default search action
Computer Communications, Volume 34
Volume 34, Number 1, January 2011
- Marco Conti:
Editorial. 1
- Subharthi Paul, Jianli Pan, Raj Jain:
Architectures for the future networks and the next generation Internet: A survey. 2-42 - Balachander Krishnamurthy, Walter Willinger, Phillipa Gill, Martin F. Arlitt:
A Socratic method for validation of measurement-based networking research. 43-53
- Shiao-Li Tsao, Chung-Huei Huang:
A survey of energy efficient MAC protocols for IEEE 802.11 WLAN. 54-67
- Enrico Gregori, Alessandro Improta, Luciano Lenzini, Chiara Orsini:
The impact of IXPs on the AS-level topology structure of the Internet. 68-82 - Andreas Konstantinidis, Kun Yang:
Multi-objective K-connected Deployment and Power Assignment in WSNs using a problem-specific constrained evolutionary algorithm based on decomposition. 83-98 - Hyun-Woo Kim, Jun-Hui Lee, Yong-Hoon Choi, Young-uk Chung, Hyukjoon Lee:
Dynamic bandwidth provisioning using ARIMA-based traffic forecasting for Mobile WiMAX. 99-106 - Ming-Yang Su:
Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. 107-117
Volume 34, Number 2, February 2011
- Chung-Ming Huang, Isaac Woungang, Ming-Chiao Chen:
Open network service technologies and applications. 119
- Chi-Chun Lo, Ting-Huan Kuo, Hsu-Yang Kung, Hsiang-Ting Kao, Chi-Hua Chen, Che-I Wu, Ding-Yuan Cheng:
Mobile merchandise evaluation service using novel information retrieval and image recognition technology. 120-128 - Carlos Serrão, Eva Rodríguez, Jaime Delgado:
Approaching the rights management interoperability problem using intelligent brokerage mechanisms. 129-139 - Keith Griffin, Colin Flanagan:
Defining a call control interface for browser-based integrations using representational state transfer. 140-149 - Jinsuk Baek, Jan Fischer, Hsiao-Hwa Chen, Minho Jo:
On a moving direction pattern based MAP selection model for HMIPv6 networks. 150-158 - Eduardo Goncalves da Silva, Luís Ferreira Pires, Marten van Sinderen:
Towards runtime discovery, selection and composition of semantic services. 159-168 - Ming-Chiao Chen, Jiann-Liang Chen, Teng-Wen Chang:
Android/OSGi-based vehicular network management system. 169-183 - Chin-Feng Lai, Yi-Wei Ma, Sung-Yen Chang, Han-Chieh Chao, Yueh-Min Huang:
OSGi-based services architecture for Cyber-Physical Home Control Systems. 184-191 - Huaming Guo, Wei Su, Hongke Zhang, Sy-Yen Kuo:
On the convergence condition and convergence time of BGP. 192-199 - Yaxuan Qi, Fei He, Xiang Wang, Xinming Chen, Yibo Xue, Jun Li:
OpenGate: Towards an open network services gateway. 200-208 - Juan C. Yelmo, José M. del Álamo, Rubén Trapero, Yod Samuel Martín:
A user-centric approach to service creation and delivery over next generation networks. 209-222
Volume 34, Number 3, March 2011
- Jong Hyuk Park, Sheikh Iqbal Ahamed, Willy Susilo, Michela Taufer:
Special issue of computer communications on information and future communication security. 223-225
- Georgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis, Jong Hyuk Park:
DoS attacks exploiting signaling in UMTS and IMS. 226-235 - Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Han-Chieh Chao:
An RFID secure authentication mechanism in WLAN. 236-240 - Yufeng Wang, Akihiro Nakao, Athanasios V. Vasilakos, Jianhua Ma:
P2P soft security: On evolutionary dynamics of P2P incentive mechanism. 241-249 - Yu-Yi Chen, Meng-Lin Tsai, Jinn-ke Jan:
The design of RFID access control protocol using the strategy of indefinite-index and challenge-response. 250-256 - Ying Sun, Chunxiang Xu, Yong Yu, Bo Yang:
Improvement of a proxy multi-signature scheme without random oracles. 257-263 - Qixu Liu, Yuqing Zhang:
VRSS: A new system for rating and scoring vulnerabilities. 264-273 - Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei:
Robust authentication and key agreement scheme preserving the privacy of secret key. 274-280 - Sudip Misra, Ankur Vaish:
Reputation-based role assignment for role-based access control in wireless sensor networks. 281-294 - Jong Sik Moon, Im-Yeong Lee:
An AAA scheme using ID-based ticket with anonymity in future mobile communication. 295-304 - Muhammad Khurram Khan, Soo-Kyun Kim, Khaled Alghathbar:
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'. 305-309 - Bo-Chao Cheng, Ryh-Yuh Tseng:
A Context Adaptive Intrusion Detection System for MANET. 310-318 - Jing Xu, Wen Tao Zhu, Dengguo Feng:
An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. 319-325 - Binod Vaidya, Jong Hyuk Park, Sang-Soo Yeo, Joel J. P. C. Rodrigues:
Robust one-time password authentication scheme using smart card for home network environment. 326-336 - Tzu-Chang Yeh, Chien-Hung Wu, Yuh-Min Tseng:
Improvement of the RFID authentication scheme based on quadratic residues. 337-341 - The Anh Pham:
The improvement of the knapsack cipher. 342-343 - Zhengping Jin, Qiaoyan Wen:
Certificateless multi-proxy signature. 344-352 - Taek-Young Youn, Changhoon Lee, Young-Ho Park:
An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes. 353-357 - Jia Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu:
Anonymity analysis of P2P anonymous communication systems. 358-366 - Daojing He, Maode Ma, Yan Zhang, Chun Chen, Jiajun Bu:
A strong user authentication scheme with smart cards for wireless communications. 367-374 - Jian Wang, Yanheng Liu, Yu Jiao:
Novel access and remediation scheme in hierarchical trusted network. 375-383 - Dang Nguyen Duc, Kwangjo Kim:
Defending RFID authentication protocols against DoS attacks. 384-390 - Jung-Sik Cho, Sang-Soo Yeo, Sung Kwon Kim:
Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value. 391-397 - Mieso K. Denko, Tao Sun, Isaac Woungang:
Trust management in ubiquitous computing: A Bayesian approach. 398-406 - Dwaine E. Clarke:
Design and implementation of a public key-based group collaboration system. 407-422 - Longjiang Li, Yuming Mao, Supeng Leng:
Privacy addressing and autoconfiguration for mobile ad hoc networks. 423-428 - Liang Zhou, Athanasios V. Vasilakos, Naixue Xiong, Yan Zhang, Shiguo Lian:
Scheduling security-critical multimedia applications in heterogeneous networks. 429-435 - Qi Zhang, Yi Mu, Minjie Zhang:
Attribute-based authentication for multi-agent systems with dynamic groups. 436-446 - Lo-Yao Yeh, Yen-Cheng Chen, Jiun-Long Huang:
PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. 447-456 - Lars Völker, Marcel Noe, Oliver P. Waldhorst, Christoph Werle, Christoph Sorge:
Can internet users protect themselves? Challenges and techniques of automated protection of HTTP communication. 457-467 - Zubair A. Baig:
Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks. 468-484 - Leonardo B. Oliveira, Diego F. Aranha, Conrado Porto Lopes Gouvêa, Michael Scott, Danilo F. Câmara, Julio César López-Hernández, Ricardo Dahab:
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks. 485-493 - Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Hua Ma:
Provably secure multi-proxy signature scheme with revocation in the standard model. 494-501 - Wei Lu, Goaletsa Rammidi, Ali A. Ghorbani:
Clustering botnet communication traffic based on n-gram feature selection. 502-514 - Roberto Di Pietro, Alexandre Viejo:
Location privacy and resilience in wireless sensor networks querying. 515-523
Volume 34, Number 4, April 2011
- Yang Xiang, Wanlei Zhou:
Special issue: Building secure parallel and distributed networks and systems. 525
- Xiaoxun Sun, Lili Sun, Hua Wang:
Extended k-anonymity models against sensitive attribute disclosure. 526-535 - Yu Zhang, Binxing Fang, Yongzheng Zhang:
Parallelizing weighted frequency counting in high-speed network monitoring. 536-547 - Nikhil Saxena, Mieso K. Denko, Dilip K. Banerji:
A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks. 548-555 - Boyeon Song, Chris J. Mitchell:
Scalable RFID security protocols supporting tag ownership transfer. 556-566 - Mihui Kim, Peng Ning:
SeCA: A framework for Secure Channel Assignment in wireless mesh networks. 567-576 - Zi Chu, Haining Wang:
An investigation of hotlinking and its countermeasures. 577-590 - Hongjuan Li, Kai Lin, Keqiu Li:
Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. 591-597 - Tilman Wolf, Russell Tessier, Gayatri Prabhu:
Securing the data path of next-generation router systems. 598-606
Volume 34, Number 5, April 2011
- Matthieu Latapy:
Complex networks. 607-608
- Adrien Friggeri, Guillaume Chelius, Eric Fleury, Antoine Fraboulet, France Mentré, Jean-Christophe Lucet:
Reconstructing social interactions using an unreliable wireless sensor network. 609-618 - Anne-Marie Kermarrec, Erwan Le Merrer, Bruno Sericola, Gilles Trédan:
Second order centrality: Distributed assessment of nodes criticity in complex networks. 619-628 - Belkacem Serrour, Alex Arenas, Sergio Gómez:
Detecting communities of triangles in complex networks using spectral optimization. 629-634 - Christophe Crespelle, Fabien Tarissan:
Evaluation of a new method for measuring the internet degree distribution: Simulation results. 635-648 - Guoqiang Zhang, Bruno Quoitin, Shi Zhou:
Phase changes in the evolution of the IPv4 and IPv6 AS-Level Internet topologies. 649-657 - M. Engin Tozal, Kamil Saraç:
Palmtree: An IP alias resolution algorithm with linear probing complexity. 658-669 - Frédéric Ouédraogo, Clémence Magnien:
Impact of sources and destinations on the observed properties of the internet topology. 670-679
Volume 34, Number 6, May 2011
- Vinicius C. M. Borges, Marília Curado, Edmundo Monteiro:
Cross-layer routing metrics for mesh networks: Current status and research directions. 681-703 - Nils Aschenbruck, Aarti Munjal, Tracy Camp:
Trace-based mobility modeling for multi-hop wireless networks. 704-714
- Gang Chen, Zujie Ren, Lidan Shou, Ke Chen, Yijun Bei:
PISA: A framework for integrating uncooperative peers into P2P-based federated search. 715-729 - Jiyong Park, Daedong Park, Seongsoo Hong, Jungkeun Park:
Preventing TCP performance interference on asymmetric links using ACKs-first variable-size queuing. 730-742 - Natalija Vlajic, Dusan Stevanovic, George Spanogiannopoulos:
Strategies for improving performance of IEEE 802.15.4/ZigBee WSNs with path-constrained mobile sink(s). 743-757 - Chirag K. Rupani, Trilok Chand Aseri:
An improved transport layer protocol for wireless sensor networks. 758-764 - Siyu Tang, Eva Jaho, Ioannis Stavrakakis, Ioannis Z. Koukoutsidis, Piet Van Mieghem:
Modeling gossip-based content dissemination and search in distributed networking. 765-779 - Yang-Ick Joo, Kyeong Hur:
A distributed-request-based CDMA CAC for DiffServ multimedia services in wireless cellular mobile networks. 780-792 - Guiyi Wei, Yun Ling, Binfeng Guo, Bin Xiao, Athanasios V. Vasilakos:
Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter. 793-802
Volume 34, Number 7, May 2011
- Theodoros Anagnostopoulos, Christos Anagnostopoulos, Stathes Hadjiefthymiades:
An adaptive location prediction model based on fuzzy control. 816-834 - Mehdi Ghatee:
QoS-based cooperative algorithm for integral multi-commodity flow problem. 835-846 - Rosario Giuseppe Garroppo, Stefano Giordano, Davide Iacono, Luca Tavanti:
Experimental and simulation analysis of a WiMAX system in an emergency marine scenario. 847-861 - Ming Xu, Shuigeng Zhou, Jihong Guan:
A new and effective hierarchical overlay structure for Peer-to-Peer networks. 862-874 - Yawen Chen, Hong Shen, Haibo Zhang:
Routing and wavelength assignment for hypercube communications embedded on optical chordal ring networks of degrees 3 and 4. 875-882 - Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori, Shigeaki Harada, Haruhisa Hasegawa:
Optimally designing caches to reduce P2P traffic. 883-897 - Ralph Kühne, George B. Huitema, Georg Carle:
A simple distributed mechanism for accounting system self-configuration in next-generation charging and billing. 898-920
Volume 34, Number 8, June 2011
- Prasant Mohapatra, Jörg Ott:
Special section on wireless mobile and multimedia networks. 921 - Paola Cappanera, Luciano Lenzini, Alessandro Lori, Giovanni Stea, Gigliola Vaglini:
Efficient link scheduling for online admission control of real-time traffic in wireless mesh networks. 922-934 - Marwan Krunz, David Manzi:
Channel access and traffic control for dynamic-spectrum networks with single-transmit, dual-receive radios. 935-947 - Emilio Ancillotti, Raffaele Bruno, Marco Conti, Antonio Pinizzotto:
Load-aware routing in mesh networks: Models, algorithms and experimentation. 948-961 - Yesid Jarma, Golnaz Karbaschi, Marcelo Dias de Amorim, Farid Benbadis, Guillaume Chelius:
Volume-aware positioning in the context of a marine port terminal. 962-972 - James Gross, Michael Reyer:
Performance prediction for OFDMA systems with dynamic power and subcarrier allocation. 973-984
- Johann Márquez-Barja, Carlos Miguel Tavares Calafate, Juan-Carlos Cano, Pietro Manzoni:
An overview of vertical handover techniques: Algorithms, protocols and tools. 985-997
- Jaehun Lee, Wooyong Chung, Euntai Kim:
A new range-free localization method using quadratic programming. 998-1010 - Kerim Fouli, Lawrence R. Chen, Martin Maier:
Time-, wavelength-, and code-domain optical reflection monitoring for next-generation access-metro networks. 1011-1021 - Farhad Faghani, Ghasem Mirjalily:
Shortcut Switching Strategy in Metro Ethernet networks. 1022-1032 - Jae Hoon Ko, Soonmok Kwon, Cheeha Kim:
Orthogonal signaling-based queue status investigation method in IEEE 802.11. 1033-1041
Volume 34, Number 9, June 2011
- Periklis Chatzimisios, Ibrahim Habib, Paolo Bellavista, Alexey V. Vinel:
Guest editorial for the special issue on "Next generation networks service management". 1043-1044
- Georgios Tsiropoulos, Dimitrios Stratogiannis, John D. Kanellopoulos, Panayotis G. Cottis:
Probabilistic framework and performance evaluation for prioritized call admission control in next generation networks. 1045-1054 - Upendra Rathnayake, Mohsin Iftikhar, Maximilian Ott, Aruna Seneviratne:
Realistic data transfer scheduling with uncertainty. 1055-1065 - Kandaraj Piamrat, Adlen Ksentini, Jean-Marie Bonnin, César Viho:
Radio resource management in emerging heterogeneous wireless networks. 1066-1076 - Nikolaos Psimogiannos, Aggeliki Sgora, Dimitrios D. Vergados:
An IMS-based network architecture for WiMAX-UMTS and WiMAX-WLAN interworking. 1077-1099 - Fabio Baroncelli, Barbara Martini, Valerio Martini, Piero Castoldi:
Extending next generation network (NGN) architecture for connection-oriented transport. 1100-1111 - Wei-Kuo Chiang, Kai-Shun Chang:
Design and implementation of a distributed service invocation function for the IP multimedia subsystem. 1112-1124 - Ming-Fong Tsai, Naveen K. Chilamkurti, Sherali Zeadally, Alexey V. Vinel:
Concurrent multipath transmission combining forward error correction and path interleaving for video streaming. 1125-1136 - Yuan-sheng Luo, Yong Qi, Di Hou, Lin-feng Shen, Ying Chen, Xiao Zhong:
A novel heuristic algorithm for QoS-aware end-to-end service composition. 1137-1144
Volume 34, Number 10, July 2011
- Pavle V. Vuletic, Jelica Protic:
Self-similar cross-traffic analysis as a foundation for choosing among active available bandwidth measurement strategies. 1145-1158 - Xu Li, Hongyu Huang, Xuegang Yu, Wei Shu, Minglu Li, Min-You Wu:
A new paradigm for urban surveillance with vehicular sensor networks. 1159-1168 - Ying-Dar Lin, Shun-Lee Chang, Shi-Hung Tao, Jui-Hung Yeh:
Realizing and benchmarking broadcast algorithms in wireless mesh networks. 1169-1181 - Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori, Shigeaki Harada, Haruhisa Hasegawa:
Parallel video streaming optimizing network throughput. 1182-1194 - Ching-Lung Chang, Yue-Shan Chang, Ching-Hung Chang, Fang-Jie Chen:
XOR-based frame loss recovery scheme for video streaming. 1195-1201 - Ye Zhu, Huirong Fu:
Traffic analysis attacks on Skype VoIP calls. 1202-1212 - Daniel F. Macedo, Aldri L. dos Santos, José Marcos S. Nogueira, Guy Pujolle:
Modeling multiple hop wireless networks with varying transmission power and data rate. 1213-1221 - Laercio Cruvinel, Teresa Maria Vazão:
Improving performance for multimedia traffic with distributed dynamic QoS adaptation. 1222-1234 - Hassaan Khaliq Qureshi, Sajjad Rizvi, Muhammad Saleem, Syed Ali Khayam, Veselin Rakocevic, Muttukrishnan Rajarajan:
Poly: A reliable and energy efficient topology control protocol for wireless sensor networks. 1235-1242 - Jianxin Liao, Jinzhu Wang, Tonghong Li, Jingyu Wang, Xiaomin Zhu:
A token-bucket based notification traffic control mechanism for IMS presence service. 1243-1257 - Vasileios Karyotis, Maria Fazio, Symeon Papavassiliou, Antonio Puliafito:
Comparison of efficient random walk strategies for wireless multi-hop networks. 1258-1267
Volume 34, Number 11, July 2011
- Wei Yu, Xun Wang, Adam C. Champion, Dong Xuan, David Lee:
On detecting active worms with varying scan rate. 1269-1282 - Massimo Bernaschi, Filippo Cacace, Antonio Davoli, Davide Guerri, Matteo Latini, Luca Vollero:
A CAPWAP-based solution for frequency planning in large scale networks of WiFi Hot-Spots. 1283-1293 - Halder Subir