


default search action
Computer Communications, Volume 36
Volume 36, Number 1, December 2012
- Kyung-Joon Park

, Rong Zheng, Xue Liu:
Cyber-physical systems: Milestones and research challenges. 1-7 - Ahmad T. Al-Hammouri

:
A comprehensive co-simulation platform for cyber-physical systems. 8-19 - Junbeom Hur, Kyungtae Kang:

Dependable and secure computing in medical information systems. 20-28 - Gregory Hackmann, Fei Sun, Nestor E. Castaneda, Chenyang Lu, Shirley Dyke

:
A holistic approach to decentralized structural damage localization using wireless sensor networks. 29-41 - Santiago J. Barro Torres, Tiago M. Fernández-Caramés

, Héctor J. Pérez-Iglesias, Carlos J. Escudero
:
Real-time personal protective equipment monitoring system. 42-50 - Hwantae Kim, Suk Kyu Lee, Hyunsoon Kim, Hwangnam Kim:

Implementing home energy management system with UPnP and mobile applications. 51-62
- Hasan Tuncer, Sumita Mishra

, Nirmala Shenoy:
A survey of identity and handoff management approaches for the future Internet. 63-79
- Wenjie Zhang, Chai Kiat Yeo

:
Joint iterative algorithm for optimal cooperative spectrum sensing in cognitive radio networks. 80-89 - Juan Vera del Campo

, Josep Pegueroles, Juan Hernández-Serrano
, Miguel Soriano
:
Design of a P2P content recommendation system using affinity networks. 90-104 - Chao Zhang, Jun Zhang, Guo Wei, Pinyi Ren:

An efficient cooperative ARQ protocol for wireless relay networks. 105-112 - Seyed Hossein Khasteh

, Saeed Bagheri Shouraki, Nima Hajiabdorahim
, Ehsan Dadashnialehi:
A new approach for integrated coverage and connectivity in wireless sensor networks. 113-120
Volume 36, Number 2, January 2013
- Jiguo Yu

, Nannan Wang, Guanghui Wang, Dongxiao Yu:
Connected dominating sets in wireless ad hoc and sensor networks - A comprehensive survey. 121-134
- Fadi M. Al-Turjman, Hossam S. Hassanein

, Mohamed Ibnkahla:
Efficient deployment of wireless sensor networks targeting environment monitoring applications. 135-148 - Rone Ilídio da Silva, Daniel Fernandes Macedo

, José Marcos S. Nogueira
:
Duty cycle aware spatial query processing in wireless sensor networks. 149-161 - Lin Xing, Wei Wang:

Energy-balanced cross layer traffic and coding optimality in battery-powered wireless mesh networks. 162-169 - Sheng-Shih Wang

, Yi-Shiun Lin:
PassCAR: A passive clustering aided routing protocol for vehicular ad hoc networks. 170-179 - Abderrahmen Mtibaa, Khaled A. Harras

:
CAF: Community aware framework for large scale mobile opportunistic networks. 180-190 - Flavio Roberto Santos, Weverton Luis da Costa Cordeiro, Luciano Paschoal Gaspary, Antônio Marinho Pilla Barcellos:

Beyond pollution and taste: A tag-based strategy to increase download quality in P2P file sharing systems. 191-202 - Yanmin Zhu, Lei Ni, Bo Li:

Exploiting mobility patterns for inter-technology handover in mobile environments. 203-210 - Yang Liu, Zheng Zheng

, Kai Liu, Xingchun Liu:
Delay-SRLG constrained, backup-shared path protection in WDM networks with sleep scheduling. 211-222 - Krishanthmohan Ratnam, Mohan Gurusamy

, Kee Chaing Chua:
A flexible optical switch architecture for efficient transmission of optical bursts. 223-241
Volume 36, Number 3, February 2013
- Walid Bechkit, Yacine Challal

, Abdelmadjid Bouabdallah:
A new class of Hash-Chain based key pre-distribution schemes for WSN. 243-255 - Huan Li, Yanlei Liu, Weifeng Chen, Weijia Jia

, Bing Li, Junwu Xiong:
COCA: Constructing optimal clustering architecture to maximize sensor network lifetime. 256-268 - Qin Liu

, Yanan Chang, Xiaohua Jia
:
A hybrid method of CSMA/CA and TDMA for real-time data aggregation in wireless sensor networks. 269-278 - Philip Ginzboorg

, Valtteri Niemi, Jörg Ott
:
Fragmentation algorithms for DTN links. 279-290 - Feng Zhong, Chai Kiat Yeo

, Bu-Sung Lee
:
EFLoM: An Efficient Framework for Local Mobility. 291-302 - P. Arun Raj Kumar

, S. Selvakumar
:
Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems. 303-319 - Sangho Lee, Jong Kim:

Fluxing botnet command and control channels with URL shortening services. 320-332 - Malabika Sengupta, Swapan Kumar Mondal, Debashis Saha

:
Distributed lightpath establishment techniques using Multi-wavelength Reservation Protocols in WDM optical networks. 333-341 - Weigang Hou, Lei Guo

, Xiaoxue Gong, Zhimin Sun:
Multi-domain integrated grooming algorithm for green IP over WDM network. 342-350 - Mingdong Tang, Guoqiang Zhang, Tao Lin, Jianxun Liu:

HDLBR: A name-independent compact routing scheme for power-law networks. 351-359
- Agassi Z. Melikov, Leonid A. Ponomarenko:

Comment on "Probabilistic framework and performance evaluation for prioritized call admission control in next generation networks". 360-361
Volume 36, Number 4, February 2013
- Stojan Trajanovski, Fernando A. Kuipers, Javier Martín Hernández, Piet Van Mieghem:

Generating graphs that approach a prescribed modularity. 363-372 - Yossi Kanizo, David Hay, Isaac Keslassy

:
Access-efficient Balanced Bloom Filters. 373-385 - Raúl Peña-Ortiz

, José A. Gil
, Julio Sahuquillo
, Ana Pont
:
Analyzing web server performance under dynamic user workloads. 386-395 - Raffaele Bolla

, Roberto Bruschi
:
An open-source platform for distributed Linux Software Routers. 396-410 - Jie Wu, Ying Dai, Yanchao Zhao:

Effective channel assignments in cognitive radio networks. 411-420 - Seyed Mohamad Alavi, Chi Zhou, Wan Wang Gen:

Efficient resource allocation algorithm for OFDMA systems with delay constraint. 421-430 - Jaeseon Hwang, Taewoon Kim

, Jungmin So, Hyuk Lim
:
A receiver-centric multi-channel MAC protocol for wireless networks. 431-444 - Tzung-Shi Chen, Hua-Wen Tsai, Yu-Hsin Chang, Tzung-Cheng Chen:

Geographic convergecast using mobile sink in wireless sensor networks. 445-458 - Shanshan Li, Shaoliang Peng

, Weifeng Chen, Xiaopei Lu:
INCOME: Practical land monitoring in precision agriculture with sensor networks. 459-467 - Erik-Oliver Blass, Anil Kurmus, Refik Molva

, Thorsten Strufe:
PSP: Private and secure payment with RFID. 468-480
Volume 36, Number 5, March 2013
- Stefano Ferretti

:
Shaping opportunistic networks. 481-503 - Seunghun Cha, Elmurod Talipov, Hojung Cha:

Data delivery scheme for intermittently connected mobile sensor networks. 504-519 - Fatma Bouabdallah

, Nizar Bouabdallah, Raouf Boutaba:
Reliable and energy efficient cooperative detection in wireless sensor networks. 520-532 - Andrei Pruteanu, Lucia D'Acunto

, Stefan Dulman:
Distributed online flash-crowd detection in P2P swarming systems. 533-541 - Josep Domingo-Ferrer

, David Megías
:
Distributed multicast of fingerprinted content based on a rational peer-to-peer community. 542-550 - Jason Brown

, Jamil Y. Khan
:
Key performance aspects of an LTE FDD based Smart Grid communications network. 551-561 - Dongwon Seo, Heejo Lee, Ejovi Nuwere:

SIPAD: SIP-VoIP Anomaly Detection using a Stateful Rule Tree. 562-574 - Yoshiki Kanda, Romain Fontugne, Kensuke Fukuda, Toshiharu Sugawara

:
ADMIRE: Anomaly detection method using entropy-based PCA with three-step sketches. 575-588 - Mohamed Lamine Lamali, Hélia Pouyllau, Dominique Barth:

Path computation in multi-layer multi-domain networks: A language theoretic approach. 589-599 - James Yiming Zhang, Jing Wu, Gregor von Bochmann:

A proof of wavelength conversion not improving Lagrangian bounds of the sliding scheduled RWA problem. 600-606
Volume 36, Number 6, March 2013
- Piotr Cholda

, Bjarne E. Helvik
:
Reliable network-based services. 607-610
- Héctor Cancela

, Franco Robledo, Gerardo Rubino, Pablo Sartor:
Monte Carlo estimation of diameter-constrained network reliability conditioned by pathsets and cutsets. 611-620 - Samir Sebbah, Brigitte Jaumard:

Differentiated quality-of-protection in survivable WDM mesh networks using p-structures. 621-629 - M. Farhan Habib, Massimo Tornatore

, Ferhat Dikbiyik, Biswanath Mukherjee:
Disaster survivability in optical communication networks. 630-644 - Levente Csikor, János Tapolcai

, Gábor Rétvári:
Optimizing IGP link costs for improving IP-level resilience with Loop-Free Alternates. 645-655 - Sachin Sharma

, Dimitri Staessens, Didier Colle, Mario Pickavet
, Piet Demeester:
OpenFlow: Meeting carrier-grade recovery requirements. 656-665 - Victor Yu Liu, David Tipper

:
Spare capacity allocation using shared backup path protection for dual link failures. 666-677 - Iyad A. Katib

, Deep Medhi:
Network protection design models, a heuristic, and a study for concurrent single-link per layer failures in three-layer networks. 678-688 - Dahai Xu, Guangzhi Li, Byrav Ramamurthy

, Angela L. Chiu, Dongmei Wang, Robert D. Doverspike:
On provisioning diverse circuits in heterogeneous multi-layer optical networks. 689-697 - Sahel Sahhaf, Wouter Tavernier, Didier Colle, Mario Pickavet

, Piet Demeester:
Link failure recovery technique for greedy routing in the hyperbolic plane. 698-707 - Andrés J. Gonzalez, Bjarne E. Helvik

:
SLA success probability assessment in networks with correlated failures. 708-717
Volume 36, Number 7, April 2013
- Bengt Ahlgren, Holger Karl, Dirk Kutscher

, Lixia Zhang:
Special section on Information-Centric Networking. 719-720 - Christian Dannewitz, Dirk Kutscher

, Börje Ohlman, Stephen Farrell, Bengt Ahlgren, Holger Karl:
Network of Information (NetInf) - An information-centric networking architecture. 721-735 - Christian Dannewitz, Matteo D'Ambrosio, Vinicio Vercellone:

Hierarchical DHT-based name resolution for information-centric networks. 736-749 - Giovanna Carofiglio, Massimo Gallo, Luca Muscariello, Diego Perino:

Evaluating per-application storage management in content-centric networks. 750-757 - Wei Koong Chai

, Diliang He, Ioannis Psaras, George Pavlou:
Cache "less for more" in information-centric networks (extended version). 758-770 - Giuseppe Rossini, Dario Rossi:

Evaluating CCN multi-path interest forwarding strategies. 771-778 - Cheng Yi, Alexander Afanasyev

, Ilya Moiseenko, Lan Wang, Beichuan Zhang, Lixia Zhang:
A case for stateful forwarding plane. 779-791 - Marica Amadeo

, Antonella Molinaro, Giuseppe Ruggeri
:
E-CHANET: Routing, forwarding and transport in Information-Centric multihop wireless networks. 792-803
- Osama Khader, Andreas Willig:

An energy consumption analysis of the Wireless HART TDMA protocol. 804-816 - Pelayo Nuño

, Juan C. Granda, Francisco J. Suárez
, Daniel F. García
:
Self-∗ in Multimedia Communication Overlays. 817-833 - Youngwon Kim An, Seong-Moo Yoo, Changhyuk An, B. Earl Wells:

Doppler effect on target tracking in wireless sensor networks. 834-848
Volume 36, Number 8, May 2013
- Zhiting Lin, Xiufang Jiang:

Universal scheme improving probabilistic routing in delay-tolerant networks. 849-860 - Nilesh Padhariya, Anirban Mondal, Sanjay Kumar Madria, Masaru Kitsuregawa:

Economic incentive-based brokerage schemes for improving data availability in mobile-P2P networks. 861-874 - Sathiamoorthy Manoharan

, Tianxu Ge:
A demerit point strategy to reduce free-riding in BitTorrent. 875-880 - Bernardo de la Ossa, José A. Gil

, Julio Sahuquillo
, Ana Pont
:
Referrer Graph: A cost-effective algorithm and pruning method for predicting web accesses. 881-894 - Y. Xie, S. Tang, X. Huang, C. Tang, Xingcheng Liu

:
Detecting latent attack behavior from aggregated Web traffic. 895-907 - Frederic Raspall-Chaure:

Scalable identification and measurement of heavy-hitters. 908-926 - Brad Whitehead, Chung-Horng Lung, Peter Rabinovitch:

An efficient hybrid approach to per-flow state tracking for high-speed networks. 927-938 - Sungwook Kim:

A repeated Bayesian auction game for cognitive radio spectrum sharing scheme. 939-946 - Arash Azarfar, Jean-François Frigon, Brunilde Sansò:

Reliability analysis of a channel restoration mechanism for opportunistic spectrum access. 947-961
Volume 36, Number 9, May 2013
- Charalampos Konstantopoulos

, Paolo Bellavista
, Chi-Fu Huang, Damla Turgut:
Special issue: Reactive wireless sensor networks. 963-964
- Majid I. Khan, Wilfried N. Gansterer

, Günter Haring:
Static vs. mobile sink: The influence of basic parameters on energy efficiency in wireless sensor networks. 965-978 - Ivan Mezei

, Milan Lukic
, Veljko Malbasa, Ivan Stojmenovic:
Auctions and iMesh based task assignment in wireless sensor and actuator networks. 979-987 - Yuanyuan Zeng, Deshi Li, Athanasios V. Vasilakos

:
Real-time data report and task execution in wireless sensor and actuator networks using self-aware mobile actuators. 988-997 - Fadi M. Al-Turjman, Ashraf E. Al-Fagih, Waleed Alsalih, Hossam S. Hassanein

:
A delay-tolerant framework for integrated RSNs in IoT. 998-1010 - Estanislao Mercadal

, Carlos Vidueira, Cormac J. Sreenan, Joan Borrell
:
Improving the dynamism of mobile agent applications in wireless sensor networks through separate itineraries. 1011-1023 - Samaneh Hosseini Semnani

, Otman A. Basir
:
Target to sensor allocation: A hierarchical dynamic Distributed Constraint Optimization approach. 1024-1038 - Dimitrios Zorbas

, Tahiry Razafindralambo
:
Prolonging network lifetime under probabilistic target coverage in wireless mobile sensor networks. 1039-1053 - Leandro A. Villas

, Azzedine Boukerche, Daniel L. Guidoni, Horacio A. B. F. de Oliveira, Regina Borges de Araujo, Antonio Alfredo Ferreira Loureiro:
An energy-aware spatio-temporal correlation mechanism to perform efficient data collection in wireless sensor networks. 1054-1066 - Yi Ren

, Vladimir A. Oleshchuk, Frank Y. Li
:
Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs. 1067-1077 - Hui Xia, Zhiping Jia, Lei Ju, Xin Li, Edwin Hsing-Mean Sha:

Impact of trust model on on-demand multi-path routing in mobile ad hoc networks. 1078-1093 - Lu Jin, Defeng David Huang

:
A slotted CSMA based reinforcement learning approach for extending the lifetime of underwater acoustic wireless sensor networks. 1094-1099
Volume 36, Numbers 10-11, June 2013
- Behrouz Shahgholi Ghahfarokhi

, Naser Movahhedinia:
A survey on applications of IEEE 802.21 Media Independent Handover framework in next generation wireless networks. 1101-1119
- Faraz Ahmed, Muhammad Abulaish

:
A generic statistical approach for spam detection in Online Social Networks. 1120-1129 - Valerio Arnaboldi

, Andrea Guazzini
, Andrea Passarella
:
Egocentric online social networks: Analysis of key features and prediction of tie strength in Facebook. 1130-1144 - Slimane Lemmouchi, Mohammed Haddad, Hamamache Kheddouci:

Robustness study of emerged communities from exchanges in peer-to-peer networks. 1145-1158 - Asmaa Adnane

, Christophe Bidan, Rafael Timóteo de Sousa Júnior
:
Trust-based security for the OLSR routing protocol. 1159-1171 - Mubashir Husain Rehmani

, Aline Carneiro Viana
, Hicham Khalife, Serge Fdida:
SURF: A distributed channel selection strategy for data dissemination in multi-hop cognitive radio networks. 1172-1185 - Sang-Seon Byun, Ilangko Balasingham, Heung-No Lee:

An inventory model-based spectrum pooling for wireless service provider and unlicensed users. 1186-1192 - Hairui Zhou, Chengchen Hu, Lina He:

Improving the efficiency and fairness of eXplicit Control Protocol in multi-bottleneck networks. 1193-1208 - Daisuke Satoh, Harutaka Ueno:

Marking algorithm of distinguishing three traffic load states with two encoding states for pre-congestion notification. 1209-1224 - Hakki Ulas Ünal

, Daniel Melchor-Aguilar
, Deniz Üstebay, Silviu-Iulian Niculescu, Hitay Özbay
:
Comparison of PI controllers designed for the delay model of TCP/AQM networks. 1225-1234 - Jianxin Wang, Pingping Dong, Jie Chen, Jiawei Huang, Shigeng Zhang, Weiping Wang:

Adaptive explicit congestion control based on bandwidth estimation for high bandwidth-delay product networks. 1235-1244 - Sebastian Schildt

, Johannes Morgenroth, Lars C. Wolf:
Efficient false positive free set synchronization using an extended bloom filter approach. 1245-1254 - Derek Chi-Wai Pao

, Nga Lam Or, Ray C. C. Cheung
:
A memory-based NFA regular expression match engine for signature-based intrusion detection. 1255-1267
Volume 36, Number 12, July 2013
- Bingdong Li, Esra Erdin, Mehmet Hadi Gunes, George Bebis, Todd Shipley:

An overview of anonymity technology usage. 1269-1283
- Oscar García Morchon, Dmitriy Kuptsov, Andrei V. Gurtov

, Klaus Wehrle
:
Cooperative security in distributed networks. 1284-1297 - Ismael de Fez

, Francisco Fraile
, Juan Carlos Guerri
:
Effect of the FDT transmission frequency for an optimum content delivery using the FLUTE protocol. 1298-1309 - Yue Han, Mingwu Yao, Zengji Liu:

A scalable method for DCLC problem using hierarchical MDP model. 1310-1316 - Marcos Postigo-Boix

, José Luis Melús-Moreno:
A pricing method for elastic services that guarantees the GoS in a scenario of evolutionary demand. 1317-1328 - Alireza Monemi

, Roozbeh Zarei
, Muhammad N. Marsono
:
Online NetFPGA decision tree statistical traffic classifier. 1329-1340 - Waleed Ejaz

, Najam Ul Hasan, Hyung Seok Kim:
Distributed cooperative spectrum sensing in cognitive radio for ad hoc networks. 1341-1349
- Peter M. van de Ven, Sem C. Borst, Lei Ying

:
Inefficiency of MaxWeight scheduling in spatial wireless networks. 1350-1359 - Omur Ozel, Jing Yang

, Sennur Ulukus:
Optimal transmission schemes for parallel and fading Gaussian broadcast channels with an energy harvesting rechargeable transmitter. 1360-1372 - Veeraruna Kavitha, Sreenath Ramanath, Mérouane Debbah:

Satisfying demands in a multicellular network: A universal power allocation algorithm. 1373-1386
Volume 36, Number 13, July 2013
- Shameek Bhattacharjee

, Shamik Sengupta, Mainak Chatterjee:
Vulnerabilities in cognitive radio networks: A survey. 1387-1398
- Junaid Ansari, Xi Zhang, Petri Mähönen:

A decentralized MAC protocol for opportunistic spectrum access in cognitive wireless networks. 1399-1410 - Ahmad Abbas, Mohamed F. Younis

:
Establishing connectivity among disjoint terminals using a mix of stationary and mobile relays. 1411-1421 - Omar Abdel Wahab

, Hadi Otrok
, Azzam Mourad
:
VANET QoS-OLSR: QoS-based clustering protocol for Vehicular Ad hoc Networks. 1422-1435 - Maria Estrella Sousa Vieira

, Andrés Suárez-González
, Manuel Fernández-Veiga
, José C. López-Ardao
, Cándido López-García
:
Model selection for long-memory processes in the spectral domain. 1436-1449 - Y. Sinan Hanay

, Abhishek Dwaraki, Kekai Hu, Tilman Wolf
:
High-performance implementation of in-network traffic pacing for small-buffer networks. 1450-1459 - Guang Cheng, Yongning Tang:

Line speed accurate superspreader identification using dynamic error compensation. 1460-1470 - Li Ming Chen, Meng Chang Chen, Wanjiun Liao

, Yeali S. Sun:
A scalable network forensics mechanism for stealthy self-propagating attacks. 1471-1484
Volume 36, Number 14, August 2013
- Kaushik R. Chowdhury

, Marco Di Felice, Luciano Bononi
:
XCHARM: A routing protocol for multi-channel wireless mesh networks. 1485-1497 - Shin-Jer Yang, Wen-Chieh Tseng:

Design novel weighted rating of multiple attributes scheme to enhance handoff efficiency in heterogeneous wireless networks. 1498-1514 - Yinan Li, Ing-Ray Chen:

Hierarchical agent-based secure and reliable multicast in wireless mesh networks. 1515-1526 - Alejandro Pérez-Méndez, Fernando Pereñíguez-Garcia

, Rafael Marín López, Gabriel López Millán:
Out-of-band federated authentication for Kerberos based on PANA. 1527-1538
- Brigitte Jaumard, Rejaul Chowdhury:

An efficient optimization scheme for WDM/TDM PON network planning. 1539-1551 - Peng Xu, Xuming Fang, Meirong Chen, Yang Xu:

A Stackelberg game-based spectrum allocation scheme in macro/femtocell hierarchical networks. 1552-1558 - Hasan Erkan, Georgios Ellinas

, Antonis Hadjiantonis, Roger Dorsinville
, Mohamed A. Ali:
Dynamic and fair resource allocation in a distributed ring-based WDM-PON architectures. 1559-1569 - Burak Kantarci, Hussein T. Mouftah:

Two-stage report generation in long-reach EPON for enhanced delay performance. 1570-1580
Volume 36, Numbers 15-16, September - October 2013
- Xiaojun Zhu

, Xiaobing Wu, Guihai Chen
:
Relative localization for wireless sensor networks with linear topology. 1581-1591 - Andrey Sapegin

, Steve Uhlig
:
On the extent of correlation in BGP updates in the Internet and what it tells us about locality of BGP routing events. 1592-1605
- Fernando Boavida

, Eduardo Cerqueira, Andreas Mauthe
, Marília Curado
, Eng Keong Lua, Mikolaj Leszczuk
:
Special section on human-centric multimedia networking: Guest editorial. 1606-1607 - Alberto Álvarez, Laura Pozueco

, Sergio Cabrero, Xabiel G. Pañeda, Roberto García, David Melendi
, Gabriel Díaz Orueta:
Subjective evaluation of critical success factors for a QoE aware adaptive system. 1608-1620 - Jalal Awed, Imad H. Elhajj

, Ali Chehab
, Ayman I. Kayssi:
Perception-aware packet-loss resilient compression for networked haptic systems. 1621-1628 - Ianire Taboada

, Fidel Liberal
, Jose Oscar Fajardo
, Urtzi Ayesta:
QoE-aware optimization of multimedia flow scheduling. 1629-1638 - Chelsea Dobbins

, Madjid Merabti, Paul Fergus
, David Llewellyn-Jones, Faycal Bouhafs:
Exploiting linked data to create rich human digital memories. 1639-1656 - Thomas C. Schmidt

, Matthias Wählisch
, Dominik Charousset, Sebastian Meiling:
On name-based group communication: Challenges, concepts, and transparent deployment. 1657-1664
Volume 36, Numbers 17-18, November - December 2013
- Emilio Ancillotti, Raffaele Bruno

, Marco Conti
:
The role of communication systems in smart grids: Architectures, technical solutions and research challenges. 1665-1697
- Haesun Byun, Meejeong Lee:

A P4P-integrated data-driven P2P system for the live multimedia streaming service. 1698-1707 - Hasan T. Karaoglu, Aparna Gupta, Murat Yuksel, Weini Liu, Koushik Kar:

Bailout forward contracts for edge-to-edge internet services. 1708-1725 - Iván Vidal

, Jaime García-Reinoso
, Ignacio Soto
, Antonio de la Oliva
:
A solution for transparent mobility with route optimization in the IP multimedia subsystem. 1726-1744 - Ronghui Hou, Sikai Qu, King-Shan Lui, Jiandong Li:

Coding- and interference-aware routing protocol in wireless networks. 1745-1753 - Yuan-Cheng Lai, Ling-Yen Hsiao, Bor-Shen Lin:

An RFID anti-collision algorithm with dynamic condensation and ordering binary tree. 1754-1767

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














