


default search action
Computer Networks, Volume 56
Volume 56, Number 1, January 2012
- Ian F. Akyildiz, Harry Rudin:

Editorial. 1-2 - Hyenyoung Yoon, Junseok Hwang, Martin B. H. Weiss

:
An analytic research on secondary-spectrum trading mechanisms based on technical and market changes. 3-19 - Hyunsang Choi, Heejo Lee:

Identifying botnets by capturing group activities in DNS traffic. 20-33 - Parisa D. Hossein Zadeh, Christian Schlegel, Mike H. MacGregor:

Distributed optimal dynamic base station positioning in wireless sensor networks. 34-49 - Alptekin Küpçü

, Anna Lysyanskaya:
Usable optimistic fair exchange. 50-63 - Yun Mao, Boon Thau Loo

, Zachary G. Ives
, Jonathan M. Smith:
MOSAIC: Declarative platform for dynamic overlay composition. 64-84 - Ziqian Dong

, Rohan D. W. Perera, Rajarathnam Chandramouli
, K. P. Subbalakshmi
:
Network measurement based modeling and optimization for IP geolocation. 85-98 - Salah A. Aly, Ahmed E. Kamal, Osameh M. Al-Kofahi

:
Network protection codes: Providing self-healing in autonomic networks using network coding. 99-111 - M. Carmen Lucas-Estan

, Javier Gozálvez
, Joaquín Sánchez-Soriano
:
Integer linear programming optimization of joint RRM policies for heterogeneous wireless systems. 112-126 - Amr Rizk, Markus Fidler:

Non-asymptotic end-to-end performance bounds for networks with long range dependent fBm cross traffic. 127-141 - Sérgio Crisóstomo

, Udo Schilcher, Christian Bettstetter, João Barros
:
Probabilistic flooding in stochastic networks: Analysis of global information outreach. 142-156 - Sara Modarres Razavi, Di Yuan, Fredrik Gunnarsson

, Johan Moe:
Performance and cost trade-off in Tracking Area reconfiguration: A Pareto-optimization approach. 157-168 - Thomas Gamer

:
Collaborative anomaly-based detection of large-scale internet attacks. 169-185 - Nicola Cordeschi

, Valentina Polli, Enzo Baccarelli
:
Traffic Engineering for wireless connectionless access networks supporting QoS-demanding media applications. 186-197 - Yuh-Jzer Joung

, Terry Hui-Ye Chiu, Shy Min Chen:
Cooperating with free riders in unstructured P2P networks. 198-212 - Yuh-Jzer Joung

, Shih-Hsiang Huang, Shi-Hang Lin:
Making data-centric storage adaptive and cost-optimal. 213-230 - Hyuntae Park, Hyejeong Hong, Sungho Kang:

An efficient IP address lookup algorithm based on a small balanced tree using entry reduction. 231-243 - Maysam Mirahmadi, Abdallah Shami

:
Traffic-prediction-assisted dynamic bandwidth assignment for hybrid optical wireless networks. 244-259 - Chun-Nan Lu, Chun-Ying Huang

, Ying-Dar Lin, Yuan-Cheng Lai:
Session level flow classification by packet size distribution and session grouping. 260-272 - Markus B. Moessner, Gul N. Khan

:
Secure authentication scheme for passive C1G2 RFID tags. 273-286 - Enzo Baccarelli

, Nicola Cordeschi
, Tatiana Patriarca:
QoS Stochastic Traffic Engineering for the wireless support of real-time streaming applications. 287-302 - Matías Toril

, Pablo Guerrero-García
, Salvador Luna-Ramírez
, Volker Wille:
An efficient integer programming formulation for the assignment of base stations to controllers in cellular networks. 303-314 - Ji-Hoon Yun

:
Cross-layer analysis of the random access mechanism in Universal Terrestrial Radio Access. 315-328 - Dagang Li

, Emmanuel Van Lil, Antoine Van de Capelle:
Improving Slow-start based probing mechanisms for flow adaptation after handovers. 329-344 - Mustafa Omer Kilavuz, Murat Yuksel:

Path approximation for multi-hop wireless routing under application-based accuracy constraints. 345-364 - Yiping Chen, Erwan Le Merrer, Zhe Li, Yaning Liu, Gwendal Simon

:
OAZE: A network-friendly distributed zapping system for peer-to-peer IPTV. 365-377 - Agapios Avramidis, Panayiotis Kotzanikolaou

, Christos Douligeris, Mike Burmester:
Chord-PKI: A distributed trust infrastructure based on P2P networks. 378-398 - Huali Bai, Ming Chen:

CCIPCA-OPCSC: An online method for detecting shared congestion paths. 399-411 - Juanjo Alins, Jorge Mata-Díaz, Jose L. Muñoz

, Elizabeth Rendon-Morales
, Oscar Esparza
:
XPLIT: A cross-layer architecture for TCP services over DVB-S2/ETSI QoS BSM. 412-434 - Guosong Tian, Yu-Chu Tian

:
Modelling and performance evaluation of the IEEE 802.11 DCF for real-time control. 435-447 - Mengjun Xie

, Zhenyu Wu, Haining Wang:
Secure instant messaging in enterprise-like networks. 448-461 - Christian Callegari

, Stefano Giordano
, Michele Pagano
, Teresa Pepe:
Behavior analysis of TCP Linux variants. 462-476 - Weili Han, Chang Lei:

A survey on policy languages in network and security management. 477-489
Volume 56, Number 2, February 2012
- Shafiullah Khan, Nabil Ali Alrajeh, Kok-Keong Loo

:
Secure route selection in wireless mesh networks. 491-503 - Evangelos Papapetrou, Panos Vassiliadis

, Efthymia Rova, Apostolos V. Zarras:
Cross-layer routing for peer database querying over mobile ad hoc networks. 504-520 - Dario Bruneo

, Salvatore Distefano
, Francesco Longo
, Antonio Puliafito, Marco Scarpa:
Evaluating wireless sensor node longevity through Markovian techniques. 521-532 - Zeki Yetgin

, Turgay Çelik:
Efficient progressive downloading over multimedia broadcast multicast service. 533-547 - Hung-Cheng Shih, Kuochen Wang:

An adaptive hybrid dynamic power management algorithm for mobile devices. 548-565 - Helena Rifà-Pous

, Carles Garrigues
:
Authenticating hard decision sensing reports in cognitive radio networks. 566-576 - Gustavo Carneiro

, Pedro Fortuna
, Jaime Dias, Manuel Ricardo
:
Transparent and scalable terminal mobility for vehicular networks. 577-597 - Gabriel Maciá-Fernández

, Yong Wang, Rafael Rodríguez-Gómez
, Aleksandar Kuzmanovic:
Extracting user web browsing patterns from non-content network traces: The online advertising case study. 598-614 - Sinan Isik, Mehmet Yunus Donmez, Cem Ersoy

:
Multi-sink load balanced forwarding with a multi-criteria fuzzy sink selection for video sensor networks. 615-627 - Fernando Silveira, Edmundo de Souza e Silva

:
Predicting packet loss statistics with hidden Markov models for FEC control. 628-641 - Ricardo J. F. Lopes Pereira, Teresa Maria Vazão

, Rodrigo Rodrigues
:
Adaptive Search Radius - Using hop count to reduce P2P traffic. 642-660 - Shie-Yuan Wang, Chih-Che Lin, Yu-Chi Chang:

A rule-based inter-session network coding scheme over IEEE 802.16(d) mesh CDS-mode networks. 661-685 - Felipe Mata, José Luis García-Dorado

, Javier Aracil:
Detection of traffic changes in large-scale backbone networks: The case of the Spanish academic network. 686-702 - Miguel Elias M. Campista

, Luís Henrique Maciel Kosmalski Costa
, Otto Carlos Muniz Bandeira Duarte:
A routing protocol suitable for backhaul access in wireless mesh networks. 703-718 - Yong Oh Lee, A. L. Narasimha Reddy:

Constructing disjoint paths for failure recovery and multipath routing. 719-730 - Xinyu Yang, Xiaojing Fan, Wei Yu

, Xinwen Fu
, Shusen Yang:
HLLS: A History information based Light Location Service for MANETs. 731-744 - Jie Feng, Lisong Xu:

Stochastic TCP friendliness: Expanding the design space of TCP-friendly traffic control protocols. 745-761 - Suhaib A. Obeidat, Abraham N. Aldaco

, Violet R. Syrotiuk:
Cross-layer opportunistic adaptation for voice over ad hoc networks. 762-779 - Casey T. Deccio, Jeff Sedayao, Krishna Kant, Prasant Mohapatra:

Quantifying DNS namespace influence. 780-794 - Emir Halepovic, Carey Williamson, Majid Ghaderi:

Enhancing redundant network traffic elimination. 795-809 - Dror Marcus, Yuval Shavitt

:
RAGE - A rapid graphlet enumerator for large networks. 810-819 - Bo-Chao Cheng, Guo-Tan Liao, Ryh-Yuh Tseng, Ping-Hai Hsu:

Network lifetime bounds for hierarchical wireless sensor networks in the presence of energy constraints. 820-831 - Burak Bayoglu, Ibrahim Sogukpinar

:
Graph based signature classes for detecting polymorphic worms via content analysis. 832-844 - Mingwei Xu, Yuan Yang, Qi Li:

Selecting shorter alternate paths for tunnel-based IP Fast ReRoute in linear time. 845-857 - Benoit Donnet

, Bamba Gueye
, Mohamed Ali Kâafar
:
Path similarity evaluation using Bloom filters. 858-869 - Artur Ziviani

, Thiago B. Cardozo, Antônio Tadeu A. Gomes
:
Rapid prototyping of active measurement tools. 870-883 - Kamran Jamshaid, Paul A. S. Ward, Martin Karsten:

Mechanisms for centralized flow rate control in 802.11-based wireless mesh networks. 884-901 - Sajjad Zarifzadeh, Nasser Yazdani, Amir Nayyeri:

Energy-efficient topology control in wireless ad hoc networks with selfish nodes. 902-914 - Cristina Cano

, Boris Bellalta
, Miquel Oliver
:
Wake up after transmissions and reduced channel contention to alleviate the hidden terminal problem in preamble sampling WSNs. 915-926 - Jean-Marc Robert, Hadi Otrok

, Ahmad Nahar Quttoum
, Rihab Boukhris:
A distributed resource management model for Virtual Private Networks: Tit-for-Tat strategies. 927-939 - Eiman Alotaibi, Biswanath Mukherjee:

A survey on routing algorithms for wireless Ad-Hoc and mesh networks. 940-965
Volume 56, Number 3, February 2012
- José Ignacio Alvarez-Hamelin

, Eric Fleury, Alessandro Vespignani
, Artur Ziviani
:
Complex dynamic networks: Tools and methods. 967-969 - Noam Koenigstein

, Yuval Shavitt
:
Talent scouting in P2P networks. 970-982 - Hyoungshick Kim, John Kit Tang, Ross J. Anderson, Cecilia Mascolo

:
Centrality prediction in dynamic human contact networks. 983-996 - Ana Cristina B. Kochem Vendramin, Anelise Munaretto

, Myriam Regattieri Delgado, Aline Carneiro Viana
:
GrAnt: Inferring best forwarders from complex networks' dynamics through a greedy Ant Colony Optimization. 997-1015 - David S. Shelley, Mehmet Hadi Gunes:

GerbilSphere: Inner sphere network visualization. 1016-1028 - Dima Feldman, Yuval Shavitt

, Noa Zilberman
:
A structural approach for PoP geo-location. 1029-1040 - Bivas Mitra, Lionel Tabourier, Camille Roth:

Intrinsically dynamic network communities. 1041-1053 - Matteo Varvello, Moritz Steiner, Koenraad Laevens:

Understanding BitTorrent: A reality check from the ISP's perspective. 1054-1065 - Meeyoung Cha

, Fabrício Benevenuto
, Yong-Yeol Ahn
, P. Krishna Gummadi
:
Delayed information cascades in Flickr: Measurement, analysis, and modeling. 1066-1076
- Xiaoming Fu

, Yang Chen
, Guy Leduc, Laurent Mathy:
Editorial for Computer Networks special issue on "Measurement-based optimization of P2P networking and applications". 1077-1079 - Ghulam Memon, Reza Rejaie, Yang Guo, Daniel Stutzbach:

Montra: A large-scale DHT traffic monitor. 1080-1091 - Noam Koenigstein

, Yuval Shavitt
, Ela Weinsberg, Udi Weinsberg:
Measuring the validity of peer-to-peer data for information retrieval applications. 1092-1102 - Zhen Ma, Ke Xu, Jiangchuan Liu, Haiyang Wang:

Measurement, modeling and enhancement of BitTorrent-based VoD system. 1103-1117 - Konstantin Pussep, Frank Lehrieder, Christian Gross, Simon Oechsner, Markus Guenther, Sebastian Meyer:

Cooperative traffic management for video streaming overlays. 1118-1130
Volume 56, Number 4, March 2012
- Mario Marchese

, Maurizio Mongelli:
Simple protocol enhancements of Rapid Spanning Tree Protocol over ring topologies. 1131-1151 - Federico Larroca

, Jean-Louis Rougier:
Minimum delay load-balancing via nonparametric regression and no-regret algorithms. 1152-1166 - Haw-Yun Shin:

Exploiting skewed access and energy-efficient algorithm to improve the performance of wireless data broadcasting. 1167-1182 - Luis Pérez, Luis Velasco, Juan Rodríguez, Pedro Capelastegui, Guillem Hernández-Sola, Lorena Calavia

, Antonio Marqués, Borja Iribarne, Amador Pozo, Antoine de Poorter:
Network convergence and QoS for future multimedia services in the VISION project. 1183-1199 - Kwan-Wu Chin

, Sieteng Soh
, Chen Meng:
Novel scheduling algorithms for concurrent transmit/receive wireless mesh networks. 1200-1214 - Marcello Cinque

, Catello Di Martino, Christian Esposito
:
On data dissemination for large-scale complex critical infrastructures. 1215-1235 - Jeongkyun Yun, Sung-Guk Yoon, Jin-Ghoo Choi, Saewoong Bahk:

Contention based scheduling for femtocell access points in a densely deployed network environment. 1236-1248 - Koteswara Rao Vemu, Shalabh Bhatnagar

, N. Hemachandra:
Optimal multi-layered congestion based pricing schemes for enhanced QoS. 1249-1262 - Dmitri Moltchanov

:
A study of TCP performance in wireless environment using fixed-point approximation. 1263-1285 - Praveen Kumar Muthuswamy, Aparna Gupta, Murat Yuksel, Koushik Kar:

Path-vector contracting: Profit maximization and risk management. 1286-1302 - Miguel S. Familiar

, José F. Martínez, Iván Corredor, Carlos García-Rubio
:
Building service-oriented Smart Infrastructures over Wireless Ad Hoc Sensor Networks: A middleware perspective. 1303-1328 - Byung-Gook Kim, Jang-Won Lee

:
Stochastic utility-based flow control algorithm for services with time-varying rate requirements. 1329-1342 - Aaron E. Cohen

, Jian-Hung Lin, Keshab K. Parhi
:
Variable data rate (VDR) network congestion control (NCC) applied to voice/audio communication. 1343-1356 - Faqir Zarrar Yousaf, Christian Wietfeld

:
Solving pinball routing, race condition and loop formation issues in nested mobile networks. 1357-1375 - Yossi Kanizo, David Hay, Isaac Keslassy

:
Hash tables with finite buckets are less resistant to deletions. 1376-1389 - Olabisi Emmanuel Falowo

, H. Anthony Chan:
Dynamic RAT selection for multiple calls in heterogeneous wireless networks using group decision-making technique. 1390-1401 - Chih-Che Lin, Shie-Yuan Wang, Teng-Wei Hsu:

On the performances of IEEE 802.16(d) mesh CDS-mode networks using Single-Switched-Beam Antennas. 1402-1423 - Douglas J. Leith

, Peter Clifford, Venkataramana Badarla, David Malone
:
WLAN channel selection without communication. 1424-1441 - Ting Wang, Chor Ping Low:

The general message ferry route (MFR∗) problem and the An-Improved-Route (AIR) scheme. 1442-1457 - Kyong-Tak Cho, Saewoong Bahk:

Optimal Hop Extended MAC protocol for wireless sensor networks. 1458-1469 - Yunzhao Li, Don Gruenbacher

, Caterina M. Scoglio
:
Evaluating stranger policies in P2P file-sharing systems with reciprocity mechanisms. 1470-1485 - Wei Zhang, Jun Bi, Jianping Wu, Baobao Zhang:

Catching popular prefixes at AS border routers with a prediction based method. 1486-1502 - M. Reza Rahimi

, Abdul Bais
, Nima Sarshar:
On fair and optimal multi-source IP-multicast. 1503-1524
Volume 56, Number 5, March 2012
- Ching-Lung Chang, Sih-Ping Huang:

The interleaved video frame distribution for P2P-based VoD system with VCR functionality. 1525-1537 - John Fitzpatrick:

Voice call capacity analysis of long range WiFi as a femto backhaul solution. 1538-1553 - Claudia Campolo

, Claudio Casetti, Carla-Fabiana Chiasserini
, Antonella Molinaro:
A multirate MAC protocol for reliable multicast in multihop wireless networks. 1554-1567 - Mehdi Bezahaf, Luigi Iannone, Marcelo Dias de Amorim, Serge Fdida:

An experimental evaluation of cross-layer routing in a wireless mesh backbone. 1568-1583 - Fabio R. J. Vieira, José Ferreira de Rezende

, Valmir Carneiro Barbosa
, Serge Fdida:
Scheduling links for heavy traffic on interfering routes in wireless mesh networks. 1584-1598 - Bang Wang, Hock-Beng Lim, Di Ma

:
A coverage-aware clustering protocol for wireless sensor networks. 1599-1611 - Jouni Mäenpää:

Performance evaluation of Recursive Distributed Rendezvous based service discovery for Peer-to-Peer Session Initiation Protocol. 1612-1626 - Atslands Rego da Rocha

, Luci Pirmez, Flávia Coimbra Delicato, Érico Lemos, Igor Leão dos Santos
, Danielo Goncalves Gomes
, José Neuman de Souza
:
WSNs clustering based on semantic neighborhood relationships. 1627-1645 - Young June Pyun, Young Hee Park, Douglas S. Reeves, Xinyuan Wang, Peng Ning:

Interval-based flow watermarking for tracing interactive traffic. 1646-1665
Volume 56, Number 6, April 2012
- Frederic Raspall:

Efficient packet sampling for accurate traffic measurements. 1667-1684 - Javad Vazifehdan, R. Venkatesha Prasad

, Ignas G. Niemegeers:
On the lifetime of node-to-node communication in wireless ad hoc networks. 1685-1709 - Sihyung Lee

, Hyong S. Kim:
End-user perspectives of Internet connectivity problems. 1710-1722 - Alex X. Liu, Jason M. Kovacs, Mohamed G. Gouda:

A secure cookie scheme. 1723-1730 - Yi Hu, Laxmi N. Bhuyan, Min Feng:

P2P consistency support for large-scale interactive applications. 1731-1744 - Joo-Young Baek, Young-Joo Suh:

An adaptive ARQ-HARQ interworking scheme in WiMAX systems. 1745-1762 - Yu Lu

, Mehul Motani
, Wai-Choong Wong
:
When Ambient Intelligence meets the Internet: User Module framework and its applications. 1763-1781 - Zhipeng Ouyang, Lisong Xu, Byrav Ramamurthy

, Negede Yossef:
Partial forwarding vs. partial participation for dynamic window resizing in P2P streaming. 1782-1796 - Xiang Cheng, Sen Su, Zhongbao Zhang, Kai Shuang, Fangchun Yang, Yan Luo, Jie Wang:

Virtual network embedding through topology awareness and optimization. 1797-1813 - ChengGuo Yin, ShuangQing Li, Qi Li:

Network traffic classification via HMM under the guidance of syntactic structure. 1814-1825 - Jihene Rezgui, Abdelhakim Hafid, Racha Ben Ali, Michel Gendreau:

Optimization model for handoff-aware channel assignment problem for multi-radio wireless mesh networks. 1826-1846 - Péter Soproni, Tibor Cinkler:

Preplanned restoration of multicast demands in optical networks. 1847-1861
Volume 56, Number 7, May 2012
- Mohammad Abdul Awal, Lila Boukhatem, Lin Chen:

An integrated cross-layer framework of adaptive FEedback REsource allocation and Prediction for OFDMA systems. 1863-1875 - Ilknur Aydin

, Janardhan R. Iyengar, Phillip T. Conrad
, Chien-Chung Shen, Paul D. Amer:
Evaluating TCP-friendliness in light of Concurrent Multipath Transfer. 1876-1892 - Jose Saldana

, Julián Fernández-Navajas
, José Ruíz-Mas
, Jenifer Murillo, Eduardo Viruete Navarro, José I. Aznar:
Evaluating the influence of multiplexing schemes and buffer implementation on perceived VoIP conversation quality. 1893-1919 - Jochen Wolfgang Furthmüller, Oliver P. Waldhorst:

Energy-aware resource sharing with mobile devices. 1920-1934 - Habib M. Ammari:

On the problem of k-coverage in mission-oriented mobile wireless sensor networks. 1935-1950 - Anfeng Liu, Ju Ren, Xu Li, Zhigang Chen, Xuemin Shen

:
Design principles and improvement of cost function based energy aware routing algorithms for wireless sensor networks. 1951-1967 - Tamma Bheemarjuna Reddy

, B. S. Manoj
, Ramesh R. Rao:
Traffic sensing and characterization in multi-channel wireless networks for cognitive networking. 1968-1982 - Fabricio Murai

, Antônio Augusto de Aragão Rocha, Daniel R. Figueiredo
, Edmundo de Souza e Silva
:
Heterogeneous download times in a homogeneous BitTorrent swarm. 1983-2000 - Duc A. Tran

, Khanh Nguyen, Cuong Pham:
S-CLONE: Socially-aware data replication for social networks. 2001-2013 - Mihaela Ion, Giovanni Russello, Bruno Crispo:

Design and implementation of a confidentiality and access control solution for publish/subscribe systems. 2014-2037 - Pietro Michiardi, Damiano Carra, Francesco Albanese, Azer Bestavros

:
Peer-assisted content distribution on a budget. 2038-2048 - Zhe Wang

, Kai Hu, Ke Xu, Baolin Yin, Xiaowen Dong:
Structural analysis of network traffic matrix via relaxed principal component pursuit. 2049-2067 - Kiam Cheng How, Maode Ma, Yang Qin:

An altruistic differentiated service protocol in dynamic cognitive radio networks against selfish behaviors. 2068-2079 - Mohammad Mursalin Akon, Mohammad Towhidul Islam, Xuemin Shen

, Ajit Singh:
A bandwidth and effective hit optimal cache scheme for wireless data access networks with client injected updates. 2080-2095
Volume 56, Number 8, May 2012
- Vincent Reinhard, Johanne Cohen, Joanna Tomasik, Dominique Barth, Marc-Antoine Weisser:

Optimal configuration of an optical network providing predefined multicast transmissions. 2097-2106 - H. Ragab Hassen, Hatem Bettahar, Abdelmadjid Bouabdallah, Yacine Challal

:
An efficient key management scheme for content access control for linear hierarchies. 2107-2118 - Jin Cao, Hui Li, Maode Ma, Yueyu Zhang, Chengzhe Lai:

A simple and robust handover authentication between HeNB and eNB in LTE networks. 2119-2131 - Yong Liao, Jiangtao Yin, Dong Yin, Lixin Gao:

DPillar: Dual-port server interconnection network for large scale data centers. 2132-2147 - Yuh-Jzer Joung

, Wing-Tat Wong, Hsiao-Mei Huang, Yi-Fang Chou:
Building a network-aware and load-balanced peer-to-peer system for range queries. 2148-2167 - Kwan-Wu Chin

, Shinan Li:
Novel association control strategies for multicasting in relay-enabled WLANs. 2168-2178 - Antti Mäkelä, Sebastian Siikavirta, Jukka Manner

:
Comparison of load-balancing approaches for multipath connectivity. 2179-2195 - Bilal Erman Bilgin

, Vehbi Çagri Güngör:
Performance evaluations of ZigBee in different smart grid environments. 2196-2205 - Sihyung Lee

, Kyriaki Levanti, Hyong S. Kim:
Impact analysis of BGP sessions for prioritization of maintenance operations. 2206-2220 - Gholam Hossein Ekbatani Fard

, Reza Monsefi
, Mohammad Hossien Yaghmaee
, Seyed Amin Hosseini Seno
:
Queen-MAC: A quorum-based energy-efficient medium access control protocol for wireless sensor networks. 2221-2236
Volume 56, Number 9, June 2012
- Péter Mátray, Péter Hága, Sándor Laki

, Gábor Vattay, István Csabai
:
On the spatial properties of internet routes. 2237-2248 - Carlo Fragni, Luís Henrique Maciel Kosmalski Costa

:
ECO-ALOC: Energy-efficient resource allocation for cluster-based software routers. 2249-2261 - Fernando Lezama

, Gerardo A. Castañón
, Ana María Sarmiento:
Differential evolution optimization applied to the wavelength converters placement problem in all optical networks. 2262-2275 - Tuan-Minh Pham

, Serge Fdida:
DTN support for news dissemination in an urban area. 2276-2291 - Changhui Hu, Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li:

Efficient HMAC-based secure communication for VANETs. 2292-2303 - Zheng Liu, Maode Ma, Jufeng Dai:

Utility-based scheduling in wireless multi-hop networks over non-deterministic fading channels. 2304-2315 - Yuh-Jzer Joung

, Wing-Tat Wong, Hsiao-Mei Huang, Yi-Fang Chou:
Erratum to "Building a network-aware and load-balanced peer-to-peer system for range queries, COMNET, 56(8) 2012, 2148-2167". 2316
Volume 56, Number 10, July 2012
- Antonio Capone

, Dan Kilper
, Zhisheng Niu:
Editorial for Computer Networks special issue on "Green communication networks". 2317-2319 - Raffaele Bolla

, Roberto Bruschi
, Alessandro Carrega
, Franco Davoli
, Diego Suino, Constantinos Vassilakis
, Anastasios Zafeiropoulos
:
Cutting the energy bills of Internet Service Providers and telecoms through power management: An impact analysis. 2320-2342 - Young-Min Kim, Eun-Jung Lee, Hea-Sook Park, Jun-Kyun Choi, Hong-Shik Park:

Ant colony based self-adaptive energy saving routing for energy efficient Internet. 2343-2354 - Francesca Cuomo

, Antonio Cianfrani
, Marco Polverini
, Daniele Mangione:
Network pruning for energy saving in the Internet. 2355-2367 - Stefano Avallone

, Giorgio Ventre:
Energy efficient online routing of flows with additive constraints. 2368-2382 - Weigang Hou, Lei Guo

, Xuetao Wei, Xiaoxue Gong:
Multi-granularity and robust grooming in power- and port-cost-efficient IP over WDM networks. 2383-2399 - Jorge López Vizcaíno, Yabin Ye, Idelfonso Tafur Monroy

:
Energy efficiency analysis for flexible-grid OFDM-based optical networks. 2400-2419 - Sergio Ricciardi, Francesco Palmieri

, Ugo Fiore
, Davide Careglio
, Germán Santos-Boada, Josep Solé-Pareta
:
An energy-aware dynamic RWA framework for next-generation wavelength-routed networks. 2420-2442 - Giuseppe Rizzelli, Annalisa Morea, Massimo Tornatore

, Olivier Rival:
Energy efficient Traffic-Aware design of on-off Multi-Layer translucent optical networks. 2443-2455 - Sergio Herrería-Alonso

, Miguel Rodríguez-Pérez
, Manuel Fernández-Veiga
, Cándido López-García
:
Optimal configuration of Energy-Efficient Ethernet. 2456-2467 - Martin Wolkerstorfer

, Driton Statovci, Tomas Nordström
:
Energy-saving by low-power modes in ADSL2. 2468-2480 - Vincenzo Mancuso

, Sara Alouf
:
Analysis of power saving with continuous connectivity. 2481-2493 - Koen De Turck, Stijn De Vuyst

, Dieter Fiems, Sabine Wittevrongel, Herwig Bruneel:
Performance analysis of sleep mode mechanisms in the presence of bidirectional traffic. 2494-2505 - Karina Mabell Gomez

, Dejene Boru
, Roberto Riggio
, Tinku Rasheed, Daniele Miorandi, Fabrizio Granelli
:
Measurement-based modelling of power consumption at wireless access network gateways. 2506-2521 - Ana Paula Couto da Silva

, Michela Meo
, Marco Ajmone Marsan:
Energy-performance trade-off in dense WLANs: A queuing study. 2522-2537 - Kim Khoa Nguyen

, Mohamed Cheriet, Mathieu Lemay, Victor Reijs, Andrew Mackarel, Alin Pastrama:
Environmental-aware virtual data center network. 2538-2550
Volume 56, Number 11, July 2012
- Aniket Pingley, Wei Yu

, Nan Zhang, Xinwen Fu
, Wei Zhao
:
A context-aware scheme for privacy-preserving location-based services. 2551-2568 - Weverton Luis da Costa Cordeiro, Flavio Roberto Santos, Gustavo Huff Mauch, Marinho P. Barcellos, Luciano Paschoal Gaspary:

Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks. 2569-2589 - Cheng-Han Lin, Yu-Chi Wang, Ce-Kuen Shieh, Wen-Shyang Hwang:

An unequal error protection mechanism for video streaming over IEEE 802.11e WLANs. 2590-2599 - Sara Moftah Elrabiei, Mohammed Hadi Habaebi

:
Reliable cooperative multicasting for MBS WiMAX traffic. 2600-2613 - Ching-Wen Chen, Chuan-Chi Weng, Po-Yueh Chen:

An interference avoidance MAC protocol design in mobile ad hoc networks. 2614-2634 - Sheng-Wei Wang

:
Probability based dynamic-alternate routing and the corresponding converter placement algorithm in all-optical WDM networks. 2635-2648 - Behnam Bahrak, Amol Deshpande, Jung-Min "Jerry" Park:

Spectrum access policy reasoning for policy-based cognitive radios. 2649-2663 - Wei Dong, Chun Chen, Xue Liu, Guodong Teng, Jiajun Bu, Yunhao Liu:

Bulk data dissemination in wireless sensor networks: Modeling and analysis. 2664-2676 - Nobuyoshi Tomita, Shahrokh Valaee:

Data uploading time estimation for CUBIC TCP in long distance networks. 2677-2689 - Meiqin Tang, Chengnian Long, Xinping Guan, Xinjiang Wei:

Nonconvex dynamic spectrum allocation for cognitive radio networks via particle swarm optimization and simulated annealing. 2690-2699 - Dino Martin López-Pacheco, Tuan Tran Thai, Emmanuel Lochin

, Fabrice Arnal:
An IP-ERN architecture to enable hybrid E2E/ERN protocol and application to satellite networking. 2700-2713 - Helena Fernández-López

, José A. Afonso
, José Higino Correia
, Ricardo Simões
:
Towards the design of efficient nonbeacon-enabled ZigBee networks. 2714-2725 - Péter Schaffer, Károly Farkas, Ádám Horváth, Tamás Holczer, Levente Buttyán:

Secure and reliable clustering in wireless sensor networks: A critical survey. 2726-2741 - Nico Saputro

, Kemal Akkaya, Suleyman Uludag
:
A survey of routing protocols for smart grid communications. 2742-2771
Volume 56, Number 12, August 2012
- Pinghui Wang, Xiaohong Guan, Don Towsley

, Jing Tao:
Virtual indexing based methods for estimating node connection degrees. 2773-2787 - Sookyoung Lee, Mohamed F. Younis

:
Optimized relay node placement for connecting disjoint wireless sensor networks. 2788-2804 - Eduardo Feitosa

, Eduardo Souto, Djamel Fawzi Hadj Sadok:
An orchestration approach for unwanted Internet traffic identification. 2805-2831 - Saeed Rashwand, Jelena V. Misic:

Effects of access phases lengths on performance of IEEE 802.15.6 CSMA/CA. 2832-2846 - Jianxin Liao, Jinzhu Wang, Tonghong Li

, Jing Wang, Jingyu Wang, Xiaomin Zhu:
A distributed end-to-end overload control mechanism for networks of SIP servers. 2847-2868 - Alberto Castro

, Luis Velasco, Marc Ruiz, Miroslaw Klinkowski
, Juan P. Fernández Palacios, Davide Careglio
:
Dynamic routing and spectrum (re)allocation in future flexgrid optical networks. 2869-2883 - F. Javier Ortega

, José A. Troyano
, Fermín L. Cruz
, Carlos G. Vallejo
, Fernando Enríquez:
Propagation of trust and distrust for the detection of trolls in a social network. 2884-2895 - Daniel Camps-Mur, Manil Dev Gomony

, Xavier Pérez Costa
, Sebastià Sallent Ribes
:
Leveraging 802.11n frame aggregation to enhance QoS and power consumption in Wi-Fi networks. 2896-2911 - Mario Montagud, Fernando Boronat

:
Enhanced adaptive RTCP-based Inter-Destination Multimedia Synchronization approach for distributed applications. 2912-2933 - Jae-Yong Yoo, Cigdem Sengul

, Ruben Merz, JongWon Kim:
Backpressure scheduling in IEEE 802.11 wireless mesh networks: Gap between theory and practice. 2934-2948 - Adrian Holzer, Patrick Eugster, Benoît Garbinato

:
ALPS - Adaptive Location-based Publish/Subscribe. 2949-2962 - Surachai Chieochan, Ekram Hossain:

Network coding for unicast in a WiFi hotspot: Promises, challenges, and testbed implementation. 2963-2980 - Ze Wang, Maode Ma, Jigang Wu:

Securing wireless mesh networks in a unified security framework with corruption-resilience. 2981-2993 - Tsu-Yang Wu

, Yuh-Min Tseng, Tung-Tso Tsai:
A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants. 2994-3006
Volume 56, Number 13, September 2012
- Pablo Pavón-Mariño, Mohammed Atiquzzaman

, Joan García-Haro
:
Special issue on "Challenges in high-performance switching and routing in the Future Internet". 3007-3009 - Hyesook Lim

, Soohyun Lee, Earl E. Swartzlander Jr.:
A new hierarchical packet classification algorithm. 3010-3022 - Anat Bremler-Barr

, David Hay, Danny Hendler:
Layered interval codes for TCAM-based classification. 3023-3039 - Aleksandra Smiljanic, Zoran Cica

:
A comparative review of scalable lookup algorithms for IPv6. 3040-3054 - Nizar Ben Neji

, Adel Bouhoula
:
A prefix-based approach for managing hybrid specifications in complex packet filtering. 3055-3064 - Mustafa Sanli, Ece Güran Schmidt

, Hasan Cengiz Güran:
Hardware design and implementation of packet fair queuing algorithms for the quality of service support in the high-speed internet. 3065-3075 - Andrea Francini:

Periodic early detection for improved TCP performance and energy efficiency. 3076-3086 - Dinil Mon Divakaran:

A spike-detecting AQM to deal with elephants. 3087-3098 - D. Fernández Hermida, Miguel Rodelgo-Lacruz

, Andrea Bianco
, Davide Cuda, Guido A. Gavilanes Castillo
, Cristina López-Bravo
, Francisco J. González-Castaño
:
AWG-based optical switches performance using crosstalk limiting schedulers. 3099-3109 - Davide Cuda, Paolo Giaccone

, Massimo Montalto:
Design and control of next generation distribution frames. 3110-3122 - Ricard Vilalta, Raul Muñoz

, Ramon Casellas
, Ricardo Martínez
, F. Javier Vilchez:
GMPLS-enabled MPLS-TP/PWE3 node with integrated 10 Gbps tunable DWDM transponders: design and experimental evaluation. 3123-3135 - Miklós Molnár

, Alia Bellabas, Samer Lahoud
:
The cost optimal solution of the multi-constrained multicast routing problem. 3136-3149 - Diego Lucerna, Massimo Tornatore

, Biswanath Mukherjee, Achille Pattavina:
Trading availability among shared-protected dynamic connections in WDM networks. 3150-3162
Volume 56, Number 14, September 2012
- Olfa Gaddour, Anis Koubaa

:
RPL in a nutshell: A survey. 3163-3178 - Xian Zhang, Xiuzhong Chen, Chris I. Phillips:

Achieving effective resilience for QoS-aware application mapping. 3179-3191 - Sihyung Lee

, Tina Wong, Hyong S. Kim:
Improving manageability through reorganization of routing-policy configurations. 3192-3205 - Hamed Ahmadi, Yong Huat Chew:

Evolutionary algorithms for orthogonal frequency division multiplexing-based dynamic spectrum access systems. 3206-3218 - Aruna Prem Bianzino, Luca Chiaraviglio

, Marco Mellia
, Jean-Louis Rougier:
GRiDA: GReen Distributed Algorithm for energy-efficient IP backbone networks. 3219-3232 - Amit Mondal, Ionut Trestian, Zhen Qin, Aleksandar Kuzmanovic:

P2P as a CDN: A new service model for file sharing. 3233-3246 - Zhiguo Hu, Dalu Zhang, Anqi Zhu, Zhiwei Chen, Hualei Zhou:

SLDRT: A measurement technique for available bandwidth on multi-hop path with bursty cross traffic. 3247-3260 - Caishi Huang, Chin-Tau A. Lea

, Albert Kai-Sun Wong
:
A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks. 3261-3273 - Gustavo B. Figueiredo, Eduardo Candido Xavier, Nelson L. S. da Fonseca

:
Optimal algorithms for the batch scheduling problem in OBS networks. 3274-3286 - Xiang Fei

, Evan H. Magill:
REED: Flexible rule based programming of wireless sensor networks at runtime. 3287-3299 - Issa Khalil

, Mamoun A. Awad
, Abdallah Khreishah
:
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks. 3300-3317 - Wha Sook Jeon, Dong Geun Jeong:

Adaptive sensing scheduling for cognitive radio systems. 3318-3332 - Alexander Shpiner, Isaac Keslassy

, Gabi Bracha, Eyal Dagan, Ofer Iny, Eyal Soha:
A switch-based approach to throughput collapse and starvation in data centers. 3333-3346 - Ram G. Lakshmi Narayanan, Oliver C. Ibe:

A joint network for disaster recovery and search and rescue operations. 3347-3373 - Olga León

, Juan Hernández-Serrano
, Miguel Soriano
:
Cooperative detection of primary user emulation attacks in CRNs. 3374-3384
Volume 56, Number 15, October 2012
- Po-Kai Tseng, Wei-Ho Chung

:
Joint coverage and link utilization for fast IP local protection. 3385-3400 - Robin Doss

, Wanlei Zhou
, Saravanan Sundaresan, Shui Yu
, Longxiang Gao:
A minimum disclosure approach to authentication and privacy in RFID systems. 3401-3416 - Changwang Zhang, Zhiping Cai, Weifeng Chen, Xiapu Luo

, Jianping Yin:
Flow level detection and filtering of low-rate DDoS. 3417-3431 - Yang Guo, Chao Liang, Yong Liu

:
Hierarchically Clustered P2P Video Streaming: Design, implementation, and evaluation. 3432-3445 - Yu Chen, Xuming Fang:

Energy-efficient dynamic resource allocation with opportunistic network coding in OFDMA relay networks. 3446-3455 - Yishay Mansour, Boaz Patt-Shamir, Dror Rawitz:

Overflow management with multipart packets. 3456-3467 - Jiwoong Bang, Daewon Kim:

Efficient RTSP-based multiple buffering and packet transmission methods for delivering OMA PoC Box service. 3468-3478 - Matheus Brenner Lehmann, Flavio Roberto Santos, Luciano Paschoal Gaspary, Marinho P. Barcellos:

Denial-of-service attacks and countermeasures on BitTorrent. 3479-3498 - Anthony E. Krzesinski, Guy Latouche, Peter G. Taylor

:
How do we encourage an egoist to act socially in an ad hoc mobile network? 3499-3510 - Anatolij Zubow, Johannes Marotzke, Daniel Camps-Mur, Xavier Pérez Costa:

sGSA: A SDMA-OFDMA greedy scheduling algorithm for WiMAX networks. 3511-3530 - Alessio Botta

, Alberto Dainotti
, Antonio Pescapè:
A tool for the generation of realistic network workload for emerging networking scenarios. 3531-3547 - Xiangyang Zhang, Hossam S. Hassanein

:
A survey of peer-to-peer live video streaming schemes - An algorithmic perspective. 3548-3579
Volume 56, Number 16, November 2012
- Guang Wu, Shu Wang, Bang Wang, Yan Dong

, Shu Yan:
A novel range-free localization based on regulated neighborhood distance for wireless ad hoc and sensor networks. 3581-3593 - Luigi Atzori, Antonio Iera

, Giacomo Morabito
, Michele Nitti
:
The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization. 3594-3608 - Yi-Ling Hsieh, Kuochen Wang:

Dynamic overlay multicast for live multimedia streaming in urban VANETs. 3609-3628 - David Palma

, Helder Araújo
, Marília Curado
:
Link quality estimation in wireless multi-hop networks using Kernel based methods. 3629-3638 - Chien-Chi Kao, Shun-Ren Yang, Hsin-Chen Chen:

A sleep-mode interleaving algorithm for layered-video multicast services in IEEE 802.16e networks. 3639-3654
Volume 56, Number 17, November 2012
- Alberto Coen-Porisini

, Sabrina Sicari:
Improving data quality using a cross layer protocol in wireless sensor networks. 3655-3665 - Antonio Capone

, Daniele Corti, Luca Giovanni Gianoli, Brunilde Sansò:
An optimization framework for the energy management of carrier ethernet networks with Multiple Spanning Trees. 3666-3681 - Sungwook Kim:

Multi-leader multi-follower Stackelberg model for cognitive radio spectrum sharing scheme. 3682-3692 - Wen-Hsing Kuo

, Ting-Yang Lin:
Multi-hop multicast path construction in modern wireless relay networks. 3693-3704 - Andrea Detti

, Matteo Pomposini, Nicola Blefari-Melazzi, Stefano Salsano
:
Supporting the Web with an information centric network that routes by name. 3705-3722 - Murat Yuksel, K. K. Ramakrishnan

, Shivkumar Kalyanaraman, Joseph D. Houle, Rita Sadhvani:
Required extra capacity: A comparative estimation of overprovisioning needed for a classless IP backbone. 3723-3743 - Xianfu Meng, Yanli Wang, Yalin Ding:

An optimized strategy for update path selection in unstructured P2P networks. 3744-3755 - Esther Palomar

, Almudena Alcaide, Arturo Ribagorda, Yan Zhang:
The Peer's Dilemma: A general framework to examine cooperation in pure peer-to-peer systems. 3756-3766 - Li Feng, Jianqing Li

:
Integer-multiple-spacing-based scheduling for multimedia applications in IEEE 802.11e HCCA wireless networks. 3767-3782 - Jiong Jin

, Marimuthu Palaniswami, Bhaskar Krishnamachari:
Rate control for heterogeneous wireless sensor networks: Characterization, algorithms and performance. 3783-3794 - James Bernsen, D. Manivannan

:
RIVER: A reliable inter-vehicular routing protocol for vehicular ad hoc networks. 3795-3807
Volume 56, Number 18, December 2012
- Dirk Husemann, Harry Rudin:

The WEB we live in. 3809-3810 - Colin Allison, Alan Miller, Iain Oliver

, Rosa Michaelson, Thanassis Tiropanis
:
The Web in education. 3811-3824 - Sergey Brin, Lawrence Page:

Reprint of: The anatomy of a large-scale hypertextual web search engine. 3825-3833 - Jan Camenisch:

Information privacy?! 3834-3848 - Junghoo Cho, Hector Garcia-Molina, Lawrence Page:

Reprint of: Efficient crawling through URL ordering. 3849-3858 - Wendy Hall

, Thanassis Tiropanis
:
Web evolution and Web Science. 3859-3865 - Julia Heidemann, Mathias Klier, Florian Probst:

Online social networks: A survey of a global phenomenon. 3866-3878 - Ian Hughes:

Virtual worlds, augmented reality, blended reality. 3879-3885 - Andrew M. Odlyzko:

Web history and economics. 3886-3890 - Ravi S. Sandhu:

Speculations on the science of web user security. 3891-3895

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














