


Остановите войну!
for scientists:
Computer Communications, Volume 35
Volume 35, Number 1, January 2012
- Marco Conti
:
Editorial. iii
- Andrea Passarella
:
A survey on content-centric technologies for the current Internet: CDN and P2P solutions. 1-32 - António Varela, Teresa Maria Vazão
, Guilherme Arroz:
Providing service differentiation in pure IP-based networks. 33-46
- Melek Önen
, Thorsten Strufe:
Special section on Security and Social Networking. 47 - Alban Hessler, Takahiro Kakumaru, Heiner Perrey, Dirk Westhoff:
Data obfuscation with network coding. 48-61 - Iain Parris, Tristan Henderson
:
Privacy-enhanced social-network routing. 62-74 - Luca Maria Aiello
, Giancarlo Ruffo:
LotusNet: Tunable privacy for distributed online social network services. 75-88
- Phan Thanh Hoa, Gaute Lambertsen, Takahiko Yamada:
Seamless handover supported by parallel polling and dynamic multicast group in connected WLAN micro-cells system. 89-99 - Zhen Zuo, Qin Lu, Wusheng Luo:
A two-hop clustered image transmission scheme for maximizing network lifetime in wireless multimedia sensor networks. 100-108 - Amir M. Ahmadzadeh, Juan Eulogio Sánchez-García, B. Saavedra-Moreno, Antonio Portilla-Figueras, Sancho Salcedo-Sanz:
Capacity estimation algorithm for simultaneous support of multi-class traffic services in Mobile WiMAX. 109-119 - Keiichi Endo, Yusuke Inoue, Yutaka Takahashi:
Performance modeling of beaconless forwarding strategies in multi-hop wireless networks. 120-128 - Antonis Papadogiannakis, Giorgos Vasiliadis, Demetres Antoniades, Michalis Polychronakis, Evangelos P. Markatos:
Improving the performance of passive network monitoring applications with memory locality enhancements. 129-140 - Shih-Lin Wu
, Jui-Te Chang, Jen-Jee Chen:
Distributed cell-centric neighborhood-related location area planning for PCS networks. 141-149
Volume 35, Number 2, January 2012
- Hao Liu, HaiQin Xu, Shuguang Zhao:
Consistent-degradation macroblock grouping for parallel video streams over DiffServ networks. 151-158 - Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski
:
Hiding information in a Stream Control Transmission Protocol. 159-169 - Roohollah Barzamini, Masoud Shafiee
, Aresh Dadlani
:
Adaptive generalized minimum variance congestion controller for dynamic TCP/AQM networks. 170-178 - Hsiang-Fu Lo, Sghaier Guizani, Tin Yu Wu, Wei-Tsong Lee, Hung-Wei Lin:
IEEE 802.21-based seamless multicast streaming with dynamic playback control. 179-187 - Wenmin Li, Qiaoyan Wen, Qi Su, Zhengping Jin:
An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. 188-195 - Ming Yu, Xiaoguang Ma, Wei Su, Leonard J. Tung:
A new joint strategy of radio channel allocation and power control for wireless mesh networks. 196-206 - Navid Amini, Alireza Vahdatpour, Wenyao Xu, Mario Gerla, Majid Sarrafzadeh:
Cluster size optimization in sensor networks with decentralized cluster-based protocols. 207-220 - Jianshe Wu, Licheng Jiao, Ranran Ding:
Average time synchronization in wireless sensor networks by pairwise messages. 221-233 - Fabrice Le Fessant, Antonis Papadimitriou, Aline Carneiro Viana, Cigdem Sengul, Esther Palomar:
A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis. 234-248 - Emmanouil Kafetzakis, Kimon P. Kontovasilis, Ioannis Stavrakakis
:
A novel Effective Capacity-based framework for providing statistical QoS guarantees in IEEE 802.11 WLANs. 249-262 - Flávio Henrique Teles Vieira
, Flávio Geraldo Coelho Rocha, Josemar Alves dos Santos Jr.:
Loss probability estimation and control for OFDM/TDMA wireless systems considering multifractal traffic characteristics. 263-271
- Hui Tian, Hong Jiang, Ke Zhou, Dan Feng:
Erratum to "Adaptive partial-matching steganography for voice over IP using triple M sequences" [Comput. Commun. 34 (2011) 2236-2247]. 272
Volume 35, Number 3, February 2012
- Essaid Sabir
, Rachid El Azouzi
, Yezekael Hayel:
Hierarchy sustains partial cooperation and induces a Braess-like paradox in slotted aloha-based networks. 273-286 - Vincent Lecuire:
Unequal error protection under bitrate constraint for video streaming over internet. 287-297 - Giuseppe Piro
, Luigi Alfredo Grieco, Gennaro Boggia, Pietro Camarda:
QoS in Wireless LAN: A comparison between feedback-based and earliest due-date approaches. 298-308 - Manel Bourguiba, Kamel Haddadou, Guy Pujolle:
Packet aggregation based network I/O virtualization for cloud computing. 309-319 - Ataul Bari, Arunita Jaekel, Jin Jiang, Yufei Xu:
Design of fault tolerant wireless sensor networks satisfying survivability and lifetime requirements. 320-333 - Serkan Ayaz, Felix Hoffmann, Ulrich Epple, Reinhard German, Falko Dressler
:
Performance evaluation of network mobility handover over future aeronautical data link. 334-343 - Wenjie Yan, Mingxi Yang, Layuan Li, Huajing Fang:
Short signature scheme for multi-source network coding. 344-351 - Ying Xu, Rong Qu
:
An iterative local search approach based on fitness landscapes analysis for the delay-constrained multicast routing problem. 352-365 - Francesco Palmieri
, Ugo Fiore
, Sergio Ricciardi:
Selfish routing and wavelength assignment strategies with advance reservation in inter-domain optical networks. 366-379 - Sunho Lim, Chansu Yu, Chita R. Das:
Cache invalidation strategies for Internet-based vehicular ad hoc networks. 380-391 - Xiaonan Wang, Shan Zhong, Rong Zhou:
A mobility support scheme for 6LoWPAN. 392-404
Volume 35, Number 4, February 2012
- Kiev Gama
, Lionel Touseau, Didier Donsez:
Combining heterogeneous service technologies for building an Internet of Things middleware. 405-417 - Mukundan Venkataraman, Shamik Sengupta, Mainak Chatterjee, Raja Neogi:
Designing a collector overlay architecture for fault diagnosis in video networks. 418-430 - Seung Yeob Nam
, Sunggon Kim
, Wonyoung Park:
Analysis of minimal backlogging-based available bandwidth estimation mechanism. 431-443 - Paolo Giacomazzi, Igor Stanojev, Giacomo Verticale
:
A negotiation-based scheme for service level pricing for wireless access. 444-453 - Hsung-Pin Chang
, Hui-Wen Kan, Ming-Hsin Ho:
Adaptive TCP congestion control and routing schemes using cross-layer information for mobile ad hoc networks. 454-474 - Muhammad Ayaz
, Azween B. Abdullah
, Ibrahima Faye
, Yasir Batira:
An efficient Dynamic Addressing based routing protocol for Underwater Wireless Sensor Networks. 475-486 - Jean-Marc Robert, Hadi Otrok
, Abdelkarim Chriqi:
RBC-OLSR: Reputation-based clustering OLSR protocol for wireless ad hoc networks. 487-499 - Dukhyun Chang, Kideok Cho, Nakjung Choi, Ted Taekyoung Kwon, Yanghee Choi:
A probabilistic and opportunistic flooding algorithm in wireless sensor networks. 500-506 - Young-Long Chen, Jia-Sheng Lin:
Energy efficiency analysis of a chain-based scheme via intra-grid for wireless sensor networks. 507-516 - Mehmet H. Suzer, Kyoung-Don Kang, Can Basaran:
Active queue management via event-driven feedback control. 517-529
Volume 35, Number 5, March 2012
- Dimitri Staessens, Didier Colle, Mario Pickavet
, Ann Nowé, Kris Steenhaut, Piet Demeester:
Optimization of common pool resource sharing in multidomain IP-over-WDM networks. 531-540 - A. Argento, Matteo Cesana
, Nicola Gatti
, Ilaria Malanchini:
A game theoretical study of access point association in wireless mesh networks. 541-553 - André O. Castelucio, Antônio Tadeu A. Gomes
, Artur Ziviani
, Ronaldo M. Salles:
Intra-domain IP traceback using OSPF. 554-564 - Pedro Casas, Federico Larroca
, Jean-Louis Rougier, Sandrine Vaton:
Taming traffic dynamics: Analysis and improvements. 565-578
- Biming Tian, Song Han, Liu Liu
, Saghar Khadem, Sazia Parvin:
Towards enhanced key management in multi-phase ZigBee network architecture. 579-588 - Feng Zhang, Zhiping Jia, Hui Xia, Xin Li, Edwin Hsing-Mean Sha:
Node trust evaluation in mobile ad hoc networks based on multi-dimensional fuzzy and Markov SCGM(1, 1) model. 589-596 - Ramya Ramamoorthy, F. Richard Yu
, Helen Tang, Peter C. Mason, Azzedine Boukerche:
Joint authentication and quality of service provisioning in cooperative communication networks. 597-607 - Basit Qureshi
, Geyong Min, Demetres D. Kouvatsos:
A distributed reputation and trust management scheme for mobile peer-to-peer networks. 608-618 - Jiefeng (Terence) Chen, Roksana Boreli, Vijay Sivaraman:
Improving the efficiency of anonymous routing for MANETs. 619-627
- Mohamed Saad
:
On optimal spectrum-efficient routing in TDMA and FDMA multihop wireless networks. 628-636 - Eva Jaho
, Ioannis Z. Koukoutsidis, Ioannis Stavrakakis
, Ina Jaho:
Cooperative content replication in networks with autonomous nodes. 637-647
Volume 35, Number 6, March 2012
- Silvia Giordano
, Daniele Puccinelli:
Special section on Pervasive Networked Sensing. 649 - Robert K. Harle, Salman Taherian, Marcelo Pias
, George Coulouris, Andy Hopper, Jonathan Cameron, Joan Lasenby
, Gregor Kuntze, Ian N. Bezodis
, G. Irwin, David G. Kerwin:
Towards real-time profiling of sprints using wearable pressure sensors. 650-660 - Akira Mutazono, Masashi Sugano
, Masayuki Murata
:
Energy efficient self-organizing control for wireless sensor networks inspired by calling behavior of frogs. 661-669 - Swastik Brahma, Mainak Chatterjee, Kevin A. Kwiat, Pramod K. Varshney:
Traffic management in wireless sensor networks: Decoupling congestion control and fairness. 670-681
- Yuh-Jzer Joung
, Hsiu-Lin Huang:
A detailed examination of the overlay construction and maintenance mechanism in BitTorrent. 682-695 - Jie Feng, Lisong Xu:
Throughput-smoothness tradeoff in preventing competing TCP from starvation. 696-708 - Jun Li, Yifeng Zhou, Louise Lamont, F. Richard Yu
, Camille Alain Rabbath:
Swarm mobility and its impact on performance of routing protocols in MANETs. 709-719 - José Manuel Bande Serrano, José Hernández Palancar:
String alignment pre-detection using unique subsequences for FPGA-based network intrusion detection. 720-728 - Po-Kai Tseng, Wei-Ho Chung:
Near optimal link on/off scheduling and weight assignment for minimizing IP network energy consumption. 729-737 - Zhian Deng, Yubin Xu, Lin Ma:
Indoor positioning via nonlinear discriminative feature extraction in wireless local area network. 738-747 - Rami Haddad, Michael P. McGarry:
Feed Forward Bandwidth Indication (FFBI): Cooperation for an accurate bandwidth forecast. 748-758 - Rosario Giuseppe Garroppo
, Stefano Giordano
, Stella Spagna, Saverio Niccolini, Jan Seedorf:
Topology control strategies on P2P live video streaming service with peer churning. 759-770
Volume 35, Number 7, April 2012
- Jordi Domingo-Pascual, Sergio Palazzo, Caterina M. Scoglio
:
Special Section on Selected Papers from IFIP Networking 2011. 771 - Pedro Casas, Johan Mazel, Philippe Owezarski:
Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge. 772-783 - Saptarshi Ghosh, Ajitesh Srivastava, Niloy Ganguly
:
Effects of a soft cut-off on node-degree in the Twitter social network. 784-795 - Christian Doerr, Norbert Blenn, Siyu Tang, Piet Van Mieghem:
Are friends overrated? A study for the social news aggregator Digg.com. 796-809 - Yehuda Afek, Anat Bremler-Barr, Yaron Koral:
Space efficient deep packet inspection of compressed web traffic. 810-819 - Eitan Altman, Konstantin Avrachenkov
, Sreenath Ramanath:
Multiscale fairness and its application to resource allocation in wireless networks. 820-828
- Hakem Beitollahi, Geert Deconinck
:
Ferris wheel: A ring based onion circuit for hidden services. 829-841 - Stefano Bregni
, Paolo Giacomazzi, Gabriella Saddemi:
Long-range dependence of traffic across schedulers with multiple service classes. 842-848 - Zhiliang Tu, Qiang Wang, Hairong Qi, Yi Shen:
Flocking based sensor deployment in mobile sensor networks. 849-860 - Yuh-Shyan Chen, Kang-Wei Hung:
VC2-MAC: A two-cycle cooperative MAC protocol in vehicular networks. 861-874 - Samuel P. Kozaitis
, W. Petsuwan:
Improved anomaly detection using block-matching denoising. 875-884 - Hooman Lal Dehghani, Saeed Golmohammadi, Kamal Shadi:
Extract Non-Line-of-Sight state of base stations and error mitigation technique for wireless localization in micro-cell networks. 885-893
Volume 35, Number 8, May 2012
- Dan Tao, Shaojie Tang, Haitao Zhang, XuFei Mao, Huadong Ma:
Strong barrier coverage in directional sensor networks. 895-905 - Abdallah Jarray, Ahmad Nahar Quttoum, Hadi Otrok
, Zbigniew Dziong:
DDP: A Dynamic Dimensioning and Partitioning model of Virtual Private Networks resources. 906-915 - Neda Edalat, Chen-Khong Tham
, Wendong Xiao:
An auction-based strategy for distributed task allocation in wireless sensor networks. 916-928 - Wissam Fawaz
:
Enhancement of blocking performance in all-optical WDM networks via wavelength reassignment and route deviation. 929-935 - Shih-Jung Wu, Shih-Yi Huang, Kuo-Feng Huang:
Efficient Quality of Service scheduling mechanism for WiMAX networks. 936-951 - Chao-Chun Chen, Da-Chung Mao:
PPZTEM: An efficient approximate trajectory extraction method with error bound constraint for wireless sensor networks. 952-969 - Hui-Kai Su:
A Local Fast-Reroute mechanism for single node or link protection in hop-by-hop routed networks. 970-979 - Shin'ichi Arakawa, Tetsuya Takine, Masayuki Murata
:
Analyzing and modeling router-level internet topology and application to routing control. 980-992 - Luis J. de la Cruz Llopis
, Andrés Vázquez Rodas, Emilio Sanvicente Gargallo, Mónica Aguilar-Igartua
:
Load splitting in clusters of video servers. 993-1003 - Alex Borges Vieira, Pedro de Carvalho Gomes, José Augusto Miranda Nacif, Rodrigo Mantini, Jussara M. Almeida, Sérgio Vale Aguiar Campos:
Characterizing SopCast client behavior. 1004-1016
Volume 35, Number 9, May 2012
- Jiming Chen, Hannes Frey, Xu Li:
Special issue: Wireless sensor and robot networks: Algorithms and experiments. iii-iv
- Baozhi Chen, Dario Pompili:
Team formation and steering algorithms for underwater gliders using acoustic communications. 1017-1028 - Kaoru Ota
, Mianxiong Dong
, Zixue Cheng, Junbo Wang, Xu Li, Xuemin (Sherman) Shen:
ORACLE: Mobility control in wireless sensor and actor networks. 1029-1037 - Arnaud Casteigts, Jeremie Albert, Serge Chaumette, Amiya Nayak, Ivan Stojmenovic:
Biconnecting a network of mobile robots using virtual angular forces. 1038-1046 - Carmelo Costanzo, Valeria Loscrì, Enrico Natalizio, Tahiry Razafindralambo:
Nodes self-deployment for coverage maximization in mobile robot networks using an evolving neural network. 1047-1055 - Ahmed E. A. A. Abdulla, Hiroki Nishiyama
, Nei Kato:
Extending the lifetime of wireless sensor networks: A hybrid routing algorithm. 1056-1063 - Hualiang Chen, Yueming Cai, Weiwei Yang, Dongmei Zhang, Yingbo Hu:
Throughput and energy efficiency of a novel cooperative ARQ strategy for wireless sensor networks. 1064-1073 - Parth H. Pathak, Rudra Dutta
:
Centrality-based power control for hot-spot mitigation in multi-hop wireless networks. 1074-1085 - Dhia Mahjoub, David W. Matula:
Constructing efficient rotating backbones in wireless sensor networks using graph coloring. 1086-1097 - Der-Chen Huang, Hsing-Chien Tseng, Der-Jiunn Deng, Han-Chieh Chao:
A queue-based prolong lifetime methods for wireless sensor node. 1098-1106 - Peng Cheng, Xianghui Cao
, Jing Bai, Youxian Sun:
On optimizing sensing quality with guaranteed coverage in autonomous mobile sensor networks. 1107-1114 - Yao Zhao, Zhipeng Yang, Hongyi Wu:
Local information guided autonomous exploration in sensor networks: Algorithms and experiments. 1115-1124 - Peng Guo, Tao Jiang, Kui Zhang:
Novel 2-hop coloring algorithm for time-slot assignment of newly deployed sensor nodes without ID in wireless sensor and robot networks. 1125-1131 - Hamed Yousefi, Mohammad Hossein Yeganeh, Naser Alinaghipour, Ali Movaghar
:
Structure-free real-time data aggregation in wireless sensor networks. 1132-1140 - Huai-Lei Fu, Hou-Chun Chen, Phone Lin:
APS: Distributed air pollution sensing system on Wireless Sensor and Robot Networks. 1141-1150 - Hüseyin Akcan, Cem Evrendilek:
GPS-free directional localization via dual wireless radios. 1151-1163
Volume 35, Number 10, June 2012
- Tien Van Do, Nam H. Do, Ram Chakka:
A new queueing model for spectrum renting in mobile cellular networks. 1165-1171 - Der-Rong Din, Jhong-Yan Jiang:
Delay-constrained survivable multicast routing problem in WDM networks. 1172-1184 - Can Komar, Mehmet Yunus Donmez, Cem Ersoy
:
Detection quality of border surveillance wireless sensor networks in the existence of trespassers' favorite paths. 1185-1199 - Ricardo Silva, Jorge Sá Silva
, Fernando Boavida
:
A proposal for proxy-based mobility in WSNs. 1200-1216 - Yang Xia, Chai Kiat Yeo
:
Mitigating the impact of node mobility using mobile backbone for heterogeneous MANETs. 1217-1230 - Djohara Benyamina, Abdelhakim Hafid, Nasreddine Hallam, Michel Gendreau, J. C. Maureira:
A hybrid nature-inspired optimizer for wireless mesh networks design. 1231-1246 - Jung-Shian Li, Kun-Hsuan Liu, Chien-Hung Wu:
Efficient group multicast node scheduling schemes in multi-hop wireless networks. 1247-1258 - Claudia Campolo, Antonio Iera
, Leonardo Militano, Antonella Molinaro:
Scenario-adaptive and gain-aware content sharing policies for cooperative wireless environments. 1259-1271 - Ming Tao, Huaqiang Yuan, Shoubin Dong
, Hewei Yu:
Initiative movement prediction assisted adaptive handover trigger scheme in fast MIPv6. 1272-1282
Volume 35, Number 11, June 2012
- Franca Delmastro
:
Introduction to the special section on Pervasive Healthcare. 1283 - Franca Delmastro
:
Pervasive communications in healthcare. 1284-1295 - Gennaro Tartarisco
, Giovanni Baldus, Daniele Corda, Rossella Raso, Antonino Arnao
, Marcello Ferro
, Andrea Gaggioli
, Giovanni Pioggia
:
Personal Health System architecture for stress monitoring and support to clinical decisions. 1296-1305 - Mélodie Vidal, Jayson Turner, Andreas Bulling
, Hans Gellersen
:
Wearable eye tracking for mental health monitoring. 1306-1311
- Hakem Beitollahi, Geert Deconinck
:
Analyzing well-known countermeasures against distributed denial of service attacks. 1312-1332
- Javad Akbari Torkestani:
An adaptive backbone formation algorithm for wireless sensor networks. 1333-1344 - Jae-Young Seol, Seong-Lyun Kim:
Node mobility and capacity in wireless controllable ad hoc networks. 1345-1354 - Wooguil Pak, Saewoong Bahk:
Centralized route recovery based on multi-hop wakeup time estimation for wireless sensor networks with ultra low duty cycles. 1355-1367 - Mahboobeh Soleimani, Ali A. Ghorbani:
Multi-layer episode filtering for the multi-step attack detection. 1368-1379