Volume 51,
Number 1,
January 2007
- Francesc Sebé, Josep Domingo-Ferrer:
Scalability and security in biased many-to-one communication.
1-13
- Davide Careglio, Josep Solé-Pareta, Salvatore Spadaro:
Service category-to-wavelength selection technique for QoS support in connection-oriented optical packet switching.
14-30
- Ka Ki To, Jack Y. B. Lee:
Parallel overlays for high data-rate multicast data transfer.
31-42
- Junfeng Wang, Lei Li, Mingtian Zhou:
Topological dynamics characterization for LEO satellite networks.
43-53
- Zhi Li, Prasant Mohapatra:
On investigating overlay service topologies.
54-68
- Shanyu Zheng, David Manz, Jim Alves-Foss:
A communication-computation efficient group key algorithm for large and dynamic groups.
69-93
- Hung Tuan Tran, Thomas Ziegler:
A design framework towards the profitable operation of service overlay networks.
94-113
- Giovanna Carofiglio, Michele Garetto, Emilio Leonardi, Alessandro Tarello, Marco Ajmone Marsan:
Beyond fluid models: Modelling TCP mice in IP networks under non-stationary random traffic.
114-133
- Li Feng, Qinglin Zhao, Hanwen Zhang:
Location management based on distance and direction for PCS networks.
134-152
- Tamma Bheemarjuna Reddy, John P. John, C. Siva Ram Murthy:
Providing MAC QoS for multimedia traffic in 802.11e based multi-hop ad hoc wireless networks.
153-176
- Tao Meng, Hong-Fei Yan:
On the peninsula phenomenon in web graph and its implications on web search.
177-189
- Shay Kutten, David Peleg:
Asynchronous resource discovery in peer-to-peer networks.
190-206
- Salvatore Spadaro, Alessandro D'Alessandro, Antonio Manzalini, Josep Solé-Pareta:
TRIDENT: An automated approach to traffic engineering in IP/MPLS over ASON/GMPLS networks.
207-223
- Robert M. Hierons, Hasan Ural:
Reducing the cost of applying adaptive test cases.
224-238
- Javed I. Khan, Raid Zaghal:
Symbiotic rate adaptation for time sensitive elastic traffic with interactive transport.
239-257
- Hirozumi Yamaguchi, Khaled El-Fakih, Gregor von Bochmann, Teruo Higashino:
Deriving protocol specifications from service specifications written as Predicate/Transition-nets.
258-284
- Fei Hu, Waqaas Siddiqui, Krishna Sankar:
Scalable security in Wireless Sensor and Actuator Networks (WSANs): Integration re-keying with routing.
285-308
- Marcos Postigo-Boix, Joan García-Haro, José Luis Melús-Moreno:
A cost-efficient method for streaming stored content in a guaranteed QoS Internet.
309-335
- Wenting Tang, Yun Fu, Ludmila Cherkasova, Amin Vahdat:
Modeling and generating realistic streaming media server workloads.
336-356
Volume 51,
Number 2,
February 2007
Feature Interaction
- Stephan Reiff-Marganiec, Mark Ryan:
Guest Editorial.
357-358
- Michael Weiss, Babak Esfandiari, Yun Luo:
Towards a classification of web service feature interactions.
359-381
- Rui Gustavo Crespo, Miguel Carvalho, Luigi Logrippo:
Distributed resolution of feature interactions for internet applications.
382-397
- Mohamed Shehata, Armin Eberlein, Abraham O. Fapojuwo:
A taxonomy for identifying requirement interactions in software systems.
398-425
- Caixia Chi, Ruibing Hao:
Test generation for interaction detection in feature-rich communication systems.
426-438
- Alice Miller, Muffy Calder, Alastair F. Donaldson:
A template-based approach for the generation of abstractable and reducible models of featured networks.
439-455
- Pierre-Yves Schobbens, Patrick Heymans, Jean-Christophe Trigaux, Yves Bontemps:
Generic semantics of feature diagrams.
456-479
- Wu-Hon F. Leung:
Program entanglement, feature interaction and the feature language extensions.
480-495
- Kenneth J. Turner, Lynne Blair:
Policies and conflicts in call control.
496-514
- Xiaotao Wu, Henning Schulzrinne:
Handling feature interactions in the language for end system services.
515-535
- Mario Kolberg, Evan H. Magill:
Managing feature interactions between distributed SIP call control services.
536-557
Volume 51,
Number 3,
February 2007
- B. Praveen, J. Praveen, C. Siva Ram Murthy:
On using forward error correction for loss recovery in optical burst switched networks.
559-568
- Carlo K. da S. Rodrigues, Rosa M. M. Leão:
Bandwidth usage distribution of multimedia servers using Patching.
569-587
- Yeim-Kuan Chang:
Fast binary and multiway prefix searches for packet forwarding.
588-605
- Sungchang Kim, Young-Chon Kim, Bin-Yeong Yoon, Minho Kang:
An integrated congestion control mechanism for optimized performance using two-step rate controller in optical burst switching networks.
606-620
- Young-June Choi, Jin-Ghoo Choi, Saewoong Bahk:
Upper-level scheduling supporting multimedia traffic in cellular data networks.
621-631
- Dong Yu, Deborah A. Frincke:
Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net.
632-654
- Zhiguo Wan, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda:
Access control protocols with two-layer architecture for wireless networks.
655-670
- Hailong Li, Ian Li-Jin Thng:
Performance analysis of limited number of wavelength converters by share per node in optical switching network.
671-682
- Péter Hága, Krisztián Diriczi, Gábor Vattay, István Csabai:
Granular model of packet pair separation in Poissonian traffic.
683-698
- Jean Marc Kelif, Eitan Altman, Ioannis Z. Koukoutsidis:
Admission and GoS control in a multiservice WCDMA system.
699-711
- Yuh-Jzer Joung, Jiaw-Chang Wang:
Chord2: A two-layer Chord for reducing maintenance overhead via heterogeneity.
712-731
- Zhiqiang Gao, Nirwan Ansari:
A practical and robust inter-domain marking scheme for IP traceback.
732-750
- Glenn S. Benson:
Portable security transaction protocol.
751-766
- Meng Chang Chen, Li-Ping Tung, Yeali S. Sun, Wei Kuan Shih:
A new per-class flow fixed proportional differentiated service for multi-service wireless LAN.
767-780
- Michel Mandjes, Petteri Mannersalo, Ilkka Norros:
Gaussian tandem queues with an application to dimensioning of switch fabric interfaces.
781-797
- Zhenqiang Ye, Lap Kong Law, Srikanth V. Krishnamurthy, Zhong Xu, Suvidhean Dhirakaosal, Satish K. Tripathi, Mart Molle:
Predictive channel reservation for handoff prioritization in wireless cellular networks.
798-822
- Lap Kong Law, Srikanth V. Krishnamurthy, Michalis Faloutsos:
A novel adaptive protocol for lightweight efficient multicasting in ad hoc networks.
823-834
- Sergio Sánchez-López, Xavier Masip-Bruin, Josep Solé-Pareta, Jordi Domingo-Pascual:
Fast setup of end-to-end paths for bandwidth constrained applications in an IP/MPLS-ATM integrated environment.
835-852
- Jianping Pan, Lin Cai, Xuemin Shen, Jon W. Mark:
Identity-based secure collaboration in wireless ad hoc networks.
853-865
- Jen-Shiuh Liu, Zhi-Jian Lee, Yeh-Ching Chung:
Dynamic probabilistic packet marking for efficient IP traceback.
866-882
- Yuh-Ren Tsai, Shiuh-Jeng Wang:
Two-tier authentication for cluster and individual sets in mobile ad hoc networks.
883-900
- Ernst W. Biersack, Damiano Carra, Renato Lo Cigno, Pablo Rodriguez, Pascal Felber:
Overlay architectures for file distribution: Fundamental performance analysis for homogeneous and heterogeneous cases.
901-917
Volume 51,
Number 4,
March 2007
- Ian F. Akyildiz, Harry Rudin:
Editorial.
919-920
- Ian F. Akyildiz, Tommaso Melodia, Kaushik R. Chowdhury:
A survey on wireless multimedia sensor networks.
921-960
- Kurtis B. Kredo II, Prasant Mohapatra:
Medium access control in wireless sensor networks.
961-994
- Yi Li, Gaoxi Xiao, Hooshang Ghafouri-Shiraz:
Performance evaluation of multi-fiber optical packet switches.
995-1012
- Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro:
Evaluation of a low-rate DoS attack against iterative servers.
1013-1030
- Konstantinos P. Ferentinos, Theodore A. Tsiligiridis:
Adaptive design optimization of wireless sensor networks using genetic algorithms.
1031-1051
- Theodore L. Willke, Nicholas F. Maxemchuk:
Coordinated interaction using reliable broadcast in mobile wireless networks.
1052-1059
- Majid Ghaderi, Raouf Boutaba, Gary W. Kenward:
Joint call and packet QoS in cellular packet networks.
1060-1071
- Jinwon Lee, Hyonik Lee, Seungwoo Kang, Su Myeon Kim, Junehwa Song:
CISS: An efficient object clustering framework for DHT-based peer-to-peer applications.
1072-1094
- Shantidev Mohanty, Jiang Xie:
Performance analysis of a novel architecture to integrate heterogeneous wireless systems.
1095-1105
- Mohamed G. Gouda, Alex X. Liu:
Structured firewall design.
1106-1120
- Praveen Jayachandran, Praveen Bhamidipati, C. Siva Ram Murthy:
On providing elastic QoS in optical burst switched networks.
1121-1132
- Yaqing Huang, Roch Guérin:
A simple FIFO-based scheme for differentiated loss guarantees.
1133-1150
- Wei-Tsung Su, Ko-Ming Chang, Yau-Hwang Kuo:
eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks.
1151-1168
- Claude Castelluccia, Nitesh Saxena, Jeong Hyun Yi:
Robust self-keying mobile ad hoc networks.
1169-1182
- Sajjad Zarifzadeh, Nasser Yazdani, Hamed Khanmirza:
A routing framework for load balancing of bandwidth sensitive traffic in differentiated service networks.
1183-1204
- Fabio Ricciato, Francesco Vacirca, Philipp Svoboda:
Diagnosis of capacity bottlenecks via passive monitoring in 3G networks: An empirical analysis.
1205-1231
Volume 51,
Number 5,
April 2007
From Intrusion Detection to Self-Protection
- Deborah A. Frincke, Andreas Wespi, Diego Zamboni:
From intrusion detection to self-protection.
1233-1238
- Kenneth L. Ingham, Anil Somayaji, John Burge, Stephanie Forrest:
Learning DFA representations of HTTP for protecting web applications.
1239-1255
- Georgios Portokalidis, Herbert Bos:
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots.
1256-1274
- Marcos Laureano, Carlos Maziero, Edgard Jamhour:
Protecting host-based intrusion detectors through virtual machines.
1275-1283
- Paul D. Williams, Eugene H. Spafford:
CuPIDS: An exploration of highly focused, co-processor-based information system protection.
1284-1298
- Erol Gelenbe, George Loukas:
A self-aware approach to denial of service defence.
1299-1314
- Morton Swimmer:
Using the danger model of immune systems for distributed defense in modern data networks.
1315-1333
- Yu-Sung Wu, Bingrui Foo, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford:
Automated adaptive intrusion containment in systems of interacting services.
1334-1360
- Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Maier:
Automatic high-performance reconstruction and recovery.
1361-1377
Volume 51,
Number 6,
April 2007
- Hwangnam Kim, Jennifer C. Hou:
Mixed-mode simulation for IEEE 802.11-operated WLANs.
1379-1402
- Jeng Farn Lee, Meng Chang Chen, Yeali S. Sun:
WF2Q-M: Worst-case fair weighted fair queueing with maximum rate control.
1403-1420
- Jiang Li, Murat Yuksel, Xingzhe Fan, Shivkumar Kalyanaraman:
Generalized multicast congestion control.
1421-1443
- Lan Wang, Daniel Massey, Lixia Zhang:
Persistent detection and recovery of state inconsistencies.
1444-1458
- Sasu Tarkoma, Jaakko Kangasharju:
On the cost and safety of handoffs in content-based routing systems.
1459-1482
- Javier Vales-Alonso, Esteban Egea-López, Alejandro S. Martínez-Sala, Pablo Pavón-Mariño, M. Victoria Bueno-Delgado, Joan García-Haro:
Performance evaluation of MAC transmission power control in wireless sensor networks.
1483-1498
- Nabhendra Bisnik, Alhussein A. Abouzeid:
Optimizing random walk search algorithms in P2P networks.
1499-1514
- Hari Rangarajan, J. J. Garcia-Luna-Aceves:
Efficient use of route requests for loop-free on-demand routing in ad hoc networks.
1515-1529
- B. S. Manoj, K. Jayanth Kumar, C. Siva Ram Murthy:
MuPAC: A new multi-power architecture for capacity enhancement in cellular networks.
1530-1554
- Yong Huat Chew, Boon Sain Yeo, Daniel Chien Ming Kuan:
Sensitivity study of location management area partitioning in cellular communication systems.
1555-1573
- Bo Li, Roberto Battiti:
Achieving optimal performance in IEEE 802.11 wireless LANs with the combination of link adaptation and adaptive backoff.
1574-1600
- Hechmi Khlifi, Jean-Charles Grégoire:
ARTP: A buffer-aware rate control protocol for media streaming.
1601-1615
- Nikos Argiriou, Leonidas Georgiadis:
Channel sharing by multi-class rate adaptive streams: Performance region and optimization.
1616-1629
- Sangheon Pack, Taekyoung Kwon, Yanghee Choi:
A performance comparison of mobility anchor point selection schemes in Hierarchical Mobile IPv6 networks.
1630-1642
- Mushi Jin, Oliver W. W. Yang:
APOSN: Operation, modeling and performance evaluation.
1643-1659
- Ashraf Al Daoud, Murat Alanyali:
Loss-cognizant pricing in networks with greedy users.
1660-1683
- Feng Zheng, John Nelson:
An Hinfinity approach to congestion control design for AQM routers supporting TCP flows in wireless access networks.
1684-1704
- Feng Gao, Michael E. Woodward:
A hybrid topological-stochastic partitioning method for scaling QoS routing algorithms.
1705-1724
- Gee-Swee Poo, Haibo Wang:
Multi-path routing versus tree routing for VPN bandwidth provisioning in the hose model.
1725-1743
Volume 51,
Number 7,
May 2007
Protocols for Fast,
Long-Distance Networks
- Katsushi Kobayashi, Pascale Vicat-Blanc Primet, Joe Touch:
Protocols for fast, long-distance networks.
1745-1747
- Sangtae Ha, Long Le, Injong Rhee, Lisong Xu:
Impact of background traffic on performance of high-speed TCP variant protocols.
1748-1762
- Shan Chen, Brahim Bensaou:
Can high-speed networks survive with DropTail queues management?
1763-1776
- Yunhong Gu, Robert L. Grossman:
UDT: UDP-based data transfer for high-speed wide area networks.
1777-1799
- Xiaomeng Huang, Chuang Lin, Fengyuan Ren:
A novel high speed transport protocol based on explicit virtual load feedback.
1800-1814
- Pasi Sarolahti, Mark Allman, Sally Floyd:
Determining an appropriate sending rate over an underutilized network path.
1815-1832
- Kiyohide Nakauchi, Katsushi Kobayashi:
An explicit router feedback framework for high bandwidth-delay product networks.
1833-1846
- Lisong Xu:
Extending equation-based congestion control to high-speed and long-distance networks.
1847-1859
Volume 51,
Number 8,
June 2007
- Edith Cohen, Amos Fiat, Haim Kaplan:
Associative search in peer to peer networks: Harnessing latent semantics.
1861-1881
- Alex Raj, Oliver C. Ibe:
A survey of IP and multiprotocol label switching fast reroute schemes.
1882-1907
- Reuven Cohen, Amnon Shochot:
The "Global-ISP" paradigm.
1908-1921
- Hwangnam Kim, Jennifer C. Hou, Chunyu Hu, Ye Ge:
QoS provisioning in IEEE 802.11-compliant networks: Past, present, and future.
1922-1941
- Jin-Hee Choi, Young-Pil Kim, Chuck Yoo:
Self-prevention of socket buffer overflow.
1942-1954
- Ye Ge, Jennifer C. Hou, Sunghyun Choi:
An analytic study of tuning systems parameters in IEEE 802.11e enhanced distributed channel access.
1955-1980
- Steven Weber, Gustavo de Veciana:
Flow-level QoS for a dynamic load of rate adaptive sessions sharing a bottleneck link.
1981-1997
- Laura Galluccio, Giacomo Morabito, Sergio Palazzo, Marco Pellegrini, M. Elena Renda, Paolo Santi:
Georoy: A location-aware enhancement to Viceroy peer-to-peer algorithm.
1998-2014
- Jianbin Wei, Cheng-Zhong Xu:
Consistent proportional delay differentiation: A fuzzy control approach.
2015-2032
- Ioannis Psaras, Vassilis Tsaoussidis:
Why TCP timers (still) don't work well.
2033-2048
- Chun-Chuan Yang, Chun-Shian Tsai, Junn-Yen Hu, Tzu-Chien Chuang:
On the design of mobility management scheme for 802.16-based network environment.
2049-2066
- Jeremie Leguay, Matthieu Latapy, Timur Friedman, Kavé Salamatian:
Describing and simulating internet routes.
2067-2085
- Michael Cho-Hoi Chek, Yu-Kwong Kwok:
Design and evaluation of practical coexistence management schemes for Bluetooth and IEEE 802.11b systems.
2086-2103
- S. S. Dhillon, Piet Van Mieghem:
Performance analysis of the AntNet algorithm.
2104-2125
- B. S. Manoj, Archana Sekhar, C. Siva Ram Murthy:
On the use of limited autonomous mobility for dynamic coverage maintenance in sensor networks.
2126-2143
- Glen MacLarty, Michael Fry:
Towards a platform for wide-area overlay network deployment and management.
2144-2162
- Srinivasan Ramasubramanian, Harish Krishnamoorthy, Marwan Krunz:
Disjoint multipath routing using colored trees.
2163-2180
- Coskun Cetinkaya:
Improving the efficiency of multipath traffic via opportunistic traffic scheduling.
2181-2197
- Dawn S. L. Dolcy, Costas C. Constantinou, Steven F. Quigley:
A Fokker-Planck equation method predicting Buffer occupancy in a single queue.
2198-2216
Volume 51,
Number 9,
June 2007
(1) Advances in Smart Cards
- Josep Domingo-Ferrer, Joachim Posegga, Francesc Sebé, Vicenç Torra:
Advances in smart cards.
2219-2222
- Bart Preneel:
A survey of recent developments in cryptographic algorithms for smart cards.
2223-2233
- HongQian Karen Lu:
Network smart card review and analysis.
2234-2248
- Joaquín Torres Márquez, Antonio Izquierdo, José María Sierra:
Advances in network smart cards authentication.
2249-2261
- Jorge Munilla, Alberto Peinado:
HB-MP: A further step in the HB-family of lightweight authentication protocols.
2262-2267
- Agusti Solanas, Josep Domingo-Ferrer, Antoni Martínez-Ballesté, Vanesa Daza:
A distributed architecture for scalable private RFID tag identification.
2268-2279
- Ting-Fang Cheng, Jung-San Lee, Chin-Chen Chang:
Security enhancement of an IC-card-based remote login mechanism.
2280-2287
- Andrés Marín López, Daniel Díaz Sánchez, Florina Almenárez Mendoza, Carlos García-Rubio, Celeste Campo:
Smart card-based agents for fair non-repudiation.
2288-2298
- Francesc Sebé, Alexandre Viejo, Josep Domingo-Ferrer:
Secure many-to-one symbol transmission for implementation on smart cards.
2299-2307
(2) Topics in Wireless Broadband Systems
- George T. Karetsos, Angelos N. Rouskas, Bijan Jabbari, Bernhard Walke:
Topics in wireless broadband systems.
2308-2310
- Claudio Cicconetti, Luciano Lenzini, Enzo Mingozzi, Giovanni Stea:
Design and performance analysis of the Real-Time HCCA scheduler for IEEE 802.11e WLANs.
2311-2325
- Xavier Pérez Costa, Daniel Camps-Mur, Albert Vidal:
On distributed power saving mechanisms of wireless LANs 802.11e U-APSD vs 802.11 power save mode.
2326-2344
- Dimitris Vassis, George Kormentzas:
Performance analysis of IEEE 802.11 ad hoc networks in the presence of hidden terminals.
2345-2352
- Sebastian Max, Guido R. Hiertz, Erik Weiss, Dee Denteneer, Bernhard Walke:
Spectrum sharing in IEEE 802.11s wireless mesh networks.
2353-2367
- Patrick Hosein:
QoS scheduling of uplink resources in OFDMA networks.
2368-2378
- Georgios Leoleis, Iakovos S. Venieris:
Fast MIPv6 extensions supporting seamless multicast handovers.
2379-2396
- Vasileios Karyotis, Symeon Papavassiliou:
Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework.
2397-2410
Volume 51,
Number 10,
July 2007
- Jelena V. Misic, Carol J. Fung:
The impact of master-slave bridge access mode on the performance of multi-cluster 802.15.4 network.
2411-2449
- Yigal Bejerano, Seung-Jae Han, Amit Kumar:
Efficient load-balancing routing for wireless mesh networks.
2450-2466
- Guoqiang Mao, Brian D. O. Anderson, Baris Fidan:
Path loss exponent estimation for wireless sensor network localization.
2467-2483
- Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Arno Bakker:
Design and implementation of a secure wide-area object middleware.
2484-2513
- Supeng Leng, Liren Zhang, Huirong Fu, Jianjun Yang:
Mobility analysis of mobile hosts with random walking in ad hoc networks.
2514-2528
- Guoqiang Mao, Baris Fidan, Brian D. O. Anderson:
Wireless sensor network localization techniques.
2529-2553
- Ning Lu, John Bigham:
On utility-fair bandwidth adaptation for multi-class traffic QoS provisioning in wireless networks.
2554-2564
- Birger Tödtmann, Erwin P. Rathgeb:
Anticipatory distributed packet filter configurations for carrier-grade IP networks.
2565-2579
- Dimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis, Tasos Dagiuklas, Stefanos Gritzalis:
A framework for protecting a SIP-based infrastructure against malformed message attacks.
2580-2593
- Vasudev Shah, Ece Gelal, Srikanth V. Krishnamurthy:
Handling asymmetry in power heterogeneous ad hoc networks.
2594-2615
- Zhenhai Duan, Yingfei Dong, Kartik Gopalan:
DMTP: Controlling spam through message delivery differentiation.
2616-2630
- Ibtissam El Khayat, Pierre Geurts, Guy Leduc:
Machine-learnt versus analytical models of TCP throughput.
2631-2644
- Nicola Blefari-Melazzi, Dario Di Sorte, Mauro Femminella, Gianluca Reali:
Autonomic control and personalization of a wireless access network.
2645-2676
- Andrey Belenky, Nirwan Ansari:
On deterministic packet marking.
2677-2700
- Baek-Young Choi, Sue B. Moon, Rene L. Cruz, Zhi-Li Zhang, Christophe Diot:
Quantile sampling for practical delay monitoring in Internet backbone networks.
2701-2716
- Aleksandar Kuzmanovic, Edward W. Knightly:
Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions.
2717-2737
- Marco Ajmone Marsan, Claudio Casetti, Gianluca Mardente, Marco Mellia:
A framework for admission control and path allocation in DiffServ networks.
2738-2752
- Kang-Won Lee, Suresh Chari, Anees Shaikh, Sambit Sahu, Pau-Chen Cheng:
Improving the resilience of content distribution networks to large scale distributed denial of service attacks.
2753-2770
- Sun-Myeng Kim, Young-Jong Cho:
Channel time allocation scheme based on feedback information in IEEE 802.11e wireless LANs.
2771-2787
- Yujie Zhu, Aravind Velayutham, Oyebamiji Oladeji, Raghupathy Sivakumar:
Enhancing TCP for networks with guaranteed bandwidth services.
2788-2804
- Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei:
Secure multicast in dynamic environments.
2805-2817
- Shudong Jin, Hongbo Jiang:
Novel approaches to efficient flooding search in peer-to-peer networks.
2818-2832
- Jocelyne Elias, Fabio Martignon, Antonio Capone, Guy Pujolle:
A new approach to dynamic bandwidth allocation in Quality of Service networks: Performance and bounds.
2833-2853
- Srinivasan Ramasubramanian, Mithun Harkara, Marwan Krunz:
Linear time distributed construction of colored trees for disjoint multipath routing.
2854-2866
- Xiaolan Zhang, Giovanni Neglia, James F. Kurose, Donald F. Towsley:
Performance modeling of epidemic routing.
2867-2891
- Pablo Vidales, Carlos Jesus Bernardos, Ignacio Soto, David N. Cottingham, Javier Baliosian, Jon Crowcroft:
MIPv6 experimental evaluation using overlay networks.
2892-2915
Volume 51,
Number 11,
August 2007
- Georgios Smaragdakis, Nikolaos Laoutaris, Azer Bestavros, Ibrahim Matta, Ioannis Stavrakakis:
Mistreatment-resilient distributed caching.
2917-2937
- Dah-Ming Chiu, Adrian Sai-Wah Tam:
Fairness of traffic controls for inelastic flows in the Internet.
2938-2957
- Eric W. M. Wong, Andrew Zalesky, Zvi Rosberg, Moshe Zukerman:
A new method for approximating blocking probability in overflow loss networks.
2958-2975
- Ashima Gupta, Prasant Mohapatra:
A survey on ultra wide band medium access control schemes.
2976-2993
- Mário Alves, Eduardo Tovar:
Real-time communications over wired/wireless PROFIBUS networks supporting inter-cell mobility.
2994-3012
- Mehmet S. Kuran, Tuna Tugcu:
A survey on emerging broadband wireless access technologies.
3013-3046
- Lixiang Xiong, Guoqiang Mao:
Saturated throughput analysis of IEEE 802.11e EDCA.
3047-3068
- Li Lao, Jun-Hong Cui, Mario Gerla:
Tackling group-to-tree matching in large scale group communications.
3069-3089
- Hualiang Chen, Zhongxin Liu, Zengqiang Chen, Zhuzhi Yuan:
Extending TCP congestion control to multicast.
3090-3109
- Timo Vanhatupa, Marko Hännikäinen, Timo D. Hämäläinen:
Evaluation of throughput estimation models and algorithms for WLAN frequency planning.
3110-3124
- Hanping Lufei, Weisong Shi:
Energy-aware QoS for application sessions across multiple protocol domains in mobile computing.
3125-3141
- Anelise Munaretto, Mauro Fonseca:
Routing and quality of service support for mobile ad hoc networks.
3142-3156
- Xiaolong Li, Aaron Striegel:
A case for Passive Application Layer Multicast.
3157-3171
- Gilberto Flores Lucio, Martin J. Reed, Ian D. Henning:
Guided local search as a network planning algorithm that incorporates uncertain traffic demands.
3172-3196
- H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Bettahar, Yacine Challal:
Key management for content access control in a hierarchy.
3197-3219
- Yuan-Cheng Lai:
Two schedulers to provide delay proportion and reduce queueing delay simultaneously.
3220-3231
- Sebastian Kiesel, Michael Scharf:
Modeling and performance evaluation of transport protocols for firewall control.
3232-3251
- Jelena V. Misic:
Algorithm for equalization of cluster lifetimes in a multi-level Beacon enabled 802.15.4 sensor network.
3252-3264
- Lin X. Cai, Xuemin Shen, Jon W. Mark, Lin Cai:
Capacity analysis and MAC enhancement for UWB broadband wireless access networks.
3265-3277
- Zhenjiang Li, J. J. Garcia-Luna-Aceves:
Loop-free constrained path computation for hop-by-hop QoS routing.
3278-3293
- Steven Shelford, Gholamali C. Shoja, Eric G. Manning:
Achieving optimal revenues in dynamically priced network services with QoS guarantees.
3294-3304
- Dusit Niyato, Ekram Hossain:
QoS-aware bandwidth allocation and admission control in IEEE 802.16 broadband wireless access networks: A non-cooperative game theoretic approach.
3305-3321
Volume 51,
Number 12,
August 2007
- Ahsan Habib, John Chuang:
Improving application QoS with residential multihoming.
3323-3337
- Soo Young Shin, Hong Seong Park, Wook Hyun Kwon:
Mutual interference analysis of IEEE 802.15.4 and IEEE 802.11b.
3338-3353
- Lih-Chyau Wuu, Tzong-Jye Liu, Kuo-Ming Chen:
A longest prefix first search tree for IP lookup.
3354-3367
- Jiann-Liang Chen, Ming-Chiao Chen, Yi-Ru Chian:
QoS management in heterogeneous home networks.
3368-3379
- Sumit Naiksatam, Stephen A. Chiappari, Silvia M. Figueira:
Efficient bandwidth utilization in LambdaGrids using pricing incentives.
3380-3391
- Vinay Sridhara, Stephan Bohacek:
Realistic propagation simulation of urban mesh networks.
3392-3412
- Luis López, Antonio Fernández, Vicent Cholvi:
A game theoretic comparison of TCP and digital fountain based protocols.
3413-3426
- Saravanan Balasubramanian, Demet Aksoy:
Adaptive energy-efficient registration and online scheduling for asymmetric wireless sensor networks.
3427-3447
- Animesh Patcha, Jung-Min Park:
An overview of anomaly detection techniques: Existing solutions and latest technological trends.
3448-3470
- Spyros Antonatos, Periklis Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis:
Defending against hitlist worms using network address space randomization.
3471-3490
- Stylianos Karapantazis, Fotini-Niovi Pavlidou:
Call admission control in multiservice high altitude platform (HAP) W-CDMA cellular systems.
3491-3506
- Grigorios Zachariadis, Javier A. Barria:
Demand management for telecommunications services.
3507-3524
- Ritesh Mukherjee, J. William Atwood:
Scalable solutions for secure group communications.
3525-3548
- Christos Bouras, Afrodite Sevasti:
An analytical QoS service model for delay-based differentiation.
3549-3563
- Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang:
A queueing analysis for the denial of service (DoS) attacks in computer networks.
3564-3573
- W.-Y. Tam, King-Shan Lui, Suleyman Uludag, Klara Nahrstedt:
Quality-of-Service routing with path information aggregation.
3574-3594
- Himabindu Pucha, Saumitra M. Das, Y. Charlie Hu:
The performance impact of traffic patterns on routing protocols in mobile ad hoc networks.
3595-3616
- Patrick P. Lam, Soung C. Liew, Jack Y. B. Lee:
Cellular universal IP for nested network mobility.
3617-3631
- Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Threshold cryptography in P2P and MANETs: The case of access control.
3632-3649
- Saralees Nadarajah, Samuel Kotz:
On the convolution of Pareto and gamma distributions.
3650-3654
- Do Young Eun, Xinbing Wang:
Performance analysis of TCP/AQM with generalized AIMD under intermediate buffer sizes.
3655-3671
Volume 51,
Number 13,
September 2007
- Abdullah Balamash, Marwan Krunz, Philippe Nain:
Performance analysis of a client-side caching/prefetching system for Web traffic.
3673-3692
- Saumitra M. Das, Himabindu Pucha, Y. Charlie Hu:
On the scalability of rendezvous-based location services for geographic wireless ad hoc routing.
3693-3714
- Mohamed G. Gouda, Alex X. Liu, Lok M. Leung, Mohamed A. Alam:
SPP: An anti-phishing single password protocol.
3715-3726
- Serdar Vural, Eylem Ekici:
Probability distribution of multi-hop-distance in one-dimensional sensor networks.
3727-3749
- Issa Khalil, Saurabh Bagchi, Ness B. Shroff:
LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks.
3750-3772
- Marios Lestas, Andreas Pitsillides, Petros A. Ioannou, George Hadjipollas:
Adaptive congestion protocol: A congestion control protocol with learning capability.
3773-3798
- Sakib A. Mondal, Faisal B. Luqman:
Improving TCP performance over wired-wireless networks.
3799-3811
- Baek-Young Choi, Sue B. Moon, Zhi-Li Zhang, Konstantina Papagiannaki, Christophe Diot:
Analysis of point-to-point packet delay in an operational network.
3812-3827
- Zhi Li, Lihua Yuan, Prasant Mohapatra, Chen-Nee Chuah:
On the analysis of overlay failure detection and recovery.
3828-3843
- Allen B. Downey:
TCP self-clocking and bandwidth sharing.
3844-3863
- Anat Bremler-Barr, Nir Halachmi, Hanoch Levy:
Protecting bursty applications against traffic aggressiveness.
3864-3877
- Nizar Bouabdallah, Harry G. Perros:
Cost-effective single-hub WDM ring networks: A proposal and analysis.
3878-3901
- Ignacio Más Ivars, Gunnar Karlsson:
Probe-based admission control for a differentiated-services internet.
3902-3918
- Yongxiang Zhao, Changjia Chen:
A redundant overbooking reservation algorithm for OBS/OPS networks.
3919-3934
- Animesh Patcha, Jung-Min Park:
Network anomaly detection with incomplete audit data.
3935-3955
Volume 51,
Number 14,
October 2007
- Qi He, Constantinos Dovrolis, Mostafa H. Ammar:
On the predictability of large transfer TCP throughput.
3959-3977
- Yang Yang, Feiyi Huang, Xiaohu Ge, Xiaodong Zhang, Xuanye Gu, Mohsen Guizani, Hsiao-Hwa Chen:
Double sense multiple access for wireless ad hoc networks.
3978-3988
- Luca Sanna Randaccio, Luigi Atzori:
Group multicast routing problem: A genetic algorithms based approach.
3989-4004
- Mahasweta Sarkar, Rene L. Cruz:
A MAC layer power management scheme for efficient energy delay tradeoff in a WLAN.
4005-4031
- Tomaso de Cola, Harald Ernst, Mario Marchese:
Performance analysis of CCSDS File Delivery Protocol and erasure coding techniques in deep space environments.
4032-4049
- Wenji Wu, Matt Crawford:
Interactivity vs. fairness in networked Linux systems.
4050-4069
- Chih-Yung Chang, Chao-Tsun Chang:
TARP: A traffic-aware restructuring protocol for Bluetooth radio networks.
4070-4091
- Mario Baldi, Guido Marchetto, Yoram Ofek:
A scalable solution for engineering streaming traffic in the future Internet.
4092-4111
- Ahmad Al Hanbali, Arzad Alam Kherani, Robin Groenevelt, Philippe Nain, Eitan Altman:
Impact of mobility on the performance of relaying in ad hoc networks - Extended version.
4112-4130
- Ta Nguyen Binh Duong, Suiping Zhou:
A two-phase approach to interactivity enhancement for large-scale distributed virtual environments.
4131-4152
- Mehmet Hadi Gunes, Sevcan Bilir, Kamil Saraç, Turgay Korkmaz:
A measurement study on overhead distribution of value-added internet services.
4153-4173
- Sagy Bar, Mira Gonen, Avishai Wool:
A geographic directed preferential internet topology model.
4174-4188
- Thierry Rakotoarivelo, Patrick Sénac, Aruna Seneviratne, Michel Diaz:
SPAD: A distributed middleware architecture for QoS enhanced alternate path discovery.
4189-4211
- Samphel Norden, Katherine Guo:
Support for resilient Peer-to-Peer gaming.
4212-4233
Volume 51,
Number 15,
October 2007
- Abhishek Kashyap, Kwangil Lee, Mehdi Kalantari, Samir Khuller, Mark A. Shayman:
Integrated topology control and routing in wireless optical mesh networks.
4237-4251
- Shigang Chen, Yibei Ling, Randy Chow, Ye Xia:
AID: A global anti-DoS service.
4252-4269
- Pablo Pavón-Mariño, Joan García-Haro, Andrzej Jajszczyk:
Parallel desynchronized block matching: A feasible scheduling algorithm for the input-buffered wavelength-routed switch.
4270-4283
- Vaishnavi Krishnamurthy, Michalis Faloutsos, Marek Chrobak, Jun-Hong Cui, Li Lao, Allon G. Percus:
Sampling large Internet topologies for simulation purposes.
4284-4302
- Weichao Wang, Tylor Stransky:
Stateless key distribution for secure intra and inter-group multicast in mobile wireless network.
4303-4321
- Wesam Lootah, William Enck, Patrick McDaniel:
TARP: Ticket-based address resolution protocol.
4322-4337
- Dongwook Lee, Gayathri Chandrasekaran, Mukundan Sridharan, Prasun Sinha:
Association management for data dissemination over wireless mesh networks.
4338-4355
- Evangelos Papapetrou, Stylianos Karapantazis, Fotini-Niovi Pavlidou:
Distributed on-demand routing for LEO satellite systems.
4356-4376
- Panagiotis Papadimitriou, Vassilis Tsaoussidis:
SSVP: A congestion control scheme for real-time video streaming.
4377-4395
- Dzmitry Kliazovich, Fabrizio Granelli, Mario Gerla:
Performance improvement in wireless networks using cross-layer ARQ.
4396-4411
- Roberto Cusani, Tiziano Inzerilli, Luca Valentini:
Network monitoring and performance evaluation in a 3.5G network.
4412-4420
- Kenneth J. Turner, Koon Leai Larry Tan:
A rigorous approach to orchestrating grid services.
4421-4441
- Hyuk Lim, Jennifer C. Hou:
Identifying lossy links in wired/wireless networks by exploiting sparse characteristics.
4442-4459
- Vicent Cholvi, Juan Echagüe:
Stability of FIFO networks under adversarial models: State of the art.
4460-4474
- Lijun Wang, Lin Cai, Xinzhi Liu, Xuemin Shen:
Stability and TCP-friendliness of AIMD/RED systems with feedback delays.
4475-4491
- Jordi Guitart, David Carrera, Vicenç Beltran, Jordi Torres, Eduard Ayguadé:
Designing an overload control strategy for secure e-commerce applications.
4492-4510
Volume 51,
Number 16,
November 2007
(1) Innovations in Web Communications Infrastructure
- Simon Courtenage, David Lewis, Thanassis Tiropanis:
Innovations in Web communications infrastructure.
4511-4513
- Elke Michlmayr, Arno Pany, Gerti Kappel:
Using taxonomies for content-based routing with ants.
4514-4528
- Juan Ignacio Vázquez, Diego López-de-Ipiña:
mRDP: An HTTP-based lightweight semantic discovery protocol.
4529-4542
- Tao Gu, Hung Keng Pung, Daqing Zhang:
Information retrieval in schema-based P2P systems using one-dimensional semantic space.
4543-4560
- Frank Zhigang Wang, Na Helian, Sining Wu, Yuhui Deng, Vineet R. Khare, Michael Parker:
GridJet: An underlying data-transporting protocol for accelerating Web communications.
4561-4573
- Dominik Benz, Karen H. L. Tso, Lars Schmidt-Thieme:
Supporting collaborative hierarchical classification: Bookmarks as an example.
4574-4585
- Trevor I. Fenner, Mark Levene, George Loizou, George Roussos:
A stochastic evolutionary growth model for social networks.
4586-4595
(2) Middleware Challenges for Next Generation Networks and Services
- George Kormentzas, Thomas Magedanz:
Middleware challenges for next generation networks and services.
4596-4598
- Pruet Boonma, Junichi Suzuki:
BiSNET: A biologically-inspired middleware architecture for self-managing wireless sensor networks.
4599-4616
- Yassine Hadjadj Aoul, Ahmed Mehaoua, Charalabos Skianis:
A fuzzy logic-based AQM for real-time traffic over internet.
4617-4633
- Jaakko Kangasharju, Tancred Lindholm, Sasu Tarkoma:
XML messaging for mobile devices: From requirements to implementation.
4634-4654
- Ivar Jørstad, Do Van Thanh:
Personalised ubiquitous file access with XML Web Services.
4655-4668
- Eugen Borcoci, Georgios Kormentzas, Abolghasem (Hamid) Asgari, Toufik Ahmed:
Service invocation admission control algorithm for multi-domain IP environments.
4669-4678
- Georgios V. Lioudakis, Eleftherios Koutsoloukas, Nikolaos L. Dellas, Nikolaos D. Tselikas, Sofia Kapellaki, George N. Prezerakos, Dimitra I. Kaklamani, Iakovos S. Venieris:
A middleware architecture for privacy protection.
4679-4696
- Muhammad Sher, Thomas Magedanz:
A vulnerabilities analysis and corresponding middleware security extensions for securing NGN applications.
4697-4709
Volume 51,
Number 17,
December 2007
- S. Jayashree, C. Siva Ram Murthy:
Towards estimating lifetime of ad hoc wireless networks.
4711-4726
- Alireza Nemaney Pour, Kazuya Kumekawa, Toshihiko Kato, Shuichi Itoh:
A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operation.
4727-4743
- Lisong Xu, Josh Helzer:
Media streaming via TFRC: An analytical study of the impact of TFRC on user-perceived media quality.
4744-4764
- Luiz Henrique A. Correia, Daniel F. Macedo, Aldri L. dos Santos, Antonio Alfredo Ferreira Loureiro, José Marcos S. Nogueira:
Transmission power control techniques for wireless sensor networks.
4765-4779
- Jianhong Xia, Lixin Gao, Teng Fei:
A measurement study of persistent forwarding loops on the Internet.
4780-4796
- Luciano Paschoal Gaspary, Marinho P. Barcellos, André Detsch, Rodolfo S. Antunes:
Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing.
4797-4815
- Dragos Ilie, Adrian Popescu:
Statistical models for Gnutella signaling traffic.
4816-4835
- Jian Chu, Chin-Tau Lea:
A restorable MPLS-based hose-model VPN network.
4836-4848
- Telemaco Melia, Antonio de la Oliva, Albert Vidal, Ignacio Soto, Daniel Corujo, Rui L. Aguiar:
Toward IP converged heterogeneous mobility: A network controlled approach.
4849-4866
- Minh Huynh, Prasant Mohapatra:
Metropolitan Ethernet Network: A move from LAN to MAN.
4867-4894
Volume 51,
Number 18,
December 2007
- Andreas Pitsillides, Christophoros Christophorou:
MBMS Handover control: A new approach for efficient handover in MBMS enabled 3G cellular networks.
4897-4918
- Yung Yi, Sanjay Shakkottai:
FluNet: A hybrid internet simulator for fast queue regimes.
4919-4937
- Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols:
Cryptographic techniques for mobile ad-hoc networks.
4938-4950
- Michael E. Kounavis, Alok Kumar, Raj Yavatkar, Harrick M. Vin:
Two stage packet classification using most specific filter matching and transport level sharing.
4951-4978
- Manos Dramitinos, George D. Stamoulis, Costas Courcoubetis:
An auction mechanism for allocating the bandwidth of networks to their users.
4979-4996
- Kuo-Feng Ssu, Chih-Hsun Chou, Wei-Tong Wang, Shin-Hung Chung:
Improving data transmission with helping nodes for geographical ad hoc routing.
4997-5010
- Shu Huang, Rudra Dutta:
Spare capacity provisioning for quasi-static traffic.
5011-5035
- Kejie Lu, Dapeng Wu, Jieyan Fan, Sinisa Todorovic, Antonio Nucci:
Robust and efficient detection of DDoS attacks for large-scale internet.
5036-5056
Copyright © Mon Mar 15 03:58:59 2010
by Michael Ley (ley@uni-trier.de)