dblp: Computer Networks, Volume 52 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



- > Home > Journals > Computer Networks
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 52, Number 1, January 2008
(1) Performance of Wireless Networks

Nael B. Abu-Ghazaleh
, Enrique Alba
, Carla-Fabiana Chiasserini
, Renato Lo Cigno
:
Guest Editorial. 1-3

Damien Charlet, Valérie Issarny, Rafik Chibout:
Energy-efficient middleware-layer multi-radio networking: An assessment in the area of service discovery. 4-24

Junhua Zhu, Ka-Lok Hung, Brahim Bensaou, Farid Naït-Abdesselam:
Rate-lifetime tradeoff for reliable communication in wireless sensor networks. 25-43

Chen Avin
, Bhaskar Krishnamachari:
The power of choice in random walks: An empirical study. 44-60

Chunyu Hu, Hwangnam Kim, Jennifer C. Hou:
Short-term non-uniform access in IEEE 802.11-compliant WLANs: A study on its impact on the saturation performance. 61-76

Tahiry Razafindralambo
, Isabelle Guérin Lassous, Luigi Iannone, Serge Fdida:
Dynamic and distributed packet aggregation to solve the performance anomaly in 802.11 wireless networks. 77-95

Alexander Sayenko, Olli Alanen, Timo Hämäläinen
:
Scheduling solution for the IEEE 802.16 base station. 96-115

Patrick Stuedi, Gustavo Alonso:
Modeling and computing throughput capacity of wireless multihop networks. 116-129

Athanasios Bamis, Azzedine Boukerche, Ioannis Chatzigiannakis
, Sotiris E. Nikoletseas:
A mobility aware protocol synthesis for efficient routing in ad hoc mobile networks. 130-154

Luciano Bononi
, Marco Di Felice, Gabriele D'Angelo
, Michele Bracuto, Lorenzo Donatiello:
MoVES: A framework for parallel and distributed simulation of wireless vehicular ad hoc networks. 155-179

Sherif M. ElRakabawy, Alexander Klemm, Christoph Lindemann:
TCP with gateway adaptive pacing for multihop wireless networks with Internet connectivity. 180-198

Raffaele Bruno
, Marco Conti
, Enrico Gregori:
An accurate closed-form formula for the throughput of long-lived TCP connections in IEEE 802.11 WLANs. 199-212
(2) Synergy of Telecommunication and Broadcasting Networks

Charalambos Skianis
:
Editorial for the special issue on synergy of telecommunication and broadcasting networks. 213-214

Spyridon L. Tompros, Spyros G. Denazis
:
Interworking of heterogeneous access networks and QoS provisioning via IP multimedia core networks. 215-227

Justino Santos, Diogo Gomes
, Susana Sargento
, Rui L. Aguiar
, Nigel Baker, Madiha Zafar, Ahsan Ikram:
Multicast/broadcast network convergence in next generation mobile networks. 228-247

Dimitris E. Charilas, Ourania I. Markaki, Dimitris Nikitopoulos, Michael E. Theologou:
Packet-switched network selection with the highest QoS in 4G networks. 248-258

Joon-Sang Park
, Seung-Jae Han:
Load balancing for video streaming services in hierarchical wireless networks. 259-274

Igor Bisio
, Mario Marchese
:
Performance evaluation of bandwidth allocation methods in a geostationary satellite channel in the presence of internet traffic. 275-291

Georgios Gardikis, S. Orfanos, George Kormentzas, Evangelos Pallis
, Anastasios Kourtis:
Dynamic IP configuration of terminals in broadcasting networks. 292-302
Volume 52, Number 2, February 2008

Soraya Kasnavi, Paul Berube, Vincent C. Gaudet
, José Nelson Amaral:
A cache-based internet protocol address lookup architecture. 303-326

Jamal N. Al-Karaki, Ahmed E. Kamal:
Efficient virtual-backbone routing in mobile ad hoc networks. 327-350

Kazumasa Oida
:
On the impact of QoS-sensitivity on correlation structures. 351-359

Stavros Toumpis:
Mother nature knows best: A survey of recent results on wireless networks based on analogies with physics. 360-383

Changhan Kim, Younghoon Kim
, Jae-Heon Yang, Ikjun Yeom:
Analysis of bandwidth efficiency in overlay multicasting. 384-398

Jun Li, Jelena Mirkovic, Toby Ehrenkranz, Mengqiu Wang, Peter L. Reiher, Lixia Zhang:
Learning the valid incoming direction of IP packets. 399-417

Chih-Hsun Chou, Kuo-Feng Ssu, Hewijin Christine Jiau:
Dynamic route maintenance for geographic forwarding in mobile ad hoc networks. 418-431

Mercedes G. Merayo, Manuel Núñez
, Ismael Rodríguez
:
Formal testing from timed finite state machines. 432-460

Basem Shihada, Pin-Han Ho:
A novel TCP with dynamic Burst-Contention Loss notification over OBS networks. 461-471
Volume 52, Number 3, February 2008

Ian F. Akyildiz, Harry Rudin:
Editorial. 473-474

Michel Mandjes, M. Ramakrishnan:
Bandwidth trading under misaligned objectives: Decentralized measurement-based control. 475-492

Amir Nayyeri, Sajjad Zarifzadeh, Nasser Yazdani, Mohammad Mahmoody-Ghidary
:
Load sensitive topology control: Towards minimum energy consumption in dense ad hoc sensor networks. 493-513

Yanni Ellen Liu, Johnny W. Wong:
Deadline-based scheduling in support of real-time data delivery. 514-530

Tai-Jung Chang, Kuochen Wang, Yi-Ling Hsieh:
A color-theory-based energy efficient routing algorithm for mobile wireless sensor networks. 531-541

Yan Jin, Ling Wang, Yoohwan Kim, Xiaozong Yang:
EEMC: An energy-efficient multi-level clustering algorithm for large-scale wireless sensor networks. 542-562

Raffaele Bolla
, Roberto Bruschi
, Franco Davoli
, Matteo Repetto
:
Hybrid optimization for QoS control in IP Virtual Private Networks. 563-580

Chiapin Wang, Tsungnan Lin
:
Application of neural networks for achieving 802.11 QoS in heterogeneous channels. 581-592

Srihari Nelakuditi, Zifei Zhong, Junling Wang, Ram Keralapura, Chen-Nee Chuah
:
Mitigating transient loops through interface-specific forwarding. 593-609

Shashidhar Gandham, Ying Zhang, Qingfeng Huang:
Distributed time-optimal scheduling for convergecast in wireless sensor networks. 610-629

Guillermo Ibáñez, Alberto García-Martínez
, Arturo Azcorra, Ignacio Soto
:
ABridges: Scalable, self-configuring Ethernet campus networks. 630-649

Tobias Hoßfeld
, Andreas Binzenhöfer:
Analysis of Skype VoIP traffic in UMTS: End-to-end QoS and QoE measurements. 650-666

Kyung Hee Kim, Jang Hyun Baek, Che Soong Kim:
Modeling and optimization of zone-based registration considering cell-by-cell location area for mobile communication networks. 667-674

Murat Karakaya
, Ibrahim Korpeoglu
, Özgür Ulusoy
:
Counteracting free riding in Peer-to-Peer networks. 675-694

Chunxi Li, Changjia Chen:
On Gnutella topology dynamics by studying leaf and ultra connection jointly in phase space. 695-719

Ching-Ju Lin
, Cheng-Fu Chou:
Cooperative content dissemination in multi-channel WLAN hotspots. 720-738

Hongtao Tian, Sanjay K. Bose
, Choi Look Law
, Wendong Xiao:
Joint routing and flow rate optimization in multi-rate ad hoc networks. 739-764
Volume 52, Number 4, March 2008
Cognitive Wireless Networks

Ye (Geoffrey) Li, Petri Mähönen, Milind M. Buddhikot, Ying-Chang Liang
:
Computer Networks (Elsevier) Special Issue on Cognitive Wireless Networks. 775-777

Alexandre de Baynast, Petri Mähönen, Marina Petrova:
ARQ-based cross-layer optimization for wireless multicarrier transmission on cognitive radio networks. 778-794

Chuan Han, Jun Wang, Yaling Yang, Shaoqian Li:
Addressing the control channel design problem: OFDM-based transform domain communication system in cognitive radio. 795-815

Alireza Attar, Seyed Ali Ghorashi
, Mahesh Sooriyabandara, A. Hamid Aghvami:
Challenges of real-time secondary usage of spectrum. 816-830

Srinivasan Krishnamurthy, Mansi Ramakrishnan Thoppian, Srikant Kuppa, Ramaswamy Chandrasekaran, Neeraj Mittal, Subbarayan Venkatesan, Ravi Prakash
:
Time-efficient distributed layer-2 auto-configuration for cognitive radio networks. 831-849

Jie Chen, Chulin Liao, Chuan Han, Shaoqian Li:
Extending available spectrum in cognitive radio: Hierarchical spectrum sharing network. 850-863

Chao Zou, Tao Jin, Chunxiao Chigan, Zhi Tian:
QoS-aware distributed spectrum sharing for heterogeneous wireless cognitive networks. 864-878

Sorabh Gandhi, Chiranjeeb Buragohain, Lili Cao, Haitao Zheng, Subhash Suri:
Towards real-time dynamic spectrum auctions. 879-897

Gregory D. Troxel, Eric Blossom, Steve Boswell, Armando Caro, Isidro Castiñeyra, Alex Colvin, Tad Dreier, Joseph B. Evans, Nick Goffee, Karen Zita Haigh, Talib S. Hussain, Vikas Kawadia, David E. Lapsley, Carl Livadas, Alberto Medina, Joanne Mikkelson, Gary J. Minden, Robert Morris, Craig Partridge, Vivek Raghunathan:
Enabling open-source cognitively-controlled collaboration among software-defined radio nodes. 898-911
Volume 52, Number 5, April 2008

Neelesh Bansod, Ashish Malgi, Byung Kyu Choi, Jean Mayo:
MuON: Epidemic based mutual anonymity in unstructured P2P networks. 915-934

Leiwen Deng, Yan Gao, Yan Chen, Aleksandar Kuzmanovic:
Pollution attacks and defenses for Internet caching systems. 935-956

Amey Shevtekar, Nirwan Ansari
:
A router-based technique to mitigate reduction of quality (RoQ) attacks. 957-970

Yung-Cheng Tu, Meng Chang Chen, Yeali S. Sun, Wei-Kuan Shih:
Enhanced bulk scheduling for supporting delay sensitive streaming applications. 971-987

Junhai Luo, Xue Liu, Danxia Ye:
Research on multicast routing protocols for mobile ad-hoc networks. 988-997

Fabien Viger, Brice Augustin, Xavier Cuvellier, Clémence Magnien, Matthieu Latapy, Timur Friedman
, Renata Teixeira:
Detection, understanding, and prevention of traceroute measurement artifacts. 998-1018

Rita H. Wouhaybi, Andrew T. Campbell:
Building resilient low-diameter peer-to-peer topologies. 1019-1039

Seong-il Hahm, Jongwon Lee, Chong-kwon Kim:
Maximizing multiuser diversity gains in IEEE 802.11 WLANs. 1040-1057

Venkatesh Sarangan, Malla Reddy Devarapalli, Sridhar Radhakrishnan:
A framework for fast RFID tag reading in static and mobile environments. 1058-1073

Bin Liu, Chuang Lin, Jian Qiao, Jianping He, Peter D. Ungsunan:
A NetFlow based flow analysis and monitoring system in enterprise networks. 1074-1092

Yue Ma, Chengwen Zhang:
Quick convergence of genetic algorithm for QoS-driven web service selection. 1093-1104

Kannan Rajah, Sanjay Ranka
, Ye Xia:
Scheduling bulk file transfers with start and end times. 1105-1122
Volume 52, Number 6, April 2008

Ernesto Exposito
, Nicolas Van Wambeke, Christophe Chassot, Khalil Drira:
Introducing a cross-layer interpreter for multimedia streams. 1125-1141

Antonis Panagakis, Athanasios Vaios, Ioannis Stavrakakis
:
Approximate analysis of LRU in the case of short term correlations. 1142-1152

Larissa Popova, Thomas Herpel, Wolfgang H. Gerstacker, Wolfgang Koch:
Cooperative mobile-to-mobile file dissemination in cellular networks within a unified radio interface. 1153-1165

Ji Li, Kwan L. Yeung, Chun-Kit Chan:
Efficient path protection in bi-directional WDM systems. 1166-1178

Ana Paula Couto da Silva
, Martín Varela, Edmundo de Souza e Silva
, Rosa M. M. Leão, Gerardo Rubino:
Quality assessment of interactive voice applications. 1179-1192

Yueping Zhang, Derek Leonard, Dmitri Loguinov:
Jetmax: Scalable max-min congestion control for high-speed heterogeneous networks. 1193-1219

Alexander Chobanyan, Matt W. Mutka
, Vidiadhar Mandrekar, Ning Xi:
End-to-end available bandwidth as a random autocorrelated QoS-relevant time-series. 1220-1237

Vilas Veeraraghavan, Steven Weber:
Fundamental tradeoffs in distributed algorithms for rate adaptive multimedia streams. 1238-1251

Gábor Fodor
, Miklós Telek
, Chrysostomos Koutsimanis:
Performance analysis of scheduling and interference coordination policies for OFDMA networks. 1252-1271

Anirban Banerjee, Michalis Faloutsos
, Laxmi N. Bhuyan:
The P2P war: Someone is monitoring your activities. 1272-1280

Hichem Ayed Harhira, Samuel Pierre:
A novel admission control mechanism in GMPLS-based IP over optical networks. 1281-1290

Pietro Belotti
, Antonio Capone
, Giuliana Carello
, Federico Malucelli
:
Multi-layer MPLS network design: The impact of statistical multiplexing. 1291-1307

Cheng-Yuan Ho, Yaw-Chung Chen, Yi-Cheng Chan, Cheng-Yun Ho:
Fast retransmit and fast recovery schemes of transport protocols: A survey and taxonomy. 1308-1327

Shih-Chang Huang
, Rong-Hong Jan, Wuu Yang:
SCPS: A self-configuring power-saving protocol for wireless ad hoc networks. 1328-1342
Volume 52, Number 7, May 2008

Michal Szymaniak, David L. Presotto, Guillaume Pierre, Maarten van Steen
:
Practical large-scale latency estimation. 1343-1364

Arzad Alam Kherani, Ralph El Khoury, Rachid El Azouzi
, Eitan Altman:
Stability-throughput tradeoff and routing in multi-hop wireless ad hoc networks. 1365-1389

Jordi Guitart
, David Carrera
, Vicenç Beltran
, Jordi Torres
, Eduard Ayguadé
:
Dynamic CPU provisioning for self-managed secure web applications in SMP hosting platforms. 1390-1409

Baochun Bai, Janelle J. Harms, Yuxi Li:
Configurable active multicast congestion control. 1410-1432

Vitalis G. Ozianyi, Neco Ventura
, Eugene Golovins:
A novel pricing approach to support QoS in 3G networks. 1433-1450

Yuh-Jzer Joung
:
Approaching neighbor proximity and load balance for range query in P2P networks. 1451-1472

Christophe De Vleeschouwer, Pascal Frossard:
Loss-resilient window-based congestion control. 1473-1491

Lei Guo
, Xingwei Wang, Jin Cao, Lemin Li:
Traffic recovery time constrained shared sub-path protection algorithm in survivable WDM networks. 1492-1505

Sandeep Kour Ahuja, Srinivasan Ramasubramanian:
All-to-all disjoint multipath routing using cycle embedding. 1506-1517
Volume 52, Number 8, June 2008

Dimitrios D. Vergados
, Alexandros Panoutsakopoulos, Christos Douligeris:
Group registration with distributed databases for location tracking in 3G wireless networks. 1521-1544

Seung Yeob Nam
, Hyu-Dae Kim, Hyong S. Kim:
Detector SherLOCK: Enhancing TRW with Bloom filters under memory and performance constraints. 1545-1566

Craig A. Shue, Minaxi Gupta, Matthew P. Davy:
Packet forwarding with source verification. 1567-1582

A. Antony Franklin
, C. Siva Ram Murthy:
A link layer adaptive pacing scheme for improving throughput of transport protocols in wireless mesh networks. 1583-1602

Padmaraj M. V. Nair, Suku Nair, Marco F. Marchetti, Girish Chiruvolu, Maher Ali:
Bandwidth sensitive fast failure recovery scheme for Metro Ethernet. 1603-1616

Pawel Garbacki, Dick H. J. Epema, Maarten van Steen
:
Broker-placement in latency-aware peer-to-peer networks. 1617-1633

Rongsheng Huang, Hongqiang Zhai, Chi Zhang, Yuguang Fang
:
SAM-MAC: An efficient channel assignment scheme for multi-channel ad hoc networks. 1634-1646

Qi Wang, Robert C. Atkinson
, John Dunlop:
Design and evaluation of flow handoff signalling for multihomed mobile nodes in wireless overlay networks. 1647-1674
Volume 52, Number 9, June 2008

Chee-Wei Ang
, Chen-Khong Tham
:
iMST: A bandwidth-guaranteed topology control algorithm for TDMA-based ad hoc networks with sectorized antennas. 1675-1692

Minghui Shi, Xuemin Shen
, Jon W. Mark, Dongmei Zhao, Yixin Jiang:
User authentication and undeniable billing support for agent-based roaming service in WLAN/cellular integrated mobile networks. 1693-1702

Hui Ma, Jing Zhu, Sumit Roy, Soo Young Shin
:
Joint transmit power and physical carrier sensing adaptation based on loss differentiation for high density IEEE 802.11 WLAN. 1703-1720

Michele Flammini
, Gianpiero Monaco, Luca Moscardelli, Mordechai Shalom
, Shmuel Zaks:
Selfishness, collusion and power of local search for the ADMs minimization problem. 1721-1731

Oleg Berzin:
Mobility label based network: Mobility support in label switched networks with multi-protocol BGP. 1732-1744

Fetahi Wuhib, Mads Dam, Rolf Stadler:
Decentralized detection of global threshold crossings using aggregation trees. 1745-1761

Daniel M. Batista
, Nelson L. S. da Fonseca
, Flávio Keidi Miyazawa
, Fabrizio Granelli
:
Self-adjustment of resource allocation for grid applications. 1762-1781

Qunfeng Dong, Ashutosh Shukla, Vivek Shrivastava, Dheeraj Agrawal, Suman Banerjee, Koushik Kar:
Load balancing in large-scale RFID systems. 1782-1796

Charalampos Konstantopoulos
, Damianos Gavalas
, Grammati E. Pantziou
:
Clustering in mobile ad hoc networks through neighborhood stability-based mobility prediction. 1797-1824

Xue Jun Li
, Boon-Chong Seet, Peter Han Joo Chong
:
Multihop cellular networks: Technology and economics. 1825-1837

Mo-Che Chan, Shun-Yun Hu, Jehn-Ruey Jiang:
An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games. 1838-1845

Matti Siekkinen
, Guillaume Urvoy-Keller, Ernst W. Biersack, Denis Collange:
A root cause analysis toolkit for TCP. 1846-1858
Volume 52, Number 10, July 2008
Challenges and Opportunities in Advanced Optical Networking
Invited Papers

Haruhisa Ichikawa, Masashi Shimizu, Kazunori Akabane, Osamu Ishida, Mitsuo Teramoto:
A Ubiquitous wireless network architecture and its impact on optical networks. 1864-1872

Carla Raffaelli
, Kyriakos Vlachos, Nicola Andriolli
, Dimitrios Apostolopoulos
, Jakob Buron, Ruth van Caenegem, Grzegorz Danilewicz, Jorge M. Finochietto, Joan García-Haro
, Dimitrios Klonidis
, Mike J. O'Mahony, Guido Maier, Achille Pattavina, Pablo Pavón-Mariño, Sarah Ruepp
, Michele Savi, Mirco Scaffardi, Ioannis Tomkos
, Anna Tzanakaki
, Lena Wosinska
:
Photonics in switching: Architectures, systems and enabling technologies. 1873-1890
Multilayer Problems in ASON/GMPLS Optical Networks

Wang Yao, Byrav Ramamurthy:
Rerouting schemes for dynamic traffic grooming in optical WDM networks. 1891-1904

Gustavo Sousa Pavani
, Luiz Gustavo Zuliani, Helio Waldman, Maurício F. Magalhães:
Distributed approaches for impairment-aware routing and wavelength assignment algorithms in GMPLS networks. 1905-1915

Víctor López, José Alberto Hernández
, Javier Aracil, Juan P. Fernández Palacios, Óscar González de Dios:
A Bayesian decision theory approach for the techno-economic analysis of an all-optical router (extended version). 1916-1926

Freek Dijkstra, Bert Andree, Karst Koymans
, Jeroen van der Ham
, Paola Grosso
, Cees de Laat:
A multi-layer network model based on ITU-T G.805. 1927-1937

Eduard Escalona, Salvatore Spadaro
, Jaume Comellas
, Gabriel Junyent
:
Advance reservations for service-aware GMPLS-based optical networks. 1938-1950
On the Resilience Problem in ASON/GMPLS Optical Networks

Sarah Ruepp
, Nicola Andriolli
, Jakob Buron, Lars Dittmann
, Lars Ellegard:
Restoration in all-optical GMPLS networks with limited wavelength conversion. 1951-1964

Massimo Tornatore
, Matteo Carcagnì, Canhui Ou, Biswanath Mukherjee, Achille Pattavina:
Intelligent shared-segment protection. 1965-1974

Luis Velasco, Salvatore Spadaro
, Jaume Comellas
, Gabriel Junyent
:
Introducing OMS protection in GMPLS-based optical ring networks. 1975-1987

Christian Awad, Brunilde Sansò, André Girard:
DiffServ for differentiated reliability in meshed IP/WDM networks. 1988-2012
OBS Technologies

Amin R. Mazloom, Preetam Ghosh
, Kalyan Basu, Sajal K. Das
:
CoCONet: A collision-free container-based core optical network. 2013-2032

Qian Chen, Gurusamy Mohan
, Kee Chaing Chua:
Route optimization in optical burst switched networks considering the streamline effect. 2033-2044

Hui-Tang Lin, Wang-Rong Chang:
CORNet: An OBS metro ring network with QoS support and fairness control. 2045-2064

Georgios Zervas, Yixuan Qin, Reza Nejabati, Dimitra Simeonidou, Franco Callegati
, Aldo Campi, Walter Cerroni
:
SIP-enabled Optical Burst Switching architectures and protocols for application-aware optical networks. 2065-2076
Physical Layer Issues

Nasaruddin
, Tetsuo Tsujioka
:
Design of strict variable-weight optical orthogonal codes for differentiated quality of service in optical CDMA networks. 2077-2086

Yoshinari Awaji, Hideaki Furukawa, Naoya Wada, Eddie Kong, Peter Chan, Ray Man:
Guidelines for amplification of optical packets in WDM environment regarding impact of transient response of erbium-doped fiber amplifier. 2087-2093
Volume 52, Number 11, August 2008

Elena Meshkova, Janne Riihijärvi, Marina Petrova, Petri Mähönen:
A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks. 2097-2128

Tae-Young Chang, Zhenyun Zhuang, Aravind Velayutham, Raghupathy Sivakumar:
WebAccel: Accelerating Web access for low-bandwidth hosts. 2129-2147

Jian Tang, Satyajayant Misra, Guoliang Xue:
Joint spectrum allocation and scheduling for fair spectrum sharing in cognitive radio wireless networks. 2148-2158

Edoardo Amaldi, Antonio Capone
, Matteo Cesana
, Ilario Filippini
, Federico Malucelli
:
Optimization models and methods for planning wireless mesh networks. 2159-2171

Stuart M. Allen
, Roger M. Whitaker, Steve Hurley:
Personalised subscription pricing for optimised wireless mesh network deployment. 2172-2188

Chih-Yung Chang, Hsu-Ruey Chang:
Energy-aware node placement, topology control and MAC scheduling for wireless sensor networks. 2189-2204

Qun Zhao, Mohan Gurusamy
:
Connected K-target coverage problem in wireless sensor networks with different observation scenarios. 2205-2220

Weijiang Liu, Jian Gong:
Double sampling for flow measurement on high speed links. 2221-2226

Jelena V. Misic:
Traffic and energy consumption of an IEEE 802.15.4 network in the presence of authenticated, ECC Diffie-Hellman ephemeral key exchange. 2227-2236

Sukrit Dasgupta, Jaudelice Cavalcante de Oliveira, Jean-Philippe Vasseur:
Dynamic traffic engineering for mixed traffic on international networks: Simulation and analysis on real network and traffic scenarios. 2237-2258
Volume 52, Number 12, August 2008

Ian F. Akyildiz, Fernando Brunetti
, Cristina Blázquez:
Nanonetworks: A new communication paradigm. 2260-2279

Daji Qiao, Kang G. Shin, Zakhia G. Abichar:
Energy-conservation in 802.11 WLANs via transmission-strategy-aware airtime allocation. 2280-2291

Jennifer Yick, Biswanath Mukherjee, Dipak Ghosal
:
Wireless sensor network survey. 2292-2330

Chih-Min Chao:
OVSF code assignment strategies with minimal fragmentations for WCDMA systems. 2331-2343

José M. Gutiérrez López, Mohamed Imine, Rubén Cuevas Rumín, Jens Myrup Pedersen
, Ole Brun Madsen:
Multilevel network characterization using regular topologies. 2344-2359

Mort Naraghi-Pour, Vinay Desai:
Loop-free traffic engineering with path protection in MPLS VPNs. 2360-2372

Yalin Chen, Jue-Sam Chou, Hung-Min Sun:
A novel mutual authentication scheme based on quadratic residues for RFID systems. 2373-2380

Pallab Datta, Arun K. Somani:
Graph transformation approaches for diverse routing in shared risk resource group (SRRG) failures. 2381-2394

Dzmitry Kliazovich, Fabrizio Granelli
, Daniele Miorandi:
Logarithmic window increase for TCP Westwood+ for improvement in high speed, long distance networks. 2395-2410

Manish Jain, Constantine Dovrolis:
Path selection using available bandwidth estimation in overlay-based video streaming. 2411-2418

I. Kuban Altinel, Necati Aras
, Evren Güney
, Cem Ersoy
:
Binary integer programming formulation and heuristics for differentiated coverage in heterogeneous sensor networks. 2419-2431

Marco Benini, Sabrina Sicari
:
Assessing the risk of intercepting VoIP calls. 2432-2446
Volume 52, Number 13, September 2008
(1) Research and Trials for Reliable VoIP Applications

Fotini-Niovi Pavlidou, Andreas Pitsillides, Henning Schulzrinne, Dorgham Sisalem:
Research and trials for reliable VoIP applications. 2447-2449

Jianxin Liao, Jingyu Wang
, Xiaomin Zhu:
A multi-path mechanism for reliable VoIP transmission over wireless networks. 2450-2460

Maria Kalama, Güray Açar, Barry G. Evans
, Ariane Isoard:
VoIP over DVB-RCS satellite systems: Trial results and the impact of adaptive speech coding using cross-layer design. 2461-2472

Sofiene Jelassi, Habib Youssef:
Adaptive playout scheduling algorithm tailored for real-time packet-based voice conversations over wireless ad-hoc networks. 2473-2488

Hung-Yun Hsieh, You-En Lin, Hsiao-Pu Lin:
Enhancing VoIP service for ubiquitous communication in a campus WLAN with partial coverage. 2489-2504

Antonio Jose Estepa
, Rafael Estepa
:
Accurate resource estimation for homogeneous VoIP aggregated traffic. 2505-2517

Dimitris Zisiadis
, Spyros Kopsidas, Leandros Tassiulas:
VIPSec defined. 2518-2528
(2) Wireless Multimedia Sensor Networks

Özgür B. Akan, Pascal Frossard, Qian Zhang
, Nikil Jayant:
Special issue on wireless multimedia sensor networks. 2529-2531

Navrati Saxena, Abhishek Roy, Jitae Shin:
Dynamic duty cycle and adaptive contention window based QoS-MAC protocol for wireless multimedia sensor networks. 2532-2542

Chewoo Na, Yaling Yang, Amitabh Mishra:
An optimal GTS scheduling algorithm for time-sensitive transactions in IEEE 802.15.4 networks. 2543-2557

Nurcan Tezcan, Wenye Wang
:
Self-orienting wireless multimedia sensor networks for occlusion-free viewpoints. 2558-2567

Changsu Suh, Zeeshan Hameed Mir, Young-Bae Ko:
Design and implementation of enhanced IEEE 802.15.4 for supporting multimedia service in Wireless Sensor Networks. 2568-2581

Baljeet Malhotra, Ioanis Nikolaidis
, Janelle J. Harms:
Distributed classification of acoustic targets in wireless audio-sensor networks. 2582-2593

Qin Lu, Wusheng Luo, Jidong Wang, Bo Chen:
Low-complexity and energy efficient image compression scheme for wireless sensor networks. 2594-2603
Volume 52, Number 14, October 2008

Edith Cohen, Nadav Grossaug, Haim Kaplan:
Processing top-k queries from samples. 2605-2622

Karthikeyan Sundaresan, Raghupathy Sivakumar:
Routing in ad-hoc networks with MIMO links: Optimization considerations and protocols. 2623-2644

Alberto Dainotti
, Antonio Pescapè, Pierluigi Salvo Rossi, Francesco Palmieri
, Giorgio Ventre:
Internet traffic modeling by means of Hidden Markov Models. 2645-2662

Marco Mellia
, Michela Meo
, Luca Muscariello, Dario Rossi:
Passive analysis of TCP anomalies. 2663-2676

Stenio F. L. Fernandes, Carlos Alberto Kamienski
, Judith Kelner, Dênio Mariz, Djamel Sadok:
A stratified traffic sampling methodology for seeing the big picture. 2677-2689

Tristan Henderson
, David Kotz
, Ilya Abyzov:
The changing usage of a mature campus-wide wireless network. 2690-2712

Dawood Al-Abri
, Janise McNair
:
On the interaction between localization and location verification for wireless sensor networks. 2713-2727

Mesut Ali Ergin, Kishore Ramachandran, Marco Gruteser:
An experimental study of inter-cell interference effects on system performance in unplanned wireless LAN deployments. 2728-2744

Francesco Oliviero, L. Peluso, Simon Pietro Romano
:
REFACING: An autonomic approach to network security based on multidimensional trustworthiness. 2745-2763

Chao-Tsun Chang, Chih-Yung Chang, Sheng-Wen Chang:
TMCP: Two-layer multicast communication protocol for Bluetooth radio networks. 2764-2778

Kemal Akkaya, S. Janapala:
Maximizing connected coverage via controlled actor relocation in wireless sensor and actor networks. 2779-2796

Yi Shi
, Yiwei Thomas Hou
:
On the capacity of UWB-based wireless sensor networks. 2797-2804

Michael Menth, Stefan Kopf, Joachim Charzinski, Karl J. Schrodi:
Resilient network admission control. 2805-2815
Volume 52, Number 15, October 2008
Complex Computer and Communication Networks

Matthieu Latapy, Walter Willinger:
Complex computer and communication networks. 2817-2818

Mohammad Fraiwan, G. Manimaran:
Scheduling algorithms for conducting conflict-free measurements in overlay networks. 2819-2830

Mira Gonen, Dana Ron
, Udi Weinsberg, Avishai Wool
:
Finding a dense-core in Jellyfish graphs. 2831-2841

Antoine Scherrer, Pierre Borgnat
, Eric Fleury, Jean-Loup Guillaume
, Céline Robardet:
Description and simulation of dynamic mobility networks. 2842-2858

Andrej Vilhar
, Roman Novak
:
Policy relationship annotations of predefined AS-level topologies. 2859-2871

Knut-Helge Vik, Pål Halvorsen, Carsten Griwodz:
Evaluating Steiner-tree heuristics and diameter variations for application layer multicast. 2872-2893

Ivan Gojmerac, Peter Reichl, Lasse Jansen:
Towards low-complexity Internet traffic engineering: The Adaptive Multi-Path algorithm. 2894-2907

Josh Karlin, Stephanie Forrest
, Jennifer Rexford
:
Autonomous security for autonomous systems. 2908-2923
Regular Papers

Hwangnam Kim, Jennifer C. Hou, Hyuk Lim
:
TranSim: Accelerating simulation of large-scale IP networks through preserving network invariants. 2924-2946

Tobias Harks, Tobias Poschwatta:
Congestion control in utility fair networks. 2947-2960

Jessie Hui Wang, Dah-Ming Chiu, John C. S. Lui:
A game-theoretic analysis of the implications of overlay network traffic on ISP peering. 2961-2974

Alessio Botta
, Antonio Pescapè, Giorgio Ventre:
An approach to the identification of network elements composing heterogeneous end-to-end paths. 2975-2987

Emmanouel A. Varvarigos
, Vasileios Sourlas
, Kostas Christodoulopoulos
:
Routing and scheduling connections in networks that support advance reservations. 2988-3006

Josep Domingo-Ferrer, Alexandre Viejo
, Francesc Sebé
, Úrsula González-Nicolás:
Privacy homomorphisms for social networks with private relationships. 3007-3016

Hui Chen
, Yang Xiao
, Susan V. Vrbsky:
Scalability study of cache access mechanisms in multiple-cell wireless networks. 3017-3027
Volume 52, Number 16, November 2008

Junghee Han, David Watson, Farnam Jahanian:
Enhancing end-to-end availability and performance via topology-aware overlay networks. 3029-3046

Renita Machado, Sirin Tekinay:
A survey of game-theoretic approaches in wireless sensor networks. 3047-3061

Xiuchao Wu, Mun Choon Chan, Akkihebbal L. Ananda:
Improving TCP performance in heterogeneous mobile environments by exploiting the explicit cooperation between server and mobile host. 3062-3074

Zuhua Shao:
Certificate-based fair exchange protocol of signatures from pairings. 3075-3084

Yuan-Cheng Lai, Ching-Neng Lai:
DCCP partial reliability extension with sequence number compensation. 3085-3100

Jen-Yu Fang, Hung-Chi Chu, Rong-Hong Jan, Wuu Yang:
A multiple power-level approach for wireless sensor network positioning. 3101-3118

Cungang Yang, Celia Li, Jie Xiao:
Location-based design for secure and efficient wireless sensor networks. 3119-3129

Monia Ghobadi, Sudhakar Ganti, Gholamali C. Shoja:
Resource optimization algorithms for virtual private networks using the hose model. 3130-3147

Qiang Pan, Jianming Wei, Haitao Liu, Maolin Hu:
Virtual field strategy for collaborative signal and information processing in wireless heterogeneous sensor networks. 3148-3168

Yaser Pourmohammadi Fallah
, Hussein M. Alnuweiri:
Analysis of temporal and throughput fair scheduling in multirate WLANs. 3169-3183
Volume 52, Number 17, December 2008

Marc Sánchez Artigas, Pedro García López, Antonio Fernandez Gómez-Skarmeta
, José Santa
:
TR-clustering: Alleviating the impact of false clustering on P2P overlay networks. 3185-3204

Wei Wei, Bing Wang, Chun Zhang, Jim Kurose, Donald F. Towsley
:
Classification of access network types: Ethernet, wireless LAN, ADSL, cable modem or dialup? 3205-3217

Vijay K. Verma, Ramesh C. Joshi, Bin Xie, Dharma P. Agrawal:
Combating the bloated state problem in mobile agents based network monitoring applications. 3218-3228

Rui Campos
, Manuel Ricardo
:
A fast algorithm for computing minimum routing cost spanning trees. 3229-3247

Xenofontas A. Dimitropoulos, Marc Ph. Stoecklin, Paul Hurley, Andreas Kind:
The eternal sunshine of the sketch data structure. 3248-3257

Vicent Pla
, Jorma T. Virtamo, Jorge Martínez-Bauset:
Optimal robust policies for bandwidth allocation and admission control in wireless networks. 3258-3272

Sangheon Pack
, Wonjun Lee:
Dual home agent (DHA)-based location management scheme in integrated cellular-WLAN networks. 3273-3283

Shigeo Shioda
, Kenji Ohtsuka, Takehiro Sato:
An efficient network-wide broadcasting based on hop-limited shortest-path trees. 3284-3295

Jehn-Ruey Jiang:
Expected quorum overlap sizes of quorum systems for asynchronous power-saving in mobile ad hoc networks. 3296-3306
Volume 52, Number 18, December 2008

Chih-Chiang Wang, Khaled Harfoush:
Shortest-path routing in randomized DHT-based Peer-to-Peer systems. 3307-3317

Pascal Jaisson, Florian De Vuyst
:
An innovating PDE model based on fluid flow paradigm for multithread systems. 3318-3324

Tarik Cicic:
On basic properties of fault-tolerant multi-topology routing. 3325-3341

Wei-Tsung Su, Yau-Hwang Kuo, Po-Cheng Huang:
A QoS-driven approach for service-oriented device anycasting in ubiquitous environments. 3342-3357

Quoc-Thinh Nguyen-Vuong, Nazim Agoulmine, Yacine Ghamri-Doudane:
A user-centric and context-aware solution to interface management and access network selection in heterogeneous wireless environments. 3358-3372

Marco Comuzzi
, Chiara Francalanci, Paolo Giacomazzi:
Pricing the quality of differentiated services for media-oriented real-time applications: A multi-attribute negotiation approach. 3373-3391

Shih-Chiang Tsao, Yuan-Cheng Lai, Le-Chi Tsao, Ying-Dar Lin:
On applying fair queuing discipline to schedule requests at access gateway for downlink differential QoS. 3392-3404

Y. C. Tay, Dinh Nguyen Tran, Eric Yi Liu, Wei Tsang Ooi
, Robert Morris:
Equilibrium analysis through separation of user and network behavior. 3405-3420

Arunita Jaekel, Subir Bandyopadhyay, Yash P. Aneja:
A new approach for designing fault-tolerant WDM networks. 3421-3432

Alireza A. Nezhad, Ali Miri, Dimitris Makrakis:
Location privacy and anonymity preserving routing for wireless sensor networks. 3433-3452

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







