


default search action
Computer Networks [and ISDN Systems], Volume 57
Volume 57, Number 1, January 2013
- Ian F. Akyildiz, Harry Rudin:
COMNET editorial for 2012. 1-2 - Christos Papathanasiou, Nikos Dimitriou
, Leandros Tassiulas:
Dynamic radio resource and interference management for MIMO-OFDMA mobile broadband wireless access systems. 3-16 - Long Long, Ahmed E. Kamal:
Protecting multicast services in optical internet backbones. 17-28 - Ahmad Sardouk, Majdi Mansouri
, Leïla Merghem-Boulahia, Dominique Gaïti, Rana Rahim-Amoud:
Crisis management using MAS-based wireless sensor networks. 29-45 - Dong Mei Shan, Kee Chaing Chua, Gurusamy Mohan
, Jian Qiu:
Partial spatial protection for provisioning differentiated reliability in FSTR-based Metro Ethernet networks. 46-60 - Seung Yeob Nam
, Seong Joon Kim, Sihyung Lee
, Hyong S. Kim:
Estimation of the available bandwidth ratio of a remote link or path segments. 61-77 - Kishore Angrishi:
An end-to-end stochastic network calculus with effective bandwidth and effective capacity. 78-84 - Beakcheol Jang, Jun Bum Lim, Mihail L. Sichitiu
:
An asynchronous scheduled MAC protocol for wireless sensor networks. 85-98 - Donghyeok An, Honguk Woo, Hyunsoo Yoon, Ikjun Yeom:
Enhanced cooperative communication MAC for mobile wireless networks. 99-116 - Mingwei Xu, Meijia Hou, Dan Wang
, Jiahai Yang:
An efficient critical protection scheme for intra-domain routing using link characteristics. 117-133 - A. Mirsayar Barkoosaraei, A. Hamid Aghvami:
Dynamic partitioning of IP-based wireless access networks. 134-146 - Addisu Eshete, Yuming Jiang
:
Generalizing the CHOKe flow protection. 147-161 - Anwesha Mukherjee
, Srimoyee Bhattacherjee, Sucheta Pal, Debashis De:
Femtocell based green power consumption methods for mobile network. 162-178 - Weiwei Fang, Xiangmin Liang, Shengxin Li, Luca Chiaraviglio
, Naixue Xiong:
VMPlanner: Optimizing virtual machine placement and traffic flow routing to reduce network power costs in cloud data centers. 179-196 - Hui Chen
, Yang Xiao
, Susan V. Vrbsky:
An update-based step-wise optimal cache replacement for wireless data access. 197-212 - Enrico Gregori, Luciano Lenzini, Chiara Orsini:
k-Dense communities in the Internet AS-level topology graph. 213-227 - Abderrahmen Mtibaa, Khaled A. Harras:
Fairness-related challenges in mobile opportunistic networking. 228-242 - Guang Yao, Jun Bi
, Peiyao Xiao:
VASE: Filtering IP spoofing traffic with agility. 243-257 - Pablo Serrano
, Paul Patras
, Andrea Mannocci
, Vincenzo Mancuso
, Albert Banchs:
Control theoretic optimization of 802.11 WLANs: Implementation and experimental evaluation. 258-272 - Fabio R. J. Vieira, José Ferreira de Rezende
, Valmir Carneiro Barbosa
, Serge Fdida:
Local heuristic for the refinement of multi-path routing in wireless mesh networks. 273-285 - Consolee Mbarushimana, Ali Shahrabi
, Tom Buggy:
A cross-layer TCP enhancement in QoS-aware mobile ad hoc networks. 286-301 - Julia Amador, Jesus R. Artalejo:
Modeling computer virus with the BSDE approach. 302-316 - Toktam Mahmoodi
, Vasilis Friderikos
, Hamid Aghvami:
Using traffic asymmetry to enhance TCP performance. 317-329 - Devrim Unal
, Mehmet Ufuk Çaglayan
:
A formal role-based access control model for security policies in multi-domain mobile networks. 330-350 - Lin Cui, Weijia Jia
:
Cyclic stable matching for three-sided networking services. 351-363 - Berk Canberk
:
An adaptive and QoS-based spectrum awareness framework for CR networks. 364-373
Volume 57, Number 2, February 2013
- Ronaldo M. Salles
, Guofei Gu, Morton Swimmer:
Editorial for Computer Networks special issue on ''Botnet Activity: Analysis, Detection and Shutdown''. 375-377 - Sérgio S. C. Silva, Rodrigo M. P. Silva, Raquel Coelho Gomes Pinto, Ronaldo M. Salles
:
Botnets: A survey. 378-403 - Masood Khosroshahy, Mustafa K. Mehmet Ali, Dongyu Qiu:
The SIC botnet lifecycle model: A step beyond traditional epidemiological models. 404-421 - Marco Riccardi, Roberto Di Pietro
, Marta Palanques, Jorge Aguila Vila:
Titans' revenge: Detecting Zeus via its own flaws. 422-435 - Aditya K. Sood, Richard J. Enbody, Rohit Bansal:
Dissecting SpyEye - Understanding the design of third generation botnets. 436-450 - Juan Caballero, Dawn Song:
Automatic protocol reverse-engineering: Message format extraction and field semantics inference. 451-474 - Christian J. Dietrich, Christian Rossow, Norbert Pohlmann:
CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis. 475-486 - Roberto Perdisci
, Davide Ariu
, Giorgio Giacinto
:
Scalable fine-grained behavioral clustering of HTTP-based malware. 487-500 - Hui-Tang Lin, Ying-You Lin, Jui-Wei Chiang:
Genetic-based real-time fast-flux service networks detection. 501-513 - Chun-Ying Huang
:
Effective bot host detection based on network failure models. 514-525 - Pedro Henrique B. Las-Casas, Dorgival O. Guedes
, Jussara M. Almeida, Artur Ziviani
, Humberto T. Marques-Neto
:
SpaDeS: Detecting spammers at the source network. 526-539 - Guanhua Yan:
Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks. 540-555 - Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu:
Design and analysis of a social botnet. 556-578 - Jingyu Hua, Kouichi Sakurai:
Botnet command and control based on Short Message Service and human mobility. 579-597
Volume 57, Number 3, February 2013
- Antonio de la Oliva
, Tito R. Vargas Hernández
, Juan Carlos Guerri
, José Alberto Hernández
, Pedro Reviriego:
Performance analysis of Energy Efficient Ethernet on video streaming servers. 599-608 - Evan Tan, Chun Tung Chou
:
Joint optimization of continuity and quality for streaming video. 609-621 - Chong Han, Josep Miquel Jornet
, Etimad A. Fadel
, Ian F. Akyildiz:
A cross-layer communication module for the Internet of Things. 622-633 - Zi Chu, Steven Gianvecchio, Aaron Koehl, Haining Wang, Sushil Jajodia
:
Blog or block: Detecting blog bots through behavioral biometrics. 634-646 - Kush Kothari, Matthew K. Wright
:
Mimic: An active covert channel that evades regularity-based detection. 647-657 - Noriaki Kamiyama:
Designing data center network by analytic hierarchy process. 658-667 - Yu Wang, Hari Krishna Garg, Mehul Motani
:
Downlink scheduling for user equipment served by multiple mobile terminals in cellular systems. 668-681 - Tudor Dumitras, Priya Narasimhan:
A study of unpredictability in fault-tolerant middleware. 682-698 - Vincent Lucas, Jean-Jacques Pansiot
, Dominique Grad, Benoît Hilt:
Robust and fair Multicast Congestion Control (M2C). 699-724 - Joo-Young Baek, Jeong-Yoon Lee, Young-Joo Suh:
An elastic compensation model for frame-based scheduling algorithms in wireless networks. 725-740 - Noriaki Kamiyama, Tatsuya Mori
, Ryoichi Kawahara:
Autonomic load balancing of flow monitors. 741-761 - Faqir Zarrar Yousaf, Christian Wietfeld
:
Optimizing throughput performance of FMIPv6 over legacy 802.11 networks using iterative scanning. 762-781 - Yi-Mao Hsiao, Yuan-Sun Chu, Jeng-Farn Lee, Jinn-Shyan Wang:
A high-throughput and high-capacity IPv6 routing lookup system. 782-794 - Emiliano Casalicchio
, Luca Silvestri:
Mechanisms for SLA provisioning in cloud-based service providers. 795-810 - Aruna Jamdagni, Zhiyuan Tan
, Xiangjian He
, Priyadarsi Nanda, Ren Ping Liu
:
RePIDS: A multi tier Real-time Payload-based Intrusion Detection System. 811-824 - Reduan H. Khan, Jamil Y. Khan
:
A comprehensive review of the application characteristics and traffic requirements of a smart grid communications network. 825-845
Volume 57, Number 4, March 2013
- Ren-Huang Liou, Yi-Bing Lin:
Mobility management with the central-based location area policy. 847-857 - Wei-Tong Wang, Kuo-Feng Ssu:
Obstacle detection and estimation in wireless sensor networks. 858-868 - Zhen Ling, Junzhou Luo, Wei Yu
, Xinwen Fu, Weijia Jia
, Wei Zhao
:
Protocol-level attacks against Tor. 869-886 - Jiunn-Jye Lee, Hann-Huei Chiou, Chia-Chang Hsu, Chin-Laung Lei:
An adaptive sector-based routing model over structured peer-to-peer networks. 887-896 - Juhoon Kim, Luigi Iannone, Anja Feldmann
:
Caching Locator/ID mappings: An experimental scalability analysis and its implications. 897-909 - Kaikai Chi, Xiaohong Jiang, Yi-hua Zhu, Jing Wang, Yanjun Li:
Block-level packet recovery with network coding for wireless reliable multicast. 910-923 - Mohamed Diallo, Vasilis Sourlas
, Paris Flegkas, Serge Fdida, Leandros Tassiulas:
A content-based publish/subscribe framework for large-scale content delivery. 924-943 - Xiuzhong Chen, Marc De Leenheer, Rui Wang, Chaitanya S. K. Vadrevu, Lei Shi, Jie Zhang, Biswanath Mukherjee:
High-performance routing for hose-based VPNs in multi-domain backbone networks. 944-953 - José M. Camacho, Alberto García-Martínez
, Marcelo Bagnulo
, Francisco Valera
:
BGP-XM: BGP eXtended Multipath for transit Autonomous Systems. 954-975 - Stefano Secci
, Kunpeng Liu, Bijan Jabbari:
Efficient inter-domain traffic engineering with transit-edge hierarchical routing. 976-989 - Yuting Miao, Qiang Yang, Chunming Wu, Ming Jiang, Jinzhou Chen:
Multicast virtual network mapping for supporting multiple description coding-based video applications. 990-1002 - Rachid El Azouzi
, Francesco De Pellegrini, Habib B. A. Sidi, Vijay Kamble:
Evolutionary forwarding games in delay tolerant networks: Equilibria, mechanism design and stochastic approximation. 1003-1018 - Alex Borges Vieira, Rafael Barra de Almeida, Jussara Marques de Almeida, Sérgio Vale Aguiar Campos:
SimplyRep: A simple and effective reputation system to fight pollution in P2P live streaming. 1019-1036 - Xiaoyuan Luo, Yanlin Yan, Shaobao Li, Xinping Guan:
Topology control based on optimally rigid graph in wireless sensor networks. 1037-1047 - Sungoh Kwon
, Neung-Hyung Lee:
Cell ID extension in femtocell environments. 1048-1062
Volume 57, Number 5, April 2013
- Feng Shan, Weifa Liang
, Jun Luo, Xiaojun Shen:
Network lifetime maximization for time-sensitive data gathering in wireless sensor networks. 1063-1077 - Christian Bauer:
A Secure Correspondent Router Protocol for NEMO Route Optimization. 1078-1100 - Mehmet Yunus Donmez, Sinan Isik, Cem Ersoy
:
Combined analysis of contention window size and duty cycle for throughput and energy optimization in wireless sensor networks. 1101-1112 - Mohammad A. Raayatpanah
, H. Salehi Fathabadi
, Babak H. Khalaj, Salman Khodayifar:
Minimum cost multiple multicast network coding with quantized rates. 1113-1123 - Efe Karasabun, Ibrahim Korpeoglu
, Cevdet Aykanat:
Active node determination for correlated data gathering in wireless sensor networks. 1124-1138 - Donggyu Yun, Jungseul Ok, Bongjhin Shin, Soobum Park, Yung Yi:
Embedding of virtual network requests over static wireless multihop networks. 1139-1152 - Ji-Hoon Yun:
Performance analysis of IEEE 802.11 WLANs with rate adaptation in time-varying fading channels. 1153-1166 - Pavlos Antoniou, Andreas Pitsillides, Tim Blackwell, Andries P. Engelbrecht
, Loizos Michael:
Congestion control in wireless sensor networks based on bird flocking behavior. 1167-1191 - Necati Kilic, Vehbi Cagri Gungor:
Analysis of low power wireless links in smart grid environments. 1192-1203 - Gregory Detal, Christoph Paasch, Simon van der Linden, Pascal Mérindol, Gildas Avoine, Olivier Bonaventure:
Revisiting flow-based load balancing: Stateless path selection in data center networks. 1204-1216 - Slavisa Aleksic
, Margot Deruyck, Willem Vereecken, Wout Joseph, Mario Pickavet
, Luc Martens:
Energy efficiency of femtocell deployment in combined wireless/optical access networks. 1217-1233 - Peristera A. Baziana
, Ioannis E. Pountourakis:
An access protocol for efficiency optimization in WDM networks: A propagation delay and collisions avoidance analysis. 1234-1252 - Lucia D'Acunto
, Nitin Chiluka, Tamás Vinkó
, Henk J. Sips:
BitTorrent-like P2P approaches for VoD: A comparative study. 1253-1276 - Daniele Casagrande
, Pier Luca Montessoro, Franco Blanchini
:
Fair and optimal dynamic admission control of elastic flows. 1277-1288 - Saeed Salah
, Gabriel Maciá-Fernández
, Jesús Esteban Díaz Verdejo:
A model-based survey of alert correlation techniques. 1289-1317 - Christian Esposito
, Domenico Cotroneo, Stefano Russo
:
On reliability in publish/subscribe services. 1318-1343 - Wenye Wang
, Zhuo Lu:
Cyber security in the Smart Grid: Survey and challenges. 1344-1371
Volume 57, Number 6, April 2013
- Márton Csernai, András Gulyás, Attila Korösi, Balázs Sonkoly
, Gergely Biczók
:
Incrementally upgradable data center architecture using hyperbolic tessellations. 1373-1393 - Christos Anagnostopoulos
, Stathes Hadjiefthymiades
:
Multivariate context collection in mobile sensor networks. 1394-1407 - Kai-Wei Ke, Chia-Hui Huang:
Performance evaluation of multisource Application Layer Multicast (ALM): Theoretical and simulative aspects. 1408-1424 - Urs Hunkeler, Clemens Lombriser, Hong Linh Truong, Beat Weiss
:
A case for centrally controlled wireless sensor networks. 1425-1442 - Conrado Borraz-Sánchez, Diego Klabjan:
Optimal placement of reconfigurable optical add/drop multiplexers with packing, blocking, and signal loss. 1443-1458 - Adel Ali Ahmed
:
An enhanced real-time routing protocol with load distribution for mobile wireless sensor networks. 1459-1473 - Linjun Fan, Yunxiang Ling, Tao Wang, Xiaomin Zhu, Xiaoyong Tang:
Novel clock synchronization algorithm of parametric difference for parallel and distributed simulations. 1474-1487 - Youghourta Benfattoum, Steven Martin, Khaldoun Al Agha:
QoS for real-time reliable multicasting in wireless multi-hop networks using a Generation-Based Network Coding. 1488-1502 - Edoardo Amaldi, Antonio Capone
, Luca Giovanni Gianoli:
Energy-aware IP traffic engineering with shortest path routing. 1503-1517 - Rajarshi Mahapatra
, Antonio De Domenico, Rohit Gupta, Emilio Calvanese Strinati:
Green framework for future heterogeneous wireless networks. 1518-1528 - Xiaoping Wang, Yunhao Liu, Zheng Yang, Kai Lu, Jun Luo:
OFA: An optimistic approach to conquer flip ambiguity in network localization. 1529-1544 - S. Chiappetta, Claudio Mazzariello, Roberta Presta
, Simon Pietro Romano
:
An anomaly-based approach to the analysis of the social behavior of VoIP users. 1545-1559 - Ryoichi Kawahara, Tetsuya Takine, Tatsuya Mori
, Noriaki Kamiyama, Keisuke Ishibashi:
Mean-variance relationship of the number of flows in traffic aggregation and its application to traffic management. 1560-1576
Volume 57, Number 7, May 2013
- S. H. Shah Newaz, Ángel Cuevas
, Gyu Myoung Lee, Noël Crespi, Jun Kyun Choi:
Adaptive Delay-Aware Energy Efficient TDM-PON. 1577-1596 - Christian Facchini, Oliver Holland, Fabrizio Granelli
, Nelson L. S. da Fonseca
, Hamid Aghvami:
Dynamic green self-configuration of 3G base stations using fuzzy cognitive maps. 1597-1610 - Weibo Chu, Xiaohong Guan, Zhongmin Cai, Lixin Gao:
Real-time volume control for interactive network traffic replay. 1611-1629 - Tobias Jung, Sylvain Martin, Mohamed Nassar
, Damien Ernst, Guy Leduc:
Outbound SPIT filter with optimal performance guarantees. 1630-1643 - Jongwook Lee, Jin-Ghoo Choi, Saewoong Bahk:
Opportunistic downlink data delivery for mobile collaborative communities. 1644-1655 - T. D. Lagkas
, Panagiotis G. Sarigiannidis
, Malamati D. Louta
:
On analyzing the intra-frame power saving potentials of the IEEE 802.16e downlink vertical mapping. 1656-1673 - Weijie Wu, John C. S. Lui, Richard T. B. Ma
:
On incentivizing upload capacity in P2P-VoD systems: Design, analysis and evaluation. 1674-1688 - Wei Kuang Lai, Chang-Lung Tang:
QoS-aware downlink packet scheduling for LTE networks. 1689-1698 - Cristina Rottondi
, Giacomo Verticale
, Antonio Capone
:
Privacy-preserving smart metering with multiple data Consumers. 1699-1713 - Javad Akbari Torkestani:
An energy-efficient topology construction algorithm for wireless sensor networks. 1714-1725 - Ahmad Vakili, Jean-Charles Grégoire:
QoE management for video conferencing applications. 1726-1738
Volume 57, Number 8, June 2013
- Stamatios Arkoulis, Evangelos Anifantis, Vasileios Karyotis
, Symeon Papavassiliou, Nikolas Mitrou:
On the optimal, fair and channel-aware cognitive radio network reconfiguration. 1739-1757 - László Gyarmati, András Gulyás, Balázs Sonkoly
, Tuan Anh Trinh, Gergely Biczók
:
Free-scaling your data center. 1758-1773 - Gongqi Lin, Sieteng Soh
, Kwan-Wu Chin
, Mihai M. Lazarescu
:
Efficient heuristics for energy-aware routing in networks with bundled links. 1774-1788 - Giacomo Bacci
, Marco Luise:
QoS-aware game-theoretic rate & power control for CDMA wireless communication networks. 1789-1804 - Shengbo Yang, Chai Kiat Yeo
, Bu-Sung Lee
:
MaxCD: Efficient multi-flow scheduling and cooperative downloading for improved highway drive-thru Internet systems. 1805-1820 - Michele Rondinone
, Javier Gozálvez
:
Contention-based forwarding with multi-hop connectivity awareness in vehicular ad-hoc networks. 1821-1837 - Giovanna Carofiglio, Luca Muscariello, Dario Rossi, Claudio Testa, Silvio Valenti:
Rethinking the Low Extra Delay Background Transport (LEDBAT) Protocol. 1838-1852 - Zoltán Czirkos, Gábor Hosszú
:
Solution for the broadcasting in the Kademlia peer-to-peer overlay. 1853-1862 - Stefano Iellamo, Lin Chen, Marceau Coupechoux:
Proportional and double imitation rules for spectrum access in cognitive radio networks. 1863-1879 - Alexandre Andrade Pires, José Ferreira de Rezende
:
Independent links: A new approach to increase spatial reuse in wireless networks. 1880-1893
Volume 57, Number 9, June 2013
- Xi Fang, Dejun Yang
, Guoliang Xue:
Pathbook: Cross-layer optimization for full-duplex wireless networks. 1895-1912 - Habib M. Ammari:
On the energy-delay trade-off in geographic forwarding in always-on wireless sensor networks: A multi-objective optimization problem. 1913-1935 - Michal Ficek, Tomás Pop, Lukas Kencl
:
Active tracking in mobile networks: An in-depth view. 1936-1954 - Leonardo Militano, Antonio Iera
, Francesco Scarcello
:
A fair cooperative content-sharing service. 1955-1973 - Péter Babarczi
, Gergely Biczók
, Harald Øverby, János Tapolcai
, Péter Soproni:
Realization strategies of dedicated path protection: A bandwidth cost perspective. 1974-1990 - Waleed Alsalih, Kashif Ali, Hossam S. Hassanein:
A power control technique for anti-collision schemes in RFID systems. 1991-2003 - Angelo Coiro, Marco Listanti
, Alessandro Valenti, Francesco Matera:
Energy-aware traffic engineering: A routing-based distributed solution for connection-oriented IP networks. 2004-2020 - Juan Felipe Botero
, Xavier Hesselbach:
Greener networking in a network virtualization environment. 2021-2039 - Adil Fahad, Zahir Tari, Ibrahim Khalil, Ibrahim Habib, Hussein M. Alnuweiri:
Toward an efficient and scalable feature selection approach for internet traffic classification. 2040-2057 - Sasho Gramatikov, Fernando Jaureguizar
, Julián Cabrera, Narciso García
:
Stochastic modelling of peer-assisted VoD streaming in managed networks. 2058-2074 - Evariste Logota
, Carlos Campos, Susana Sargento
, Augusto Neto
:
Advanced multicast class-based bandwidth over-provisioning. 2075-2092 - Giuseppe Aceto, Alessio Botta
, Walter de Donato, Antonio Pescapè:
Cloud monitoring: A survey. 2093-2115
Volume 57, Number 10, July 2013
- Stephan J. Eidenbenz
, Madhav V. Marathe, Arunabha Sen:
Editorial for Computer Networks special issue on ''Towards a Science of Cyber Security''. 2119-2120 - Chris J. Kuhlman, V. S. Anil Kumar, S. S. Ravi:
Controlling opinion propagation in online networks. 2121-2132 - Nam P. Nguyen, Guanhua Yan, My T. Thai:
Analysis of misinformation containment in online social networks. 2133-2146 - Yi Wang, Marios Iliofotou, Michalis Faloutsos
, Bin Wu:
Analyzing Communication Interaction Networks (CINs) in enterprises and inferring hierarchies. 2147-2158 - Jaafar Almasizadeh, Mohammad Abdollahi Azgomi
:
A stochastic model of attack process for the evaluation of security metrics. 2159-2180 - Bugra Çaskurlu, Ashish Gehani, Cemal Çagatay Bilgin, K. Subramani
:
Analytical models for risk-based intrusion response. 2181-2192 - Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy:
On the exploitation of CDF based wireless scheduling. 2193-2205 - Klaus Julisch:
Understanding and overcoming cyber security anti-patterns. 2206-2211
- Tapio Levä, Miika Komu, Ari Keränen, Sakari Luukkainen:
Adoption barriers of network layer protocols: The case of host identity protocol. 2218-2232 - Elena Torroglosa-García, Antonio D. Perez-Morales, Pedro Martinez-Julia
, Diego R. López:
Integration of the OAuth and Web Service family security standards. 2233-2249 - Yang Xiang, Xingang Shi, Jianping Wu, Zhiliang Wang, Xia Yin:
Sign what you really care about - Secure BGP AS-paths efficiently. 2250-2265 - Rodrigo Roman, Jianying Zhou
, Javier López
:
On the features and challenges of security and privacy in distributed internet of things. 2266-2279 - Pedro Martinez-Julia
, Antonio Fernandez Gómez-Skarmeta
:
Beyond the separation of identifier and locator: Building an identity-based overlay network architecture for the Future Internet. 2280-2300
Volume 57, Number 11, August 2013
- Paola Cappanera
, Luciano Lenzini, Alessandro Lori, Giovanni Stea
, Gigliola Vaglini:
Optimal joint routing and link scheduling for real-time traffic in TDMA Wireless Mesh Networks. 2301-2312 - Soham Sengupta:
An approach to provide a network layer security model with QR code generated with shuffled GPS parameters as embedded keys traveling over Internet using existing IPv4 mechanism. 2313-2330 - Fabien Tarissan, Bruno Quoitin
, Pascal Mérindol, Benoit Donnet
, Jean-Jacques Pansiot
, Matthieu Latapy:
Towards a bipartite graph modeling of the internet topology. 2331-2347 - Xiao-Yang Liu, Kai-Liang Wu, Yanmin Zhu, Linghe Kong, Min-You Wu:
Mobility increases the surface coverage of distributed sensor networks. 2348-2363 - Md. Nooruzzaman
, Osanori Koyama, Yutaka Katsuyama:
Congestion removing performance of stackable ROADM in WDM networks under dynamic traffic. 2364-2373 - Mirjana D. Stojanovic, Aleksandra Kostic-Ljubisavljevic
, Vesna M. Radonjic-Djogatovic:
SLA-controlled interconnection charging in next generation networks. 2374-2394
Volume 57, Number 12, August 2013
- Kenneth J. Turner, Evan H. Magill:
Special Issue on Feature interaction in communications and software systems. 2395-2398 - Sven Apel
, Alexander von Rhein, Thomas Thüm, Christian Kästner
:
Feature-interaction detection based on feature-based specifications. 2399-2409 - Mario Kolberg, John F. Buford, Krishna Kishore Dhara, Xiaotao Wu, Venky Krishnaswamy:
Feature interaction in a federated communications-enabled collaboration platform. 2410-2428 - Claire Maternaghan, Kenneth J. Turner:
Policy conflicts in home automation. 2429-2441 - Masahide Nakamura
, Kousuke Ikegami, Shinsuke Matsumoto:
Considering impacts and requirements for better understanding of environment interactions in home network services. 2442-2453 - Thein Than Tun, Robin C. Laney
, Yijun Yu
, Bashar Nuseibeh
:
Specifying software features for composition: A tool-supported approach. 2454-2464
Volume 57, Number 13, September 2013
- Yusung Kim, Ikjun Yeom:
Performance analysis of in-network caching for content-centric networking. 2465-2482 - Chao-Tsun Chang, Chih-Yung Chang, Tzu-Lin Wang, Yun-Jung Lu:
Throughput enhancement by exploiting spatial reuse opportunities with smart antenna systems in wireless ad hoc networks. 2483-2498 - Jérémy Serror, Hui Zang, Jean-Chrysostome Bolot:
Measurement and modeling of paging channel overloads on a cellular network. 2499-2513 - Hui-Tang Lin, Ying-You Lin, Chung-Jui Sun:
Efficient and adaptive resource scheduling in IEEE 802.16j transparent relay networks. 2514-2535 - Klaus Wehmuth
, Artur Ziviani
:
DACCER: Distributed Assessment of the Closeness CEntrality Ranking in complex networks. 2536-2548 - Jaehoon (Paul) Jeong, Tian He, David H. C. Du:
TMA: Trajectory-based Multi-Anycast forwarding for efficient multicast data delivery in vehicular networks. 2549-2563 - Silvia Boiardi, Antonio Capone
, Brunilde Sansò:
Radio planning of energy-aware cellular networks. 2564-2577 - Hasan Tuncer, Andres Kwasinski, Nirmala Shenoy:
Performance analysis of Virtual Mobility Domain scheme vs. IPv6 mobility protocols. 2578-2596 - Tolga Acar, Mira Belenkiy, Alptekin Küpçü
:
Single password authentication. 2597-2614 - Jeng-Wei Lee, I-Hsun Chuang, Win-Bin Huang
, Yau-Hwang Kuo:
An opportunistic resource allocation approach for mixed QoS and non-QoS connections in OFDMA wireless networks. 2615-2627 - Seungwon Shin, Zhaoyan Xu, Guofei Gu:
EFFORT: A new host-network cooperated framework for efficient and effective bot malware detection. 2628-2642 - Ben-Jye Chang, Ying-Hsin Liang, Yu-Hsien Lee:
Dynamic-cost-reward connection admission control for maximizing system reward in 4G wireless multihop relaying networks. 2643-2655 - Natalia Castro Fernandes
, Marcelo Duffles Donato Moreira, Otto Carlos Muniz Bandeira Duarte:
Safeguarding ad hoc networks with a self-organized membership control system. 2656-2674
Volume 57, Number 14, October 2013
- Boris Bellalta
, Azadeh Faridi
, Dirk Staehle, Jaume Barceló, Alexey V. Vinel, Miquel Oliver
:
Performance analysis of CSMA/CA protocols with multi-packet transmission. 2675-2688 - Pengfei Zhang, Gaoxi Xiao
, Hwee-Pink Tan
:
Clustering algorithms for maximizing the lifetime of wireless sensor networks with energy-harvesting sensors. 2689-2704 - Hung-Yu Chien:
Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices. 2705-2717 - José Camacho
, Pablo Padilla
, Pedro García-Teodoro, Jesús Esteban Díaz Verdejo:
A generalizable dynamic flow pairing method for traffic classification. 2718-2732 - Hai-Heng Ng, Wee-Seng Soh
, Mehul Motani
:
An underwater acoustic MAC protocol using reverse opportunistic packet appending. 2733-2751 - Faouzi Bouali
, Oriol Sallent
, Jordi Pérez-Romero
, Ramón Agustí
:
A cognitive management framework for spectrum selection. 2752-2765 - Ibrahima Diarrassouba, Ali Lourimi, Ali Ridha Mahjoub, Habib Youssef:
Hose workload based exact algorithm for the optimal design of virtual private networks. 2766-2774 - Florian Tschorsch, Björn Scheuermann:
An algorithm for privacy-preserving distributed user statistics. 2775-2787 - Ze Wang, Yunlong Wang, Maode Ma, Jigang Wu:
Efficient localization for mobile sensor networks based on constraint rules optimized Monte Carlo method. 2788-2801 - Giuseppe Rossini, Dario Rossi, Christophe Betoule, Remi Clavier, Gilles Thouénon:
FIB Aplasia through probabilistic routing and autoforwarding. 2802-2816 - Dariusz Gasior, Maciej Drwal:
Pareto-optimal Nash equilibrium in capacity allocation game for self-managed networks. 2817-2832 - Delfina Malandrino
, Vittorio Scarano
:
Privacy leakage on the Web: Diffusion and countermeasures. 2833-2855 - Kai-Lung Hua
, Ge-Ming Chiu, Hsing-Kuo Pao, Yi-Chi Cheng:
An efficient scheduling algorithm for scalable video streaming over P2P networks. 2856-2868
Volume 57, Number 15, October 2013
- Sunheui Ryoo, Changhee Joo, Saewoong Bahk:
Location-based spectrum allocation and partitioning scheme for cross-tier interference mitigation in macro-femtocell networks. 2869-2879 - Mingwei Xu, Yunfei Shang, Dan Li, Xin Wang:
Greening data center networks with throughput-guaranteed power-aware routing. 2880-2899 - Xiang Meng, Pui-Sze Tsang, King-Shan Lui:
Analysis of distribution time of multiple files in a P2P network. 2900-2915 - Yuh-Rong Chen, Sridhar Radhakrishnan, Sudarshan K. Dhall, Suleyman Karabuk:
On multi-stream multi-source multicast routing. 2916-2930 - Luca Chiaraviglio
, Antonio Cianfrani
, Esther Le Rouzic, Marco Polverini
:
Sleep modes effectiveness in backbone networks with limited configurations. 2931-2948 - Minh Duc Pham, Syed Mahfuzul Aziz
:
Object extraction scheme and protocol for energy efficient image communication over wireless sensor networks. 2949-2960 - Khalim Amjad Meerja
, Pin-Han Ho, Bin Wu, Hsiang-Fu Yu:
Media access protocol for a coexisting cognitive femtocell network. 2961-2975 - Xudong Xiang, Jianxiong Wan, Chuang Lin, Xin Chen:
A dynamic programming approximation for downlink channel allocation in cognitive femtocell networks. 2976-2991 - Pramila Mouttappa, Stephane Maag, Ana R. Cavalli
:
Using passive testing based on symbolic execution and slicing techniques: Application to the validation of communication protocols. 2992-3008 - Chao Hu, Ming Chen, Chang-you Xing:
Towards efficient video chunk dissemination in peer-to-peer live streaming. 3009-3024 - Stefania Tosi, Sara Casolari, Michele Colajanni
:
Data clustering based on correlation analysis applied to highly variable domains. 3025-3038 - Chao Zhou, Xinggong Zhang, Zongming Guo:
Optimal adaptive channel scheduling for scalable video broadcasting over MIMO wireless networks. 3039-3050 - Luca Chiaraviglio
, Delia Ciullo, Marco Mellia
, Michela Meo
:
Modeling sleep mode gains in energy-aware networks. 3051-3066 - Karim Habak
, Moustafa Youssef
, Khaled A. Harras:
An optimal deployable bandwidth aggregation system. 3067-3080 - Noriaki Kamiyama, Ryoichi Kawahara, Haruhisa Hasegawa:
Optimum profit allocation in coalitional VoD service. 3081-3097 - Sabrina Sicari, Alberto Coen-Porisini
, Roberto Riggio
:
DARE: evaluating Data Accuracy using node REputation. 3098-3111
Volume 57, Number 16, November 2013
- Andrea Detti
, Diego Perino, Mario Gerla, Yanghee Choi:
Editorial: Special issue on Information Centric Networking. 3113-3115
- Giovanna Carofiglio, Giacomo Morabito
, Luca Muscariello, Ignacio Solis, Matteo Varvello:
From content delivery today to information centric networking. 3116-3127 - Guoqiang Zhang, Yang Li, Tao Lin:
Caching in information centric networking: A survey. 3128-3141 - HyunYong Lee, Akihiro Nakao
:
User-assisted in-network caching in information-centric networking. 3142-3153 - Suyong Eum, Kiyohide Nakauchi, Masayuki Murata
, Yozo Shoji, Nozomu Nishinaga:
Potential based routing as a secondary best-effort routing for Information Centric Networking (ICN). 3154-3164 - Yi Wang
, Huichen Dai, Ting Zhang, Wei Meng, Jindou Fan, Bin Liu:
GPU-accelerated name lookup with component encoding. 3165-3177 - Mauro Conti
, Paolo Gasti, Marco Teoli:
A lightweight mechanism for detection of cache pollution attacks in Named Data Networking. 3178-3191 - Matthias Wählisch
, Thomas C. Schmidt
, Markus Vahlenkamp:
Backscatter from the data plane - Threats to stability and security in information-centric network infrastructure. 3192-3206 - Stefano Salsano
, Nicola Blefari-Melazzi, Andrea Detti
, Giacomo Morabito
, Luca Veltri:
Information centric networking over SDN and OpenFlow: Architectural aspects and experiments on the OFELIA testbed. 3207-3221 - Marica Amadeo, Claudia Campolo
, Antonella Molinaro:
Enhancing content-centric networking for vehicular environments. 3222-3234 - H. M. N. Dilum Bandara
, Anura P. Jayasumana:
Distributed, multi-user, multi-application, and multi-sensor data fusion over named data networks. 3235-3248 - Ben Tagger, Dirk Trossen, Alexandros Kostopoulos, Stuart Porter, George Parisis
:
Realising an application environment for information-centric networking. 3249-3266
Volume 57, Number 17, December 2013
- Luiz Filipe M. Vieira, Mario Gerla, Archan Misra
:
Fundamental limits on end-to-end throughput of network coding in multi-rate and multicast wireless networks. 3267-3275 - Marco Ajmone Marsan, Luca Chiaraviglio
, Delia Ciullo, Michela Meo
:
On the effectiveness of single and multiple base station sleep modes in cellular networks. 3276-3290 - Xiaohui Chen, Jing Xu, Wei Yuan, Wei Liu, Wenqing Cheng:
Channel assignment in heterogeneous multi-radio multi-channel wireless networks: A game theoretic approach. 3291-3299 - Elena Baralis, Andrea Bianco
, Tania Cerquitelli
, Luca Chiaraviglio
, Marco Mellia
:
NetCluster: A clustering-based framework to analyze internet passive measurements data. 3300-3315 - Ricardo Campanha Carrano, Diego G. Passos
, Luiz Claudio Schara Magalhães, Célio Vinicius N. de Albuquerque
:
Nested block designs: Flexible and efficient schedule-based asynchronous duty cycling. 3316-3326 - Honghuing Liu, Patrick P. C. Lee
, John C. S. Lui:
On the credit evolution of credit-based incentive protocols in wireless mesh networks. 3327-3343 - Genki Matsui, Takuji Tachibana, Yukinori Nakamura, Kenji Sugimoto:
Distributed power adjustment based on control theory for cognitive radio networks. 3344-3356 - João Marco C. Silva
, Paulo Carvalho
, Solange Rito Lima
:
A multiadaptive sampling technique for cost-effective network measurements. 3357-3369 - Zoltán Faigl, László Bokor
, Jani Pellikka, Andrei V. Gurtov
:
Suitability analysis of existing and new authentication methods for future 3GPP Evolved Packet Core. 3370-3388 - Eleonora Borgia
, Giuseppe Anastasi, Marco Conti
:
Energy efficient and reliable data delivery in urban sensing applications: A performance analysis. 3389-3409 - Brett Hagelstein, Mehran Abolhasan
, Daniel Robert Franklin
, Farzad Safaei
:
Improving fairness in IEEE 802.11 networks using MAC layer opportunistic retransmission. 3410-3427 - Lei Chen
, Di Yuan:
Mathematical modeling for optimal design of in-building distributed antenna systems. 3428-3445 - Angelo Coluccia
, Alessandro D'Alconzo, Fabio Ricciato:
Distribution-based anomaly detection via generalized likelihood ratio test: A general Maximum Entropy approach. 3446-3462 - Konstantin Avrachenkov
, Urtzi Ayesta, Josu Doncel
, Peter Jacko
:
Congestion control of TCP flows in Internet routers by means of index policy. 3463-3478 - Nicola Cordeschi
, Mohammad Shojafar
, Enzo Baccarelli:
Energy-saving self-configuring networked data centers. 3479-3491 - Chengzhe Lai, Hui Li, Rongxing Lu, Xuemin (Sherman) Shen
:
SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. 3492-3510 - Ce-Kuen Shieh, Chia-Yu Yu, Cheng-Han Lin, J. Morris Chang:
Efficiency-driven selection of bandwidth request mechanism in broadband wireless access networks. 3511-3521 - Peng Zhou
, Xiapu Luo
, Ang Chen, Rocky K. C. Chang
:
SGor: Trust graph based onion routing. 3522-3544 - Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan
, Rodolfo W. L. Coutinho
, João Crisóstomo Weyl Albuquerque Costa:
A semi-Markov decision process-based joint call admission control for inter-RAT cell re-selection in next generation wireless networks. 3545-3562 - Jihun Ha, Jiung Yu, Byungjo Kim, Hyogon Kim:
On UDP continuity over vertical handovers. 3563-3580 - Le Wang, Jukka Manner
:
Energy-efficient mobile web in a bundle. 3581-3600 - Nuutti Varis, Jukka Manner
, Mikko Särelä, Timo Kiravuo:
DBridges: Flexible floodless frame forwarding. 3601-3616 - Byung-Gook Kim, Jeong-Ahn Kwon, Jang-Won Lee
:
Subchannel allocation for the OFDMA-based femtocell system. 3617-3629 - Yuxin Meng
, Wenjuan Li
, Lam-for Kwok
:
Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection. 3630-3640 - Marc Manzano, Eusebi Calle
, Victor Torres-Padrosa, Juan Segovia, David Harle:
Endurance: A new robustness measure for complex networks under multiple failure scenarios. 3641-3653 - Emre Atsan, Öznur Özkasap
:
SCALAR: Scalable data lookup and replication protocol for mobile ad hoc networks. 3654-3672 - Martin Zubeldia, Andrés Ferragut
, Fernando Paganini:
Overcoming performance pitfalls in rate-diverse high speed WLANs. 3673-3685 - Matjaz Fras, Joze Mohorko, Zarko Cucej:
Limitations of a Mapping Algorithm with Fragmentation Mimics (MAFM) when modeling statistical data sources based on measured packet network traffic. 3686-3700 - Cuiqin Hou, Yibin Hou, Zhangqin Huang:
A framework based on barycentric coordinates for localization in wireless sensor networks. 3701-3712 - Liliana Bolea, Jordi Pérez-Romero
, Ramón Agustí
:
ML aided context feature extraction for cognitive radio. 3713-3727 - Alfonso Iacovazzi
, Alessandro D'Alconzo, Fabio Ricciato, Martin Burkhart:
Elementary secure-multiparty computation for massive-scale collaborative network monitoring: A quantitative assessment. 3728-3742 - Giovanna Carofiglio, Massimo Gallo, Luca Muscariello:
On the performance of bandwidth and storage sharing in information-centric networks. 3743-3758
Volume 57, Number 18, December 2013
- Angelos-Christos G. Anadiotis, Charalampos Z. Patrikakis
, Iakovos S. Venieris:
On the performance improvement of gossip protocols for content-based publish-subscribe through caching. 3759-3772 - Peng Lin, Alan Kai-Hau Yeung
, Angus Kin Yeung Wong:
Multi-portal association based dispatching and a virtual-queue method in wireless mesh networks. 3773-3789 - Nadine Akkari
:
An IMS-based integration architecture for WiMax/LTE handover. 3790-3798 - Yifeng Cai, Konstantinos Pelechrinis, Xin Wang, Prashant Krishnamurthy, Yijun Mo:
Joint reactive jammer detection and localization in an enterprise WiFi network. 3799-3811 - Fatemeh Ghods, Hamed Yousefi, Ali Mohammad Afshin Hemmatyar, Ali Movaghar
:
MC-MLAS: Multi-channel Minimum Latency Aggregation Scheduling in Wireless Sensor Networks. 3812-3825 - Elias Bou-Harb
, Mourad Debbabi
, Chadi Assi:
A systematic approach for detecting and clustering distributed cyber scanning. 3826-3839 - Baozhi Chen, Dario Pompili:
Minimizing position uncertainty for under-ice autonomous underwater vehicles. 3840-3854 - Zohar Naor, Sajal K. Das
:
A scalable framework for mobile real-time group communication services. 3855-3865 - Seung Yeob Nam
, Sirojiddin Djuraev, Minho Park
:
Collaborative approach to mitigating ARP poisoning-based Man-in-the-Middle attacks. 3866-3884 - Wen Sun, Yu Ge
, Wai-Choong Wong
:
A lightweight distributed scheme for mitigating inter-user interference in body sensor networks. 3885-3896 - Ignasi Paredes-Oliva, Pere Barlet-Ros
, Xenofontas A. Dimitropoulos:
FaRNet: Fast recognition of high-dimensional patterns from big network traffic data. 3897-3913 - Zakwan Al-Arnaout
, Qiang Fu
, Marcus Frean:
A divide-and-conquer approach for content replication in WMNs. 3914-3928 - Weigang Wu, Jiannong Cao
, Hejun Wu, Jingjing Li:
Robust and dynamic data aggregation in wireless sensor networks: A cross-layer approach. 3929-3940 - Seung-Ho Lee, Han-You Jeong, Seung-Woo Seo:
Optimal pricing and capacity partitioning for tiered access service in virtual networks. 3941-3956 - Wanzhi Qiu, Efstratios Skafidas
:
Distributed routing for signal detection in wireless sensor networks. 3957-3966 - Mohammad Rajiullah, Reine Lundin, Anna Brunström, Stefan Lindskog:
Performance analysis and improvement of PR-SCTP for small messages. 3967-3986 - Zhenhua Wu, Yu Hen Hu:
How many wireless resources are needed to resolve the hidden terminal problem? 3987-3996 - Giovanni Accongiagioco, Matteo Maria Andreozzi, Daniele Migliorini, Giovanni Stea
:
Throughput-optimal resource allocation in LTE-Advanced with distributed antennas. 3997-4009 - M. Sarper Gokturk, Özgür Gürbüz, Elza Erkip
:
A cross-layer multi-hop cooperative network architecture for wireless ad hoc networks. 4010-4029 - Tahir Mehmood, Lavy Libman, Hooman Reisi Dehkordi, Sanjay K. Jha
:
Optimal opportunistic routing and network coding for bidirectional wireless flows. 4030-4046 - Shahabeddin Geravand, Mahmood Ahmadi
:
Bloom filter applications in network security: A state-of-the-art survey. 4047-4064

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.