


default search action
IEEE Network, Volume 20
Volume 20, Number 1, January-February 2006
- Chatschik Bisdikian:

Editor's note. 2-3 - Andrzej Jajszczyk

, Pawel Rózycki
:
Recovery of the control plane after failures in ASON/GMPLS networks. 4-10 - Paolo Giacomazzi, Luigi Musumeci, Giuseppe Caizzone, Giacomo Verticale

, G. Liggieri, A. Proietti, S. Sabatini:
Quality of service for packet telephony over mobile ad hoc networks. 12-20 - Ivan Stojmenovic:

Localized network layer protocols in wireless sensor networks based on optimizing cost over progress ratio. 21-27 - Kin Yeung Wong:

Web cache replacement policies: a pragmatic approach. 28-34 - Simone Frattasi, Hanane Fathi, Frank H. P. Fitzek, Ramjee Prasad, Marcos D. Katz:

Defining 4G technology from the user's perspective. 35-41
Volume 20, Number 2, March/April 2006
- Chatschik Bisdikian:

Naming the decade. 2 - John G. Apostolopoulos, Marco Conti

:
Mulitmedia over broadband wireless networks. 4-5 - Nilanjan Banerjee, Arup Acharya, Sajal K. Das

:
Seamless SIP-based mobility for multimedia applications. 6-13 - Hrvoje Jenkac, Thomas Stockhammer

, Wen Xu:
Asynchronous and reliable on-demand media broadcast. 14-20 - Guan-Ming Su, Zhu Han, Min Wu

, K. J. Ray Liu:
Multiuser cross-layer resource allocation for video transmission over wireless networks. 21-27 - Stark C. Draper

, Mitchell D. Trott:
Costs and benefits of fading for streaming media over wireless. 28-33 - Per Frojdh, Uwe Horn, Markus Kampmann, A. Nohlgren, Magnus Westerlund:

Adaptive streaming within the 3GPP packet-switched streaming service. 34-40 - Dhafer Ben Khedher, Roch H. Glitho

, Rachida Dssouli:
Media handling aspects of multimedia conferencing in broadband wireless ad hoc networks. 42-49 - Claudio Cicconetti

, Luciano Lenzini, Enzo Mingozzi, Carl Eklund:
Quality of service support in IEEE 802.16 networks. 50-55 - Juan J. Alcaraz

, Fernando Cerdán
, Joan García-Haro
:
Optimizing TCP and RLC interaction in the UMTS radio access network. 56-64
Volume 20, Number 3, May-June 2006
- Chatschik Bisdikian:

Cruising with wireless and sensors... [Editor's note]. 2-5 - Jun Zheng, Pascal Lorenz

, Petre Dini:
Wireless sensor networking [Guest editorial]. 4-5 - Yihan Li, Shivendra S. Panwar, Shiwen Mao:

A wireless biosensor network using autonomously controlled animals. 6-11 - Jun-Hong Cui, Jiejun Kong, Mario Gerla, Shengli Zhou:

The challenges of building mobile underwater wireless networks for aquatic applications. 12-18 - Ossama Younis, Marwan Krunz, Srinivasan Ramasubramanian:

Node clustering in wireless sensor networks: recent developments and deployment challenges. 20-25 - Quanhong Wang, Kenan Xu, Glen Takahara, Hossam S. Hassanein

:
On lifetime-oriented device provisioning in heterogeneous wireless sensor networks: approaches and challenges. 26-33 - Chonggang Wang, Kazem Sohraby, Bo Li, Mahmoud Daneshmand, Yueming Hu:

A survey of transport protocols for wireless sensor networks. 34-40 - Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang:

Jamming sensor networks: attack and defense strategies. 41-47 - Qiang Wang, Yaoyao Zhu, Liang Cheng

:
Reprogramming wireless sensor networks: challenges and approaches. 48-55
Volume 20, Number 4, July - August 2006
- Chatschik Bisdikian:

From the open call. 2 - Borgar Tørre Olsen, Dimitris Katsianis

, Dimitris Varoutas
, Kjell Stordahl, Jarmo Harno
, Nils Kristian Elnegaard, Ilari Welling, François Loizillon, Thomas Monath, Philippe Cadro:
Technoeconomic evaluation of the major telecommunication investment options for European players. 6-15 - Raymond B. Jennings III, Erich M. Nahum, David P. Olshefski, Debanjan Saha, Zon-Yin Shae, Chris Waters:

A study of Internet instant messaging and chat protocols. 16-21 - Shun-Yun Hu, Jui-Fa Chen, Tsu-Han Chen:

VON: a scalable peer-to-peer network for virtual environments. 22-31 - Brunilde Sansò, Christian Awad, André Girard:

Can DiffServ guarantee IP QoS under failures? 32-40
Volume 20, Number 5, September - October 2006
- Hong Yan, Hui Zhang, Kunwadee Sripanidkulchai, Zon-Yin Shae, Debanjan Saha:

Information leak vulnerabilities in SIP implementations. 6-13 - Hannes Tschofenig, Rainer Falk, Jon Peterson, Jeff Hodges, Douglas C. Sicker

, James M. Polk:
Using SAML to protect the session initiation protocol (SIP). 14-17 - Dongwook Shin, Jinyoung Ahn, Choon Shim:

Progressive multi gray-leveling: a voice spam protection algorithm. 18-24 - Dorgham Sisalem, Jiri Kuthan, Sven Ehlert:

Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms. 26-31 - Shiping Chen, Xinyuan Wang, Sushil Jajodia:

On the anonymity and traceability of peer-to-peer VoIP calls. 32-37 - Jan Seedorf:

Security challenges for peer-to-peer SIP. 38-45
Volume 20, Number 6, November - December 2006
- Chatschik Bisdikian:

Editor's note [contains five articles from the open call]. 2-3 - Franck Legendre, Vincent Borrel, Marcelo Dias de Amorim, Serge Fdida:

Reconsidering microscopic mobility modeling for self-organizing networks. 4-12 - Teck-Kuen Chua, David C. Pheanis:

QoS evaluation of sender-based loss-recovery techniques for VoIP. 14-22 - Haijie Huang, Jianfei Cai

:
Adding network-layer intelligence to mobile receivers for solving spurious TCP timeout during vertical handoff. 24-31 - Hemant Sengar, Ram Dantu, Duminda Wijesekera, Sushil Jajodia:

SS7 over IP: signaling interworking vulnerabilities. 32-41 - Stephen Brown, Cormac J. Sreenan:

A new model for updating software in wireless sensor networks. 42-47

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














