


Остановите войну!
for scientists:


default search action
Computer Networks [and ISDN Systems], Volume 57
Volume 57, Number 1, January 2013
- Ian F. Akyildiz, Harry Rudin:
COMNET editorial for 2012. 1-2 - Christos Papathanasiou, Nikos Dimitriou
, Leandros Tassiulas:
Dynamic radio resource and interference management for MIMO-OFDMA mobile broadband wireless access systems. 3-16 - Long Long, Ahmed E. Kamal:
Protecting multicast services in optical internet backbones. 17-28 - Ahmad Sardouk, Majdi Mansouri
, Leïla Merghem-Boulahia, Dominique Gaïti, Rana Rahim-Amoud:
Crisis management using MAS-based wireless sensor networks. 29-45 - Dong Mei Shan, Kee Chaing Chua, Gurusamy Mohan
, Jian Qiu:
Partial spatial protection for provisioning differentiated reliability in FSTR-based Metro Ethernet networks. 46-60 - Seung Yeob Nam
, Seong Joon Kim, Sihyung Lee
, Hyong S. Kim:
Estimation of the available bandwidth ratio of a remote link or path segments. 61-77 - Kishore Angrishi:
An end-to-end stochastic network calculus with effective bandwidth and effective capacity. 78-84 - Beakcheol Jang, Jun Bum Lim, Mihail L. Sichitiu
:
An asynchronous scheduled MAC protocol for wireless sensor networks. 85-98 - Donghyeok An, Honguk Woo, Hyunsoo Yoon, Ikjun Yeom:
Enhanced cooperative communication MAC for mobile wireless networks. 99-116 - Mingwei Xu, Meijia Hou, Dan Wang, Jiahai Yang:
An efficient critical protection scheme for intra-domain routing using link characteristics. 117-133 - A. Mirsayar Barkoosaraei, A. Hamid Aghvami:
Dynamic partitioning of IP-based wireless access networks. 134-146 - Addisu Eshete, Yuming Jiang:
Generalizing the CHOKe flow protection. 147-161 - Anwesha Mukherjee
, Srimoyee Bhattacherjee, Sucheta Pal, Debashis De:
Femtocell based green power consumption methods for mobile network. 162-178 - Weiwei Fang, Xiangmin Liang, Shengxin Li, Luca Chiaraviglio
, Naixue Xiong:
VMPlanner: Optimizing virtual machine placement and traffic flow routing to reduce network power costs in cloud data centers. 179-196 - Hui Chen
, Yang Xiao
, Susan V. Vrbsky:
An update-based step-wise optimal cache replacement for wireless data access. 197-212 - Enrico Gregori, Luciano Lenzini, Chiara Orsini:
k-Dense communities in the Internet AS-level topology graph. 213-227 - Abderrahmen Mtibaa, Khaled A. Harras:
Fairness-related challenges in mobile opportunistic networking. 228-242 - Guang Yao, Jun Bi
, Peiyao Xiao:
VASE: Filtering IP spoofing traffic with agility. 243-257 - Pablo Serrano
, Paul Patras
, Andrea Mannocci
, Vincenzo Mancuso
, Albert Banchs:
Control theoretic optimization of 802.11 WLANs: Implementation and experimental evaluation. 258-272 - Fabio R. J. Vieira, José Ferreira de Rezende
, Valmir Carneiro Barbosa
, Serge Fdida:
Local heuristic for the refinement of multi-path routing in wireless mesh networks. 273-285 - Consolee Mbarushimana, Ali Shahrabi
, Tom Buggy:
A cross-layer TCP enhancement in QoS-aware mobile ad hoc networks. 286-301 - Julia Amador, Jesus R. Artalejo:
Modeling computer virus with the BSDE approach. 302-316 - Toktam Mahmoodi
, Vasilis Friderikos
, Hamid Aghvami:
Using traffic asymmetry to enhance TCP performance. 317-329 - Devrim Unal
, Mehmet Ufuk Çaglayan
:
A formal role-based access control model for security policies in multi-domain mobile networks. 330-350 - Lin Cui, Weijia Jia
:
Cyclic stable matching for three-sided networking services. 351-363 - Berk Canberk
:
An adaptive and QoS-based spectrum awareness framework for CR networks. 364-373
Volume 57, Number 2, February 2013
- Ronaldo M. Salles, Guofei Gu, Morton Swimmer:
Editorial for Computer Networks special issue on ''Botnet Activity: Analysis, Detection and Shutdown''. 375-377 - Sérgio S. C. Silva, Rodrigo M. P. Silva, Raquel Coelho Gomes Pinto, Ronaldo M. Salles:
Botnets: A survey. 378-403 - Masood Khosroshahy, Mustafa K. Mehmet Ali, Dongyu Qiu:
The SIC botnet lifecycle model: A step beyond traditional epidemiological models. 404-421 - Marco Riccardi, Roberto Di Pietro
, Marta Palanques, Jorge Aguila Vila:
Titans' revenge: Detecting Zeus via its own flaws. 422-435 - Aditya K. Sood, Richard J. Enbody, Rohit Bansal:
Dissecting SpyEye - Understanding the design of third generation botnets. 436-450 - Juan Caballero, Dawn Song:
Automatic protocol reverse-engineering: Message format extraction and field semantics inference. 451-474 - Christian J. Dietrich, Christian Rossow, Norbert Pohlmann:
CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis. 475-486 - Roberto Perdisci, Davide Ariu
, Giorgio Giacinto
:
Scalable fine-grained behavioral clustering of HTTP-based malware. 487-500 - Hui-Tang Lin, Ying-You Lin, Jui-Wei Chiang:
Genetic-based real-time fast-flux service networks detection. 501-513 - Chun-Ying Huang
:
Effective bot host detection based on network failure models. 514-525 - Pedro Henrique B. Las-Casas, Dorgival O. Guedes
, Jussara M. Almeida, Artur Ziviani
, Humberto T. Marques Neto
:
SpaDeS: Detecting spammers at the source network. 526-539 - Guanhua Yan:
Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks. 540-555 - Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu:
Design and analysis of a social botnet. 556-578 - Jingyu Hua, Kouichi Sakurai:
Botnet command and control based on Short Message Service and human mobility. 579-597
Volume 57, Number 3, February 2013
- Antonio de la Oliva
, Tito R. Vargas Hernández
, Juan Carlos Guerri
, José Alberto Hernández
, Pedro Reviriego:
Performance analysis of Energy Efficient Ethernet on video streaming servers. 599-608 - Evan Tan, Chun Tung Chou
:
Joint optimization of continuity and quality for streaming video. 609-621 - Chong Han, Josep Miquel Jornet
, Etimad A. Fadel
, Ian F. Akyildiz:
A cross-layer communication module for the Internet of Things. 622-633 - Zi Chu, Steven Gianvecchio, Aaron Koehl, Haining Wang, Sushil Jajodia
:
Blog or block: Detecting blog bots through behavioral biometrics. 634-646 - Kush Kothari, Matthew K. Wright
:
Mimic: An active covert channel that evades regularity-based detection. 647-657 - Noriaki Kamiyama:
Designing data center network by analytic hierarchy process. 658-667 - Yu Wang, Hari Krishna Garg, Mehul Motani
:
Downlink scheduling for user equipment served by multiple mobile terminals in cellular systems. 668-681 - Tudor Dumitras, Priya Narasimhan:
A study of unpredictability in fault-tolerant middleware. 682-698 - Vincent Lucas, Jean-Jacques Pansiot
, Dominique Grad, Benoît Hilt:
Robust and fair Multicast Congestion Control (M2C). 699-724 - Joo-Young Baek, Jeong-Yoon Lee, Young-Joo Suh:
An elastic compensation model for frame-based scheduling algorithms in wireless networks. 725-740 - Noriaki Kamiyama, Tatsuya Mori
, Ryoichi Kawahara:
Autonomic load balancing of flow monitors. 741-761 - Faqir Zarrar Yousaf, Christian Wietfeld
:
Optimizing throughput performance of FMIPv6 over legacy 802.11 networks using iterative scanning. 762-781 - Yi-Mao Hsiao, Yuan-Sun Chu, Jeng-Farn Lee, Jinn-Shyan Wang:
A high-throughput and high-capacity IPv6 routing lookup system. 782-794 - Emiliano Casalicchio, Luca Silvestri:
Mechanisms for SLA provisioning in cloud-based service providers. 795-810 - Aruna Jamdagni, Zhiyuan Tan
, Xiangjian He
, Priyadarsi Nanda, Ren Ping Liu
:
RePIDS: A multi tier Real-time Payload-based Intrusion Detection System. 811-824 - Reduan H. Khan, Jamil Y. Khan
:
A comprehensive review of the application characteristics and traffic requirements of a smart grid communications network. 825-845
Volume 57, Number 4, March 2013
- Ren-Huang Liou, Yi-Bing Lin:
Mobility management with the central-based location area policy. 847-857 - Wei-Tong Wang, Kuo-Feng Ssu:
Obstacle detection and estimation in wireless sensor networks. 858-868 - Zhen Ling, Junzhou Luo, Wei Yu
, Xinwen Fu, Weijia Jia
, Wei Zhao
:
Protocol-level attacks against Tor. 869-886 - Jiunn-Jye Lee, Hann-Huei Chiou, Chia-Chang Hsu, Chin-Laung Lei:
An adaptive sector-based routing model over structured peer-to-peer networks. 887-896 - Juhoon Kim, Luigi Iannone, Anja Feldmann:
Caching Locator/ID mappings: An experimental scalability analysis and its implications. 897-909 - Kaikai Chi, Xiaohong Jiang, Yi-hua Zhu, Jing Wang, Yanjun Li:
Block-level packet recovery with network coding for wireless reliable multicast. 910-923 - Mohamed Diallo, Vasilis Sourlas
, Paris Flegkas, Serge Fdida, Leandros Tassiulas:
A content-based publish/subscribe framework for large-scale content delivery. 924-943 - Xiuzhong Chen, Marc De Leenheer, Rui Wang, Chaitanya S. K. Vadrevu, Lei Shi, Jie Zhang, Biswanath Mukherjee:
High-performance routing for hose-based VPNs in multi-domain backbone networks. 944-953 - José M. Camacho, Alberto García-Martínez
, Marcelo Bagnulo
, Francisco Valera
:
BGP-XM: BGP eXtended Multipath for transit Autonomous Systems. 954-975 - Stefano Secci
, Kunpeng Liu, Bijan Jabbari:
Efficient inter-domain traffic engineering with transit-edge hierarchical routing. 976-989 - Yuting Miao, Qiang Yang, Chunming Wu, Ming Jiang, Jinzhou Chen:
Multicast virtual network mapping for supporting multiple description coding-based video applications. 990-1002 - Rachid El Azouzi
, Francesco De Pellegrini, Habib B. A. Sidi, Vijay Kamble:
Evolutionary forwarding games in delay tolerant networks: Equilibria, mechanism design and stochastic approximation. 1003-1018 - Alex Borges Vieira, Rafael Barra de Almeida, Jussara Marques de Almeida, Sérgio Vale Aguiar Campos:
SimplyRep: A simple and effective reputation system to fight pollution in P2P live streaming. 1019-1036 - Xiaoyuan Luo, Yanlin Yan, Shaobao Li, Xinping Guan:
Topology control based on optimally rigid graph in wireless sensor networks. 1037-1047 - Sungoh Kwon
, Neung-Hyung Lee:
Cell ID extension in femtocell environments. 1048-1062
Volume 57, Number 5, April 2013
- Feng Shan, Weifa Liang
, Jun Luo, Xiaojun Shen:
Network lifetime maximization for time-sensitive data gathering in wireless sensor networks. 1063-1077 - Christian Bauer:
A Secure Correspondent Router Protocol for NEMO Route Optimization. 1078-1100 - Mehmet Yunus Donmez, Sinan Isik, Cem Ersoy
:
Combined analysis of contention window size and duty cycle for throughput and energy optimization in wireless sensor networks. 1101-1112 - Mohammad A. Raayatpanah
, H. Salehi Fathabadi
, Babak H. Khalaj, Salman Khodayifar:
Minimum cost multiple multicast network coding with quantized rates. 1113-1123 - Efe Karasabun, Ibrahim Korpeoglu, Cevdet Aykanat:
Active node determination for correlated data gathering in wireless sensor networks. 1124-1138 - Donggyu Yun, Jungseul Ok, Bongjhin Shin, Soobum Park, Yung Yi:
Embedding of virtual network requests over static wireless multihop networks. 1139-1152 - Ji-Hoon Yun:
Performance analysis of IEEE 802.11 WLANs with rate adaptation in time-varying fading channels. 1153-1166 - Pavlos Antoniou, Andreas Pitsillides, Tim Blackwell, Andries P. Engelbrecht
, Loizos Michael:
Congestion control in wireless sensor networks based on bird flocking behavior. 1167-1191 - Necati Kilic, Vehbi Cagri Gungor:
Analysis of low power wireless links in smart grid environments. 1192-1203 - Gregory Detal, Christoph Paasch, Simon van der Linden, Pascal Mérindol, Gildas Avoine, Olivier Bonaventure:
Revisiting flow-based load balancing: Stateless path selection in data center networks. 1204-1216 - Slavisa Aleksic
, Margot Deruyck, Willem Vereecken, Wout Joseph, Mario Pickavet
, Luc Martens:
Energy efficiency of femtocell deployment in combined wireless/optical access networks. 1217-1233 - Peristera A. Baziana, Ioannis E. Pountourakis:
An access protocol for efficiency optimization in WDM networks: A propagation delay and collisions avoidance analysis. 1234-1252 - Lucia D'Acunto
, Nitin Chiluka, Tamás Vinkó
, Henk J. Sips:
BitTorrent-like P2P approaches for VoD: A comparative study. 1253-1276 - Daniele Casagrande
, Pier Luca Montessoro, Franco Blanchini
:
Fair and optimal dynamic admission control of elastic flows. 1277-1288 - Saeed Salah
, Gabriel Maciá-Fernández
, Jesús Esteban Díaz Verdejo:
A model-based survey of alert correlation techniques. 1289-1317 - Christian Esposito
, Domenico Cotroneo, Stefano Russo
:
On reliability in publish/subscribe services. 1318-1343 - Wenye Wang
, Zhuo Lu:
Cyber security in the Smart Grid: Survey and challenges. 1344-1371
Volume 57, Number 6, April 2013
- Márton Csernai, András Gulyás, Attila Korösi, Balázs Sonkoly
, Gergely Biczók
:
Incrementally upgradable data center architecture using hyperbolic tessellations. 1373-1393 - Christos Anagnostopoulos
, Stathes Hadjiefthymiades
:
Multivariate context collection in mobile sensor networks. 1394-1407 - Kai-Wei Ke, Chia-Hui Huang:
Performance evaluation of multisource Application Layer Multicast (ALM): Theoretical and simulative aspects. 1408-1424 - Urs Hunkeler, Clemens Lombriser, Hong Linh Truong, Beat Weiss
:
A case for centrally controlled wireless sensor networks. 1425-1442 - Conrado Borraz-Sánchez, Diego Klabjan:
Optimal placement of reconfigurable optical add/drop multiplexers with packing, blocking, and signal loss. 1443-1458 - Adel Ali Ahmed
:
An enhanced real-time routing protocol with load distribution for mobile wireless sensor networks. 1459-1473 - Linjun Fan, Yunxiang Ling, Tao Wang, Xiaomin Zhu, Xiaoyong Tang:
Novel clock synchronization algorithm of parametric difference for parallel and distributed simulations. 1474-1487 - Youghourta Benfattoum, Steven Martin, Khaldoun Al Agha:
QoS for real-time reliable multicasting in wireless multi-hop networks using a Generation-Based Network Coding. 1488-1502 - Edoardo Amaldi, Antonio Capone
, Luca Giovanni Gianoli:
Energy-aware IP traffic engineering with shortest path routing. 1503-1517 - Rajarshi Mahapatra
, Antonio De Domenico, Rohit Gupta, Emilio Calvanese Strinati:
Green framework for future heterogeneous wireless networks. 1518-1528 - Xiaoping Wang, Yunhao Liu, Zheng Yang, Kai Lu, Jun Luo:
OFA: An optimistic approach to conquer flip ambiguity in network localization. 1529-1544 - S. Chiappetta, Claudio Mazzariello, Roberta Presta
, Simon Pietro Romano
:
An anomaly-based approach to the analysis of the social behavior of VoIP users. 1545-1559 - Ryoichi Kawahara, Tetsuya Takine, Tatsuya Mori
, Noriaki Kamiyama, Keisuke Ishibashi:
Mean-variance relationship of the number of flows in traffic aggregation and its application to traffic management. 1560-1576
Volume 57, Number 7, May 2013
- S. H. Shah Newaz, Ángel Cuevas
, Gyu Myoung Lee, Noël Crespi, Jun Kyun Choi:
Adaptive Delay-Aware Energy Efficient TDM-PON. 1577-1596 - Christian Facchini, Oliver Holland, Fabrizio Granelli
, Nelson L. S. da Fonseca
, Hamid Aghvami:
Dynamic green self-configuration of 3G base stations using fuzzy cognitive maps. 1597-1610 - Weibo Chu, Xiaohong Guan, Zhongmin Cai, Lixin Gao:
Real-time volume control for interactive network traffic replay. 1611-1629 - Tobias Jung, Sylvain Martin, Mohamed Nassar
, Damien Ernst, Guy Leduc:
Outbound SPIT filter with optimal performance guarantees. 1630-1643 - Jongwook Lee, Jin-Ghoo Choi, Saewoong Bahk:
Opportunistic downlink data delivery for mobile collaborative communities. 1644-1655 - T. D. Lagkas
, Panagiotis G. Sarigiannidis
, Malamati D. Louta:
On analyzing the intra-frame power saving potentials of the IEEE 802.16e downlink vertical mapping. 1656-1673 - Weijie Wu, John C. S. Lui, Richard T. B. Ma
:
On incentivizing upload capacity in P2P-VoD systems: Design, analysis and evaluation. 1674-1688 - Wei Kuang Lai, Chang-Lung Tang:
QoS-aware downlink packet scheduling for LTE networks. 1689-1698 - Cristina Rottondi
, Giacomo Verticale
, Antonio Capone
:
Privacy-preserving smart metering with multiple data Consumers. 1699-1713 - Javad Akbari Torkestani:
An energy-efficient topology construction algorithm for wireless sensor networks. 1714-1725 - Ahmad Vakili, Jean-Charles Grégoire:
QoE management for video conferencing applications. 1726-1738
Volume 57, Number 8, June 2013
- Stamatios Arkoulis, Evangelos Anifantis, Vasileios Karyotis
, Symeon Papavassiliou, Nikolas Mitrou:
On the optimal, fair and channel-aware cognitive radio network reconfiguration. 1739-1757 - László Gyarmati, András Gulyás, Balázs Sonkoly
, Tuan Anh Trinh, Gergely Biczók
:
Free-scaling your data center. 1758-1773 - Gongqi Lin, Sieteng Soh
, Kwan-Wu Chin
, Mihai M. Lazarescu
:
Efficient heuristics for energy-aware routing in networks with bundled links. 1774-1788 - Giacomo Bacci
, Marco Luise:
QoS-aware game-theoretic rate & power control for CDMA wireless communication networks. 1789-1804 - Shengbo Yang, Chai Kiat Yeo
, Bu-Sung Lee
:
MaxCD: Efficient multi-flow scheduling and cooperative downloading for improved highway drive-thru Internet systems. 1805-1820 - Michele Rondinone, Javier Gozálvez
:
Contention-based forwarding with multi-hop connectivity awareness in vehicular ad-hoc networks. 1821-1837 - Giovanna Carofiglio, Luca Muscariello, Dario Rossi, Claudio Testa, Silvio Valenti:
Rethinking the Low Extra Delay Background Transport (LEDBAT) Protocol. 1838-1852 - Zoltán Czirkos, Gábor Hosszú
:
Solution for the broadcasting in the Kademlia peer-to-peer overlay. 1853-1862 - Stefano Iellamo, Lin Chen, Marceau Coupechoux:
Proportional and double imitation rules for spectrum access in cognitive radio networks. 1863-1879 - Alexandre Andrade Pires, José Ferreira de Rezende
:
Independent links: A new approach to increase spatial reuse in wireless networks. 1880-1893
Volume 57, Number 9, June 2013
- Xi Fang, Dejun Yang
, Guoliang Xue:
Pathbook: Cross-layer optimization for full-duplex wireless networks. 1895-1912 - Habib M. Ammari:
On the energy-delay trade-off in geographic forwarding in always-on wireless sensor networks: A multi-objective optimization problem. 1913-1935