default search action
Computer Communications, Volume 32
Volume 32, Number 1, January 2009
- Yew Fai Wong, Lek Heng Ngoh, Winston Khoon Guan Seah, Wai-Choong Wong:
Dual wakeup design for wireless sensor networks. 1-13 - Jianhong Zhang, Jian Mao:
A novel identity-based multi-signcryption scheme. 14-18 - Xinbing Wang, Yun Han, Youyun Xu:
APS-FeW: Improving TCP throughput over multihop adhoc networks. 19-24 - P. P. Deepthi, P. S. Sathidevi:
New stream ciphers based on elliptic curve point multiplication. 25-33 - Yuanqing He, Tianyun Huang:
Objective quality definition of scalable video coding and its application for optimal streaming of FGS-coded videos. 34-40 - Hasan Sözer, Metin Tekkalmaz, Ibrahim Korpeoglu:
A peer-to-peer file search and download protocol for wireless ad-hoc networks. 41-50 - Seung Chul Han, Ye Xia:
Network load-aware content distribution in overlay networks. 51-61 - Jie Feng, Zhipeng Ouyang, Lisong Xu, Byrav Ramamurthy:
Packet reordering in high-speed networks and its impact on high-speed TCP variants. 62-68 - Kuei-Ping Shih, Wen-Hwa Liao, Hung-Chang Chen, Chien-Min Chou:
On avoiding RTS collisions for IEEE 802.11-based wireless ad hoc networks. 69-77 - Fernando A. Kuipers, Freek Dijkstra:
Path selection in multi-layer networks. 78-85 - Hamid Shokrzadeh, A. T. Haghighat, Abbas Nayebi:
New routing framework base on rumor routing in wireless sensor networks. 86-93 - Ai Chen, Dongwook Lee, Gayathri Chandrasekaran, Prasun Sinha:
High throughput MAC layer multicasting over time-varying channels. 94-104 - Li Zhang, Lian-bo Cai, Meng Li, Fa-hui Wang:
A method for least-cost QoS multicast routing based on genetic simulated annealing algorithm. 105-110 - Zizhan Zheng, Prasun Sinha:
Buffer Coding for Reliable Transmissions over Wireless Networks. 111-123 - Boqing Zhou, Sujun Li, Qiaoliang Li, Xingming Sun, Xiaoming Wang:
An efficient and scalable pairwise key pre-distribution scheme for sensor networks using deployment knowledge. 124-133 - Wan-Seon Lim, Dong-Wook Kim, Young-Joo Suh, Jeong-Jae Won:
Implementation and performance study of IEEE 802.21 in integrated IEEE 802.11/802.16e networks. 134-143 - Liang Dai, Yanchuan Cao, Yi Cui, Yuan Xue:
On scalability of proximity-aware peer-to-peer streaming. 144-153 - Ángel M. Pérez-Bellido, Sancho Salcedo-Sanz, Emilio G. Ortíz-García, Antonio Portilla-Figueras, Maurizio Naldi:
A dandelion-encoded evolutionary algorithm for the delay-constrained capacitated minimum spanning tree problem. 154-158 - Hisham A. Mahmoud, Hüseyin Arslan, Mehmet Kemal Özdemir:
An efficient initial ranging algorithm for WiMAX (802.16e) OFDMA. 159-168 - Peng-Jung Wu, Chung-Nan Lee:
Connection-oriented multi-channel MAC protocol for ad-hoc networks. 169-178 - Khaled Salah, Abdulhakim Ali Qahtan:
Implementation and experimental performance evaluation of a hybrid interrupt-handling scheme. 179-188 - Yan Zhang, Jim Mee Ng, Chor Ping Low:
A distributed group mobility adaptive clustering algorithm for mobile ad hoc networks. 189-202 - Stelios Dritsas, Vicky Dritsou, Bill Tsoumas, Panos Constantopoulos, Dimitris Gritzalis:
OntoSPIT: SPIT management through ontologies. 203-212 - Noshin Bigdeli, Mohammad Haeri:
CDM-based design and performance evaluation of a robust AQM method for dynamic TCP/AQM networks. 213-229
Volume 32, Number 2, February 2009
- Jui Teng Wang:
Combined switching and power control for diversity and multiplexing in MIMO systems with cochannel interference. 231-234 - Seungwoon Kim, Minwook Lee, Ikjun Yeom:
Impact of bandwidth request schemes for Best-Effort traffic in IEEE 802.16 networks. 235-245 - Stylianos Dimitriou, Vassilis Tsaoussidis:
Adaptive Head-to-Tail: Active Queue Management based on implicit congestion signals. 246-256 - Zhenyu Li, Zengyang Zhu, Gaogang Xie, Zhongcheng Li:
Fast and proximity-aware multi-source overlay multicast under heterogeneous environment. 257-267 - S. Y. Wang, C. L. Chou, C. C. Lin:
Increasing wide-area download throughputs on the roads by trunking multiple cellular channels over a vehicular ad hoc network. 268-280 - Yu-Chang Chen, Ja-Hsing Hsia, Yi-Ju Liao:
Advanced seamless vertical handoff architecture for WiMAX and WiFi heterogeneous networks with QoS guarantees. 281-293 - Antonio Robles-Gómez, Aurelio Bermúdez, Rafael Casado, Åshild Grønstad Solheim, Thomas Sødring, Tor Skeie:
A new distributed management mechanism for ASI based networks. 294-304 - Gabriel Ioan Ivascu, Samuel Pierre, Alejandro Quintero:
QoS routing with traffic distribution in mobile ad hoc networks. 305-316 - Okan Yilmaz, Ing-Ray Chen:
Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks. 317-323 - Seyed Mohammad Mahdi Alavi, Martin J. Hayes:
Robust active queue management design: A loop-shaping approach. 324-331 - Yi-Neng Lin, Ying-Dar Lin, Yuan-Cheng Lai, Che-Wen Wu:
Highest Urgency First (HUF): A latency and modulation aware bandwidth allocation algorithm for WiMAX base stations. 332-342 - Taoyu Li, Yuncheng Zhu, Ke Xu, Maoke Chen:
Performance model and evaluation on geographic-based routing. 343-348 - Yuhua Chen, Oladapo Oguntoyinbo:
Power efficient packet classification using cascaded bloom filter and off-the-shelf ternary CAM for WDM networks. 349-356 - Akbar Ghaffar Pour Rahbar, Oliver W. W. Yang:
LGRR: A new packet scheduling algorithm for differentiated services packet-switched networks. 357-367 - Mehdi Kadivar, Mohammad Ebrahim Shiri, Mehdi Dehghan:
Distributed topology control algorithm based on one- and two-hop neighbors' information for ad hoc networks. 368-375 - Timotheos Kastrinogiannis, Symeon Papavassiliou:
Game theoretic distributed uplink power control for CDMA networks with real-time services. 376-385 - Huanlai Xing, Xin Liu, Xing Jin, Lin Bai, Yuefeng Ji:
A multi-granularity evolution based Quantum Genetic Algorithm for QoS multicast routing problem in WDM networks. 386-393 - Ik Rae Jeong, Jeong Ok Kwon, Dowon Hong, Dong Hoon Lee:
Constructing PEKS schemes secure against keyword guessing attacks is possible? 394-396 - Der-Rong Din, Chia-Yu Li:
A genetic algorithm for solving virtual source placement problem on WDM networks. 397-408 - Bahri Atay Ozgovde, Cem Ersoy:
WCOT: A utility based lifetime metric for wireless sensor networks. 409-418 - Safaa O. Al-Mamory, Hongli Zhang:
Intrusion detection alarms reduction using root cause analysis and clustering. 419-430 - Wenyu Liu, Zhenhua Tang, Shuang Zhao:
Transmission distortion estimation for real-time video delivery over hybrid channels with bit errors and packet erasures. 431-438 - Rodolfo Oliveira, Luís Bernardo, Paulo Pinto:
The influence of broadcast traffic on IEEE 802.11 DCF networks. 439-452
Volume 32, Number 3, February 2009
- Hsiao-Hwa Chen, Symeon Papavassiliou, Lingyang Song, Yan Zhang:
Adaptive multicarrier communications and networks. 453-455 - Yun Rui, Honglin Hu, Huiyue Yi, Hsiao-Hwa Chen, Yueh-Min Huang:
Frequency domain discrete fourier transform spread generalized multi-carrier system and its performance analysis. 456-464 - Eugene Golovins, Neco Ventura:
Optimisation of the pilot-to-data power ratio in the wireless MIMO-OFDM system with low-complexity MMSE channel estimation. 465-476 - Dimas Mavares Terán, Rafael P. Torres:
Space-time code selection for OFDM-MISO systems. 477-481 - Yung-Ping Tu, Wen-Hsien Fang, Hoang-Yang Lu:
Efficient groupwise multiuser detection with iterative soft interference cancellation for multi-rate MC-CDMA. 482-491 - Jingtao Zhang, David W. Matolak:
Multiple level orthogonal codes and their application in MC-CDMA systems. 492-500 - Wenhua Jiao, Linghe Cai, Meixia Tao:
Competitive scheduling for OFDMA systems with guaranteed transmission rate. 501-510 - Najah A. Abu Ali, Pratik Dhrona, Hossam S. Hassanein:
A performance study of uplink scheduling algorithms in point-to-multipoint WiMAX networks. 511-521 - Dimitra Zarbouti, Ioannis Stiakogiannakis, George V. Tsoulos, Georgia E. Athanasiadou, Dimitra I. Kaklamani:
OFDMA techniques in multicellular networks with total frequency reuse. 522-530 - Tara Ali-Yahiya, André-Luc Beylot, Guy Pujolle:
An adaptive cross-layer design for multiservice scheduling in OFDMA based mobile WiMAX systems. 531-539 - Li Zhang, Wei Heng:
Cross-layer adaptive modulation and coding design for space-time block coded MIMO-OFDM systems. 540-545 - Yingji Zhong, Kyung Sup Kwak, Dongfeng Yuan:
Cross layer multicarrier MIMO cognitive cooperation scheme for wireless hybrid ad hoc networks. 546-551 - Jianfeng Guan, Hongbin Luo, Hongke Zhang, Han-Chieh Chao, Jong Hyuk Park:
Design and implementation of light-weight mobile multicast for fast MIPv6. 552-559 - Naixue Xiong, Laurence Tianruo Yang, Yingshu Li:
ODMCA: An adaptive data mining control algorithm in multicarrier networks. 560-567
Volume 32, Number 4, March 2009
- Ahmad Belhoul, Y. Ahmet Sekercioglu, Nallasamy Mani:
Mobility-Aware RSVP: A framework for improving the performance of multimedia services over wireless IP-based mobile networks. 569-582 - Yan-yan Wang, Jia-Yong Liu, Feng-xia Xiao, Jing Dan:
A more efficient and secure dynamic ID-based remote user authentication scheme. 583-585 - Hua Wang, Zhao Shi, Anfeng Ge, Chaoying Yu:
An optimized ant colony algorithm based on the gradual changing orientation factor for multi-constraint QoS routing. 586-593 - Satish Mahadevan Srinivasan, Azad H. Azadmanesh:
Data aggregation in partially connected networks. 594-601 - Yaohui Lei, Alejandro Quintero, Samuel Pierre:
Mobile services access and payment through reusable tickets. 602-610 - Chin-Chen Chang, Chia-Yin Lee, Yen-Chang Chiu:
Enhanced authentication scheme with anonymity for roaming service in global mobility networks. 611-618 - Habib Rostami, Jafar Habibi, Emad Livani:
Semantic partitioning of peer-to-peer search space. 619-633 - Md. Golam Kaosar, Tarek R. Sheltami:
Voice transmission over ad hoc network adapting optimum approaches to maximize the performance. 634-639 - Paolo Giacomazzi:
Closed-form analysis of end-to-end network delay with Markov-modulated Poisson and fluid traffic. 640-648 - Han-Cheng Hsiang, Wei-Kuan Shih:
Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards. 649-652 - Achraf Gazdar, Abdelfattah Belghith:
Interactive slotted stream tapping. 653-661 - Dilip Kumar, Trilok Chand Aseri, R. B. Patel:
EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks. 662-667 - Öznur Özkasap:
End-to-end epidemic multicast loss recovery: Analysis of scalability and robustness. 668-678 - Satish Chand, Bijendra Kumar, Hari Om:
Segmented patching broadcasting protocol for video data. 679-684 - Tomaz Dobravec, Borut Robic:
Restricted shortest paths in 2-circulant graphs. 685-690 - Sameer Ladiwala, Ramaswamy Ramaswamy, Tilman Wolf:
Transparent TCP acceleration. 691-702 - Won-Hyoung Park, Saewoong Bahk:
Resource management policies for fixed relays in cellular networks. 703-711 - Jordi Cucurull-Juan, Ramon Martí, Guillermo Navarro-Arribas, Sergi Robles, B. Overeinder, Joan Borrell:
Agent mobility architecture based on IEEE-FIPA standards. 712-729 - Bazil Taha Ahmed, Miguel Calvo-Ramón:
Infostations for highway cigar-shaped cells. 730-735 - Jorge Munilla, Alberto Peinado:
Security flaw of Hölbl et al.'s protocol. 736-739 - Kenji Yoshigoe:
Trends in highly scalable crossbar-based packet switch architecture. 740-749 - Minh Huynh, Prasant Mohapatra, Stuart Goose:
Spanning tree elevation protocol: Enhancing metro Ethernet performance and QoS. 750-765 - Yu-Chang Chen:
Next generation CATV networks with QoS guarantees. 766-776 - Xingwei Wang, Lei Guo, Xuekui Wang, Yu Zhang, Xiaobing Zheng, Weigang Hou, Hongming Li, Hongpeng Wang:
A new algorithm based on auxiliary virtual topology for sub-path protection in WDM optical networks. 777-781
Volume 32, Number 5, March 2009
- Jia-Lun Tsai:
Convertible multi-authenticated encryption scheme with one-way hash function. 783-786 - Ali A. Kanso:
Modified clock-controlled alternating step generators. 787-799 - Lei Ye, Zhijun Wang, Hao Che, Henry C. B. Chan, Constantino M. Lagoa:
Utility function of TCP. 800-805 - Rashid A. Saeed, Hafizal Mohamad, Borhanuddin Mohd Ali:
Dynamic hybrid automatic repeat request (DHARQ) for WiMAX - Mobile multihop relay using adaptive power control. 806-813 - Nikolaos D. Doulamis, Pantelis N. Karamolegkos, Anastasios D. Doulamis, Ioannis G. Nikolakopoulos:
Exploiting semantic proximities for content search over p2p networks. 814-827 - Bazil Taha Ahmed, Miguel Calvo-Ramón:
UMTS-HSDPA in High Altitude Platforms (HAPs) communications with finite transmitted power and unequal cell's load. 828-833 - Kevin F. Chen, Edwin Hsing-Mean Sha, Si-Qing Zheng:
Fast and noniterative scheduling in input-queued switches: Supporting QoS. 834-846 - Byungseung Kim, Hyogon Kim, Saewoong Bahk:
FDF: Frequency detection-based filtering of scanning worms. 847-857 - Rachid Hadid, Mehmet Hakan Karaata:
An adaptive stabilizing algorithm for finding all disjoint paths in anonymous mesh networks. 858-866 - Jacob Engel, Taskin Koçak:
Off-chip communication architectures for high throughput network processors. 867-879 - Yuhong Zhang, Ezzatollah Salari:
A hybrid channel allocation algorithm with priority to handoff calls in mobile cellular networks. 880-887 - Ioannis Psaras, Vassilis Tsaoussidis:
On the properties of an adaptive TCP Minimum RTO. 888-895 - Giuseppe Amato, Antonio Caruso, Stefano Chessa:
Application-driven, energy-efficient communication in wireless sensor networks. 896-906 - Bazil Taha Ahmed, Miguel Calvo-Ramón:
Uplink multiservice capacity and interference statistics of WCDMA macrocells with antenna diversity reception in a multipath fading environment. 907-912 - Li Tang, Jun Li, Yanda Li, Scott Shenker:
An investigation of the Internet's IP-layer connectivity. 913-926 - Zhi-Ting Lin, Yugui Qu, Xiaofang Zhou, Baohua Zhao:
Analysis and design of mobile Wireless Social Model. 927-934 - Shih-Wei Pan, Jung-Shyr Wu:
Throughput analysis of IEEE 802.11e EDCA under heterogeneous traffic. 935-942 - Shenghai Liu, Suili Feng, Wu Ye, Hongcheng Zhuang:
Slot allocation algorithms in centralized scheduling scheme for IEEE 802.16 based wireless mesh networks. 943-953 - Zhong Fan:
Bandwidth allocation in UWB WPANs with ECMA-368 MAC. 954-960 - Dheeraj K. Klair, Kwan-Wu Chin, Raad Raad:
On the energy consumption of Pure and Slotted Aloha based RFID anti-collision protocols. 961-973 - Xiaowen Zhang, Hao Zhu, Jinsong Zhang:
RANC: Relay-aided network coding in multi-hop wireless networks. 974-984 - Marzieh Varposhti, Naser Movahhedinia:
Supporting QoS in IEEE 802.11e wireless LANs over fading channel. 985-991 - Seokhee Lee, JongWon Kim:
Transparency analysis and delay compensation scheme for haptic-based networked virtual environments. 992-999 - Xingwei Wang, Lei Guo, Cunqian Yu, Dong Wang, Weigang Hou, Ying Li, Chongshan Wang, Xin Liu:
A new heuristic protection algorithm based on survivable integrated auxiliary graph in waveband switching optical networks. 1000-1005 - Sascha Rehbock, Ray Hunt:
Trustworthy clients: Extending TNC to web-based environments. 1006-1013
Volume 32, Number 6, April 2009
- Da-Zhi Sun, Jin-Peng Huai, Jizhou Sun, Jian-Xin Li:
Cryptanalysis of a mutual authentication scheme based on nonce and smart cards. 1015-1017 - Sang-Kyun Kim, Min Gyo Chung:
More secure remote user authentication scheme. 1018-1021 - Frans J. M. Panken, Geert Jan Hoekstra:
Multi-service traffic profiles to realise and maintain QoS guarantees in wireless LANs. 1022-1033 - Erl-Huei Lu, Yi-Nan Lin, Wei-Wen Hung:
Improvement of turbo decoding using cross-entropy. 1034-1038 - Yung-Chung Wang, Chwan-Lu Tseng, Ren-Guey Chu, Shu-Ming Tseng:
Completed analysis of cellular networks with PH-renewal arrival call. 1039-1049 - Haitao Zhao, Emiliano Garcia-Palacios, Jibo Wei, Yong Xi:
Accurate available bandwidth estimation in IEEE 802.11-based ad hoc networks. 1050-1057 - Tingting Chen, Sheng Zhong:
Perfectly fair channel assignment in non-cooperative multi-radio multi-channel wireless networks. 1058-1061 - Kyungbaek Kim:
Dynamic nodeID based heterogeneity aware p2p system. 1062-1071 - Irfan Ahmed, Mugen Peng, Wenbo Wang, Syed Ismail Shah:
Joint rate and cooperative MIMO scheme optimization for uniform energy distribution in Wireless Sensor Networks. 1072-1078 - Lei Zhang, Futai Zhang:
A new certificateless aggregate signature scheme. 1079-1085 - Huanlai Xing, Yuefeng Ji, Lin Bai, Xin Liu, Zhijian Qu, Xiaoling Wang:
An adaptive-evolution-based quantum-inspired evolutionary algorithm for QoS multicasting in IP/DWDM networks. 1086-1094 - Xinchang Zhang, Xiaodong Li, Wanming Luo, Baoping Yan:
An application layer multicast approach based on topology-aware clustering. 1095-1103 - Rachid Beghdad:
Efficient deterministic method for detecting new U2R attacks. 1104-1110 - Chao Zhang, Weidong Wang, Guo Wei:
Design of ARQ protocols for two-user cooperative diversity systems in wireless networks. 1111-1117 - Raúl Peña-Ortiz, Julio Sahuquillo, Ana Pont, José A. Gil:
Dweb model: Representing Web 2.0 dynamism. 1118-1128 - Lei Guo, Xuetao Wei, Xingwei Wang:
Erratum to "New routing algorithms in trustworthy Internet" [Computer Communications 31 (2008) 3533-3536]. 1129
Volume 32, Numbers 7-10, May 2009
- Ahmed Mohamed Abdelsalam Ahmed, Ian D. Marsland:
Downlink co-channel interference cancellation in multihop relay networks. 1131-1137 - Hangxing Wu, Fengyuan Ren, Dejun Mu, Xianwu Gong:
An efficient and fair explicit congestion control protocol for high bandwidth-delay product networks. 1138-1147 - Hejiao Huang, Xiaolu Cao, Xiaohua Jia, Xiaolong Wang:
Channel assignment using block design in wireless mesh networks. 1148-1153 - Tuan Dinh Le, Wen Hu, Peter I. Corke, Sanjay Jha:
ERTP: Energy-efficient and Reliable Transport Protocol for data streaming in Wireless Sensor Networks. 1154-1171 - Kostas Christodoulopoulos, Vasileios Sourlas, I. Mpakolas, Emmanouel A. Varvarigos:
A comparison of centralized and distributed meta-scheduling architectures for computation and communication tasks in Grid networks. 1172-1184 - Pedro Peris-Lopez, Tieyan Li, Julio C. Hernandez-Castro, Juan E. Tapiador:
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard. 1185-1193 - Alex X. Liu, LeRoy A. Bailey:
PAP: A privacy and authentication protocol for passive RFID tags. 1194-1199 - Hamed Nassar, Hassan Al Mahdi:
Design and analysis of a TDMA call assignment scheme for cellular networks. 1200-1206 - Amit Sahoo, Krishna Kant, Prasant Mohapatra:
BGP convergence delay after multiple simultaneous router failures: Characterization and solutions. 1207-1218 - Victor Morales-Rocha, Miguel Soriano, Jordi Puiggali:
New voter verification scheme using pre-encrypted ballots. 1219-1227 - Sergey N. Moiseev, Mikhail S. Kondakov:
Fast system load estimation in the IEEE 802.16 OFDMA network. 1228-1232 - Kemal Akkaya, Andrew Newell:
Self-deployment of sensors for maximized coverage in underwater acoustic sensor networks. 1233-1244 - Yih-Shyh Chiou, Chin-Liang Wang, Sheng-Cheng Yeh, Ming-Yang Su:
Design of an adaptive positioning system based on WiFi radio signals. 1245-1254
Volume 32, Number 11, July 2009
- Ekram Hossain, Qian Zhang:
Special issue of computer communications on heterogeneous networking for quality, reliability, security, and robustness - Part-I. 1255-1256
- Feng Wang, Jian Pu, Mounir Hamdi:
QoS based scheduling in the downlink of multi-user wireless systems (extended). 1257-1262 - Qiang Shen, Xuming Fang, Rongsheng Huang, Pan Li, Yuguang Fang:
Improving throughput by tuning carrier sensing in 802.11 wireless networks. 1263-1270 - Joshua Wall, Jamil Y. Khan:
Efficient multimedia transmission using adaptive packet bursting for wireless LANs. 1271-1280 - Weiwei Wang, Zihua Guo, Jun Cai, Xuemin Shen, Changjia Chen:
Multiple frequency reuse schemes in the two-hop IEEE 802.16j wireless relay networks with asymmetrical topology. 1298-1305 - Wenjing Wang, Mainak Chatterjee, Kevin A. Kwiat:
User-input driven QoS management in ad hoc networks. 1306-1315 - Chao Song, Ming Liu, Jiannong Cao, Yuan Zheng, Hai-gang Gong, Guihai Chen:
Maximizing network lifetime based on transmission range adjustment in wireless sensor networks. 1316-1325 - Vojislav B. Misic, Jelena V. Misic:
Reducing sensing error in cognitive PANs through reduction of the channel set and split sensing. 1326-1335 - An'an Luo, Chuang Lin, Kai Wang, Lei Lei, Chanfang Liu:
Quality of protection analysis and performance modeling in IP multimedia subsystem. 1336-1345 - Chonggang Wang, Mahmoud Daneshmand, Kazem Sohraby:
Optimization of tag reading performance in generation-2 RFID protocol. 1346-1352
Volume 32, Number 12, July 2009
- Ekram Hossain, Qian Zhang:
Special Issue of Computer Communications on Heterogeneous Networking for Quality, Reliability, Security, and Robustness - Part-II. 1353-1354
- Enzo Mingozzi, Giovanni Stea, María Ángeles Callejo-Rodríguez, José Enríquez-Gabeiras, Gerardo García-de-Blas, Francisco Javier Ramón-Salguero, Wojciech Burakowski, Andrzej Beben, Jaroslaw Sliwinski, Halina Tarasiuk, Olivier Dugeon, Michel Diaz, Laurent Baresse, Edmundo Monteiro:
EuQoS: End-to-End Quality of Service over Heterogeneous Networks. 1355-1370 - Abdelhamid Mellouk, Said Hoceini, Sherali Zeadally:
Design and performance analysis of an inductive QoS routing algorithm. 1371-1376 - Satoshi Utsumi, Salahuddin Muhammad Salim Zabir, Norio Shiratori:
TCP-Cherry for satellite IP networks: Analytical model and performance evaluation. 1377-1383 - Anjali Sardana, Ramesh C. Joshi:
An auto-responsive honeypot architecture for dynamic resource allocation and QoS adaptation in DDoS attacked networks. 1384-1399 - Natalya Fedotova, Luca Veltri:
Reputation management algorithms for DHT-based peer-to-peer environment. 1400-1409 - Jialing Xu, Victor O. K. Li:
Request-driven swarming scheme for P2P data streaming. 1410-1417 - Sirui Yang, Hai Jin, Bo Li, Xiaofei Liao, Hong Yao, Qi Huang, Xuping Tu:
Measuring web feature impacts in Peer-to-Peer file sharing systems. 1418-1425
Volume 32, Numbers 13-14, August 2009
- Bang Wang, Hock-Beng Lim, Di Ma:
A survey of movement strategies for improving network coverage in wireless sensor networks. 1427-1436
- Kensaku Wakuda, Shoji Kasahara, Yutaka Takahashi, Yoshinobu Kure, Eisaburo Itakura:
A packet scheduling algorithm for max-min fairness in multihop wireless LANs. 1437-1444 - Diego N. da Hora, Daniel F. Macedo, Leonardo B. Oliveira, Isabela G. Siqueira, Antonio Alfredo Ferreira Loureiro, José Marcos S. Nogueira, Guy Pujolle:
Enhancing peer-to-peer content discovery techniques over mobile ad hoc networks. 1445-1459 - Sándor Molnár, Balázs Sonkoly, Tuan Anh Trinh:
A comprehensive TCP fairness analysis in high speed networks. 1460-1484 - Mathieu Bouet, Guy Pujolle:
L-VIRT: Range-free 3-D localization of RFID tags based on topological constraints. 1485-1494 - Min-Xiou Chen, Yin-Din Wang:
An efficient location tracking structure for wireless sensor networks. 1495-1504 - Juan J. Alcaraz, Gaspar Pedreño, Fernando Cerdán, Joan García-Haro, Felipe García-Sánchez:
Discrete-time control analysis of transport channel synchronization in 3G radio access networks. 1505-1514 - Jiangwen Wan, Ning Yu, Renjian Feng, Yinfeng Wu, Changming Su:
Localization refinement for wireless sensor networks. 1515-1524 - Wu Chen, Shuang-Hua Yang:
The mechanism of adapting RED parameters to TCP traffic. 1525-1530 - Hyunjue Kim, Jong-Moon Chung, Chang Hyun Kim:
Secured communication protocol for internetworking ZigBee cluster networks. 1531-1540 - Jordi Castellà-Roca, Alexandre Viejo, Jordi Herrera-Joancomartí:
Preserving user's privacy in web search engines. 1541-1551 - Marc Ciurana, Francisco Barceló-Arroyo, Sebastiano Cugno:
Tracking mobile targets indoors using WLAN and time of arrival. 1552-1558 - Daishi Kato, Kazuo Kunieda, Keiji Yamada:
An emulator for peer-to-peer distributed hash tables. 1559-1567 - Abdellah Chehri, Paul Fortier, Pierre-Martin Tardif:
Cross-layer link adaptation design for UWB-based sensor networks. 1568-1575
- Marco Conti:
Editor-in-chief Note of Concern. 1576
Volume 32, Number 15, September 2009
- Preethi Natarajan, Nasif Ekiz, Paul D. Amer, Randall R. Stewart:
Concurrent Multipath Transfer during path failure. 1577-1587 - Youngkyu Choi, Sunghyun Choi:
Energy-aware WLAN scanning in integrated IEEE 802.16e/802.11 networks. 1588-1599 - John Fitzpatrick, Seán Murphy, Mohammed Atiquzzaman, John Murphy:
Using cross-layer metrics to improve the performance of end-to-end handover mechanisms. 1600-1612
- Yuh-Shyan Chen, Chih-Shun Hsu, Po-Tsai Hsieh:
An efficient bow-based on-demand QoS routing protocol for MIMO ad hoc networks. 1613-1630 - Zhenguo Gao, Ling Wang:
A passive tree-based backbone construction scheme for MANETs. 1631-1641 - Atsuo Tachibana, Shigehiro Ano, Toru Hasegawa, Masato Tsuru, Yuji Oie:
Locating congested segments over the Internet by clustering the delay performance of multiple paths. 1642-1654 - Konstantinos Kalpakis, Shilang Tang:
A combinatorial algorithm for the maximum lifetime data gathering with aggregation problem in sensor networks. 1655-1665 - Yuyan Xue, Byrav Ramamurthy, Yong Wang:
LTRES: A loss-tolerant reliable event sensing protocol for wireless sensor networks. 1666-1676 - Wissam Fawaz, Timothy Sawah, Chadi Abou-Rjeily:
Priority-aware optical shared protection: An offline evaluation study. 1677-1684
Volume 32, Number 16, October 2009
- Vinny Cahill, Stephen Farrell, Jörg Ott:
Special issue of computer communications on delay and disruption tolerant networking. 1685-1686
- Khaled A. Harras, Lara B. Deek, Caitlin Holman, Kevin C. Almeroth:
DBS-IC: An adaptive Data Bundling System for Intermittent Connectivity. 1687-1698 - Mike P. Wittie, Khaled A. Harras, Kevin C. Almeroth, Elizabeth M. Belding:
On the implications of routing metric staleness in delay tolerant networks. 1699-1709 - Hyewon Jun, Mostafa H. Ammar, Mark D. Corner, Ellen W. Zegura:
Hierarchical power management in disruption tolerant networks using traffic-aware optimization. 1710-1723 - Michael J. Demmer, Kevin R. Fall:
The design and implementation of a session layer for delay-tolerant networks. 1724-1730 - Qing Ye, Liang Cheng, Mooi Choo Chuah, Brian D. Davison:
Performance comparison of different multicast routing strategies in disruption tolerant networks. 1731-1741 - Yong Xi, Mooi Choo Chuah:
An encounter-based multicast scheme for disruption tolerant networks. 1742-1756 - Giorgos Papastergiou, Ioannis Psaras, Vassilis Tsaoussidis:
Deep-Space Transport Protocol: A novel transport scheme for Space DTNs. 1757-1767 - Adel Javanmard, Farid Ashtiani:
Analytical evaluation of average delay and maximum stable throughput along a typical two-way street for vehicular ad hoc networks in sparse situations. 1768-1780
Volume 32, Number 17, November 2009
- Aggelos Lazaris, Polychronis Koutsakis:
Pricing-based call admission control for wireless MPEG-4 traffic. 1781-1789 - Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:
Secure network coding for wireless mesh networks: Threats, challenges, and directions. 1790-1801
- Jiong Jin, Wei-Hua Wang, Marimuthu Palaniswami:
Utility max-min fair resource allocation for communication networks with multipath routing. 1802-1809 - Yuhan Moon, Violet R. Syrotiuk:
A cooperative CDMA-based multi-channel MAC protocol for mobile ad hoc networks. 1810-1819 - Hongli Xu, Liusheng Huang, Wang Liu, Gang Wang, Yang Wang:
Topology control for delay-constraint data collection in wireless sensor networks. 1820-1828 - Ting Yi Chang:
An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks. 1829-1836 - Xinhua Yang, Tracy Camp, Hailong Yang, Athina P. Petropulu:
Extending network lifetime for ALLIANCES. 1837-1851 - Prithula Dhungel, Di Wu, Keith W. Ross:
Measurement and mitigation of BitTorrent leecher attacks. 1852-1861 - Ming-Kuei Yeh, Jehn-Ruey Jiang, Shing-Tsaan Huang:
Adaptive splitting and pre-signaling for RFID tag anti-collision. 1862-1870 - Guillaume Valadon, Clémence Magnien, Ryuji Wakikawa:
Mobile IPv6 deployments: Graph-based analysis and practical guidelines. 1871-1880 - Niandong Liao, Shengfeng Tian, Tinghua Wang:
Network forensics based on fuzzy logic and expert system. 1881-1892 - Zhijun Wang, Hao Che, Jiannong Cao, Jingshan Wang:
A TCAM-based solution for integrated traffic anomaly detection and policy filtering. 1893-1901
Volume 32, Number 18, December 2009
- Abderrahim Benslimane, Chadi Assi, Ekram Hossain, Mehmet C. Vuran:
Special issue of "Computer Communications" on Cognitive Radio and Dynamic Spectrum Sharing Systems. 1903-1904
- Show-Shiow Tzeng:
Call admission control policies in cellular wireless networks with spectrum renting. 1905-1913 - Qinghai Xiao, Yunzhou Li, Ming Zhao, Shidong Zhou, Jing Wang:
Opportunistic channel selection approach under collision probability constraint in cognitive radio systems. 1914-1922 - Lutfa Akter, Balasubramaniam Natarajan:
QoS constrained resource allocation to secondary users in cognitive radio networks. 1923-1930 - Si Chen, Alexander M. Wyglinski:
Efficient spectrum utilization via cross-layer optimization in distributed cognitive radio networks. 1931-1943 - Chao Zou, Chunxiao Chigan:
On game theoretic DSA-driven MAC for cognitive radio networks. 1944-1954 - László Toka, Attila Vidács:
General distributed economic framework for dynamic spectrum allocation. 1955-1964 - Chengshi Zhao, Mingrui Zou, Kyungsup Kwak:
Mutual interference considered power allocation in OFDM-based cognitive networks: The single SU case. 1965-1974 - Yanbo Ma, Haixia Zhang, Dongfeng Yuan, Hsiao-Hwa Chen:
Adaptive power allocation with quality-of-service guarantee in cognitive radio networks. 1975-1982 - Kaushik R. Chowdhury, Marco Di Felice:
Search: A routing protocol for mobile cognitive radio ad-hoc networks. 1983-1997 - Matthias Wellens, Janne Riihijärvi, Petri Mähönen:
Spatial statistics and models of spectrum use. 1998-2011
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.