Last update:
Wed May 17 09:55:33 MDT 2023
Guido Urdaneta and
Guillaume Pierre and
Maarten van Steen Wikipedia workload analysis for
decentralized hosting . . . . . . . . . 1830--1845
Ian F. Akyildiz and
Harry Rudin Editorial . . . . . . . . . . . . . . . 1--2
Sunmyeng Kim and
Young-Jong Cho and
Yong K. Kim Admission control scheme based on
priority access for wireless LANs . . . 3--12
Chunxi Li and
Changjia Chen Measurement-based study on the relation
between users' watching behavior and
network sharing in P2P VoD systems . . . 13--27
Yixin Jiang and
Haojin Zhu and
Minghui Shi and
Xuemin (Sherman) Shen and
Chuang Lin An efficient dynamic-identity based
signature scheme for secure network
coding . . . . . . . . . . . . . . . . . 28--40
Guillermo Ibáñez and
Alberto García-Martínez and
Juan A. Carral and
Pedro A. González and
Arturo Azcorra and
José M. Arco HURP/HURBA: Zero-configuration
hierarchical Up/Down routing and
bridging architecture for Ethernet
backbones and campus networks . . . . . 41--56
Minh Huynh and
Stuart Goose and
Prasant Mohapatra Resilience technologies in Ethernet . . 57--78
Jose L. Muñoz and
Oscar Esparza and
Mónica Aguilar and
Victor Carrascal and
Jordi Forné RDSR-V. Reliable Dynamic Source Routing
for video-streaming over mobile ad hoc
networks . . . . . . . . . . . . . . . . 79--96
Tim Stevens and
Tim Wauters and
Chris Develder and
Filip De Turck and
Bart Dhoedt and
Piet Demeester Analysis of an anycast based overlay
system for scalable service discovery
and execution . . . . . . . . . . . . . 97--111
Suman Kumar and
Seung-Jong Park and
S. Sitharama Iyengar A loss-event driven scalable fluid
simulation method for high-speed
networks . . . . . . . . . . . . . . . . 112--132
Johan Eklund and
Karl-Johan Grinnemo and
Stephan Baucke and
Anna Brunstrom Tuning SCTP failover for carrier grade
telephony signaling . . . . . . . . . . 133--149
Yiu-Wing Leung Sparse telephone gateway for Internet
telephony . . . . . . . . . . . . . . . 150--164
Deke Guo and
Yuan He and
Panlong Yang Receiver-oriented design of Bloom
filters for data-centric routing . . . . 165--174
Anonymous Editorial Board . . . . . . . . . . . . ??
Raouf Boutaba and
Seán Murphy and
Albert Banchs Special issue on ``Wireless Multi-Hop
Networking for Infrastructure Access'' 175--177
Jonathan Wellons and
Liang Dai and
Yuan Xue and
Yui Cui Augmenting predictive with oblivious
routing for wireless mesh networks under
traffic uncertainty . . . . . . . . . . 178--195
Jian Zhang and
Yuanzhu Peter Chen and
Ivan Marsic MAC-layer proactive mixing for network
coding in multi-hop wireless networks 196--207
Charles B. Ward and
Nathan M. Wiegand Complexity results on labeled shortest
path problems from wireless routing
metrics . . . . . . . . . . . . . . . . 208--217
Vincent Toubiana and
Houda Labiod and
Laurent Reynaud and
Yvon Gourhant A global security architecture for
operated hybrid WLAN mesh networks . . . 218--230
Valerio Targon and
Brunilde Sans\`o and
Antonio Capone The joint Gateway Placement and Spatial
Reuse Problem in Wireless Mesh Networks 231--240
Mahesh K. Marina and
Samir R. Das and
Anand Prabhu Subramanian A topology control approach for
utilizing multiple channels in
multi-radio wireless mesh networks . . . 241--256
Nico Bayer and
Bangnan Xu and
Veselin Rakocevic and
Joachim Habermann Application-aware scheduling for VoIP in
Wireless Mesh Networks . . . . . . . . . 257--277
Ayman Radwan and
Hossam S. Hassanein and
Abd-Elhamid M. Taha Identifying the capacity gains of
multihop cellular networks . . . . . . . 278--290
Carlos J. Bernardos and
Maria Calderon and
Ignacio Soto and
Ana Beatriz Solana and
Kilian Weniger Building an IP-based community wireless
mesh network: Assessment of PACMAN as an
IP address autoconfiguration protocol 291--303
Jiazhen Zhou and
Kenneth Mitchell A scalable delay based analytical
framework for CSMA/CA wireless mesh
networks . . . . . . . . . . . . . . . . 304--318
Katerina Papadaki and
Vasilis Friderikos Gateway selection and routing in
wireless mesh networks . . . . . . . . . 319--329
Cheolgi Kim and
Young-Bae Ko and
Nitin H. Vaidya Link-state routing without broadcast
storming for multichannel mesh networks 330--340
Anonymous Editorial Board . . . . . . . . . . . . ??
Abdul Hasib and
Abraham O. Fapojuwo Cross-layer radio resource management in
integrated WWAN and WLAN networks . . . 341--356
Andrés Ortiz and
Julio Ortega and
Antonio F. Díaz and
Alberto Prieto Network interfaces for programmable NICs
and multicore platforms . . . . . . . . 357--376
Shucheng Yu and
Kui Ren and
Wenjing Lou Attribute-based on-demand multicast
group setup with membership anonymity 377--386
Akbar Ghaffar Pour Rahbar and
Oliver Yang Agile bandwidth management techniques in
slotted all-optical packet switched
networks . . . . . . . . . . . . . . . . 387--403
Erik F. Golen and
Sumita Mishra and
Nirmala Shenoy An underwater sensor allocation scheme
for a range dependent environment . . . 404--415
Rui Gustavo Crespo Predicting feature interactions by using
inconsistency models . . . . . . . . . . 416--427
Ertan Onur and
Cem Ersoy and
Hakan Deliç and
Lale Akarun Surveillance with wireless sensor
networks in obstruction: Breach paths as
watershed contours . . . . . . . . . . . 428--441
Xiaowei Yang and
Yanbin Lu and
Lei Zan Improving XCP to achieve max--min fair
bandwidth allocation . . . . . . . . . . 442--461
Satish Chand and
Hari Om Efficient staircase scheme with seamless
channel transition mechanism . . . . . . 462--474
Yixin Wu and
Suman Kumar and
Seung-Jong Park Measurement and performance issues of
transport protocols over 10 Gbps
high-speed optical networks . . . . . . 475--488
Chamil Kulatunga and
Gorry Fairhurst Enforcing layered multicast congestion
control using ECN-nonce . . . . . . . . 489--505
Xiang Feng and
Francis C. M. Lau A new economic generalized particle
model for flow control . . . . . . . . . 506--524
Anonymous Editorial Board . . . . . . . . . . . . ??
Violet R. Syrotiuk and
Brahim Bensaou Computer networks (Elsevier) special
issue on advances in wireless and mobile
networks . . . . . . . . . . . . . . . . 525--526
Uichin Lee and
Mario Gerla A survey of urban vehicular sensing
platforms . . . . . . . . . . . . . . . 527--544
Peyman TalebiFard and
Terrence Wong and
Victor C. M. Leung Access and service convergence over the
mobile Internet --- a survey . . . . . . 545--557
Zhenxia Zhang and
Richard W. Pazzi and
Azzedine Boukerche A mobility management scheme for
wireless mesh networks based on a hybrid
routing protocol . . . . . . . . . . . . 558--572
Zhenzhen Ye and
Alhussein A. Abouzeid A unified model for joint
throughput-overhead analysis of random
access mobile ad hoc networks . . . . . 573--588
Chiara Boldrini and
Marco Conti and
Andrea Passarella Design and performance evaluation of
ContentPlace, a social-aware data
dissemination system for opportunistic
networks . . . . . . . . . . . . . . . . 589--604
Jelena Mi\vsi\'c and
Vojislav B. Mi\vsi\'c Making the best of limited resources:
Optimized differential sensing in
cognitive PANs . . . . . . . . . . . . . 605--617
Zhengqing Hu and
Chen-Khong Tham CCMAC: Coordinated cooperative MAC for
wireless LANs . . . . . . . . . . . . . 618--630
Volodymyr Pryyma and
Damla Turgut and
Ladislau Bölöni Active time scheduling for rechargeable
sensor networks . . . . . . . . . . . . 631--640
Jeongkeun Lee and
Jiho Ryu and
Sung-Ju Lee and
Ted Taekyoung Kwon Improved modeling of IEEE 802.11a PHY
through fine-grained measurements . . . 641--657
Tal Rusak and
Philip Levis Physically-based models of low-power
wireless links using signal power
simulation . . . . . . . . . . . . . . . 658--673
Anonymous Editorial Board . . . . . . . . . . . . ??
Stephanos Androutsellis-Theotokis and
Diomidis Spinellis and
Panos Louridas and
Kostas Stroggylos A market-based approach to managing the
risk of peer-to-peer transactions . . . 675--688
Zhonghong Ou and
Erkki Harjula and
Otso Kassinen and
Mika Ylianttila Performance evaluation of a
Kademlia-based communication-oriented
P2P system under churn . . . . . . . . . 689--705
D. M. Shan and
K. C. Chua and
G. Mohan On burst rescheduling in OBS networks
with partial wavelength conversion
capability . . . . . . . . . . . . . . . 706--715
Bin Wu and
Kwan L. Yeung and
Pin-Han Ho ILP formulations for non-simple
$p$-cycle and $p$-trail design in WDM
mesh networks . . . . . . . . . . . . . 716--725
Celal Çeken and
Serhan Yarkan and
Hüseyin Arslan Interference aware vertical handoff
decision algorithm for quality of
service support in wireless
heterogeneous networks . . . . . . . . . 726--740
Ioannis Anagnostopoulos and
Christos Anagnostopoulos and
Dimitrios D. Vergados Estimating evolution of freshness in
Internet cache directories under the
capture--recapture methodology . . . . . 741--765
Gagan Raj Gupta and
Ness B. Shroff Practical scheduling schemes with
throughput guarantees for multi-hop
wireless networks . . . . . . . . . . . 766--780
Luis Rodero-Merino and
Antonio Fernández Anta and
Luis López and
Vicent Cholvi Performance of random walks in one-hop
replication networks . . . . . . . . . . 781--796
Doraid Dalalah Real-time optimization flow control . . 797--810
Ming Lei and
Susan V. Vrbsky and
Yang Xiao Scheduling on-demand data broadcast in
mixed-type request environments . . . . 811--825
Javad Akbari Torkestani and
Mohammad Reza Meybodi An intelligent backbone formation
algorithm for wireless ad hoc networks
based on distributed learning automata 826--843
Seungjoon Lee and
Bobby Bhattacharjee and
Suman Banerjee and
Bo Han A general framework for efficient
geographic routing in wireless networks 844--861
N. M. Mosharaf Kabir Chowdhury and
Raouf Boutaba A survey of network virtualization . . . 862--876
Guido Urdaneta and
Guillaume Pierre and
Maarten van Steen Corrigendum to ``Wikipedia workload
analysis for decentralized hosting''
[Computer Networks 53 (11) (2009)
1830--1845] . . . . . . . . . . . . . . 877--878
Anonymous Editorial Board . . . . . . . . . . . . ??
Eitan Altman and
Tamer Ba\csar and
Emma Hart and
Daniele Miorandi and
Aris L. Moustakas and
Stavros Toumpis Special issue on ``New Network
Paradigms'' . . . . . . . . . . . . . . 879--880
Falko Dressler and
Ozgur B. Akan A survey on bio-inspired networking . . 881--900
Michael Meisel and
Vasileios Pappas and
Lixia Zhang A taxonomy of biologically inspired
research in computer networking . . . . 901--916
Koichiro Kitagawa and
Toshiyuki Tanaka Optimization of sequences in CDMA
systems: a statistical--mechanics
approach . . . . . . . . . . . . . . . . 917--924
Yuedong Xu and
John C. S. Lui and
Dah-Ming Chiu On oligopoly spectrum allocation game in
cognitive radio networks with capacity
constraints . . . . . . . . . . . . . . 925--943
Daniele Miorandi and
Lidia Yamamoto and
Francesco De Pellegrini A survey of evolutionary and embryogenic
approaches to autonomic networking . . . 944--959
Andreas Konstantinidis and
Kun Yang and
Qingfu Zhang and
Demetrios Zeinalipour-Yazti A multi-objective evolutionary algorithm
for the deployment and power assignment
problem in wireless sensor networks . . 960--976
Cesar D. Guerrero and
Miguel A. Labrador Traceband: a fast, low overhead and
accurate tool for available bandwidth
estimation and monitoring . . . . . . . 977--990
Alessandro Nordio and
Carla-Fabiana Chiasserini and
Armando Muscariello Signal reconstruction in sensor networks
with flat and clustered topologies . . . 991--1004
Alonso Silva and
Eitan Altman and
Pierre Bernhard and
Mérouane Debbah Continuum equilibria and global
optimization for routing in dense static
ad hoc networks . . . . . . . . . . . . 1005--1018
Poul E. Heegaard and
Otto J. Wittner Overhead reduction in a distributed path
management system . . . . . . . . . . . 1019--1041
Huijuan Wang and
Piet Van Mieghem Sampling networks by the union of $m$
shortest path trees . . . . . . . . . . 1042--1053
Anonymous Editorial Board . . . . . . . . . . . . ??
Ram Keralapura and
Antonio Nucci and
Chen-Nee Chuah A novel self-learning architecture for
P2P traffic classification in high speed
networks . . . . . . . . . . . . . . . . 1055--1068
Lijun Wang and
Lin Cai and
Xinzhi Liu and
Xuemin (Sherman) Shen Bounds estimation and practical
stability of AIMD/RED systems with time
delays . . . . . . . . . . . . . . . . . 1069--1082
Eng Hwee Ong and
Jamil Y. Khan Cooperative radio resource management
framework for future IP-based multiple
radio access technologies environment 1083--1107
Iksoon Hwang and
Ana Cavalli Testing a probabilistic FSM using
interval estimation . . . . . . . . . . 1108--1125
John Felix Charles Joseph and
Amitabha Das and
Bu-Sung Lee and
Boon-Chong Seet CARRADS: Cross layer based adaptive
real-time routing attack detection
system for MANETS . . . . . . . . . . . 1126--1141
Simon Schütz and
Henrik Abrahamsson and
Bengt Ahlgren and
Marcus Brunner Design and implementation of the Node
Identity Internetworking Architecture 1142--1154
Jinchang Lu and
Maode Ma A cross-layer elastic CAC and holistic
opportunistic scheduling for QoS support
in WiMAX . . . . . . . . . . . . . . . . 1155--1168
Guanhua Yan and
Stephan Eidenbenz and
Sunil Thulasidasan and
Pallab Datta and
Venkatesh Ramaswamy Criticality analysis of Internet
infrastructure . . . . . . . . . . . . . 1169--1182
Rajashekhar Biradar and
Sunilkumar Manvi and
Mylara Reddy Link stability based multicast routing
scheme in MANET . . . . . . . . . . . . 1183--1196
Andrej Vilhar and
Roman Novak and
Gorazd Kandus The impact of network topology on the
performance of MAP selection algorithms 1197--1209
Beno\^\it Garbinato and
Adrian Holzer and
François Vessaz Context-aware broadcasting approaches in
mobile ad hoc networks . . . . . . . . . 1210--1228
Ke Xu and
Ming Zhang and
Jiangchuan Liu and
Zhijing Qin and
Mingjiang Ye Proxy caching for peer-to-peer live
streaming . . . . . . . . . . . . . . . 1229--1241
Valerio Targon and
Brunilde Sans\`o and
Antonio Capone Erratum to ``The joint Gateway Placement
and Spatial Reuse Problem in Wireless
Mesh Networks'' [Computer Networks 54
(2010) 231--240] . . . . . . . . . . . . 1242--1242
Anonymous Editorial Board . . . . . . . . . . . . ??
Bernhard Plattner and
David Hutchison and
James P. G. Sterbenz Resilient and survivable networks . . . 1243--1244
James P. G. Sterbenz and
David Hutchison and
Egemen K. Çetinkaya and
Abdul Jabbar and
Justin P. Rohrer and
Marcus Schöller and
Paul Smith Resilience and survivability in
communication networks: Strategies,
principles, and survey of disciplines 1245--1265
Daniel L. Guidoni and
Raquel A. F. Mini and
Antonio A. F. Loureiro On the design of resilient heterogeneous
wireless sensor networks based on small
world concepts . . . . . . . . . . . . . 1266--1281
Zhichun Li and
Yan Gao and
Yan Chen HiFIND: a high-speed flow-level
intrusion detection approach with DoS
resiliency . . . . . . . . . . . . . . . 1282--1299
Michael Menth and
Matthias Hartmann and
Rüdiger Martin and
Tarik \vCi\vci\'c and
Amund Kvalbein Loop-free alternates and not-via
addresses: a proper combination for IP
fast reroute? . . . . . . . . . . . . . 1300--1315
Kunwoo Park and
Sangheon Pack and
Ted ``Taekyoung'' Kwon An adaptive peer-to-peer live streaming
system with incentives for resilience 1316--1327
P. M. Santiago del Río and
J. A. Hernández and
J. Aracil and
J. E. López de Vergara and
J. Dom\.za\l and
R. Wójcik and
P. Cho\lda and
K. Wajda and
J. P. Fernández Palacios and
Ó. González de Dios and
R. Duque A reliability analysis of Double-Ring
topologies with Dual Attachment using
$p$-cycles for optical metro networks 1328--1341
Anonymous Editorial Board . . . . . . . . . . . . ??
Alexandre Viejo and
Jordi Castell\`a-Roca Using social networks to distort users'
profiles generated by Web search engines 1343--1357
Zvi Rosberg and
John Matthews and
Moshe Zukerman A network rate management protocol with
TCP congestion control and fairness for
all . . . . . . . . . . . . . . . . . . 1358--1374
Xingang Shi and
Dah-Ming Chiu and
John C. S. Lui An online framework for catching top
spreaders and scanners . . . . . . . . . 1375--1388
Pablo J. Argibay-Losada and
Andrés Suárez-González and
Cándido López-García and
Manuel Fernández-Veiga A new design for end-to-end proportional
loss differentiation in IP networks . . 1389--1403
Josep Domenech and
Jose A. Gil and
Julio Sahuquillo and
Ana Pont Using current Web page structure to
improve prefetching performance . . . . 1404--1417
Kyung-Hoe Kim and
Kwang-Min Jeong and
Chul-Hee Kang and
Seung-Joon Seok A transmission control SCTP for
real-time multimedia streaming . . . . . 1418--1425
Ming-Fei Guo and
Xinbing Wang and
Min-You Wu On the capacity of multi-packet
reception enabled multi-channel
multi-interface wireless networks . . . 1426--1439
Joydeep Chandra and
Santosh Kumar Shaw and
Niloy Ganguly HPC5: an efficient topology generation
mechanism for Gnutella networks . . . . 1440--1459
Yao Yu and
Lei Guo and
Xingwei Wang and
Cuixiang Liu Routing security scheme based on
reputation evaluation in hierarchical ad
hoc networks . . . . . . . . . . . . . . 1460--1469
Sabbir Ahmed and
Gour C. Karmakar and
Joarder Kamruzzaman An environment-aware mobility model for
wireless ad hoc network . . . . . . . . 1470--1489
S. Laki and
P. Mátray and
P. Hága and
I. Csabai and
G. Vattay A model based approach for improving
router geolocation . . . . . . . . . . . 1490--1501
Pedro Peris-Lopez and
Julio C. Hernandez-Castro and
Juan M. E. Tapiador and
Tieyan Li and
Yingjiu Li Vulnerability analysis of RFID protocols
for tag ownership transfer . . . . . . . 1502--1508
Eitan Altman and
Tania Jiménez and
Daniel Kofman Discriminatory processor sharing queues
with stationary ergodic service times
and the performance of TCP in overload 1509--1519
Tsu-Yang Wu and
Yuh-Min Tseng An efficient user authentication and key
exchange protocol for mobile
client--server environment . . . . . . . 1520--1530
Anonymous Editorial Board . . . . . . . . . . . . ??
António Pinto and
Manuel Ricardo Secure multicast in IPTV services . . . 1531--1542
Yueping Zhang and
Yong Xiong and
Steve Liu and
Dmitri Loguinov Queuing dynamics and single-link
stability of delay-based window
congestion control . . . . . . . . . . . 1543--1553
Sameer Qazi and
Tim Moors On the impact of routing matrix
inconsistencies on statistical path
monitoring in overlay networks . . . . . 1554--1572
Bazil Taha Ahmed and
Jose Luis Masa Campos and
Jorge A. Ruiz-Cruz Impact of Ultra Wide Band emission on
WiMAX systems at $ 2.5 $ and $ 3.5 $ GHz 1573--1583
Anatolij Zubow and
Daniel Camps Mur and
Xavier Perez Costa and
Paolo Favaro Greedy scheduling algorithm (GSA) ---
Design and evaluation of an efficient
and flexible WiMAX OFDMA scheduling
solution . . . . . . . . . . . . . . . . 1584--1606
Jesper H. Sòrensen and
Rasmus Krigslund and
Petar Popovski and
Toshiaki Koike Akino and
Torben Larsen Scalable DeNoise-and-Forward in
bidirectional relay networks . . . . . . 1607--1614
Konstantinos Oikonomou and
Dimitrios Kogias and
Ioannis Stavrakakis Probabilistic flooding for efficient
information dissemination in random
graph topologies . . . . . . . . . . . . 1615--1629
Lanny Sitanayah and
Amitava Datta and
Rachel Cardell-Oliver Heuristic algorithm for finding boundary
cycles in location-free low density
wireless sensor networks . . . . . . . . 1630--1645
Salekul Islam and
J. William Atwood Sender access and data distribution
control for inter-domain multicast
groups . . . . . . . . . . . . . . . . . 1646--1671
P. S. Kritzinger and
Henry Msiska and
Tino Mundangepfupfu and
Paolo Pileggi and
Andrew Symington Comparing the results from various
performance models of IEEE 802.11g DCF 1672--1682
G. Booker and
A. Sprintson and
E. Zechman and
C. Singh and
S. Guikema Efficient traffic loss evaluation for
transport backbone networks . . . . . . 1683--1691
Lyes Khoukhi and
Soumaya Cherkaoui Intelligent QoS management for
multimedia services support in wireless
mobile ad hoc networks . . . . . . . . . 1692--1706
Kai-Wei Ke and
Chen-Nien Tsai and
Ho-Ting Wu Performance analysis for hierarchical
resource allocation in multiplexed
mobile packet data networks . . . . . . 1707--1725
Anonymous Editorial Board . . . . . . . . . . . . ??
Hyang-Won Lee and
Jeong-woo Cho and
Song Chong Distributed max--min flow control for
multi-rate overlay multicast . . . . . . 1727--1738
Duc A. Tran and
Cuong Pham Enabling content-based publish/subscribe
services in cooperative P2P networks . . 1739--1749
P. Casas and
S. Vaton and
L. Fillatre and
I. Nikiforov Optimal volume anomaly detection and
isolation in large-scale IP networks
using coarse-grained measurements . . . 1750--1766
Xiang Feng and
Francis C. M. Lau Parallel physics-inspired waterflow
particle mechanics algorithm for load
rebalancing . . . . . . . . . . . . . . 1767--1777
Fragkiskos Papadopoulos On scaling the IEEE 802.11 to facilitate
scalable wireless networks . . . . . . . 1778--1791
Wissam Fawaz and
Iyad Ouaiss and
Ken Chen and
Harry Perros Deadline-based connection setup in
wavelength-routed WDM networks . . . . . 1792--1804
Evren Güney and
Necati Aras and
\.I. Kuban Altìnel and
Cem Ersoy Efficient integer programming
formulations for optimum sink location
and routing in heterogeneous wireless
sensor networks . . . . . . . . . . . . 1805--1822
Kaikai Chi and
Xiaohong Jiang and
Susumu Horiguchi Network coding-based reliable multicast
in wireless networks . . . . . . . . . . 1823--1836
Ruishan Zhang and
Xinyuan Wang and
Xiaohui Yang and
Xuxian Jiang On the billing vulnerabilities of
SIP-based VoIP systems . . . . . . . . . 1837--1847
Xiaohuan Yan and
Y. Ahmet \cSekercio\uglu and
Sathya Narayanan A survey of vertical handover decision
algorithms in Fourth Generation
heterogeneous wireless networks . . . . 1848--1863
Bheemarjuna Reddy Tamma and
Anirudh Badam and
C. Siva Ram Murthy and
Ramesh R. Rao $K$-Tree: a multiple tree video
multicast protocol for ad hoc wireless
networks . . . . . . . . . . . . . . . . 1864--1884
Jianning Mai and
Ashwin Sridharan and
Hui Zang and
Chen-Nee Chuah Fast Filtered Sampling . . . . . . . . . 1885--1898
Xiaofeng Lu and
Pan Hui and
Don Towsley and
Juahua Pu and
Zhang Xiong Anti-localization anonymous routing for
Delay Tolerant Network . . . . . . . . . 1899--1910
Yu-Chen Kuo Quorum-based power-saving multicast
protocols in the asynchronous ad hoc
network . . . . . . . . . . . . . . . . 1911--1922
Anonymous Editorial Board . . . . . . . . . . . . ??
Pedro García-López and
Michael W. Sobolewski and
Marc Sánchez-Artigas Guest editorial for the special issue
collaborative P2P systems . . . . . . . 1923--1925
Pierre St. Juste and
David Wolinsky and
P. Oscar Boykin and
Michael J. Covington and
Renato J. Figueiredo SocialVPN: Enabling wide-area
collaboration with integrated social and
overlay networks . . . . . . . . . . . . 1926--1938
Gérald Oster and
Rubén Mondéjar and
Pascal Molli and
Sergiu Dumitriu Building a collaborative peer-to-peer
wiki system on a structured overlay . . 1939--1952
Santosh Kulkarni and
Scott Douglas and
David Churchill Badumna: a decentralised network engine
for virtual environments . . . . . . . . 1953--1967
Marc S\`anchez-Artigas and
Jordi Pujol-Ahulló and
Lluis Pamies-Juarez and
Pedro García-López p2pWeb: an open, decentralized
infrastructure of Web servers for
sharing ephemeral Web content . . . . . 1968--1985
Krzysztof Rzadca and
Jackson Tan Teck Yong and
Anwitaman Datta Multi-objective optimization of
multicast overlays for collaborative
applications . . . . . . . . . . . . . . 1986--2006
Di Wu and
Chao Liang and
Yong Liu and
Keith W. Ross Redesigning multi-channel P2P live video
systems with View-Upload Decoupling . . 2007--2018
Odysseas Papapetrou and
Wolf Siberski and
Wolfgang Nejdl PCIR: Combining DHTs and peer clusters
for efficient full-text P2P indexing . . 2019--2040
Nicklas S. Beijar Zone indexing: Optimizing the balance
between searching and indexing in a
loosely structured overlay . . . . . . . 2041--2055
Juan M. Tirado and
Daniel Higuero and
Florin Isaila and
Jesús Carretero and
Adriana Iamnitchi Affinity P2P: a self-organizing
content-based locality-aware
collaborative peer-to-peer network . . . 2056--2070
Rubén Cuevas and
Ángel Cuevas and
Albert Cabellos-Aparicio and
Loránd Jakab and
Carmen Guerrero A collaborative P2P scheme for NAT
Traversal Server discovery based on
topological information . . . . . . . . 2071--2085
Gian Paolo Jesi and
Alberto Montresor and
Maarten van Steen Secure peer sampling . . . . . . . . . . 2086--2098
Anonymous Editorial Board . . . . . . . . . . . . ??
Michael Menth and
Frank Lehrieder PCN-based measured rate termination . . 2099--2116
Luci Pirmez and
Jaime C. Carvalho, Jr. and
Flávia C. Delicato and
Fábio Protti and
Luiz F. R. C. Carmo and
Paulo F. Pires and
Marcos Pirmez SUTIL --- Network selection based on
utility function and integer linear
programming . . . . . . . . . . . . . . 2117--2136
Xiaomao Mao and
Huifang Chen and
Peiliang Qiu and
Zhaoyang Zhang Energy-efficient scheduling for multiple
access in wireless sensor networks: a
job scheduling method . . . . . . . . . 2137--2146
Yu Ge and
Chen-Khong Tham and
Peng-Yong Kong and
Yew-Hock Ang Dynamic end-to-end capacity in IEEE
802.16 wireless mesh networks . . . . . 2147--2165
N. Akar and
C. Raffaelli and
M. Savi and
E. Karasan Shared-per-wavelength asynchronous
optical packet switching: a comparative
analysis . . . . . . . . . . . . . . . . 2166--2181
Chuan Yue and
Mengjun Xie and
Haining Wang An automatic HTTP cookie management
system . . . . . . . . . . . . . . . . . 2182--2198
C. Cano and
B. Bellalta and
A. Sfairopoulou and
J. Barceló Tuning the EDCA parameters in WLANs with
heterogeneous traffic: a flow-level
analysis . . . . . . . . . . . . . . . . 2199--2214
Eliana Stavrou and
Andreas Pitsillides A survey on secure multipath routing
protocols in WSNs . . . . . . . . . . . 2215--2238
Josephina Antoniou and
Vicky Papadopoulou and
Vasos Vassiliou and
Andreas Pitsillides Cooperative user--network interactions
in next generation communication
networks . . . . . . . . . . . . . . . . 2239--2255
Zahra Ahmadian and
Somayeh Salimi and
Ahmad Salahi Security enhancements against UMTS--GSM
interworking attacks . . . . . . . . . . 2256--2270
Preetha Thulasiraman and
Xuemin (Sherman) Shen Interference aware resource allocation
for hybrid hierarchical wireless
networks . . . . . . . . . . . . . . . . 2271--2280
Patrick Maillé and
Bruno Tuffin Price war in heterogeneous wireless
networks . . . . . . . . . . . . . . . . 2281--2292
Rully Adrian Santosa and
Bu-Sung Lee and
Chai Kiat Yeo Efficient DSR route request flooding
with directional antennas . . . . . . . 2293--2309
Jaideep D. Padhye and
Kush Kothari and
Madhu Venkateshaiah and
Matthew Wright Evading stepping-stone detection under
the cloak of streaming media with SNEAK 2310--2325
Anonymous Editorial Board . . . . . . . . . . . . ??
Gustavo Marfia and
Claudio E. Palazzi and
Giovanni Pau and
Mario Gerla and
Marco Roccetti TCP Libra: Derivation, analysis, and
comparison with other RTT-fair TCPs . . 2327--2344
Mohit Saxena and
Ramana Rao Kompella CLAMP: Efficient class-based sampling
for flexible flow monitoring . . . . . . 2345--2356
Oleg Berzin Hierarchical Mobility Label Based
Network: System model and performance
analysis . . . . . . . . . . . . . . . . 2357--2382
Robin Doss and
Gang Li and
Vicky Mak and
Menik Tissera Information discovery in
mission-critical wireless sensor
networks . . . . . . . . . . . . . . . . 2383--2399
Gilvan M. Durães and
André Soares and
José R. Amazonas and
William Giozza The choice of the best among the
shortest routes in transparent optical
networks . . . . . . . . . . . . . . . . 2400--2409
M. Esnaashari and
M. R. Meybodi A learning automata based scheduling
solution to the dynamic point coverage
problem in wireless sensor networks . . 2410--2438
Junyi Zhou and
Jing Shi Error analysis of non-collaborative
wireless localization in circular-shaped
regions . . . . . . . . . . . . . . . . 2439--2452
Stefano Secci and
Jean-Louis Rougier and
Achille Pattavina AS-level source routing for
multi-provider connection-oriented
services . . . . . . . . . . . . . . . . 2453--2467
Hyewon Lee and
Ilenia Tinnirello and
Jeonggyun Yu and
Sunghyun Choi A performance analysis of block ACK
scheme for IEEE 802.11e networks . . . . 2468--2481
Lei Zhang and
Bo Qin and
Qianhong Wu and
Futai Zhang Efficient many-to-one authentication
with certificateless aggregate
signatures . . . . . . . . . . . . . . . 2482--2491
Cristel Pelsser and
Steve Uhlig and
Tomonori Takeda and
Bruno Quoitin and
Kohei Shiomoto Providing scalable NH-diverse iBGP route
re-distribution to achieve sub-second
switch-over time . . . . . . . . . . . . 2492--2505
Wolfgang Mühlbauer and
Steve Uhlig and
Anja Feldmann and
Olaf Maennel and
Bruno Quoitin and
Bingjie Fu Impact of routing parameters on route
diversity and path inflation . . . . . . 2506--2518
Xavier Gelabert and
Oriol Sallent and
Jordi Pérez-Romero and
Ramon Agustí Spectrum sharing in cognitive radio
networks with imperfect sensing: a
discrete-time Markov model . . . . . . . 2519--2536
Beibei Wang and
Yongle Wu and
K. J. Ray Liu Game theory for cognitive radio
networks: an overview . . . . . . . . . 2537--2561
Yueping Zhang and
Dmitri Loguinov ABS: Adaptive buffer sizing for
heterogeneous networks . . . . . . . . . 2562--2574
Anonymous Editorial Board . . . . . . . . . . . . ??
Yigal Bejerano and
Seung-Jae Han and
Mark Smith A novel frequency planning algorithm for
mitigating unfairness in wireless LANs 2575--2590
Marcos A. Simplício, Jr. and
Paulo S. L. M. Barreto and
Cintia B. Margi and
Tereza C. M. B. Carvalho A survey on key management mechanisms
for distributed Wireless Sensor Networks 2591--2612
Hui Yang and
Stephen D. Patek and
Zhenyu Yan Strategies for adaptive smoothing and
rebuffering via dynamic network calculus 2613--2625
P. L. Conti and
L. De Giovanni and
M. Naldi Blind maximum likelihood estimation of
traffic matrices under long-range
dependent traffic . . . . . . . . . . . 2626--2639
Navid Ghazisaidi and
Martin Maier Techno-economic analysis of EPON and
WiMAX for future Fiber-Wireless (FiWi)
networks . . . . . . . . . . . . . . . . 2640--2650
R. Marin-Lopez and
F. Pereniguez and
F. Bernal and
A. F. Gomez Secure three-party key distribution
protocol for fast network access in
EAP-based wireless networks . . . . . . 2651--2673
Fu-Yi Hung and
Ivan Marsic Performance analysis of the IEEE 802.11
DCF in the presence of the hidden
stations . . . . . . . . . . . . . . . . 2674--2687
Hande Alemdar and
Cem Ersoy Wireless sensor networks for healthcare:
a survey . . . . . . . . . . . . . . . . 2688--2710
Gabriel Maciá-Fernández and
Rafael A. Rodríguez-Gómez and
Jesús E. Díaz-Verdejo Defense techniques for low-rate DoS
attacks against application servers . . 2711--2727
Qishi Wu and
Nageswara S. V. Rao and
Xukang Lu and
Ki-Hyeon Kwon Stabilizing transport dynamics of
control channels over wide-area networks 2728--2743
Xiaodong Lin and
Rongxing Lu and
Davis Kwan and
Xuemin (Sherman) Shen REACT: an RFID-based privacy-preserving
children tracking scheme for large
amusement parks . . . . . . . . . . . . 2744--2755
Xin Sun and
Ruben Torres and
Sanjay Rao Preventing DDoS attacks on Internet
servers exploiting P2P systems . . . . . 2756--2774
Hua Wang and
Xiangxu Meng and
Shuai Li and
Hong Xu A tree-based particle swarm optimization
for multicast routing . . . . . . . . . 2775--2786
Luigi Atzori and
Antonio Iera and
Giacomo Morabito The Internet of Things: a survey . . . . 2787--2805
Anonymous Editorial Board . . . . . . . . . . . . ??
Metin Feridun and
Joseph Hellerstein Editorial . . . . . . . . . . . . . . . 2807--2808
Qi Liao and
Andrew Blaich and
Dirk VanBruggen and
Aaron Striegel Managing networks through context: Graph
visualization and exploration . . . . . 2809--2824
Kevin Feeney and
Rob Brennan and
John Keeney and
Hendrik Thomas and
Dave Lewis and
Aidan Boran and
Declan O'Sullivan Enabling decentralised management
through federation . . . . . . . . . . . 2825--2839
Bin Guo and
Daqing Zhang and
Michita Imai Enabling user-oriented management for
ubiquitous computing: The meta-design
approach . . . . . . . . . . . . . . . . 2840--2855
Andreas Berl and
Nicholas Race and
Johnathan Ishmael and
Hermann de Meer Network virtualization in
energy-efficient office environments . . 2856--2868
Tridib Mukherjee and
Ayan Banerjee and
Georgios Varsamopoulos and
Sandeep K. S. Gupta Model-driven coordinated management of
data centers . . . . . . . . . . . . . . 2869--2886
Jacques M. Bahi and
Michel Salomon A decentralized energy-based diffusion
algorithm to increase the lifetime of
MANETs . . . . . . . . . . . . . . . . . 2887--2898
Félix Gómez Mármol and
Joao Girao and
Gregorio Martínez Pérez TRIMS, a privacy-aware trust and
reputation model for identity management
systems . . . . . . . . . . . . . . . . 2899--2912
Anonymous Editorial Board . . . . . . . . . . . . ??
Hél\`ene Le Cadre and
Mustapha Bouhtou An interconnection game between mobile
network operators: Hidden information
forecasting using expert advice fusion 2913--2942
Zhi Ang Eu and
Hwee-Pink Tan and
Winston K. G. Seah Opportunistic routing in wireless sensor
networks powered by ambient energy
harvesting . . . . . . . . . . . . . . . 2943--2966
Jongdeog Lee and
Krasimira Kapitanova and
Sang H. Son The price of security in wireless sensor
networks . . . . . . . . . . . . . . . . 2967--2978
Daniel F. Macedo and
Aldri L. dos Santos and
Luiz H. A. Correia and
José M. Nogueira and
Guy Pujolle Transmission power and data rate aware
routing on wireless networks . . . . . . 2979--2990
Luis Cobo and
Alejandro Quintero and
Samuel Pierre Ant-based routing for wireless
multimedia sensor networks using
multiple QoS metrics . . . . . . . . . . 2991--3010
Seongkwan Kim and
Lochan Verma and
Sunghyun Choi and
Daji Qiao Collision-Aware Rate Adaptation in
multi-rate WLANs: Design and
implementation . . . . . . . . . . . . . 3011--3030
George Alyfantis and
Stathes Hadjiefthymiades and
Lazaros Merakos Distributed QoS-sensitive band selection
strategies for dynamic spectrum access
in unlicensed CDMA networks . . . . . . 3031--3048
Ming-Fong Tsai and
Tzu-Chi Huang and
Ce-Kuen Shieh and
Kuo-Chih Chu Dynamical combination of byte level and
Sub-Packet level FEC in HARQ mechanism
to reduce error recovery overhead on
video streaming over wireless networks 3049--3067
Taiming Feng and
Long Long and
Ahmed E. Kamal and
Lu Ruan Two-link failure protection in WDM mesh
networks with $p$-cycles . . . . . . . . 3068--3080
Rosario G. Garroppo and
Stefano Giordano and
Luca Tavanti A survey on multi-constrained optimal
path computation: Exact and approximate
algorithms . . . . . . . . . . . . . . . 3081--3107
Ying Zhang and
Damien Fay and
Liam Kilmartin and
Andrew W. Moore A Garch-based adaptive playout delay
algorithm for VoIP . . . . . . . . . . . 3108--3122
Pablo Belzarena and
Laura Aspirot End-to-end quality of service seen by
applications: a statistical learning
approach . . . . . . . . . . . . . . . . 3123--3143
René Serral-Graci\`a and
Marcelo Yannuzzi and
Yann Labit and
Philippe Owezarski and
Xavi Masip-Bruin An efficient and lightweight method for
Service Level Agreement assessment . . . 3144--3158
Cunqing Hua and
Rong Zheng On link-level starvation in dense 802.11
wireless community networks . . . . . . 3159--3172
Shaohe Lv and
Xiaodong Wang and
Xingming Zhou On the rate adaptation for IEEE 802.11
wireless networks . . . . . . . . . . . 3173--3186
Yuan Rao and
Ru-chuan Wang Agent-based load balancing routing for
LEO satellite networks . . . . . . . . . 3187--3195
Anonymous Editorial Board . . . . . . . . . . . . ??
Gregor v. Bochmann and
Dave Rayner and
Colin H. West Some notes on the history of protocol
engineering . . . . . . . . . . . . . . 3197--3209
Chao Chen and
Zesheng Chen and
Yubin Li Characterizing and defending against
divide-conquer-scanning worms . . . . . 3210--3222
Eiji Oki and
Ayako Iwaki Fine two-phase routing over shortest
paths with traffic matrix . . . . . . . 3223--3231
Craig A. Shue and
Minaxi Gupta An Internet without the Internet
protocol . . . . . . . . . . . . . . . . 3232--3245
Dimitrios P. Pezaros and
Konstantinos Georgopoulos and
David Hutchison High-speed, in-band performance
measurement instrumentation for next
generation IP networks . . . . . . . . . 3246--3263
Abdeltouab Belbekkouche and
Abdelhakim Hafid and
Mariam Tagmouti and
Michel Gendreau Topology-aware wavelength partitioning
for DWDM OBS networks: a novel approach
for absolute QoS provisioning . . . . . 3264--3279
Houda Labiod and
Hai Lin and
Riccardo Nonni Analytical study of intradomain handover
in multiple-mobile-routers-based
multihomed NEMO networks . . . . . . . . 3280--3294
Jongwook Lee and
Saewoong Bahk and
Jin-Ghoo Choi Energy efficient transmission scheduling
for infrastructure sensor nodes in
location systems . . . . . . . . . . . . 3295--3308
Tian Bu and
Jin Cao and
Aiyou Chen and
Patrick P. C. Lee Sequential hashing: a flexible approach
for unveiling significant patterns in
high speed networks . . . . . . . . . . 3309--3326
Hongbo Jiang and
Zihui Ge and
Shudong Jin and
Jia Wang Network prefix-level traffic profiling:
Characterizing, modeling, and evaluation 3327--3340
Mustafizur Rahman and
Rajiv Ranjan and
Rajkumar Buyya Reputation-based dependable scheduling
of workflow applications in Peer-to-Peer
Grids . . . . . . . . . . . . . . . . . 3341--3359
Stylianos Dimitriou and
Vassilis Tsaoussidis Promoting effective service
differentiation with Size-oriented Queue
Management . . . . . . . . . . . . . . . 3360--3372
Benoit Donnet and
Bruno Baynat and
Timur Friedman Improving retouched Bloom filter for
trading off selected false positives
against false negatives . . . . . . . . 3373--3387
Loránd Jakab and
Albert Cabellos-Aparicio and
Thomas Silverston and
Marc Solé and
Florin Coras and
Jordi Domingo-Pascual CoreCast: How core/edge separation can
help improving inter-domain live
streaming . . . . . . . . . . . . . . . 3388--3401
Sara Alouf and
Giovanni Neglia and
Iacopo Carreras and
Daniele Miorandi and
Álvaro Fialho Fitting genetic algorithms to
distributed on-line evolution of network
protocols . . . . . . . . . . . . . . . 3402--3420
Dimitris E. Charilas and
Athanasios D. Panagopoulos A survey on game theory applications in
wireless networks . . . . . . . . . . . 3421--3430
Shao Tao and
A. L. Ananda and
Mun Choon Chan Greedy face routing with face
identification support in wireless
networks . . . . . . . . . . . . . . . . 3431--3448
Mehmet Yunus Donmez and
Rabun Kosar and
Cem Ersoy An analytical approach to the deployment
quality of surveillance wireless sensor
networks considering the effect of
jammers and coverage holes . . . . . . . 3449--3466
Ian F. Akyildiz and
Harry Rudin Editorial . . . . . . . . . . . . . . . 1--2
Daniel M. Batista and
Nelson L. S. da Fonseca Robust scheduler for grid networks under
uncertainties of both application
demands and resource availability . . . 3--19
Ying Li and
Antonis Papachristodoulou and
Mung Chiang and
A. Robert Calderbank Congestion control and its stability in
networks with delay sensitive traffic 20--32
T. Heikkinen and
A. Hottinen Distributed subchannel assignment in a
two-hop network . . . . . . . . . . . . 33--44
Ihsan Ayyub Qazi and
Taieb Znati On the design of load factor based
congestion control protocols for
next-generation networks . . . . . . . . 45--60
Mine Altunay and
Sven Leyffer and
Jeffrey T. Linderoth and
Zhen Xie Optimal response to attacks on the open
science grid . . . . . . . . . . . . . . 61--73
Juan J. Alcaraz and
Esteban Egea-López and
Javier Vales-Alonso and
Joan García-Haro Dynamic system model for optimal
configuration of mobile RFID systems . . 74--83
Nadjib Aitsaadi and
Nadjib Achir and
Khaled Boussetta and
Guy Pujolle Artificial potential field approach in
WSN deployment: Cost, QoM, connectivity,
and lifetime constraints . . . . . . . . 84--105
Jocelyne Elias and
Fabio Martignon and
Konstantin Avrachenkov and
Giovanni Neglia A game theoretic analysis of network
design with socially-aware users . . . . 106--118
Josep Domingo-Ferrer and
Úrsula González-Nicolás Decapitation of networks with and
without weights and direction: The
economics of iterated attack and defense 119--130
Zehua Zhou and
Xiaojing Xiang and
Xin Wang and
Jianping Pan A holistic sensor network design for
energy conservation and efficient data
dissemination . . . . . . . . . . . . . 131--146
Younghyun Kim and
Sangheon Pack and
Chung Gu Kang and
Soonjun Park An enhanced information server for
seamless vertical handover in IEEE
802.21 MIH networks . . . . . . . . . . 147--158
Abdeltouab Belbekkouche and
Jihene Rezgui and
Abdelhakim Hafid Wireless mesh and optical burst
switching convergence for a novel
metropolitan area network architecture 159--172
Xavier Gelabert and
Oriol Sallent and
Jordi Pérez-Romero and
Ramon Agustí Performance evaluation of radio access
selection strategies in constrained
multi-access/multi-service wireless
networks . . . . . . . . . . . . . . . . 173--192
Darli A. A. Mello and
Helio Waldman and
Gustavo S. Quitério Interval availability estimation for
protected connections in optical
networks . . . . . . . . . . . . . . . . 193--204
Tao Zhou and
Jing Xu Provable secure authentication protocol
with anonymity for roaming service in
global mobility networks . . . . . . . . 205--213
Ashraf Al Daoud and
Murat Alanyali and
David Starobinski Reservation policies for revenue
maximization from secondary spectrum
access in cellular networks . . . . . . 214--224
Donggook Kim and
Jaesub Kim and
Kyu Ho Park An event-aware MAC scheduling for energy
efficient aggregation in wireless sensor
networks . . . . . . . . . . . . . . . . 225--240
Kyungmin Cho and
Younghyun Ju and
Sungjae Jo and
Yunseok Rhee and
Junehwa Song SATI: a scalable and traffic-efficient
data delivery infrastructure for
real-time sensing applications . . . . . 241--263
S. Guo and
M. Derakhshani and
M. H. Falaki and
U. Ismail and
R. Luk and
E. A. Oliver and
S. Ur Rahman and
A. Seth and
M. A. Zaharia and
S. Keshav Design and implementation of the
KioskNet system . . . . . . . . . . . . 264--281
George C. Hadjichristofi and
Luiz A. DaSilva and
Scott F. Midkiff and
Unghee Lee and
Waltemar De Sousa Routing, security, resource management,
and monitoring in ad hoc networks:
Implementation and integration . . . . . 282--299
Sabina Serbu and
Pascal Felber and
Peter Kropf HyPeer: Structured overlay with
flexible-choice routing . . . . . . . . 300--313
Ren-Song Ko A distributed routing algorithm for
sensor networks derived from macroscopic
models . . . . . . . . . . . . . . . . . 314--329
Kiam Cheng How and
Maode Ma and
Yang Qin Routing and QoS provisioning in
cognitive radio networks . . . . . . . . 330--342
Can Zhao and
Xiaojun Lin On the queue-overflow probabilities of a
class of distributed scheduling
algorithms . . . . . . . . . . . . . . . 343--355
Christos P. Antonopoulos On BS/BS coordination towards
interference minimization in WiMAX
networks . . . . . . . . . . . . . . . . 356--369
Anonymous Editorial Board . . . . . . . . . . . . ??
Eitan Altman and
Sajal K. Das and
Luciano Lenzini and
Adam Wolisz Preface . . . . . . . . . . . . . . . . 371--373
Sabrina Gaito and
Elena Pagani and
Gian Paolo Rossi Strangers help friends to communicate in
opportunistic networks . . . . . . . . . 374--385
Marco Ajmone Marsan and
Michela Meo Energy efficient wireless Internet
access with cooperative cellular
networks . . . . . . . . . . . . . . . . 386--398
Ioannis Psaras and
Lefteris Mamatas On Demand Connectivity Sharing: Queuing
management and load balancing for
User-Provided Networks . . . . . . . . . 399--414
Chakchai So-In and
Raj Jain and
Subharthi Paul and
Jianli Pan Virtualization architecture using the
ID/Locator split concept for Future
Wireless Networks (FWNs) . . . . . . . . 415--430
Mariana Dirani and
Zwi Altman Self-organizing networks in next
generation radio access networks:
Application to fractional power control 431--438
Gergely Biczók and
László Toka and
András Gulyás and
Tuan A. Trinh and
Attila Vidács Incentivizing the global wireless
village . . . . . . . . . . . . . . . . 439--456
Mario Gerla and
Leonard Kleinrock Vehicular networks and the future of the
mobile Internet . . . . . . . . . . . . 457--469
Sulan Wong and
Eitan Altman and
Julio Rojas-Mora Internet access: Where law, economy,
culture and technology meet . . . . . . 470--479
Lijun Chen and
Steven H. Low and
John C. Doyle Cross-layer design in multihop wireless
networks . . . . . . . . . . . . . . . . 480--496
Anonymous Editorial Board . . . . . . . . . . . . ??
Fei Yang and
Isabelle Augé-Blum Delivery ratio-maximized wakeup
scheduling for ultra-low duty-cycled
WSNs under real-time constraints . . . . 497--513
Josip Lorincz and
Antonio Capone and
Dinko Begu\vsi\'c Optimized network management for energy
savings of wireless access networks . . 514--540
Stevens Le Blond and
Arnaud Legout and
Walid Dabbous Pushing BitTorrent locality to the limit 541--557
Luca De Cicco and
Saverio Mascolo and
Vittorio Palmisano Skype Video congestion control: an
experimental investigation . . . . . . . 558--571
Ivan D. Barrera and
Gonzalo R. Arce and
Stephan Bohacek Statistical approach for congestion
control in gateway routers . . . . . . . 572--582
Juan J. Gálvez and
Pedro M. Ruiz and
Antonio F. G. Skarmeta Multipath routing with spatial
separation in wireless multi-hop
networks without location information 583--599
Ivan Vidal and
Jaime Garcia-Reinoso and
Ignacio Soto and
Francisco Valera Evaluating extensions to IMS session
setup for multicast-based many-to-many
services . . . . . . . . . . . . . . . . 600--621
Katarzyna Kosek-Szott and
Marek Natkaniec and
Andrzej R. Pach A simple but accurate throughput model
for IEEE 802.11 EDCA in saturation and
non-saturation conditions . . . . . . . 622--635
Pei-chun Cheng and
Beichuan Zhang and
Daniel Massey and
Lixia Zhang Identifying BGP routing table transfers 636--649
Soonmok Kwon and
Jae Hoon Ko and
Jeongkyu Kim and
Cheeha Kim Dynamic timeout for data aggregation in
wireless sensor networks . . . . . . . . 650--664
P. Pavon-Marino and
B. Garcia-Manrubia and
R. Aparicio-Pardo Multi-hour network planning based on
domination between sets of traffic
matrices . . . . . . . . . . . . . . . . 665--675
Xingwei Wang and
Weigang Hou and
Lei Guo and
Jiannong Cao and
Dingde Jiang Energy saving and cost reduction in
multi-granularity green optical networks 676--688
Christophoros Christophorou and
Andreas Pitsillides and
Tomas Lundborg Enhanced radio resource management
algorithms for efficient MBMS service
provision in UTRAN . . . . . . . . . . . 689--710
Lei Li and
Baoxian Zhang and
Xiaojun Shen and
Jun Zheng and
Zheng Yao A study on the weak barrier coverage
problem in wireless sensor networks . . 711--721
Jenq-Shiou Leu and
Cheng-Wei Tsai and
Wei-Hsiang Lin Resource searching in an unstructured
P2P network based on Cloning Random
Walker assisted by Dominating Set . . . 722--733
Yan Cai and
Patrick P. C. Lee and
Weibo Gong and
Don Towsley Analysis of traffic correlation attacks
on router queues . . . . . . . . . . . . 734--747
Bin Wu and
Kwan L. Yeung and
Bing Hu and
Pin-Han Ho $ M^2$-CYCLE: an optical layer algorithm
for fast link failure detection in
all-optical mesh networks . . . . . . . 748--758
Natalia Castro Fernandes and
Otto Carlos Muniz Bandeira Duarte A lightweight group-key management
protocol for secure ad-hoc-network
routing . . . . . . . . . . . . . . . . 759--778
Maria Gregori and
Ignacio Llatser and
Albert Cabellos-Aparicio and
Eduard Alarcón Physical channel characterization for
medium-range nanonetworks using
flagellated bacteria . . . . . . . . . . 779--791
Nikolaos Chrysos and
Manolis Katevenis Distributed WFQ scheduling converging to
weighted max--min fairness . . . . . . . 792--806
Xingwei Wang and
Weigang Hou and
Lei Guo and
Jiannong Cao and
Dingde Jiang A new multi-granularity grooming
algorithm based on traffic partition in
IP over WDM networks . . . . . . . . . . 807--821
Fabrice Theoleyre A route-aware MAC for wireless multihop
networks with a convergecast traffic
pattern . . . . . . . . . . . . . . . . 822--837
DK Lee and
Keon Jang and
Changhyun Lee and
Gianluca Iannaccone and
Sue Moon Scalable and systematic Internet-wide
path and delay estimation from existing
measurements . . . . . . . . . . . . . . 838--855
B. Peng and
A. H. Kemp Energy-efficient geographic routing in
the presence of localization errors . . 856--872
Ravish Khosla and
Sonia Fahmy and
Y. Charlie Hu and
Jennifer Neville Prediction models for long-term Internet
prefix availability . . . . . . . . . . 873--889
Anonymous Editorial Board . . . . . . . . . . . . ??
Lars Eggert and
Tilman Wolf Special Issue on Architectures and
Protocols for the Future Internet . . . 891--892
Xavier Sanchez-Loro and
José Luis Ferrer and
Carles Gomez and
Jordi Casademont and
Josep Paradells Can Future Internet be based on
constrained networks design principles? 893--909
Denis Martin and
Lars Völker and
Martina Zitterbart A flexible framework for Future Internet
design, assessment, and operation . . . 910--918
Joe Touch and
Ilia Baldine and
Rudra Dutta and
Gregory G. Finn and
Bryan Ford and
Scott Jordan and
Dan Massey and
Abraham Matta and
Christos Papadopoulos and
Peter Reiher and
George Rouskas A Dynamic Recursive Unified Internet
Design (DRUID) . . . . . . . . . . . . . 919--935
Konstantinos Katsaros and
George Xylomenos and
George C. Polyzos MultiCache: an overlay architecture for
information-centric networking . . . . . 936--947
Luigi Iannone and
Damien Saucez and
Olivier Bonaventure Implementing the Locator/ID Separation
Protocol: Design and experience . . . . 948--958
Hongbin Luo and
Hongke Zhang and
Moshe Zukerman Decoupling the design of
identifier-to-locator mapping services
from identifiers . . . . . . . . . . . . 959--974
Jarno Rajahalme and
Mikko Särelä and
Kari Visala and
Janne Riihijärvi On name-based inter-domain routing . . . 975--986
M. Sifalakis and
A. Louca and
G. Bouabene and
M. Fry and
A. Mauthe and
D. Hutchison Functional composition in future
networks . . . . . . . . . . . . . . . . 987--998
Brent Mochizuki and
Firat Kiyak and
Eric Keller and
Matthew Caesar Better by a HAIR: hardware-amenable
Internet routing . . . . . . . . . . . . 999--1010
Ines Houidi and
Wajdi Louati and
Walid Ben Ameur and
Djamal Zeghlache Virtual network provisioning across
multiple substrate networks . . . . . . 1011--1023
Jianxin Liao and
Jingyu Wang and
Tonghong Li and
Xiaomin Zhu Introducing multipath selection for
concurrent multipath transfer in the
future Internet . . . . . . . . . . . . 1024--1035
Anonymous Editorial Board . . . . . . . . . . . . ??
Ehud Doron and
Avishai Wool WDA: a Web farm Distributed Denial of
Service attack attenuator . . . . . . . 1037--1051
Bikash Kumar Dey and
D. Manjunath and
Supriyo Chakraborty Estimating network link characteristics
using packet-pair dispersion: a
discrete-time queueing theoretic
analysis . . . . . . . . . . . . . . . . 1052--1068
Choonha Hwang and
Elmurod Talipov and
Hojung Cha Distributed geographic service discovery
for mobile sensor networks . . . . . . . 1069--1082
Valentín Carela-Español and
Pere Barlet-Ros and
Albert Cabellos-Aparicio and
Josep Solé-Pareta Analysis of the impact of sampling on
NetFlow traffic classification . . . . . 1083--1099
Lluis Pamies-Juarez and
Pedro García-López and
Marc Sánchez-Artigas and
Blas Herrera Towards the design of optimal data
redundancy schemes for heterogeneous
cloud storage infrastructures . . . . . 1100--1113
Vassilis E. Zafeiris and
E. A. Giakoumakis Optimized traffic flow assignment in
multi-homed, multi-radio mobile hosts 1114--1131
P. Mérindol and
P. François and
O. Bonaventure and
S. Cateloin and
J.-J. Pansiot An efficient algorithm to enable path
diversity in link state routing networks 1132--1149
Pu Wang and
Zhi Sun and
Mehmet C. Vuran and
Mznah A. Al-Rodhaan and
Abdullah M. Al-Dhelaan and
Ian F. Akyildiz On network connectivity of wireless
sensor networks for sandstorm monitoring 1150--1157
Maurizio Dusi and
Francesco Gringoli and
Luca Salgarelli Quantifying the accuracy of the ground
truth associated with Internet traffic
traces . . . . . . . . . . . . . . . . . 1158--1167
Igor Bilogrevic and
Mohammad Hossein Manshaei and
Maxim Raya and
Jean-Pierre Hubaux OREN: Optimal revocations in ephemeral
networks . . . . . . . . . . . . . . . . 1168--1180
N. Akar and
M. A. Toksöz MPLS automatic bandwidth allocation via
adaptive hysteresis . . . . . . . . . . 1181--1196
Tobias Hoßfeld and
Frank Lehrieder and
David Hock and
Simon Oechsner and
Zoran Despotovic and
Wolfgang Kellerer and
Maximilian Michel Characterization of BitTorrent swarms
and their distribution in the Internet 1197--1215
Robert J. Walls and
Kush Kothari and
Matthew Wright Liquid: a detection-resistant covert
timing channel based on IPD shaping . . 1217--1228
Srikanth Hariharan and
Ness B. Shroff and
Saurabh Bagchi Secure neighbor discovery through
overhearing in static multihop wireless
networks . . . . . . . . . . . . . . . . 1229--1241
Guoqiang Zhang and
Guoqing Zhang and
Suqi Cheng LANC: Locality-aware network coding for
better P2P traffic localization . . . . 1242--1256
Alexander Shpiner and
Isaac Keslassy Modeling the interactions of congestion
control and switch scheduling . . . . . 1257--1275
Mohammad Sadegh Talebi and
Ahmad Khonsari and
Amin Mohtasham and
Ali Abbasi Cost-aware monitoring of network-wide
aggregates in wireless sensor networks 1276--1290
Jinchang Lu and
Maode Ma Cognitive radio-based framework and
self-optimizing temporal-spectrum block
scheduling for QoS provisioning in WiMAX 1291--1309
Alex Bikfalvi and
Jaime García-Reinoso and
Iván Vidal and
Francisco Valera and
Arturo Azcorra P2P vs. IP multicast: Comparing
approaches to IPTV streaming based on TV
channel popularity . . . . . . . . . . . 1310--1325
Riyad Alshammari and
A. Nur Zincir-Heywood Can encrypted traffic be identified
without port numbers, IP addresses and
payload inspection? . . . . . . . . . . 1326--1350
Takanori Kudo and
Tetsuya Takine Design of a sliding window scheme for
detecting high packet-rate flows via
random packet sampling . . . . . . . . . 1351--1363
Christian Esteve Rothenberg and
Carlos Alberto Braz Macapuna and
Maurício Ferreira Magalhães and
Fábio Luciano Verdi and
Alexander Wiesmaier In-packet Bloom filters: Design and
networking applications . . . . . . . . 1364--1378
Chi-ho Lam and
Wing Cheong Lau and
Onching Yue Enhancing distributed traffic monitoring
via traffic digest splitting . . . . . . 1379--1393
Paola Bermolen and
Marco Mellia and
Michela Meo and
Dario Rossi and
Silvio Valenti Abacus: Accurate behavioral
classification of P2P-TV traffic . . . . 1394--1411
Dimitrios Zorbas and
Christos Douligeris Connected coverage in WSNs based on
critical targets . . . . . . . . . . . . 1412--1425
Dogu Arifler Capacity analysis of a diffusion-based
short-range molecular nano-communication
channel . . . . . . . . . . . . . . . . 1426--1434
J. Ramos and
P. M. Santiago del Río and
J. Aracil and
J. E. López de Vergara On the effect of concurrent applications
in bandwidth measurement speedometers 1435--1453
Anonymous Editorial Board . . . . . . . . . . . . ??
P. Rost and
R. Boutaba and
K. Doppler and
A. Gumaste Recent Advances in Network Convergence 1455--1458
R. Stankiewicz and
A. Jajszczyk A survey of QoE assurance in converged
networks . . . . . . . . . . . . . . . . 1459--1473
Ivan Vidal and
Antonio de la Oliva and
Jaime Garcia-Reinoso and
Ignacio Soto TRIM: an architecture for transparent
IMS-based mobility . . . . . . . . . . . 1474--1486
Nemanja Vucevi\'c and
Jordi Pérez-Romero and
Oriol Sallent and
Ramon Agustí Reinforcement learning for joint radio
resource management in LTE--UMTS
scenarios . . . . . . . . . . . . . . . 1487--1497
Pedro Neves and
João Soares and
Susana Sargento and
Hugo Pires and
Francisco Fontes Context-aware media independent
information server for optimized
seamless handover procedures . . . . . . 1498--1519
Joon-Myung Kang and
John Strassner and
Sin-seok Seo and
James Won-Ki Hong Autonomic personalized handover
decisions for mobile services in
heterogeneous wireless networks . . . . 1520--1532
Natasa Vulic and
Sonia M. Heemstra de Groot and
Ignas G. M. M. Niemegeers Vertical handovers among different
wireless technologies in a UMTS radio
access-based integrated architecture . . 1533--1548
Abbas Jamalipour and
Farshad Javadi and
Kumudu S. Munasinghe Resource competition in a converged
heterogeneous networking ecosystem . . . 1549--1559
Zoltán Faigl and
László Bokor and
Pedro Miguel Neves and
Khadija Daoud and
Philippe Herbelin Evaluation of two integrated signalling
schemes for the Ultra Flat Architecture
using SIP, IEEE 802.21, and HIP/PMIP
protocols . . . . . . . . . . . . . . . 1560--1575
Djamal-Eddine Meddour and
Tinku Rasheed and
Yvon Gourhant On the role of infrastructure sharing
for mobile network operators in emerging
markets . . . . . . . . . . . . . . . . 1576--1591
B. Ishibashi and
N. Bouabdallah and
R. Boutaba QoS capacity of virtual wireless
networks . . . . . . . . . . . . . . . . 1592--1613
Damien Leroy and
Gregory Detal and
Julien Cathalo and
Mark Manulis and
François Koeune and
Olivier Bonaventure SWISH: Secure WiFi sharing . . . . . . . 1614--1630
Anonymous Editorial Board . . . . . . . . . . . . ??
D. Benyamina and
A. Hafid and
M. Gendreau and
J. C. Maureira On the design of reliable wireless mesh
network infrastructure with QoS
constraints . . . . . . . . . . . . . . 1631--1647
Ning Weng and
Luke Vespa and
Benfano Soewito Deep packet pre-filtering and finite
state encoding for adaptive intrusion
detection system . . . . . . . . . . . . 1648--1661
M. Govindarajan and
R. M. Chandrasekaran Intrusion detection using neural based
hybrid classification methods . . . . . 1662--1671
M. Caretti and
C. Cicconetti and
D. Franceschini and
L. Lenzini and
D. Migliorini and
E. Mingozzi and
R. Rossi and
D. Sabella Efficient downlink scheduling with power
boosting in mobile IEEE 802.16 networks 1672--1683
Michael Rossberg and
Guenter Schaefer A survey on automatic configuration of
virtual private networks . . . . . . . . 1684--1699
Hee-Tae Roh and
Jang-Won Lee User-level satisfaction aware end-to-end
rate control in communication networks 1700--1710
Jui Teng Wang Rate adaptation with joint receive
diversity and power control for
cognitive radio networks . . . . . . . . 1711--1718
Jen-Jee Chen and
Ling Lee and
Yu-Chee Tseng Integrating SIP and IEEE 802.11e to
support handoff and multi-grade QoS for
VoIP-over-WLAN applications . . . . . . 1719--1734
Suat Ozdemir and
Yang Xiao Integrity protecting hierarchical
concealed data aggregation for wireless
sensor networks . . . . . . . . . . . . 1735--1746
Lei You and
Lianghui Ding and
Ping Wu and
Zhiwen Pan and
Honglin Hu and
Mei Song and
Junde Song Cross-layer optimization of wireless
multihop networks with one-hop two-way
network coding . . . . . . . . . . . . . 1747--1769
Nelson I. Dopico and
Álvaro Gutiérrez and
Santiago Zazo Performance analysis of a delay tolerant
application for herd localization . . . 1770--1783
Anis Jdidi and
Tijani Chahed Flow-level performance of proportional
fairness with hierarchical modulation in
OFDMA-based networks . . . . . . . . . . 1784--1793
M. Dakkak and
A. Nakib and
B. Daachi and
P. Siarry and
J. Lemoine Indoor localization method based on RTT
and AOA using coordinates clustering . . 1794--1803
Rafael P. Laufer and
Pedro B. Velloso and
Otto Carlos M. B. Duarte A Generalized Bloom Filter to Secure
Distributed Network Applications . . . . 1804--1819
A. Detti and
N. Blefari-Melazzi and
I. Habib and
A. Ordine Per-station throughput fairness in a
WLAN hot-spot with TCP traffic . . . . . 1820--1833
Daniel F. Macedo and
Aldri L. dos Santos and
José M. Nogueira and
Guy Pujolle Fuzzy-based load self-configuration in
mobile P2P services . . . . . . . . . . 1834--1848
Ali Fanian and
Mehdi Berenjkoub and
Hossein Saidi and
T. Aaron Gulliver A high performance and intrinsically
secure key establishment protocol for
wireless sensor networks . . . . . . . . 1849--1863
Zhihua Wen and
Michael Rabinovich Dynamic landmark triangles: a simple and
efficient mechanism for inter-host
latency estimation . . . . . . . . . . . 1864--1879
Konstantin Avrachenkov and
Alexander Dudin and
Valentina Klimenok and
Philippe Nain and
Olga Semenova Optimal threshold control by the robots
of Web search engines with obsolescence
of documents . . . . . . . . . . . . . . 1880--1893
Mamoun F. Al-Mistarihi and
Mohammad Al-Shurman and
Ahmad Qudaimat Tree based dynamic address
autoconfiguration in mobile ad hoc
networks . . . . . . . . . . . . . . . . 1894--1908
Marios Iliofotou and
Hyun-chul Kim and
Michalis Faloutsos and
Michael Mitzenmacher and
Prashanth Pappu and
George Varghese Graption: a graph-based P2P traffic
classification framework for the
Internet backbone . . . . . . . . . . . 1909--1920
Michael Scharf Comparison of end-to-end and
network-supported fast startup
congestion control schemes . . . . . . . 1921--1940
Guanhua Yan and
Duc T. Ha and
Stephan Eidenbenz AntBot: Anti-pollution peer-to-peer
botnets . . . . . . . . . . . . . . . . 1941--1956
Ramesh Viswanathan and
Krishan K. Sabnani and
Robert J. Holt and
Arun N. Netravali Expected convergence properties of BGP 1957--1981
M. Aykut Yigitel and
Ozlem Durmaz Incel and
Cem Ersoy QoS-aware MAC protocols for wireless
sensor networks: a survey . . . . . . . 1982--2004
Tony K. C. Chan and
Yiu-Wing Leung and
Gaoxi Xiao Upgrading unicast nodes to
multicast-capable nodes in all-optical
networks . . . . . . . . . . . . . . . . 2005--2021
Anonymous Editorial Board . . . . . . . . . . . . ??
HyunYong Lee and
Akihiro Nakao and
JongWon Kim BiCo: Network operator-friendly P2P
traffic control through bilateral
cooperation with peers . . . . . . . . . 2023--2034
Eugenio Alessandria and
Massimo Gallo and
Emilio Leonardi and
Marco Mellia and
Michela Meo Impact of adverse network conditions on
P2P-TV systems: Experimental evidence 2035--2050
Sergio Herrería-Alonso and
Miguel Rodríguez-Pérez and
Manuel Fernández-Veiga and
Cándido López-García Opportunistic power saving algorithms
for Ethernet devices . . . . . . . . . . 2051--2064
Frederic Thouin and
Mark Coates and
Michael Rabbat Large scale probabilistic available
bandwidth estimation . . . . . . . . . . 2065--2078
Hammad Iqbal and
Taieb Znati On the design of network control and
management plane . . . . . . . . . . . . 2079--2091
Sangtae Ha and
Injong Rhee Taming the elephants: New TCP slow start 2092--2110
José Luis García-Dorado and
José Alberto Hernández and
Javier Aracil and
Jorge E. López de Vergara and
Sergio Lopez-Buedo Characterization of the busy-hour
traffic of IP networks based on their
intrinsic features . . . . . . . . . . . 2111--2125
Chong Tan and
Junni Zou and
Min Wang and
Ruifeng Zhang Network lifetime optimization for
wireless video sensor networks with
network coding/ARQ hybrid adaptive
error-control scheme . . . . . . . . . . 2126--2137
Abu (Sayeem) Reaz and
Vishwanath Ramamurthi and
Massimo Tornatore and
Suman Sarkar and
Dipak Ghosal and
Biswanath Mukherjee Cost-efficient design for higher
capacity hybrid wireless-optical
broadband access network (WOBAN) . . . . 2138--2149
Fangmin Li and
Yilin Fang and
Fei Hu and
Xinhua Liu Load-aware multicast routing metrics in
multi-radio multi-channel wireless mesh
networks . . . . . . . . . . . . . . . . 2150--2167
Sung-Guk Yoon and
Changhee Joo and
Saewoong Bahk Energy-efficient opportunistic
scheduling schemes in wireless networks 2168--2175
Andy An-Kai Jeng and
Rong-Hong Jan and
Chi-Yu Li and
Chien Chen Release-time-based multi-channel MAC
protocol for wireless mesh networks . . 2176--2195
Yueping Zhang and
Ao-Jan Su and
Guofei Jiang Understanding data center network
architectures in virtualized
environments: a view from multi-tier
applications . . . . . . . . . . . . . . 2196--2208
Wei-Chieh Ke and
Bing-Hong Liu and
Ming-Jer Tsai The critical-square-grid coverage
problem in wireless sensor networks is
NP-Complete . . . . . . . . . . . . . . 2209--2220
Seyed Hossein Ahmadinejad and
Saeed Jalili and
Mahdi Abadi A hybrid model for correlating alerts of
known and unknown attack scenarios and
updating attack graphs . . . . . . . . . 2221--2240
Vishwanath Ramamurthi and
Abu (Sayeem) Reaz and
Dipak Ghosal and
Sudhir Dixit and
Biswanath Mukherjee Channel, capacity, and flow assignment
in wireless mesh networks . . . . . . . 2241--2258
Lin Chen and
Jean Leneutre Fight jamming with jamming --- a game
theoretic analysis of jamming attack in
wireless networks and defense strategy 2259--2270
Alexander A. Kist and
Abdelnour Aldraho Dynamic topologies for sustainable and
energy efficient traffic routing . . . . 2271--2288
Pablo Belzarena and
Fernando Paganini and
Andrés Ferragut Optimizing revenue for bandwidth
auctions over networks with time
reservations . . . . . . . . . . . . . . 2289--2302
Rafael Estepa and
Antonio Estepa and
Thiago Cupertino A productivity-oriented methodology for
local area network design in industrial
environments . . . . . . . . . . . . . . 2303--2314
Beatrice Paillassa and
Cholatip Yawut and
Riadh Dhaou Network awareness and dynamic routing:
The ad hoc network case . . . . . . . . 2315--2328
M. Yuksel and
K. K. Ramakrishnan and
R. D. Doverspike and
R. K. Sinha and
G. Li and
K. N. Oikonomou and
D. Wang Cross-layer failure restoration of IP
multicast with applications to IPTV . . 2329--2351
Mathias Boc and
Anne Fladenmuller and
Marcelo Dias de Amorim and
Laura Galluccio and
Sergio Palazzo Price: Hybrid geographic and co-based
forwarding in delay-tolerant networks 2352--2360
Anonymous Editorial Board . . . . . . . . . . . . ??
Glenn Carl and
George Kesidis Modeling a policy-capable path-vector
routing protocol using Jacobi iteration
over a path algebra . . . . . . . . . . 2361--2379
Rémi Diana and
Emmanuel Lochin ECN verbose mode: a statistical method
for network path congestion estimation 2380--2391
Z. Dwekat and
G. N. Rouskas A practical fair queuing scheduler:
Simplification through quantization . . 2392--2406
I-Ta Lee and
Guann-Long Chiou and
Shun-Ren Yang A cooperative multicast routing protocol
for mobile ad hoc networks . . . . . . . 2407--2424
Kaikai Chi and
Xiaohong Jiang and
Baoliu Ye and
Yanjun Li Flow-oriented network coding
architecture for multihop wireless
networks . . . . . . . . . . . . . . . . 2425--2442
Ming Li and
Kai Zeng and
Wenjing Lou Opportunistic broadcast of event-driven
warning messages in Vehicular Ad Hoc
Networks with lossy links . . . . . . . 2443--2464
Haidar Safa and
Farah Abu Shahla A Policy-Based Trust-Aware Adaptive
Monitoring Scheme to enhance WiMax QoS 2465--2480
Jiming Chen and
Chengqun Wang and
Youxian Sun and
Xuemin (Sherman) Shen Semi-supervised Laplacian regularized
least squares algorithm for localization
in wireless sensor networks . . . . . . 2481--2491
Wenping Deng and
Merkouris Karaliopoulos and
Wolfgang Mühlbauer and
Peidong Zhu and
Xicheng Lu and
Bernhard Plattner $k$-Fault tolerance of the Internet AS
graph . . . . . . . . . . . . . . . . . 2492--2503
Alessandro Amoroso and
Gustavo Marfia and
Marco Roccetti Going realistic and optimal: a
distributed multi-hop broadcast
algorithm for vehicular safety . . . . . 2504--2519
Sunggeun Jin and
Munhwan Choi and
Lei Wang and
Sunghyun Choi Fast scanning schemes for IEEE 802.11
WLANs in virtual AP environments . . . . 2520--2533
Rongfei Zeng and
Yixin Jiang and
Chuang Lin and
Yanfei Fan and
Xuemin (Sherman) Shen A scalable and robust key
pre-distribution scheme with network
coding for sensor data storage . . . . . 2534--2544
Anonymous Editorial Board . . . . . . . . . . . . ??
Geyong Min and
Jia Hu and
Mike E. Woodward Modeling and analysis of TXOP
differentiation in infrastructure-based
WLANs . . . . . . . . . . . . . . . . . 2545--2557
Tony O'Donovan and
Utz Roedig and
Jonathan Benson and
Cormac J. Sreenan Self-adaptive framelet-based
communication for wireless sensor
networks . . . . . . . . . . . . . . . . 2558--2575
Feng Shu and
Taka Sakurai A new analytical model for the IEEE
802.15.4 CSMA--CA protocol . . . . . . . 2576--2591
Shie-Yuan Wang and
Chih-Che Lin and
Wei-Jyun Hong and
Kuang-Che Liu On the performances of forwarding
multihop unicast traffic in WBSS-based
802.11(p)/1609 networks . . . . . . . . 2592--2607
Fei Xing and
Wenye Wang Toward robust multi-hop data forwarding
in large scale wireless networks . . . . 2608--2621
Jing Wu A survey of WDM network reconfiguration:
Strategies and triggering methods . . . 2622--2645
R. Murawski and
E. Ekici Utilizing dynamic spectrum leasing for
cognitive radios in 802.11-based
wireless networks . . . . . . . . . . . 2646--2657
Andrés Ferragut and
Fernando Paganini Resource allocation over multirate
wireless networks: a Network Utility
Maximization perspective . . . . . . . . 2658--2674
Anonymous Editorial Board . . . . . . . . . . . . ??
Weiyi Zhao and
Jiang Xie OPNET-based modeling and simulation
study on handoffs in Internet-based
infrastructure wireless mesh networks 2675--2688
Salekul Islam and
Jean-Charles Grégoire Multi-domain authentication for IMS
services . . . . . . . . . . . . . . . . 2689--2704
Marc St-Hilaire and
Shangyun Liu Comparison of different meta-heuristics
to solve the global planning problem of
UMTS networks . . . . . . . . . . . . . 2705--2716
Jian Qiu and
Yong Liu and
Gurusamy Mohan and
Kee Chaing Chua Fast spanning tree reconnection
mechanism for resilient Metro Ethernet
networks . . . . . . . . . . . . . . . . 2717--2729
Jeff Seibert and
Xin Sun and
Cristina Nita-Rotaru and
Sanjay Rao A design for securing data delivery in
mesh-based peer-to-peer streaming . . . 2730--2745
Hyung Rai Oh and
Dapeng Oliver Wu and
Hwangjun Song An effective mesh-pull-based P2P video
streaming system using Fountain codes
with variable symbol sizes . . . . . . . 2746--2759
Xiaochao Zi and
Lihong Yao and
Xinghao Jiang and
Li Pan and
Jianhua Li Evaluating the transmission rate of
covert timing channels in a network . . 2760--2771
Juliana de Santi and
Nelson L. S. da Fonseca Design of optimal Active Queue
Management controllers for HSTCP in
large bandwidth-delay product networks 2772--2790
Matías Toril and
Volker Wille and
S. Luna-Ramírez and
K. Jarvinen Network performance model for location
area re-planning in GERAN . . . . . . . 2791--2802
Anonymous Editorial Board . . . . . . . . . . . . ??
Wagner Moro Aioffi and
Cristiano Arbex Valle and
Geraldo R. Mateus and
Alexandre Salles da Cunha Balancing message delivery latency and
network lifetime through an integrated
model for clustering and routing in
Wireless Sensor Networks . . . . . . . . 2803--2820
Ying Chen and
Arunita Jaekel and
Ataul Bari A new model for allocating resources to
scheduled lightpath demands . . . . . . 2821--2837
Daniel Camps-Mur and
Xavier Pérez-Costa and
Sebasti\`a Sallent-Ribes Designing energy efficient access points
with Wi-Fi Direct . . . . . . . . . . . 2838--2855
Prasan Kumar Sahoo and
Jang-Ping Sheu Limited mobility coverage and
connectivity maintenance protocols for
wireless sensor networks . . . . . . . . 2856--2872
Giovanni Ciccarese and
Mario De Blasi and
Pierluigi Marra and
Cosimo Palazzo and
Luigi Patrono An algorithm for controlling packet size
in IEEE 802.16e networks . . . . . . . . 2873--2885
Amir Darehshoorzadeh and
Llorenç Cerd\`a-Alabern and
Vicent Pla Modeling and comparison of candidate
selection algorithms in opportunistic
routing . . . . . . . . . . . . . . . . 2886--2898
Martin Jacobsson and
Cheng Guo and
Ignas Niemegeers An experimental investigation of
optimized flooding protocols using a
wireless sensor network testbed . . . . 2899--2913
B. Nechaev and
D. Korzun and
A. Gurtov CR-Chord: Improving lookup availability
in the presence of malicious DHT nodes 2914--2928
Shaohe Lv and
Weihua Zhuang and
Xiaodong Wang and
Xingming Zhou Link scheduling in wireless networks
with successive interference
cancellation . . . . . . . . . . . . . . 2929--2941
Ömer Korçak and
Fatih Alagöz Efficient integration of HAPs and mobile
satellites via free-space optical links 2942--2953
Juliano Araujo Wickboldt and
Luís Armando Bianchin and
Roben Castagna Lunardi and
Lisandro Zambenedetti Granville and
Luciano Paschoal Gaspary and
Claudio Bartolini A framework for risk assessment based on
analysis of historical information of
workflow execution in IT systems . . . . 2954--2975
Fei Ge and
Sammy Chan and
Lachlan L. H. Andrew and
Fan Li and
Liansheng Tan and
Moshe Zukerman Performance effects of two-way FAST TCP 2976--2984
Mónica Aguilar Igartua and
Luis J. de la Cruz Llopis and
Víctor Carrascal Frías and
Emilio Sanvicente Gargallo A game-theoretic multipath routing for
video-streaming services over Mobile Ad
Hoc Networks . . . . . . . . . . . . . . 2985--3000
Anirban Banerjee and
Md Sazzadur Rahman and
Michalis Faloutsos SUT: Quantifying and mitigating URL
typosquatting . . . . . . . . . . . . . 3001--3014
R. Gotzhein and
T. Kuhn Black Burst Synchronization (BBS) --- a
protocol for deterministic tick and time
synchronization in wireless networks . . 3015--3031
Azzedine Boukerche and
Begumhan Turgut and
Nevin Aydin and
Mohammad Z. Ahmad and
Ladislau Bölöni and
Damla Turgut Routing protocols in ad hoc networks: a
survey . . . . . . . . . . . . . . . . . 3032--3080
Ozlem Durmaz Incel A survey on multi-channel communication
in wireless sensor networks . . . . . . 3081--3099
Anonymous Editorial Board . . . . . . . . . . . . ??
R. G. Herrtwich and
I. Radusch Editorial for the Special Issue:
Deploying vehicle-2-x communication . . 3101--3102
Christian Weiß V2X communication in Europe --- From
research projects towards
standardization and field testing of
vehicle communication technology . . . . 3103--3119
James A. Misener and
Subir Biswas and
Greg Larson Development of V-to-X systems in North
America: The promise, the pitfalls and
the prognosis . . . . . . . . . . . . . 3120--3133
Masao Fukushima The latest trend of V2X driver
assistance systems in Japan . . . . . . 3134--3141
J. Vales-Alonso and
F. Vicente-Carrasco and
J. J. Alcaraz Optimal configuration of roadside
beacons in V2I communications . . . . . 3142--3153
Sebastian Röglinger A methodology for testing intersection
related Vehicle-2-X applications . . . . 3154--3168
Benno Schweiger and
Christian Raubitschek and
Bernard Bäker and
Johann Schlichter Elisa\TM --- Car to infrastructure
communication in the field . . . . . . . 3169--3178
Razvan Stanica and
Emmanuel Chaput and
André-Luc Beylot Simulation of vehicular ad-hoc networks:
Challenges, review of tools and
recommendations . . . . . . . . . . . . 3179--3188
Björn Schünemann V2X simulation runtime infrastructure
VSimRTI: an assessment tool to design
smart traffic management systems . . . . 3189--3198
Carmela Troncoso and
Enrique Costa-Montenegro and
Claudia Diaz and
Stefan Schiffner On the difficulty of achieving anonymity
for Vehicle-2-X communication . . . . . 3199--3210
Anonymous Editorial Board . . . . . . . . . . . . ??
Rolando Trujillo-Rasua and
Agusti Solanas Efficient probabilistic communication
protocol for the private identification
of RFID tags by means of collaborative
readers . . . . . . . . . . . . . . . . 3211--3223
Zheng Ruan and
Edith C.-H. Ngai and
Jiangchuan Liu Wireless sensor deployment for
collaborative sensing with mobile phones 3224--3245
Lei Zhang and
Qianhong Wu and
Bo Qin and
Josep Domingo-Ferrer and
Úrsula González-Nicolás Asymmetric group key agreement protocol
for open networks and its application to
broadcast encryption . . . . . . . . . . 3246--3255
Javad Vazifehdan and
R. Venkatesha Prasad and
Ertan Onur and
Ignas Niemegeers Energy-aware routing algorithms for
wireless ad hoc networks with
heterogeneous power supplies . . . . . . 3256--3274
Kuochen Wang and
Chun-Ying Huang and
Shang-Jyh Lin and
Ying-Dar Lin A fuzzy pattern-based filtering
algorithm for botnet detection . . . . . 3275--3286
Yuyan Xue and
Byrav Ramamurthy and
Mehmet C. Vuran SDRCS: a service-differentiated
real-time communication scheme for event
sensing in wireless sensor networks . . 3287--3302
Flavio Esposito and
Ibrahim Matta and
Debajyoti Bera and
Pietro Michiardi On the impact of seed scheduling in
peer-to-peer networks . . . . . . . . . 3303--3317
Dan Li and
Jianping Wu and
Yong Cui and
Jiangchuan Liu and
Ke Xu Impact of user selfishness in
construction action on the streaming
quality of overlay multicast . . . . . . 3318--3331
M. Alkubeily and
H. Bettahar and
A. Bouabdallah A new Application-Level Multicast
technique for stable, robust and
efficient overlay tree construction . . 3332--3350
C. Cano and
B. Bellalta and
A. Sfairopoulou and
M. Oliver Low energy operation in WSNs: a survey
of preamble sampling MAC protocols . . . 3351--3363
Ziqian Dong and
Santhanakrishnan Anand and
Rajarathnam Chandramouli Estimation of missing RTTs in computer
networks: Matrix completion vs
compressed sensing . . . . . . . . . . . 3364--3375
Liu Yang and
Rezwana Karim and
Vinod Ganapathy and
Randy Smith Fast, memory-efficient regular
expression matching with NFA-OBDDs . . . 3376--3393
Xavier León and
Tuan Anh Trinh and
Leandro Navarro Modeling resource usage in
planetary-scale shared infrastructures:
PlanetLab's case study . . . . . . . . . 3394--3407
Elmurod Talipov and
Hojung Cha Communication capacity-based message
exchange mechanism for delay-tolerant
networks . . . . . . . . . . . . . . . . 3408--3422
Sasitharan Balasubramaniam and
Dmitri Botvich and
Raymond Carroll and
Julien Mineraud and
Tadashi Nakano and
Tatsuya Suda and
William Donnelly Biologically inspired future service
environment . . . . . . . . . . . . . . 3423--3440
Sevil Sen and
John A. Clark Evolutionary computation techniques for
intrusion detection in mobile ad hoc
networks . . . . . . . . . . . . . . . . 3441--3457
Damien Fay and
Hamed Haddadi and
Steve Uhlig and
Liam Kilmartin and
Andrew W. Moore and
Jérôme Kunegis and
Marios Iliofotou Discriminating graphs through spectral
projections . . . . . . . . . . . . . . 3458--3468
Hyoungshick Kim and
Jaehoon Jeong RAD: Recipient-anonymous data delivery
based on public routing proxies . . . . 3469--3484
Bernhard Tellenbach and
Martin Burkhart and
Dominik Schatzmann and
David Gugelmann and
Didier Sornette Accurate network anomaly classification
with generalized entropy metrics . . . . 3485--3502
Dessislava Nikolova and
Chris Blondia Bonded deficit round robin scheduling
for multi-channel networks . . . . . . . 3503--3516
Gianluca Ciccarelli and
Renato Lo Cigno Collusion in peer-to-peer systems . . . 3517--3532
Dingde Jiang and
Zhengzheng Xu and
Zhenhua Chen and
Yang Han and
Hongwei Xu Joint time-frequency sparse estimation
of large-scale network traffic . . . . . 3533--3547
Cheng Wang and
Changjun Jiang and
Xiang-Yang Li and
Yunhao Liu On multicast throughput scaling of
hybrid wireless networks with general
node density . . . . . . . . . . . . . . 3548--3561
Hidayet Aksu and
Demet Aksoy and
Ibrahim Korpeoglu A study of localization metrics:
Evaluation of position errors in
wireless sensor networks . . . . . . . . 3562--3577
Daniele Migliorini and
Enzo Mingozzi and
Carlo Vallati Performance evaluation of H.264/SVC
video streaming over mobile WiMAX . . . 3578--3591
Che-Jung Hsu and
Huey-Ing Liu and
Winston K. G. Seah Opportunistic routing --- a review and
the challenges ahead . . . . . . . . . . 3592--3603
Wenye Wang and
Yi Xu and
Mohit Khanna A survey on the communication
architectures in smart grid . . . . . . 3604--3629
Anonymous Editorial Board . . . . . . . . . . . . ??
Tuna Tugcu Guest Editorial . . . . . . . . . . . . 3631--3633
O. Font-Bach and
N. Bartzoudis and
A. Pascual-Iserte and
D. López Bueno A real-time MIMO-OFDM mobile WiMAX
receiver: Architecture, design and FPGA
implementation . . . . . . . . . . . . . 3634--3647
HanGyu Cho and
Taeyoung Kim and
Yu-Tao Hsieh and
Jong-Kae Fwu Physical layer structure of next
generation mobile WiMAX technology . . . 3648--3658
Rafael Kunst and
Cristiano Bonato Both and
Lisandro Zambenedetti Granville and
Juergen Rochol On the impact of hybrid errors on mobile
WiMAX networks . . . . . . . . . . . . . 3659--3671
Balakrishnan Kaarthick and
N. Nagarajan and
E. Raguvaran and
G. Saimethun Subchannel allocation and mapping
algorithms for improving the QoS of VoIP
traffic in IEEE 802.16e networks . . . . 3672--3679
C. Cicconetti and
L. Lenzini and
A. Lodi and
S. Martello and
E. Mingozzi and
M. Monaci A fast and efficient algorithm to
exploit multi-user diversity in IEEE
802.16 BandAMC . . . . . . . . . . . . . 3680--3693
G. Vejarano and
D. Wang and
J. McNair Stability region adaptation using
transmission power control for transport
capacity optimization in IEEE 802.16
wireless mesh networks . . . . . . . . . 3694--3704
Jia-Ming Liang and
You-Chiun Wang and
Jen-Jee Chen and
Jui-Hsiang Liu and
Yu-Chee Tseng Energy-efficient uplink resource
allocation for IEEE 802.16j
transparent-relay networks . . . . . . . 3705--3720
Jen-Jee Chen and
Shih-Lin Wu and
Shiou-Wen Wang and
Yu-Chee Tseng Per-flow sleep scheduling for power
management in IEEE 802.16 wireless
networks . . . . . . . . . . . . . . . . 3721--3733
Shunfu Jin and
Wuyi Yue Performance analysis for power saving
class type III of IEEE 802.16 in WiMAX 3734--3743
Ronny Yongho Kim and
Ritesh Kumar Kalle and
Debabrata Das Joint paging area and location update
optimization for IEEE 802.16m idle mode 3744--3758
Zdenek Becvar and
Pavel Mach and
Boris Simak Improvement of handover prediction in
mobile WiMAX by using two thresholds . . 3759--3773
Sunggeun Jin and
Xi Chen and
Daji Qiao and
Sunghyun Choi Adaptive sleep mode management in IEEE
802.16m wireless metropolitan area
networks . . . . . . . . . . . . . . . . 3774--3783
T. M. Fernández-Caramés and
M. González-López and
L. Castedo Mobile WiMAX for vehicular applications:
Performance evaluation and comparison
against IEEE 802.11p/a . . . . . . . . . 3784--3795
Ming-Chin Chuang and
Jeng-Farn Lee A lightweight mutual authentication
mechanism for network mobility in IEEE
802.16e wireless networks . . . . . . . 3796--3809
Anonymous Editorial Board . . . . . . . . . . . . ??
Yufeng Wang and
Akihiro Nakao and
Athanasios V. Vasilakos and
Jianhua Ma On the effectiveness of service
differentiation based resource-provision
incentive mechanisms in dynamic and
autonomous P2P networks . . . . . . . . 3811--3831
Jocelyne Elias and
Fabio Martignon and
Antonio Capone and
Eitan Altman Non-cooperative spectrum access in
cognitive radio networks: a game
theoretical model . . . . . . . . . . . 3832--3846
Sok-Ian Sou and
Chuan-Sheng Lin SPR proxy mechanism for 3GPP Policy and
Charging Control System . . . . . . . . 3847--3862
Sebasti\`a Galmés and
Ramon Puigjaner Randomized Data-Gathering protocol for
time-driven sensor networks . . . . . . 3863--3885
Chien-Chi Kao and
Shun-Ren Yang and
Tung-Lin Tsai Performance enhancement of repacking and
borrowing mechanisms for IEEE 802.16j
multihop resource scheduling . . . . . . 3886--3903
Aldar C.-F. Chan Efficient defence against misbehaving
TCP receiver DoS attacks . . . . . . . . 3904--3914
Seongjin Lee and
Jongwoo Song and
Soohan Ahn and
Youjip Won Session-based classification of Internet
applications in 3G wireless networks . . 3915--3931
InKwan Yu and
Richard Newman TCP slow start with fair share of
bandwidth . . . . . . . . . . . . . . . 3932--3946
Christopher Page and
Emad Guirguis and
Mina Guirguis Performance evaluation of path splicing
on the GÉANT and the Sprint networks . . 3947--3958
Jorge Londoño and
Azer Bestavros and
Nikolaos Laoutaris Trade & Cap: a customer-managed,
market-based system for trading
bandwidth allowances at a shared link 3959--3974
Georgios Theodoridis and
Fotini-Niovi Pavlidou A combined resource management and
admission control scheme for optimizing
uplink performance of M-WiMAX systems 3975--3986
Anonymous Editorial Board . . . . . . . . . . . . ??
Ian F. Akyildiz and
Harry Rudin Editorial . . . . . . . . . . . . . . . 1--2
Hyenyoung Yoon and
Junseok Hwang and
Martin B. H. Weiss An analytic research on
secondary-spectrum trading mechanisms
based on technical and market changes 3--19
Hyunsang Choi and
Heejo Lee Identifying botnets by capturing group
activities in DNS traffic . . . . . . . 20--33
P. D. Hossein Zadeh and
C. Schlegel and
M. H. MacGregor Distributed optimal dynamic base station
positioning in wireless sensor networks 34--49
Alptekin Küpçü and
Anna Lysyanskaya Usable optimistic fair exchange . . . . 50--63
Yun Mao and
Boon Thau Loo and
Zachary Ives and
Jonathan M. Smith MOSAIC: Declarative platform for dynamic
overlay composition . . . . . . . . . . 64--84
Ziqian Dong and
Rohan D. W. Perera and
Rajarathnam Chandramouli and
K. P. Subbalakshmi Network measurement based modeling and
optimization for IP geolocation . . . . 85--98
Salah A. Aly and
Ahmed E. Kamal and
Osameh M. Al-Kofahi Network protection codes: Providing
self-healing in autonomic networks using
network coding . . . . . . . . . . . . . 99--111
M. C. Lucas-Estañ and
J. Gozalvez and
J. Sanchez-Soriano Integer linear programming optimization
of joint RRM policies for heterogeneous
wireless systems . . . . . . . . . . . . 112--126
Amr Rizk and
Markus Fidler Non-asymptotic end-to-end performance
bounds for networks with long range
dependent fBm cross traffic . . . . . . 127--141
Sérgio Crisóstomo and
Udo Schilcher and
Christian Bettstetter and
João Barros Probabilistic flooding in stochastic
networks: Analysis of global information
outreach . . . . . . . . . . . . . . . . 142--156
Sara Modarres Razavi and
Di Yuan and
Fredrik Gunnarsson and
Johan Moe Performance and cost trade-off in
Tracking Area reconfiguration: a
Pareto-optimization approach . . . . . . 157--168
Thomas Gamer Collaborative anomaly-based detection of
large-scale Internet attacks . . . . . . 169--185
Nicola Cordeschi and
Valentina Polli and
Enzo Baccarelli Traffic Engineering for wireless
connectionless access networks
supporting QoS-demanding media
applications . . . . . . . . . . . . . . 186--197
Yuh-Jzer Joung and
Terry Hui-Ye Chiu and
Shy-Min Chen Cooperating with free riders in
unstructured P2P networks . . . . . . . 198--212
Yuh-Jzer Joung and
Shih-Hsiang Huang and
Shi-Hang Lin Making data-centric storage adaptive and
cost-optimal . . . . . . . . . . . . . . 213--230
Hyuntae Park and
Hyejeong Hong and
Sungho Kang An efficient IP address lookup algorithm
based on a small balanced tree using
entry reduction . . . . . . . . . . . . 231--243
Maysam Mirahmadi and
Abdallah Shami Traffic-prediction-assisted dynamic
bandwidth assignment for hybrid optical
wireless networks . . . . . . . . . . . 244--259
Chun-Nan Lu and
Chun-Ying Huang and
Ying-Dar Lin and
Yuan-Cheng Lai Session level flow classification by
packet size distribution and session
grouping . . . . . . . . . . . . . . . . 260--272
M. Moessner and
Gul N. Khan Secure authentication scheme for passive
C1G2 RFID tags . . . . . . . . . . . . . 273--286
Enzo Baccarelli and
Nicola Cordeschi and
Tatiana Patriarca QoS Stochastic Traffic Engineering for
the wireless support of real-time
streaming applications . . . . . . . . . 287--302
M. Toril and
P. Guerrero-García and
S. Luna-Ramírez and
V. Wille An efficient integer programming
formulation for the assignment of base
stations to controllers in cellular
networks . . . . . . . . . . . . . . . . 303--314
Ji-Hoon Yun Cross-layer analysis of the random
access mechanism in Universal
Terrestrial Radio Access . . . . . . . . 315--328
Dagang Li and
Emmanuel Van Lil and
Antoine Van de Capelle Improving Slow-start based probing
mechanisms for flow adaptation after
handovers . . . . . . . . . . . . . . . 329--344
Mustafa O. Kilavuz and
Murat Yuksel Path approximation for multi-hop
wireless routing under application-based
accuracy constraints . . . . . . . . . . 345--364
Yiping Chen and
Erwan Le Merrer and
Zhe Li and
Yaning Liu and
Gwendal Simon OAZE: a network-friendly distributed
zapping system for peer-to-peer IPTV . . 365--377
Agapios Avramidis and
Panayiotis Kotzanikolaou and
Christos Douligeris and
Mike Burmester Chord-PKI: a distributed trust
infrastructure based on P2P networks . . 378--398
Huali Bai and
Ming Chen CCIPCA-OPCSC: an online method for
detecting shared congestion paths . . . 399--411
Juanjo Alins and
Jorge Mata-Diaz and
Jose L. Muñoz and
Elizabeth Rendón-Morales and
Oscar Esparza XPLIT: a cross-layer architecture for
TCP services over DVB-S2/ETSI QoS BSM 412--434
Guosong Tian and
Yu-Chu Tian Modelling and performance evaluation of
the IEEE 802.11 DCF for real-time
control . . . . . . . . . . . . . . . . 435--447
Mengjun Xie and
Zhenyu Wu and
Haining Wang Secure instant messaging in
enterprise-like networks . . . . . . . . 448--461
C. Callegari and
S. Giordano and
M. Pagano and
T. Pepe Behavior analysis of TCP Linux variants 462--476
Weili Han and
Chang Lei A survey on policy languages in network
and security management . . . . . . . . 477--489
Anonymous Editorial Board . . . . . . . . . . . . ??
Shafiullah Khan and
Nabil Ali Alrajeh and
Kok-Keong Loo Secure route selection in wireless mesh
networks . . . . . . . . . . . . . . . . 491--503
Evangelos Papapetrou and
Panos Vassiliadis and
Efthymia Rova and
Apostolos Zarras Cross-layer routing for peer database
querying over mobile ad hoc networks . . 504--520
Dario Bruneo and
Salvatore Distefano and
Francesco Longo and
Antonio Puliafito and
Marco Scarpa Evaluating wireless sensor node
longevity through Markovian techniques 521--532
Zeki Yetgìn and
Turgay Çelìk Efficient progressive downloading over
multimedia broadcast multicast service 533--547
Hung-Cheng Shih and
Kuochen Wang An adaptive hybrid dynamic power
management algorithm for mobile devices 548--565
Helena Rif\`a-Pous and
Carles Garrigues Authenticating hard decision sensing
reports in cognitive radio networks . . 566--576
Gustavo Carneiro and
Pedro Fortuna and
Jaime Dias and
Manuel Ricardo Transparent and scalable terminal
mobility for vehicular networks . . . . 577--597
Gabriel Maciá-Fernández and
Yong Wang and
Rafael A. Rodri'guez-Gómez and
Aleksandar Kuzmanovic Extracting user Web browsing patterns
from non-content network traces: The
online advertising case study . . . . . 598--614
Sinan Isik and
Mehmet Yunus Donmez and
Cem Ersoy Multi-sink load balanced forwarding with
a multi-criteria fuzzy sink selection
for video sensor networks . . . . . . . 615--627
Fernando Silveira and
Edmundo de Souza e Silva Predicting packet loss statistics with
hidden Markov models for FEC control . . 628--641
Ricardo Lopes Pereira and
Teresa Vazão and
Rodrigo Rodrigues Adaptive Search Radius --- Using hop
count to reduce P2P traffic . . . . . . 642--660
Shie-Yuan Wang and
Chih-Che Lin and
Yu-Chi Chang A rule-based inter-session network
coding scheme over IEEE 802.16(d) mesh
CDS-mode networks . . . . . . . . . . . 661--685
Felipe Mata and
José Luis García-Dorado and
Javier Aracil Detection of traffic changes in
large-scale backbone networks: The case
of the Spanish academic network . . . . 686--702
Miguel Elias M. Campista and
Luís Henrique M. K. Costa and
Otto Carlos M. B. Duarte A routing protocol suitable for backhaul
access in wireless mesh networks . . . . 703--718
Yong Oh Lee and
A. L. Narasimha Reddy Constructing disjoint paths for failure
recovery and multipath routing . . . . . 719--730
Xinyu Yang and
Xiaojing Fan and
Wei Yu and
Xinwen Fu and
Shusen Yang HLLS: a History information based Light
Location Service for MANETs . . . . . . 731--744
Jie Feng and
Lisong Xu Stochastic TCP friendliness: Expanding
the design space of TCP-friendly traffic
control protocols . . . . . . . . . . . 745--761
Suhaib A. Obeidat and
Abraham N. Aldaco and
Violet R. Syrotiuk Cross-layer opportunistic adaptation for
voice over ad hoc networks . . . . . . . 762--779
Casey Deccio and
Jeff Sedayao and
Krishna Kant and
Prasant Mohapatra Quantifying DNS namespace influence . . 780--794
Emir Halepovic and
Carey Williamson and
Majid Ghaderi Enhancing redundant network traffic
elimination . . . . . . . . . . . . . . 795--809
D. Marcus and
Y. Shavitt RAGE --- a rapid graphlet enumerator for
large networks . . . . . . . . . . . . . 810--819
Bo-Chao Cheng and
Guo-Tan Liao and
Ryh-Yuh Tseng and
Ping-Hai Hsu Network lifetime bounds for hierarchical
wireless sensor networks in the presence
of energy constraints . . . . . . . . . 820--831
Burak Bayoglu and
Ibrahim Sogukpinar Graph based signature classes for
detecting polymorphic worms via content
analysis . . . . . . . . . . . . . . . . 832--844
Mingwei Xu and
Yuan Yang and
Qi Li Selecting shorter alternate paths for
tunnel-based IP Fast ReRoute in linear
time . . . . . . . . . . . . . . . . . . 845--857
Benoit Donnet and
Bamba Gueye and
Mohamed Ali Kaafar Path similarity evaluation using Bloom
filters . . . . . . . . . . . . . . . . 858--869
Artur Ziviani and
Thiago B. Cardozo and
Antônio Tadeu A. Gomes Rapid prototyping of active measurement
tools . . . . . . . . . . . . . . . . . 870--883
Kamran Jamshaid and
Paul A. S. Ward and
Martin Karsten Mechanisms for centralized flow rate
control in 802.11-based wireless mesh
networks . . . . . . . . . . . . . . . . 884--901
Sajjad Zarifzadeh and
Nasser Yazdani and
Amir Nayyeri Energy-efficient topology control in
wireless ad hoc networks with selfish
nodes . . . . . . . . . . . . . . . . . 902--914
C. Cano and
B. Bellalta and
M. Oliver Wake up after transmissions and reduced
channel contention to alleviate the
hidden terminal problem in preamble
sampling WSNs . . . . . . . . . . . . . 915--926
Jean-Marc Robert and
Hadi Otrok and
Ahmad Nahar Quttoum and
Rihab Boukhris A distributed resource management model
for Virtual Private Networks:
Tit-for-Tat strategies . . . . . . . . . 927--939
Eiman Alotaibi and
Biswanath Mukherjee A survey on routing algorithms for
wireless Ad-Hoc and mesh networks . . . 940--965
Anonymous Editorial Board . . . . . . . . . . . . ??
José Ignacio Alvarez-Hamelin and
Éric Fleury and
Alessandro Vespignani and
Artur Ziviani Complex dynamic networks: Tools and
methods . . . . . . . . . . . . . . . . 967--969
N. Koenigstein and
Y. Shavitt Talent scouting in P2P networks . . . . 970--982
Hyoungshick Kim and
John Tang and
Ross Anderson and
Cecilia Mascolo Centrality prediction in dynamic human
contact networks . . . . . . . . . . . . 983--996
Ana Cristina Kochem Vendramin and
Anelise Munaretto and
Myriam Regattieri Delgado and
Aline Carneiro Viana GrAnt: Inferring best forwarders from
complex networks' dynamics through a
greedy Ant Colony Optimization . . . . . 997--1015
David S. Shelley and
Mehmet Hadi Gunes GerbilSphere: Inner sphere network
visualization . . . . . . . . . . . . . 1016--1028
Dima Feldman and
Yuval Shavitt and
Noa Zilberman A structural approach for PoP
geo-location . . . . . . . . . . . . . . 1029--1040
Bivas Mitra and
Lionel Tabourier and
Camille Roth Intrinsically dynamic network
communities . . . . . . . . . . . . . . 1041--1053
Matteo Varvello and
Moritz Steiner and
Koen Laevens Understanding BitTorrent: a reality
check from the ISP's perspective . . . . 1054--1065
Meeyoung Cha and
Fabrício Benevenuto and
Yong-Yeol Ahn and
Krishna P. Gummadi Delayed information cascades in Flickr:
Measurement, analysis, and modeling . . 1066--1076
Xiaoming Fu and
Yang Chen and
Guy Leduc and
Laurent Mathy Editorial for Computer Networks special
issue on ``Measurement-based
optimization of P2P networking and
applications'' . . . . . . . . . . . . . 1077--1079
Ghulam Memon and
Reza Rejaie and
Yang Guo and
Daniel Stutzbach Montra: a large-scale DHT traffic
monitor . . . . . . . . . . . . . . . . 1080--1091
Noam Koenigstein and
Yuval Shavitt and
Ela Weinsberg and
Udi Weinsberg Measuring the validity of peer-to-peer
data for information retrieval
applications . . . . . . . . . . . . . . 1092--1102
Zhen Ma and
Ke Xu and
Jiangchuan Liu and
Haiyang Wang Measurement, modeling and enhancement of
BitTorrent-based VoD system . . . . . . 1103--1117
Konstantin Pussep and
Frank Lehrieder and
Christian Gross and
Simon Oechsner and
Markus Guenther and
Sebastian Meyer Cooperative traffic management for video
streaming overlays . . . . . . . . . . . 1118--1130
Anonymous Editorial Board . . . . . . . . . . . . ??
M. Marchese and
M. Mongelli Simple protocol enhancements of Rapid
Spanning Tree Protocol over ring
topologies . . . . . . . . . . . . . . . 1131--1151
Federico Larroca and
Jean-Louis Rougier Minimum delay load-balancing via
nonparametric regression and no-regret
algorithms . . . . . . . . . . . . . . . 1152--1166
Haw-Yun Shin Exploiting skewed access and
energy-efficient algorithm to improve
the performance of wireless data
broadcasting . . . . . . . . . . . . . . 1167--1182
Luis Pérez and
Luis Velasco and
Juan Rodríguez and
Pedro Capelastegui and
Guillem Hernández-Sola and
Lorena Calavia and
Antonio Marqués and
Borja Iribarne and
Amador Pozo and
Antoine De Poorter Network convergence and QoS for future
multimedia services in the VISION
project . . . . . . . . . . . . . . . . 1183--1199
Kwan-Wu Chin and
Sieteng Soh and
Chen Meng Novel scheduling algorithms for
concurrent transmit/receive wireless
mesh networks . . . . . . . . . . . . . 1200--1214
Marcello Cinque and
Catello Di Martino and
Christian Esposito On data dissemination for large-scale
complex critical infrastructures . . . . 1215--1235
Jeongkyun Yun and
Sung-Guk Yoon and
Jin-Ghoo Choi and
Saewoong Bahk Contention based scheduling for
femtocell access points in a densely
deployed network environment . . . . . . 1236--1248
Koteswara Rao Vemu and
Shalabh Bhatnagar and
N. Hemachandra Optimal multi-layered congestion based
pricing schemes for enhanced QoS . . . . 1249--1262
Dmitri Moltchanov A study of TCP performance in wireless
environment using fixed-point
approximation . . . . . . . . . . . . . 1263--1285
Praveen K. Muthuswamy and
Aparna Gupta and
Murat Yuksel and
Koushik Kar Path-vector contracting: Profit
maximization and risk management . . . . 1286--1302
Miguel S. Familiar and
José F. Martínez and
Iván Corredor and
Carlos García-Rubio Building service-oriented Smart
Infrastructures over Wireless Ad Hoc
Sensor Networks: a middleware
perspective . . . . . . . . . . . . . . 1303--1328
Byung-Gook Kim and
Jang-Won Lee Stochastic utility-based flow control
algorithm for services with time-varying
rate requirements . . . . . . . . . . . 1329--1342
Aaron E. Cohen and
Jian-Hung Lin and
Keshab K. Parhi Variable data rate (VDR) network
congestion control (NCC) applied to
voice/audio communication . . . . . . . 1343--1356
Faqir Zarrar Yousaf and
Christian Wietfeld Solving pinball routing, race condition
and loop formation issues in nested
mobile networks . . . . . . . . . . . . 1357--1375
Yossi Kanizo and
David Hay and
Isaac Keslassy Hash tables with finite buckets are less
resistant to deletions . . . . . . . . . 1376--1389
Olabisi E. Falowo and
H. Anthony Chan Dynamic RAT selection for multiple calls
in heterogeneous wireless networks using
group decision-making technique . . . . 1390--1401
Chih-Che Lin and
Shie-Yuan Wang and
Teng-Wei Hsu On the performances of IEEE 802.16(d)
mesh CDS-mode networks using
Single-Switched-Beam Antennas . . . . . 1402--1423
D. J. Leith and
P. Clifford and
V. Badarla and
D. Malone WLAN channel selection without
communication . . . . . . . . . . . . . 1424--1441
Ting Wang and
Chor Ping Low The general Message Ferry Route
(MFR$^*$) problem and the
An-Improved-Route (AIR) scheme . . . . . 1442--1457
Kyong-Tak Cho and
Saewoong Bahk Optimal Hop Extended MAC protocol for
wireless sensor networks . . . . . . . . 1458--1469
Yunzhao Li and
Don Gruenbacher and
Caterina Scoglio Evaluating stranger policies in P2P
file-sharing systems with reciprocity
mechanisms . . . . . . . . . . . . . . . 1470--1485
Wei Zhang and
Jun Bi and
Jianping Wu and
Baobao Zhang Catching popular prefixes at AS border
routers with a prediction based method 1486--1502
M. Reza Rahimi and
Abdul Bais and
Nima Sarshar On fair and optimal multi-source
IP-multicast . . . . . . . . . . . . . . 1503--1524
Anonymous Editorial Board . . . . . . . . . . . . ??
Ching-Lung Chang and
Sih-Ping Huang The interleaved video frame distribution
for P2P-based VoD system with VCR
functionality . . . . . . . . . . . . . 1525--1537
J. Fitzpatrick Voice call capacity analysis of long
range WiFi as a femto backhaul solution 1538--1553
Claudia Campolo and
Claudio Casetti and
Carla-Fabiana Chiasserini and
Antonella Molinaro A multirate MAC protocol for reliable
multicast in multihop wireless networks 1554--1567
Mehdi Bezahaf and
Luigi Iannone and
Marcelo Dias de Amorim and
Serge Fdida An experimental evaluation of
cross-layer routing in a wireless mesh
backbone . . . . . . . . . . . . . . . . 1568--1583
Fabio R. J. Vieira and
José F. de Rezende and
Valmir C. Barbosa and
Serge Fdida Scheduling links for heavy traffic on
interfering routes in wireless mesh
networks . . . . . . . . . . . . . . . . 1584--1598
Bang Wang and
Hock Beng Lim and
Di Ma A coverage-aware clustering protocol for
wireless sensor networks . . . . . . . . 1599--1611
Jouni Mäenpää Performance evaluation of Recursive
Distributed Rendezvous based service
discovery for Peer-to-Peer Session
Initiation Protocol . . . . . . . . . . 1612--1626
Atslands R. Rocha and
Luci Pirmez and
Flávia C. Delicato and
Érico Lemos and
Igor Santos and
Danielo G. Gomes and
José Neuman de Souza WSNs clustering based on semantic
neighborhood relationships . . . . . . . 1627--1645
Young June Pyun and
Younghee Park and
Douglas S. Reeves and
Xinyuan Wang and
Peng Ning Interval-based flow watermarking for
tracing interactive traffic . . . . . . 1646--1665
Anonymous Editorial Board . . . . . . . . . . . . ??
Frederic Raspall Efficient packet sampling for accurate
traffic measurements . . . . . . . . . . 1667--1684
Javad Vazifehdan and
R. Venkatesha Prasad and
Ignas Niemegeers On the lifetime of node-to-node
communication in wireless ad hoc
networks . . . . . . . . . . . . . . . . 1685--1709
Sihyung Lee and
Hyong S. Kim End-user perspectives of Internet
connectivity problems . . . . . . . . . 1710--1722
Alex X. Liu and
Jason M. Kovacs and
Mohamed G. Gouda A secure cookie scheme . . . . . . . . . 1723--1730
Yi Hu and
Laxmi N. Bhuyan and
Min Feng P2P consistency support for large-scale
interactive applications . . . . . . . . 1731--1744
Joo-Young Baek and
Young-Joo Suh An adaptive ARQ-HARQ interworking scheme
in WiMAX systems . . . . . . . . . . . . 1745--1762
Yu Lu and
Mehul Motani and
Wai-Choong Wong When Ambient Intelligence meets the
Internet: User Module framework and its
applications . . . . . . . . . . . . . . 1763--1781
Zhipeng Ouyang and
Lisong Xu and
Byrav Ramamurthy and
Negede Yossef Partial forwarding vs. partial
participation for dynamic window
resizing in P2P streaming . . . . . . . 1782--1796
Xiang Cheng and
Sen Su and
Zhongbao Zhang and
Kai Shuang and
Fangchun Yang and
Yan Luo and
Jie Wang Virtual network embedding through
topology awareness and optimization . . 1797--1813
ChengGuo Yin and
ShuangQing Li and
Qi Li Network traffic classification via HMM
under the guidance of syntactic
structure . . . . . . . . . . . . . . . 1814--1825
Jihene Rezgui and
Abdelhakim Hafid and
Racha Ben Ali and
Michel Gendreau Optimization model for handoff-aware
channel assignment problem for
multi-radio wireless mesh networks . . . 1826--1846
Péter Soproni and
Tibor Cinkler Preplanned restoration of multicast
demands in optical networks . . . . . . 1847--1861
Anonymous Editorial Board . . . . . . . . . . . . ??
Mohammad Abdul Awal and
Lila Boukhatem and
Lin Chen An integrated cross-layer framework of
adaptive FEedback REsource allocation
and Prediction for OFDMA systems . . . . 1863--1875
Ilknur Aydin and
Janardhan Iyengar and
Phillip Conrad and
Chien-Chung Shen and
Paul Amer Evaluating TCP-friendliness in light of
Concurrent Multipath Transfer . . . . . 1876--1892
Jose Saldana and
Julián Fernández-Navajas and
José Ruiz-Mas and
Jenifer Murillo and
Eduardo Viruete Navarro and
José I. Aznar Evaluating the influence of multiplexing
schemes and buffer implementation on
perceived VoIP conversation quality . . 1893--1919
Jochen Furthmüller and
Oliver P. Waldhorst Energy-aware resource sharing with
mobile devices . . . . . . . . . . . . . 1920--1934
Habib M. Ammari On the problem of $k$-coverage in
mission-oriented mobile wireless sensor
networks . . . . . . . . . . . . . . . . 1935--1950
Anfeng Liu and
Ju Ren and
Xu Li and
Zhigang Chen and
Xuemin (Sherman) Shen Design principles and improvement of
cost function based energy aware routing
algorithms for wireless sensor networks 1951--1967
Bheemarjuna Reddy Tamma and
B. S. Manoj and
Ramesh R. Rao Traffic sensing and characterization in
multi-channel wireless networks for
cognitive networking . . . . . . . . . . 1968--1982
Fabricio Murai and
Antonio A. de A. Rocha and
Daniel R. Figueiredo and
Edmundo A. de Souza e Silva Heterogeneous download times in a
homogeneous BitTorrent swarm . . . . . . 1983--2000
Duc A. Tran and
Khanh Nguyen and
Cuong Pham S-CLONE: Socially-aware data replication
for social networks . . . . . . . . . . 2001--2013
Mihaela Ion and
Giovanni Russello and
Bruno Crispo Design and implementation of a
confidentiality and access control
solution for publish/subscribe systems 2014--2037
Pietro Michiardi and
Damiano Carra and
Francesco Albanese and
Azer Bestavros Peer-assisted content distribution on a
budget . . . . . . . . . . . . . . . . . 2038--2048
Zhe Wang and
Kai Hu and
Ke Xu and
Baolin Yin and
Xiaowen Dong Structural analysis of network traffic
matrix via relaxed principal component
pursuit . . . . . . . . . . . . . . . . 2049--2067
Kiam Cheng How and
Maode Ma and
Yang Qin An altruistic differentiated service
protocol in dynamic cognitive radio
networks against selfish behaviors . . . 2068--2079
Mursalin Akon and
Mohammad Towhidul Islam and
Xuemin (Sherman) Shen and
Ajit Singh A bandwidth and effective hit optimal
cache scheme for wireless data access
networks with client injected updates 2080--2095
Anonymous Editorial Board . . . . . . . . . . . . ??
Vincent Reinhard and
Johanne Cohen and
Joanna Tomasik and
Dominique Barth and
Marc-Antoine Weisser Optimal configuration of an optical
network providing predefined multicast
transmissions . . . . . . . . . . . . . 2097--2106
Hani Ragab Hassen and
Hatem Bettahar and
Abdalmadjid Bouadbdallah and
Yacine Challal An efficient key management scheme for
content access control for linear
hierarchies . . . . . . . . . . . . . . 2107--2118
Jin Cao and
Hui Li and
Maode Ma and
Yueyu Zhang and
Chengzhe Lai A simple and robust handover
authentication between HeNB and eNB in
LTE networks . . . . . . . . . . . . . . 2119--2131
Yong Liao and
Jiangtao Yin and
Dong Yin and
Lixin Gao DPillar: Dual-port server
interconnection network for large scale
data centers . . . . . . . . . . . . . . 2132--2147
Yuh-Jzer Joung and
Wing-Tat Wong and
Hsiao-Mei Huang and
Yi-Fang Chou Building a network-aware and
load-balanced peer-to-peer system for
range queries . . . . . . . . . . . . . 2148--2167
Kwan-Wu Chin and
Shinan Li Novel association control strategies for
multicasting in relay-enabled WLANs . . 2168--2178
Antti Mäkelä and
Sebastian Siikavirta and
Jukka Manner Comparison of load-balancing approaches
for multipath connectivity . . . . . . . 2179--2195
B. E. Bilgin and
V. C. Gungor Performance evaluations of ZigBee in
different smart grid environments . . . 2196--2205
Sihyung Lee and
Kyriaki Levanti and
Hyong S. Kim Impact analysis of BGP sessions for
prioritization of maintenance operations 2206--2220
GholamHossein Ekbatanifard and
Reza Monsefi and
Mohammad H. Yaghmaee M. and
Seyed Amin Hosseini S. Queen-MAC: a quorum-based
energy-efficient medium access control
protocol for wireless sensor networks 2221--2236
Anonymous Editorial Board . . . . . . . . . . . . ??
Péter Mátray and
Péter Hága and
Sándor Laki and
Gábor Vattay and
István Csabai On the spatial properties of Internet
routes . . . . . . . . . . . . . . . . . 2237--2248
Carlo Fragni and
Luís Henrique Maciel Kosmalski Costa ECO-ALOC: Energy-efficient resource
allocation for cluster-based software
routers . . . . . . . . . . . . . . . . 2249--2261
Fernando Lezama and
Gerardo Castañón and
Ana Maria Sarmiento Differential evolution optimization
applied to the wavelength converters
placement problem in all optical
networks . . . . . . . . . . . . . . . . 2262--2275
Tuan-Minh Pham and
Serge Fdida DTN support for news dissemination in an
urban area . . . . . . . . . . . . . . . 2276--2291
Changhui Hu and
Tat Wing Chim and
S. M. Yiu and
Lucas C. K. Hui and
Victor O. K. Li Efficient HMAC-based secure
communication for VANETs . . . . . . . . 2292--2303
Zheng Liu and
Maode Ma and
Jufeng Dai Utility-based scheduling in wireless
multi-hop networks over
non-deterministic fading channels . . . 2304--2315
Yuh-Jzer Joung and
Wing-Tat Wong and
Hsiao-Mei Huang and
Yi-Fang Chou Erratum to ``Building a network-aware
and load-balanced peer-to-peer system
for range queries'', COMNET, \bf 56(8)
2012, 2148--2167 . . . . . . . . . . . . 2316--2316
Anonymous Editorial Board . . . . . . . . . . . . ??
Antonio Capone and
Dan Kilper and
Zhisheng Niu Editorial for Computer Networks special
issue on ``Green communication
networks'' . . . . . . . . . . . . . . . 2317--2319
Raffaele Bolla and
Roberto Bruschi and
Alessandro Carrega and
Franco Davoli and
Diego Suino and
Constantinos Vassilakis and
Anastasios Zafeiropoulos Cutting the energy bills of Internet
Service Providers and telecoms through
power management: an impact analysis . . 2320--2342
Young-Min Kim and
Eun-Jung Lee and
Hea-Sook Park and
Jun-Kyun Choi and
Hong-Shik Park Ant colony based self-adaptive energy
saving routing for energy efficient
Internet . . . . . . . . . . . . . . . . 2343--2354
Francesca Cuomo and
Antonio Cianfrani and
Marco Polverini and
Daniele Mangione Network pruning for energy saving in the
Internet . . . . . . . . . . . . . . . . 2355--2367
Stefano Avallone and
Giorgio Ventre Energy efficient online routing of flows
with additive constraints . . . . . . . 2368--2382
Weigang Hou and
Lei Guo and
Xuetao Wei and
Xiaoxue Gong Multi-granularity and robust grooming in
power- and port-cost-efficient IP over
WDM networks . . . . . . . . . . . . . . 2383--2399
Jorge López Vizcaíno and
Yabin Ye and
Idelfonso Tafur Monroy Energy efficiency analysis for
flexible-grid OFDM-based optical
networks . . . . . . . . . . . . . . . . 2400--2419
Sergio Ricciardi and
Francesco Palmieri and
Ugo Fiore and
Davide Careglio and
Germán Santos-Boada and
Josep Solé-Pareta An energy-aware dynamic RWA framework
for next-generation wavelength-routed
networks . . . . . . . . . . . . . . . . 2420--2442
Giuseppe Rizzelli and
Annalisa Morea and
Massimo Tornatore and
Olivier Rival Energy efficient Traffic-Aware design of
on-off Multi-Layer translucent optical
networks . . . . . . . . . . . . . . . . 2443--2455
Sergio Herrería-Alonso and
Miguel Rodri'guez-Pérez and
Manuel Fernández-Veiga and
Cándido López-García Optimal configuration of
Energy-Efficient Ethernet . . . . . . . 2456--2467
Martin Wolkerstorfer and
Driton Statovci and
Tomas Nordström Energy-saving by low-power modes in
ADSL2 . . . . . . . . . . . . . . . . . 2468--2480
Vincenzo Mancuso and
Sara Alouf Analysis of power saving with continuous
connectivity . . . . . . . . . . . . . . 2481--2493
Koen De Turck and
Stijn De Vuyst and
Dieter Fiems and
Sabine Wittevrongel and
Herwig Bruneel Performance analysis of sleep mode
mechanisms in the presence of
bidirectional traffic . . . . . . . . . 2494--2505
Karina Gomez and
Dejene Boru and
Roberto Riggio and
Tinku Rasheed and
Daniele Miorandi and
Fabrizio Granelli Measurement-based modelling of power
consumption at wireless access network
gateways . . . . . . . . . . . . . . . . 2506--2521
Ana Paula Couto da Silva and
Michela Meo and
Marco Ajmone Marsan Energy-performance trade-off in dense
WLANs: a queuing study . . . . . . . . . 2522--2537
Kim Khoa Nguyen and
Mohamed Cheriet and
Mathieu Lemay and
Victor Reijs and
Andrew Mackarel and
Alin Pastrama Environmental-aware virtual data center
network . . . . . . . . . . . . . . . . 2538--2550
Anonymous Editorial Board . . . . . . . . . . . . ??
Aniket Pingley and
Wei Yu and
Nan Zhang and
Xinwen Fu and
Wei Zhao A context-aware scheme for
privacy-preserving location-based
services . . . . . . . . . . . . . . . . 2551--2568
Weverton Luis da Costa Cordeiro and
Flávio Roberto Santos and
Gustavo Huff Mauch and
Marinho Pilla Barcelos and
Luciano Paschoal Gaspary Identity management based on adaptive
puzzles to protect P2P systems from
Sybil attacks . . . . . . . . . . . . . 2569--2589
Cheng-Han Lin and
Yu-Chi Wang and
Ce-Kuen Shieh and
Wen-Shyang Hwang An unequal error protection mechanism
for video streaming over IEEE 802.11e
WLANs . . . . . . . . . . . . . . . . . 2590--2599
Sara Moftah Elrabiei and
Mohamed Hadi Habaebi Reliable cooperative multicasting for
MBS WiMAX traffic . . . . . . . . . . . 2600--2613
Ching-Wen Chen and
Chuan-Chi Weng and
Po-Yueh Chen An interference avoidance MAC protocol
design in mobile ad hoc networks . . . . 2614--2634
Sheng-Wei Wang Probability based dynamic-alternate
routing and the corresponding converter
placement algorithm in all-optical WDM
networks . . . . . . . . . . . . . . . . 2635--2648
Behnam Bahrak and
Amol Deshpande and
Jung-Min `Jerry' Park Spectrum access policy reasoning for
policy-based cognitive radios . . . . . 2649--2663
Wei Dong and
Chun Chen and
Xue Liu and
Guodong Teng and
Jiajun Bu and
Yunhao Liu Bulk data dissemination in wireless
sensor networks: Modeling and analysis 2664--2676
Nobuyoshi Tomita and
Shahrokh Valaee Data uploading time estimation for CUBIC
TCP in long distance networks . . . . . 2677--2689
Meiqin Tang and
Chengnian Long and
Xinping Guan and
Xinjiang Wei Nonconvex dynamic spectrum allocation
for cognitive radio networks via
particle swarm optimization and
simulated annealing . . . . . . . . . . 2690--2699
Dino Martin Lopez Pacheco and
Tuan Tran Thai and
Emmanuel Lochin and
Fabrice Arnal An IP-ERN architecture to enable hybrid
E2E/ERN protocol and application to
satellite networking . . . . . . . . . . 2700--2713
Helena Fernández-López and
José A. Afonso and
J. H. Correia and
Ricardo Simoes Towards the design of efficient
nonbeacon-enabled ZigBee networks . . . 2714--2725
Péter Schaffer and
Károly Farkas and
Ádám Horváth and
Tamás Holczer and
Levente Buttyán Secure and reliable clustering in
wireless sensor networks: a critical
survey . . . . . . . . . . . . . . . . . 2726--2741
Nico Saputro and
Kemal Akkaya and
Suleyman Uludag A survey of routing protocols for smart
grid communications . . . . . . . . . . 2742--2771
Anonymous Editorial Board . . . . . . . . . . . . ??
Pinghui Wang and
Xiaohong Guan and
Don Towsley and
Jing Tao Virtual indexing based methods for
estimating node connection degrees . . . 2773--2787
Sookyoung Lee and
Mohamed Younis Optimized relay node placement for
connecting disjoint wireless sensor
networks . . . . . . . . . . . . . . . . 2788--2804
Eduardo Feitosa and
Eduardo Souto and
Djamel H. Sadok An orchestration approach for unwanted
Internet traffic identification . . . . 2805--2831
Saeed Rashwand and
Jelena Misi\'c Effects of access phases lengths on
performance of IEEE 802.15.6 CSMA/CA . . 2832--2846
Jianxin Liao and
Jinzhu Wang and
Tonghong Li and
Jing Wang and
Jingyu Wang and
Xiaomin Zhu A distributed end-to-end overload
control mechanism for networks of SIP
servers . . . . . . . . . . . . . . . . 2847--2868
Alberto Castro and
Luis Velasco and
Marc Ruiz and
Miroslaw Klinkowski and
Juan Pedro Fernández-Palacios and
Davide Careglio Dynamic routing and spectrum
(re)allocation in future flexgrid
optical networks . . . . . . . . . . . . 2869--2883
F. Javier Ortega and
José A. Troyano and
Fermín L. Cruz and
Carlos G. Vallejo and
Fernando Enríquez Propagation of trust and distrust for
the detection of trolls in a social
network . . . . . . . . . . . . . . . . 2884--2895
Daniel Camps-Mur and
Manil Dev Gomony and
Xavier Pérez-Costa and
Sebasti\`a Sallent-Ribes Leveraging 802.11n frame aggregation to
enhance QoS and power consumption in
Wi-Fi networks . . . . . . . . . . . . . 2896--2911
Mario Montagud and
Fernando Boronat Enhanced adaptive RTCP-based
Inter-Destination Multimedia
Synchronization approach for distributed
applications . . . . . . . . . . . . . . 2912--2933
Jae-Yong Yoo and
Cigdem Sengul and
Ruben Merz and
JongWon Kim Backpressure scheduling in IEEE 802.11
wireless mesh networks: Gap between
theory and practice . . . . . . . . . . 2934--2948
Adrian Holzer and
Patrick Eugster and
Beno\^\it Garbinato ALPS --- Adaptive Location-based
Publish/Subscribe . . . . . . . . . . . 2949--2962
S. Chieochan and
E. Hossain Network coding for unicast in a WiFi
hotspot: Promises, challenges, and
testbed implementation . . . . . . . . . 2963--2980
Ze Wang and
Maode Ma and
Jigang Wu Securing wireless mesh networks in a
unified security framework with
corruption-resilience . . . . . . . . . 2981--2993
Tsu-Yang Wu and
Yuh-Min Tseng and
Tung-Tso Tsai A revocable ID-based authenticated group
key exchange protocol with resistant to
malicious participants . . . . . . . . . 2994--3006
Anonymous Editorial Board . . . . . . . . . . . . ??
Pablo Pavon-Marino and
Mohammed Atiquzzaman and
Joan Garcia-Haro Special issue on ``Challenges in
high-performance switching and routing
in the Future Internet'' . . . . . . . . 3007--3009
Hyesook Lim and
Soohyun Lee and
Earl E. Swartzlander, Jr. A new hierarchical packet classification
algorithm . . . . . . . . . . . . . . . 3010--3022
Anat Bremler-Barr and
David Hay and
Danny Hendler Layered interval codes for TCAM-based
classification . . . . . . . . . . . . . 3023--3039
Aleksandra Smiljani\'c and
Zoran Cica A comparative review of scalable lookup
algorithms for IPv6 . . . . . . . . . . 3040--3054
Nizar Ben Neji and
Adel Bouhoula A prefix-based approach for managing
hybrid specifications in complex packet
filtering . . . . . . . . . . . . . . . 3055--3064
Mustafa Sanli and
Ece Güran Schmidt and
Hasan Cengiz Güran Hardware design and implementation of
packet fair queuing algorithms for the
quality of service support in the
high-speed Internet . . . . . . . . . . 3065--3075
Andrea Francini Periodic early detection for improved
TCP performance and energy efficiency 3076--3086
Dinil Mon Divakaran A spike-detecting AQM to deal with
elephants . . . . . . . . . . . . . . . 3087--3098
D. Fernández Hermida and
M. Rodelgo Lacruz and
A. Bianco and
D. Cuda and
G. Gavilanes Castillo and
C. López Bravo and
F. J. González Castaño AWG-based optical switches performance
using crosstalk limiting schedulers . . 3099--3109
Davide Cuda and
Paolo Giaccone and
Massimo Montalto Design and control of next generation
distribution frames . . . . . . . . . . 3110--3122
Ricard Vilalta and
Raul Muñoz and
Ramon Casellas and
Ricardo Martinez and
Javier Vílchez GMPLS-enabled MPLS-TP/PWE3 node with
integrated 10 Gbps tunable DWDM
transponders: design and experimental
evaluation . . . . . . . . . . . . . . . 3123--3135
Miklós Molnár and
Alia Bellabas and
Samer Lahoud The cost optimal solution of the
multi-constrained multicast routing
problem . . . . . . . . . . . . . . . . 3136--3149
Diego Lucerna and
Massimo Tornatore and
Biswanath Mukherjee and
Achille Pattavina Trading availability among
shared-protected dynamic connections in
WDM networks . . . . . . . . . . . . . . 3150--3162
Anonymous Editorial Board . . . . . . . . . . . . ??
Olfa Gaddour and
Anis Koubâa RPL in a nutshell: a survey . . . . . . 3163--3178
Xian Zhang and
Xiuzhong Chen and
Chris Phillips Achieving effective resilience for
QoS-aware application mapping . . . . . 3179--3191
Sihyung Lee and
Tina Wong and
Hyong S. Kim Improving manageability through
reorganization of routing-policy
configurations . . . . . . . . . . . . . 3192--3205
H. Ahmadi and
Y. H. Chew Evolutionary algorithms for orthogonal
frequency division multiplexing-based
dynamic spectrum access systems . . . . 3206--3218
Aruna Prem Bianzino and
Luca Chiaraviglio and
Marco Mellia and
Jean-Louis Rougier GRiDA: GReen Distributed Algorithm for
energy-efficient IP backbone networks 3219--3232
Amit Mondal and
Ionut Trestian and
Zhen Qin and
Aleksandar Kuzmanovic P2P as a CDN: a new service model for
file sharing . . . . . . . . . . . . . . 3233--3246
Zhiguo Hu and
Dalu Zhang and
Anqi Zhu and
Zhiwei Chen and
Hualei Zhou SLDRT: a measurement technique for
available bandwidth on multi-hop path
with bursty cross traffic . . . . . . . 3247--3260
Caishi Huang and
Chin-Tau Lea and
Albert Kai-Sun Wong A joint solution for the hidden and
exposed terminal problems in CSMA/CA
wireless networks . . . . . . . . . . . 3261--3273
Gustavo B. Figueiredo and
Eduardo Candido Xavier and
Nelson L. S. da Fonseca Optimal algorithms for the batch
scheduling problem in OBS networks . . . 3274--3286
Xiang Fei and
Evan Magill REED: Flexible rule based programming of
wireless sensor networks at runtime . . 3287--3299
Issa Khalil and
Mamoun Awad and
Abdallah Khreishah CTAC: Control traffic tunneling attacks'
countermeasures in mobile wireless
networks . . . . . . . . . . . . . . . . 3300--3317
Wha Sook Jeon and
Dong Geun Jeong Adaptive sensing scheduling for
cognitive radio systems . . . . . . . . 3318--3332
Alexander Shpiner and
Isaac Keslassy and
Gabi Bracha and
Eyal Dagan and
Ofer Iny and
Eyal Soha A switch-based approach to throughput
collapse and starvation in data centers 3333--3346
Ram G. Lakshmi Narayanan and
Oliver C. Ibe A joint network for disaster recovery
and search and rescue operations . . . . 3347--3373
Olga León and
Juan Hernández-Serrano and
Miguel Soriano Cooperative detection of primary user
emulation attacks in CRNs . . . . . . . 3374--3384
Anonymous Editorial Board . . . . . . . . . . . . ??
Po-Kai Tseng and
Wei-Ho Chung Joint coverage and link utilization for
fast IP local protection . . . . . . . . 3385--3400
Robin Doss and
Wanlei Zhou and
Saravanan Sundaresan and
Shui Yu and
Longxiang Gao A minimum disclosure approach to
authentication and privacy in RFID
systems . . . . . . . . . . . . . . . . 3401--3416
Changwang Zhang and
Zhiping Cai and
Weifeng Chen and
Xiapu Luo and
Jianping Yin Flow level detection and filtering of
low-rate DDoS . . . . . . . . . . . . . 3417--3431
Yang Guo and
Chao Liang and
Yong Liu Hierarchically Clustered P2P Video
Streaming: Design, implementation, and
evaluation . . . . . . . . . . . . . . . 3432--3445
Yu Chen and
Xuming Fang Energy-efficient dynamic resource
allocation with opportunistic network
coding in OFDMA relay networks . . . . . 3446--3455
Yishay Mansour and
Boaz Patt-Shamir and
Dror Rawitz Overflow management with multipart
packets . . . . . . . . . . . . . . . . 3456--3467
Jiwoong Bang and
Daewon Kim Efficient RTSP-based multiple buffering
and packet transmission methods for
delivering OMA PoC Box service . . . . . 3468--3478
Matheus Brenner Lehmann and
Flávio Roberto Santos and
Luciano Paschoal Gaspary and
Marinho Pilla Barcellos Denial-of-service attacks and
countermeasures on BitTorrent . . . . . 3479--3498
A. E. Krzesinski and
G. Latouche and
P. G. Taylor How do we encourage an egoist to act
socially in an ad hoc mobile network? 3499--3510
Anatolij Zubow and
Johannes Marotzke and
Daniel Camps-Mur and
Xavier Perez Costa sGSA: a SDMA-OFDMA greedy scheduling
algorithm for WiMAX networks . . . . . . 3511--3530
Alessio Botta and
Alberto Dainotti and
Antonio Pescapé A tool for the generation of realistic
network workload for emerging networking
scenarios . . . . . . . . . . . . . . . 3531--3547
Xiangyang Zhang and
Hossam Hassanein A survey of peer-to-peer live video
streaming schemes --- an algorithmic
perspective . . . . . . . . . . . . . . 3548--3579
Anonymous Editorial Board . . . . . . . . . . . . ??
Guang Wu and
Shu Wang and
Bang Wang and
Yan Dong and
Shu Yan A novel range-free localization based on
regulated neighborhood distance for
wireless ad hoc and sensor networks . . 3581--3593
Luigi Atzori and
Antonio Iera and
Giacomo Morabito and
Michele Nitti The Social Internet of Things (SIoT) ---
When social networks meet the Internet
of Things: Concept, architecture and
network characterization . . . . . . . . 3594--3608
Yi-Ling Hsieh and
Kuochen Wang Dynamic overlay multicast for live
multimedia streaming in urban VANETs . . 3609--3628
David Palma and
Helder Araujo and
Marilia Curado Link quality estimation in wireless
multi-hop networks using Kernel based
methods . . . . . . . . . . . . . . . . 3629--3638
Chien-Chi Kao and
Shun-Ren Yang and
Hsin-Chen Chen A sleep-mode interleaving algorithm for
layered-video multicast services in IEEE
802.16e networks . . . . . . . . . . . . 3639--3654
Anonymous Editorial Board . . . . . . . . . . . . ??
Alberto Coen-Porisini and
Sabrina Sicari Improving data quality using a cross
layer protocol in wireless sensor
networks . . . . . . . . . . . . . . . . 3655--3665
Antonio Capone and
Daniele Corti and
Luca Gianoli and
Brunilde Sansó An optimization framework for the energy
management of carrier Ethernet networks
with Multiple Spanning Trees . . . . . . 3666--3681
Sungwook Kim Multi-leader multi-follower Stackelberg
model for cognitive radio spectrum
sharing scheme . . . . . . . . . . . . . 3682--3692
Wen-Hsing Kuo and
Ting-Yang Lin Multi-hop multicast path construction in
modern wireless relay networks . . . . . 3693--3704
A. Detti and
M. Pomposini and
N. Blefari-Melazzi and
S. Salsano Supporting the Web with an information
centric network that routes by name . . 3705--3722
M. Yuksel and
K. K. Ramakrishnan and
S. Kalyanaraman and
J. D. Houle and
R. Sadhvani Required extra capacity: a comparative
estimation of overprovisioning needed
for a classless IP backbone . . . . . . 3723--3743
Xianfu Meng and
Yanli Wang and
Yalin Ding An optimized strategy for update path
selection in unstructured P2P networks 3744--3755
Esther Palomar and
Almudena Alcaide and
Arturo Ribagorda and
Yan Zhang The Peer's Dilemma: a general framework
to examine cooperation in pure
peer-to-peer systems . . . . . . . . . . 3756--3766
Li Feng and
Jianqing Li Integer-multiple-spacing-based
scheduling for multimedia applications
in IEEE 802.11e HCCA wireless networks 3767--3782
Jiong Jin and
Marimuthu Palaniswami and
Bhaskar Krishnamachari Rate control for heterogeneous wireless
sensor networks: Characterization,
algorithms and performance . . . . . . . 3783--3794
James Bernsen and
D. Manivannan RIVER: a reliable inter-vehicular
routing protocol for vehicular ad hoc
networks . . . . . . . . . . . . . . . . 3795--3807
Anonymous Editorial Board . . . . . . . . . . . . ??
Dirk Husemann and
Harry Rudin The WEB we live in . . . . . . . . . . . 3809--3810
Colin Allison and
Alan Miller and
Iain Oliver and
Rosa Michaelson and
Thanassis Tiropanis The Web in education . . . . . . . . . . 3811--3824
Sergey Brin and
Lawrence Page Reprint of: The anatomy of a large-scale
hypertextual Web search engine . . . . . 3825--3833
Jan Camenisch Information privacy?! . . . . . . . . . 3834--3848
Junghoo Cho and
Hector Garcia-Molina and
Lawrence Page Reprint of: Efficient crawling through
URL ordering . . . . . . . . . . . . . . 3849--3858
Wendy Hall and
Thanassis Tiropanis Web evolution and Web Science . . . . . 3859--3865
Julia Heidemann and
Mathias Klier and
Florian Probst Online social networks: a survey of a
global phenomenon . . . . . . . . . . . 3866--3878
Ian Hughes Virtual worlds, augmented reality,
blended reality . . . . . . . . . . . . 3879--3885
Andrew Odlyzko Web history and economics . . . . . . . 3886--3890
Ravi Sandhu Speculations on the science of Web user
security . . . . . . . . . . . . . . . . 3891--3895
Anonymous Editorial Board . . . . . . . . . . . . ??
Ian F. Akyildiz and
Harry Rudin COMNET editorial for 2012 . . . . . . . 1--2
Christos Papathanasiou and
Nikos Dimitriou and
Leandros Tassiulas Dynamic radio resource and interference
management for MIMO-OFDMA mobile
broadband wireless access systems . . . 3--16
Long Long and
Ahmed E. Kamal Protecting multicast services in optical
Internet backbones . . . . . . . . . . . 17--28
Ahmad Sardouk and
Majdi Mansouri and
Leila Merghem-Boulahia and
Dominique Gaiti and
Rana Rahim-Amoud Crisis management using MAS-based
wireless sensor networks . . . . . . . . 29--45
Dong Mei Shan and
Kee Chaing Chua and
Gurusamy Mohan and
Jian Qiu Partial spatial protection for
provisioning differentiated reliability
in FSTR-based Metro Ethernet networks 46--60
Seung Yeob Nam and
Seong Joon Kim and
Sihyung Lee and
Hyong S. Kim Estimation of the available bandwidth
ratio of a remote link or path segments 61--77
Kishore Angrishi An end-to-end stochastic network
calculus with effective bandwidth and
effective capacity . . . . . . . . . . . 78--84
Beakcheol Jang and
Jun Bum Lim and
Mihail L. Sichitiu An asynchronous scheduled MAC protocol
for wireless sensor networks . . . . . . 85--98
Dognhyeok An and
Honguk Woo and
Hyunsoo Yoon and
Ikjun Yeom Enhanced cooperative communication MAC
for mobile wireless networks . . . . . . 99--116
Mingwei Xu and
Meijia Hou and
Dan Wang and
Jiahai Yang An efficient critical protection scheme
for intra-domain routing using link
characteristics . . . . . . . . . . . . 117--133
A. Mirsayar Barkoosaraei and
A. Hamid Aghvami Dynamic partitioning of IP-based
wireless access networks . . . . . . . . 134--146
Addisu Eshete and
Yuming Jiang Generalizing the CHOKe flow protection 147--161
Anwesha Mukherjee and
Srimoyee Bhattacherjee and
Sucheta Pal and
Debashis De Femtocell based green power consumption
methods for mobile network . . . . . . . 162--178
Weiwei Fang and
Xiangmin Liang and
Shengxin Li and
Luca Chiaraviglio and
Naixue Xiong VMPlanner: Optimizing virtual machine
placement and traffic flow routing to
reduce network power costs in cloud data
centers . . . . . . . . . . . . . . . . 179--196
Hui Chen and
Yang Xiao and
Susan V. Vrbsky An update-based step-wise optimal cache
replacement for wireless data access . . 197--212
Enrico Gregori and
Luciano Lenzini and
Chiara Orsini $k$-Dense communities in the Internet
AS-level topology graph . . . . . . . . 213--227
Abderrahmen Mtibaa and
Khaled A. Harras Fairness-related challenges in mobile
opportunistic networking . . . . . . . . 228--242
Guang Yao and
Jun Bi and
Peiyao Xiao VASE: Filtering IP spoofing traffic with
agility . . . . . . . . . . . . . . . . 243--257
Pablo Serrano and
Paul Patras and
Andrea Mannocci and
Vincenzo Mancuso and
Albert Banchs Control theoretic optimization of 802.11
WLANs: Implementation and experimental
evaluation . . . . . . . . . . . . . . . 258--272
Fabio R. J. Vieira and
José F. de Rezende and
Valmir C. Barbosa and
Serge Fdida Local heuristic for the refinement of
multi-path routing in wireless mesh
networks . . . . . . . . . . . . . . . . 273--285
C. Mbarushimana and
A. Shahrabi and
T. Buggy A cross-layer TCP enhancement in
QoS-aware mobile ad hoc networks . . . . 286--301
Julia Amador and
Jesus R. Artalejo Modeling computer virus with the BSDE
approach . . . . . . . . . . . . . . . . 302--316
Toktam Mahmoodi and
Vasilis Friderikos and
Hamid Aghvami Using traffic asymmetry to enhance TCP
performance . . . . . . . . . . . . . . 317--329
D. Unal and
M. U. Caglayan A formal role-based access control model
for security policies in multi-domain
mobile networks . . . . . . . . . . . . 330--350
Lin Cui and
Weijia Jia Cyclic stable matching for three-sided
networking services . . . . . . . . . . 351--363
Berk Canberk An adaptive and QoS-based spectrum
awareness framework for CR networks . . 364--373
Anonymous Editorial Board . . . . . . . . . . . . ??
Ronaldo Salles and
Guofei Gu and
Morton Swimmer Editorial for Computer Networks special
issue on ``Botnet Activity: Analysis,
Detection and Shutdown'' . . . . . . . . 375--377
Sérgio S. C. Silva and
Rodrigo M. P. Silva and
Raquel C. G. Pinto and
Ronaldo M. Salles Botnets: a survey . . . . . . . . . . . 378--403
Masood Khosroshahy and
Mustafa K. Mehmet Ali and
Dongyu Qiu The SIC botnet lifecycle model: a step
beyond traditional epidemiological
models . . . . . . . . . . . . . . . . . 404--421
Marco Riccardi and
Roberto Di Pietro and
Marta Palanques and
Jorge Aguil\`a Vila Titans' revenge: Detecting Zeus via its
own flaws . . . . . . . . . . . . . . . 422--435
Aditya K. Sood and
Richard J. Enbody and
Rohit Bansal Dissecting SpyEye --- Understanding the
design of third generation botnets . . . 436--450
Juan Caballero and
Dawn Song Automatic protocol reverse-engineering:
Message format extraction and field
semantics inference . . . . . . . . . . 451--474
Christian J. Dietrich and
Christian Rossow and
Norbert Pohlmann CoCoSpot: Clustering and recognizing
botnet command and control channels
using traffic analysis . . . . . . . . . 475--486
Roberto Perdisci and
Davide Ariu and
Giorgio Giacinto Scalable fine-grained behavioral
clustering of HTTP-based malware . . . . 487--500
Hui-Tang Lin and
Ying-You Lin and
Jui-Wei Chiang Genetic-based real-time fast-flux
service networks detection . . . . . . . 501--513
Chun-Ying Huang Effective bot host detection based on
network failure models . . . . . . . . . 514--525
Pedro H. B. Las-Casas and
Dorgival Guedes and
Jussara M. Almeida and
Artur Ziviani and
Humberto T. Marques-Neto SpaDeS: Detecting spammers at the source
network . . . . . . . . . . . . . . . . 526--539
Guanhua Yan Peri-Watchdog: Hunting for hidden
botnets in the periphery of online
social networks . . . . . . . . . . . . 540--555
Yazan Boshmaf and
Ildar Muslukhov and
Konstantin Beznosov and
Matei Ripeanu Design and analysis of a social botnet 556--578
Jingyu Hua and
Kouichi Sakurai Botnet command and control based on
Short Message Service and human mobility 579--597
Anonymous Editorial Board . . . . . . . . . . . . ??
Antonio de la Oliva and
Tito R. Vargas Hernández and
Juan Carlos Guerri and
José Alberto Hernández and
Pedro Reviriego Performance analysis of Energy Efficient
Ethernet on video streaming servers . . 599--608
Evan Tan and
Chun Tung Chou Joint optimization of continuity and
quality for streaming video . . . . . . 609--621
Chong Han and
Josep Miquel Jornet and
Etimad Fadel and
Ian F. Akyildiz A cross-layer communication module for
the Internet of Things . . . . . . . . . 622--633
Zi Chu and
Steven Gianvecchio and
Aaron Koehl and
Haining Wang and
Sushil Jajodia Blog or block: Detecting blog bots
through behavioral biometrics . . . . . 634--646
Kush Kothari and
Matthew Wright Mimic: an active covert channel that
evades regularity-based detection . . . 647--657
Noriaki Kamiyama Designing data center network by
analytic hierarchy process . . . . . . . 658--667
Yu Wang and
Hari Krishna Garg and
Mehul Motani Downlink scheduling for user equipment
served by multiple mobile terminals in
cellular systems . . . . . . . . . . . . 668--681
Tudor Dumitras and
Priya Narasimhan A study of unpredictability in
fault-tolerant middleware . . . . . . . 682--698
Vincent Lucas and
Jean-Jacques Pansiot and
Dominique Grad and
Beno\^\it Hilt Robust and fair Multicast Congestion
Control (M2C) . . . . . . . . . . . . . 699--724
Joo-Young Baek and
Jeong-Yoon Lee and
Young-Joo Suh An elastic compensation model for
frame-based scheduling algorithms in
wireless networks . . . . . . . . . . . 725--740
Noriaki Kamiyama and
Tatsuya Mori and
Ryoichi Kawahara Autonomic load balancing of flow
monitors . . . . . . . . . . . . . . . . 741--761
Faqir Zarrar Yousaf and
Christian Wietfeld Optimizing throughput performance of
FMIPv6 over legacy 802.11 networks using
iterative scanning . . . . . . . . . . . 762--781
Yi-Mao Hsiao and
Yuan-Sun Chu and
Jeng-Farn Lee and
Jinn-Shyan Wang A high-throughput and high-capacity IPv6
routing lookup system . . . . . . . . . 782--794
Emiliano Casalicchio and
Luca Silvestri Mechanisms for SLA provisioning in
cloud-based service providers . . . . . 795--810
Aruna Jamdagni and
Zhiyuan Tan and
Xiangjian He and
Priyadarsi Nanda and
Ren Ping Liu RePIDS: a multi tier Real-time
Payload-based Intrusion Detection System 811--824
Reduan H. Khan and
Jamil Y. Khan A comprehensive review of the
application characteristics and traffic
requirements of a smart grid
communications network . . . . . . . . . 825--845
Anonymous Editorial Board . . . . . . . . . . . . ??
Ren-Huang Liou and
Yi-Bing Lin Mobility management with the
central-based location area policy . . . 847--857
Wei-Tong Wang and
Kuo-Feng Ssu Obstacle detection and estimation in
wireless sensor networks . . . . . . . . 858--868
Zhen Ling and
Junzhou Luo and
Wei Yu and
Xinwen Fu and
Weijia Jia and
Wei Zhao Protocol-level attacks against Tor . . . 869--886
Jiunn-Jye Lee and
Hann-Huei Chiou and
Chia-Chang Hsu and
Chin-Laung Lei An adaptive sector-based routing model
over structured peer-to-peer networks 887--896
Juhoon Kim and
Luigi Iannone and
Anja Feldmann Caching Locator/ID mappings: an
experimental scalability analysis and
its implications . . . . . . . . . . . . 897--909
Kaikai Chi and
Xiaohong Jiang and
Yi-hua Zhu and
Jing Wang and
Yanjun Li Block-level packet recovery with network
coding for wireless reliable multicast 910--923
Mohamed Diallo and
Vasilis Sourlas and
Paris Flegkas and
Serge Fdida and
Leandros Tassiulas A content-based publish/subscribe
framework for large-scale content
delivery . . . . . . . . . . . . . . . . 924--943
Xiuzhong Chen and
Marc De Leenheer and
Rui Wang and
Chaitanya S. K. Vadrevu and
Lei Shi and
Jie Zhang and
Biswanath Mukherjee High-performance routing for hose-based
VPNs in multi-domain backbone networks 944--953
Jose M. Camacho and
Alberto García-Martínez and
Marcelo Bagnulo and
Francisco Valera BGP-XM: BGP eXtended Multipath for
transit Autonomous Systems . . . . . . . 954--975
Stefano Secci and
Kunpen Liu and
Bijan Jabbari Efficient inter-domain traffic
engineering with transit-edge
hierarchical routing . . . . . . . . . . 976--989
Yuting Miao and
Qiang Yang and
Chunming Wu and
Ming Jiang and
Jinzhou Chen Multicast virtual network mapping for
supporting multiple description
coding-based video applications . . . . 990--1002
Rachid El-Azouzi and
Francesco De Pellegrini and
Habib B. A. Sidi and
Vijay Kamble Evolutionary forwarding games in delay
tolerant networks: Equilibria, mechanism
design and stochastic approximation . . 1003--1018
Alex Borges Vieira and
Rafael Barra de Almeida and
Jussara Marques de Almeida and
Sérgio Vale Aguiar Campos SimplyRep: a simple and effective
reputation system to fight pollution in
P2P live streaming . . . . . . . . . . . 1019--1036
Xiaoyuan Luo and
Yanlin Yan and
Shaobao Li and
Xinping Guan Topology control based on optimally
rigid graph in wireless sensor networks 1037--1047
Sungoh Kwon and
Neung-Hyung Lee Cell ID extension in femtocell
environments . . . . . . . . . . . . . . 1048--1062
Anonymous Editorial Board . . . . . . . . . . . . ??
Feng Shan and
Weifa Liang and
Jun Luo and
Xiaojun Shen Network lifetime maximization for
time-sensitive data gathering in
wireless sensor networks . . . . . . . . 1063--1077
Christian Bauer A Secure Correspondent Router Protocol
for NEMO Route Optimization . . . . . . 1078--1100
Mehmet Yunus Donmez and
Sinan Isik and
Cem Ersoy Combined analysis of contention window
size and duty cycle for throughput and
energy optimization in wireless sensor
networks . . . . . . . . . . . . . . . . 1101--1112
M. A. Raayatpanah and
H. Salehi Fathabadi and
B. H. Khalaj and
S. Khodayifar Minimum cost multiple multicast network
coding with quantized rates . . . . . . 1113--1123
Efe Karasabun and
Ibrahim Korpeoglu and
Cevdet Aykanat Active node determination for correlated
data gathering in wireless sensor
networks . . . . . . . . . . . . . . . . 1124--1138
Donggyu Yun and
Jungseul Ok and
Bongjhin Shin and
Soobum Park and
Yung Yi Embedding of virtual network requests
over static wireless multihop networks 1139--1152
Ji-Hoon Yun Performance analysis of IEEE 802.11
WLANs with rate adaptation in
time-varying fading channels . . . . . . 1153--1166
Pavlos Antoniou and
Andreas Pitsillides and
Tim Blackwell and
Andries Engelbrecht and
Loizos Michael Congestion control in wireless sensor
networks based on bird flocking behavior 1167--1191
Necati Kilic and
V. Cagri Gungor Analysis of low power wireless links in
smart grid environments . . . . . . . . 1192--1203
Gregory Detal and
Christoph Paasch and
Simon van der Linden and
Pascal Mérindol and
Gildas Avoine and
Olivier Bonaventure Revisiting flow-based load balancing:
Stateless path selection in data center
networks . . . . . . . . . . . . . . . . 1204--1216
Slavisa Aleksic and
Margot Deruyck and
Willem Vereecken and
Wout Joseph and
Mario Pickavet and
Luc Martens Energy efficiency of femtocell
deployment in combined wireless/optical
access networks . . . . . . . . . . . . 1217--1233
P. A. Baziana and
I. E. Pountourakis An access protocol for efficiency
optimization in WDM networks: a
propagation delay and collisions
avoidance analysis . . . . . . . . . . . 1234--1252
Lucia D'Acunto and
Nitin Chiluka and
Tamás Vinkó and
Henk Sips BitTorrent-like P2P approaches for VoD:
a comparative study . . . . . . . . . . 1253--1276
Daniele Casagrande and
Pier Luca Montessoro and
Franco Blanchini Fair and optimal dynamic admission
control of elastic flows . . . . . . . . 1277--1288
Saeed Salah and
Gabriel Maciá-Fernández and
Jesús E. Díaz-Verdejo A model-based survey of alert
correlation techniques . . . . . . . . . 1289--1317
Christian Esposito and
Domenico Cotroneo and
Stefano Russo On reliability in publish/subscribe
services . . . . . . . . . . . . . . . . 1318--1343
Wenye Wang and
Zhuo Lu Cyber security in the Smart Grid: Survey
and challenges . . . . . . . . . . . . . 1344--1371
Anonymous Editorial Board . . . . . . . . . . . . ??
Márton Csernai and
András Gulyás and
Attila Körösi and
Balázs Sonkoly and
Gergely Biczók Incrementally upgradable data center
architecture using hyperbolic
tessellations . . . . . . . . . . . . . 1373--1393
Christos Anagnostopoulos and
Stathes Hadjiefthymiades Multivariate context collection in
mobile sensor networks . . . . . . . . . 1394--1407
Kai-Wei Ke and
Chia-Hui Huang Performance evaluation of multisource
Application Layer Multicast (ALM):
Theoretical and simulative aspects . . . 1408--1424
Urs Hunkeler and
Clemens Lombriser and
Hong Linh Truong and
Beat Weiss A case for centrally controlled wireless
sensor networks . . . . . . . . . . . . 1425--1442
Conrado Borraz-Sánchez and
Diego Klabjan Optimal placement of reconfigurable
optical add/drop multiplexers with
packing, blocking, and signal loss . . . 1443--1458
Adel Ali Ahmed An enhanced real-time routing protocol
with load distribution for mobile
wireless sensor networks . . . . . . . . 1459--1473
Linjun Fan and
Yunxiang Ling and
Tao Wang and
Xiaomin Zhu and
Xiaoyong Tang Novel clock synchronization algorithm of
parametric difference for parallel and
distributed simulations . . . . . . . . 1474--1487
Youghourta Benfattoum and
Steven Martin and
Khaldoun Al Agha QoS for real-time reliable multicasting
in wireless multi-hop networks using a
Generation-Based Network Coding . . . . 1488--1502
E. Amaldi and
A. Capone and
L. G. Gianoli Energy-aware IP traffic engineering with
shortest path routing . . . . . . . . . 1503--1517
Rajarshi Mahapatra and
Antonio De Domenico and
Rohit Gupta and
Emilio Calvanese Strinati Green framework for future heterogeneous
wireless networks . . . . . . . . . . . 1518--1528
Xiaoping Wang and
Yunhao Liu and
Zheng Yang and
Kai Lu and
Jun Luo OFA: an optimistic approach to conquer
flip ambiguity in network localization 1529--1544
S. Chiappetta and
C. Mazzariello and
R. Presta and
S. P. Romano An anomaly-based approach to the
analysis of the social behavior of VoIP
users . . . . . . . . . . . . . . . . . 1545--1559
Ryoichi Kawahara and
Tetsuya Takine and
Tatsuya Mori and
Noriaki Kamiyama and
Keisuke Ishibashi Mean-variance relationship of the number
of flows in traffic aggregation and its
application to traffic management . . . 1560--1576
Anonymous Editorial Board . . . . . . . . . . . . ??
S. H. Shah Newaz and
Ángel Cuevas and
Gyu Myoung Lee and
Noël Crespi and
Jun Kyun Choi Adaptive Delay-Aware Energy Efficient
TDM-PON . . . . . . . . . . . . . . . . 1577--1596
Christian Facchini and
Oliver Holland and
Fabrizio Granelli and
Nelson L. S. da Fonseca and
Hamid Aghvami Dynamic green self-configuration of 3G
base stations using fuzzy cognitive maps 1597--1610
Weibo Chu and
Xiaohong Guan and
Zhongmin Cai and
Lixin Gao Real-time volume control for interactive
network traffic replay . . . . . . . . . 1611--1629
Tobias Jung and
Sylvain Martin and
Mohamed Nassar and
Damien Ernst and
Guy Leduc Outbound SPIT filter with optimal
performance guarantees . . . . . . . . . 1630--1643
Jongwook Lee and
Jin-Ghoo Choi and
Saewoong Bahk Opportunistic downlink data delivery for
mobile collaborative communities . . . . 1644--1655
T. D. Lagkas and
P. Sarigiannidis and
M. Louta On analyzing the intra-frame power
saving potentials of the IEEE 802.16e
downlink vertical mapping . . . . . . . 1656--1673
Weijie Wu and
John C. S. Lui and
Richard T. B. Ma On incentivizing upload capacity in
P2P-VoD systems: Design, analysis and
evaluation . . . . . . . . . . . . . . . 1674--1688
Wei Kuang Lai and
Chang-Lung Tang QoS-aware downlink packet scheduling for
LTE networks . . . . . . . . . . . . . . 1689--1698
Cristina Rottondi and
Giacomo Verticale and
Antonio Capone Privacy-preserving smart metering with
multiple data consumers . . . . . . . . 1699--1713
Javad Akbari Torkestani An energy-efficient topology
construction algorithm for wireless
sensor networks . . . . . . . . . . . . 1714--1725
Ahmad Vakili and
Jean-Charles Grégoire QoE management for video conferencing
applications . . . . . . . . . . . . . . 1726--1738
Anonymous Editorial Board . . . . . . . . . . . . ??
Stamatios Arkoulis and
Evangelos Anifantis and
Vasileios Karyotis and
Symeon Papavassiliou and
Nikolaos Mitrou On the optimal, fair and channel-aware
cognitive radio network reconfiguration 1739--1757
László Gyarmati and
András Gulyás and
Balázs Sonkoly and
Tuan A. Trinh and
Gergely Biczók Free-scaling your data center . . . . . 1758--1773
Gongqi Lin and
Sieteng Soh and
Kwan-Wu Chin and
Mihai Lazarescu Efficient heuristics for energy-aware
routing in networks with bundled links 1774--1788
Giacomo Bacci and
Marco Luise QoS-aware game-theoretic rate & power
control for CDMA wireless communication
networks . . . . . . . . . . . . . . . . 1789--1804
Shengbo Yang and
Chai Kiat Yeo and
Bu Sung Lee MaxCD: Efficient multi-flow scheduling
and cooperative downloading for improved
highway drive-thru Internet systems . . 1805--1820
Michele Rondinone and
Javier Gozalvez Contention-based forwarding with
multi-hop connectivity awareness in
vehicular ad-hoc networks . . . . . . . 1821--1837
Giovanna Carofiglio and
Luca Muscariello and
Dario Rossi and
Claudio Testa and
Silvio Valenti Rethinking the Low Extra Delay
Background Transport (LEDBAT) Protocol 1838--1852
Zoltán Czirkos and
Gábor Hosszú Solution for the broadcasting in the
Kademlia peer-to-peer overlay . . . . . 1853--1862
Stefano Iellamo and
Lin Chen and
Marceau Coupechoux Proportional and double imitation rules
for spectrum access in cognitive radio
networks . . . . . . . . . . . . . . . . 1863--1879
Alexandre A. Pires and
José F. de Rezende Independent links: a new approach to
increase spatial reuse in wireless
networks . . . . . . . . . . . . . . . . 1880--1893
Anonymous Editorial Board . . . . . . . . . . . . ??
Xi Fang and
Dejun Yang and
Guoliang Xue Pathbook: Cross-layer optimization for
full-duplex wireless networks . . . . . 1895--1912
Habib M. Ammari On the energy-delay trade-off in
geographic forwarding in always-on
wireless sensor networks: a
multi-objective optimization problem . . 1913--1935
Michal Ficek and
Tomás Pop and
Lukás Kencl Active tracking in mobile networks: an
in-depth view . . . . . . . . . . . . . 1936--1954
L. Militano and
A. Iera and
F. Scarcello A fair cooperative content-sharing
service . . . . . . . . . . . . . . . . 1955--1973
Péter Babarczi and
Gergely Biczók and
Harald Òverby and
János Tapolcai and
Péter Soproni Realization strategies of dedicated path
protection: a bandwidth cost perspective 1974--1990
Waleed Alsalih and
Kashif Ali and
Hossam Hassanein A power control technique for
anti-collision schemes in RFID systems 1991--2003
A. Coiro and
M. Listanti and
A. Valenti and
F. Matera Energy-aware traffic engineering: a
routing-based distributed solution for
connection-oriented IP networks . . . . 2004--2020
Juan Felipe Botero and
Xavier Hesselbach Greener networking in a network
virtualization environment . . . . . . . 2021--2039
Adil Fahad and
Zahir Tari and
Ibrahim Khalil and
Ibrahim Habib and
Hussein Alnuweiri Toward an efficient and scalable feature
selection approach for Internet traffic
classification . . . . . . . . . . . . . 2040--2057
S. Gramatikov and
F. Jaureguizar and
J. Cabrera and
N. García Stochastic modelling of peer-assisted
VoD streaming in managed networks . . . 2058--2074
Evariste Logota and
Carlos Campos and
Susana Sargento and
Augusto Neto Advanced multicast class-based bandwidth
over-provisioning . . . . . . . . . . . 2075--2092
Giuseppe Aceto and
Alessio Botta and
Walter de Donato and
Antonio Pescap\`e Cloud monitoring: a survey . . . . . . . 2093--2115
Anonymous Editorial Board . . . . . . . . . . . . ??
Stephan Eidenbenz and
Madhav Marathe and
Arunabha Sen Editorial for Computer Networks special
issue on ``Towards a Science of Cyber
Security'' . . . . . . . . . . . . . . . 2119--2120
Chris J. Kuhlman and
V. S. Anil Kumar and
S. S. Ravi Controlling opinion propagation in
online networks . . . . . . . . . . . . 2121--2132
Nam P. Nguyen and
Guanhua Yan and
My T. Thai Analysis of misinformation containment
in online social networks . . . . . . . 2133--2146
Yi Wang and
Marios Iliofotou and
Michalis Faloutsos and
Bin Wu Analyzing Communication Interaction
Networks (CINs) in enterprises and
inferring hierarchies . . . . . . . . . 2147--2158
Jaafar Almasizadeh and
Mohammad Abdollahi Azgomi A stochastic model of attack process for
the evaluation of security metrics . . . 2159--2180
Bugra Caskurlu and
Ashish Gehani and
Cemal Cagatay Bilgin and
K. Subramani Analytical models for risk-based
intrusion response . . . . . . . . . . . 2181--2192
Udi Ben-Porat and
Anat Bremler-Barr and
Hanoch Levy On the exploitation of CDF based
wireless scheduling . . . . . . . . . . 2193--2205
Klaus Julisch Understanding and overcoming cyber
security anti-patterns . . . . . . . . . 2206--2211
Anonymous Special Issue on ``Security and identity
architecture for the future Internet'' 2215--2217
Tapio Levä and
Miika Komu and
Ari Keränen and
Sakari Luukkainen Adoption barriers of network layer
protocols: the case of host identity
protocol . . . . . . . . . . . . . . . . 2218--2232
Elena Torroglosa-García and
Antonio D. Pérez-Morales and
Pedro Martinez-Julia and
Diego R. Lopez Integration of the OAuth and Web Service
family security standards . . . . . . . 2233--2249
Yang Xiang and
Xingang Shi and
Jianping Wu and
Zhiliang Wang and
Xia Yin Sign what you really care about ---
Secure BGP AS-paths efficiently . . . . 2250--2265
Rodrigo Roman and
Jianying Zhou and
Javier Lopez On the features and challenges of
security and privacy in distributed
Internet of Things . . . . . . . . . . . 2266--2279
Pedro Martinez-Julia and
Antonio F. Skarmeta Beyond the separation of identifier and
locator: Building an identity-based
overlay network architecture for the
Future Internet . . . . . . . . . . . . 2280--2300
Anonymous Editorial Board . . . . . . . . . . . . ??
Paola Cappanera and
Luciano Lenzini and
Alessandro Lori and
Giovanni Stea and
Gigliola Vaglini Optimal joint routing and link
scheduling for real-time traffic in TDMA
Wireless Mesh Networks . . . . . . . . . 2301--2312
Soham Sengupta An approach to provide a network layer
security model with QR code generated
with shuffled GPS parameters as embedded
keys traveling over Internet using
existing IPv4 mechanism . . . . . . . . 2313--2330
Fabien Tarissan and
Bruno Quoitin and
Pascal Mérindol and
Benoit Donnet and
Jean-Jacques Pansiot and
Matthieu Latapy Towards a bipartite graph modeling of
the Internet topology . . . . . . . . . 2331--2347
Xiao-Yang Liu and
Kai-Liang Wu and
Yanmin Zhu and
Linghe Kong and
Min-You Wu Mobility increases the surface coverage
of distributed sensor networks . . . . . 2348--2363
Md. Nooruzzaman and
Osanori Koyama and
Yutaka Katsuyama Congestion removing performance of
stackable ROADM in WDM networks under
dynamic traffic . . . . . . . . . . . . 2364--2373
Mirjana D. Stojanovic and
Aleksandra M. Kostic-Ljubisavljevic and
Vesna M. Radonjic-Djogatovic SLA-controlled interconnection charging
in next generation networks . . . . . . 2374--2394
Kenneth J. Turner and
Evan H. Magill Special Issue on feature interaction in
communications and software systems . . 2395--2398
Sven Apel and
Alexander von Rhein and
Thomas Thüm and
Christian Kästner Feature-interaction detection based on
feature-based specifications . . . . . . 2399--2409
M. Kolberg and
J. F. Buford and
K. Dhara and
X. Wu and
V. Krishnaswamy Feature interaction in a federated
communications-enabled collaboration
platform . . . . . . . . . . . . . . . . 2410--2428
Claire Maternaghan and
Kenneth J. Turner Policy conflicts in home automation . . 2429--2441
Masahide Nakamura and
Kousuke Ikegami and
Shinsuke Matsumoto Considering impacts and requirements for
better understanding of environment
interactions in home network services 2442--2453
Thein Than Tun and
Robin Laney and
Yijun Yu and
Bashar Nuseibeh Specifying software features for
composition: a tool-supported approach 2454--2464
Anonymous Editorial Board . . . . . . . . . . . . ??
Yusung Kim and
Ikjun Yeom Performance analysis of in-network
caching for content-centric networking 2465--2482
Chao-Tsun Chang and
Chih-Yung Chang and
Tzu-Lin Wang and
Yun-Jung Lu Throughput enhancement by exploiting
spatial reuse opportunities with smart
antenna systems in wireless ad hoc
networks . . . . . . . . . . . . . . . . 2483--2498
Jérémy Serror and
Hui Zang and
Jean C. Bolot Measurement and modeling of paging
channel overloads on a cellular network 2499--2513
Hui-Tang Lin and
Ying-You Lin and
Chung-Jui Sun Efficient and adaptive resource
scheduling in IEEE 802.16j transparent
relay networks . . . . . . . . . . . . . 2514--2535
Klaus Wehmuth and
Artur Ziviani DACCER: Distributed Assessment of the
Closeness CEntrality Ranking in complex
networks . . . . . . . . . . . . . . . . 2536--2548
Jaehoon (Paul) Jeong and
Tian He and
David H. C. Du TMA: Trajectory-based Multi-Anycast
forwarding for efficient multicast data
delivery in vehicular networks . . . . . 2549--2563
Silvia Boiardi and
Antonio Capone and
Brunilde Sansó Radio planning of energy-aware cellular
networks . . . . . . . . . . . . . . . . 2564--2577
Hasan Tuncer and
Andres Kwasinski and
Nirmala Shenoy Performance analysis of Virtual Mobility
Domain scheme vs. IPv6 mobility
protocols . . . . . . . . . . . . . . . 2578--2596
Tolga Acar and
Mira Belenkiy and
Alptekin Küpçü Single password authentication . . . . . 2597--2614
Jeng-Wei Lee and
I-Hsun Chuang and
Win-Bin Huang and
Yau-Hwang Kuo An opportunistic resource allocation
approach for mixed QoS and non-QoS
connections in OFDMA wireless networks 2615--2627
Seungwon Shin and
Zhaoyan Xu and
Guofei Gu EFFORT: a new host-network cooperated
framework for efficient and effective
bot malware detection . . . . . . . . . 2628--2642
Ben-Jye Chang and
Ying-Hsin Liang and
Yu-Hsien Lee Dynamic-cost-reward connection admission
control for maximizing system reward in
$4$G wireless multihop relaying networks 2643--2655
Natalia Castro Fernandes and
Marcelo Duffles Donato Moreira and
Otto Carlos Muniz Bandeira Duarte Safeguarding ad hoc networks with a
self-organized membership control system 2656--2674
Anonymous Editorial Board . . . . . . . . . . . . ??
B. Bellalta and
A. Faridi and
D. Staehle and
J. Barcelo and
A. Vinel and
M. Oliver Performance analysis of CSMA/CA
protocols with multi-packet transmission 2675--2688
Pengfei Zhang and
Gaoxi Xiao and
Hwee-Pink Tan Clustering algorithms for maximizing the
lifetime of wireless sensor networks
with energy-harvesting sensors . . . . . 2689--2704
Hung-Yu Chien Combining Rabin cryptosystem and error
correction codes to facilitate anonymous
authentication with un-traceability for
low-end devices . . . . . . . . . . . . 2705--2717
José Camacho and
Pablo Padilla and
Pedro García-Teodoro and
Jesús Díaz-Verdejo A generalizable dynamic flow pairing
method for traffic classification . . . 2718--2732
Hai-Heng Ng and
Wee-Seng Soh and
Mehul Motani An underwater acoustic MAC protocol
using reverse opportunistic packet
appending . . . . . . . . . . . . . . . 2733--2751
F. Bouali and
O. Sallent and
J. Pérez-Romero and
R. Agustí A cognitive management framework for
spectrum selection . . . . . . . . . . . 2752--2765
Ibrahima Diarrassouba and
Ali Lourimi and
Ali Ridha Mahjoub and
Habib Youssef Hose workload based exact algorithm for
the optimal design of virtual private
networks . . . . . . . . . . . . . . . . 2766--2774
Florian Tschorsch and
Björn Scheuermann An algorithm for privacy-preserving
distributed user statistics . . . . . . 2775--2787
Ze Wang and
Yunlong Wang and
Maode Ma and
Jigang Wu Efficient localization for mobile sensor
networks based on constraint rules
optimized Monte Carlo method . . . . . . 2788--2801
Giuseppe Rossini and
Dario Rossi and
Christophe Betoule and
Remi Clavier and
Gilles Thouenon FIB Aplasia through probabilistic
routing and autoforwarding . . . . . . . 2802--2816
Dariusz Gasior and
Maciej Drwal Pareto-optimal Nash equilibrium in
capacity allocation game for
self-managed networks . . . . . . . . . 2817--2832
Delfina Malandrino and
Vittorio Scarano Privacy leakage on the Web: Diffusion
and countermeasures . . . . . . . . . . 2833--2855
Kai-Lung Hua and
Ge-Ming Chiu and
Hsing-Kuo Pao and
Yi-Chi Cheng An efficient scheduling algorithm for
scalable video streaming over P2P
networks . . . . . . . . . . . . . . . . 2856--2868
Anonymous Editorial Board . . . . . . . . . . . . ??
Sunheui Ryoo and
Changhee Joo and
Saewoong Bahk Location-based spectrum allocation and
partitioning scheme for cross-tier
interference mitigation in
macro-femtocell networks . . . . . . . . 2869--2879
Mingwei Xu and
Yunfei Shang and
Dan Li and
Xin Wang Greening data center networks with
throughput-guaranteed power-aware
routing . . . . . . . . . . . . . . . . 2880--2899
Xiang Meng and
Pui-Sze Tsang and
King-Shan Lui Analysis of distribution time of
multiple files in a P2P network . . . . 2900--2915
Yuh-Rong Chen and
Sridhar Radhakrishnan and
Sudarshan Dhall and
Suleyman Karabuk On multi-stream multi-source multicast
routing . . . . . . . . . . . . . . . . 2916--2930
Luca Chiaraviglio and
Antonio Cianfrani and
Esther Le Rouzic and
Marco Polverini Sleep modes effectiveness in backbone
networks with limited configurations . . 2931--2948
Duc Minh Pham and
Syed Mahfuzul Aziz Object extraction scheme and protocol
for energy efficient image communication
over wireless sensor networks . . . . . 2949--2960
Khalim Amjad Meerja and
Pin-Han Ho and
Bin Wu and
Hsiang-Fu Yu Media access protocol for a coexisting
cognitive femtocell network . . . . . . 2961--2975
Xudong Xiang and
Jianxiong Wan and
Chuang Lin and
Xin Chen A dynamic programming approximation for
downlink channel allocation in cognitive
femtocell networks . . . . . . . . . . . 2976--2991
Pramila Mouttappa and
Stephane Maag and
Ana Cavalli Using passive testing based on symbolic
execution and slicing techniques:
Application to the validation of
communication protocols . . . . . . . . 2992--3008
Chao Hu and
Ming Chen and
Changyou Xing Towards efficient video chunk
dissemination in peer-to-peer live
streaming . . . . . . . . . . . . . . . 3009--3024
Stefania Tosi and
Sara Casolari and
Michele Colajanni Data clustering based on correlation
analysis applied to highly variable
domains . . . . . . . . . . . . . . . . 3025--3038
Chao Zhou and
Xinggong Zhang and
Zongming Guo Optimal adaptive channel scheduling for
scalable video broadcasting over MIMO
wireless networks . . . . . . . . . . . 3039--3050
Luca Chiaraviglio and
Delia Ciullo and
Marco Mellia and
Michela Meo Modeling sleep mode gains in
energy-aware networks . . . . . . . . . 3051--3066
Karim Habak and
Moustafa Youssef and
Khaled A. Harras An optimal deployable bandwidth
aggregation system . . . . . . . . . . . 3067--3080
Noriaki Kamiyama and
Ryoichi Kawahara and
Haruhisa Hasegawa Optimum profit allocation in coalitional
VoD service . . . . . . . . . . . . . . 3081--3097
Sabrina Sicari and
Alberto Coen-Porisini and
Roberto Riggio DARE: evaluating Data Accuracy using
node REputation . . . . . . . . . . . . 3098--3111
Anonymous Editorial Board . . . . . . . . . . . . ??
Andrea Detti and
Diego Perino and
Mario Gerla and
Yanghee Choi Editorial: Special issue on Information
Centric Networking . . . . . . . . . . . 3113--3115
G. Carofiglio and
G. Morabito and
L. Muscariello and
I. Solis and
M. Varvello From content delivery today to
information centric networking . . . . . 3116--3127
Guoqiang Zhang and
Yang Li and
Tao Lin Caching in information centric
networking: a survey . . . . . . . . . . 3128--3141
HyunYong Lee and
Akihiro Nakao User-assisted in-network caching in
information-centric networking . . . . . 3142--3153
S. Eum and
K. Nakauchi and
M. Murata and
Y. Shoji and
N. Nishinaga Potential based routing as a secondary
best-effort routing for Information
Centric Networking (ICN) . . . . . . . . 3154--3164
Yi Wang and
Huichen Dai and
Ting Zhang and
Wei Meng and
Jindou Fan and
Bin Liu GPU-accelerated name lookup with
component encoding . . . . . . . . . . . 3165--3177
Mauro Conti and
Paolo Gasti and
Marco Teoli A lightweight mechanism for detection of
cache pollution attacks in Named Data
Networking . . . . . . . . . . . . . . . 3178--3191
Matthias Wählisch and
Thomas C. Schmidt and
Markus Vahlenkamp Backscatter from the data plane ---
Threats to stability and security in
information-centric network
infrastructure . . . . . . . . . . . . . 3192--3206
S. Salsano and
N. Blefari-Melazzi and
A. Detti and
G. Morabito and
L. Veltri Information centric networking over SDN
and OpenFlow: Architectural aspects and
experiments on the OFELIA testbed . . . 3207--3221
Marica Amadeo and
Claudia Campolo and
Antonella Molinaro Enhancing content-centric networking for
vehicular environments . . . . . . . . . 3222--3234
H. M. N. Dilum Bandara and
Anura P. Jayasumana Distributed, multi-user,
multi-application, and multi-sensor data
fusion over named data networks . . . . 3235--3248
Ben Tagger and
Dirk Trossen and
Alexandros Kostopoulos and
Stuart Porter and
George Parisis Realising an application environment for
information-centric networking . . . . . 3249--3266
Luiz Filipe M. Vieira and
Mario Gerla and
Archan Misra Fundamental limits on end-to-end
throughput of network coding in
multi-rate and multicast wireless
networks . . . . . . . . . . . . . . . . 3267--3275
Marco Ajmone Marsan and
Luca Chiaraviglio and
Delia Ciullo and
Michela Meo On the effectiveness of single and
multiple base station sleep modes in
cellular networks . . . . . . . . . . . 3276--3290
Xiaohui Chen and
Jing Xu and
Wei Yuan and
Wei Liu and
Wenqing Cheng Channel assignment in heterogeneous
multi-radio multi-channel wireless
networks: a game theoretic approach . . 3291--3299
Elena Baralis and
Andrea Bianco and
Tania Cerquitelli and
Luca Chiaraviglio and
Marco Mellia NetCluster: a clustering-based framework
to analyze Internet passive measurements
data . . . . . . . . . . . . . . . . . . 3300--3315
Ricardo C. Carrano and
Diego Passos and
Luiz C. S. Magalhães and
Célio V. N. Albuquerque Nested block designs: Flexible and
efficient schedule-based asynchronous
duty cycling . . . . . . . . . . . . . . 3316--3326
Honghuing Liu and
Patrick P. C. Lee and
John C. S. Lui On the credit evolution of credit-based
incentive protocols in wireless mesh
networks . . . . . . . . . . . . . . . . 3327--3343
Genki Matsui and
Takuji Tachibana and
Yukinori Nakamura and
Kenji Sugimoto Distributed power adjustment based on
control theory for cognitive radio
networks . . . . . . . . . . . . . . . . 3344--3356
João Marco C. Silva and
Paulo Carvalho and
Solange Rito Lima A multiadaptive sampling technique for
cost-effective network measurements . . 3357--3369
Zoltán Faigl and
László Bokor and
Jani Pellikka and
Andrei Gurtov Suitability analysis of existing and new
authentication methods for future 3GPP
Evolved Packet Core . . . . . . . . . . 3370--3388
Eleonora Borgia and
Giuseppe Anastasi and
Marco Conti Energy efficient and reliable data
delivery in urban sensing applications:
a performance analysis . . . . . . . . . 3389--3409
B. Hagelstein and
M. Abolhasan and
D. Franklin and
F. Safaei Improving fairness in IEEE 802.11
networks using MAC layer opportunistic
retransmission . . . . . . . . . . . . . 3410--3427
Lei Chen and
Di Yuan Mathematical modeling for optimal design
of in-building distributed antenna
systems . . . . . . . . . . . . . . . . 3428--3445
A. Coluccia and
A. D'Alconzo and
F. Ricciato Distribution-based anomaly detection via
generalized likelihood ratio test: a
general Maximum Entropy approach . . . . 3446--3462
K. Avrachenkov and
U. Ayesta and
J. Doncel and
P. Jacko Congestion control of TCP flows in
Internet routers by means of index
policy . . . . . . . . . . . . . . . . . 3463--3478
Nicola Cordeschi and
Mohammad Shojafar and
Enzo Baccarelli Energy-saving self-configuring networked
data centers . . . . . . . . . . . . . . 3479--3491
Chengzhe Lai and
Hui Li and
Rongxing Lu and
Xuemin (Sherman) Shen SE-AKA: a secure and efficient group
authentication and key agreement
protocol for LTE networks . . . . . . . 3492--3510
Ce-Kuen Shieh and
Chia-Yu Yu and
Cheng-Han Lin and
J. Morris Chang Efficiency-driven selection of bandwidth
request mechanism in broadband wireless
access networks . . . . . . . . . . . . 3511--3521
Peng Zhou and
Xiapu Luo and
Ang Chen and
Rocky K. C. Chang SGor: Trust graph based onion routing 3522--3544
Glaucio H. S. Carvalho and
Isaac Woungang and
Alagan Anpalagan and
Rodolfo W. L. Coutinho and
João C. W. A. Costa A semi-Markov decision process-based
joint call admission control for
inter-RAT cell re-selection in next
generation wireless networks . . . . . . 3545--3562
Jihun Ha and
Jiung Yu and
Byungjo Kim and
Hyogon Kim On UDP continuity over vertical
handovers . . . . . . . . . . . . . . . 3563--3580
Le Wang and
Jukka Manner Energy-efficient mobile web in a bundle 3581--3600
Nuutti Varis and
Jukka Manner and
Mikko Särelä and
Timo Kiravuo DBridges: Flexible floodless frame
forwarding . . . . . . . . . . . . . . . 3601--3616
Byung-Gook Kim and
Jeong-Ahn Kwon and
Jang-Won Lee Subchannel allocation for the
OFDMA-based femtocell system . . . . . . 3617--3629
Yuxin Meng and
Wenjuan Li and
Lam-For Kwok Towards adaptive character
frequency-based exclusive signature
matching scheme and its applications in
distributed intrusion detection . . . . 3630--3640
M. Manzano and
E. Calle and
V. Torres-Padrosa and
J. Segovia and
D. Harle Endurance: a new robustness measure for
complex networks under multiple failure
scenarios . . . . . . . . . . . . . . . 3641--3653
Emre Atsan and
Öznur Özkasap SCALAR: Scalable data lookup and
replication protocol for mobile ad hoc
networks . . . . . . . . . . . . . . . . 3654--3672
Martín Zubeldía and
Andrés Ferragut and
Fernando Paganini Overcoming performance pitfalls in
rate-diverse high speed WLANs . . . . . 3673--3685
Matjaz Fras and
Joze Mohorko and
Zarko Cucej Limitations of a Mapping Algorithm with
Fragmentation Mimics (MAFM) when
modeling statistical data sources based
on measured packet network traffic . . . 3686--3700
Cuiqin Hou and
Yibin Hou and
Zhangqin Huang A framework based on barycentric
coordinates for localization in wireless
sensor networks . . . . . . . . . . . . 3701--3712
Liliana Bolea and
Jordi Pérez-Romero and
Ramón Agustí ML aided context feature extraction for
cognitive radio . . . . . . . . . . . . 3713--3727
A. Iacovazzi and
A. D'Alconzo and
F. Ricciato and
M. Burkhart Elementary secure-multiparty computation
for massive-scale collaborative network
monitoring: a quantitative assessment 3728--3742
Giovanna Carofiglio and
Massimo Gallo and
Luca Muscariello On the performance of bandwidth and
storage sharing in information-centric
networks . . . . . . . . . . . . . . . . 3743--3758
Angelos-Christos G. Anadiotis and
Charalampos Z. Patrikakis and
Iakovos S. Venieris On the performance improvement of gossip
protocols for content-based
publish-subscribe through caching . . . 3759--3772
Peng Lin and
Alan Kai-Hau Yeung and
Angus Kin-Yeung Wong Multi-portal association based
dispatching and a virtual-queue method
in wireless mesh networks . . . . . . . 3773--3789
Nadine Akkari An IMS-based integration architecture
for WiMax/LTE handover . . . . . . . . . 3790--3798
Yifeng Cai and
Konstantinos Pelechrinis and
Xin Wang and
Prashant Krishnamurthy and
Yijun Mo Joint reactive jammer detection and
localization in an enterprise WiFi
network . . . . . . . . . . . . . . . . 3799--3811
Fatemeh Ghods and
Hamed Yousefi and
Ali Mohammad Afshin Hemmatyar and
Ali Movaghar MC-MLAS: Multi-channel Minimum Latency
Aggregation Scheduling in Wireless
Sensor Networks . . . . . . . . . . . . 3812--3825
Elias Bou-Harb and
Mourad Debbabi and
Chadi Assi A systematic approach for detecting and
clustering distributed cyber scanning 3826--3839
Baozhi Chen and
Dario Pompili Minimizing position uncertainty for
under-ice autonomous underwater vehicles 3840--3854
Zohar Naor and
Sajal K. Das A scalable framework for mobile
real-time group communication services 3855--3865
Seung Yeob Nam and
Sirojiddin Djuraev and
Minho Park Collaborative approach to mitigating ARP
poisoning-based Man-in-the-Middle
attacks . . . . . . . . . . . . . . . . 3866--3884
Wen Sun and
Yu Ge and
Wai-Choong Wong A lightweight distributed scheme for
mitigating inter-user interference in
body sensor networks . . . . . . . . . . 3885--3896
Ignasi Paredes-Oliva and
Pere Barlet-Ros and
Xenofontas Dimitropoulos FaRNet: Fast recognition of
high-dimensional patterns from big
network traffic data . . . . . . . . . . 3897--3913
Zakwan Al-Arnaout and
Qiang Fu and
Marcus Frean A divide-and-conquer approach for
content replication in WMNs . . . . . . 3914--3928
Weigang Wu and
Jiannong Cao and
Hejun Wu and
Jingjing Li Robust and dynamic data aggregation in
wireless sensor networks: a cross-layer
approach . . . . . . . . . . . . . . . . 3929--3940
Seung-Ho Lee and
Han-You Jeong and
Seung-Woo Seo Optimal pricing and capacity
partitioning for tiered access service
in virtual networks . . . . . . . . . . 3941--3956
Wanzhi Qiu and
Efstratios Skafidas Distributed routing for signal detection
in wireless sensor networks . . . . . . 3957--3966
Mohammad Rajiullah and
Reine Lundin and
Anna Brunstrom and
Stefan Lindskog Performance analysis and improvement of
PR-SCTP for small messages . . . . . . . 3967--3986
Zhenhua Wu and
Yu Hen Hu How many wireless resources are needed
to resolve the hidden terminal problem? 3987--3996
Giovanni Accongiagioco and
Matteo Andreozzi and
Daniele Migliorini and
Giovanni Stea Throughput-optimal resource allocation
in LTE-Advanced with distributed
antennas . . . . . . . . . . . . . . . . 3997--4009
M. Sarper Gokturk and
Ozgur Gurbuz and
Elza Erkip A cross-layer multi-hop cooperative
network architecture for wireless ad hoc
networks . . . . . . . . . . . . . . . . 4010--4029
Tahir Mehmood and
Lavy Libman and
Hooman Reisi Dehkordi and
Sanjay K. Jha Optimal opportunistic routing and
network coding for bidirectional
wireless flows . . . . . . . . . . . . . 4030--4046
Shahabeddin Geravand and
Mahmood Ahmadi Bloom filter applications in network
security: a state-of-the-art survey . . 4047--4064
Ian F. Akyildiz and
Harry Rudin Editorial . . . . . . . . . . . . . . . 1--1
Sangman Cho and
Srinivasan Ramasubramanian Localizing link failures in all-optical
networks using monitoring tours . . . . 2--12
R. Block and
G. T. Peeters and
B. Van Houdt A branching process approach to compute
the delay and energy efficiency of tree
algorithms with free access . . . . . . 13--28
Haomin Yang and
Yaoxue Zhang and
Yuezhi Zhou and
Xiaoming Fu and
Hao Liu and
Athanasios V. Vasilakos Provably secure three-party
authenticated key agreement protocol
using smart cards . . . . . . . . . . . 29--38
Kyoung-Hak Jung and
Hyo-Ryun Lee and
Wan-Seon Lim and
Young-Joo Suh An adaptive collision resolution scheme
for energy efficient communication in
IEEE 802.15.4 networks . . . . . . . . . 39--57
Mohammad Faisal Uddin and
Chadi Assi and
Ali Ghrayeb Joint optimal AF relay assignment and
power allocation in wireless cooperative
networks . . . . . . . . . . . . . . . . 58--69
Manuel Gil Pérez and
Juan E. Tapiador and
John A. Clark and
Gregorio Martínez Pérez and
Antonio F. Skarmeta Gómez Trustworthy placements: Improving
quality and resilience in collaborative
attack detection . . . . . . . . . . . . 70--86
Wenjie Zhang and
Chai Kiat Yeo Sequential sensing based spectrum
handoff in cognitive radio networks with
multiple users . . . . . . . . . . . . . 87--98
Kuzman Katkalov and
Nina Moebius and
Kurt Stenzel and
Marian Borek and
Wolfgang Reif Modeling test cases for security
protocols with SecureMDD . . . . . . . . 99--111
Lihua Dou and
Yunchuan Wei and
Jun Ni Multi-user wireless channel probing for
shared key generation with a fuzzy
controller . . . . . . . . . . . . . . . 112--126
Xiaofei Wu and
Xin Wang and
Ke Yu and
Frank Y. Li A measurement-based study on the
correlations of inter-domain Internet
application flows . . . . . . . . . . . 127--140
Wei-Min Yao and
Sonia Fahmy Flow-based partitioning of network
testbed experiments . . . . . . . . . . 141--157
Jin Cheol Kim and
Younghee Lee An end-to-end measurement and monitoring
technique for the bottleneck link
capacity and its available bandwidth . . 158--179
Laura Carrea and
Alexei Vernitski and
Martin Reed Optimized hash for network path encoding
with minimized false positives . . . . . 180--191
Hars Vardhan and
Seong-Ryong Ryu and
Bhaskar Banerjee and
Ravi Prakash 60 GHz wireless links in data center
networks . . . . . . . . . . . . . . . . 192--205
Micah Sherr and
Harjot Gill and
Taher Aquil Saeed and
Andrew Mao and
William R. Marczak and
Saravana Soundararajan and
Wenchao Zhou and
Boon Thau Loo and
Matt Blaze The design and implementation of the $
A^3 $ application-aware anonymity
platform . . . . . . . . . . . . . . . . 206--227
Hung-Quoc Lai and
Yan Chen and
K. J. Ray Liu Energy efficient cooperative
communications using coalition formation
games . . . . . . . . . . . . . . . . . 228--238
A. Shawky and
R. Olsen and
J. Pedersen and
H. Schwefel Network aware dynamic context
subscription management . . . . . . . . 239--253
Mohamed Younis and
Izzet F. Senturk and
Kemal Akkaya and
Sookyoung Lee and
Fatih Senel Topology management techniques for
tolerating node failures in wireless
sensor networks: a survey . . . . . . . 254--283
Lluis Pamies-Juarez and
Marc Sanchez-Artigas and
Pedro García-López and
Rubén Mondéjar and
Rahma Chaabouni On the interplay between data redundancy
and retrieval times in P2P storage
systems . . . . . . . . . . . . . . . . 1--16
Ali Dabirmoghaddam and
Majid Ghaderi and
Carey Williamson On the optimal randomized clustering in
distributed sensor networks . . . . . . 17--32
Naser M. Asghari and
M. Mandjes and
Anwar Walid Energy-efficient scheduling in
multi-core servers . . . . . . . . . . . 33--43
Vasilis Sourlas and
Paris Flegkas and
Leandros Tassiulas A novel cache aware routing scheme for
Information-Centric Networks . . . . . . 44--61
Xiaoning Zhang and
Haoran Wang and
Zian Zhang Survivable green IP over WDM networks
against double-link failures . . . . . . 62--76
Rubén Cuevas and
Michal Kryczka and
Roberto González and
Angel Cuevas and
Arturo Azcorra TorrentGuard: Stopping scam and malware
distribution in the BitTorrent ecosystem 77--90
Sinan Toklu and
O. Ayhan Erdem BSC-MAC: Energy efficiency in wireless
sensor networks with base station
control . . . . . . . . . . . . . . . . 91--100
Tu Ouyang and
Soumya Ray and
Mark Allman and
Michael Rabinovich A large-scale empirical analysis of
email spam detection through network
characteristics in a stand-alone
enterprise . . . . . . . . . . . . . . . 101--121
Mathias Fischer and
Sascha Grau and
Giang Nguyen and
Guenter Schaefer Resilient and underlay-aware P2P
live-streaming . . . . . . . . . . . . . 122--136
Alia Asheralieva and
Kaushik Mahata A two-step resource allocation procedure
for LTE-based cognitive radio network 137--152
Florin Coras and
Jordi Domingo-Pascual and
Fabio Maino and
Dino Farinacci and
Albert Cabellos-Aparicio Lcast: Software-defined inter-domain
multicast . . . . . . . . . . . . . . . 153--170
Elias Yaacoub and
Adnan Abu-Dayya Automatic meter reading in the smart
grid using contention based random
access over the free cellular spectrum 171--183
Jaeseong Jeong and
Kyunghan Lee and
Yung Yi and
Injong Rhee and
Song Chong ExMin: a routing metric for novel
opportunity gain in Delay Tolerant
Networks . . . . . . . . . . . . . . . . 184--196
Yangyang Liu and
Le Chang and
Jianping Pan On the performance and fairness of
BitTorrent-like data swarming systems
with NAT devices . . . . . . . . . . . . 197--212
Seyedeh Leili Mirtaheri and
Mohsen Sharifi An efficient resource discovery
framework for pure unstructured
peer-to-peer systems . . . . . . . . . . 213--226
Mingwei Xu and
Shu Yang and
Dan Wang and
Jianping Wu Efficient Two Dimensional-IP routing: an
incremental deployment design . . . . . 227--243
Giorgos Papastergiou and
Ioannis Alexiadis and
Scott Burleigh and
Vassilis Tsaoussidis Delay Tolerant Payload Conditioning
protocol . . . . . . . . . . . . . . . . 244--263
Josselin Vallet and
Olivier Brun Online OSPF weights optimization in IP
networks . . . . . . . . . . . . . . . . 1--12
W. Ramirez and
X. Masip-Bruin and
M. Yannuzzi and
R. Serral-Gracia and
A. Martinez and
M. S. Siddiqui A survey and taxonomy of ID/Locator
Split Architectures . . . . . . . . . . 13--33
Adele L. Jia and
Xiaowei Chen and
Xiaowen Chu and
Johan A. Pouwelse and
Dick H. J. Epema User behaviors in private BitTorrent
communities . . . . . . . . . . . . . . 34--45
Tiago Condeixa and
Susana Sargento Studying the integration of distributed
and dynamic schemes in the mobility
management . . . . . . . . . . . . . . . 46--59
Zoltán Faigl and
Jani Pellikka and
László Bokor and
Andrei Gurtov Performance evaluation of current and
emerging authentication schemes for
future 3GPP network architectures . . . 60--74
Fei Chen and
Haitao Li and
Jiangchuan Liu Popularity decays in peer-to-peer VoD
systems: Impact, model, and design
implications . . . . . . . . . . . . . . 75--87
Boris Bellalta and
Azadeh Faridi and
Jaume Barcelo and
Vanesa Daza and
Miquel Oliver Performance analysis of a Multiuser
Multi-Packet Transmission system for
WLANs in non-saturation conditions . . . 88--100
Kaikai Chi and
Yi-hua Zhu and
Xiaohong Jiang and
Xianzhong Tian Practical throughput analysis for
two-hop wireless network coding . . . . 101--114
Claudio Testa and
Dario Rossi Delay-based congestion control: Flow vs.
BitTorrent swarm perspectives . . . . . 115--128
Iván S. Razo-Zapata and
Gerardo Castañón and
Carlos Mex-Perera Self-healing in transparent optical
packet switching mesh networks: a
reinforcement learning perspective . . . 129--146
A. Gotta and
M. Luglio and
C. Roseti A TCP/IP satellite infrastructure for
sensing operations in emergency contexts 147--159
Samil Temel and
Vehbi Çagri Gungor and
Taskin Koçak Routing protocol design guidelines for
smart grid environments . . . . . . . . 160--170
Pascal Anelli and
Rémi Diana and
Emmanuel Lochin FavorQueue: a parameterless active queue
management to improve TCP traffic
performance . . . . . . . . . . . . . . 171--186
Felipe Mata and
Piotr Zuraniewski and
Michel Mandjes and
Marco Mellia Anomaly detection in diurnal data . . . 187--200
J. Coimbra and
G. Schütz and
N. Correia Energy efficient routing algorithm for
fiber-wireless access networks: a
network formation game approach . . . . 201--216
Hao Cui and
Xiao Su and
Weijia Shang On optimal media/video distribution in
closed P2P-based IPTV networks . . . . . 217--232
James P. G. Sterbenz and
David Hutchison and
Paul Müller and
Chip Elliott Special issue on Future Internet
Testbeds --- Part I: Guest Editorial . . 1--4
Mark Berman and
Jeffrey S. Chase and
Lawrence Landweber and
Akihiro Nakao and
Max Ott and
Dipankar Raychaudhuri and
Robert Ricci and
Ivan Seskar GENI: a federated testbed for innovative
network experiments . . . . . . . . . . 5--23
Nicholas Bastin and
Andy Bavier and
Jessica Blaine and
Jim Chen and
Narayan Krishnan and
Joe Mambretti and
Rick McGeer and
Rob Ricci and
Nicki Watts The InstaGENI initiative: an
architecture for distributed systems and
advanced programmable networks . . . . . 24--38
Dongkyun Kim and
Joobum Kim and
Gicheol Wang and
Jin-Hyung Park and
Seung-Hae Kim K-GENI testbed deployment and federated
meta operations experiment over GENI and
KREONET . . . . . . . . . . . . . . . . 39--50
Deep Medhi and
Byrav Ramamurthy and
Caterina Scoglio and
Justin P. Rohrer and
Egemen K. Çetinkaya and
Ramkumar Cherukuri and
Xuan Liu and
Pragatheeswaran Angu and
Andy Bavier and
Cort Buffington and
James P. G. Sterbenz The GpENI testbed: Network
infrastructure, implementation
experience, and experimentation . . . . 51--74
Ernst Gunnar Gran and
Thomas Dreibholz and
Amund Kvalbein $N$ or NetCore --- a multi-homed
research testbed . . . . . . . . . . . . 75--87
Amund Kvalbein and
Dziugas Baltrunas and
Kristian Evensen and
Jie Xiang and
Ahmed Elmokashfi and
Simone Ferlin-Oliveira The Nornet Edge platform for mobile
broadband measurements . . . . . . . . . 88--101
Dennis Schwerdel and
Bernd Reuther and
Thomas Zinner and
Paul Müller and
Phouc Tran-Gia Future Internet research and
experimentation: the G-Lab approach . . 102--117
Joe Mambretti and
Jim Chen and
Fei Yeh Creating environments for innovation:
Designing and implementing advanced
experimental network research testbeds
based on the Global Lambda Integrated
Facility and the StarLight Exchange . . 118--131
M. Suñé and
L. Bergesio and
H. Woesner and
T. Rothe and
A. Köpsel and
D. Colle and
B. Puype and
D. Simeonidou and
R. Nejabati and
M. Channegowda and
M. Kind and
T. Dietz and
A. Autenrieth and
V. Kotronis and
E. Salvadori and
S. Salsano and
M. Körner and
S. Sharma Design and implementation of the OFELIA
FP7 facility: the European OpenFlow
testbed . . . . . . . . . . . . . . . . 132--150
Masayoshi Kobayashi and
Srini Seetharaman and
Guru Parulkar and
Guido Appenzeller and
Joseph Little and
Johan van Reijendam and
Paul Weissmann and
Nick McKeown Maturing of OpenFlow and
Software-defined Networking through
deployments . . . . . . . . . . . . . . 151--175
M. Campanella and
F. Farina The FEDERICA infrastructure and
experience . . . . . . . . . . . . . . . 176--183
Jordi Jofre and
Celia Velayos and
Giada Landi and
Michal Giertych and
Alastair C. Hume and
Gareth Francis and
Albert Vico Oton Federation of the BonFIRE multi-cloud
infrastructure with networking
facilities . . . . . . . . . . . . . . . 184--196
Bartosz Belter and
Juan Rodriguez Martinez and
José Ignacio Aznar and
Jordi Ferrer Riera and
Luis M. Contreras and
Monika Antoniak-Lewandowska and
Matteo Biancani and
Jens Buysse and
Chris Develder and
Yuri Demchenko and
Pasquale Donadio and
Dimitra Simeonidou and
Reza Nejabati and
Shuping Peng and
Lukasz Drzewiecki and
Eduard Escalona and
Joan Antoni Garcia Espin and
Steluta Gheorghiu and
Mattijs Ghijsen and
Jakub Gutkowski and
Giada Landi and
others The GEYSERS optical testbed: a platform
for the integration, validation and
demonstration of cloud-based
infrastructure services . . . . . . . . 197--216
Luis Sanchez and
Luis Muñoz and
Jose Antonio Galache and
Pablo Sotres and
Juan R. Santana and
Veronica Gutierrez and
Rajiv Ramdhany and
Alex Gluhak and
Srdjan Krco and
Evangelos Theodoridis and
Dennis Pfisterer SmartSantander: IoT experimentation over
a smart city testbed . . . . . . . . . . 217--238
Xianfu Meng and
Changyuan Zhang An ant colony model based replica
consistency maintenance strategy in
unstructured P2P networks . . . . . . . 1--11
Yoh-han Lee and
Daeyoung Kim Slow hopping based cooperative sensing
MAC protocol for cognitive radio
networks . . . . . . . . . . . . . . . . 12--28
Ahmed Amokrane and
Rami Langar and
Raouf Boutaba and
Guy Pujolle Energy efficient management framework
for multihop TDMA-based wireless
networks . . . . . . . . . . . . . . . . 29--42
Mete Yilmaz and
Nirwan Ansari Achieving destination differentiation in
ingress aggregated fairness for
resilient packet rings by weighted
destination based fair dropping . . . . 43--54
Carlos Guimarães and
Daniel Corujo and
Antonio de la Oliva and
Yoshihiro Ohba and
Rui L. Aguiar Multicast group membership management in
media independent handover services . . 55--68
Ilhem Fajjari and
Nadjib Aitsaadi and
Michal Pióro and
Guy Pujolle A new virtual network static embedding
strategy within the Cloud's private
backbone network . . . . . . . . . . . . 69--88
P. J. Piñero and
J. A. Cortés and
J. Malgosa and
F. J. Cañete and
P. Manzanares and
L. Díez Analysis and improvement of multicast
communications in HomePlug AV-based
in-home networks . . . . . . . . . . . . 89--100
Behnam Dezfouli and
Marjan Radi and
Shukor Abd Razak and
Kamin Whitehouse and
Kamalrulnizam Abu Bakar and
Tan Hwee-Pink Improving broadcast reliability for
neighbor discovery, link estimation and
collection tree construction in wireless
sensor networks . . . . . . . . . . . . 101--121
K. Giotis and
C. Argyropoulos and
G. Androulidakis and
D. Kalogeras and
V. Maglaris Combining OpenFlow and sFlow for an
effective and scalable anomaly detection
and mitigation mechanism on SDN
environments . . . . . . . . . . . . . . 122--136
Hao Di and
Vishal Anand and
Hongfang Yu and
Lemin Li and
Gang Sun and
Dan Liao Design of reliable virtual
infrastructure with resource sharing . . 137--151
Andrea Bianco and
Davide Cuda and
Jorge M. Finochietto Multi-MetaRing fairness control in a WDM
folded-bus architecture . . . . . . . . 152--161
Saman Hameed Amin and
H. S. Al-Raweshidy and
Rafed Sabbar Abbas Smart data packet ad hoc routing
protocol . . . . . . . . . . . . . . . . 162--181
Jie Tian and
Guiling Wang and
Tan Yan and
Wensheng Zhang Detect smart intruders in sensor
networks by creating network dynamics 182--196
Enrico Gregori and
Alessandro Improta and
Luciano Lenzini and
Lorenzo Rossi and
Luca Sani Improving the reliability of inter-AS
economic inferences through a hygiene
phase on BGP data . . . . . . . . . . . 197--207
Chien-Fu Cheng and
Ting-Ying Wu and
Hsien-Chun Liao A density-barrier construction algorithm
with minimum total movement in mobile
WSNs . . . . . . . . . . . . . . . . . . 208--220
Dominic Meier and
Yvonne Anne Pignolet and
Stefan Schmid and
Roger Wattenhofer On the Windfall and price of friendship:
Inoculation strategies on social
networks . . . . . . . . . . . . . . . . 221--236
James P. G. Sterbenz and
David Hutchison and
Paul Müller and
Chip Elliott Special issue on Future Internet
Testbeds --- Part II: Guest Editorial 1--4
Ali Sydney and
David S. Ochs and
Caterina Scoglio and
Don Gruenbacher and
Ruth Miller Using GENI for experimental evaluation
of Software Defined Networking in smart
grids . . . . . . . . . . . . . . . . . 5--16
James Griffioen and
Zongming Fei and
Hussamuddin Nasir and
Xiongqi Wu and
Jeremy Reed and
Charles Carpenter Measuring experiments in GENI . . . . . 17--32
Yoshihiro Nozaki and
Parth Bakshi and
Hasan Tuncer and
Nirmala Shenoy Evaluation of tiered routing protocol in
floating cloud tiered Internet
architecture . . . . . . . . . . . . . . 33--47
Stratos Keranidis and
Dimitris Giatsios and
Thanasis Korakis and
Iordanis Koutsopoulos and
Leandros Tassiulas and
Thierry Rakotoarivelo and
Max Ott and
Thierry Parmentelat Experimentation on end-to-end
performance aware algorithms in the
federated environment of the
heterogeneous PlanetLab and NITOS
testbeds . . . . . . . . . . . . . . . . 48--67
Olivier Mehani and
Guillaume Jourjon and
Thierry Rakotoarivelo and
Max Ott An instrumentation framework for the
critical task of measurement collection
in the future Internet . . . . . . . . . 68--83
Milorad Tosic and
Ivan Seskar Resource specification and intelligent
user interaction for federated testbeds
using Semantic Web technologies . . . . 84--100
Jon Matias and
Alaitz Mendiola and
Nerea Toledo and
Borja Tornero and
Eduardo Jacob The EHU--OEF: an OpenFlow-based Layer-2
experimental facility . . . . . . . . . 101--127
Shingo Ata and
Dijiang Huang and
Xuan Liu and
Akira Wada and
Tianyi Xing and
Parikshit Juluri and
Chun-Jen Chung and
Yasuhiro Sato and
Deep Medhi SeRViTR: a framework, implementation,
and a testbed for a trustworthy future
Internet . . . . . . . . . . . . . . . . 128--146
M. Yannuzzi and
M. S. Siddiqui and
A. Sällström and
B. Pickering and
R. Serral-Graci\`a and
A. Martínez and
W. Chen and
S. Taylor and
F. Benbadis and
J. Leguay and
E. Borrelli and
I. Ormaetxea and
K. Campowsky and
G. Giammatteo and
G. Aristomenopoulos and
S. Papavassiliou and
T. Kuczynski and
S. Zielinski and
J. M. Seigneur and
C. Ballester Lafuente and
J. Johansson and
X. Masip-Bruin and
M. Caria and
J. R. Ribeiro Junior and
E. Salageanu and
J. Latanicki TEFIS: a single access point for
conducting multifaceted experiments on
heterogeneous test facilities . . . . . 147--172
Thierry Rakotoarivelo and
Guillaume Jourjon and
Max Ott Designing and orchestrating reproducible
experiments on federated networking
testbeds . . . . . . . . . . . . . . . . 173--187
Sang Woo Han and
Namgon Kim and
JongWon Kim An experimental service composition tool
for media-centric networked applications 188--204
Jordan Augé and
Thierry Parmentelat and
Nicolas Turro and
Sandrine Avakian and
Lo\"\ic Baron and
Mohamed Amine Larabi and
Mohammed Yasin Rahman and
Timur Friedman and
Serge Fdida Tools to foster a global federation of
testbeds . . . . . . . . . . . . . . . . 205--220
Igor M. Moraes and
Diogo M. F. Mattos and
Lyno Henrique G. Ferraz and
Miguel Elias M. Campista and
Marcelo G. Rubinstein and
Luís Henrique M. K. Costa and
Marcelo D. de Amorim and
Pedro B. Velloso and
Otto Carlos M. B. Duarte and
Guy Pujolle FITS: a flexible virtual network testbed
architecture . . . . . . . . . . . . . . 221--237
Young-Hwan Kim and
Alina Quereilhac and
Mohamed Amine Larabi and
Julien Tribino and
Thierry Parmentelat and
Thierry Turletti and
Walid Dabbous Enabling iterative development and
reproducible evaluation of network
protocols . . . . . . . . . . . . . . . 238--250
Zbigniew Duli\'nski and
Kamil Palkowski and
Piotr Cholda A university testbed for large-scale
interconnection experiments on
distributed applications . . . . . . . . 251--264
Ming Li and
Andrey Lukyanenko and
Sasu Tarkoma and
Yong Cui and
Antti Ylä-Jääski Tolerating path heterogeneity in
multipath TCP with bounded receive
buffers . . . . . . . . . . . . . . . . 1--14
Xin Cong and
Kai Shuang and
Sen Su and
FangChun Yang and
LingLing Zi LBAS: an effective pricing mechanism
towards video migration in
cloud-assisted VoD system . . . . . . . 15--25
Giovanni Di Stasi and
Jonas Karlsson and
Stefano Avallone and
Roberto Canonico and
Andreas Kassler and
Anna Brunstrom Combining multi-path forwarding and
packet aggregation for improved network
performance in wireless mesh networks 26--37
Sun-Hyun Kim and
Yeonsik Jeong and
Seung-Jae Han Use of contact duration for message
forwarding in intermittently connected
mobile networks . . . . . . . . . . . . 38--54
Oscar Mauricio Caicedo Rendon and
Carlos Raniery Paula dos Santos and
Arthur Selle Jacobs and
Lisandro Zambenedetti Granville Monitoring Virtual Nodes using mashups 55--70
Rodrigo S. Couto and
Miguel Elias M. Campista and
Luís Henrique M. K. Costa Network resource control for Xen-based
virtualized software routers . . . . . . 71--88
S. A. Abid and
Mazliza Othman and
Nadir Shah $3$D P2P overlay over MANETs . . . . . . 89--111
Daeho Kang and
Sangkyu Park and
Changhee Joo and
Saewoong Bahk Address-free contention in wireless
access networks with common control
channel for throughput improvement . . . 112--124
Angelo Coiro and
Luca Chiaraviglio and
Antonio Cianfrani and
Marco Listanti and
Marco Polverini Reducing power consumption in backbone
IP networks through table lookup bypass 125--142
Cristian González García and
B. Cristina Pelayo G-Bustelo and
Jordán Pascual Espada and
Guillermo Cueva-Fernandez Midgar: Generation of heterogeneous
objects interconnecting applications. A
Domain Specific Language proposal for
Internet of Things scenarios . . . . . . 143--158
Jasone Astorga and
Eduardo Jacob and
Nerea Toledo and
Juanjo Unzilla Enhancing secure access to sensor data
with user privacy support . . . . . . . 159--179
C. K. Tan and
T. C. Chuah and
S. W. Tan Subcarrier and power allocation for
OFDMA-based multicast cellular networks
using a coalitional game . . . . . . . . 180--194
Masud Moshtaghi and
Christopher Leckie and
Shanika Karunasekera and
Sutharshan Rajasegarar An adaptive elliptical anomaly detection
model for wireless sensor networks . . . 195--207
Christoph Neumann and
Olivier Heen and
Stéphane Onno DNStamp: Short-lived trusted
timestamping . . . . . . . . . . . . . . 208--224
Maram Bani Younes and
Azzedine Boukerche and
Graciela Rom'an-Alonso An intelligent path recommendation
protocol (ICOD) for VANETs . . . . . . . 225--242
Abdulhalim Dandoush and
Sara Alouf and
Philippe Nain Lifetime and availability of data stored
on a P2P system: Evaluation of
redundancy and recovery schemes . . . . 243--260
Yufei Wang and
Rong Zheng and
Qixin Wang Self-tuned distributed monitoring of
multi-channel wireless networks using
Gibbs sampler . . . . . . . . . . . . . 261--272
Yosra Ben Saied and
Alexis Olivereau and
Djamal Zeghlache and
Maryline Laurent Lightweight collaborative key
establishment scheme for the Internet of
Things . . . . . . . . . . . . . . . . . 273--295
Sahar Hoteit and
Stefano Secci and
Stanislav Sobolevsky and
Carlo Ratti and
Guy Pujolle Estimating human trajectories and
hotspots through mobile phone data . . . 296--307
Min Wang and
Junfeng Wang and
Sunyoung Han Adaptive congestion control framework
and a simple implementation on high
bandwidth-delay product networks . . . . 308--321
Rachid Guerraoui and
Kévin Huguenin and
Anne-Marie Kermarrec and
Maxime Monod and
Swagatika Prusty and
Aline Roumy Tracking freeriders in gossip-based
content dissemination systems . . . . . 322--338
Hui-Tang Lin and
Chia-Lin Lai and
Chin-Lien Liu Design and analysis of a frame-oriented
dynamic bandwidth allocation scheme for
triple-play services over EPONs . . . . 339--352
S. Gitzenis and
G. S. Paschos and
L. Tassiulas Enhancing wireless networks with
caching: Asymptotic laws, sustainability
& trade-offs . . . . . . . . . . . . . . 353--368
Yongquan Fu and
Yijie Wang and
Wei Peng CommonFinder: a decentralized and
privacy-preserving common-friend
measurement method for the distributed
online social networks . . . . . . . . . 369--389
Melike Yigit and
Ozlem Durmaz Incel and
Vehbi Cagri Gungor On the interdependency between
multi-channel scheduling and tree-based
routing for WSNs in smart grid
environments . . . . . . . . . . . . . . 1--20
Bruno Sousa and
Kostas Pentikousis and
Marilia Curado MeTHODICAL: Towards the next generation
of multihomed applications . . . . . . . 21--40
Keontaek Lee and
Hak-Jin Kim and
Sunju Park and
Seungjae Han Satisfying the target network lifetime
in wireless sensor networks . . . . . . 41--55
Isaí Michel Lombera and
Louise E. Moser and
P. Michael Melliar-Smith and
Yung-Ting Chuang Peer-to-peer publication, search and
retrieval using the Android mobile
platform . . . . . . . . . . . . . . . . 56--72
Bing-Hong Liu and
Jyun-Yu Jhang Efficient distributed data scheduling
algorithm for data aggregation in
wireless sensor networks . . . . . . . . 73--83
Sihyung Lee and
Kyriaki Levanti and
Hyong S. Kim Network monitoring: Present and future 84--98
Issa Khalil and
Abdallah Khreishah and
Muhammad Azeem Consolidated Identity Management System
for secure mobile cloud computing . . . 99--110
Raffaele Bolla and
Roberto Bruschi and
Paolo Lago Energy adaptation in multi-core software
routers . . . . . . . . . . . . . . . . 111--128
Farshad Shams and
Giacomo Bacci and
Marco Luise A survey on resource allocation
techniques in OFDM(A) networks . . . . . 129--150
Edoardo Bonetto and
Alessandro Finamore and
Marco Mellia and
Riccardo Fiandra Energy efficiency in access and
aggregation networks: From current
traffic to potential savings . . . . . . 151--166
Trong-Viet Ho and
Yves Deville and
Olivier Bonaventure Multi-objective traffic engineering for
data center networks . . . . . . . . . . 167--182
Soumyadev Maity and
R. C. Hansdah Self-organized public key management in
MANETs with enhanced security and
without certificate-chains . . . . . . . 183--211
Nicaise Choungmo Fofack and
Philippe Nain and
Giovanni Neglia and
Don Towsley Performance evaluation of hierarchical
TTL-based cache networks . . . . . . . . 212--231
Caroline Battaglia and
Véronique Bruy\`ere and
Olivier Gauwin and
Cristel Pelsser and
Bruno Quoitin Reasoning on BGP routing filters using
tree automata . . . . . . . . . . . . . 232--254
Y. Gong and
D. Rossi and
C. Testa and
S. Valenti and
M. D. Täht Fighting the bufferbloat: On the
coexistence of AQM and low priority
congestion control . . . . . . . . . . . 255--267
John Silvester and
Parviz Kermani Professor Leonard Kleinrock --- Tribute
Volume . . . . . . . . . . . . . . . . . 1--3
Parviz Kermani and
Leonard Kleinrock Reprint of ``Virtual cut-through: a new
computer communication switching
technique'' . . . . . . . . . . . . . . 4--17
Luigi Fratta and
Mario Gerla and
Leonard Kleinrock Flow Deviation: 40 years of incremental
flows for packets, waves, cars and
tunnels . . . . . . . . . . . . . . . . 18--31
G. Tychogiorgos and
K. K. Leung Optimization-based resource allocation
in communication networks . . . . . . . 32--45
Yechiam Yemini A balance of power principle for
decentralized resource sharing . . . . . 46--51
Y. Afek and
A. Bremler-Barr and
L. Schiff Recursive design of hardware priority
queues . . . . . . . . . . . . . . . . . 52--67
Udi Ben-Porat and
Anat Bremler-Barr and
Hanoch Levy Computer and network performance:
Graduating from the ``Age of Innocence'' 68--81
Marco Ajmone Marsan and
Michela Meo Queueing systems to study the energy
consumption of a campus WLAN . . . . . . 82--93
Aaron Yi Ding and
Jon Crowcroft and
Sasu Tarkoma and
Hannu Flinck Software defined networking for security
enhancement in wireless mobile networks 94--101
Hideaki Takagi From computer science to service
science: Queues with human customers and
servers . . . . . . . . . . . . . . . . 102--111
Jim Kurose Information-centric networking: the
evolution from circuits to packets to
content . . . . . . . . . . . . . . . . 112--120
Paolo Ferrari and
Emiliano Sisinni and
Alessandra Flammini and
Alessandro Depari Adding accurate timestamping capability
to wireless networks for smart grids . . 1--13
Ali Hammad and
Reza Nejabati and
Dimitra Simeonidou Novel methods for virtual network
composition . . . . . . . . . . . . . . 14--25
Cristina Romero-Tris and
Jordi Castell\`a-Roca and
Alexandre Viejo Distributed system for private Web
search with untrusted partners . . . . . 26--42
Alexandre Mouradian and
Isabelle Augé-Blum and
Fabrice Valois RTXP: a localized real-time MAC-routing
protocol for wireless sensor networks 43--59
H. Ahmadi and
Y. H. Chew and
N. Reyhani and
C. C. Chai and
L. A. DaSilva Learning solutions for auction-based
dynamic spectrum access in multicarrier
systems . . . . . . . . . . . . . . . . 60--73
Murat Kuzlu and
Manisa Pipattanasomporn and
Saifur Rahman Communication network requirements for
major smart grid applications in HAN,
NAN and WAN . . . . . . . . . . . . . . 74--88
Biplob R. Ray and
Jemal Abawajy and
Morshed Chowdhury Scalable RFID security framework and
protocol supporting Internet of Things 89--103
Tifenn Rault and
Abdelmadjid Bouabdallah and
Yacine Challal Energy efficiency in wireless sensor
networks: a top-down survey . . . . . . 104--122
Wei-Cheng Chu and
Kuo-Feng Ssu Sink discovery in location-free and
mobile-sink wireless sensor networks . . 123--140
Shihong Zou and
Xitao Wen and
Kai Chen and
Shan Huang and
Yan Chen and
Yongqiang Liu and
Yong Xia and
Chengchen Hu VirtualKnotter: Online virtual machine
shuffling for congestion resolving in
virtualized datacenter . . . . . . . . . 141--153
Lien-Wu Chen and
Yu-Chee Tseng and
Kun-Ze Syue Surveillance on-the-road: Vehicular
tracking and reporting by V2V
communications . . . . . . . . . . . . . 154--163
I-Hsien Liu and
Chuan-Gang Liu and
Chien-Tung Lu and
Yi-Tsen Kuo and
Jung-Shian Li A multi-hop resource scheduling
algorithm for IEEE 802.16j relay
networks . . . . . . . . . . . . . . . . 164--179
David Rebollo-Monedero and
Javier Parra-Arnau and
Jordi Forné and
Claudia Diaz Optimizing the design parameters of
threshold pool mixes for anonymity and
delay . . . . . . . . . . . . . . . . . 180--200
Iordanis Koutsopoulos and
Leandros Tassiulas and
Lazaros Gkatzikis Client-server games and their equilibria
in peer-to-peer networks . . . . . . . . 201--218
L. Rajya Lakshmi Handover rate based dynamic guard
bandwidth allocation method for call
admission control in IEEE 802.16j Mobile
Multihop Relay networks . . . . . . . . 219--234
Glenn Benson and
Shiu-Kai Chin and
Sean Croston and
Karthick Jayaraman and
Susan Older Banking on interoperability: Secure,
interoperable credential management . . 235--251
R. de O. Schmidt and
R. Sadre and
A. Sperotto and
H. van den Berg and
A. Pras A hybrid procedure for efficient link
dimensioning . . . . . . . . . . . . . . 252--269
Raouf Boutaba and
Noura Limam and
Stefano Secci and
Tarik Taleb Cloud networking and communications . . 1--4
Abu (Sayeem) Reaz and
Vishwanath Ramamurthi and
Massimo Tornatore and
Biswanath Mukherjee Cloud-Integrated WOBAN: an
offloading-enabled architecture for
service-oriented access networks . . . . 5--19
Jaehyun Hwang and
Joon Yoo and
Nakjung Choi Deadline and Incast Aware TCP for cloud
data center networks . . . . . . . . . . 20--34
Ahmed Amamou and
Kamel Haddadou and
Guy Pujolle A TRILL-based multi-tenant data center
network . . . . . . . . . . . . . . . . 35--53
Juliano Araujo Wickboldt and
Rafael Pereira Esteves and
Márcio Barbosa de Carvalho and
Lisandro Zambenedetti Granville Resource management in IaaS cloud
platforms made flexible through
programmability . . . . . . . . . . . . 54--70
Wenda Ni and
Changcheng Huang and
Jing Wu Provisioning high-availability
datacenter networks for full bandwidth
communication . . . . . . . . . . . . . 71--94
Zehua Guo and
Mu Su and
Yang Xu and
Zhemin Duan and
Luo Wang and
Shufeng Hui and
H. Jonathan Chao Improving the performance of load
balancing in software-defined networks
through load variance-based
synchronization . . . . . . . . . . . . 95--109
Prasad Calyam and
Sudharsan Rajagopalan and
Sripriya Seetharam and
Arunprasath Selvadhurai and
Khaled Salah and
Rajiv Ramnath VDC-Analyst: Design and verification of
virtual desktop cloud resource
allocations . . . . . . . . . . . . . . 110--122
Yiwen Wang and
Sen Su and
Alex X. Liu and
Zhongbao Zhang Multiple bulk data transfers scheduling
among datacenters . . . . . . . . . . . 123--137
Simon S. Woo and
Jelena Mirkovic Optimal application allocation on
multiple public clouds . . . . . . . . . 138--148
Pedro Casas and
Raimund Schatz Quality of Experience in Cloud services:
Survey and measurements . . . . . . . . 149--165
Subharthi Paul and
Raj Jain and
Mohammed Samaka and
Jianli Pan Application delivery in multi-cloud
environments using software defined
networking . . . . . . . . . . . . . . . 166--186
Rudolf Strijkers and
Marc X. Makkes and
Cees de Laat and
Robert Meijer Internet factories: Creating
application-specific networks on-demand 187--198
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Xin Jin and
Yu-Kwong Kwok Network aware peer-to-peer media
streaming: Capacity or proximity? . . . 1--18
Tomaz Buh and
Roman Trobec and
Andrej Ciglic Adaptive network-traffic balancing on
multi-core software networking devices 19--34
Jan Dvorák and
Jirí Novák and
Petr Kocourek Energy efficient network protocol
architecture for narrowband power line
communication networks . . . . . . . . . 35--50
Wojciech Bober and
Chris J. Bleakley BailighPulse: a low duty cycle data
gathering protocol for mostly-off
Wireless Sensor Networks . . . . . . . . 51--65
Soohong Park and
Jaehoon (Paul) Jeong and
Choong Seon Hong QoS-guaranteed Mobile IPTV service in
heterogeneous access networks . . . . . 66--81
Nadia Battat and
Hamida Seba and
Hamamache Kheddouci Monitoring in mobile ad hoc networks: a
survey . . . . . . . . . . . . . . . . . 82--100
S. Traverso and
C. Kiraly and
E. Leonardi and
M. Mellia A performance comparison of hose rate
controller approaches for P2P-TV
applications . . . . . . . . . . . . . . 101--120
Zhongjin Liu and
Yong Li and
Bo Cui and
Li Su and
Depeng Jin and
Lieguang Zeng GrainFlow: Enable testing for future
Internet architectures by per-bit
customization . . . . . . . . . . . . . 121--132
Ji-Su Kim and
Jae-Hyun Kim and
Sunghyun Cho Enhanced handoff scheme based on
efficient uplink quality estimation in
LTE-Advanced system . . . . . . . . . . 133--146
Hui Wang and
George N. Rouskas Hierarchical traffic grooming: a
tutorial . . . . . . . . . . . . . . . . 147--156
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Yuan Yang and
Mingwei Xu and
Qi Li Towards fast rerouting-based energy
efficient routing . . . . . . . . . . . 1--15
Gaofeng Wu and
Gurusamy Mohan Power-efficient integrated routing of
sublambda connection requests with
traffic splitting in IP over WDM
networks . . . . . . . . . . . . . . . . 16--29
Atef Abdelkefi and
Yuming Jiang and
Bjarne Emil Helvik and
Gergely Biczók and
Alexandru Calu Assessing the service quality of an
Internet path through end-to-end
measurement . . . . . . . . . . . . . . 30--44
Liang Liang and
Yu Ge and
Gang Feng and
Wei Ni and
Aung Aung Phyo Wai A low overhead tree-based
energy-efficient routing scheme for
multi-hop wireless body area networks 45--58
Argyrios G. Tasiopoulos and
Christos Tsiaras and
Stavros Toumpis Optimal and achievable cost/delay
tradeoffs in delay-tolerant networks . . 59--74
Bernardetta Addis and
Danilo Ardagna and
Antonio Capone and
Giuliana Carello Energy-aware joint management of
networks and Cloud infrastructures . . . 75--95
Wei-Cheng Chu and
Kuo-Feng Ssu Location-free boundary detection in
mobile wireless sensor networks with a
distributed approach . . . . . . . . . . 96--112
Constantinos Marios Angelopoulos and
Sotiris Nikoletseas and
Theofanis P. Raptis Wireless energy transfer in sensor
networks with adaptive, limited
knowledge protocols . . . . . . . . . . 113--141
Taeseop Lee and
Sangkyu Park and
Hyung-Sin Kim and
Saewoong Bahk Sounding resource management for QoS
support in massive MIMO systems . . . . 142--153
Chunxi Li and
Changjia Chen and
Yong Liu and
Baoxian Zhang Threshold bipolar scheduling for P2P
live streaming . . . . . . . . . . . . . 154--169
Esmat Mirzamany and
Aboubaker Lasebae and
Orhan Gemikonakli An efficient traffic engineering based
on multi-topology routing for future
Internet . . . . . . . . . . . . . . . . 170--178
Celimuge Wu and
Yusheng Ji and
Juan Xu and
Satoshi Ohzahata and
Toshihiko Kato Coded packets over lossy links: a
redundancy-based mechanism for reliable
and fast data collection in sensor
networks . . . . . . . . . . . . . . . . 179--191
Kyeong Soo Kim The effect of ISP traffic shaping on
user-perceived performance in broadband
shared access networks . . . . . . . . . 192--209
Peter Terlecky and
Brian Phelan and
Amotz Bar-Noy and
Theodore Brown and
Dror Rawitz Should I stay or should I go? Maximizing
lifetime with relays . . . . . . . . . . 210--224
Quang Duy La and
Yong Huat Chew and
Boon-Hee Soong Oligopolistic spectrum allocation game
via market competition under spectrum
broker . . . . . . . . . . . . . . . . . 225--239
Mario Montagud and
Fernando Boronat and
Hans Stokking and
Pablo Cesar Design, development and assessment of
control schemes for IDMS in a
standardized RTCP-based solution . . . . 240--259
Sharon Goldberg and
Michael Schapira and
Pete Hummon and
Jennifer Rexford How secure are secure interdomain
routing protocols? . . . . . . . . . . . 260--287
Hyung-Sin Kim and
Jae-Seok Bang and
Yong-Hwan Lee Distributed network configuration in
large-scale low power wireless networks 288--301
Rafael A. Rodríguez-Gómez and
Gabriel Maciá-Fernández and
Pedro García-Teodoro and
Moritz Steiner and
Davide Balzarotti Resource monitoring for the detection of
parasite P2P botnets . . . . . . . . . . 302--311
Melike Yigit and
V. Cagri Gungor and
Selcuk Baktir Cloud computing for Smart Grid
applications . . . . . . . . . . . . . . 312--329
Pantelis A. Frangoudis and
George C. Polyzos On the performance of secure
user-centric VoIP communication . . . . 330--344
Sérgio Figueiredo and
Carlos Guimarães and
Daniel Corujo and
Rui L. Aguiar MI3M: a framework for media independent
multicast mobility management . . . . . 345--365
Melike Yigit and
V. Cagri Gungor and
Gurkan Tuna and
Maria Rangoussi and
Etimad Fadel Power line communication technologies
for smart grid applications: a review of
advances and challenges . . . . . . . . 366--383
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Ian F. Akyildiz and
Ahyoung Lee and
Pu Wang and
Min Luo and
Wu Chou A roadmap for traffic engineering in
SDN--OpenFlow networks . . . . . . . . . 1--30
Moad Y. Mowafi and
Fahed H. Awad and
Walid A. Aljoby A novel approach for extracting spatial
correlation of visual information in
heterogeneous wireless multimedia sensor
networks . . . . . . . . . . . . . . . . 31--47
Abhijit Bhattacharya and
Anurag Kumar A shortest path tree based algorithm for
relay placement in a wireless sensor
network and its performance analysis . . 48--62
Wenjing Wang and
Mainak Chatterjee and
Kevin Kwiat and
Qing Li A game theoretic approach to detect and
co-exist with malicious nodes in
wireless networks . . . . . . . . . . . 63--83
Tiago Condeixa and
Susana Sargento Context-aware adaptive IP mobility
anchoring . . . . . . . . . . . . . . . 84--99
P. Muñoz and
D. Laselva and
R. Barco and
P. Mogensen Dynamic traffic steering based on fuzzy
Q-Learning approach in a multi-RAT
multi-layer wireless network . . . . . . 100--116
Alia Asheralieva and
Kaushik Mahata Joint power and bandwidth allocation in
IEEE802.22 based cognitive LTE network 117--129
Honggang Zhang and
Benyuan Liu and
Bin Nie and
Zhiyong Xu and
Xiayin Weng and
Chao Yu Leveraging online social friendship to
improve data swarming performance . . . 130--143
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Marica Amadeo and
Claudia Campolo and
Antonella Molinaro and
Giuseppe Ruggeri Content-centric wireless networking: a
survey . . . . . . . . . . . . . . . . . 1--13
Ankunda R. Kiremire and
Matthias R. Brust and
Vir V. Phoha Using network motifs to investigate the
influence of network topology on
PPM-based IP traceback schemes . . . . . 14--32
Dong Geun Jeong and
Jeong Ae Han and
Wha Sook Jeon Hop capacity balancing in OFDMA relay
networks . . . . . . . . . . . . . . . . 33--44
Bo Zhang and
Zhenhua Huang and
Yang Xiang A novel multiple-level trust management
framework for wireless sensor networks 45--61
Xin Kang and
Yongdong Wu A trust-based pollution attack
prevention scheme in peer-to-peer
streaming networks . . . . . . . . . . . 62--73
Manar Jammal and
Taranpreet Singh and
Abdallah Shami and
Rasool Asal and
Yiming Li Software defined networking: State of
the art and research challenges . . . . 74--98
Michele Savi and
Harald Òverby and
Norvald Stol and
Carla Raffaelli Cost evolution model to design optical
switching fabrics with wavelength
converters . . . . . . . . . . . . . . . 99--112
Tien-Thinh Nguyen and
Christian Bonnet Considerations of IP multicast for load
balancing in Proxy Mobile IPv6 networks 113--126
Xiaopei Lu and
Dezun Dong and
Xiangke Liao and
Shanshan Li and
Xiaodong Liu PathZip: a lightweight scheme for
tracing packet path in wireless sensor
networks . . . . . . . . . . . . . . . . 1--14
Sungwook Kim Learning based bandwidth management
algorithms by using bargaining and
fictitious play approaches . . . . . . . 15--21
Giovanni Stea and
Antonio Virdis A comprehensive simulation analysis of
LTE Discontinuous Reception (DRX) . . . 22--40
Ding Wang and
Ping Wang On the anonymity of two-factor
authentication schemes for wireless
sensor networks: Attacks, principle and
solutions . . . . . . . . . . . . . . . 41--57
Chen-Khong Tham and
Tie Luo Fairness and social welfare in service
allocation schemes for participatory
sensing . . . . . . . . . . . . . . . . 58--71
Sunggeun Jin and
Daji Qiao Numerical analysis of the power saving
with a bursty traffic model in
LTE-Advanced networks . . . . . . . . . 72--83
Dinil Mon Divakaran and
Mohan Gurusamy and
Mathumitha Sellamuthu Bandwidth allocation with differential
pricing for flexible demands in data
center networks . . . . . . . . . . . . 84--97
Giuseppe Colistra and
Virginia Pilloni and
Luigi Atzori The problem of task allocation in the
Internet of Things and the
consensus-based approach . . . . . . . . 98--111
Yaodong Zhang and
Yue Wang and
Dan Pei and
Jian Yuan Multi-AS cooperative incoming traffic
engineering in a transit-edge separate
Internet . . . . . . . . . . . . . . . . 112--127
Furqan Hameed Khan and
Young-June Choi Distributed games for coordinated
coalition formation in femtocell
networks . . . . . . . . . . . . . . . . 128--141
Meng-Shiuan Pan and
Ping-Lin Liu and
Yen-Pei Lin Event data collection in ZigBee
tree-based wireless sensor networks . . 142--153
Salvatore Cavalieri and
Ferdinando Chiacchio Limiting the loss of information in
KNXnet/IP on congestion conditions . . . 154--172
Abderrahmane Baadache and
Ali Belmehdi Struggling against simple and
cooperative black hole attacks in
multi-hop wireless ad hoc networks . . . 173--184
Li Xu and
Yuan He and
Xiaofeng Chen and
Xinyi Huang Ticket-based handoff authentication for
wireless mesh networks . . . . . . . . . 185--194
Tong Liu and
Yanmin Zhu Social welfare maximization in
participatory smartphone sensing . . . . 195--209
Tiphaine Phe-Neau and
Marcelo Dias de Amorim and
Vania Conan Uncovering vicinity properties in
disruption-tolerant networks . . . . . . 210--223
A. K. Marnerides and
A. Schaeffer-Filho and
A. Mauthe Traffic anomaly diagnosis in Internet
backbone networks: a survey . . . . . . 224--243
Chunqi Tian and
Baijian Yang and
Jidong Zhong and
Xiaojian Liu Trust-based incentive mechanism to
motivate cooperation in hybrid P2P
networks . . . . . . . . . . . . . . . . 244--255
Rosario G. Garroppo and
Gianfranco Nencioni and
Luca Tavanti and
Bernard Gendron The greening potential of content
delivery in residential community
networks . . . . . . . . . . . . . . . . 256--267
Yi-Huai Hsu and
Kuochen Wang and
Yu-Chee Tseng Efficient cooperative access class
barring with load balancing and traffic
adaptive radio resource management for
M2M communications over LTE-A . . . . . 268--281
A. Coluccia and
F. Ricciato and
P. Romirer-Maierhofer Robust estimation of mean failure
probability in access networks . . . . . 282--301
Youngsoo Lee and
Chong-Ho Choi Transmission Order Deducing MAC
(TOD-MAC) protocol for CSMA/CA wireless
networks . . . . . . . . . . . . . . . . 302--318
Min-Hong Han and
Byung-Gook Kim and
Jang-Won Lee Opportunistic resource scheduling for
D2D communication in OFDMA networks . . 319--334
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Greg Kuperman and
Eytan Modiano and
Aradhana Narula-Tam Network protection with multiple
availability guarantees . . . . . . . . 1--12
Jianming Lv and
Tieying Zhang and
Zhenhua Li and
Xueqi Cheng PACOM: Parasitic anonymous communication
in the BitTorrent network . . . . . . . 13--33
Lei Shi and
Jianghong Han and
Dong Han and
Xu Ding and
Zhenchun Wei The dynamic routing algorithm for
renewable wireless sensor networks with
wireless power transfer . . . . . . . . 34--52
Dongni Ren and
Wang Kit Wong and
S.-H. Gary Chan Overlay live video streaming with
heterogeneous bitrate requirements . . . 53--63
Alaa Awad and
Amr Mohamed and
Amr A. El-Sherif and
Omar A. Nasr Interference-aware energy-efficient
cross-layer design for healthcare
monitoring applications . . . . . . . . 64--77
Ayaz Ahmad and
Naveed Ul Hassan and
Nadir Shah Robust channel quality indicator
reporting for multi-carrier and
multi-user systems . . . . . . . . . . . 78--88
Junaid Ansari and
Elena Meshkova and
Wasif Masood and
Arham Muslim and
Janne Riihijärvi and
Petri Mähönen CONFab: Ontology and component based
optimization of WSN protocol stacks with
deployment feedback . . . . . . . . . . 89--108
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Yulei Wu and
Fei Hu and
Xinheng Wang Special issue on mobile computing for
content/service-oriented networking
architecture . . . . . . . . . . . . . . 1--3
Ricardo Matos and
Carlos Marques and
Susana Sargento Context-aware control of user-centric
virtual networks: Centralized vs
distributed approaches . . . . . . . . . 4--21
Chathura M. Sarathchandra Magurawalage and
Kun Yang and
Liang Hu and
Jianming Zhang Energy-efficient and network-aware
offloading algorithm for mobile cloud
computing . . . . . . . . . . . . . . . 22--33
Péter Vingelmann and
Janus Heide and
Morten Videbæk Pedersen and
Qi Zhang and
Frank H. P. Fitzek All-to-all data dissemination with
network coding in dynamic MANETs . . . . 34--47
Gaocai Wang and
Ying Peng and
Peng Feng and
Nao Wang An energy consumption minimization
routing scheme based on rate adaptation
with QoS guarantee for the mobile
environment . . . . . . . . . . . . . . 48--57
Mianxiong Dong and
Kaoru Ota and
Laurence T. Yang and
Shan Chang and
Hongzi Zhu and
Zhenyu Zhou Mobile agent-based energy-aware and
user-centric data collection in wireless
sensor networks . . . . . . . . . . . . 58--70
Guiyi Wei and
Yang Xiang and
Min Ji and
Ping Zhu An analytical model for optimal spectrum
leasing under constraints of quality of
service in CRNs . . . . . . . . . . . . 71--80
Quan Liu and
Hongwei Niu and
Wenjun Xu and
Duzhong Zhang A service-oriented spectrum allocation
algorithm using enhanced PSO for
cognitive wireless networks . . . . . . 81--91
Mian Ahmad Jan and
Priyadarsi Nanda and
Xiangjian He and
Ren Ping Liu PASCCC: Priority-based
application-specific congestion control
clustering protocol . . . . . . . . . . 92--102
Sancheng Peng and
Min Wu and
Guojun Wang and
Shui Yu Containing smartphone worm propagation
with an influence maximization algorithm 103--113
Bhanu Kaushik and
Honggang Zhang and
Xinyu Yang and
Xinwen Fu and
Benyuan Liu and
Jie Wang Providing service assurance in mobile
opportunistic networks . . . . . . . . . 114--140
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Ertugrul N. Ciftcioglu and
Antonios Michaloliakos and
Aylin Yener and
Konstantinos Psounis and
Thomas F. La Porta and
Ramesh Govindan Operational information content sum
capacity: From theory to practice . . . 1--17
Nelson Capela and
Susana Sargento Multihoming and network coding: a new
approach to optimize the network
performance . . . . . . . . . . . . . . 18--36
Dmitriy Kuptsov and
Boris Nechaev and
Andrey Lukyanenko and
Andrei Gurtov How penalty leads to improvement: a
measurement study of wireless backoff in
IEEE 802.11 networks . . . . . . . . . . 37--57
Hanjin Park and
Yung Yi and
Yongdae Kim Revisiting security of proportional fair
scheduler in wireless cellular networks 58--74
Sok-Ian Sou and
Dung-Ru Tsai Bulk credit reservation in event-based
Machine Type Communications for 3GPP
online charging . . . . . . . . . . . . 75--85
Dongni Ren and
S.-H. Gary Chan and
Guangyu Shi and
Hongbo Zhang Distributed joint optimization for
large-scale video-on-demand . . . . . . 86--98
Hassan Noura and
Steven Martin and
Khaldoun Al Agha and
Khaled Chahine ERSS--RLNC: Efficient and robust secure
scheme for random linear network coding 99--112
Mehmet Fatih Tuysuz An energy-efficient QoS-based network
selection scheme over heterogeneous
WLAN--3G networks . . . . . . . . . . . 113--133
Xiang-Jun Shen and
Lu Liu and
Zheng-Jun Zha and
Pei-Ying Gu and
Zhong-Qiu Jiang and
Ji-Ming Chen and
John Panneerselvam Achieving dynamic load balancing through
mobile agents in small world P2P
networks . . . . . . . . . . . . . . . . 134--148
Li-Ping Tung and
Ying-Dar Lin and
Yu-Hsien Kuo and
Yuan-Cheng Lai and
Krishna M. Sivalingam Reducing power consumption in LTE data
scheduling with the constraints of
channel condition and QoS . . . . . . . 149--159
Wen-Kang Jia A unified MIPv6 and PMIPv6 route
optimization scheme for heterogeneous
mobility management domains . . . . . . 160--176
Dina S. M. Hassan and
Hossam M. A. Fahmy and
Ayman M. Bahaa-ElDin RCA: Efficient connected dominated
clustering algorithm for mobile ad hoc
networks . . . . . . . . . . . . . . . . 177--191
Yinghui Zhang and
Xiaofeng Chen and
Jin Li and
Hui Li Generic construction for secure and
efficient handoff authentication schemes
in EAP-based wireless networks . . . . . 192--211
Hui Wang and
H. Eduardo Roman and
Liyong Yuan and
Yongfeng Huang and
Rongli Wang Connectivity, coverage and power
consumption in large-scale wireless
sensor networks . . . . . . . . . . . . 212--225
Charalambos Sergiou and
Vasos Vassiliou and
Aristodemos Paphitis Congestion control in Wireless Sensor
Networks through dynamic alternative
path selection . . . . . . . . . . . . . 226--238
B. Addis and
A. Capone and
G. Carello and
L. G. Gianoli and
B. Sans\`o On the energy cost of robustness and
resiliency in IP networks . . . . . . . 239--259
Cosimo Anglano and
Marco Guazzone and
Matteo Sereno Maximizing profit in green cellular
networks through collaborative games . . 260--275
Xiuquan Qiao and
Guoshun Nan and
Wei Tan and
Lei Guo and
Junliang Chen and
Wei Quan and
Yukai Tu CCNxTomcat: an extended web server for
Content-Centric Networking . . . . . . . 276--296
Aruna Prem Bianzino and
Mikael Asplund and
Ekhiotz Jon Vergara and
Simin Nadjm-Tehrani Cooperative proxies: Optimally trading
energy and quality of service in mobile
devices . . . . . . . . . . . . . . . . 297--312
Xin Jin and
Yu-Kwong Kwok and
Jian Deng Variegated competing peer-to-peer
systems with selfish peers . . . . . . . 313--330
Miloud Bagaa and
Mohamed Younis and
Abdelouahid Derhab and
Nadjib Badache Intertwined path formation and MAC
scheduling for fast delivery of
aggregated data in WSN . . . . . . . . . 331--350
Feng Shan and
Junzhou Luo and
Xiaojun Shen Optimal energy efficient packet
scheduling with arbitrary individual
deadline guarantee . . . . . . . . . . . 351--366
Zhongxing Ming and
Mingwei Xu and
Dan Wang InCan: In-network cache assisted eNodeB
caching mechanism in 4G LTE networks . . 367--380
Leandro Aparecido Villas and
Azzedine Boukerche and
Guilherme Maia and
Richard Werner Pazzi and
Antonio A. F. Loureiro DRIVE: an efficient and robust data
dissemination protocol for highway and
urban vehicular ad hoc networks . . . . 381--394
Jesús Friginal and
David de Andrés and
Juan-Carlos Ruiz and
Miquel Martínez A survey of evaluation platforms for ad
hoc routing protocols: a resilience
perspective . . . . . . . . . . . . . . 395--413
Deanna Hlavacek and
J. Morris Chang A layered approach to cognitive radio
network security: a survey . . . . . . . 414--436
Thomas Paul and
Antonino Famulari and
Thorsten Strufe A survey on decentralized Online Social
Networks . . . . . . . . . . . . . . . . 437--452
Akram Hakiri and
Aniruddha Gokhale and
Pascal Berthou and
Douglas C. Schmidt and
Thierry Gayraud Software-Defined Networking: Challenges
and research opportunities for Future
Internet . . . . . . . . . . . . . . . . 453--471
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Julia Klier and
Mathias Klier and
Rolf T. Wigand The connectedness, pervasiveness and
ubiquity of online social networks . . . 473--476
Tobias Mutter and
Dennis Kundisch Don't take away my status! --- Evidence
from the restructuring of a virtual
reward system . . . . . . . . . . . . . 477--490
Gongjun Yan and
Wu He and
Jiancheng Shen and
Chuanyi Tang A bilingual approach for conducting
Chinese and English social media
sentiment analysis . . . . . . . . . . . 491--503
Duc A. Tran and
Ting Zhang S-PUT: an EA-based framework for
socially aware data partitioning . . . . 504--518
Johannes Putzke and
Kai Fischbach and
Detlef Schoder and
Peter A. Gloor Cross-cultural gender differences in the
adoption and usage of social media
platforms --- an exploratory study of
Last.FM . . . . . . . . . . . . . . . . 519--530
Constantinos Patsakis and
Athanasios Zigomitros and
Achilleas Papageorgiou and
Edgar Galván-López Distributing privacy policies over
multimedia content across multiple
online social networks . . . . . . . . . 531--543
Junzhou Zhao and
John C. S. Lui and
Don Towsley and
Xiaohong Guan Whom to follow: Efficient followee
selection for cascading outbreak
detection on online social networks . . 544--559
Sebastian Behrendt and
Alexander Richter and
Matthias Trier Mixed methods analysis of enterprise
social networks . . . . . . . . . . . . 560--577
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Anonymous Thank you reviewers . . . . . . . . . . i--xxxi
Anonymous Editorial . . . . . . . . . . . . . . . iii--iv
Luiz H. A. Correia and
Thanh-Dien Tran and
Vasco N. S. S. Pereira and
João C. Giacomin and
Jorge M. Sá Silva DynMAC: a resistant MAC protocol to
coexistence in wireless sensor networks 1--16
Gy\Hozö Gódor and
Zoltán Jakó and
Ádám Knapp and
Sándor Imre A survey of handover management in
LTE-based multi-tier femtocell networks:
Requirements, challenges and solutions 17--41
R. Acedo-Hernández and
M. Toril and
S. Luna-Ramírez and
I. de la Bandera and
N. Faour Analysis of the impact of PCI planning
on downlink throughput performance in
LTE . . . . . . . . . . . . . . . . . . 42--54
Xenofon Fafoutis and
Alessio Di Mauro and
Madava D. Vithanage and
Nicola Dragoni Receiver-initiated medium access control
protocols for wireless sensor networks 55--74
Tomasz Bujlow and
Valentín Carela-Español and
Pere Barlet-Ros Independent comparison of popular DPI
tools for traffic classification . . . . 75--89
Dionysis Xenakis and
Nikos Passas and
Lazaros Merakos and
Christos Verikoukis Advanced mobility management for reduced
interference and energy consumption in
the two-tier LTE-Advanced network . . . 90--111
P. Muñoz and
R. Barco and
I. de la Bandera Load balancing and handover joint
optimization in LTE networks using Fuzzy
Logic and Reinforcement Learning . . . . 112--125
Michele Mangili and
Fabio Martignon and
Stefano Paraboschi A cache-aware mechanism to enforce
confidentiality, trackability and access
policy evolution in Content-Centric
Networks . . . . . . . . . . . . . . . . 126--145
S. Sicari and
A. Rizzardi and
L. A. Grieco and
A. Coen-Porisini Security, privacy and trust in Internet
of Things: the road ahead . . . . . . . 146--164
Tengfei Chang and
Thomas Watteyne and
Kris Pister and
Qin Wang Adaptive synchronization in multi-hop
TSCH networks . . . . . . . . . . . . . 165--176
Yuansheng Wu and
Bing Guo and
Yan Shen and
Jihe Wang and
Xiaobin Liu A Cross-Layer Optimization and Design
approach under QoS constraints for green
IP over WDM networks . . . . . . . . . . 177--190
Xu Wang and
Hailong Sun and
Ting Deng and
Jinpeng Huai On the tradeoff of availability and
consistency for quorum systems in data
center networks . . . . . . . . . . . . 191--206
Mustafa Ilhan Akbas and
Matthias R. Brust and
Damla Turgut and
Carlos H. C. Ribeiro A preferential attachment model for
primate social networks . . . . . . . . 207--226
Tugrul Çavdar and
Erkan Güler and
Zhaleh Sadreddini Instant overbooking framework for
cognitive radio networks . . . . . . . . 227--241
Yuichi Ohsita and
Takashi Miyamura and
Shin'ichi Arakawa and
Shohei Kamamura and
Daisaku Shimazaki and
Kohei Shiomoto and
Atsushi Hiramatsu and
Masayuki Murata Aggregation of traffic information for
hierarchical routing reconfiguration . . 242--258
Martino Fornasa and
Michele Stecca and
Massimo Maresca and
Pierpaolo Baglietto Bounded latency spanning tree
reconfiguration . . . . . . . . . . . . 259--274
Bilal Gonen and
Gurhan Gunduz and
Murat Yuksel Automated network management and
configuration using Probabilistic
Trans-Algorithmic Search . . . . . . . . 275--293
Chao Gao and
Guorong Zhao and
Jianhua Lu and
Shuang Pan A grid-based cooperative QoS routing
protocol with fading memory optimization
for navigation carrier ad hoc networks 294--316
Müge Erel and
Zemre Arslan and
Yusuf Özçevik and
Berk Canberk Grade of Service (GoS) based adaptive
flow management for Software Defined
Heterogeneous Networks (SDHetN) . . . . 317--330
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Alfonso Iacovazzi and
Andrea Baiocchi Protecting traffic privacy for massive
aggregated traffic . . . . . . . . . . . 1--17
Jerzy Domzal and
Zbigniew Duli\'nski and
Miroslaw Kantor and
Jacek Rzasa and
Rafal Stankiewicz and
Krzysztof Wajda and
Robert Wójcik A survey on methods to provide multipath
transmission in wired packet networks 18--41
Michele Albano and
Stefano Chessa Replication vs erasure coding in data
centric storage for wireless sensor
networks . . . . . . . . . . . . . . . . 42--55
Dexiang Wang Tradeoff study among traffic egression
schemes and member allocation
optimization for link aggregation groups
in integrated switching systems . . . . 56--72
Giovanni Accongiagioco and
Enrico Gregori and
Luciano Lenzini S-BITE: a Structure-Based Internet
Topology gEnerator . . . . . . . . . . . 73--89
Scott Fowler and
Ahmed Omar Shahidullah and
Mohammed Osman and
Johan M. Karlsson and
Di Yuan Analytical evaluation of extended DRX
with additional active cycles for light
traffic . . . . . . . . . . . . . . . . 90--102
Hassan Habibi Gharakheili and
Arun Vishwanath and
Vijay Sivaraman Comparing edge and host traffic pacing
in small buffer networks . . . . . . . . 103--116
Sebastian Neumayer and
Alon Efrat and
Eytan Modiano Geographic max-flow and min-cut under a
circular disk failure model . . . . . . 117--127
Farzad Tashtarian and
M. H. Yaghmaee Moghaddam and
Khosrow Sohraby and
Sohrab Effati ODT: Optimal deadline-based trajectory
for mobile sinks in WSN: a decision tree
and dynamic programming approach . . . . 128--143
Phuong Luu Vo and
Duc Ngoc Minh Dang and
Sungwon Lee and
Choong Seon Hong and
Quan Le-Trung A coalitional game approach for
fractional cooperative caching in
content-oriented networks . . . . . . . 144--152
Aristotelis Kretsis and
Panagiotis Kokkinos and
Kostas Christodoulopoulos and
Theodora Varvarigou and
Emmanouel (Manos) Varvarigos Mantis: Cloud-based optical network
planning and operation tool . . . . . . 153--168
Shashank Shanbhag and
Arun Reddy Kandoor and
Cong Wang and
Ramgopal Mettu and
Tilman Wolf VHub: Single-stage virtual network
mapping through hub location . . . . . . 169--180
Myungjin Lee and
Mohammad Hajjat and
Ramana Rao Kompella and
Sanjay G. Rao A flow measurement architecture to
preserve application structure . . . . . 181--195
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Anonymous Editorial Board . . . . . . . . . . . . ibc--ibc
Richard Combes and
Salah Eddine Elayoubi and
Arshad Ali and
Louai Saker and
Tijani Chahed Optimal online control for sleep mode in
green base stations . . . . . . . . . . ibc--ibc
Chao Fang and
F. Richard Yu and
Tao Huang and
Jiang Liu and
Yunjie Liu An energy-efficient distributed
in-network caching scheme for green
content-centric networks . . . . . . . . ibc--ibc
Fatemeh Ganji and
Lukasz Budzisz and
Fikru G. Debele and
Nanfang Li and
Michela Meo and
Marco Ricca and
Yi Zhang and
Adam Wolisz Greening campus WLANs: Energy-relevant
usage and mobility patterns . . . . . . ibc--ibc
Ward Van Heddeghem and
Filip Idzikowski and
Francesco Musumeci and
Achille Pattavina and
Bart Lannoo and
Didier Colle and
Mario Pickavet A power consumption sensitivity analysis
of circuit-switched versus
packet-switched backbone networks . . . ibc--ibc
Xiaoli Huan and
Bang Wang and
Yijun Mo and
Laurence T. Yang Rechargeable router placement based on
efficiency and fairness in green
wireless mesh networks . . . . . . . . . ibc--ibc
S. Lambert and
B. Lannoo and
A. Dixit and
D. Colle and
M. Pickavet and
J. Montalvo and
J. A. Torrijos and
P. Vetter Energy efficiency analysis of high speed
triple-play services in next-generation
PON deployments . . . . . . . . . . . . ibc--ibc
Nam Pham Ngoc and
Thanh Nguyen Huu and
Trong Vu Quang and
Vu Tran Hoang and
Huong Truong Thu and
Phuoc Tran-Gia and
Christian Schwartz A new power profiling method and power
scaling mechanism for energy-aware
NetFPGA gigabit router . . . . . . . . . ibc--ibc
J. Peng and
P. Hong and
K. Xue Optimal power management under delay
constraint in cellular networks with
hybrid energy sources . . . . . . . . . ibc--ibc
Marco Polverini and
Antonio Cianfrani and
Angelo Coiro and
Marco Listanti and
Roberto Bruschi Freezing forwarding functionality to
make the network greener . . . . . . . . ibc--ibc
Balaji Rengarajan and
Gianluca Rizzo and
Marco Ajmone Marsan Energy-optimal base station density in
cellular access networks with sleep
modes . . . . . . . . . . . . . . . . . ibc--ibc
Pablo Serrano and
Xavier Costa-Pérez and
Jinsong Wu and
Ken Christensen Special Issue: Green Communications . . ibc--ibc
Kyuho Son and
Eunsung Oh and
Bhaskar Krishnamachari Energy-efficient design of heterogeneous
cellular networks from deployment to
operation . . . . . . . . . . . . . . . ibc--ibc
Luis Suárez and
Loutfi Nuaymi and
Jean-Marie Bonnin Energy-efficient BS switching-off and
cell topology management for macro/femto
environments . . . . . . . . . . . . . . ibc--ibc
Jiayuan Wang and
Xin Chen and
Chris Phillips and
Ying Yan Energy efficiency with QoS control in
dynamic optical networks with SDN
enabled integrated control plane . . . . ibc--ibc
M. Aykut Yigitel and
Ozlem Durmaz Incel and
Cem Ersoy QoS vs. energy: a traffic-aware topology
management scheme for green
heterogeneous networks . . . . . . . . . ibc--ibc
Pantelis A. Frangoudis and
George C. Polyzos Reputation-based crowdsourced Wi-Fi
topology discovery . . . . . . . . . . . 1--16
Wei Wang and
Linlin Yang and
Yanjiao Chen and
Qian Zhang A privacy-aware framework for targeted
advertising . . . . . . . . . . . . . . 17--29
Noor Al-Nakhala and
Ryan Riley and
Tarek Elfouly Distributed algorithms in wireless
sensor networks: an approach for
applying binary consensus in a real
testbed . . . . . . . . . . . . . . . . 30--38
Md. Tauhiduzzaman and
Mea Wang Fighting pollution attacks in P2P
streaming . . . . . . . . . . . . . . . 39--52
Seil Jeon and
Namhi Kang and
Daniel Corujo and
Rui L. Aguiar Comprehensive performance evaluation of
distributed and dynamic mobility routing
strategy . . . . . . . . . . . . . . . . 53--67
Revathi Bangalore Somanatha and
J. William Atwood Router authentication, key management,
and adjacency management for securing
inter-router control messages . . . . . 68--90
Young-Hwan Kim and
Roberto Konow and
Diego Dujovne and
Thierry Turletti and
Walid Dabbous and
Gonzalo Navarro PcapWT: an efficient packet extraction
tool for large volume network traces . . 91--102
A. Mostefaoui and
A. Boukerche and
M. A. Merzoug and
M. Melkemi A scalable approach for serial data
fusion in Wireless Sensor Networks . . . 103--119
Elisa Rojas and
Guillermo Ibañez and
Jose Manuel Gimenez-Guzman and
Juan A. Carral and
Alberto Garcia-Martinez and
Isaias Martinez-Yelmo and
Jose Manuel Arco All-Path bridging: Path exploration
protocols for data center and campus
networks . . . . . . . . . . . . . . . . 120--132
Sangyup Han and
Myungchul Kim and
Ben Lee and
Sungwon Kang Fast Directional Handoff and lightweight
retransmission protocol for enhancing
multimedia quality in indoor WLANs . . . 133--147
Róza Go\'scie\'n and
Krzysztof Walkowiak and
Miroslaw Klinkowski Tabu search algorithm for routing,
modulation and spectrum allocation in
elastic optical network with anycast and
unicast traffic . . . . . . . . . . . . 148--165
Muhammad Adeel Mahmood and
Winston K. G. Seah and
Ian Welch Reliability in wireless sensor networks:
a survey and challenges ahead . . . . . 166--187
Fabrício A. Silva and
Azzedine Boukerche and
Thais R. M. B. Silva and
Linnyer B. Ruiz and
Antonio A. F. Loureiro A novel macroscopic mobility model for
vehicular networks . . . . . . . . . . . 188--202
Pablo Romero and
Franco Robledo and
Pablo Rodríguez-Bocca and
Claudia Rostagnol Lyapunov stability and performance of
user-assisted Video-on-Demand services 203--215
Behnaz Bostanipour and
Beno\^\it Garbinato Effective and efficient neighbor
detection for proximity-based mobile
applications . . . . . . . . . . . . . . 216--235
Yousri Daldoul and
Djamal-Eddine Meddour and
Toufik Ahmed and
Raouf Boutaba Impact of device unavailability on the
reliability of multicast transport in
IEEE 802.11 networks . . . . . . . . . . 236--246
Álvaro Pachón and
Andrés Navarro and
Ubaldo García-Palomares A flexible mid-term frequency domain
scheduler for resource allocation in
HetNets based on the SINR requested by
users . . . . . . . . . . . . . . . . . 247--262
Michael Donohoe and
Brendan Jennings and
Sasitharan Balasubramaniam Context-awareness and the smart grid:
Requirements and challenges . . . . . . 263--282
Ting Wang and
Zhiyang Su and
Yu Xia and
Jogesh Muppala and
Mounir Hamdi Designing efficient high performance
server-centric data center network
architecture . . . . . . . . . . . . . . 283--296
You-Chiun Wang and
Chien-An Chuang Efficient eNB deployment strategy for
heterogeneous cells in 4G LTE systems 297--312
Julio Soto and
Michele Nogueira A framework for resilient and secure
spectrum sensing on cognitive radio
networks . . . . . . . . . . . . . . . . 313--322
Fatma Ekici and
Didem Gözüpek Joint overlay routing and relay
assignment for green networks . . . . . 323--344
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
M. S. Siddiqui and
D. Montero and
R. Serral-Graci\`a and
X. Masip-Bruin and
M. Yannuzzi A survey on the recent efforts of the
Internet Standardization Body for
securing inter-domain routing . . . . . 1--26
Gabriel Martorell and
Guillem Femenias and
Felip Riera-Palou Non-saturated IEEE 802.11 networks. A
hierarchical $3$D Markov model . . . . . 27--50
Amin Karami and
Manel Guerrero-Zapata An ANFIS-based cache replacement method
for mitigating cache pollution attacks
in Named Data Networking . . . . . . . . 51--65
Sergio Pastrana and
Juan E. Tapiador and
Agustin Orfila and
Pedro Peris-Lopez DEFIDNET: a framework for optimal
allocation of cyberdefenses in Intrusion
Detection Networks . . . . . . . . . . . 66--88
Adelina Madhja and
Sotiris Nikoletseas and
Theofanis P. Raptis Distributed wireless power transfer in
sensor networks with multiple Mobile
Chargers . . . . . . . . . . . . . . . . 89--108
Yangming Zhao and
Yifan Huang and
Kai Chen and
Minlan Yu and
Sheng Wang and
DongSheng Li Joint VM placement and topology
optimization for traffic scalability in
dynamic datacenter networks . . . . . . 109--123
Anita Sobe and
Wilfried Elmenreich and
Tibor Szkaliczki and
Laszlo Böszörmenyi SEAHORSE: Generalizing an artificial
hormone system algorithm to a middleware
for search and delivery of information
units . . . . . . . . . . . . . . . . . 124--142
Amin Azari and
Jalil S. Harsini and
Farshad Lahouti Performance analysis of ad-hoc routing
in heterogeneous clustered multi-hop
wireless networks . . . . . . . . . . . 143--154
Leng-Gan Yi and
Yi-Min Lu Utility-driven relay for hybrid access
femtocells based on cognitive radio
spectrum auction . . . . . . . . . . . . 155--166
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Xin Jin and
Yu-Kwong Kwok Coercion builds cooperation in dynamic
and heterogeneous P2P live streaming
networks . . . . . . . . . . . . . . . . 1--18
José Marinho and
Edmundo Monteiro CORHYS: Hybrid signaling for
opportunistic distributed cognitive
radio . . . . . . . . . . . . . . . . . 19--42
Cristiano Rezende and
Azzedine Boukerche and
Mohammed Almulla and
Antonio A. F. Loureiro The selective use of redundancy for
video streaming over Vehicular Ad Hoc
Networks . . . . . . . . . . . . . . . . 43--62
Ilaria Malanchini and
Steven Weber and
Matteo Cesana Stochastic characterization of the
spectrum sharing game in ad-hoc networks 63--78
Hamid Farhady and
HyunYong Lee and
Akihiro Nakao Software-Defined Networking: a survey 79--95
Niels Bouten and
Ricardo de O. Schmidt and
Jeroen Famaey and
Steven Latré and
Aiko Pras and
Filip De Turck QoE-driven in-network optimization for
Adaptive Video Streaming based on packet
sampling measurements . . . . . . . . . 96--115
Soochang Park and
Seung-Woo Hong and
Euisin Lee and
Sang-Ha Kim and
Noel Crespi Large-scale mobile phenomena monitoring
with energy-efficiency in wireless
sensor networks . . . . . . . . . . . . 116--135
Ghadah Aldabbagh and
Sheikh Tahir Bakhsh and
Nadine Akkari and
Sabeen Tahir and
Haleh Tabrizi and
John Cioffi QoS-Aware Tethering in a Heterogeneous
Wireless Network using LTE and TV White
Spaces . . . . . . . . . . . . . . . . . 136--146
Andra Lutu and
Marcelo Bagnulo and
Cristel Pelsser and
Kenjiro Cho and
Rade Stanojevic An analysis of the economic impact of
strategic deaggregation . . . . . . . . 147--163
Zhen Huang and
Jinbang Chen and
Yisong Lin and
Pengfei You and
Yuxing Peng Minimizing data redundancy for high
reliable cloud storage systems . . . . . 164--177
Hakan Kardes and
Mehmet Hadi Gunes and
Kamil Sarac Graph Based Induction of unresponsive
routers in Internet topologies . . . . . 178--200
A. Socievole and
E. Yoneki and
F. De Rango and
J. Crowcroft ML--SOR: Message routing using
multi-layer social networks in
opportunistic communications . . . . . . 201--219
Christos Anagnostopoulos and
Stathes Hadjiefthymiades and
Kostas Kolomvatsos Time-optimized user grouping in Location
Based Services . . . . . . . . . . . . . 220--244
Li Yang and
Jianfeng Ma and
Wenjing Lou and
Qi Jiang A delegation based cross trusted domain
direct anonymous attestation scheme . . 245--257
Siddhartha Sarma and
Joy Kuri Optimal power allocation for protective
jamming in wireless networks: a flow
based model . . . . . . . . . . . . . . 258--271
Andrea Detti and
Bruno Ricci and
Nicola Blefari-Melazzi Mobile peer-to-peer video streaming over
information-centric networks . . . . . . 272--288
Wei Yin and
Peizhao Hu and
Jadwiga Indulska Rate control in the mac80211 framework:
Overview, evaluation and improvements 289--307
Bing Wang and
Yao Zheng and
Wenjing Lou and
Y. Thomas Hou DDoS attack protection in the era of
cloud computing and Software-Defined
Networking . . . . . . . . . . . . . . . 308--319
Tobias Hoßfeld and
Michael Seufert and
Christian Sieber and
Thomas Zinner and
Phuoc Tran-Gia Identifying QoE optimal adaptation of
HTTP adaptive streaming based on
subjective studies . . . . . . . . . . . 320--332
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Wouter Tavernier and
Deborah Frincke and
Achim Autenrieth and
Didier Colle Editorial . . . . . . . . . . . . . . . 1--3
Abdulaziz Alashaikh and
Teresa Gomes and
David Tipper The \em Spine concept for improving
network availability . . . . . . . . . . 4--19
Aditya Sundarrajan and
Srinivasan Ramasubramanian Fast reroute from single link and single
node failures for IP multicast . . . . . 20--33
M. Todd Gardner and
Rebecca May and
Cory Beard and
Deep Medhi A Geographic Multi-Topology Routing
approach and its benefits during
large-scale geographically correlated
failures . . . . . . . . . . . . . . . . 34--49
Yufei Cheng and
M. Todd Gardner and
Junyan Li and
Rebecca May and
Deep Medhi and
James P. G. Sterbenz Analysing GeoPath diversity and
improving routing performance in optical
networks . . . . . . . . . . . . . . . . 50--67
Péter Babarczi and
Alija Pasi\'c and
János Tapolcai and
Felicián Németh and
Bence Ladóczki Instantaneous recovery of unicast
connections in transport networks:
Routing versus coding . . . . . . . . . 68--80
Yong-Hyuk Moon and
Chan-Hyun Youn Multihybrid job scheduling for
fault-tolerant distributed computing in
policy-constrained resource networks . . 81--95
Sergio Fortes and
Raquel Barco and
Alejandro Aguilar-García and
Pablo Muñoz Contextualized indicators for online
failure diagnosis in cellular networks 96--113
Jesús Friginal and
David de Andrés and
Juan-Carlos Ruiz and
Miquel Martínez REFRAHN: a Resilience Evaluation
Framework for Ad Hoc Routing Protocols 114--134
M. S. Siddiqui and
D. Montero and
R. Serral-Graci\`a and
M. Yannuzzi Self-reliant detection of route leaks in
inter-domain routing . . . . . . . . . . 135--155
Sahel Sahhaf and
Wouter Tavernier and
Didier Colle and
Mario Pickavet and
Piet Demeester Experimental validation of resilient
tree-based greedy geometric routing . . 156--171
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Munyoung Lee and
Junghwan Song and
Kideok Cho and
Sangheon Pack and
Ted `Taekyoung' Kwon and
Jussi Kangasharju and
Yanghee Choi Content discovery for
information-centric networking . . . . . 1--14
Carlo Vallati and
Enzo Mingozzi Efficient design of wireless mesh
networks with robust dynamic frequency
selection capability . . . . . . . . . . 15--29
Min Luo and
Yulong Zeng and
Jianfei Li and
Wu Chou An adaptive multi-path computation
framework for centrally controlled
networks . . . . . . . . . . . . . . . . 30--44
Anna Dudnikova and
Daniela Panno and
Antonio Mastrosimone Measurement-based coverage function for
green femtocell networks . . . . . . . . 45--58
Zichuan Xu and
Weifa Liang Operational cost minimization of
distributed data centers through the
provision of fair request rate
allocations while meeting different user
SLAs . . . . . . . . . . . . . . . . . . 59--75
Samil Temel and
Ilker Bekmezci LODMAC: Location Oriented Directional
MAC protocol for FANETs . . . . . . . . 76--84
Yaoqing Liu and
Vince Lehman and
Lan Wang Efficient FIB caching using minimal
non-overlapping prefixes . . . . . . . . 85--99
Xiaoying Zheng and
Chunglae Cho and
Ye Xia Content distribution by multiple
multicast trees and intersession
cooperation: Optimal algorithms and
approximations . . . . . . . . . . . . . 100--117
C. Cano and
D. Malone On efficiency and validity of previous
Homeplug MAC performance analysis . . . 118--135
Matteo Dell'Amico and
Pietro Michiardi and
Laszlo Toka and
Pasquale Cataldi Adaptive redundancy management for
durable P2P backup . . . . . . . . . . . 136--148
Adrián Sánchez-Carmona and
Sergi Robles and
Carlos Borrego Endeavouring to be in the good books.
Awarding DTN network use for
acknowledging the reception of bundles 149--166
Farha N. Ali and
Yvon Feaster and
Jiannan Zhai and
Jason O. Hallstrom The smart surface network: a bus-based
approach to dense sensing . . . . . . . 167--183
Sheng Zhang and
Jie Wu and
Zhuzhong Qian and
Sanglu Lu MobiCache: Cellular traffic offloading
leveraging cooperative caching in mobile
social networks . . . . . . . . . . . . 184--198
Dexiang Wang Bandwidth-efficiency-oriented topology
optimization for integrated switching
systems based on circulant graphs . . . 199--216
L. Rajya Lakshmi and
Vinay J. Ribeiro and
B. N. Jain PRIME: a partial path establishment
based handover management technique for
QoS support in WiMAX based wireless mesh
networks . . . . . . . . . . . . . . . . 217--234
Andrea Bianco and
Davide Cuda and
Jorge M. Finochietto Short-term fairness in slotted WDM rings 235--248
Martín Zubeldía and
Andrés Ferragut and
Fernando Paganini Neighbor selection for proportional
fairness in P2P networks . . . . . . . . 249--264
Konstantin Avrachenkov and
Jocelyne Elias and
Fabio Martignon and
Giovanni Neglia and
Leon Petrosyan Cooperative network design: a Nash
bargaining solution approach . . . . . . 265--279
Francesco Longo and
Salvatore Distefano and
Dario Bruneo and
Marco Scarpa Dependability modeling of Software
Defined Networking . . . . . . . . . . . 280--296
Xingkong Ma and
Yijie Wang and
Xiaoqiang Pei and
Fangliang Xu Scalable and elastic total order in
content-based publish/subscribe systems 297--314
Lei Ding and
Tommaso Melodia and
Stella N. Batalama and
John D. Matyjas Distributed resource allocation in
cognitive and cooperative ad hoc
networks through joint routing, relay
selection and spectrum allocation . . . 315--331
Lara Deek and
Eduard Garcia-Villegas and
Elizabeth Belding and
Sung-Ju Lee and
Kevin Almeroth A practical framework for 802.11 MIMO
rate adaptation . . . . . . . . . . . . 332--348
Yuanzhu Chen and
Xu Liu and
Jiafen Liu and
Walter Taylor and
Jason H. Moore Delay-tolerant networks and network
coding: Comparative studies on simulated
and real-device experiments . . . . . . 349--362
Adnan Nadeem and
Muhammad Azhar Hussain and
Obaidullah Owais and
Abdul Salam and
Sarwat Iqbal and
Kamran Ahsan Application specific study, analysis and
classification of body area wireless
sensor network applications . . . . . . 363--380
Giuseppe Aceto and
Antonio Pescapé Internet Censorship detection: a survey 381--421
Vahid Nazari Talooki and
Riccardo Bassoli and
Daniel E. Lucani and
Jonathan Rodriguez and
Frank H. P. Fitzek and
Hugo Marques and
Rahim Tafazolli Security concerns and countermeasures in
network coding based communication
systems: a survey . . . . . . . . . . . 422--445
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Dingde Jiang and
Yuanting Wang and
Chunping Yao and
Yang Han An effective dynamic spectrum access
algorithm for multi-hop cognitive
wireless networks . . . . . . . . . . . 1--16
Md. Rakib Hassan and
Gour Karmakar and
Joarder Kamruzzaman and
Bala Srinivasan A comprehensive spectrum trading scheme
based on market competition, reputation
and buyer specific requirements . . . . 17--31
Sumanta Saha and
Andrey Lukyanenko and
Antti Ylä-Jääski Efficient cache availability management
in Information-Centric Networks . . . . 32--45
Roberto Di Pietro and
Gabriele Oligeri ESC: an efficient, scalable, and
crypto-less solution to secure wireless
networks . . . . . . . . . . . . . . . . 46--63
Chen Ran and
Shaowei Wang and
Chonggang Wang Cellular networks planning: a workload
balancing perspective . . . . . . . . . 64--75
Sahar Hoteit and
Stefano Secci and
Guy Pujolle and
Adam Wolisz and
Cezary Ziemlicki and
Zbigniew Smoreda Mobile data traffic offloading over
Passpoint hotspots . . . . . . . . . . . 76--93
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Ian F. Akyildiz and
Pu Wang and
Shih-Chun Lin SoftAir: a software defined networking
architecture for 5G wireless systems . . 1--18
Changhoon Yoon and
Taejune Park and
Seungsoo Lee and
Heedo Kang and
Seungwon Shin and
Zonghua Zhang Enabling security functions with SDN: a
feasibility study . . . . . . . . . . . 19--35
Tatsuya Otoshi and
Yuichi Ohsita and
Masayuki Murata and
Yousuke Takahashi and
Keisuke Ishibashi and
Kohei Shiomoto Traffic prediction for dynamic traffic
engineering . . . . . . . . . . . . . . 36--50
Jun He and
Wei Song Smart routing: Fine-grained stall
management of video streams in mobile
core networks . . . . . . . . . . . . . 51--62
Mohammed L. Ali and
Pin-Han Ho and
János Tapolcai SRLG fault localization using nested
$m$-trails . . . . . . . . . . . . . . . 63--79
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
João Eugenio Marynowski and
Altair Olivo Santin and
Andrey Ricardo Pimentel Method for testing the fault tolerance
of MapReduce frameworks . . . . . . . . 1--13
Mehmet Hadi Gunes and
Murat Yuksel and
Hayreddin Ceker A blind processing framework to
facilitate openness in smart grid
communications . . . . . . . . . . . . . 14--26
Xinyun Wu and
Tao Ye and
Qi Guo and
Zhipeng Lü GRASP for traffic grooming and routing
with simple path constraints in WDM mesh
networks . . . . . . . . . . . . . . . . 27--39
Eduard Garcia-Villegas and
Muhammad Shahwaiz Afaqui and
Elena Lopez-Aguilera A novel cheater and jammer detection
scheme for IEEE 802.11-based wireless
LANs . . . . . . . . . . . . . . . . . . 40--56
Yingbiao Yao and
Nanlan Jiang Distributed wireless sensor network
localization based on weighted search 57--75
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Jianxin Liao and
Ziteng Cui and
Jingyu Wang and
Tonghong Li and
Qi Qi and
Jing Wang A coalitional game approach on improving
interactions in multiple overlay
environments . . . . . . . . . . . . . . 1--15
Walter Cerroni and
Molka Gharbaoui and
Barbara Martini and
Aldo Campi and
Piero Castoldi and
Franco Callegati Cross-layer resource orchestration for
cloud service delivery: a seamless SDN
approach . . . . . . . . . . . . . . . . 16--32
Shu Fu and
Bin Wu and
Xiaohong Jiang and
Achille Pattavina and
Hong Wen and
Hongfang Yu Switch cost and packet delay tradeoff in
data center networks with switch
reconfiguration overhead . . . . . . . . 33--43
Leovigildo Sánchez-Casado and
Gabriel Maciá-Fernández and
Pedro García-Teodoro and
Roberto Magán-Carrión A model of data forwarding in MANETs for
lightweight detection of malicious
packet dropping . . . . . . . . . . . . 44--58
Carlos Borrego and
Sergi Robles and
Angela Fabregues and
Adrián Sánchez-Carmona A mobile code bundle extension for
application-defined routing in delay and
disruption tolerant networking . . . . . 59--77
Lin Yao and
Jing Deng and
Jie Wang and
Guowei Wu A-CACHE: an anchor-based public key
caching scheme in large wireless
networks . . . . . . . . . . . . . . . . 78--88
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Ertong Zhang and
Lisong Xu Capacity and token rate estimation for
networks with token bucket shapers . . . 1--11
Mustapha Reda Senouci and
Abdelhamid Mellouk and
Latifa Oukhellou and
Amar Aissani WSNs deployment framework based on the
theory of belief functions . . . . . . . 12--26
Quoc-Tuan Vien and
Wanqing Tu and
Huan X. Nguyen and
Ramona Trestian Cross-layer topology design for network
coding based wireless multicasting . . . 27--39
Kaveh Vaezi and
Nail Akar Analytical performance modeling of
elastic optical links with aligned
spectrum allocation . . . . . . . . . . 40--50
Michele Girolami and
Stefano Chessa and
Antonio Caruso On service discovery in mobile social
networks: Survey and perspectives . . . 51--71
Xinyu Yang and
Xuebin Ren and
Shusen Yang and
Julie McCann A novel temporal perturbation based
privacy-preserving scheme for real-time
monitoring systems . . . . . . . . . . . 72--88
Victor Lira and
Eduardo Tavares and
Paulo Maciel An automated approach to dependability
evaluation of virtual networks . . . . . 89--102
Vladimir Fux and
Patrick Maillé and
Matteo Cesana Road-side units operators in
competition: a game-theoretical approach 103--120
Weigang Hou and
Lei Guo and
Yejun Liu and
Cunqian Yu and
Yue Zong Resource management and control in
converged optical data center networks:
Survey and enabling technologies . . . . 121--135
Wei Wang and
Lei Chen and
Qian Zhang Outsourcing high-dimensional healthcare
data to cloud with personalized privacy
preservation . . . . . . . . . . . . . . 136--148
Dimitris Tsolkas and
Nikos Passas and
Lazaros Merakos Enabling device discovery transmissions
in LTE networks with fractional
frequency reuse . . . . . . . . . . . . 149--160
Uthpala Subodhani Premarathne and
Ibrahim Khalil and
Mohammed Atiquzzaman Location-dependent disclosure risk based
decision support framework for
persistent authentication in pervasive
computing applications . . . . . . . . . 161--177
Haitham Y. Adarbah and
Shakeel Ahmad and
Alistair Duffy Impact of noise and interference on
probabilistic broadcast schemes in
mobile ad-hoc networks . . . . . . . . . 178--186
Georgios Papadimitriou and
Nikolaos Pappas and
Apostolos Traganitis and
Vangelis Angelakis Network-level performance evaluation of
a two-relay cooperative random access
wireless system . . . . . . . . . . . . 187--201
Nicol\`o Facchi and
Francesco Gringoli and
Fabio Ricciato and
Andrea Toma Emitter localisation from reception
timestamps in asynchronous networks . . 202--217
Ahmed Makki and
Abubakr Siddig and
Mohamed Saad and
Chris Bleakley Survey of WiFi positioning using
time-based techniques . . . . . . . . . 218--233
Imran Ahmed and
M. Majid Butt and
Constantinos Psomas and
Amr Mohamed and
Ioannis Krikidis and
Mohsen Guizani Survey on energy harvesting wireless
communications: Challenges and
opportunities for radio resource
allocation . . . . . . . . . . . . . . . 234--248
Aissan Dalvandi and
Mohan Gurusamy and
Kee Chaing Chua Power-efficient resource-guaranteed VM
placement and routing for time-aware
data center applications . . . . . . . . 249--268
Nuno Coutinho and
Ricardo Matos and
Carlos Marques and
André Reis and
Susana Sargento and
Jacob Chakareski and
Andreas Kassler Dynamic dual-reinforcement-learning
routing strategies for quality of
experience-aware wireless mesh
networking . . . . . . . . . . . . . . . 269--285
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Ji-Su Kim and
Jin-Ki Kim and
Jae-Hyun Kim Advanced handover scheme considering
downlink and uplink service traffic in
asymmetric channel . . . . . . . . . . . 1--13
Jernej Kos and
Mahdi Aiash and
Jonathan Loo and
Denis Trçek U-Sphere: Strengthening scalable
flat-name routing for decentralized
networks . . . . . . . . . . . . . . . . 14--31
Francesco Rossi and
Giovanni Schmid Identity-based secure group
communications using pairings . . . . . 32--43
Bo Fu and
Yang Xiao A multi-resolution accountable logging
and its applications . . . . . . . . . . 44--58
Rodrigo R. Oliveira and
Daniel S. Marcon and
Leonardo R. Bays and
Miguel C. Neves and
Luciano P. Gaspary and
Deep Medhi and
Marinho P. Barcellos Opportunistic Resilience Embedding
(ORE): Toward cost-efficient resilient
virtual networks . . . . . . . . . . . . 59--77
Roberto Rojas-Cessa and
Taweesak Kijkanjanarat and
Wara Wangchai and
Krutika Patil and
Narathip Thirapittayatakul Helix: IP lookup scheme based on
helicoidal properties of binary trees 78--89
Toke Hòiland-Jòrgensen and
Per Hurtig and
Anna Brunstrom The Good, the Bad and the WiFi: Modern
AQMs in a residential setting . . . . . 90--106
Nicola Accettura and
Giovanni Neglia and
Luigi Alfredo Grieco The Capture--Recapture approach for
population estimation in computer
networks . . . . . . . . . . . . . . . . 107--122
Tobias Hoßfeld and
Phuoc Tran-Gia and
Maja Vukovic Special issue on crowdsourcing . . . . . 1--4
Gianluca Demartini Hybrid human-machine information
systems: Challenges and opportunities 5--13
Ognjen Scekic and
Hong-Linh Truong and
Schahram Dustdar PRINGL --- a domain-specific language
for incentive management in
crowdsourcing . . . . . . . . . . . . . 14--33
Jorge Goncalves and
Simo Hosio and
Jakob Rogstadius and
Evangelos Karapanos and
Vassilis Kostakos Motivating participation and improving
quality of contribution in ubiquitous
crowdsourcing . . . . . . . . . . . . . 34--48
Hayam Mousa and
Sonia Ben Mokhtar and
Omar Hasan and
Osama Younes and
Mohiy Hadhoud and
Lionel Brunie Trust management and reputation systems
in mobile participatory sensing
applications: a survey . . . . . . . . . 49--73
Tomoyo Sasao and
Shin'ichi Konomi and
Masatoshi Arikawa and
Hideyuki Fujita Context Weaver: Awareness and feedback
in networked mobile crowdsourcing tools 74--84
Matthias Hirth and
Tobias Hoßfeld and
Marco Mellia and
Christian Schwartz and
Frank Lehrieder Crowdsourced network measurements:
Benefits and best practices . . . . . . 85--98
Thomas Volk and
Christian Keimel and
Michael Moosmeier and
Klaus Diepold Crowdsourcing vs. laboratory experiments
--- QoE evaluation of binaural playback
in a teleconference scenario . . . . . . 99--109
Maria Christoforaki and
Panagiotis G. Ipeirotis A system for scalable and reliable
technical-skill testing in online labor
markets . . . . . . . . . . . . . . . . 110--120
Mahmood Hosseini and
Jack Moore and
Malik Almaliki and
Alimohammad Shahri and
Keith Phalp and
Raian Ali Wisdom of the Crowd within enterprises:
Practices and challenges . . . . . . . . 121--132
Jasper Oosterman and
Jie Yang and
Alessandro Bozzon and
Lora Aroyo and
Geert-Jan Houben On the impact of knowledge extraction
and aggregation on crowdsourced
annotation of visual artworks . . . . . 133--149
Roger Baig and
Ramon Roca and
Felix Freitag and
Leandro Navarro \tt guifi.net, a crowdsourced network
infrastructure held in common . . . . . 150--165
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Kangho Kim and
Hwantae Kim and
Jongtack Jung and
Hwangnam Kim AFAR: a robust and delay-constrained
communication framework for smart grid
applications . . . . . . . . . . . . . . 1--25
Somia Sahraoui and
Azeddine Bilami Efficient HIP-based approach to ensure
lightweight end-to-end security in the
Internet of Things . . . . . . . . . . . 26--45
Antti Juvonen and
Tuomo Sipola and
Timo Hämäläinen Online anomaly detection using
dimensionality reduction techniques for
HTTP log analysis . . . . . . . . . . . 46--56
Elissar Khloussy and
Xavier Gelabert and
Yuming Jiang Investigation on MDP-based radio access
technology selection in heterogeneous
wireless networks . . . . . . . . . . . 57--67
Angelo Trotta and
Marco Di Felice and
Luca Bedogni and
Luciano Bononi and
Fabio Panzieri Connectivity recovery in post-disaster
scenarios through Cognitive Radio swarms 68--89
Bo Fan and
Supeng Leng and
Kun Yang and
Yan Zhang Optimal storage allocation on throwboxes
in Mobile Social Networks . . . . . . . 90--100
Yanjiao Chen and
Qihong Chen and
Fan Zhang and
Qian Zhang and
Kaishun Wu and
Ruochen Huang and
Liang Zhou Understanding viewer engagement of video
service in Wi-Fi network . . . . . . . . 101--116
Biling Zhang and
Yan Chen and
Chih-Yu Wang and
K. J. Ray Liu A Chinese restaurant game for learning
and decision making in cognitive radio
networks . . . . . . . . . . . . . . . . 117--134
Jiechen Yin and
Yuming Mao and
Supeng Leng and
Yuming Jiang and
Muhammad Asad Khan Access granularity control of
multichannel random access in
next-generation wireless LANs . . . . . 135--150
Shuhao Liu and
Zhiping Cai and
Hong Xu and
Ming Xu Towards security-aware virtual network
embedding . . . . . . . . . . . . . . . 151--163
Qianru Wu and
Qixu Liu and
Yuqing Zhang and
Guanxing Wen TrackerDetector: a system to detect
third-party trackers through machine
learning . . . . . . . . . . . . . . . . 164--173
Florin Coras and
Jordi Domingo-Pascual and
Albert Cabellos-Aparicio On the scalability of LISP mappings
caches . . . . . . . . . . . . . . . . . 174--183
Yasir Saleem and
Kok-Lim Alvin Yau and
Hafizal Mohamad and
Nordin Ramli and
Mubashir Husain Rehmani SMART: a SpectruM-Aware ClusteR-based
rouTing scheme for distributed cognitive
radio networks . . . . . . . . . . . . . 196--224
Sandip Chakraborty and
Sukumar Nandi Data rate, path length and network
contention trade-off in IEEE 802.11s
mesh networks: a dynamic data rate
selection approach . . . . . . . . . . . 225--243
Xiaoying Zheng and
Ye Xia Optimizing network objectives in
collaborative content distribution . . . 244--261
Kai Liu and
Xiaoying Chang and
Feng Liu and
Xin Wang and
Athanasios V. Vasilakos A cooperative MAC protocol with rapid
relay selection for wireless ad hoc
networks . . . . . . . . . . . . . . . . 262--282
Dinil Mon Divakaran and
Le Su and
Yung Siang Liau and
Vrizlynn L. L. Thing SLIC: Self-Learning Intelligent
Classifier for network traffic . . . . . 283--297
Qun Huang and
Patrick P. C. Lee A hybrid local and distributed sketching
design for accurate and scalable heavy
key detection in network data streams 298--315
N. Chrysos and
F. Neeser and
M. Gusat and
C. Minkenberg and
W. Denzel and
C. Basso and
M. Rudquist and
K. Valk and
B. Vanderpool Large switches or blocking multi-stage
networks? An evaluation of routing
strategies for datacenter fabrics . . . 316--328
Jenq-Shiou Leu and
Min-Chieh Yu and
Hung-Jie Tzeng Improving indoor positioning precision
by using received signal strength
fingerprint and footprint based on
weighted ambient Wi-Fi signals . . . . . 329--340
Wassef Louati and
Walid Ben-Ameur and
Djamal Zeghlache A bottleneck-free tree-based name
resolution system for
Information-Centric Networking . . . . . 341--355
Xia Yin and
Dan Wu and
Zhiliang Wang and
Xingang Shi and
Jianping Wu DIMR: Disjoint Interdomain Multipath
Routing . . . . . . . . . . . . . . . . 356--375
Donghai Zhu and
Xinyu Yang and
Wei Yu SPAIS: a novel Self-checking Pollution
Attackers Identification Scheme in
network coding-based wireless mesh
networks . . . . . . . . . . . . . . . . 376--389
Gongbing Hong and
James Martin and
James M. Westall On fairness and application performance
of active queue management in broadband
cable networks . . . . . . . . . . . . . 390--406
Chien-Fu Cheng and
Chih-Wei Huang and
Lung-Hao Li Mobile sensor relocation problem:
Finding the optimal (nearest) redundant
sensor with low message overhead . . . . 407--424
Vitaly Milyeykovski and
Michael Segal and
Vladimir Katz Using central nodes for efficient data
collection in wireless sensor networks 425--437
Maurizio Giacobbe and
Antonio Celesti and
Maria Fazio and
Massimo Villari and
Antonio Puliafito Towards energy management in Cloud
federation: a survey in the perspective
of future sustainable and cost-saving
strategies . . . . . . . . . . . . . . . 438--452
Shahin Vakilinia and
Mustafa Mehmet Ali and
Dongyu Qiu Modeling of the resource allocation in
cloud computing centers . . . . . . . . 453--470
Quoc-Viet Pham and
Hoang-Linh To and
Won-Joo Hwang A multi-timescale cross-layer approach
for wireless ad hoc networks . . . . . . 471--482
Chen Tian and
Jingdong Sun and
Weimin Wu and
Yan Luo Optimal bandwidth allocation for hybrid
Video-on-Demand streaming with a
distributed max flow algorithm . . . . . 483--494
Feng Xia and
Qiuyuan Yang and
Jie Li and
Jiannong Cao and
Li Liu and
Ahmedin Mohammed Ahmed Data dissemination using interest-tree
in socially aware networking . . . . . . 495--507
Amir Rahimzadeh Ilkhechi and
Ibrahim Korpeoglu and
Özgür Ulusoy Network-aware virtual machine placement
in cloud data centers with multiple
traffic-intensive components . . . . . . 508--527
Bin Wang and
Zhengwei Qi and
Ruhui Ma and
Haibing Guan and
Athanasios V. Vasilakos A survey on data center networking for
cloud computing . . . . . . . . . . . . 528--547
Bong-Hwan Oh and
Jaiyong Lee Constraint-based proactive scheduling
for MPTCP in wireless networks . . . . . 548--563
Sotirios K. Goudos and
David Plets and
Ning Liu and
Luc Martens and
Wout Joseph A multi-objective approach to indoor
wireless heterogeneous networks planning
based on biogeography-based optimization 564--576
Xu Zhang and
Ning Wang and
Vassilios G. Vassilakis and
Michael P. Howarth A distributed in-network caching scheme
for P2P-like content chunk delivery . . 577--592
Guo Chen and
Youjian Zhao and
Dan Pei Alleviating flow interference in data
center networks through fine-grained
switch queue management . . . . . . . . 593--613
Jun Kawahara and
Koji M. Kobayashi and
Tomotaka Maeda Tight analysis of priority queuing for
egress traffic . . . . . . . . . . . . . 614--624
Sok-Ian Sou and
Hung-Yang Hsieh Modeling application-based charging
management with traffic detection
function in 3GPP . . . . . . . . . . . . 625--637
Michele Mangili and
Fabio Martignon and
Antonio Capone Optimal design of Information Centric
Networks . . . . . . . . . . . . . . . . 638--653
Satish Kumar and
Arnab Sarkar and
Santhosh Sriram and
Arijit Sur A three level LTE downlink scheduling
framework for RT VBR traffic . . . . . . 654--674
T. Panayiotou and
G. Ellinas and
N. Antoniades and
A. Hadjiantonis Impairment-aware multicast session
provisioning in metro optical networks 675--688
Mahmood Ahmadi and
Sara Mehdizadeh Khalifani A new look at hybrid Aloha: an
analytical approach . . . . . . . . . . 689--699
Waya Fadini and
Bijoy Chand Chatterjee and
Eiji Oki A subcarrier-slot partition scheme with
first-last fit spectrum allocation for
elastic optical networks . . . . . . . . 700--711
L. F. Xie and
Peter H. J. Chong and
Ivan W. H. Ho and
Y. L. Guan A survey of inter-flow network coding in
wireless mesh networks with unicast
traffic . . . . . . . . . . . . . . . . 738--751
Antonello Rizzi and
Alfonso Iacovazzi and
Andrea Baiocchi and
Silvia Colabrese A low complexity real-time Internet
traffic flows neuro-fuzzy classifier . . 752--771
Jee Hun Song and
Hee-Tae Roh and
Jang-Won Lee Opportunistic scheduling and incentive
mechanism for OFDMA networks with D2D
relaying . . . . . . . . . . . . . . . . 772--787
J. Camilo Cardona and
Pierre François and
Bruno Decraene and
John Scudder and
Adam Simpson and
Keyur Patel Bringing high availability to BGP: a
survey . . . . . . . . . . . . . . . . . 788--803
Jun Kawahara and
Koji M. Kobayashi Optimal buffer management for $2$-frame
throughput maximization . . . . . . . . 804--820
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Ioannis D. Moscholios and
Michael D. Logothetis and
John S. Vardakas and
Anthony C. Boucouvalas Congestion probabilities of elastic and
adaptive calls in Erlang--Engset
multirate loss models under the
threshold and bandwidth reservation
policies . . . . . . . . . . . . . . . . 1--23
Changwon Nam and
Saewoong Bahk $ \Delta $ SNR--MAC: a priority-based
multi-round contention scheme for
MU--MIMO WLANs . . . . . . . . . . . . . 24--40
Péter Megyesi and
Géza Szabó and
Sándor Molnár User behavior based traffic emulator: a
framework for generating test data for
DPI tools . . . . . . . . . . . . . . . 41--54
Xiao-Hui Lin and
Yu Tan and
Yu-Kwong Kwok and
Hui Wang and
Mingjun Dai and
Bin Chen and
Gong Chao Su Balancing time and energy efficiencies
with identification reliability
constraint for portable reader in mobile
RFID systems . . . . . . . . . . . . . . 55--71
Shouxi Luo and
Hongfang Yu and
Lemin Li Practical flow table aggregation in SDN 72--88
Silvia Fichera and
Laura Galluccio and
Salvatore C. Grancagnolo and
Giacomo Morabito and
Sergio Palazzo OPERETTA: an OPEnflow-based REmedy to
mitigate TCP SYNFLOOD Attacks against
web servers . . . . . . . . . . . . . . 89--100
Zhiyang Su and
Ting Wang and
Yu Xia and
Mounir Hamdi CeMon: a cost-effective flow monitoring
system in software defined networks . . 101--115
Hyunbum Kim and
Jorge A. Cobb Optimization algorithms for transmission
range and actor movement in wireless
sensor and actor networks . . . . . . . 116--133
Yung-Tsung Weng and
Chi-Huang Shih and
Chun-I Kuo and
Ce-Kuen Shieh Real-time video streaming using
prediction-based forward error
correction . . . . . . . . . . . . . . . 134--147
Farah Moety and
Samer Lahoud and
Bernard Cousin and
Kinda Khawam Optimization models for the joint
power-delay minimization problem in
green wireless access networks . . . . . 148--167
Karim Habak and
Khaled A. Harras and
Moustafa Youssef Bandwidth aggregation techniques in
heterogeneous multi-homed devices: a
survey . . . . . . . . . . . . . . . . . 168--188
Anderson Santos da Silva and
Paul Smith and
Andreas Mauthe and
Alberto Schaeffer-Filho Resilience support in software-defined
networking: a survey . . . . . . . . . . 189--207
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Alberto Leon-Garcia and
Peter Ashwood-Smith and
Yashar Ganjali Software Defined Networks . . . . . . . 209--210
Luis M. Contreras and
Paul Doolan and
Håkon Lònsethagen and
Diego R. López Operational, organizational and business
challenges for network operators in the
context of SDN and NFV . . . . . . . . . 211--217
Syed Naveed Rizvi and
Daniel Raumer and
Florian Wohlfart and
Georg Carle Towards carrier grade SDNs . . . . . . . 218--226
Vasileios Kotronis and
Adrian Gämperli and
Xenofontas Dimitropoulos Routing centralization across domains
via SDN: a model and emulation framework
for BGP evolution . . . . . . . . . . . 227--239
Ryo Nakamura and
Kouji Okada and
Yuji Sekiya and
Hiroshi Esaki A common data plane for multiple overlay
networks . . . . . . . . . . . . . . . . 240--250
Huu Thanh Nguyen and
Anh Vu Vu and
Duc Lam Nguyen and
Van Huynh Nguyen and
Manh Nam Tran and
Quynh Thu Ngo and
Thu-Huong Truong and
Tai Hung Nguyen and
Thomas Magedanz A generalized resource allocation
framework in support of multi-layer
virtual network embedding based on SDN 251--269
Peter Peresíni and
Maciej Ku\'zniar and
Marco Canini and
Daniele Venzano and
Dejan Kosti\'c and
Jennifer Rexford Systematically testing OpenFlow
controller applications . . . . . . . . 270--286
Qing Li and
Kun Zhao and
Yong Jiang and
Mingwei Xu and
Shu-Tao Xia SARD: a Smart Approach of Rule Division
for fast flow-level consistent update in
SDN . . . . . . . . . . . . . . . . . . 287--299
Zehua Guo and
Yang Xu and
Marco Cello and
Junjie Zhang and
Zicheng Wang and
Mingjian Liu and
H. Jonathan Chao JumpFlow: Reducing flow table usage in
software-defined networks . . . . . . . 300--315
Won-Suk Kim and
Sang-Hwa Chung and
Jae-Won Moon Improved content management for
information-centric networking in
SDN-based wireless mesh network . . . . 316--329
Saumya Hegde and
Shashidhar G. Koolagudi and
Swapan Bhattacharya Scalable and fair forwarding of elephant
and mice traffic in software defined
networks . . . . . . . . . . . . . . . . 330--340
Harold Owens II and
Arjan Durresi Video over Software-Defined Networking
(VSDN) . . . . . . . . . . . . . . . . . 341--356
Tuba Uzakgider and
Cihat Cetinkaya and
Muge Sayit Learning-based approach for layered
adaptive video streaming over SDN . . . 357--368
Ángel Leonardo Valdivieso Caraguay and
Jesús Antonio Puente Fernández and
Luis Javier García Villalba Framework for optimized multimedia
routing over software defined networks 369--379
Ivano Cerrato and
Alex Palesandro and
Fulvio Risso and
Marc Suñé and
Vinicio Vercellone and
Hagen Woesner Toward dynamic virtualized network
services in telecom operator networks 380--395
Guozhen Cheng and
Hongchang Chen and
Hongchao Hu and
Zhiming Wang and
Julong Lan Enabling network function combination
via service chain instantiation . . . . 396--407
Peng Wang and
Julong Lan and
Xiaohui Zhang and
Yuxiang Hu and
Shuqiao Chen Dynamic function composition for network
service chain: Model and optimization 408--418
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Enzo Baccarelli and
Danilo Amendola and
Nicola Cordeschi Minimum-energy bandwidth management for
QoS live migration of virtual machines 1--22
Francisco A. Gonzalez-Horta and
Pedro Mejia-Alvarez and
Eldamira Buenfil-Alpuche Multipurpose mobility services for the
Future Internet . . . . . . . . . . . . 23--40
Shaahin Madani and
Ibrahim Khalil Multi-Binomial mixes: a proposal for
secure and efficient anonymous
communication . . . . . . . . . . . . . 41--53
Maurizio Casoni and
Carlo Augusto Grazia and
Martin Klapez and
Natale Patriciello QRM: a queue rate management for
fairness and TCP flooding protection in
mission-critical networks . . . . . . . 54--65
Ian F. Akyildiz and
Shih-Chun Lin and
Pu Wang Wireless software-defined networks
(W-SDNs) and network function
virtualization (NFV) for 5G cellular
systems: an overview and qualitative
evaluation . . . . . . . . . . . . . . . 66--79
Shoushou Ren and
Tao Lin and
Wei An and
Guoqiang Zhang and
Dalei Wu and
Laxmi Narayan Bhuyan and
Zhen Xu Design and analysis of collaborative EPC
and RAN caching for LTE mobile networks 80--95
Marco Savi and
Roberto Fratini and
Giacomo Verticale and
Massimo Tornatore Performance evaluation of video server
replication in metro/access networks . . 96--110
Hei-Chia Wang and
Wei-Pin Chiu and
Suei-Chih Wu QoS-driven selection of web service
considering group preference . . . . . . 111--124
A. Aguilar-Garcia and
S. Fortes and
Mariano Molina-García and
Jaime Calle-Sánchez and
José I. Alonso and
Aaron Garrido and
Alfonso Fernández-Durán and
R. Barco Location-aware self-organizing methods
in femtocell networks . . . . . . . . . 125--140
Hicham Lakhlef and
Julien Bourgeois Fast and robust self-organization for
micro-electro-mechanical robotic systems 141--152
Samah Mansour and
Intissar Harrabi and
Martin Maier and
Géza Joós Co-simulation study of performance
trade-offs between centralised,
distributed, and hybrid adaptive PEV
charging algorithms . . . . . . . . . . 153--165
Jaehoon Paul Jeong and
Jinyong Kim and
Taehwan Hwang and
Fulong Xu and
Shuo Guo and
Yu Jason Gu and
Qing Cao and
Ming Liu and
Tian He TPD: Travel Prediction-based Data
Forwarding for light-traffic vehicular
networks . . . . . . . . . . . . . . . . 166--182
Konglin Zhu and
Wenzhong Li and
Xiaoming Fu and
Lin Zhang Data routing strategies in opportunistic
mobile social networks: Taxonomy and
open challenges . . . . . . . . . . . . 183--198
Tian Wang and
Yiqiao Cai and
Weijia Jia and
Sheng Wen and
Guojun Wang and
Hui Tian and
Yonghong Chen and
Bineng Zhong Maximizing real-time streaming services
based on a multi-servers networking
framework . . . . . . . . . . . . . . . 199--212
Wei Wang and
Linlin Yang and
Qian Zhang Privacy preservation in location-based
advertising: a contract-based approach 213--224
Xingwei Wang and
Dapeng Qu and
Min Huang and
Keqin Li and
Sajal K. Das and
Jinhong Zhang and
Ruiyun Yu Multiple many-to-many multicast routing
scheme in green multi-granularity
transport networks . . . . . . . . . . . 225--242
Bart Braem and
Felix Freitag and
Roger Baig Viñas Community networks . . . . . . . . . . . 243--244
Javier Simo-Reigadas and
Esteban Municio and
Eduardo Morgado and
Eva M. Castro and
Andres Martinez and
Luis F. Solorzano and
Ignacio Prieto-Egido Sharing low-cost wireless
infrastructures with telecommunications
operators to bring $3$G services to
rural communities . . . . . . . . . . . 245--259
Davide Vega and
Roger Baig and
Llorenç Cerd\`a-Alabern and
Esunly Medina and
Roc Meseguer and
Leandro Navarro A technological overview of the
guifi.net community network . . . . . . 260--278
Jernej Kos and
Mitar Milutinovi\'c and
Luka Cehovin \tt nodewatcher: a substrate for growing
your own community network . . . . . . . 279--296
Roger Pueyo Centelles and
Victor Oncins and
Axel Neumann Enhancing reflection and
self-determination in a real-life
community mesh network . . . . . . . . . 297--307
Axel Neumann and
Ester López and
Leandro Navarro Evaluation of mesh routing protocols for
wireless community networks . . . . . . 308--323
Christoph Barz and
Christoph Fuchs and
Jonathan Kirchhoff and
Julia Niewiejska and
Henning Rogge OLSRv2 for Community Networks: Using
Directional Airtime Metric with external
radios . . . . . . . . . . . . . . . . . 324--341
Pere Millan and
Carlos Molina and
Esunly Medina and
Davide Vega and
Roc Meseguer and
Bart Braem and
Chris Blondia Time series analysis to predict link
quality of wireless community networks 342--358
Ahmed Abujoda and
David Dietrich and
Panagiotis Papadimitriou and
Arjuna Sathiaseelan Software-defined wireless mesh networks
for Internet access sharing . . . . . . 359--372
Mennan Selimi and
Amin M. Khan and
Emmanouil Dimogerontakis and
Felix Freitag and
Roger Pueyo Centelles Cloud services in the Guifi.net
community network . . . . . . . . . . . 373--388
Luca Baldesi and
Leonardo Maccari and
Renato Lo Cigno Improving P2P streaming in Wireless
Community Networks . . . . . . . . . . . 389--403
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Raouf Boutaba and
Nelson Fonseca and
Dzmitry Kliazovich and
Noura Limam Cloud networking and communications II 405--407
Valerio Persico and
Pietro Marchetta and
Alessio Botta and
Antonio Pescap\`e Measuring network throughput in the
cloud: the case of Amazon EC2 . . . . . 408--422
Rodrigo S. Couto and
Stefano Secci and
Miguel Elias M. Campista and
Luís Henrique M. K. Costa Server placement with shared backups for
disaster-resilient clouds . . . . . . . 423--434
Eleni Kavvadia and
Spyros Sagiadinos and
Konstantinos Oikonomou and
Giorgos Tsioutsiouliklis and
Sonia A\"\issa Elastic virtual machine placement in
cloud computing network environments . . 435--447
Zhongbao Zhang and
Sen Su and
Junchi Zhang and
Kai Shuang and
Peng Xu Energy aware virtual network embedding
with dynamic demands: Online and offline 448--459
Ebrahim Ghazisaeedi and
Changcheng Huang Energy-aware node and link
reconfiguration for virtualized network
environments . . . . . . . . . . . . . . 460--479
Yosr Jarraya and
Arash Eghtesadi and
Sahba Sadri and
Mourad Debbabi and
Makan Pourzandi Verification of firewall reconfiguration
for virtual machines migrations in the
cloud . . . . . . . . . . . . . . . . . 480--491
Sahel Sahhaf and
Wouter Tavernier and
Matthias Rost and
Stefan Schmid and
Didier Colle and
Mario Pickavet and
Piet Demeester Network service chaining with optimized
network function embedding supporting
service decompositions . . . . . . . . . 492--505
Paolo Bellavista and
Franco Callegati and
Walter Cerroni and
Chiara Contoli and
Antonio Corradi and
Luca Foschini and
Alessandro Pernafini and
Giuliano Santandrea Virtual network function embedding in
real cloud environments . . . . . . . . 506--517
Wenjie Lin and
Puneet Sharma and
Sarbajit Chatterjee and
Deepti Sharma and
David Lee and
Subu Iyer and
Ajay Gupta Scaling persistent connections for cloud
services . . . . . . . . . . . . . . . . 518--530
Marcelo Antonio Marotta and
Leonardo Roveda Faganello and
Matias Artur Klafke Schimuneck and
Lisandro Zambenedetti Granville and
Juergen Rochol and
Cristiano Bonato Both Managing mobile cloud computing
considering objective and subjective
perspectives . . . . . . . . . . . . . . 531--542
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Anonymous Thank you reviewers . . . . . . . . . . I--IX
Ian F. Akyildiz and
Harry Rudin Comnet Editorial for 2015 . . . . . . . iii--iv
Pedro H. P. Castro and
Vívian L. Barreto and
Sand Luz Corrêa and
Lisandro Zambenedetti Granville and
Kleber Vieira Cardoso A joint CPU--RAM energy efficient and
SLA-compliant approach for cloud data
centers . . . . . . . . . . . . . . . . 1--13
Sebastian Neumayer and
Eytan Modiano Network reliability under geographically
correlated line and disk failure models 14--28
Margot Deruyck and
Emmeric Tanghe and
David Plets and
Luc Martens and
Wout Joseph Optimizing LTE wireless access networks
towards power consumption and
electromagnetic exposure of human beings 29--40
M. Isabel Sanchez and
Antonio de la Oliva and
Carlos J. Bernardos Experimental analysis of connectivity
management in mobile operating systems 41--61
Huichen Dai and
Bin Liu CONSERT: Constructing optimal name-based
routing tables . . . . . . . . . . . . . 62--79
Michele Mangili and
Fabio Martignon and
Antonio Capone Performance analysis of Content-Centric
and Content-Delivery networks with
evolving object popularity . . . . . . . 80--98
Rosario G. Garroppo and
Gianfranco Nencioni and
Gregorio Procissi and
Luca Tavanti The impact of the access point power
model on the energy-efficient management
of infrastructured wireless LANs . . . . 99--111
Alaitz Mendiola and
Victor Fuentes and
Jon Matias and
Jasone Astorga and
Nerea Toledo and
Eduardo Jacob and
Maider Huarte An architecture for dynamic QoS
management at Layer 2 for DOCSIS access
networks using OpenFlow . . . . . . . . 112--128
Tien-Thinh Nguyen and
Christian Bonnet DMMS: a flexible architecture for
multicast listener support in a
distributed mobility management
environment . . . . . . . . . . . . . . 129--144
Fikadu B. Degefa and
Donghoon Lee and
Jiye Kim and
Younsung Choi and
Dongho Won Performance and security enhanced
authentication and key agreement
protocol for SAE/LTE network . . . . . . 145--163
Sudeepta Mishra and
C. Siva Ram Murthy An efficient location aware distributed
physical resource block assignment for
dense closed access femtocell networks 164--175
Song Han and
Xinbin Li and
Zhixin Liu and
Xinping Guan Distributed hierarchical game-based
algorithm for downlink power allocation
in OFDMA femtocell networks . . . . . . 176--188
Panayiotis Kolios and
Katerina Papadaki and
Vasilis Friderikos Energy efficient mobile video streaming
using mobility . . . . . . . . . . . . . 189--204
Riccardo Pecori S-Kademlia: a trust and reputation
method to mitigate a Sybil attack in
Kademlia . . . . . . . . . . . . . . . . 205--218
Guoqiang Zhang and
Ziqu Xu Combing CCN with network coding: an
architectural perspective . . . . . . . 219--230
Jianbing Ding and
Zhenjie Zhang and
Richard T. B. Ma and
Yin Yang Auction-based cloud service
differentiation with service level
objectives . . . . . . . . . . . . . . . 231--249
Qiaoni Han and
Bo Yang and
Cailian Chen and
Xinping Guan Energy-aware and QoS-aware load
balancing for HetNets powered by
renewable energy . . . . . . . . . . . . 250--262
Federico Patota and
Luca Chiaraviglio and
Francesco Bella and
Vincenzo Deriu and
Silvia Fortunato and
Francesca Cuomo DAFNES: a distributed algorithm for
network energy saving based on
stress-centrality . . . . . . . . . . . 263--284
Oscar Mauricio Caicedo Rendon and
Felipe Estrada-Solano and
Vinicius Guimarães and
Liane Margarida Rockenbach Tarouco and
Lisandro Zambenedetti Granville Rich dynamic mashments: an approach for
network management based on mashups and
situation management . . . . . . . . . . 285--306
Melih Onus and
Andréa W. Richa Parameterized maximum and average degree
approximation in topic-based
publish-subscribe overlay network design 307--317
Yang Wang and
Qian Hu and
Xiaojun Cao A branch-and-price framework for optimal
virtual network embedding . . . . . . . 318--326
Elias Bou-Harb and
Mourad Debbabi and
Chadi Assi A novel cyber security capability:
Inferring Internet-scale infections by
correlating malware and probing
activities . . . . . . . . . . . . . . . 327--343
You-Chiun Wang and
Song-Yun Hsieh Service-differentiated downlink flow
scheduling to support QoS in long term
evolution . . . . . . . . . . . . . . . 344--359
Jie Zhang and
Dafang Zhang and
Kun Huang and
Zheng Qin Minimizing datacenter flow completion
times with server-based flow scheduling 360--374
Tzu-Chin Liu and
Kuochen Wang and
Chia-Yu Ku and
Yi-Huai Hsu QoS-aware resource management for
multimedia traffic report systems over
LTE-A . . . . . . . . . . . . . . . . . 375--389
Stefano Ferretti and
Vittorio Ghini and
Fabio Panzieri A survey on handover management in
mobility architectures . . . . . . . . . 390--413
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Jia Peng and
Yanmin Zhu and
Wei Shu and
Min-You Wu When data contributors meet multiple
crowdsourcers: Bilateral competition in
mobile crowdsourcing . . . . . . . . . . 1--14
Amira Meharouech and
Jocelyne Elias and
Ahmed Mehaoua A two-stage game theoretical approach
for interference mitigation in
Body-to-Body Networks . . . . . . . . . 15--34
Matthias Hartmann and
David Hock and
Michael Menth Routing optimization for IP networks
with loop-free alternates . . . . . . . 35--50
Robson D. A. Timoteo and
Lizandro N. Silva and
Daniel C. Cunha and
George D. C. Cavalcanti An approach using support vector
regression for mobile location in
cellular networks . . . . . . . . . . . 51--61
Roberto M. Oliveira and
Michelle S. P. Facina and
Moises V. Ribeiro and
Alex B. Vieira Performance evaluation of in-home
broadband PLC systems using a
cooperative MAC protocol . . . . . . . . 62--76
Stefano Tennina and
Olfa Gaddour and
Anis Koubâa and
Fernando Royo and
Mário Alves and
Mohamed Abid Z-Monitor: a protocol analyzer for IEEE
802.15.4-based low-power wireless
networks . . . . . . . . . . . . . . . . 77--96
Weverton Luis da Costa Cordeiro and
Flávio Roberto Santos and
Marinho Pilla Barcelos and
Luciano Paschoal Gaspary and
Hanna Kavalionak and
Alessio Guerrieri and
Alberto Montresor Making puzzles green and useful for
adaptive identity management in
large-scale distributed systems . . . . 97--114
Pouya Ostovari and
Jie Wu Robust wireless transmission of scalable
coded videos using two-dimensional
network coding . . . . . . . . . . . . . 115--126
I. Michel Lombera and
L. E. Moser and
P. M. Melliar-Smith and
Y. T. Chuang Corrigendum to ``Peer-to-Peer
Publication, Search and Retrieval Using
the Android Mobile Platform'' [Computer
Networks \bf 65(2014) 56--72] . . . . . 127
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Eirini Eleni Tsiropoulou and
Aggelos Kapoukakis and
Symeon Papavassiliou Uplink resource allocation in SC-FDMA
wireless networks: a survey and taxonomy 1--28
Mohammad Al Mojamed and
Mario Kolberg Structured Peer-to-Peer overlay
deployment on MANET: a survey . . . . . 29--47
Junichi Nagano and
Norihiko Shinomiya Efficient switch clustering for
distributed controllers of OpenFlow
network with bi-connectivity . . . . . . 48--57
Kyu-Hwan Lee and
Jae-Hyun Kim and
Sunghyun Cho Power saving mechanism with network
coding in the bottleneck zone of
multimedia sensor networks . . . . . . . 58--68
Shih-Chun Lin and
Pu Wang and
Min Luo Jointly optimized QoS-aware
virtualization and routing in software
defined networks . . . . . . . . . . . . 69--78
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Frederic Raspall Building Nemo, a system to monitor IP
routing and traffic paths in real time 1--30
Zubair A. Baig and
Sadiq M. Sait and
Farid Binbeshr Controlled access to cloud resources for
mitigating Economic Denial of
Sustainability (EDoS) attacks . . . . . 31--47
Jonghoon Kwon and
Jehyun Lee and
Heejo Lee and
Adrian Perrig PsyBoG: a scalable botnet detection
method for large-scale DNS traffic . . . 48--73
G. Brandner and
U. Schilcher and
C. Bettstetter Firefly synchronization with phase rate
equalization and its experimental
analysis in wireless systems . . . . . . 74--87
Yang Sui and
Xiumin Wang and
Jin Wang and
Lusheng Wang and
Saihang Hou Deadline-aware cooperative data exchange
with network coding . . . . . . . . . . 88--97
Adelina Madhja and
Sotiris Nikoletseas and
Theofanis P. Raptis Hierarchical, collaborative wireless
energy transfer in sensor networks with
multiple Mobile Chargers . . . . . . . . 98--112
Louai Al-Awami and
Hossam S. Hassanein Distributed Data Storage Systems for
Data Survivability in Wireless Sensor
Networks using Decentralized Erasure
Cod's . . . . . . . . . . . . . . . . . 113--127
Onkar Bhardwaj and
Elliot Anshelevich and
Koushik Kar Coalitionally stable pricing schemes for
inter-domain forwarding . . . . . . . . 128--146
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Yi Gai and
Hua Liu and
Bhaskar Krishnamachari A packet dropping mechanism for
efficient operation of M/M/1 queues with
selfish users . . . . . . . . . . . . . 1--13
Eun Kyung Lee and
Hariharasudhan Viswanathan and
Dario Pompili RescueNet: Reinforcement-learning-based
communication framework for emergency
networking . . . . . . . . . . . . . . . 14--28
Changyan Yi and
Zhen Zhao and
Jun Cai and
Ricardo Lobato de Faria and
Gong (Michael) Zhang Priority-aware pricing-based capacity
sharing scheme for beyond-wireless body
area networks . . . . . . . . . . . . . 29--43
Luyao Wang and
Kwan-Wu Chin and
Sieteng Soh Joint routing and scheduling in
multi-Tx/Rx wireless mesh networks with
random demands . . . . . . . . . . . . . 44--56
M. Sarper Gokturk and
Ozgur Gurbuz and
Murat Erman A practical cross layer cooperative MAC
framework for WSNs . . . . . . . . . . . 57--71
Mustafa Ilhan Akbas and
Gürkan Solmaz and
Damla Turgut Molecular geometry inspired positioning
for aerial networks . . . . . . . . . . 72--88
Jeroen Avonts and
Chris Blondia A framework to compare topology
algorithms in multi-channel multi-radio
wireless mesh networks . . . . . . . . . 89--108
Muhammad Faisal Amjad and
Mainak Chatterjee and
Cliff C. Zou Coexistence in heterogeneous spectrum
through distributed correlated
equilibrium in cognitive radio networks 109--122
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Alexandre Jaron and
Andrej Mihailovic and
A. H. Aghvami QoS-aware multi-plane routing method for
OSPF-based IP access networks . . . . . 1--14
Xu Ding and
Xinjiang Sun and
Cheng Huang and
Xiaobei Wu Cluster-level based link redundancy with
network coding in duty cycled relay
wireless sensor networks . . . . . . . . 15--36
Gil Einziger and
Roy Friedman and
Yoav Kantor Shades: Expediting Kademlia's lookup
process . . . . . . . . . . . . . . . . 37--50
Xun Xiao and
Rui Zhang and
Jianping Wang and
Chunming Qiao and
Kejie Lu An optimal pricing scheme to improve
transmission opportunities for a mobile
virtual network operator . . . . . . . . 51--65
Chengzhe Lai and
Rongxing Lu and
Dong Zheng and
Hui Li and
Xuemin (Sherman) Shen GLARM: Group-based lightweight
authentication scheme for
resource-constrained machine to machine
communications . . . . . . . . . . . . . 66--81
Xiangmao Chang and
Jin Wang and
Jianping Wang and
Kejie Lu and
Yi Zhuang On the optimal design of secure network
coding against wiretapping attack . . . 82--98
Haithem Al-Mefleh and
Osameh Al-Kofahi Taking advantage of jamming in wireless
networks: a survey . . . . . . . . . . . 99--124
Fabio R. J. Vieira and
José F. de Rezende and
Valmir C. Barbosa Scheduling wireless links by vertex
multicoloring in the physical
interference model . . . . . . . . . . . 125--133
M. Iqbal and
M. Naeem and
A. Anpalagan and
N. N. Qadri and
M. Imran Multi-objective optimization in sensor
networks: Optimization classification,
applications and solution approaches . . 134--161
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Meiqin Tang and
Yalin Xin Energy efficient power allocation in
cognitive radio network using
coevolution chaotic particle swarm
optimization . . . . . . . . . . . . . . 1--11
Ahmad Jakalan and
Jian Gong and
Qi Su and
Xiaoyan Hu and
Abdeldime M. S. Abdelgder Social relationship discovery of IP
addresses in the managed IP networks by
observing traffic at network boundary 12--27
Andreas Berger and
Alessandro D'Alconzo and
Wilfried N. Gansterer and
Antonio Pescapé Mining agile DNS traffic using graph
analysis for cybercrime detection . . . 28--44
Hongbin Chen and
Qiong Zhang and
Feng Zhao Energy-efficient joint BS and RS sleep
scheduling in relay-assisted cellular
networks . . . . . . . . . . . . . . . . 45--54
Sungwook Kim Asymptotic Shapley value based resource
allocation scheme for IoT services . . . 55--63
Dionysis Xenakis and
Nikos Passas and
Lazaros Merakos and
Christos Verikoukis Handover decision for small cells:
Algorithms, lessons learned and
simulation study . . . . . . . . . . . . 64--74
Syed Arefinul Haque and
Salekul Islam and
Md. Jahidul Islam and
Jean-Charles Grégoire An architecture for client
virtualization: a case study . . . . . . 75--89
Miguel Eguizábal and
Ángela Hernández Joint dynamic resource allocation and
load balancing-cell selection in LTE-A
HetNet scenarios based on Type 1 inband
relay deployments . . . . . . . . . . . 90--109
Ilaria Malanchini and
Stefan Valentin and
Osman Aydin Wireless resource sharing for multiple
operators: Generalization, fairness, and
the value of prediction . . . . . . . . 110--123
Gurhan Gunduz and
Murat Yuksel Popularity-based scalable peer-to-peer
topology growth . . . . . . . . . . . . 124--140
Oran Sharon and
Yaron Alpert Coupled IEEE 802.11ac and TCP
performance evaluation in various
aggregation schemes and Access
Categories . . . . . . . . . . . . . . . 141--156
Bruna L. R. Melo and
Daniel C. Cunha and
Cecilio Pimentel Optimal power distribution in non-binary
LDPC code-based cooperative wireless
networks . . . . . . . . . . . . . . . . 157--165
Gin-Xian Kok and
Chee-Onn Chow and
Yi-Han Xu and
Hiroshi Ishii Sensor-free route stability metric for
mobile ad hoc networks . . . . . . . . . 166--178
Rafael L. Gomes and
Luiz F. Bittencourt and
Edmundo R. M. Madeira and
Eduardo Cerqueira and
Mario Gerla Bandwidth-aware allocation of resilient
Virtual Software Defined Networks . . . 179--194
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Daqiang Zhang and
Jiafu Wan and
Ching-Hsien (Robert) Hsu and
Ammar Rayes Industrial technologies and applications
for the Internet of Things . . . . . . . 1--4
Min Xia and
Teng Li and
Yunfei Zhang and
Clarence W. de Silva Closed-loop design evolution of
engineering system using condition
monitoring through Internet of Things
and cloud computing . . . . . . . . . . 5--18
Guangjie Han and
Aihua Qian and
Jinfang Jiang and
Ning Sun and
Li Liu A grid-based joint routing and charging
algorithm for industrial wireless
rechargeable sensor networks . . . . . . 19--28
Bo Zhang and
Chi Harold Liu and
Jianyu Lu and
Zheng Song and
Ziyu Ren and
Jian Ma and
Wendong Wang Privacy-preserving QoI-aware participant
coordination for mobile crowdsourcing 29--41
Ruhul Amin and
Sk Hafizul Islam and
G. P. Biswas and
Muhammad Khurram Khan and
Lu Leng and
Neeraj Kumar Design of an anonymity-preserving
three-factor authenticated key exchange
protocol for wireless sensor networks 42--62
M. Mazhar Rathore and
Awais Ahmad and
Anand Paul and
Seungmin Rho Urban planning and building smart cities
based on the Internet of Things using
Big Data analytics . . . . . . . . . . . 63--80
Xiong Luo and
Ji Liu and
Dandan Zhang and
Xiaohui Chang A large-scale web QoS prediction scheme
for the Industrial Internet of Things
based on a kernel machine learning
algorithm . . . . . . . . . . . . . . . 81--89
Wei Huang and
Liangmin Wang ECDS: Efficient collaborative
downloading scheme for popular content
distribution in urban vehicular networks 90--103
Qiang Liu and
Yujun Ma and
Musaed Alhussein and
Yin Zhang and
Limei Peng Green data center with IoT sensing and
cloud-assisted smart temperature control
system . . . . . . . . . . . . . . . . . 104--112
Kai Lin and
Wenjian Wang and
Yuanguo Bi and
Meikang Qiu and
Mohammad Mehedi Hassan Human localization based on inertial
sensors and fingerprints in the
Industrial Internet of Things . . . . . 113--126
Tie Qiu and
Diansong Luo and
Feng Xia and
Nakema Deonauth and
Weisheng Si and
Amr Tolba A greedy model with small world for
improving the robustness of
heterogeneous Internet of Things . . . . 127--143
Linghe Kong and
Qiao Xiang and
Xue Liu and
Xiao-Yang Liu and
Xiaofeng Gao and
Guihai Chen and
Min-You Wu ICP: Instantaneous clustering protocol
for wireless sensor networks . . . . . . 144--157
Shiyong Wang and
Jiafu Wan and
Daqiang Zhang and
Di Li and
Chunhua Zhang Towards smart factory for industry 4.0:
a self-organized multi-agent system with
big data based feedback and coordination 158--168
Loizos Kanaris and
Akis Kokkinis and
Giancarlo Fortino and
Antonio Liotta and
Stavros Stavrou Sample Size Determination Algorithm for
fingerprint-based indoor localization
systems . . . . . . . . . . . . . . . . 169--177
Chun-Wei Tsai An effective WSN deployment algorithm
via search economics . . . . . . . . . . 178--191
M. Shamim Hossain and
Ghulam Muhammad Cloud-assisted Industrial Internet of
Things (IIoT) --- Enabled framework for
health monitoring . . . . . . . . . . . 192--202
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Hiroaki Yamanaka and
Eiji Kawai and
Shinji Shimojo A technique for full flow virtualization
of multi-tenant OpenFlow networks . . . 1--19
Ke Wang and
Teck Yoong Chai and
Wai-Choong Wong Routing, power control and rate
adaptation: a Q-learning-based
cross-layer design . . . . . . . . . . . 20--37
Qahhar Muhammad Qadir and
Alexander A. Kist and
Zhongwei Zhang A quality of experience-aware
cross-layer architecture for optimizing
video streaming services . . . . . . . . 38--49
Mehdi Nikkhah Maintaining the progress of IPv6
adoption . . . . . . . . . . . . . . . . 50--69
V. Udaya Sankar and
Vinod Sharma QoS provisioning for multiple Femtocells
via game theory . . . . . . . . . . . . 70--82
Lukas Malina and
Jan Hajny and
Radek Fujdiak and
Jiri Hosek On perspective of security and
privacy-preserving solutions in the
Internet of Things . . . . . . . . . . . 83--95
Ahmed Jedda and
Mazen G. Khair and
Hussein T. Mouftah Decentralized RFID coverage algorithms
using writeable tags . . . . . . . . . . 96--108
Bing Li and
J. William Atwood Secure receiver access control for IP
multicast at the network level: Design
and validation . . . . . . . . . . . . . 109--128
Tao Zhao and
Tao Li and
Biao Han and
Zhigang Sun and
Jinfeng Huang Design and implementation of Software
Defined Hardware Counters for SDN . . . 129--144
Zhixin Liu and
Peng Zhang and
Xinping Guan and
Hongjiu Yang Robust power control for femtocell
networks under outage-based QoS
constraints . . . . . . . . . . . . . . 145--156
Yingjie Wang and
Zhipeng Cai and
Guisheng Yin and
Yang Gao and
Xiangrong Tong and
Guanying Wu An incentive mechanism with privacy
protection in mobile crowdsourcing
systems . . . . . . . . . . . . . . . . 157--171
Bing Xiong and
Kun Yang and
Jinyuan Zhao and
Wei Li and
Keqin Li Performance evaluation of OpenFlow-based
software-defined networks based on
queueing model . . . . . . . . . . . . . 172--185
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
L. Militano and
M. Nitti and
L. Atzori and
A. Iera Enhancing the navigability in a social
network of smart objects: a
Shapley-value based approach . . . . . . 1--14
Hél\`ene Le Cadre and
Jean-Sébastien Bedo Dealing with uncertainty in the smart
grid: a learning game approach . . . . . 15--32
Wei Li and
Yuwei Wu Tree-based coverage hole detection and
healing method in wireless sensor
networks . . . . . . . . . . . . . . . . 33--43
Ming-Chieh Lee and
Jang-Ping Sheu An efficient routing algorithm based on
segment routing in software-defined
networking . . . . . . . . . . . . . . . 44--55
Lisheng Ma and
Xiaohong Jiang and
Bin Wu and
Achille Pattavina and
Norio Shiratori Probabilistic region failure-aware data
center network and content placement . . 56--66
Vasilis Sourlas and
Ioannis Psaras and
Lorenzo Saino and
George Pavlou Efficient Hash-routing and Domain
Clustering Techniques for
Information-Centric Networks . . . . . . 67--83
Olfa Ben Rhaiem and
Lamia Chaari Fourati and
Wessam Ajib Network coding-based approach for
efficient video streaming over MANET . . 84--100
Sang-Seon Byun TCP over scarce transmission opportunity
in cognitive radio networks . . . . . . 101--114
Shiguo Wang and
Rukhsana Ruby and
Victor C. M. Leung and
Zhiqiang Yao Energy-efficient power allocation for
multi-user single-AF-relay underlay
cognitive radio networks . . . . . . . . 115--128
Sahar Hoteit and
Mahmoud El Chamie and
Damien Saucez and
Stefano Secci On fair network cache allocation to
content providers . . . . . . . . . . . 129--142
Oguzhan Erdem Pipelined hierarchical architecture for
high performance packet classification 143--164
Víctor M. López Millán and
Vicent Cholvi and
Antonio Fernández Anta and
Luis López Resource location based on precomputed
partial random walks in dynamic networks 165--180
Costas K. Constantinou and
Georgios Ellinas Heuristic algorithms for efficient
allocation of multicast-capable nodes in
sparse-splitting optical networks . . . 181--195
A. Socievole and
F. De Rango and
C. Scoglio and
P. Van Mieghem Assessing network robustness under SIS
epidemics: the relationship between
epidemic threshold and viral conductance 196--206
Keyur Parmar and
Devesh C. Jinwala Concealed data aggregation in wireless
sensor networks: a comprehensive survey 207--227
Xiapu Luo and
Haocheng Zhou and
Le Yu and
Lei Xue and
Yi Xie Characterizing mobile $^*$-box
applications . . . . . . . . . . . . . . 228--239
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Vanniyarajan Chellappan and
Krishna M. Sivalingam and
Kamala Krithivasan A Centrality Entropy Maximization
Problem in Shortest Path Routing
Networks . . . . . . . . . . . . . . . . 1--15
Yanming Sun and
Min Chen and
Abel Bacchus and
Xiaodong Lin Towards collusion-attack-resilient group
key management using one-way function
tree . . . . . . . . . . . . . . . . . . 16--26
Ognjen Joldzic and
Zoran Djuric and
Pavle Vuletic A transparent and scalable anomaly-based
DoS detection method . . . . . . . . . . 27--42
Mehmet Karaca and
Ozgur Ercetin and
Tansu Alpcan Entropy-based active learning for
wireless scheduling with incomplete
channel feedback . . . . . . . . . . . . 43--54
Yang Wang and
Phanvu Chau and
Fuyu Chen Towards a secured network virtualization 55--65
Adel Mounir Said and
Michel Marot and
Ashraf William Ibrahim and
Hossam Afifi Modeling interactive real-time
applications in VANETs with performance
evaluation . . . . . . . . . . . . . . . 66--78
Ashutosh Bhatia and
R. C. Hansdah TRM-MAC: a TDMA-based reliable multicast
MAC protocol for WSNs with flexibility
to trade-off between latency and
reliability . . . . . . . . . . . . . . 79--93
Gaofei Huang and
Wanqing Tu Optimal resource allocation in
wireless-powered OFDM relay networks . . 94--107
Nusrat Mehajabin and
Md. Abdur Razzaque and
Mohammad Mehedi Hassan and
Ahmad Almogren and
Atif Alamri Energy-sustainable relay node deployment
in wireless sensor networks . . . . . . 108--121
Alysson Bessani and
Nuno F. Neves and
Paulo Veríssimo and
Wagner Dantas and
Alexandre Fonseca and
Rui Silva and
Pedro Luz and
Miguel Correia JITeR: Just-in-time application-layer
routing . . . . . . . . . . . . . . . . 122--136
Shipra Kumari and
Hari Om Authentication protocol for wireless
sensor networks applications like safety
monitoring in coal mines . . . . . . . . 137--154
D. Yi and
H. Yang HEER --- a delay-aware and
energy-efficient routing protocol for
wireless sensor networks . . . . . . . . 155--173
Mingkui Wei and
Wenye Wang Data-centric threats and their impacts
to real-time communications in smart
grid . . . . . . . . . . . . . . . . . . 174--188
Deyu Zhang and
Zhigang Chen and
Haibo Zhou and
Long Chen and
Xuemin (Sherman) Shen Energy-balanced cooperative transmission
based on relay selection and power
control in energy harvesting wireless
sensor network . . . . . . . . . . . . . 189--197
Faqir Zarrar Yousaf and
Christian Wietfeld and
Sahibzada Ali Mahmud Optimizing tunnel management in
predictive handover protocols . . . . . 198--212
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Kiran Yedugundla and
Simone Ferlin and
Thomas Dreibholz and
Özgü Alay and
Nicolas Kuhn and
Per Hurtig and
Anna Brunstrom Is multi-path transport suitable for
latency sensitive traffic? . . . . . . . 1--21
Sung-Guk Yoon and
Jeong-O Seo and
Saewoong Bahk Regrouping algorithm to alleviate the
hidden node problem in 802.11ah networks 22--32
Thanh Dinh and
Younghan Kim and
Tao Gu and
Athanasios V. Vasilakos L-MAC: a wake-up time self-learning MAC
protocol for wireless sensor networks 33--46
Tianjie Cao and
Xiuqing Chen and
Robin Doss and
Jingxuan Zhai and
Lucas J. Wise and
Qiang Zhao RFID ownership transfer protocol based
on cloud . . . . . . . . . . . . . . . . 47--59
Mohamed-Lamine Messai and
Hamida Seba A survey of key management schemes in
multi-phase wireless sensor networks . . 60--74
Andrea Bianco and
Paolo Giaccone and
Marco Ricca Scheduling traffic for maximum switch
lifetime in optical data center fabrics 75--88
Chi-Huang Shih and
Chun-I Kuo and
Yeh-Kai Chou Frame-based forward error correction
using content-dependent coding for video
streaming applications . . . . . . . . . 89--98
Ngoc-Tu Nguyen and
Bing-Hong Liu and
Van-Trung Pham and
Yi-Sheng Luo On maximizing the lifetime for data
aggregation in wireless sensor networks
using virtual data aggregation trees . . 99--110
Ling Fu Xie and
Peter Han Joo Chong and
Ivan Wang-Hei Ho and
Henry C. B. Chan Virtual overhearing: an effective way to
increase network coding opportunities in
wireless ad-hoc networks . . . . . . . . 111--123
Lucas R. Costa and
Guilherme N. Ramos and
André C. Drummond Leveraging adaptive modulation with
multi-hop routing in elastic optical
networks . . . . . . . . . . . . . . . . 124--137
Peyman Pahlevani and
Hana Khamfroush and
Daniel E. Lucani and
Morten V. Pedersen and
Frank H. P. Fitzek Network coding for hop-by-hop
communication enhancement in multi-hop
networks . . . . . . . . . . . . . . . . 138--149
Antonios Michaloliakos and
Ryan Rogalin and
Yonglong Zhang and
Konstantinos Psounis and
Giuseppe Caire Performance modeling of next-generation
WiFi networks . . . . . . . . . . . . . 150--165
Wenzhi Cui and
Ye Yu and
Chen Qian DiFS: Distributed Flow Scheduling for
adaptive switching in FatTree data
center networks . . . . . . . . . . . . 166--179
Yao Zhang and
Xiaoyou Wang and
Adrian Perrig and
Zhiming Zheng Tumbler: Adaptable link access in the
bots-infested Internet . . . . . . . . . 180--193
Jing Chen and
Kun He and
Quan Yuan and
Ruiying Du and
Lina Wang and
Jie Wu Distributed Greedy Coding-aware
Deterministic Routing for multi-flow in
wireless networks . . . . . . . . . . . 194--206
Pantelis A. Frangoudis and
George C. Polyzos and
Gerardo Rubino Relay-based multipoint content delivery
for wireless users in an
information-centric network . . . . . . 207--223
Qiao Hu and
Lavinia Mihaela Dinca and
Anjia Yang and
Gerhard Hancke Practical limitation of co-operative
RFID jamming methods in environments
without accurate signal synchronization 224--236
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
A. Aguilar-Garcia and
R. Barco and
S. Fortes Coordinated location-based
self-optimization for indoor femtocell
networks . . . . . . . . . . . . . . . . 1--16
Ian F. Akyildiz and
Shuai Nie and
Shih-Chun Lin and
Manoj Chandrasekaran 5G roadmap: 10 key enabling technologies 17--48
Filippo Rebecchi and
Marcelo Dias de Amorim and
Vania Conan Circumventing plateaux in cellular data
offloading using adaptive content
reinjection . . . . . . . . . . . . . . 49--63
Olga Goussevskaia and
Luiz F. M. Vieira and
Marcos A. M. Vieira Wireless scheduling with multiple data
rates: From physical interference to
disk graphs . . . . . . . . . . . . . . 64--76
Yuanyuan Zhang and
Mingwei Xu and
Ning Wang and
Jun Li and
Penghan Chen and
Fei Liang Compressing IP Forwarding Tables with
Small Bounded Update Time . . . . . . . 77--90
Dionysis Xenakis and
Nikos Passas and
Lazaros Merakos and
Christos Verikoukis ANDSF-Assisted vertical handover
decisions in the IEEE
802.11/LTE-Advanced network . . . . . . 91--108
Xiaoyan Lu and
Eyuphan Bulut and
Boleslaw Szymanski Towards limited scale-free topology with
dynamic peer participation . . . . . . . 109--121
Jun Zheng and
Peng Yang and
Jingjing Luo and
Qiuming Liu and
Li Yu Per-user throughput analysis for
secondary users in multi-hop cognitive
radio networks . . . . . . . . . . . . . 122--133
Ali Sehati and
Majid Ghaderi Network assisted latency reduction for
mobile web browsing . . . . . . . . . . 134--150
Hao Xu and
Huafei Sun and
Yongqiang Cheng and
Hao Liu Wireless sensor networks localization
based on graph embedding with polynomial
mapping . . . . . . . . . . . . . . . . 151--160
L. Boero and
M. Cello and
C. Garibotto and
M. Marchese and
M. Mongelli BeaQoS: Load balancing and deadline
management of queues in an OpenFlow SDN
switch . . . . . . . . . . . . . . . . . 161--170
Minh Tuan Nguyen and
Keith A. Teague and
Nazanin Rahnavard CCS: Energy-efficient data collection in
clustered wireless sensor networks
utilizing block-wise compressive sensing 171--185
Michele Mangili and
Jocelyne Elias and
Fabio Martignon and
Antonio Capone Optimal planning of virtual content
delivery networks under uncertain
traffic demands . . . . . . . . . . . . 186--195
Ting Wang and
Mounir Hamdi Presto: Towards efficient online virtual
network embedding in virtualized cloud
data centers . . . . . . . . . . . . . . 196--208
Fung Po Tso and
Simon Jouet and
Dimitrios P. Pezaros Network and server resource management
strategies for data centre
infrastructures: a survey . . . . . . . 209--225
Kyung-Wook Hwang and
Vijay Gopalakrishnan and
Rittwik Jana and
Seungjoon Lee and
Vishal Misra and
K. K. Ramakrishnan and
Dan Rubenstein Joint-family: Adaptive bitrate
video-on-demand streaming over
peer-to-peer networks with realistic
abandonment patterns . . . . . . . . . . 226--244
Dimitris Tsolkas and
Nikos Passas and
Lazaros Merakos Device discovery in LTE networks: a
radio access perspective . . . . . . . . 245--259
Shih-Chun Lin and
Pu Wang and
Min Luo Control traffic balancing in software
defined networks . . . . . . . . . . . . 260--271
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Alessandro D'Alconzo and
Pere Barlet-Ros and
Kensuke Fukuda and
David Choffnes Machine learning, data mining and Big
Data frameworks for network monitoring
and troubleshooting . . . . . . . . . . 1--4
Arian Baer and
Pedro Casas and
Alessandro D'Alconzo and
Pierdomenico Fiadino and
Lukasz Golab and
Marco Mellia and
Erich Schikuta DBStream: a holistic approach to
large-scale network traffic monitoring
and analysis . . . . . . . . . . . . . . 5--19
Enrico Bocchi and
Ali Safari Khatouni and
Stefano Traverso and
Alessandro Finamore and
Maurizio Munaf\`o and
Marco Mellia and
Dario Rossi Statistical network monitoring:
Methodology and application to
carrier-grade NAT . . . . . . . . . . . 20--35
François Espinet and
Diana Joumblatt and
Dario Rossi Framework, models and controlled
experiments for network troubleshooting 36--54
Martin Grill and
Tomás Pevný Learning combination of anomaly
detectors for security domain . . . . . 55--63
Félix Iglesias and
Tanja Zseby Time-activity footprints in IP traffic 64--75
Andra Lutu and
Yuba Raj Siwakoti and
Özgü Alay and
Dziugas Baltrunas and
Ahmed Elmokashfi The good, the bad and the implications
of profiling mobile broadband coverage 76--93
Zahaib Akhtar and
Alefiya Hussain and
Ethan Katz-Bassett and
Ramesh Govindan DBit: Assessing statistically
significant differences in CDN
performance . . . . . . . . . . . . . . 94--103
Ondrej Tomanek and
Pavol Mulinka and
Lukas Kencl Multidimensional cloud latency
monitoring and evaluation . . . . . . . 104--120
Stuart E. Middleton and
Stefano Modafferi Scalable classification of QoS for
real-time interactive applications from
IP traffic measurements . . . . . . . . 121--132
Qishan Zhang and
Qirong Qiu and
Wenzhong Guo and
Kun Guo and
Naixue Xiong A social community detection algorithm
based on parallel grey label propagation 133--143
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Marilia Curado and
Ivan Ganchev and
Andreas Kassler and
Yevgeni Koucheryavy Guest editorial: Special issue on mobile
wireless networks . . . . . . . . . . . 145--147
Xiuxiu Wen and
Guangsheng Feng and
Huiqiang Wang and
Hongwu Lv and
Junyu Lin An adaptive disorder-avoidance
cooperative downloading method . . . . . 148--162
Jose Moura and
Christopher Edwards Efficient access of mobile flows to
heterogeneous networks under flash
crowds . . . . . . . . . . . . . . . . . 163--177
Ólafur Helgason and
Sylvia T. Kouyoumdjieva and
Ljubica Pajevi\'c and
Emre A. Yavuz and
Gunnar Karlsson A middleware for opportunistic content
distribution . . . . . . . . . . . . . . 178--193
Carlos Anastasiades and
Tobias Schmid and
Jürg Weber and
Torsten Braun Information-centric content retrieval
for delay-tolerant networks . . . . . . 194--207
Carlos Anastasiades and
Jürg Weber and
Torsten Braun Dynamic Unicast: Information-centric
multi-hop routing for mobile ad-hoc
networks . . . . . . . . . . . . . . . . 208--219
G. E. M. Zhioua and
J. Zhang and
H. Labiod and
N. Tabbane and
S. Tabbane A joint active time and flow selection
model for cellular content retrieval
through ITS . . . . . . . . . . . . . . 220--232
Peng Zhou and
Yanheng Liu and
Jian Wang and
Weiwen Deng and
Heekuck Oh Performance analysis of prioritized
broadcast service in WAVE/IEEE 802.11p 233--245
Ahmed D. Kora and
Brice A. Elono Ongbwa and
Jean-Pierre Cances and
Vahid Meghdadi Accurate radio coverage assessment
methods investigation for 3G/4G networks 246--257
Alexander Dudin and
Chesoong Kim and
Sergey Dudin and
Olga Dudina Analysis and optimization of Guard
Channel Policy with buffering in
cellular mobile networks . . . . . . . . 258--269
Felipe S. Dantas Silva and
Augusto Venâncio Neto and
Douglas Maciel and
José Castillo-Lema and
Flávio Silva and
Pedro Frosi and
Eduardo Cerqueira An innovative software-defined WiNeMO
architecture for advanced QoS-guaranteed
mobile service transport . . . . . . . . 270--291
E. Zola and
A. J. Kassler Minimizing the impact of the handover
for mobile users in WLAN: a study on
performance optimization . . . . . . . . 292--303
Mohamed Abdelkrim Senouci and
M. Sajid Mushtaq and
Said Hoceini and
Abdelhamid Mellouk TOPSIS-based dynamic approach for mobile
network interface selection . . . . . . 304--314
Bart Jooris and
Jan Bauwens and
Peter Ruckebusch and
Peter De Valck and
Christophe Van Praet and
Ingrid Moerman and
Eli De Poorter TAISC: a cross-platform MAC protocol
compiler and execution engine . . . . . 315--326
Aleksandr Ometov and
Antonino Orsino and
Leonardo Militano and
Giuseppe Araniti and
Dmitri Moltchanov and
Sergey Andreev A novel security-centric framework for
D2D connectivity based on spatial and
social proximity . . . . . . . . . . . . 327--338
Afonso Oliveira and
Teresa Vazão Low-power and lossy networks under
mobility: a survey . . . . . . . . . . . 339--352
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Alia Asheralieva and
Yoshikazu Miyanaga Effective resource block allocation
procedure for quality of service
provisioning in a single-operator
heterogeneous LTE-A network . . . . . . 1--14
Nasrin Taherkhani and
Samuel Pierre Prioritizing and scheduling messages for
congestion control in vehicular ad hoc
networks . . . . . . . . . . . . . . . . 15--28
Xianfu Meng and
Shuang Ren An outlier mining-based malicious node
detection model for hybrid P2P networks 29--39
Molka Gharbaoui and
Barbara Martini and
Carol. J. Fung and
Francesco Paolucci and
Alessio Giorgetti and
Piero Castoldi An incentive-compatible and trust-aware
multi-provider path computation element
(PCE) . . . . . . . . . . . . . . . . . 40--54
Carlos Pereira and
Ana Aguiar and
Daniel E. Lucani When are network coding based dynamic
multi-homing techniques beneficial? . . 55--65
S. Sciancalepore and
G. Piro and
E. Vogli and
G. Boggia and
L. A. Grieco and
G. Cavone LICITUS: a lightweight and standard
compatible framework for securing
layer-2 communications in the IoT . . . 66--77
Mohamed Abu Sharkh and
Ali Kanso and
Abdallah Shami and
Peter Öhlén Building a cloud on Earth: a study of
cloud computing data center simulators 78--96
Soodeh Hosseini and
Mohammad Abdollahi Azgomi A model for malware propagation in
scale-free networks based on rumor
spreading process . . . . . . . . . . . 97--107
Xianda Chen and
Kyung Tae Kim and
Hee Yong Youn Integration of Markov random field with
Markov chain for efficient event
detection using wireless sensor network 108--119
Feng Li and
Jun Luo and
Shiqing Xin and
Ying He Autonomous deployment of wireless sensor
networks for optimal coverage with
directional sensing model . . . . . . . 120--132
Sabrina Sicari and
Alessandra Rizzardi and
Daniele Miorandi and
Cinzia Cappiello and
Alberto Coen-Porisini Security policy enforcement for
networked smart objects . . . . . . . . 133--147
Chen-Khong Tham and
Wen Sun A spatio-temporal incentive scheme with
consumer demand awareness for
participatory sensing . . . . . . . . . 148--159
Armir Bujari and
Andrea Marin and
Claudio E. Palazzi and
Sabina Rossi Analysis of ECN/RED and SAP-LAW with
simultaneous TCP and UDP traffic . . . . 160--170
Mariusz Glabowski and
Adam Kaliszan and
Maciej Stasiak Modelling overflow systems with
distributed secondary resources . . . . 171--183
Tram Truong-Huu and
Mohan Gurusamy and
Vishal Girisagar Dynamic embedding of workflow requests
for bandwidth efficiency in data centers 184--198
Kübra Kalkan and
Fatih Alagöz A distributed filtering mechanism
against DDoS attacks: ScoreForCore . . . 199--209
Tassos Dimitriou and
Ebrahim A. Alrashed and
Mehmet Hakan Karaata and
Ali Hamdan Imposter detection for replication
attacks in mobile sensor networks . . . 210--222
Moumita Patra and
C. Siva Ram Murthy Piggybacking assisted many-to-many
communication with efficient vehicle
selection for improved performance in
vehicular ad hoc networks . . . . . . . 223--232
Robert Wójcik and
Jerzy Domzal and
Zbigniew Duli\'nski and
Grzegorz Rzym and
Andrzej Kamisi\'nski and
Piotr Gawlowicz and
Piotr Jurkiewicz and
Jacek Rzasa and
Rafal Stankiewicz and
Krzysztof Wajda A survey on methods to provide
interdomain multipath transmissions . . 233--259
Rihab Chaâri and
Fatma Ellouze and
Anis Koubâa and
Basit Qureshi and
Nuno Pereira and
Habib Youssef and
Eduardo Tovar Cyber-physical systems clouds: a survey 260--278
M. Gharbaoui and
B. Martini and
D. Adami and
S. Giordano and
P. Castoldi Cloud and network orchestration in SDN
data centers: Design principles and
performance evaluation . . . . . . . . . 279--295
Wayan Damayanti and
Sanghyun Kim and
Ji-Hoon Yun Collision chain mitigation and hidden
device-aware grouping in large-scale
IEEE 802.11ah networks . . . . . . . . . 296--306
Cristian Hernandez Benet and
Andreas Kassler and
Enrica Zola Predicting expected TCP throughput using
genetic algorithm . . . . . . . . . . . 307--322
Emrah Cem and
Kamil Sarac Estimation of structural properties of
online social networks at the extreme 323--344
Siguang Chen and
Chuanxin Zhao and
Meng Wu and
Zhixin Sun and
Haijun Zhang and
Victor C. M. Leung Compressive network coding for wireless
sensor networks: Spatio-temporal coding
and optimization design . . . . . . . . 345--356
Jan Plachy and
Zdenek Becvar and
Pavel Mach Path selection enabling user mobility
and efficient distribution of data for
computation at the edge of mobile
network . . . . . . . . . . . . . . . . 357--370
Afraa Khalifah and
Nadine Akkari and
Ghadah Aldabbagh and
Nikos Dimitriou Hybrid femto/macro rate-based offloading
for high user density networks . . . . . 371--380
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Gerhard Hancke and
Aikaterini Mitrokotsa and
Reihaneh Safavi-Naini and
Damien Sauveron Special issue on recent advances in
physical-layer security . . . . . . . . 1--3
Nguyen Xuan Quyen and
Trung Q. Duong and
Nguyen-Son Vo and
Qingqing Xie and
Lei Shu Chaotic direct-sequence spread-spectrum
with variable symbol period: a technique
for enhancing physical layer security 4--12
Pedro H. J. Nardelli and
Hirley Alves and
Carlos H. M. de Lima and
Matti Latva-aho Throughput maximization in multi-hop
wireless networks under a secrecy
constraint . . . . . . . . . . . . . . . 13--20
Giulio Aliberti and
Roberto Di Pietro and
Stefano Guarino Reliable and perfectly secret
communication over the generalized
Ozarow--Wyner's wire-tap channel . . . . 21--30
Nils Ole Tippenhauer and
Kasper Bonne Rasmussen and
Srdjan Capkun Physical-layer integrity for wireless
messages . . . . . . . . . . . . . . . . 31--38
Nikolaos E. Petroulakis and
George Spanoudakis and
Ioannis G. Askoxylakis Patterns for the design of secure and
dependable software defined networks . . 39--49
Suman Bhunia and
Vahid Behzadan and
Paulo Alexandre Regis and
Shamik Sengupta Adaptive beam nulling in multihop ad hoc
networks against a jammer in motion . . 50--66
Il-Gu Lee and
Myungchul Kim Persistent jamming in wireless local
area networks: Attack and defense . . . 67--83
Christopher Huth and
René Guillaume and
Thomas Strohm and
Paul Duplys and
Irin Ann Samuel and
Tim Güneysu Information reconciliation schemes in
physical-layer security: a survey . . . 84--104
Christian T. Zenger and
Mario Pietersz and
Jan Zimmer and
Jan-Felix Posielek and
Thorben Lenze and
Christof Paar Authenticated key establishment for
low-resource devices exploiting
correlated random channels . . . . . . . 105--123
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Michela Meo and
Sabine Wittevrongel Traffic and performance in the big data
era . . . . . . . . . . . . . . . . . . 125--126
Mirco Marchetti and
Fabio Pierazzi and
Michele Colajanni and
Alessandro Guido Analysis of high volumes of network
traffic for Advanced Persistent Threat
detection . . . . . . . . . . . . . . . 127--141
Enrico Bocchi and
Luigi Grimaudo and
Marco Mellia and
Elena Baralis and
Sabyasachi Saha and
Stanislav Miskovic and
Gaspar Modelo-Howard and
Sung-Ju Lee MAGMA network behavior classifier for
malware traffic . . . . . . . . . . . . 142--156
Gaurav Somani and
Manoj Singh Gaur and
Dheeraj Sanghi and
Mauro Conti DDoS attacks in cloud computing:
Collateral damage to non-targets . . . . 157--171
Taejin Ha and
Sunghwan Kim and
Namwon An and
Jargalsaikhan Narantuya and
Chiwook Jeong and
JongWon Kim and
Hyuk Lim Suspicious traffic sampling for
intrusion detection in software-defined
networks . . . . . . . . . . . . . . . . 172--182
Glauber D. Gonçalves and
Idilio Drago and
Alex B. Vieira and
Ana Paula Couto da Silva and
Jussara M. Almeida and
Marco Mellia Workload models and performance
evaluation of cloud storage services . . 183--199
Hadrien Hours and
Ernst Biersack and
Patrick Loiseau and
Alessandro Finamore and
Marco Mellia A study of the impact of DNS resolvers
on CDN performance using a causal
approach . . . . . . . . . . . . . . . . 200--210
Florian Wamser and
Pedro Casas and
Michael Seufert and
Christian Moldovan and
Phuoc Tran-Gia and
Tobias Hossfeld Modeling the YouTube stack: From packets
to quality of experience . . . . . . . . 211--224
T. Bonald and
C. Comte The multi-source model for dimensioning
data networks . . . . . . . . . . . . . 225--233
Jan Willem Kleinrouweler and
Sergio Cabrero and
Rob van der Mei and
Pablo Cesar A model for evaluating sharing policies
for network-assisted HTTP adaptive
streaming . . . . . . . . . . . . . . . 234--245
Florian Metzger and
Eirini Liotou and
Christian Moldovan and
Tobias Hoßfeld TCP video streaming and mobile networks:
Not a love story, but better with
context . . . . . . . . . . . . . . . . 246--256
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Jin Wang and
Jing Ren and
Kejie Lu and
Jianping Wang and
Shucheng Liu and
Cedric Westphal A minimum cost cache management
framework for information-centric
networks with network coding . . . . . . 1--17
Si Quoc Viet Trang and
Emmanuel Lochin FLOWER, an innovative Fuzzy
Lower-than-Best-Effort transport
protocol . . . . . . . . . . . . . . . . 18--30
Meng Chen and
Mingwei Xu and
Qing Li and
Yuan Yang Measurement of large-scale BGP events:
Definition, detection, and analysis . . 31--45
Yuqi Fan and
Hongli Ding and
Lusheng Wang and
Xiaojing Yuan Green latency-aware data placement in
data centers . . . . . . . . . . . . . . 46--57
Yu Wang and
Mehul Motani and
Hari Krishna Garg and
Xin Kang and
Qian Chen Throughput maximization for cooperative
60 GHz wireless personal area networks 58--68
Yi Guo and
Haixin Duan and
Jikun Chen and
Fu Miao MAF-SAM: an effective method to perceive
data plane threats of inter domain
routing system . . . . . . . . . . . . . 69--78
Sungwook Kim Cognitive hierarchy thinking based
behavioral game model for IoT power
control algorithm . . . . . . . . . . . 79--90
Jianbiao Mao and
Biao Han and
Zhigang Sun and
Xicheng Lu and
Ziwen Zhang Efficient mismatched packet buffer
management with packet order-preserving
for OpenFlow networks . . . . . . . . . 91--103
Giovanna Carofiglio and
Massimo Gallo and
Luca Muscariello Optimal multipath congestion control and
request forwarding in
information-centric networks: Protocol
design and experimentation . . . . . . . 104--117
Allan M. de Souza and
R. S. Yokoyama and
Azzedine Boukerche and
Guilherme Maia and
Eduardo Cerqueira and
Antonio A. F. Loureiro and
Leandro Aparecido Villas ICARUS: Improvement of traffic Condition
through an Alerting and Re-routing
System . . . . . . . . . . . . . . . . . 118--132
Giovanna Carofiglio and
Léonce Mekinda and
Luca Muscariello Joint forwarding and caching with
latency awareness in information-centric
networking . . . . . . . . . . . . . . . 133--153
Heitor S. Ramos and
Azzedine Boukerche and
Alyson L. C. Oliveira and
Alejandro C. Frery and
Eduardo M. R. Oliveira and
Antonio A. F. Loureiro On the deployment of large-scale
wireless sensor networks considering the
energy hole problem . . . . . . . . . . 154--167
Arslan Ahmad and
Alessandro Floris and
Luigi Atzori QoE-centric service delivery: a
collaborative approach among OTTs and
ISPs . . . . . . . . . . . . . . . . . . 168--179
V. V. Mandhare and
V. R. Thool and
R. R. Manthalkar QoS Routing enhancement using
metaheuristic approach in mobile ad-hoc
network . . . . . . . . . . . . . . . . 180--191
Husnu S. Narman and
Mohammed Atiquzzaman and
Mehdi Rahmani-andebili and
Haiying Shen Joint and selective periodic component
carrier assignment for LTE-A . . . . . . 192--205
Esmaeil Nik Maleki and
Ghasem Mirjalily Fault-tolerant interference-aware
topology control in multi-radio
multi-channel wireless mesh networks . . 206--222
Luca Valcarenghi and
Koteswararao Kondepu and
Piero Castoldi Delay fairness in reconfigurable and
energy efficient TWDM PON . . . . . . . 223--231
Sudip Misra and
Samaresh Bera and
Tamoghna Ojha and
Hussein T. Mouftah and
Alagan Anpalagan ENTRUST: Energy trading under
uncertainty in smart grid systems . . . 232--242
Xin Li and
Haotian Wu and
Don Gruenbacher and
Caterina Scoglio and
Tricha Anjali Efficient routing for middlebox policy
enforcement in software-defined
networking . . . . . . . . . . . . . . . 243--252
Jinho Lee and
Jaehoon (Paul) Jeong and
David H. C. Du Two-way traffic link delay modeling in
vehicular networks . . . . . . . . . . . 253--265
Yuemei Xu and
Song Ci and
Yang Li and
Tao Lin and
Gang Li Design and evaluation of coordinated
in-network caching model for content
centric networking . . . . . . . . . . . 266--283
Tashnim J. S. Chowdhury and
Colin Elkin and
Vijay Devabhaktuni and
Danda B. Rawat and
Jared Oluoch Advances on localization techniques for
wireless sensor networks: a survey . . . 284--305
Xenofon Vasilakos and
Vasilios A. Siris and
George C. Polyzos Addressing niche demand based on joint
mobility prediction and content
popularity caching . . . . . . . . . . . 306--323
Kun Xie and
Jiannong Cao and
Xin Wang and
Jigang Wen Pre-scheduled handoff for service-aware
and seamless Internet access . . . . . . 324--337
Nguyen Xuan Tien and
Semog Kim and
Jong Myung Rhee A novel ring-based dual paths approach
for reducing redundant traffic in HSR
networks . . . . . . . . . . . . . . . . 338--350
Run Ye and
Azzedine Boukerche and
Houjun Wang and
Xiaojia Zhou and
Bin Yan RECODAN: an efficient redundancy
coding-based data transmission scheme
for wireless sensor networks . . . . . . 351--363
Yang Xu and
Yong Liu and
Rahul Singh and
Shu Tao SDN state inconsistency verification in
openstack . . . . . . . . . . . . . . . 364--376
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
A. Socievole and
A. Ziviani and
F. De Rango and
A. V. Vasilakos and
E. Yoneki Cyber-physical systems for Mobile
Opportunistic Networking in Proximity
(MNP) . . . . . . . . . . . . . . . . . 1--5
Kassio Machado and
Azzedine Boukerche and
Pedro O. S. Vaz de Melo and
Eduardo Cerqueira and
Antonio A. F. Loureiro Pervasive forwarding mechanism for
mobile social networks . . . . . . . . . 6--16
Jingwei Miao and
Omar Hasan and
Sonia Ben Mokhtar and
Lionel Brunie and
Ammar Hasan 4PR: Privacy preserving routing in
mobile delay tolerant networks . . . . . 17--28
Victor Ramiro and
Emmanuel Lochin and
Patrick Sénac Characterization and applications of
temporal random walks on opportunistic
networks . . . . . . . . . . . . . . . . 29--44
Enrique Hernández-Orallo and
Marina Murillo-Arcila and
Carlos T. Calafate and
Juan Carlos Cano and
J. Alberto Conejero and
Pietro Manzoni Analytical evaluation of the performance
of contact-based messaging applications 45--54
Carlos Oberdan Rolim and
Anubis G. Rossetto and
Valderi R. Q. Leithardt and
Guilherme A. Borges and
Cláudio F. R. Geyer and
Tatiana F. M. dos Santos and
Adriano M. Souza Situation awareness and computational
intelligence in opportunistic networks
to support the data transmission of
urban sensing applications . . . . . . . 55--70
Xiao Chen and
Charles Shang and
Britney Wong and
Wenzhong Li and
Suho Oh Efficient Multicast Algorithms in
Opportunistic Mobile Social Networks
using Community and Social Features . . 71--81
Adrian Holzer and
Sven Reber and
Jonny Quarta and
Jorge Mazuze and
Denis Gillet Padoc: Enabling social networking in
proximity . . . . . . . . . . . . . . . 82--92
Okan Turkes and
Hans Scholten and
Paul J. M. Havinga Cocoon: a lightweight opportunistic
networking middleware for
community-oriented smart mobile
applications . . . . . . . . . . . . . . 93--108
Marc-Olivier Killijian and
Roberto Pasqua and
Matthieu Roy and
Gilles Trédan and
Christophe Zanon Souk: Spatial Observation of Human
Kinetics . . . . . . . . . . . . . . . . 109--119
Cristian-Octavian Ojog and
Radu-Corneliu Marin and
Radu-Ioan Ciobanu and
Ciprian Dobre Multi-criteria optimization of wireless
connectivity over sparse networks . . . 120--128
Thiago Rodrigues Oliveira and
Cristiano M. Silva and
Daniel F. Macedo and
José Marcos S. Nogueira SNVC: Social Networks for Vehicular
Certification . . . . . . . . . . . . . 129--140
L. Militano and
A. Orsino and
G. Araniti and
M. Nitti and
L. Atzori and
A. Iera Trust-based and social-aware coalition
formation game for multihop data
uploading in 5G systems . . . . . . . . 141--151
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Anonymous Editorial for Computer Networks Journal
2016 . . . . . . . . . . . . . . . . . . iii--iii
Giulia Mauri and
Giacomo Verticale Up-to-date key retrieval for information
centric networking . . . . . . . . . . . 1--11
Yi Zhang and
Michela Meo and
Raffaella Gerboni and
Marco Ajmone Marsan Minimum cost solar power systems for LTE
macro base stations . . . . . . . . . . 12--23
Jianxin Liao and
Haifeng Sun and
Jingyu Wang and
Qi Qi and
Kai Li and
Tonghong Li Density cluster based approach for
controller placement problem in
large-scale software defined networkings 24--35
Lyno Henrique G. Ferraz and
Rafael Laufer and
Diogo M. F. Mattos and
Otto Carlos M. B. Duarte and
Guy Pujolle A high-performance Two-Phase Multipath
scheme for data-center networks . . . . 36--51
Nagao Ogino and
Takeshi Kitahara and
Shin'ichi Arakawa and
Masayuki Murata Virtual network embedding with multiple
priority classes sharing substrate
resources . . . . . . . . . . . . . . . 52--66
Valerio Persico and
Alessio Botta and
Pietro Marchetta and
Antonio Montieri and
Antonio Pescapé On the performance of the wide-area
networks interconnecting public-cloud
datacenters around the globe . . . . . . 67--83
Meng Zheng and
Chi Xu and
Wei Liang and
Haibin Yu and
Lin Chen Time-efficient cooperative spectrum
sensing via analog computation over
multiple-access channel . . . . . . . . 84--94
Meng-Shiuan Pan and
Shu-Wei Yang A lightweight and distributed geographic
multicast routing protocol for IoT
applications . . . . . . . . . . . . . . 95--107
Mustafa Ismael Salman and
Muntadher Qasim Abdulhasan and
Chee Kyun Ng and
Nor Kamariah Noordin and
Borhanuddin Mohd Ali and
Aduwati Sali A partial feedback reporting scheme for
LTE mobile video transmission with QoS
provisioning . . . . . . . . . . . . . . 108--121
Ahmed Abdelsalam and
Michele Luglio and
Cesare Roseti and
Francesco Zampognaro TCP Wave: a new reliable transport
approach for future Internet . . . . . . 122--143
Emmanuel Ndashimye and
Sayan K. Ray and
Nurul I. Sarkar and
Jairo A. Gutiérrez Vehicle-to-infrastructure communication
over multi-tier heterogeneous networks:
a survey . . . . . . . . . . . . . . . . 144--166
Jinfa Yao and
Baoqun Yin and
Xiaobin Tan and
Xiaofeng Jiang A POMDP framework for forwarding
mechanism in named data networking . . . 167--175
Eduardo Mucelli Rezende Oliveira and
Aline Carneiro Viana and
K. P. Naveen and
Carlos Sarraute Mobile data traffic modeling: Revealing
temporal facets . . . . . . . . . . . . 176--193
Cong Xu and
Jiahai Yang and
Kevin Yin and
Hui Yu Optimal construction of virtual networks
for Cloud-based MapReduce workflows . . 194--207
Pablo Adasme and
Rafael Andrade and
Abdel Lisser Minimum cost dominating tree sensor
networks under probabilistic constraints 208--222
Cheng Ren and
Sheng Wang and
Jing Ren and
Weizhong Qian and
Xiaoning Zhang and
Jie Duan Energy-efficient virtual topology design
in IP over WDM mesh networks . . . . . . 223--236
Aafaf Ouaddah and
Hajar Mousannif and
Anas Abou Elkalam and
Abdellah Ait Ouahman Access control in the Internet of
Things: Big challenges and new
opportunities . . . . . . . . . . . . . 237--262
Qiufen Xia and
Weifa Liang and
Zichuan Xu The operational cost minimization in
distributed clouds via community-aware
user data placements of social networks 263--278
Murat Karakus and
Arjan Durresi A survey: Control plane scalability
issues and approaches in
Software-Defined Networking (SDN) . . . 279--293
Behnaz Bostanipour and
Beno\^\it Garbinato A neighbor detection algorithm based on
multiple virtual mobile nodes for mobile
ad hoc networks . . . . . . . . . . . . 294--313
Zhibo Wang and
Honglong Chen and
Qing Cao and
Hairong Qi and
Zhi Wang and
Qian Wang Achieving location error tolerant
barrier coverage for wireless sensor
networks . . . . . . . . . . . . . . . . 314--328
Ben-Jye Chang and
Gunag-Jie Jhang Minimizing contention collision
probability and guaranteeing packet
delay for cloud big data transmissions
in 4G LTE-A packet random access . . . . 329--344
Ebrahim Ghazisaeedi and
Changcheng Huang GreenMap: Green mapping of
MapReduce-based virtual networks onto a
data center network and managing incast
queueing delay . . . . . . . . . . . . . 345--359
Shaowei Liu and
Weimin Lei and
Wei Zhang and
Yunchong Guan CMT--SR: a selective retransmission
based concurrent multipath transmission
mechanism for conversational video . . . 360--371
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Liudong Zuo and
Michelle M. Zhu and
Chase Q. Wu and
Jason Zurawski Fault-tolerant bandwidth reservation
strategies for data transfers in
high-performance networks . . . . . . . 1--16
Mehmet Fatih Tuysuz and
Murat Uçan Energy-aware network/interface selection
and handover application for
Android-based mobile devices . . . . . . 17--28
Alejandro Erickson and
Iain A. Stewart and
Javier Navaridas and
Abbas E. Kiasari The stellar transformation: From
interconnection networks to datacenter
networks . . . . . . . . . . . . . . . . 29--45
Wilfried Yoro and
Tijani Chahed and
Mamdouh El-Tabach and
Taoufik En-Najjary and
Azeddine Gati Service-oriented sharing of energy in
wireless access networks using Shapley
value . . . . . . . . . . . . . . . . . 46--57
Konstantinos Deltouzos and
Spyros Denazis Tackling energy and battery issues in
mobile P2P VoD systems . . . . . . . . . 58--71
Yan Yan and
Baoxian Zhang and
Cheng Li Opportunistic network coding based
cooperative retransmissions in D2D
communications . . . . . . . . . . . . . 72--83
M. Itani and
S. Sharafeddine and
I. Elkabani Dynamic single node failure recovery in
distributed storage systems . . . . . . 84--93
Christoforos Panos and
Christoforos Ntantogian and
Stefanos Malliaros and
Christos Xenakis Analyzing, quantifying, and detecting
the blackhole attack in
infrastructure-less networks . . . . . . 94--110
Jenq-Shiou Leu and
Min-Chieh Yu and
Chun-Yao Liu and
Alrezza Pradanta Bagus Budiarsa and
Vincent Utomo Energy efficient streaming for
smartphone by video adaptation and
backlight control . . . . . . . . . . . 111--123
Sokratis Barmpounakis and
Alexandros Kaloxylos and
Panagiotis Spapis and
Nancy Alonistioti Context-aware, user-driven,
network-controlled RAT selection for 5G
networks . . . . . . . . . . . . . . . . 124--147
Bitan Banerjee and
Anand Seetharam and
Amitava Mukherjee and
Mrinal Kanti Naskar Characteristic time routing in
information centric networks . . . . . . 148--158
João Taveira Araujo and
Raul Landa and
Richard G. Clegg and
George Pavlou and
Kensuke Fukuda On rate limitation mechanisms for TCP
throughput: a longitudinal analysis . . 159--175
Jeffrey Lai and
Qiang Fu and
Tim Moors Using SDN and NFV to enhance request
rerouting in ISP-CDN collaborations . . 176--187
Mehmet Fatih Tuysuz and
Zekiye Kubra Ankarali and
Didem Gözüpek A survey on energy efficiency in
software defined networks . . . . . . . 188--204
Joshua Stein and
Han Hee Song and
Mario Baldi and
Jun Li On the most representative summaries of
network user activities . . . . . . . . 205--217
Uzzam Javed and
Azeem Iqbal and
Saad Saleh and
Syed Ali Haider and
Muhammad U. Ilyas A stochastic model for transit latency
in OpenFlow SDNs . . . . . . . . . . . . 218--229
Junling Shi and
Xingwei Wang and
Min Huang and
Keqin Li and
Sajal K. Das Social-based routing scheme for
fixed-line VANET . . . . . . . . . . . . 230--243
Abdur Rahim Mohammad Forkan and
Ibrahim Khalil and
Mohammed Atiquzzaman ViSiBiD: a learning model for early
discovery and real-time prediction of
severe clinical events using vital signs
as big data . . . . . . . . . . . . . . 244--257
Carlos Vega and
Paula Roquero and
Javier Aracil Multi-Gbps HTTP traffic analysis in
commodity hardware based on local
knowledge of TCP streams . . . . . . . . 258--268
Mohammed Gharib and
Zahra Moradlou and
Mohammed Ali Doostari and
Ali Movaghar Fully distributed ECC-based key
management for mobile ad hoc networks 269--283
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Xuetao Wei and
Nicholas C. Valler and
Harsha V. Madhyastha and
Iulian Neamtiu and
Michalis Faloutsos Characterizing the behavior of handheld
devices and its implications . . . . . . 1--12
Le\"\ila Gazzah and
Le\"\ila Najjar Trade-off between node selection and
space diversity for accurate
uncooperative localization . . . . . . . 13--22
Eduardo Moreno and
Alejandra Beghelli and
Filippo Cugini Traffic engineering in segment routing
networks . . . . . . . . . . . . . . . . 23--31
Madhusanka Liyanage and
An Braeken and
Anca Delia Jurcut and
Mika Ylianttila and
Andrei Gurtov Secure communication channel
architecture for Software Defined Mobile
Networks . . . . . . . . . . . . . . . . 32--50
Reem E. Mohemed and
Ahmed I. Saleh and
Maher Abdelrazzak and
Ahmed S. Samra Energy-efficient routing protocols for
solving energy hole problem in wireless
sensor networks . . . . . . . . . . . . 51--66
Xin Kang and
Jing Yang Viewing experience optimization for
peer-to-peer streaming networks with
credit-based incentive mechanisms . . . 67--79
Linfeng Liu and
Ping Wang and
Ran Wang Propagation control of data forwarding
in opportunistic underwater sensor
networks . . . . . . . . . . . . . . . . 80--94
Selma Khebbache and
Makhlouf Hadji and
Djamal Zeghlache Virtualized network functions chaining
and routing algorithms . . . . . . . . . 95--110
Julia Klier and
Mathias Klier and
Alexander Richter and
Rolf T. Wigand Special issue on social media networks
in business . . . . . . . . . . . . . . 111--113
Libo Li and
Frank Goethals and
Bart Baesens and
Monique Snoeck Predicting software revision outcomes on
GitHub using structural holes theory . . 114--124
Benjamin Wehner and
Christian Ritter and
Susanne Leist Enterprise social networks: a literature
review and research agenda . . . . . . . 125--142
Stoney Brooks and
Christopher Califf Social media-induced technostress: Its
impact on the job performance of it
professionals and the moderating role of
job characteristics . . . . . . . . . . 143--153
Haishuai Wang and
Jia Wu and
Shirui Pan and
Peng Zhang and
Ling Chen Towards large-scale social networks with
online diffusion provenance detection 154--166
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Abhishek Sinha and
Pradeepkumar Mani and
Jie Liu and
Ashley Flavel and
Dave Maltz Distributed load management algorithms
in anycast-based CDNs . . . . . . . . . 1--15
Ben-Jye Chang and
Syuan-Hong Liou Adaptive cooperative communication for
maximizing reliability and reward in
ultra-dense small cells LTE-A toward 5G
cellular networking . . . . . . . . . . 16--28
Salvatore D'Oro and
Laura Galluccio and
Panayotis Mertikopoulos and
Giacomo Morabito and
Sergio Palazzo Auction-based resource allocation in
OpenFlow multi-tenant networks . . . . . 29--41
Rui Wang and
Suixiang Gao and
Wenguo Yang and
Zhipeng Jiang Energy aware routing with link disjoint
backup paths . . . . . . . . . . . . . . 42--53
Sangkyu Park and
Hyunjoong Lee and
Chan-Byoung Chae and
Saewoong Bahk Massive MIMO operation in partially
centralized cloud radio access networks 54--64
Udo Schilcher and
Günther Brandner and
Christian Bettstetter Quantifying inhomogeneity of spatial
point patterns . . . . . . . . . . . . . 65--81
Tsung-Yu Tsai and
Yi-Hsueh Tsai and
Zsehong Tsai and
Shiann-Tsong Sheu A Novel Description approach based on
sorted rectangles for scheduling
information bearing in OFDMA systems . . 82--99
Jing Wang and
Jian Tang and
Guoliang Xue and
Dejun Yang Towards energy-efficient task scheduling
on smartphones in mobile crowd sensing
systems . . . . . . . . . . . . . . . . 100--109
Wai-Xi Liu and
Shun-Zheng Yu and
Guang Tan and
Jun Cai Information-centric networking with
built-in network coding to achieve
multisource transmission at
network-layer . . . . . . . . . . . . . 110--128
Julio Soto and
Michele Nogueira Corrigendum to ``A framework for
resilient and secure spectrum sensing on
cognitive radio networks'' [Computer
Networks volume \bf 79 (2015) 313--322] 129--129
Julio Soto and
Michele Nogueira A framework for resilient and secure
spectrum sensing on cognitive radio
networks . . . . . . . . . . . . . . . . 130--138
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Matthieu Coudron and
Stefano Secci An implementation of multipath TCP in
\tt ns3 . . . . . . . . . . . . . . . . 1--11
Douglas C. MacFarland and
Craig A. Shue and
Andrew J. Kalafut The best bang for the byte:
Characterizing the potential of DNS
amplification attacks . . . . . . . . . 12--21
Gloria Ciavarrini and
Valerio Luconi and
Alessio Vecchio Smartphone-based geolocation of Internet
hosts . . . . . . . . . . . . . . . . . 22--32
Roberto Di Pietro and
Gabriele Oligeri Enabling broadcast communications in
presence of jamming via probabilistic
pairing . . . . . . . . . . . . . . . . 33--46
Purnima Murali Mohan and
Tram Truong-Huu and
Mohan Gurusamy Fault tolerance in TCAM-limited software
defined networks . . . . . . . . . . . . 47--62
Geng Sun and
Yanheng Liu and
Ming Yang and
Aimin Wang and
Shuang Liang and
Ying Zhang Coverage optimization of VLC in smart
homes based on improved cuckoo search
algorithm . . . . . . . . . . . . . . . 63--78
Nasreen Anjum and
Dmytro Karamshuk and
Mohammad Shikh-Bahaei and
Nishanth Sastry Survey on peer-assisted content delivery
networks . . . . . . . . . . . . . . . . 79--95
Sunny Behal and
Krishan Kumar Detection of DDoS attacks and flash
events using novel information theory
metrics . . . . . . . . . . . . . . . . 96--110
Mohamed Koub\`aa and
Maroua Bakri and
Ammar Bouall\`egue and
Maurice Gagnaire QoT-aware elastic bandwidth allocation
and spare capacity assignment in
flexible island-based optical transport
networks under shared risk link group
constraints . . . . . . . . . . . . . . 111--140
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Reza Malekian and
Kui Wu and
Gianluca Reali and
Ning Ye and
Kevin Curran Cyber-physical systems and context-aware
sensing and computing . . . . . . . . . 1--4
Shu-Yu Kuo and
Yao-Hsin Chou and
Chi-Yuan Chen Quantum-inspired algorithm for
cyber-physical visual surveillance
deployment systems . . . . . . . . . . . 5--18
Wenlin Han and
Yang Xiao A novel detector to detect colluded
non-technical loss frauds in smart grid 19--31
Xu Zhang and
Mi Wen and
Kejie Lu and
Jingsheng Lei A privacy-aware data dissemination
scheme for smart grid with abnormal data
traceability . . . . . . . . . . . . . . 32--41
Guoming Tang and
Zhen Ling and
Fengyong Li and
Daquan Tang and
Jiuyang Tang Occupancy-aided energy disaggregation 42--51
David Rodriguez-Lozano and
Juan A. Gomez-Pulido and
Jose M. Lanza-Gutierrez and
Arturo Duran-Dominguez and
Ramon A. Fernandez-Diaz Context-aware prediction of access
points demand in Wi-Fi networks . . . . 52--61
Abdelrahman Abuarqoub and
Mohammad Hammoudeh and
Bamidele Adebisi and
Sohail Jabbar and
Ahc\`ene Bounceur and
Hashem Al-Bashar Dynamic clustering and management of
mobile wireless sensor networks . . . . 62--75
Fuliang Li and
Zhihan Lv Reliable vehicle type recognition based
on information fusion in multiple sensor
networks . . . . . . . . . . . . . . . . 76--84
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Alexandre Fontinele and
Iallen Santos and
Juarez Nolêto Neto and
Divanilson R. Campelo and
André Soares An Efficient IA-RMLSA Algorithm for
Transparent Elastic Optical Networks . . 1--14
Ajay Kumar Yadav and
Santosh Kumar Das and
Sachin Tripathi EFMMRP: Design of efficient fuzzy based
multi-constraint multicast routing
protocol for wireless ad-hoc network . . 15--23
Aveek K. Das and
Parth H. Pathak and
Chen-Nee Chuah and
Prasant Mohapatra Privacy-aware contextual localization
using network traffic analysis . . . . . 24--36
Dinil Mon Divakaran and
Li Ling Ko and
Le Su and
Vrizlynn L. L. Thing REX: Resilient and efficient data
structure for tracking network flows . . 37--53
Penghao Sun and
Julong Lan and
Peng Wang and
Teng Ma RFC: Range feature code for TCAM-based
packet classification . . . . . . . . . 54--61
Yao-Jen Tang and
Jian-Jhih Kuo and
Ming-Jer Tsai Zero-knowledge GPS-free data replication
and retrieval scheme in mobile ad hoc
networks using double-ruling and
landmark-labeling techniques . . . . . . 62--77
Song Yang and
Philipp Wieder and
Ramin Yahyapour and
Xiaoming Fu Energy-Aware Provisioning in Optical
Cloud Networks . . . . . . . . . . . . . 78--95
Hugo Marques and
Hélio Silva and
Evariste Logota and
Jonathan Rodriguez and
Seiamak Vahid and
Rahim Tafazolli Multiview real-time media distribution
for next generation networks . . . . . . 96--124
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Hongtao Shi and
Hongping Li and
Dan Zhang and
Chaqiu Cheng and
Wei Wu Efficient and robust feature extraction
and selection for traffic classification 1--16
Guilherme Domingues and
Edmundo de Souza e Silva and
Rosa M. M. Leão and
Daniel S. Menasché and
Don Towsley Enabling opportunistic search and
placement in cache networks . . . . . . 17--34
Julius Rückert and
Julian Wulfheide and
Tamara Knierim and
David Hausheer On clubs, screaming peers, and
duplicates: a comprehensive study of
BitTorrent Live . . . . . . . . . . . . 35--55
Sebastian Zander and
Lachlan L. H. Andrew and
Grenville Armitage Collaborative and privacy-preserving
estimation of IP address space
utilisation . . . . . . . . . . . . . . 56--70
Siba Narayan Swain and
Rahul Thakur and
C. Siva Ram Murthy Design and stochastic geometric analysis
of an efficient Q-Learning based
physical resource block allocation
scheme to maximize the spectral
efficiency of Device-to-Device overlaid
cellular networks . . . . . . . . . . . 71--85
Georgios Z. Papadopoulos and
Antoine Gallais and
Guillaume Schreiner and
Emery Jou and
Thomas Noel Thorough IoT testbed characterization:
From proof-of-concept to repeatable
experimentations . . . . . . . . . . . . 86--101
Yu-ning Dong and
Jia-jie Zhao and
Jiong Jin Novel feature selection and
classification of Internet video traffic
based on a hierarchical scheme . . . . . 102--111
R. Acedo-Hernández and
M. Toril and
S. Luna-Ramírez and
C. Úbeda A PCI planning algorithm for jointly
reducing reference signal collisions in
LTE uplink and downlink . . . . . . . . 112--123
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Yi Wu and
Ge Nong and
Mounir Hamdi Scalable pipelined IP lookup with prefix
tries . . . . . . . . . . . . . . . . . 1--11
Hatem Ibn-Khedher and
Emad Abd-Elrahman and
Ahmed E. Kamal and
Hossam Afifi OPAC: an optimal placement algorithm for
virtual CDN . . . . . . . . . . . . . . 12--27
Gianpiero Costantino and
Rajib Maiti and
Fabio Martinelli and
Paolo Santi Private mobility-cast for opportunistic
networks . . . . . . . . . . . . . . . . 28--42
Tong Guan and
Le Fang and
Wen Dong and
Dimitrios Koutsonikolas and
Geoffrey Challen and
Chunming Qiao Robust, cost-effective and scalable
localization in large indoor areas . . . 43--55
Xiaofeng Qiu and
Kai Zhang and
Qiuzheng Ren Global Flow Table: a convincing
mechanism for security operations in SDN 56--70
Mohammad Mahdi Tajiki and
Behzad Akbari and
Nader Mokari Optimal Qos-aware network
reconfiguration in software defined
cloud data centers . . . . . . . . . . . 71--86
Pedro Moreira da Silva and
Jaime Dias and
Manuel Ricardo Mistrustful P2P: Deterministic
privacy-preserving P2P file sharing
model to hide user content interests in
untrusted peer-to-peer networks . . . . 87--104
Zhang Bo and
Zhang Huan and
Li Meizi and
Zhao Qin and
Huang Jifeng Trust Traversal: a trust link detection
scheme in social network . . . . . . . . 105--125
Carlo Galiotto and
Nuno K. Pratas and
Linda Doyle and
Nicola Marchetti Effect of LOS/NLOS propagation on 5G
ultra-dense networks . . . . . . . . . . 126--140
Chiraz Houaidia and
Hanen Idoudi and
Adrien Van Den Bossche and
Leila Azouz Saidane and
Thierry Val Inter-flow and intra-flow interference
mitigation routing in wireless mesh
networks . . . . . . . . . . . . . . . . 141--156
Tongqing Zhou and
Zhiping Cai and
Kui Wu and
Yueyue Chen and
Ming Xu FIDC: a framework for improving data
credibility in mobile crowdsensing . . . 157--169
Wenzhong Li and
Xiao Chen and
Sanglu Lu Content synchronization using
device-to-device communication in smart
cities . . . . . . . . . . . . . . . . . 170--185
Yuxiang Zhang and
Lin Cui and
Yuan Zhang A stable matching based elephant flow
scheduling algorithm in data center
networks . . . . . . . . . . . . . . . . 186--197
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Liljana Gavrilovska and
Pero Latkoski and
Vladimir Atanasovski and
Ramjee Prasad and
Albena Mihovska and
Octavian Fratu and
Pavlos Lazaridis Radio Spectrum: Evaluation approaches,
coexistence issues and monitoring . . . 1--12
Tao Zhang and
Jing Liu An efficient and fast kinematics-based
algorithm for RFID network planning . . 13--24
Hossein Hadian Jazi and
Hugo Gonzalez and
Natalia Stakhanova and
Ali A. Ghorbani Detecting HTTP-based application layer
DoS attacks on web servers in the
presence of sampling . . . . . . . . . . 25--36
Ricardo Macedo and
Leonardo Melniski and
Aldri Santos and
Yacine Ghamri-Doudane and
Michele Nogueira SPARTA: a survival performance
degradation framework for identity
federations . . . . . . . . . . . . . . 37--52
Mohammad Rmayti and
Rida Khatoun and
Youcef Begriche and
Lyes Khoukhi and
Dominique Gaiti A stochastic approach for packet
dropping attacks detection in mobile Ad
hoc networks . . . . . . . . . . . . . . 53--64
Ming Chen and
Ke Ding and
Jie Hao and
Chao Hu and
Gaogang Xie and
Changyou Xing and
Bing Chen LCMSC: a lightweight collaborative
mechanism for SDN controllers . . . . . 65--75
Jung-Woong Sung and
Seung-Jae Han Data bundling for energy efficient
communication of wearable devices . . . 76--88
Cihangir Besiktas and
Didem Gözüpek and
Aydin Ulas and
Erhan Lokman Secure virtual network embedding with
flexible bandwidth-based revenue
maximization . . . . . . . . . . . . . . 89--99
Yustus Eko Oktian and
SangGon Lee and
HoonJae Lee and
JunHuy Lam Distributed SDN controller system: a
survey on design choice . . . . . . . . 100--111
Nir Gazit and
Francesco Malandrino and
David Hay Mobile operators and content providers
in next-generation SDN/NFV core
networks: Between cooperation and
competition . . . . . . . . . . . . . . 112--123
Luca Cominardi and
Fabio Giust and
Carlos J. Bernardos and
Antonio De La Oliva Distributed mobility management
solutions for next mobile network
architectures . . . . . . . . . . . . . 124--136
Lazaros Gkatzikis and
Vasilis Sourlas and
Carlo Fischione and
Iordanis Koutsopoulos Low complexity content replication
through clustering in Content-Delivery
Networks . . . . . . . . . . . . . . . . 137--151
Muhammad Mohsin Mehdi and
Imran Raza and
Syed Asad Hussain A game theory based trust model for
Vehicular Ad hoc Networks (VANETs) . . . 152--172
Juraj Gazda and
Gabriel Bugár and
Marcel Volosin and
Peter Drotár and
Denis Horváth and
Vladimír Gazda Dynamic spectrum leasing and retail
pricing using an experimental economy 173--184
Myriana Rifai and
Nicolas Huin and
Christelle Caillouet and
Frederic Giroire and
Joanna Moulierac and
Dino Lopez Pacheco and
Guillaume Urvoy-Keller Minnie: an SDN world with few compressed
forwarding rules . . . . . . . . . . . . 185--207
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Bing Leng and
Liusheng Huang and
Chunming Qiao and
Hongli Xu and
Xinglong Wang FTRS: a mechanism for reducing flow
table entries in software defined
networks . . . . . . . . . . . . . . . . 1--15
Jonathan Lutz and
Charles J. Colbourn and
Violet R. Syrotiuk Variable-weight topology-transparent
scheduling . . . . . . . . . . . . . . . 16--28
Jorge Werner and
Carla Merkle Westphall and
Carlos Becker Westphall Cloud identity management: a survey on
privacy strategies . . . . . . . . . . . 29--42
Hongli Xu and
Xiang-Yang Li and
Liusheng Huang and
Yang Du and
Zichun Liu Partial flow statistics collection for
load-balanced routing in software
defined networks . . . . . . . . . . . . 43--55
Dongyue Xue and
Eylem Ekici and
Rania Ibrahim and
Moustafa Youssef A novel queue-length-based CSMA
algorithm with improved delay
characteristics . . . . . . . . . . . . 56--69
Saravanan Sundaresan and
Robin Doss and
Selwyn Piramuthu and
Wanlei Zhou A secure search protocol for low cost
passive RFID tags . . . . . . . . . . . 70--82
Thibaut Stimpfling and
Normand Bélanger and
Omar Cherkaoui and
André Béliveau and
Ludovic Béliveau and
Yvon Savaria Extensions to decision-tree based packet
classification algorithms to address new
classification paradigms . . . . . . . . 83--95
Michal Morawski and
Przemyslaw Ignaciuk Network nodes play a game --- a routing
alternative in multihop ad-hoc
environments . . . . . . . . . . . . . . 96--104
Yi Wang and
Ye Xia Improving the queue size and delay
performance with the I-CSMA link
scheduling algorithm . . . . . . . . . . 105--119
Rahul Hiran and
Niklas Carlsson and
Nahid Shahmehri Collaborative framework for protection
against attacks targeting BGP and edge
networks . . . . . . . . . . . . . . . . 120--137
Li Chunlin and
Yan Xin and
Zhang Yang and
Luo Youlong Multiple context based service
scheduling for balancing cost and
benefits of mobile users and cloud
datacenter supplier in mobile cloud . . 138--152
Antônio J. Pinheiro and
Ethel B. Gondim and
Divanilson R. Campelo An efficient architecture for dynamic
middlebox policy enforcement in SDN
networks . . . . . . . . . . . . . . . . 153--162
Mahmood Salehi and
Azzedine Boukerche A novel packet salvaging model to
improve the security of opportunistic
routing protocols . . . . . . . . . . . 163--178
Zhixin Liu and
Shiyi Li and
Kai Ma and
Xinping Guan and
Xinbin Li Robust power allocation based on
hierarchical game with consideration of
different user requirements in two-tier
femtocell networks . . . . . . . . . . . 179--190
Min Sang Yoon and
Ahmed E. Kamal and
Zhengyuan Zhu Adaptive data center activation with
user request prediction . . . . . . . . 191--204
Leng-Gan Yi Rate-sensitive CoMP beamforming plus
sensible snooze for energy-QoE tradeoff
in cognitive small cell networks . . . . 205--216
Jinli Meng and
Fengyuan Ren and
Chuang Lin Modeling and understanding burst
transmission for energy efficient
Ethernet . . . . . . . . . . . . . . . . 217--230
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Asmita Roy and
Sadip Midya and
Koushik Majumder and
Santanu Phadikar and
Anurag Dasgupta Optimized secondary user selection for
quality of service enhancement of
two-tier multi-user Cognitive Radio
Network: a game theoretic approach . . . 1--18
Faizan Qamar and
Kaharudin Bin Dimyati and
Mhd Nour Hindia and
Kamarul Ariffin Bin Noordin and
Ahmed M. Al-Samman A comprehensive review on coordinated
multi-point operation for LTE-A . . . . 19--37
Peng Wu and
Li Pan Scalable influence blocking maximization
in social networks under competitive
independent cascade models . . . . . . . 38--50
Carlos Borrego and
Adrián Sánchez-Carmona and
Zhiyuan Li and
Sergi Robles Explore and wait: a composite
routing-delivery scheme for relative
profile-casting in opportunistic
networks . . . . . . . . . . . . . . . . 51--63
Sandip Karar and
Abhirup Das Barman Opportunistic spectrum access for
cooperative unlicensed femtocells in
two-tier heterogeneous networks
utilizing HARQ feedback . . . . . . . . 64--76
Yang Xu and
Jia Liu and
Yulong Shen and
Xiaohong Jiang and
Norio Shiratori Physical layer security-aware routing
and performance tradeoffs in ad hoc
networks . . . . . . . . . . . . . . . . 77--87
Jianhui Lv and
Xingwei Wang and
Min Huang and
Junling Shi and
Keqin Li and
Jie Li RISC: ICN routing mechanism
incorporating SDN and community division 88--103
Rodolfo I. Meneguette and
Azzedine Boukerche SERVitES: an efficient search and
allocation resource protocol based on
V2V communication for vehicular cloud 104--118
Lorenzo Donatiello and
Gustavo Marfia Models and performance evaluation of
event goodput in sensor platforms . . . 119--136
Jasaswi Prasad Mohanty and
Chittaranjan Mandal and
Chris Reade Distributed construction of minimum
Connected Dominating Set in wireless
sensor network using two-hop information 137--152
Sergio Barrachina-Muñoz and
Boris Bellalta and
Toni Adame and
Albert Bel Multi-hop communication in the uplink
for LPWANs . . . . . . . . . . . . . . . 153--168
Roberto Bonafiglia and
Amedeo Sapio and
Mario Baldi and
Fulvio Risso and
Paolo C. Pomi Enforcement of dynamic HTTP policies on
resource-constrained residential
gateways . . . . . . . . . . . . . . . . 169--183
Sain Saginbekov and
Arshad Jhumka Many-to-many data aggregation scheduling
in wireless sensor networks with two
sinks . . . . . . . . . . . . . . . . . 184--199
Yang Wang and
Shuang Wu and
Zhiyin Chen and
Xiaofeng Gao and
Guihai Chen Coverage problem with uncertain
properties in wireless sensor networks:
a survey . . . . . . . . . . . . . . . . 200--232
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Sotiris Nikoletseas and
Theofanis P. Raptis and
Christoforos Raptopoulos Radiation-constrained algorithms for
Wireless Energy Transfer in Ad hoc
Networks . . . . . . . . . . . . . . . . 1--10
S. Gheisari and
M. R. Meybodi A new reasoning and learning model for
Cognitive Wireless Sensor Networks based
on Bayesian networks and learning
automata cooperation . . . . . . . . . . 11--26
Philippe Ezran and
Yoram Haddad and
Mérouane Debbah Availability optimization in a
ring-based network topology . . . . . . 27--32
Qamas Gul Khan Safi and
Senlin Luo and
Chao Wei and
Limin Pan and
Qianrou Chen PIaaS: Cloud-oriented secure and
privacy-conscious parking information as
a service using VANETs . . . . . . . . . 33--45
Lei Xu and
Ke Xu and
Yong Jiang and
Fengyuan Ren and
Haiyang Wang Throughput optimization of TCP incast
congestion control in large-scale
datacenter networks . . . . . . . . . . 46--60
Zi-Yang Yang and
Yaw-Wen Kuo Efficient resource allocation algorithm
for overlay D2D communication . . . . . 61--71
Milan Erdelj and
Michal Król and
Enrico Natalizio Wireless Sensor Networks and Multi-UAV
systems for natural disaster management 72--86
Mohsen Riahi Manesh and
Sririam Subramaniam and
Hector Reyes and
Naima Kaabouch Real-time spectrum occupancy monitoring
using a probabilistic model . . . . . . 87--96
Xuming Fang and
Lei Nan and
Zonghua Jiang and
Lijun Chen Noise-aware fingerprint localization
algorithm for wireless sensor network
based on adaptive fingerprint Kalman
filter . . . . . . . . . . . . . . . . . 97--107
Azzedine Boukerche and
Xiaoli Zhou MAC transmission protocols for
delay-tolerant sensor networks . . . . . 108--125
Nikolaos Baroutis and
Mohamed Younis Load-conscious maximization of
base-station location privacy in
wireless sensor networks . . . . . . . . 126--139
Gaogang Xie and
Jingxiu Su and
Xin Wang and
Taihua He and
Guangxing Zhang and
Steve Uhlig and
Kave Salamatian Index-Trie: Efficient archival and
retrieval of network traffic . . . . . . 140--156
Rasmus L. Olsen and
Jacob Theilgaard Madsen and
Jakob G. Rasmussen and
Hans-Peter Schwefel On the use of information quality in
stochastic networked control systems . . 157--169
Xuya Jia and
Qing Li and
Yong Jiang and
Zehua Guo and
Jie Sun A low overhead flow-holding algorithm in
software-defined networks . . . . . . . 170--180
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Tobias Hoßfeld and
S.-H. Gary Chan and
Brian L. Mark and
Andreas Timm-Giel Softwarization and caching in NGN . . . 1--3
Thomas Zinner and
Stefan Geissler and
Stanislav Lange and
Steffen Gebert and
Michael Seufert and
Phuoc Tran-Gia A discrete-time model for optimizing the
processing time of virtualized network
functions . . . . . . . . . . . . . . . 4--14
Zehua Guo and
Ruoyan Liu and
Yang Xu and
Andrey Gushchin and
Anwar Walid and
H. Jonathan Chao STAR: Preventing flow-table overflow in
software-defined networks . . . . . . . 15--25
Sai Qian Zhang and
Qi Zhang and
Ali Tizghadam and
Byungchul Park and
Hadi Bannazadeh and
Raouf Boutaba and
Alberto Leon-Garcia TCAM space-efficient routing in a
software defined network . . . . . . . . 26--40
Qing Li and
Lei Wang and
Yong Jiang and
Mingwei Xu and
Jianping Wu A fast and incremental update scheme for
SDN based on a relation graph . . . . . 41--52
Qiang Gao and
Weiqin Tong and
Samina Kausar and
Lei Huang and
Chao Shen and
Shenan Zheng Congestion-aware multicast plug-in for
an SDN network operating system . . . . 53--63
Antonio Marotta and
Fabio D'Andreagiovanni and
Andreas Kassler and
Enrica Zola On the energy cost of robustness for
green virtual network function placement
in 5G virtualized infrastructures . . . 64--75
Tran Manh Nam and
Nguyen Huu Thanh and
Hoang Trung Hieu and
Nguyen Tien Manh and
Nguyen Van Huynh and
Hoang Duong Tuan Joint network embedding and server
consolidation for energy-efficient
dynamic data center virtualization . . . 76--89
Mirza Mohd Shahriar Maswood and
Chris Develder and
Edmundo Madeira and
Deep Medhi Energy-Efficient dynamic virtual network
traffic engineering for north-south
traffic in multi-location data center
networks . . . . . . . . . . . . . . . . 90--102
Muhammad Faran Majeed and
Syed Hassan Ahmed and
Siraj Muhammad and
Houbing Song and
Danda B. Rawat Multimedia streaming in
information-centric networking: a survey
and future perspectives . . . . . . . . 103--121
Thomas Bonald and
Léonce Mekinda and
Luca Muscariello Fair throughput allocation in
Information-Centric Networks . . . . . . 122--131
Rodrigo B. Mansilha and
Marinho P. Barcellos and
Emilio Leonardi and
Dario Rossi Exploiting parallelism in hierarchical
content stores for high-speed ICN
routers . . . . . . . . . . . . . . . . 132--145
M. Tortelli and
D. Rossi and
E. Leonardi A hybrid methodology for the performance
evaluation of Internet-scale cache
networks . . . . . . . . . . . . . . . . 146--159
Sladana Josilo and
Valentino Pacifici and
György Dán Distributed algorithms for content
placement in hierarchical cache networks 160--171
Gerhard Hasslinger and
Konstantinos Ntougias and
Frank Hasslinger and
Oliver Hohlfeld Performance evaluation for new web
caching strategies combining LRU with
score based object selection . . . . . . 172--186
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Rodolfo W. L. Coutinho and
Azzedine Boukerche and
Luiz F. M. Vieira and
Antonio A. F. Loureiro Performance modeling and analysis of
void-handling methodologies in
underwater wireless sensor networks . . 1--14
HR Shamna and
Jacob Lillykutty An energy and throughput efficient
distributed cooperative MAC protocol for
multihop wireless networks . . . . . . . 15--30
Tao Wang and
Baoxian Zhang and
Zheng Yao and
Hussein T. Mouftah Network coding based adaptive CSMA for
network utility maximization . . . . . . 31--43
Abolfazl Hajisami and
Dario Pompili Dynamic joint processing: Achieving high
spectral efficiency in uplink 5G
cellular networks . . . . . . . . . . . 44--56
Merve Ekmen and
Aysegül Altin-Kayhan Reliable and energy efficient wireless
sensor network design via conditional
multi-copying for multiple central nodes 57--68
Xing Ye and
Guozhen Cheng and
Xingguo Luo Maximizing SDN control resource
utilization via switch migration . . . . 69--80
Salvatore d'Ambrosio and
Salvatore de Pasquale and
Gerardo Iannone and
Delfina Malandrino and
Alberto Negro and
Giovanni Patimo and
Vittorio Scarano and
Raffaele Spinelli and
Rocco Zaccagnino Privacy as a proxy for Green Web
browsing: Methodology and
experimentation . . . . . . . . . . . . 81--99
Charu C. Aggarwal and
Amotz Bar-Noy and
Simon Shamoun On sensor selection in linked
information networks . . . . . . . . . . 100--113
Michele Luvisotto and
Federico Tramarin and
Stefano Vitturi A learning algorithm for rate selection
in real-time wireless LANs . . . . . . . 114--124
Thomas Clausen and
Jiazi Yi and
Ulrich Herberg Lightweight On-demand Ad hoc
Distance-vector Routing --- Next
Generation (LOADng): Protocol,
extension, and applicability . . . . . . 125--140
Zhenchun Wei and
Yan Zhang and
Xiangwei Xu and
Lei Shi and
Lin Feng A task scheduling algorithm based on
Q-learning and shared value function for
WSNs . . . . . . . . . . . . . . . . . . 141--149
Hyung-Sin Kim and
Hosoo Cho and
Hongchan Kim and
Saewoong Bahk DT-RPL: Diverse bidirectional traffic
delivery through RPL routing protocol in
low power and lossy networks . . . . . . 150--161
Enrico Gregori and
Barbara Guidi and
Alessandro Improta and
Luca Sani ICE: a memory-efficient BGP route
collecting engine . . . . . . . . . . . 162--173
Claudio Casetti and
Carla-Fabiana Chiasserini and
Francesco Malandrino and
Carlo Borgiattino Area formation and content assignment
for LTE broadcasting . . . . . . . . . . 174--186
Yingya Guo and
Zhiliang Wang and
Xia Yin and
Xingang Shi and
Jianping Wu Traffic engineering in hybrid SDN
networks with multiple traffic matrices 187--199
Jianhui Lv and
Xingwei Wang and
Kexin Ren and
Min Huang and
Keqin Li ACO-inspired Information-Centric
Networking routing mechanism . . . . . . 200--217
Dohyung Kim and
Younghoon Kim Enhancing NDN feasibility via dedicated
routing and caching . . . . . . . . . . 218--228
Xingwei Wang and
Jinhong Zhang and
Min Huang and
Shengxiang Yang A green intelligent routing algorithm
supporting flexible QoS for many-to-many
multicast . . . . . . . . . . . . . . . 229--245
Guangwei Xu and
Yanke Bai and
Qiao Pan and
Qiubo Huang and
Yanbin Yang Data verification tasks scheduling based
on dynamic resource allocation in mobile
big data storage . . . . . . . . . . . . 246--255
Lin Yang and
Mingxuan Yuan and
Yanjiao Chen and
Wei Wang and
Qian Zhang and
Jia Zeng Personalized user engagement modeling
for mobile videos . . . . . . . . . . . 256--267
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Manel Chenait and
Bahia Zebbane and
Chafika Benzaid and
Nadjib Badache Energy-efficient coverage protocol based
on stable and predictive scheduling in
wireless sensor networks . . . . . . . . 1--12
Shreyasee Mukherjee and
Shravan Sriram and
Tam Vu and
Dipankar Raychaudhuri EIR: Edge-aware inter-domain routing
protocol for the future mobile Internet 13--30
Yaw-Wen Kuo and
Jane-Hwa Huang A CSMA-based MAC protocol for WLANs with
automatic synchronization capability to
provide hard quality of service
guarantees . . . . . . . . . . . . . . . 31--42
Deke Guo and
Xiaoqiang Teng and
Zhiyao Hu and
Junjie Xie and
Bangbang Ren Source selection problem in multi-source
multi-destination multicasting . . . . . 43--55
Chia-Cheng Hu and
Chin-Feng Lai and
Ji-Gong Hou and
Yueh-Min Huang Timely scheduling algorithm for P2P
streaming over MANETs . . . . . . . . . 56--67
Santiago Egea Gómez and
Belén Carro Martínez and
Antonio J. Sánchez-Esguevillas and
Luis Hernández Callejo Ensemble network traffic classification:
Algorithm comparison and novel ensemble
scheme proposal . . . . . . . . . . . . 68--80
Fadoua Hassen and
Lotfi Mhamdi A scalable packet-switch architecture
based on OQ NoCs for data center
networks . . . . . . . . . . . . . . . . 81--93
Ivan O. Nunes and
Clayson Celes and
Pedro O. S. Vaz de Melo and
Antonio A. F. Loureiro GROUPS-NET: Group meetings aware routing
in multi-hop D2D networks . . . . . . . 94--108
Daniel S. Marcon and
Fabrício M. Mazzola and
Marinho P. Barcellos Achieving minimum bandwidth guarantees
and work-conservation in large-scale,
SDN-based datacenter networks . . . . . 109--125
Wahida Mansouri and
Faouzi Zarai and
Kais Mnif and
Lotfi Kamoun Cross layer architecture with integrated
MIH in heterogeneous wireless networks 126--137
Yongbin Yim and
Hyunchong Cho and
Sang-Ha Kim and
Euisin Lee and
Mario Gerla Vehicle location service scheme based on
road map in Vehicular Sensor Networks 138--150
Farshad Keyvan Ghazvini and
Mustafa Mehmet-Ali and
Mahmoud Doughan Scalable hybrid MAC protocol for M2M
communications . . . . . . . . . . . . . 151--160
Yongqiang Wang and
Krishna Mosalakanti and
Felipe Núñez and
Socrates Deligeorges and
Francis J. Doyle III A kernel module for pulse-coupled time
synchronization of sensor networks . . . 161--172
Hamed Hellaoui and
Mouloud Koudil and
Abdelmadjid Bouabdallah Energy-efficient mechanisms in security
of the Internet of Things: a survey . . 173--189
Kyu-Hwan Lee and
Dong-Hyuk Jang and
Sung-Jae Lee and
Jae-Ryong Cha Target BER selection scheme in LMS
networks using AL-FEC systems . . . . . 190--199
Eduardo K. Viegas and
Altair O. Santin and
Luiz S. Oliveira Toward a reliable anomaly-based
intrusion detection in real-world
environments . . . . . . . . . . . . . . 200--216
Pradipta Ghosh and
He Ren and
Reza Banirazi and
Bhaskar Krishnamachari and
Edmond Jonckheere Empirical evaluation of the
heat-diffusion collection protocol for
wireless sensor networks . . . . . . . . 217--232
Frank Wetzels and
Hans van den Berg and
Joost Bosman and
Rob van der Mei Flow termination signaling in the
centralized pre-congestion notification
architecture . . . . . . . . . . . . . . 233--242
Krisztián Németh and
Attila K\Horösi and
Gábor Rétvári Optimal resource pooling over legacy
equal-split load balancing schemes . . . 243--265
Manassés Ferreira Neto and
Olga Goussevskaia and
Vinícius Fernandes dos Santos Connectivity with backbone structures in
obstructed wireless networks . . . . . . 266--281
Samira Chouikhi and
In\`es El Korbi and
Yacine Ghamri-Doudane and
Leila Azouz Saidane Distributed connectivity restoration in
multichannel wireless sensor networks 282--295
Thomas Valerrian Pasca Santhappan and
Sumanta Patro and
Bheemarjuna Reddy Tamma and
Antony Franklin A. Network Coordination Function for uplink
traffic steering in tightly coupled LTE
Wi-Fi networks . . . . . . . . . . . . . 296--316
Agnese V. Ventrella and
Giuseppe Piro and
L. Alfredo Grieco Publish--subscribe in mobile information
centric networks: Modeling and
performance evaluation . . . . . . . . . 317--339
Salman Goli-Bidgoli and
Naser Movahhedinia Determining vehicles' radio transmission
range for increasing cognitive radio
VANET (CR-VANET) reliability using a
trust management system . . . . . . . . 340--351
Han Zhang and
Xingang Shi and
Yingya Guo and
Zhiliang Wang and
Xia Yin More load, more differentiation --- Let
more flows finish before deadline in
data center networks . . . . . . . . . . 352--367
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Ahmed E. Kamal and
Muhammad Imran and
Hsiao-Hwa Chen and
Athanasios V. Vasilakos Survivability strategies for emerging
wireless networks . . . . . . . . . . . 1--4
Muhammad Zeeshan Asghar and
Paavo Nieminen and
Seppo Hämäläinen and
Tapani Ristaniemi and
Muhammad Ali Imran and
Timo Hämäläinen Towards proactive context-aware
self-healing for $5$G networks . . . . . 5--13
Sonia Ben Rejeb and
Nidal Nasser and
Samer Mansour and
Massa Boujlbane Centralized SON function for operator
optimal strategies in heterogeneous
networks . . . . . . . . . . . . . . . . 14--27
Lang Xie and
Poul E. Heegaard and
Yuming Jiang Survivability analysis of a two-tier
infrastructure-based wireless network 28--40
Louai Al-Awami and
Hossam S. Hassanein Robust decentralized data storage and
retrieval for wireless networks . . . . 41--50
Bhaskar Das and
Jalal Almhana A new cooperative communication
algorithm for improving connectivity in
the event of network failure in VANETs 51--62
Wassila Lalouani and
Mohamed Younis and
Nadjib Badache Optimized repair of a partitioned
network topology . . . . . . . . . . . . 63--77
Enver Ever and
Fadi M. Al-Turjman and
Hadi Zahmatkesh and
Mustafa Riza Modelling green HetNets in dynamic ultra
large-scale applications: a case-study
for femtocells in smart-cities . . . . . 78--93
Seif eddine Hammami and
Hossam Afifi Fault-tolerant dynamic planning for
wireless mesh networks based on real
load profiles . . . . . . . . . . . . . 94--107
Sanaa Sharafeddine and
Karim Jahed and
Omar Farhat and
Zaher Dawy Failure recovery in wireless content
distribution networks with
device-to-device cooperation . . . . . . 108--122
Olga Galinina and
Sergey Andreev and
Mikhail Komarov and
Svetlana Maltseva Leveraging heterogeneous device
connectivity in a converged 5G-IoT
ecosystem . . . . . . . . . . . . . . . 123--132
Di Li and
Xiaomin Li and
Jiafu Wan A cloud-assisted handover optimization
strategy for mobile nodes in industrial
wireless networks . . . . . . . . . . . 133--141
A. Tahir and
S. A. Abid and
Nadir Shah Logical clusters in a DHT-paradigm for
scalable routing in MANETs . . . . . . . 142--153
Debiao He and
Sherali Zeadally and
Libing Wu and
Huaqun Wang Analysis of handover authentication
protocols for mobile wireless networks
using identity-based public key
cryptography . . . . . . . . . . . . . . 154--163
Caidan Zhao and
Minmin Huang and
Lianfen Huang and
Xiaojiang Du and
Mohsen Guizani A robust authentication scheme based on
physical-layer phase noise fingerprint
for emerging wireless networks . . . . . 164--171
Prasenjit Bhavathankar and
Subhadeep Sarkar and
Sudip Misra Optimal decision rule-based ex-ante
frequency hopping for jamming avoidance
in wireless sensor networks . . . . . . 172--185
Hossein Soleimani and
Thomas Begin and
Azzedine Boukerche Safety message generation rate
adaptation in LTE-based vehicular
networks . . . . . . . . . . . . . . . . 186--196
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Sanaa Sharafeddine and
Karim Jahed and
Marwan Fawaz Optimized device centric aggregation
mechanisms for mobile devices with
multiple wireless interfaces . . . . . . 1--16
Yi-Ting Peng and
Sok-Ian Sou and
Meng-Hsun Tsai and
Chuan-Sheng Lin Multipath mobile data offloading of
deadline assurance with policy and
charging control in cellular/WiFi
networks . . . . . . . . . . . . . . . . 17--27
Erfaneh Vahedi and
Majid Bayat and
Mohammad Reza Pakravan and
Mohammad Reza Aref A secure ECC-based privacy preserving
data aggregation scheme for smart grids 28--36
Jian Zhang and
Yang Yang and
Yanjiao Chen and
Jing Chen and
Qian Zhang A general framework to design secure
cloud storage protocol using homomorphic
encryption scheme . . . . . . . . . . . 37--50
Haojun Huang and
Junbao Zhang and
Xu Zhang and
Benshun Yi and
Qilin Fan and
Feng Li EMGR: Energy-efficient multicast
geographic routing in wireless sensor
networks . . . . . . . . . . . . . . . . 51--63
YiPeng Wang and
Xiaochun Yun and
Yongzheng Zhang and
Liwei Chen and
Tianning Zang Rethinking robust and accurate
application protocol identification . . 64--78
Soojeon Lee and
Dongman Lee and
Myungjin Lee and
Hyungsoo Jung and
Byoung-Sun Lee Randomizing TCP payload size for TCP
fairness in data center networks . . . . 79--92
Mehdi Malboubi and
Yanlei Gong and
Zijun Yang and
Xiong Wang and
Chen-Nee Chuah and
Puneet Sharma Software defined network inference with
evolutionary optimal observation
matrices . . . . . . . . . . . . . . . . 93--104
Amin Ghalami Osgouei and
Amir Khorsandi Koohanestani and
Hossein Saidi and
Ali Fanian Online assignment of non-SDN virtual
network nodes to a physical SDN . . . . 105--116
Bruno P. Santos and
Luiz F. M. Vieira and
Marcos A. M. Vieira CGR: Centrality-based green routing for
Low-power and Lossy Networks . . . . . . 117--128
Sara El Alaoui and
Byrav Ramamurthy EAODR: a novel routing algorithm based
on the Modified Temporal Graph network
model for DTN-based Interplanetary
Networks . . . . . . . . . . . . . . . . 129--141
K. Katsalis and
B. Rofoee and
G. Landi and
J. F. Riera and
K. Kousias and
M. Anastasopoulos and
L. Kiraly and
A. Tzanakaki and
T. Korakis Implementation experience in
multi-domain SDN: Challenges,
consolidation and future directions . . 142--158
Orhan Ermis and
Serif Bahtiyar and
Emin Anarim and
M. Ufuk Çaglayan A key agreement protocol with partial
backward confidentiality . . . . . . . . 159--177
Lei Ding and
Jun Liu and
Tao Qin and
Haifei Li Internet traffic classification based on
expanding vector of flow . . . . . . . . 178--192
Jianwei Niu and
Shihao Wang and
Wei Niu and
Mohammed Atiquzzaman User-aware partitioning algorithm for
mobile cloud computing based on maximum
graph cuts . . . . . . . . . . . . . . . 193--206
Gabriel Scalosub Towards optimal buffer management for
streams with packet dependencies . . . . 207--214
Ying Qu and
Bryan Ng and
Michael Homer Optimising channel assignment to prevent
flow starvation and improve fairness for
planning single radio WMNs in built
environments . . . . . . . . . . . . . . 215--231
Phi Le Nguyen and
Yusheng Ji and
Zhi Liu and
Huy Vu and
Khanh-Van Nguyen Distributed hole-bypassing protocol in
WSNs with constant stretch and load
balancing . . . . . . . . . . . . . . . 232--250
Ji Qi and
Fei Hu and
Xin Li and
Koushik A. M. and
Sunil Kumar 3-ent (resili-ent, intellig-ent, and
effici-ent) medium access control for
full-duplex, jamming-aware, directional
airborne networks . . . . . . . . . . . 251--260
João Marcelo Ceron and
Cíntia Borges Margi and
Lisandro Zambenedetti Granville MARS: From traffic containment to
network reconfiguration in
malware-analysis systems . . . . . . . . 261--272
Rahul Thakur and
Vijeth J. Kotagi and
C. Siva Ram Murthy Resource allocation and cell selection
framework for LTE-Unlicensed femtocell
networks . . . . . . . . . . . . . . . . 273--283
Hyunjoong Lee and
Sangkyu Park and
Saewoong Bahk An opportunistic scheduling algorithm
using aged CSI in massive MIMO systems 284--296
Jia Wu and
Zhigang Chen and
Ming Zhao Effective information transmission based
on socialization nodes in opportunistic
networks . . . . . . . . . . . . . . . . 297--305
Yue Qiu and
Maode Ma and
Shuo Chen An anonymous authentication scheme for
multi-domain machine-to-machine
communication in cyber-physical systems 306--318
Aya Ayadi and
Oussama Ghorbel and
Abdulfattah M. Obeid and
Mohamed Abid Outlier detection approaches for
wireless sensor networks: a survey . . . 319--333
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Harry Rudin Change at the Helm: Welcome, Farewell,
Advice, Thanks: Special Issues . . . . . iii--iii
J. J. P. C. Rodrigues and
S. Zeadally and
N. Kumar and
G. Han Special Issue on 5G Wireless Networks
for IoT and Body Sensors . . . . . . . . 335--339
Jaime Lloret and
Lorena Parra and
Miran Taha and
Jesus Tomás An architecture and protocol for smart
continuous eHealth monitoring using 5G 340--351
Radu-Corneliu Marin and
Radu-Ioan Ciobanu and
Ciprian Dobre and
Constandinos X. Mavromoustakis and
George Mastorakis A context-aware collaborative model for
smartphone energy efficiency over 5G
wireless networks . . . . . . . . . . . 352--362
Ilsun You and
Jong-Hyouk Lee SPFP: Ticket-based secure handover for
fast proxy mobile IPv6 in 5G networks 363--372
Carolina Fortuna and
Adnan Bekan and
Tomaz Javornik and
Gregor Cerar and
Mihael Mohorcic Software interfaces for control,
optimization and update of 5G machine
type communication networks . . . . . . 373--383
Shuai Han and
Cheng Guo and
Weixiao Meng and
Cheng Li A flexible resource scheduling scheme
for an adaptive SCMA system . . . . . . 384--391
Yujie Li and
Zhibin Gao and
Lianfen Huang and
Xiaojiang Du and
Mohsen Guizani Resource management for future mobile
networks: Architecture and technologies 392--398
Yang Liu and
Changqiao Xu and
Yufeng Zhan and
Zhixin Liu and
Jianfeng Guan and
Hongke Zhang Incentive mechanism for computation
offloading using edge computing: a
Stackelberg game approach . . . . . . . 399--409
Lijun Yang and
Chao Ding and
Meng Wu and
Kun Wang Robust detection of false data injection
attacks for data aggregation in an
Internet of Things-based environmental
surveillance . . . . . . . . . . . . . . 410--428
Xiong Li and
Maged Hamada Ibrahim and
Saru Kumari and
Arun Kumar Sangaiah and
Vidushi Gupta and
Kim-Kwang Raymond Choo Anonymous mutual authentication and key
agreement scheme for wearable sensors in
wireless body area networks . . . . . . 429--443
Ibrar Yaqoob and
Ejaz Ahmed and
Muhammad Habib ur Rehman and
Abdelmuttlib Ibrahim Abdalla Ahmed and
Mohammed Ali Al-garadi and
Muhammad Imran and
Mohsen Guizani The rise of ransomware and emerging
security challenges in the Internet of
Things . . . . . . . . . . . . . . . . . 444--458
Ejaz Ahmed and
Ibrar Yaqoob and
Ibrahim Abaker Targio Hashem and
Imran Khan and
Abdelmuttlib Ibrahim Abdalla Ahmed and
Muhammad Imran and
Athanasios V. Vasilakos The role of big data analytics in
Internet of Things . . . . . . . . . . . 459--471
Chi-Yuan Chen and
Hsin-Min Wu and
Lei Wang and
Chia-Mu Yu Practical integrity preservation for
data streaming in cloud-assisted
healthcare sensor systems . . . . . . . 472--480
Tie Qiu and
Xize Liu and
Min Han and
Mingchu Li and
Yushuang Zhang SRTS: a Self-Recoverable Time
Synchronization for sensor networks of
healthcare IoT . . . . . . . . . . . . . 481--492
Zhenyu Zhou and
Junhao Feng and
Yunjian Jia and
Shahid Mumtaz and
Kazi Mohammed Saidul Huq and
Jonathan Rodriguez and
Di Zhang Energy-efficient game-theoretical random
access for M2M communications in
overlapped cellular networks . . . . . . 493--501
Long Zhao and
Kan Zheng and
Periklis Chatzimisios Hybrid information and energy transfer
in ultra-dense HetNets . . . . . . . . . 502--509
Jacopo De Benedetto and
Paolo Bellavista and
Luca Foschini Proximity discovery and data
dissemination for mobile crowd sensing
using LTE direct . . . . . . . . . . . . 510--521
Bang Wang and
Qiang Yang and
Laurence T. Yang and
Chunsheng Zhu On minimizing energy consumption cost in
green heterogeneous wireless networks 522--535
Chun-Cheng Lin and
Ching-Tsorng Tsai and
Der-Jiunn Deng and
I-Hsin Tsai and
Shun-Yu Jhong Minimizing electromagnetic pollution and
power consumption in green heterogeneous
small cell network deployment . . . . . 536--547
Ahmed Harbouche and
Noureddine Djedi and
Mohammed Erradi and
Jalel Ben-Othman and
Abdellatif Kobbane Model driven flexible design of a
wireless body sensor network for health
monitoring . . . . . . . . . . . . . . . 548--571
Satya J. Borah and
Sanjay Kumar Dhurandher and
Isaac Woungang and
Vinesh Kumar A game theoretic context-based routing
protocol for opportunistic networks in
an IoT scenario . . . . . . . . . . . . 572--584
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Ian F. Akyildiz and
Harry Rudin and
Burkhard Stiller Editorial for COMNET 2017 . . . . . . . iii--iii
Ashanie Gunathillake and
Andrey V. Savkin and
Anura P. Jayasumana Topology mapping algorithm for $2$D and
$3$D Wireless Sensor Networks based on
maximum likelihood estimation . . . . . 1--15
A. Hafsaoui and
A. Dandoush and
G. Urvoy-Keller and
M. Siekkinen and
D. Collange A fine-grained response time analysis
technique in heterogeneous environments 16--33
Islam Tharwat Abdel-Halim and
Hossam Mahmoud Ahmed Fahmy Prediction-based protocols for vehicular
Ad Hoc Networks: Survey and taxonomy . . 34--50
Ran Shu and
Fengyuan Ren and
Jiao Zhang and
Tong Zhang and
Chuang Lin Analysing and improving convergence of
quantized congestion notification in
Data Center Ethernet . . . . . . . . . . 51--64
Antonio Marotta and
Stefano Avallone and
Andreas Kassler A Joint Power Efficient Server and
Network Consolidation approach for
virtualized data centers . . . . . . . . 65--80
Surabhi Abhimithra Karthikeya and
Revathy Narayanan and
Siva Ram Murthy C. Power-aware gateway connectivity in
battery-powered dynamic IoT networks . . 81--93
Kashif Bilal and
Osman Khalid and
Aiman Erbad and
Samee U. Khan Potentials, trends, and prospects in
edge technologies: Fog, cloudlet, mobile
edge, and micro data centers . . . . . . 94--120
Animesh Roy and
Tamaghna Acharya and
Sipra DasBit Quality of service in delay tolerant
networks: a survey . . . . . . . . . . . 121--133
Anand Seetharam and
Arti Ramesh On the goodput of flows in heterogeneous
mobile networks . . . . . . . . . . . . 134--144
Hoda Ayatollahi and
Mohammad Khansari and
Hamid R. Rabiee A push-pull network coding protocol for
live peer-to-peer streaming . . . . . . 145--155
A. Meloni and
P. A. Pegoraro and
L. Atzori and
A. Benigni and
S. Sulis Cloud-based IoT solution for state
estimation in smart grids: Exploiting
virtualization and edge-intelligence
technologies . . . . . . . . . . . . . . 156--165
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Weibo Chu and
Mostafa Dehghan and
John C. S. Lui and
Don Towsley and
Zhi-Li Zhang Joint cache resource allocation and
request routing for in-network caching
services . . . . . . . . . . . . . . . . 1--14
Reza Ghebleh A comparative classification of
information dissemination approaches in
vehicular ad hoc networks from
distinctive viewpoints: a survey . . . . 15--37
Xingwei Wang and
Jianhui Lv and
Min Huang and
Keqin Li and
Jie Li and
Kexin Ren Energy-efficient ICN routing mechanism
with QoS support . . . . . . . . . . . . 38--51
Daeho Kang and
Hyung-Sin Kim and
Changhee Joo and
Saewoong Bahk ORGMA: Reliable opportunistic routing
with gradient forwarding for MANETs . . 52--64
Xuya Jia and
Yong Jiang and
Zehua Guo and
Gengbiao Shen and
Lei Wang Intelligent path control for
energy-saving in hybrid SDN networks . . 65--76
Giovanni Nardini and
Giovanni Stea and
Antonio Virdis A scalable data-plane architecture for
one-to-one device-to-device
communications in LTE-Advanced . . . . . 77--95
Zhibo Wang and
Ran Tan and
Jiahui Hu and
Jing Zhao and
Qian Wang and
Feng Xia and
Xiaoguang Niu Heterogeneous incentive mechanism for
time-sensitive and location-dependent
crowdsensing networks with random
arrivals . . . . . . . . . . . . . . . . 96--109
Xiaonan Wang and
Zhengxiong Dou and
Dong Wang and
Qi Sun Mobility management for 6LoWPAN WSN . . 110--128
Fátima Castro-Jul and
Rebeca P. Díaz-Redondo and
Ana Fernández-Vilas Collaboratively assessing urban alerts
in ad hoc participatory sensing . . . . 129--143
Durbadal Chattaraj and
Monalisa Sarma and
Ashok Kumar Das A new two-server authentication and key
agreement protocol for accessing secure
cloud services . . . . . . . . . . . . . 144--164
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Hui Cai and
Yanmin Zhu and
Zhenni Feng A truthful incentive mechanism for
mobile crowd sensing with
location-sensitive weighted tasks . . . 1--14
Junxiao He and
Oliver Yang and
Yifeng Zhou Using flow cost to globally allocate and
optimize limited bandwidth in multipath
routing . . . . . . . . . . . . . . . . 15--25
Meitian Huang and
Weifa Liang and
Zichuan Xu and
Wenzheng Xu and
Song Guo and
Yinlong Xu Online unicasting and multicasting in
software-defined networks . . . . . . . 26--39
Yufeng Zhan and
Yuanqing Xia and
Jinhui Zhang Incentive mechanism in platform-centric
mobile crowdsensing: a one-to-many
bargaining approach . . . . . . . . . . 40--52
Abdullah Yasin Nur and
Mehmet Engin Tozal Cross-AS (X-AS) Internet topology
mapping . . . . . . . . . . . . . . . . 53--67
Miguel L. Bote-Lorenzo and
Eduardo Gómez-Sánchez and
Carlos Mediavilla-Pastor and
Juan I. Asensio-Pérez Online machine learning algorithms to
predict link quality in community
wireless mesh networks . . . . . . . . . 68--80
Hongtao Shi and
Hongping Li and
Dan Zhang and
Chaqiu Cheng and
Xuanxuan Cao An efficient feature generation approach
based on deep learning and feature
selection techniques for traffic
classification . . . . . . . . . . . . . 81--98
Hideo Kobayashi and
Eiichi Kameda and
Yoshiaki Terashima and
Norihiko Shinomiya Towards sustainable heterogeneous
wireless networks: a decision strategy
for AP selection with dynamic graphs . . 99--107
Fu Xiao and
Qianwen Miao and
Xiaohui Xie and
Lijuan Sun and
Ruchuan Wang SHMO: a seniors health monitoring system
based on energy-free sensing . . . . . . 108--117
Yue Li and
Luigi Iannone Assessing Locator/Identifier Separation
Protocol interworking performance
through RIPE Atlas . . . . . . . . . . . 118--128
Mumtaz Karatas Optimal deployment of heterogeneous
sensor networks for a hybrid point and
barrier coverage application . . . . . . 129--144
Quang-Tuan Thieu and
Hung-Yun Hsieh Outage protection for cellular-mode
users in device-to-device communications
through stochastic optimization . . . . 145--160
Mourad Benmalek and
Yacine Challal and
Abdelouahid Derhab and
Abdelmadjid Bouabdallah VerSAMI: Versatile and Scalable key
management for Smart Grid AMI systems 161--179
Mohammed S. Hadi and
Ahmed Q. Lawey and
Taisir E. H. El-Gorashi and
Jaafar M. H. Elmirghani Big data analytics for wireless and
wired network design: a survey . . . . . 180--199
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Abhishek Gupta and
M. Farhan Habib and
Uttam Mandal and
Pulak Chowdhury and
Massimo Tornatore and
Biswanath Mukherjee On service-chaining strategies using
Virtual Network Functions in operator
networks . . . . . . . . . . . . . . . . 1--16
J. Carmona-Murillo and
V. Friderikos and
J. L. González-Sánchez A hybrid DMM solution and trade-off
analysis for future wireless networks 17--32
Wei Li and
Changxin Huang and
Chao Xiao and
Songchen Han A heading adjustment method in wireless
directional sensor networks . . . . . . 33--41
Abbas Arghavani and
Mahdi Arghavani and
Mahmood Ahmadi and
Paul Crane Attacker-Manager Game Tree (AMGT): A new
framework for visualizing and analysing
the interactions between attacker and
network security manager . . . . . . . . 42--58
Yiran Shen and
Chengwen Luo and
Dan Yin and
Hongkai Wen and
Rus Daniela and
Wen Hu Privacy-preserving sparse representation
classification in cloud-enabled mobile
applications . . . . . . . . . . . . . . 59--72
Piotr Borylo and
Jerzy Domzal and
Robert Wójcik Survivable automatic hidden bypasses in
Software-Defined Networks . . . . . . . 73--89
Ibrahim Ayad and
Youngbin Im and
Eric Keller and
Sangtae Ha A Practical Evaluation of Rate
Adaptation Algorithms in HTTP-based
Adaptive Streaming . . . . . . . . . . . 90--103
Jun Xu and
Chengcheng Guo and
Hao Zhang Joint channel allocation and power
control based on PSO for cellular
networks with D2D communications . . . . 104--119
Chaonong Xu and
Kaichi Ma and
Yongjun Xu Complexity of minimum uplink scheduling
in backbone-assisted successive
interference cancellation-based wireless
networks . . . . . . . . . . . . . . . . 120--129
Tian Wang and
Jiandian Zeng and
MD Zakirul Alam Bhuiyan and
Yonghong Chen and
Yiqiao Cao and
Hui Tian and
Mande Xie Energy-efficient relay tracking with
multiple mobile camera sensors . . . . . 130--140
Sana Belguith and
Nesrine Kaaniche and
Maryline Laurent and
Abderrazak Jemai and
Rabah Attia PHOABE: Securely outsourcing
multi-authority attribute based
encryption with policy hidden for cloud
assisted IoT . . . . . . . . . . . . . . 141--156
Hui Cui and
Robert H. Deng and
Junzuo Lai and
Xun Yi and
Surya Nepal An efficient and expressive
ciphertext-policy attribute-based
encryption scheme with partially hidden
access structures, revisited . . . . . . 157--165
Huan Chen and
Xiong Wang and
Yangming Zhao and
Tongyu Song and
Yang Wang and
Shizhong Xu and
Lemin Li MOSC: a method to assign the outsourcing
of service function chain across
multiple clouds . . . . . . . . . . . . 166--182
Jessie Hui Wang and
Changqing An A study on geographic properties of
Internet routing . . . . . . . . . . . . 183--194
Shadi Moazzeni and
Mohammad Reza Khayyambashi and
Naser Movahhedinia and
Franco Callegati On reliability improvement of
Software-Defined Networks . . . . . . . 195--211
Bo Yi and
Xingwei Wang and
Keqin Li and
Sajal K. Das and
Min Huang A comprehensive survey of Network
Function Virtualization . . . . . . . . 212--262
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Sergio M. Martínez-Chavez and
Mario E. Rivero-Angeles and
Laura I. Garay-Jimenez and
Elena F. Ruiz-Ledesma Cognitive radio system for interference
reduction in BANETs focused on epilepsy
diagnosis . . . . . . . . . . . . . . . 1--22
G. Stergiopoulos and
D. Gritzalis and
V. Kouktzoglou Using formal distributions for threat
likelihood estimation in cloud-enabled
IT risk assessment . . . . . . . . . . . 23--45
Javier Lopez and
Juan E. Rubio Access control for cyber-physical
systems interconnected to the cloud . . 46--54
Andrea Detti and
Lorenzo Bracciale and
Pierpaolo Loreti and
Nicola Blefari Melazzi Modeling LRU cache with invalidation . . 55--65
Long Cheng and
Jianwei Niu and
Chengwen Luo and
Lei Shu and
Linghe Kong and
Zhiwei Zhao and
Yu Gu Towards minimum-delay and
energy-efficient flooding in
low-duty-cycle wireless sensor networks 66--77
Seyed Morteza Pournaghi and
Behnam Zahednejad and
Majid Bayat and
Yaghoub Farjami NECPPA: A novel and efficient
conditional privacy-preserving
authentication scheme for VANET . . . . 78--92
Francesco Malandrino and
Carla-Fabiana Chiasserini and
Claudio Casetti Virtualization-based evaluation of
backhaul performance in vehicular
applications . . . . . . . . . . . . . . 93--104
Daisuke Satoh and
Yuji Takano and
Ryunosuke Sudo and
Takemi Mochida Reduction of communication demand under
disaster congestion using control to
change human communication behavior
without direct restriction . . . . . . . 105--115
Xiaoxiong Weng and
Yongxin Liu and
Houbing Song and
Shushen Yao and
Pengfei Zhang Mining urban passengers' travel patterns
from incomplete data with use cases . . 116--126
Mario Collotta and
Giovanni Pau and
Daniel G. Costa A fuzzy-based approach for
energy-efficient Wi-Fi communications in
dense wireless multimedia sensor
networks . . . . . . . . . . . . . . . . 127--139
Ilhan Demirci and
Ömer Korçak Cell breathing algorithms for load
balancing in Wi-Fi/cellular
heterogeneous networks . . . . . . . . . 140--151
Aous Thabit Naman and
Yu Wang and
Hassan Habibi Gharakheili and
Vijay Sivaraman and
David Taubman Responsive high throughput congestion
control for interactive applications
over SDN-enabled networks . . . . . . . 152--166
Wei Feng and
Yu Qin and
Shijun Zhao and
Dengguo Feng AAoT: Lightweight attestation and
authentication of low-resource things in
IoT and CPS . . . . . . . . . . . . . . 167--182
A. K. Marnerides and
D. P. Pezaros and
D. Hutchison Internet traffic characterisation:
Third-order statistics and higher-order
spectra for precise traffic modelling 183--201
Quanzhong Li and
Sai Zhao Secure transmission for multi-antenna
wireless powered communication with
co-channel interference and self-energy
recycling . . . . . . . . . . . . . . . 202--214
Lakshmikanth Guntupalli and
Jorge Martinez-Bauset and
Frank Y. Li Performance of frame transmissions and
event-triggered sleeping in duty-cycled
WSNs with error-prone wireless links . . 215--227
Rafael Kunst and
Leandro Avila and
Edison Pignaton and
Sergio Bampi and
Juergen Rochol Improving network resources allocation
in smart cities video surveillance . . . 228--244
G. Siracusano and
S. Salsano and
P. L. Ventre and
A. Detti and
O. Rashed and
N. Blefari-Melazzi A framework for experimenting ICN over
SDN solutions using physical and virtual
testbeds . . . . . . . . . . . . . . . . 245--259
Yanxiao Zhao and
MD Nashid Anjum and
Lina Pu and
Guodong Wang and
Yu Luo Optimal On Demand Delay-constrained Fair
Distribution for self-coexistence WRAN 260--271
Ismail Bennis and
Hac\`ene Fouchal and
Kandaraj Piamrat and
Marwane Ayaida Efficient queuing scheme through
cross-layer approach for multimedia
transmission over WSNs . . . . . . . . . 272--282
Saptarshi Chaudhuri and
Irfan Baig and
Debabrata Das A novel QoS aware medium access control
scheduler for LTE-advanced network . . . 1--14
Hui Xia and
Bin Fang and
Matthew Roughan and
Kenjiro Cho and
Paul Tune A BasisEvolution framework for network
traffic anomaly detection . . . . . . . 15--31
Yingjie Wang and
Zhipeng Cai and
Xiangrong Tong and
Yang Gao and
Guisheng Yin Truthful incentive mechanism with
location privacy-preserving for mobile
crowdsourcing systems . . . . . . . . . 32--43
Mohiyeddin Mozaffari and
Behrouz Safarinejadian and
Mokhtar Shasadeghi Probability density estimation in sensor
networks based on distributed mixture of
factor analyzers, mobile agents and
stochastic sensor selection . . . . . . 44--53
Geraldo P. R. Filho and
Leandro A. Villas and
Heitor Freitas and
Alan Valejo and
Daniel L. Guidoni and
Jó Ueyama ResiDI: Towards a smarter smart home
system for decision-making using
wireless sensors and actuators . . . . . 54--69
Gloria Ciavarrini and
Maria S. Greco and
Alessio Vecchio Geolocation of Internet hosts: Accuracy
limits through Cramér--Rao lower bound 70--80
Murat Karakus and
Arjan Durresi Economic Viability of Software Defined
Networking (SDN) . . . . . . . . . . . . 81--95
E. Schiller and
N. Nikaein and
E. Kalogeiton and
M. Gasparyan and
T. Braun CDS-MEC: NFV/SDN-based Application
Management for MEC in 5G Systems . . . . 96--107
Charalampos Konstantopoulos and
Nikolaos Vathis and
Grammati Pantziou and
Damianos Gavalas Employing mobile elements for
delay-constrained data gathering in WSNs 108--131
Arvind Merwaday and
Murat Yuksel and
Thomas Quint and
Ismail Güvenç and
Walid Saad and
Naim Kapucu Incentivizing spectrum sharing via
subsidy regulations for future wireless
networks . . . . . . . . . . . . . . . . 132--146
Andrés F. Murillo Piedrahita and
Vikram Gaur and
Jairo Giraldo and
Alvaro A. Cardenas and
Sandra Julieta Rueda Virtual incident response functions in
control systems . . . . . . . . . . . . 147--159
Walid Khallef and
Sylvain Durand and
Miklós Molnár ILP formulation of the exact solution of
multi-constrained minimum cost multicast 160--170
Azzedine Boukerche and
Robson E. De Grande Vehicular cloud computing:
Architectures, applications, and
mobility . . . . . . . . . . . . . . . . 171--189
Haitao Zhao and
Lingchu Mao and
Jibo Wei Coverage on demand: A simple motion
control algorithm for autonomous robotic
sensor networks . . . . . . . . . . . . 190--200
Sana Rekik and
Nouha Baccour and
Mohamed Jmaiel and
Khalil Drira and
Luigi Alfredo Grieco Autonomous and traffic-aware scheduling
for TSCH networks . . . . . . . . . . . 201--212
Marcos R. M. Falcão and
Andson M. Balieiro and
Kelvin L. Dias A flexible-bandwidth model with channel
reservation and channel aggregation for
three-layered Cognitive Radio Networks 213--225
Kushan Sudheera Kalupahana Liyanage and
Maode Ma and
Peter Han Joo Chong Controller placement optimization in
hierarchical distributed software
defined vehicular networks . . . . . . . 226--239
Mira Morcos and
Tijani Chahed and
Lin Chen and
Jocelyne Elias and
Fabio Martignon A two-level auction for resource
allocation in multi-tenant C-RAN . . . . 240--252
Sven Hager and
Patrik John and
Stefan Dietzel and
Björn Scheuermann RuleBender: Tree-based policy
transformations for practical packet
classification systems . . . . . . . . . 253--265
Heng Zhang and
Wei Xing Zheng Optimum transmission policy for remote
state estimation with opportunistic
energy harvesting . . . . . . . . . . . 266--274
Alexandra Cetto and
Mathias Klier and
Alexander Richter and
Jan Felix Zolitschka ``Thanks for sharing'' --- Identifying
users' roles based on knowledge
contribution in Enterprise Social
Networks . . . . . . . . . . . . . . . . 275--288
José Suárez-Varela and
Pere Barlet-Ros Flow monitoring in Software-Defined
Networks: Finding the
accuracy/performance tradeoffs . . . . . 289--301
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Yehuda Afek and
Anat Bremler-Barr and
Shir Landau Feibish and
Liron Schiff Detecting heavy flows in the SDN match
and action model . . . . . . . . . . . . 1--12
Miguel Sepulcre and
Javier Gozalvez Context-aware heterogeneous V2X
communications for connected vehicles 13--21
Maciej Ku\'zniar and
Peter Peresíni and
Dejan Kosti\'c and
Marco Canini Methodology, measurement and analysis of
flow table update characteristics in
hardware OpenFlow switches . . . . . . . 22--36
Vajiheh Hajisalem and
Shahram Babaie A hybrid intrusion detection system
based on ABC-AFS algorithm for misuse
and anomaly detection . . . . . . . . . 37--50
Ivano Cerrato and
Fulvio Risso Enabling precise traffic filtering based
on protocol encapsulation rules . . . . 51--67
Junmei Yao and
Wei Lou and
Chao Yang and
Kaishun Wu Efficient Interference-Aware Power
Control for Wireless Networks . . . . . 68--79
Zhaomin Chen and
Chai Kiat Yeo and
Bu Sung Lee and
Chiew Tong Lau Power spectrum entropy based detection
and mitigation of low-rate DoS attacks 80--94
Tingting Yang and
Xiang Long and
Arun Kumar Sangaiah and
Zhigao Zheng and
Chao Tong Deep detection network for real-life
traffic sign in vehicular networks . . . 95--104
Seilendria A. Hadiwardoyo and
Enrique Hernández-Orallo and
Carlos T. Calafate and
Juan Carlos Cano and
Pietro Manzoni Experimental characterization of
UAV-to-car communications . . . . . . . 105--118
Ming Li and
Joseph Reeves and
Carlos Moreno Multi-level sample importance ranking
based progressive transmission strategy
for time series body sensor data . . . . 119--127
Siqian Yang and
Cheng Wang and
Changjun Jiang Centron: Cooperative neighbor discovery
in mobile Ad-hoc networks . . . . . . . 128--136
Murat Semerci and
Ali Taylan Cemgil and
Bülent Sankur An intelligent cyber security system
against DDoS attacks in SIP networks . . 137--154
Lijie Xu and
Geng Yang and
Jia Xu and
Lei Wang and
Haipeng Dai Achieving adaptive broadcasting
performance tradeoff for energy-critical
sensor networks: a bottom-up approach 155--170
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Yu-Ting Lin and
Thomas Bonald and
Salah Eddine Elayoubi Flow-level traffic model for adaptive
streaming services in mobile networks 1--16
Ryoichi Shinkuma and
Yusuke Tanaka and
Yoshinobu Yamada and
Eiji Takahashi and
Takeo Onishi User instruction mechanism for temporal
traffic smoothing in mobile networks . . 17--26
Muhammad Awais Javed and
Sherali Zeadally and
Zara Hamid Trust-based security adaptation
mechanism for Vehicular Sensor Networks 27--36
Sabrina Sicari and
Alessandra Rizzardi and
Daniele Miorandi and
Alberto Coen-Porisini REATO: REActing TO Denial of Service
attacks in the Internet of Things . . . 37--48
ChunSheng Xin and
Sharif Ullah and
Min Song and
Zhao Wu and
Qiong Gu and
Huanqing Cui Throughput oriented lightweight
near-optimal rendezvous algorithm for
cognitive radio networks . . . . . . . . 49--60
Zhengyu Zhu and
Zhongyong Wang and
Zheng Chu and
Di Zhang and
Byonghyo Shim Robust energy harvest balancing
optimization with V2X-SWIPT over MISO
secrecy channel . . . . . . . . . . . . 61--68
Mahdi Zareei and
Cesar Vargas-Rosales and
Rafaela Villalpando-Hernandez and
Leyre Azpilicueta and
Mohammad Hossein Anisi and
Mubashir Husain Rehmani The effects of an Adaptive and
Distributed Transmission Power Control
on the performance of energy harvesting
sensor networks . . . . . . . . . . . . 69--82
Suman Bhunia and
Paulo Alexandre Regis and
Shamik Sengupta Distributed adaptive beam nulling to
survive against jamming in $3$D UAV mesh
networks . . . . . . . . . . . . . . . . 83--97
Danda B. Rawat and
Reham Alsabet and
Chandra Bajracharya and
Min Song On the performance of cognitive
internet-of-vehicles with unlicensed
user-mobility and licensed user-activity 98--106
N. Anand and
Sarath Babu and
B. S. Manoj On detecting compromised controller in
software defined networks . . . . . . . 107--118
Sungjin Kim and
Jinkook Kim and
Seokwoo Nam and
Dohoon Kim WebMon: ML- and YARA-based malicious
webpage detection . . . . . . . . . . . 119--131
Yunchong Guan and
Weimin Lei and
Wei Zhang and
Shaowei Liu and
Hao Li Scalable orchestration of software
defined service overlay network for
multipath transmission . . . . . . . . . 132--146
Ali Safa Sadiq and
Suleman Khan and
Kayhan Zrar Ghafoor and
Mohsen Guizani and
Seyedali Mirjalili Transmission power adaption scheme for
improving IoV awareness exploiting:
evaluation weighted matrix based on
piggybacked information . . . . . . . . 147--159
Wei Guo and
V. Mahendran and
Sridhar Radhakrishnan Join and spilt TCP for SDN networks:
Architecture, implementation, and
evaluation . . . . . . . . . . . . . . . 160--172
Mohammed Amer and
Anthony Busson and
Isabelle Guérin Lassous Association optimization based on access
fairness for Wi-Fi networks . . . . . . 173--188
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Quang Do and
Ben Martini and
Kim-Kwang Raymond Choo Cyber-physical systems information
gathering: A smart home case study . . . 1--12
Cristina Alcaraz and
Xinyi Huang and
Erich Rome Security and privacy in cloud-assisted
cyber-physical systems . . . . . . . . . 13--14
David Hausheer and
Oliver Hohlfeld and
Stefan Schmid and
Guofei Gu Security and performance of
software-defined networks and functions
virtualization . . . . . . . . . . . . . 15--17
Qamas Gul Khan Safi and
Senlin Luo and
Limin Pan and
Wangtong Liu and
Rasheed Hussain and
Safdar H. Bouk SVPS: Cloud-based smart vehicle parking
system over ubiquitous VANETs . . . . . 18--30
Afraa Attiah and
Muhammad Faisal Amjad and
Mainak Chatterjee and
Cliff Zou An evolutionary routing game for energy
balance in Wireless Sensor Networks . . 31--43
Ali M. Mahmood and
Adil Al-Yasiri and
Omar Y. Alani Latency reduction by dynamic channel
estimator selection in C-RAN networks
using fuzzy logic . . . . . . . . . . . 44--56
Yantao Liu and
Yasser Morgan Security against passive attacks on
network coding system --- a survey . . . 57--76
Jianwei Zhang and
Xinchang Zhang and
Chunling Yang Towards the multi-request mechanism in
pull-based peer-to-peer live streaming
systems . . . . . . . . . . . . . . . . 77--89
Karishma Singh and
Karan Singh and
Le Hoang Son and
Ahmed Aziz Congestion control in wireless sensor
networks by hybrid multi-objective
optimization algorithm . . . . . . . . . 90--107
Lin Cui and
Fung Po Tso and
Weijia Jia Enforcing network policy in
heterogeneous network function box
environment . . . . . . . . . . . . . . 108--118
Iván García-Magariño and
Guillermo Palacios-Navarro and
Raquel Lacuesta and
Jaime Lloret ABSCEV: An agent-based simulation
framework about smart transportation for
reducing waiting times in charging
electric vehicles . . . . . . . . . . . 119--135
O. Arana and
F. Garcia and
J. Gomez and
V. Rangel MSP: Providing location privacy in WLAN
networks with a MAC Swapping Protocol 136--148
Xiaofeng Gao and
Tao Chen and
Zongchen Chen and
Guihai Chen NEMO: Novel and efficient multicast
routing schemes for Hybrid Data Center
Networks . . . . . . . . . . . . . . . . 149--163
Katty Rohoden and
Rebeca Estrada and
Hadi Otrok and
Zbigniew Dziong Game theoretical framework for
clustering and resource allocation in
macro-femtocell networks . . . . . . . . 164--176
Javier Ramos and
David Muelas and
Jorge E. López de Vergara and
Javier Aracil Estimation of the parameters of
token-buckets in multi-hop environments 177--191
Qing Yang and
Yiran Shen and
Fengyuan Yang and
Jianpei Zhang and
Wanli Xue and
Hongkai Wen HealCam: Energy-efficient and
privacy-preserving human vital cycles
monitoring on camera-enabled smart
devices . . . . . . . . . . . . . . . . 192--200
Shireesh Bhat and
George N. Rouskas and
Iyad Katib On time dependent routing algorithms for
open marketplaces of path services with
support for in-advance path reservation 201--212
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Anand M. Baswade and
Touheed Anwar Atif and
Bheemarjuna Reddy Tamma and
Antony Franklin A novel coexistence scheme for IEEE
802.11 for user fairness and efficient
spectrum utilization in the presence of
LTE-U . . . . . . . . . . . . . . . . . 1--18
Shabnam Shadroo and
Amir Masoud Rahmani Systematic survey of big data and data
mining in Internet of Things . . . . . . 19--47
Dan Xu and
Wenli Jiao and
Zhuang Yin and
Junjie Huang and
Yao Peng and
Xiaojiang Chen and
Dingyi Fang and
Zhanyong Tang Maximizing throughput for low
duty-cycled sensor networks . . . . . . 48--59
Masahiro Sasabe Analysis of optimal piece flow in
tit-for-tat-based P2P streaming . . . . 60--69
Lingnan Gao and
George N. Rouskas A spectral clustering approach to
network-aware virtual request
partitioning . . . . . . . . . . . . . . 70--80
Chenhong Cao and
Yi Gao and
Wei Dong and
Jiajun Bu Accurate per-link loss tomography in
dynamic sensor networks . . . . . . . . 81--91
Kawther Hassine and
Mounir Frikha and
Tijani Chahed Access point backhaul capacity
aggregation as a matching game in the
context of Wireless Local Area Networks 92--108
Aaqib Khalid and
Tariq Umer and
Muhammad Khalil Afzal and
Sheraz Anjum and
Adnan Sohail and
Hafiz Muhammad Asif Autonomous data driven surveillance and
rectification system using in-vehicle
sensors for intelligent transportation
systems (ITS) . . . . . . . . . . . . . 109--118
Rui Wang and
Zhiyong Zhang and
Zhiwei Zhang and
Zhiping Jia ETMRM: An Energy-efficient Trust
Management and Routing Mechanism for
SDWSNs . . . . . . . . . . . . . . . . . 119--135
Lars Kröhnke and
Jelte Jansen and
Harald Vranken Resilience of the Domain Name System: A
case study of the \tt .nl-domain . . . . 136--150
Ivano Cerrato and
Fulvio Risso and
Roberto Bonafiglia and
Kostas Pentikousis and
Gergely Pongrácz and
Hagen Woesner COMPOSER: A compact open-source service
platform . . . . . . . . . . . . . . . . 151--174
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Pratima Biswas and
Ashok Singh Sairam Modeling privacy approaches for location
based services . . . . . . . . . . . . . 1--14
Ahmed Salim Chekkouri and
Abdellatif Ezzouhairi and
Samuel Pierre A new integrated VANET-LTE --- a
architecture for enhanced mobility in
small cells HetNet using dynamic gateway
and traffic forwarding . . . . . . . . . 15--27
Bruna Peres and
Bruno P. Santos and
Otavio A. de O. Souza and
Olga Goussevskaia and
Marcos A. M. Vieira and
Luiz F. M. Vieira and
Antonio A. F. Loureiro Matrix: Multihop Address allocation and
dynamic any-To-any Routing for 6LoWPAN 28--40
Hasmukh Patel and
Devesh C. Jinwala LPM: A lightweight authenticated packet
marking approach for IP traceback . . . 41--50
George Koufoudakis and
Konstantinos Oikonomou and
Konstantinos Giannakis and
Sonia A\"\issa Probabilistic flooding coverage analysis
for efficient information dissemination
in wireless networks . . . . . . . . . . 51--61
Jingyu Hua and
Laiping Zhao and
Suohao Zhang and
Yangyang Liu and
Xin Ge and
Sheng Zhong Topology-Preserving Traffic Engineering
for Hierarchical Multi-Domain SDN . . . 62--77
Bitan Banerjee and
Adita Kulkarni and
Anand Seetharam Greedy Caching: An optimized content
placement strategy for
information-centric networks . . . . . . 78--91
Guoquan Li and
Ying Zhou and
Tong Bai and
Jinzhao Lin and
Yu Pang and
Wei Wu and
Sadia Din and
Gwanggil Jeon Performance analysis for low-complexity
detection of MIMO V2V communication
systems . . . . . . . . . . . . . . . . 92--100
Mohammed Yazid Lyazidi and
Nadjib Aitsaadi and
Rami Langar A dynamic resource allocation framework
in LTE downlink for Cloud-Radio Access
Network . . . . . . . . . . . . . . . . 101--111
Adele Lu Jia and
Siqi Shen and
Dongsheng Li and
Shengling Chen Predicting the implicit and the explicit
video popularity in a User Generated
Content site with enhanced social
features . . . . . . . . . . . . . . . . 112--125
Moustafa M. Nasralla and
Manzoor Razaak and
Ikram U. Rehman and
Maria G. Martini Content-aware packet scheduling strategy
for medical ultrasound videos over LTE
wireless networks . . . . . . . . . . . 126--137
Aneesh M. Koya and
Deepthi P. P. Anonymous hybrid mutual authentication
and key agreement scheme for wireless
body area network . . . . . . . . . . . 138--151
Seyyed Naser Seyyed Hashemi and
Ali Bohlooli Analytical modeling of multi-source
content delivery in information-centric
networks . . . . . . . . . . . . . . . . 152--162
Qian He and
Ning Zhang and
Yongzhuang Wei and
Yan Zhang Lightweight attribute based encryption
scheme for mobile cloud assisted
cyber-physical systems . . . . . . . . . 163--173
Hui Cai and
Yanmin Zhu and
Zhenni Feng and
Hongzi Zhu and
Jiadi Yu and
Jian Cao Truthful incentive mechanisms for mobile
crowd sensing with dynamic smartphones ii--ii
Tongxiang Wang and
Xianglin Wei and
Jianhua Fan and
Tao Liang Adaptive jammer localization in wireless
networks . . . . . . . . . . . . . . . . 1--16
Anonymous Editorial Board . . . . . . . . . . . . 1--234
A. Serdar Tan and
Engin Zeydan Performance maximization of network
assisted mobile data offloading with
opportunistic Device-to-Device
communications . . . . . . . . . . . . . 17--30
Yu Li and
Xiaotian Wang and
Dae Wook Kim and
Junjie Zhang and
Rui Dai Designing self-destructing wireless
sensors with security and performance
assurance . . . . . . . . . . . . . . . 31--43
Qing Yang and
Paolo Gasti and
Kiran Balagani and
Yantao Li and
Gang Zhou USB side-channel attack on Tor . . . . . 44--56
Ramin Karimi and
Saeed Shokrollahi PGRP: Predictive geographic routing
protocol for VANETs . . . . . . . . . . 57--66
Haibo Wang and
Hongli Xu and
Liusheng Huang and
Jianxin Wang and
Xuwei Yang Load-balancing routing in software
defined networks with multiple
controllers . . . . . . . . . . . . . . 67--81
Anubhab Banerjee and
Bitan Banerjee and
Anand Seetharam and
Chintha Tellambura Content search and routing under
custodian unavailability in
information-centric networks . . . . . . 82--91
Yuan Yang and
Mingwei Xu Demand-oblivious routing with planned
link pruning . . . . . . . . . . . . . . 92--101
Dali Zhu and
Bobai Zhao and
Siye Wang Mobile target indoor tracking based on
Multi-Direction Weight Position Kalman
Filter . . . . . . . . . . . . . . . . . 102--114
Kyubo Shin and
Hyoil Kim and
Se Young Chun and
Donghoon Shin TVWS assisted performance anomaly
mitigation exploiting spectrum
heterogeneity . . . . . . . . . . . . . 115--127
Cuicui Lv and
Qiang Wang and
Wenjie Yan and
Jia Li A sparsity feedback-based data gathering
algorithm for Wireless Sensor Networks 128--144
Morteza Tavana and
Ali Rahmati and
Vahid Shah-Mansouri Congestion control with adaptive access
class barring for LTE M2M overload using
Kalman filters . . . . . . . . . . . . . 145--156
Georgios Tsoumanis and
Konstantinos Oikonomou and
George Koufoudakis and
Sonia A\"\issa Energy-efficient sink placement in
wireless sensor networks . . . . . . . . 157--165
Zhuo Wang and
Xiaoning Feng and
Guangjie Han and
Yancheng Sui and
Hongde Qin EODL: Energy Optimized Distributed
Localization Method in three-dimensional
underwater acoustic sensors networks . . 166--178
Chi Xu and
Chunhe Song and
Peng Zeng and
Haibin Yu Secure resource allocation for energy
harvesting cognitive radio sensor
networks without and with cooperative
jamming . . . . . . . . . . . . . . . . 179--188
Heyuan Shi and
Xibin Zhao and
Hai Wan and
Huihui Wang and
Jian Dong and
Kun Tang and
Anfeng Liu Multi-model induced network for
participatory-sensing-based
classification tasks in intelligent and
connected transportation systems . . . . 199--221
Djamel Eddine Kouicem and
Abdelmadjid Bouabdallah and
Hicham Lakhlef Internet of Things security: a top-down
survey . . . . . . . . . . . . . . . . . 222--233
Kamal Adli Mehr and
Javad Musevi Niya and
Nail Akar Queue management for two-user cognitive
radio with delay-constrained primary
user . . . . . . . . . . . . . . . . . . ii--ii
Andrea Detti and
Lorenzo Bracciale and
Pierpaolo Loreti and
Giulio Rossi and
Nicola Blefari Melazzi A cluster-based scalable router for
information centric networks . . . . . . 1--12
Anonymous Editorial Board . . . . . . . . . . . . 1--290
Saifur Rahman Sabuj and
Masanori Hamamura Two-slope path-loss design of energy
harvesting in random cognitive radio
networks . . . . . . . . . . . . . . . . 13--23
Dilara Akdogan and
Duygu Karaoglan Altop and
Laleh Eskandarian and
Albert Levi Secure key agreement protocols: Pure
biometrics and cancelable biometrics . . 24--32
Ram Narayan Yadav and
Rajiv Misra Approximating the largest connected
topology in cognitive radio networks . . 33--48
Mahya Mohammadi Golchi and
Homayun Motameni Evaluation of the improved particle
swarm optimization algorithm efficiency
inward peer to peer video streaming . . 49--63
Ali Safari Khatouni and
Marco Ajmone Marsan and
Marco Mellia and
Reza Rejaie Deadline-constrained content upload from
multihomed devices: Formulations and
algorithms . . . . . . . . . . . . . . . 64--75
Meihui Gao and
Bernardetta Addis and
Mathieu Bouet and
Stefano Secci Optimal orchestration of virtual network
functions . . . . . . . . . . . . . . . 76--92
Sourav Kumar Bhoi and
Deepak Puthal and
Pabitra Mohan Khilar and
Joel J. P. C. Rodrigues and
Sanjaya Kumar Panda and
Laurence T. Yang Adaptive routing protocol for urban
vehicular networks to support sellers
and buyers on wheels . . . . . . . . . . 93--107
Malak Sadik and
Nadine Akkari and
Ghadah Aldabbagh SDN-based handover scheme for multi-tier
LTE/Femto and D2D networks . . . . . . . 108--127
Reem E. Mohamed and
Walid R. Ghanem and
Abeer T. Khalil and
Mohamed Elhoseny and
Muhammad Sajjad and
Mohamed A. Mohamed Energy efficient collaborative proactive
routing protocol for Wireless Sensor
Network . . . . . . . . . . . . . . . . 128--141
Weiwei Li and
Petros Spachos and
Mark Chignell and
Alberto Leon-Garcia and
Leon Zucherman and
Jie Jiang A quantitative relationship between
Application Performance Metrics and
Quality of Experience for Over-The-Top
video . . . . . . . . . . . . . . . . . 142--153
Salma Bradai and
Sofien Khemakhem and
Mohamed Jmaiel Real-time and energy aware opportunistic
mobile crowdsensing framework based on
people's connectivity habits . . . . . . 154--167
Zhetao Li and
YuXin Liu and
Ming Ma and
Anfeng Liu and
Xiaozhi Zhang and
Gungming Luo MSDG: a novel green data gathering
scheme for wireless sensor networks . . 179--193
Rubén Rumipamba-Zambrano and
Jordi Perelló and
Joan M. Gené and
Salvatore Spadaro On the scalability of dynamic
Flex-Grid/SDM optical core networks . . 194--207
Samoda Gamage and
Jamil Y. Khan and
Duy T. Ngo Adaptive resource allocation with
traffic peak duration prediction and
admission control for cognitive Wi-Fi
networks . . . . . . . . . . . . . . . . 208--222
Sheneela Naz and
Rao Naveed Bin Rais and
Peer Azmat Shah and
Sadaf Yasmin and
Amir Qayyum and
Seungmin Rho and
Yunyoung Nam A dynamic caching strategy for CCN-based
MANETs . . . . . . . . . . . . . . . . . 223--239
Wenbo Zhao and
Xueyan Tang and
Luping Xu Constructing routing structures for
sensor data collection with dynamic
traffic patterns . . . . . . . . . . . . 240--252
Fanzi Zeng and
Jisheng Xu and
Yongfeng Li and
Kang Li and
Lei Jiao Performance analysis of underlay two-way
relay cooperation in cognitive radio
networks with energy harvesting . . . . 253--271
Shenghong Li and
Wei Ni and
Chang Kyung Sung and
Mark Hedley Recent advances on cooperative wireless
localization and their application in
inhomogeneous propagation environments 272--290
Junfeng Li and
Dan Li and
Yirong Yu and
Yukai Huang and
Jing Zhu and
Jinkun Geng Towards full virtualization of SDN
infrastructure . . . . . . . . . . . . . ii--ii
Zichuan Xu and
Weifa Liang and
Alex Galis and
Yu Ma and
Qiufen Xia and
Wenzheng Xu Throughput optimization for admitting
NFV-enabled requests in cloud networks 1--14
Anonymous Editorial Board . . . . . . . . . . . . 1--288
Pengchao Han and
Yejun Liu and
Lei Guo QoS satisfaction aware and network
reconfiguration enabled resource
allocation for virtual network embedding
in Fiber--Wireless access network . . . 15--29
Weibin Xie and
Fang Wang and
Dan Feng and
Lingling Zhang and
Tingwei Zhu and
Qingyu Shi Host-based scheduling: Achieving
near-optimal transport for datacenter
networks . . . . . . . . . . . . . . . . 30--48
Gokhan Sagirlar and
Barbara Carminati and
Elena Ferrari Decentralizing privacy enforcement for
Internet of Things smart objects . . . . 49--61
Junchao Wang and
Kaining Han and
Anastasios Alexandridis and
Zeljko Zilic and
Yu Pang and
Wei Wu and
Sadia Din and
Gwanggil Jeon A novel security scheme for Body Area
Networks compatible with smart vehicles 62--73
Joaquim Ferreira and
Muhammad Alam and
Bruno Fernandes and
Luis Silva and
João Almeida and
Lara Moura and
Rui Costa and
Giovanni Iovino and
Elena Cordiviola Cooperative sensing for improved traffic
efficiency: the highway field trial . . 74--81
Sijia Chen and
Bin Song and
Jie Guo and
Yanling Zhang and
Xiaojiang Du and
Mohsen Guizani FPAN: Fine-grained and progressive
attention localization network for data
retrieval . . . . . . . . . . . . . . . 82--97
Khalil Al-Hussaeni and
Benjamin C. M. Fung and
Farkhund Iqbal and
Gaby G. Dagher and
Eun G. Park SafePath: Differentially-private
publishing of passenger trajectories in
transportation systems . . . . . . . . . 98--111
P. A. Baziana Exploring the optimum number of
receivers per station in WDM networks 112--125
Claudia Campolo and
Antonella Molinaro and
Antonio Iera A reference framework for
social-enhanced Vehicle-to-Everything
communications in 5G scenarios . . . . . 126--139
Gagangeet Singh Aujla and
Anish Jindal and
Neeraj Kumar EVaaS: Electric vehicle-as-a-service for
energy trading in SDN-enabled smart
transportation system . . . . . . . . . 140--152
Ming Li and
Dejun Yang and
Jian Lin and
Ming Li and
Jian Tang SpecWatch: a framework for adversarial
spectrum monitoring with unknown
statistics . . . . . . . . . . . . . . . 153--165
Chen Liu and
Dingyi Fang and
Yue Hu and
Shensheng Tang and
Dan Xu and
Wen Cui and
Xiaojiang Chen and
Baoying Liu and
Guangquan Xu and
Hao Chen EasyGo: Low-cost and robust geographic
opportunistic sensing routing in a strip
topology wireless sensor network . . . . 166--175
Jie Li and
Xingwei Wang and
Min Huang SVDR: a scalable virtual domain-based
routing scheme for CCN . . . . . . . . . 176--190
Faisal Riaz and
Sania Khadim and
Rabia Rauf and
Mudassar Ahmad and
Sohail Jabbar and
Junaid Chaudhry A validated fuzzy logic inspired driver
distraction evaluation system for road
safety using artificial human driver
emotion . . . . . . . . . . . . . . . . 191--205
Mustapha Khiati and
Djamel Djenouri Adaptive learning-enforced broadcast
policy for solar energy harvesting
wireless sensor networks . . . . . . . . 206--220
Haibin Zhang and
Jiajia Liu and
Ai-Chun Pang A Bayesian network model for data losses
and faults in medical body sensor
networks . . . . . . . . . . . . . . . . 221--246
Vijayalakshmi Murugesan and
Mercy Shalinie Selvaraj and
Ming-Hour Yang HPSIPT: a high-precision single-packet
IP traceback scheme . . . . . . . . . . 263--274
Ola Salman and
Imad Elhajj and
Ali Chehab and
Ayman Kayssi IoT survey: an SDN and fog computing
perspective . . . . . . . . . . . . . . 275--288
Tim Strayer and
Samuel Nelson and
Amando Caro and
Joud Khoury and
Bryan Tedesco and
Olivia DeRosa and
Carsten Clark and
Kolia Sadeghi and
Michael Matthews and
Jake Kurzer and
Philip Lundrigan and
Vikas Kawadia and
Dorene Ryder and
Keith Gremban and
Wayne Phoel Content sharing with mobility in an
infrastructure-less environment . . . . ii--ii
Xi Chen and
Chuanhe Huang and
Xiying Fan and
Di Liu and
Peng Li LDMAC: a propagation delay-aware MAC
scheme for long-distance UAV networks 1--16
Anonymous Editorial Board . . . . . . . . . . . . 1--296
Fatma Karray and
Mohamed W. Jmal and
Alberto Garcia-Ortiz and
Mohamed Abid and
Abdulfattah M. Obeid A comprehensive survey on wireless
sensor node hardware platforms . . . . . 17--39
Bahare M. Khorsandi and
Carla Raffaelli BBU location algorithms for survivable
5G C-RAN over WDM . . . . . . . . . . . 40--52
Jung-Han Han and
Seung-Jae Han Non-intrusive estimation of available
throughput for IEEE 802.11 link . . . . 53--63
Lei Wang and
Qing Li and
Richard Sinnott and
Yong Jiang and
Jianping Wu An intelligent rule management scheme
for Software Defined Networking . . . . 64--76
Tamer Aldwairi and
Dilina Perera and
Mark A. Novotny An evaluation of the performance of
Restricted Boltzmann Machines as a model
for anomaly network intrusion detection 77--88
Hadi Habibzadeh and
Tolga Soyata and
Burak Kantarci and
Azzedine Boukerche and
Cem Kaptan Sensing, communication and security
planes: a new challenge for a smart city
system design . . . . . . . . . . . . . 89--110
Mikhail Zolotukhin and
Alexander Sayenko and
Timo Hämäläinen On optimal deployment of low power nodes
for high frequency next generation
wireless systems . . . . . . . . . . . . 111--119
Sohail Sarang and
Micheal Drieberg and
Azlan Awang and
Rizwan Ahmad A QoS MAC protocol for prioritized data
in energy harvesting wireless sensor
networks . . . . . . . . . . . . . . . . 120--140
Natthanan Promsuk and
Attaphongse Taparugssanagorn and
Johanna Vartiainen Probability of false alarm based
interference suppression methods in
Internet of Things (IoT) systems . . . . 141--153
Priyan Malarvizhi Kumar and
Usha Devi G and
Gunasekaran Manogaran and
Revathi Sundarasekar and
Naveen Chilamkurti and
Ramachandran Varatharajan Ant colony optimization algorithm with
Internet of Vehicles for intelligent
traffic control system . . . . . . . . . 163--200
Simon Yusuf Enoch and
Mengmeng Ge and
Jin B. Hong and
Hani Alzaid and
Dong Seong Kim A systematic evaluation of cybersecurity
metrics for dynamic networks . . . . . . 201--215
Chun-Chih Lo and
Yau-Hwang Kuo A geo-temporal mobility prediction
method for cooperative
time-validity-constrained content
delivery in opportunistic networks . . . 216--229
Sadananda Behera and
Jithin George and
Goutam Das Effect of transmission impairments in
CO-OFDM based Elastic Optical Network
design . . . . . . . . . . . . . . . . . 230--241
Fawaz AL-Hazemi and
Yuyang Peng and
Chan-Hyun Youn and
Josip Lorincz and
Chao Li and
Guo Song and
Raouf Boutaba Dynamic allocation of power delivery
paths in consolidated data centers based
on adaptive UPS switching . . . . . . . 242--253
Julian Andres Caicedo-Muñoz and
Agapito Ledezma Espino and
Juan Carlos Corrales and
Alvaro Rendón QoS-Classifier for VPN and Non-VPN
traffic based on time-related features 254--270
Yuhang Ye and
Brian Lee and
Ronan Flynn and
Niall Murray and
Guiming Fang and
Jianwen Cao and
Yuansong Qiao PTP: Path-specified transport protocol
for concurrent multipath transmission in
named data networks . . . . . . . . . . 271--279
Alem Colakovi\'c and
Mesud Hadziali\'c Internet of Things (IoT): a review of
enabling technologies, challenges, and
open research issues . . . . . . . . . . 280--296
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Jonas Hansen and
Jeppe Krigslund and
Daniel E. Lucani and
Peyman Pahlevani and
Frank H. P. Fitzek Bridging inter-flow and intra-flow
network coding in wireless mesh
networks: From theory to implementation 1--12
Carles Angl\`es-Tafalla and
Jordi Castell\`a-Roca and
Maci\`a Mut-Puigserver and
M. Magdalena Payeras-Capell\`a and
Alexandre Viejo Secure and privacy-preserving
lightweight access control system for
low emission zones . . . . . . . . . . . 13--26
G. Reali and
M. Femminella and
E. Nunzi and
D. Valocchi Genomics as a service: a joint computing
and networking perspective . . . . . . . 27--51
Adel Abusitta and
Martine Bellaiche and
Michel Dagenais On trustworthy federated clouds: a
coalitional game approach . . . . . . . 52--63
I-Fen Chao and
Chain-Hung Lee AWG-based WDM ring networks:
High-performance and low-cost system
designs . . . . . . . . . . . . . . . . 64--75
Won-Suk Kim and
Sang-Hwa Chung User incentive model and its
optimization scheme in
user-participatory fog computing
environment . . . . . . . . . . . . . . 76--88
Mohamed Saad Non-isotonic routing metrics solvable to
optimality via shortest path . . . . . . 89--95
Fahed H. Awad Optimization of relay node deployment
for multisource multipath routing in
Wireless Multimedia Sensor Networks
using Gaussian distribution . . . . . . 96--106
Tao Wu and
Panlong Yang and
Haipeng Dai and
Ping Li and
Xunpeng Rao Near optimal bounded route association
for drone-enabled rechargeable WSNs . . 107--117
Koki Inoue and
Shin'ichi Arakawa and
Satoshi Imai and
Toru Katagiri and
Masayuki Murata Noise-induced VNE method for
software-defined infrastructure with
uncertain delay behaviors . . . . . . . 118--127
Iftikhar Ahmad and
Rafidah Md Noor and
Ismail Ahmedy and
Syed Adeel Ali Shah and
Ibrar Yaqoob and
Ejaz Ahmed and
Muhammad Imran VANET-LTE based heterogeneous vehicular
clustering for driving assistance and
route planning applications . . . . . . 128--140
Fatima Zohra Bousbaa and
Nasreddine Lagraa and
Chaker Abdelaziz Kerrache and
Fen Zhou and
Mohamed Bachir Yagoubi and
Rasheed Hussain A distributed time-limited multicast
algorithm for VANETs using incremental
power strategy . . . . . . . . . . . . . 141--155
Chuan Zhu and
Kangning Quan and
Guangjie Han and
Joel J. P. C. Rodrigues A high-available and location predictive
data gathering scheme with mobile sinks
for wireless sensor networks . . . . . . 156--164
Xiaoyun Yan and
Ping Dong and
Xiaojiang Du and
Tao Zheng and
Jianan Sun and
Mohsen Guizani Improving flow delivery with link
available time prediction in
software-defined high-speed vehicular
networks . . . . . . . . . . . . . . . . 165--174
Chun-Yu Wang and
Chi-Lung Ou and
Yu-En Zhang and
Feng-Min Cho and
Pin-Hao Chen and
Jyh-Biau Chang and
Ce-Kuen Shieh BotCluster: a session-based P2P botnet
clustering system on NetFlow . . . . . . 175--189
Sunder Ali Khowaja and
Aria Ghora Prabono and
Feri Setiawan and
Bernardo Nugroho Yahya and
Seok-Lyong Lee Contextual activity based Healthcare
Internet of Things, Services, and People
(HIoTSP): an architectural framework for
healthcare monitoring using wearable
sensors . . . . . . . . . . . . . . . . 190--206
Ismaeel Al Ridhawi and
Moayad Aloqaily and
Burak Kantarci and
Yaser Jararweh and
Hussein T. Mouftah A continuous diversified vehicular cloud
service availability framework for smart
cities . . . . . . . . . . . . . . . . . 207--218
Madhusudan Singh and
Shiho Kim Branch based blockchain technology in
intelligent vehicle . . . . . . . . . . 219--231
Xin Chen and
Guoqiang Zhang and
Qian Gao and
Huajun Cui Improving NDN forwarding engine
performance by rendezvous-based caching
and forwarding . . . . . . . . . . . . . 232--242
Alassane Samba and
Yann Busnel and
Alberto Blanc and
Philippe Dooze and
Gwendal Simon Predicting file downloading time in
cellular network: Large-scale analysis
of machine learning approaches . . . . . 243--254
Oluwatosin Ahmed Amodu and
Mohamed Othman Machine-to-Machine Communication: an
Overview of Opportunities . . . . . . . 255--276
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Israel L. C. Vasconcelos and
Ivan C. Martins and
Carlos M. S. Figueiredo and
Andre L. L. Aquino A data sample algorithm applied to
wireless sensor network with disruptive
connections . . . . . . . . . . . . . . 1--11
Diego Cruz Abrahão and
Flávio Henrique Teles Vieira Scheduling algorithm for the LTE
downlink with F-OFDM using adaptive
multifractal envelope process and
minimum service curve . . . . . . . . . 12--32
Farzad Tashtarian and
Alireza Erfanian and
Amir Varasteh $S$2VC: an SDN-based framework for
maximizing QoE in SVC-based HTTP
adaptive streaming . . . . . . . . . . . 33--46
Behrouz Shahgholi Ghahfarokhi and
Maryam Azadmanesh and
Samaneh Khadem Khorasani Energy and spectrum efficient
mobility-aware resource management for
D2D multicasting . . . . . . . . . . . . 47--64
Massimo Condoluci and
Toktam Mahmoodi Softwarization and virtualization in 5G
mobile networks: Benefits, trends and
challenges . . . . . . . . . . . . . . . 65--84
Jain-Shing Liu Joint downlink resource allocation in
LTE-Advanced heterogeneous networks . . 85--103
Chuanwen Luo and
Jiguo Yu and
Deying Li and
Honglong Chen and
Yi Hong and
Lina Ni A novel distributed algorithm for
constructing virtual backbones in
wireless sensor networks . . . . . . . . 104--114
Yoshinobu Yamada and
Ryoichi Shinkuma and
Takanori Iwai and
Takeo Onishi and
Takahiro Nobukiyo and
Kozo Satoda Temporal traffic smoothing for IoT
traffic in mobile networks . . . . . . . 115--124
Jack Kirton and
Matthew Bradbury and
Arshad Jhumka Towards optimal source location
privacy-aware TDMA schedules in wireless
sensor networks . . . . . . . . . . . . 125--137
Lun Tang and
Guofan Zhao and
Chenmeng Wang and
Peipei Zhao and
Qianbin Chen Queue-aware reliable embedding algorithm
for 5G network slicing . . . . . . . . . 138--150
Tarek Gaber and
Sarah Abdelwahab and
Mohamed Elhoseny and
Aboul Ella Hassanien Trust-based secure clustering in
WSN-based intelligent transportation
systems . . . . . . . . . . . . . . . . 151--158
Hao Yang and
Xiwei Wang ECO CS: Energy consumption optimized
compressive sensing in group sensor
networks . . . . . . . . . . . . . . . . 159--166
Piotr Lechowicz and
Krzysztof Walkowiak and
Miroslaw Klinkowski Greedy randomized adaptive search
procedure for joint optimization of
unicast and anycast traffic in
spectrally-spatially flexible optical
networks . . . . . . . . . . . . . . . . 167--182
Dan Xu and
Wenli Jiao and
Zhuang Yin and
Bin Wu and
Yao Peng and
Xiaojiang Chen and
Feng Chen and
Dingyi Fang Enabling robust and reliable
transmission in Internet of Things with
multiple gateways . . . . . . . . . . . 183--199
Gewu Bu and
Maria Potop-Butucaru FIFO order reliable convergecast in WBAN 200--216
Peng Sun and
Azzedine Boukerche Performance modeling and analysis of a
UAV path planning and target detection
in a UAV-based wireless sensor network 217--231
Khaled Almi'ani and
Young Choon Lee and
Bernard Mans On efficient resource use for scientific
workflows in clouds . . . . . . . . . . 232--242
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Lei Wang and
Qing Li and
Yong Jiang and
Xuya Jia and
Jianping Wu Woodpecker: Detecting and mitigating
link-flooding attacks via SDN . . . . . 1--13
Yongwook Ra and
June-Koo Kevin Rhee and
Junseong Bang and
Yunjoo Kim Photonic-Frame-Based TCP proxy
architecture in optically interconnected
data center networks . . . . . . . . . . 14--26
Prabhat Thakur and
Alok Kumar and
S. Pandit and
G. Singh and
S. N. Satashia Analysis of high-traffic cognitive radio
network with imperfect spectrum
monitoring technique . . . . . . . . . . 27--37
Jianhua Huang and
Danwei Ruan and
Weiqiang Meng An annulus sector grid aided
energy-efficient multi-hop routing
protocol for wireless sensor networks 38--48
Yu Zhao and
Yunhuai Liu and
Tingting Yu and
Tian He and
Chen Qian FREDI: Robust RSS-based ranging with
multipath effect and radio interference 49--63
Xiaodong Wang and
Ye Tian and
Min Zhao and
Mingzheng Li and
Lei Mei and
Xinming Zhang PNPL: Simplifying programming for
protocol-oblivious SDN networks . . . . 64--80
Sylvie Delaët and
Shlomi Dolev and
Daniel Khankin and
Shimrit Tzur-David Make&activate-before-break for seamless
SDN route updates . . . . . . . . . . . 81--97
Kai Bu and
Kaiwen Zhu and
Yi Zheng and
Yuanyuan Yang and
Yutian Yang and
Linfeng Cheng Fastlane-ing more flows with less
bandwidth for software-defined
networking . . . . . . . . . . . . . . . 98--111
Nils Dorsch and
Fabian Kurtz and
Christian Wietfeld Enabling hard service guarantees in
Software-Defined Smart Grid
infrastructures . . . . . . . . . . . . 112--131
Luigi Atzori and
Alessandro Floris and
Roberto Girau and
Michele Nitti and
Giovanni Pau Towards the implementation of the Social
Internet of Vehicles . . . . . . . . . . 132--145
Slawomir Hanczewski and
Maciej Stasiak and
Joanna Weissenberg Queueing model of a multi-service system
with elastic and adaptive traffic . . . 146--161
Chedia Jarray and
Anastasios Giovanidis Successful file transmission in mobile
D2D networks with caches . . . . . . . . 162--179
Abolfazl Hajisami and
Dario Pompili Cloud-BSS: Joint intra- and
inter-cluster interference cancellation
in uplink 5G cellular networks . . . . . 180--190
A. Grassi and
G. Piro and
G. Boggia and
M. Kurras and
W. Zirwas and
R. SivaSiva Ganesan and
K. Pedersen and
L. Thiele Massive MIMO interference coordination
for 5G broadband access: Integration and
system level study . . . . . . . . . . . 191--203
Itamar Cohen and
Gabriel Scalosub Queueing in the mist: Buffering and
scheduling with limited knowledge . . . 204--220
Maroua Ben Attia and
Kim-Khoa Nguyen and
Mohamed Cheriet QoS-aware software-defined routing in
smart community network . . . . . . . . 221--235
Xiaoqian Li and
Kwan L. Yeung Bandwidth-efficient network monitoring
algorithms based on segment routing . . 236--245
Muhammad Jawad Khokhar and
Nawfal Abbassi Saber and
Thierry Spetebroot and
Chadi Barakat An intelligent sampling framework for
controlled experimentation and QoE
modeling . . . . . . . . . . . . . . . . 246--261
I. F. Akyildiz and
A. Kak and
E. Khorov and
A. Krasilov and
A. Kureev ARBAT: a flexible network architecture
for QoE-aware communications in 5G
systems . . . . . . . . . . . . . . . . 262--279
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Ian F. Akyildiz and
Harry Rudin and
Burkhard Stiller Computer Networks (COMNET) Editorial for
2018 . . . . . . . . . . . . . . . . . . iii--iv
Hailong Huang and
Andrey V. Savkin and
Ming Ding and
Chao Huang Mobile robots in wireless sensor
networks: a survey on tasks . . . . . . 1--19
Jaehyun Park and
Jaehee Ha and
Brent Byunghoon Kang and
Myungchul Kim MoHoP: a protocol providing for both
mobility management and host privacy . . 20--33
Yazhou Yuan and
Xiaoqin Sun and
Zhixin Liu and
Yuefeng Li and
Xinping Guan Approach of personnel location in
roadway environment based on
multi-sensor fusion and activity
classification . . . . . . . . . . . . . 34--45
Yanling Shao and
Chunlin Li and
Hengliang Tang A data replica placement strategy for
IoT workflows in collaborative edge and
cloud environments . . . . . . . . . . . 46--59
Konrad-Felix Krentz and
Christoph Meinel Denial-of-sleep defenses for IEEE
802.15.4 coordinated sampled listening
(CSL) . . . . . . . . . . . . . . . . . 60--71
Chi Lin and
Yu Sun and
Kai Wang and
Zhunyue Chen and
Bo Xu and
Guowei Wu Double warning thresholds for preemptive
charging scheduling in Wireless
Rechargeable Sensor Networks . . . . . . 72--87
Rafael B. R. Lourenço and
Gustavo B. Figueiredo and
Massimo Tornatore and
Biswanath Mukherjee Data evacuation from data centers in
disaster-affected regions through
software-defined satellite networks . . 88--100
Huansheng Ning and
Feifei Shi and
Tao Zhu and
Qingjuan Li and
Liming Chen A novel ontology consistent with
acknowledged standards in smart homes 101--107
Yannick Léo and
Christophe Crespelle and
Eric Fleury Non-altering time scales for aggregation
of dynamic networks into series of
graphs . . . . . . . . . . . . . . . . . 108--119
Yuan Chai and
Xiao-Jun Zeng Regional condition-aware hybrid routing
protocol for hybrid wireless mesh
network . . . . . . . . . . . . . . . . 120--128
Thi-Minh Nguyen and
Michel Minoux and
Serge Fdida Optimizing resource utilization in NFV
dynamic systems: New exact and heuristic
approaches . . . . . . . . . . . . . . . 129--141
Hao Wang and
Guangjie Han and
Lina Zhou and
James Adu Ansere and
Wenbo Zhang A source location privacy protection
scheme based on ring-loop routing for
the IoT . . . . . . . . . . . . . . . . 142--150
Mojtaba Ghermezcheshmeh and
Vahid Shah-Mansouri and
Mohammad Ghanbari Analysis and performance evaluation of
scalable video coding over heterogeneous
cellular networks . . . . . . . . . . . 151--163
Fadi Salo and
Ali Bou Nassif and
Aleksander Essex Dimensionality reduction with IG-PCA and
ensemble classifier for network
intrusion detection . . . . . . . . . . 164--175
Francesco Marino and
Corrado Moiso and
Matteo Petracca Automatic contract negotiation, service
discovery and mutual authentication
solutions: a survey on the enabling
technologies of the forthcoming IoT
ecosystems . . . . . . . . . . . . . . . 176--195
Marko Kompara and
SK Hafizul Islam and
Marko Hölbl A robust and efficient mutual
authentication and key agreement scheme
with untraceability for WBANs . . . . . 196--213
Abdul Wahid and
Humera Yasmeen and
Munam Ali Shah and
Masoom Alam and
Sayed Chhattan Shah Holistic approach for coupling privacy
with safety in VANETs . . . . . . . . . 214--230
Cun Ji and
Chao Zhao and
Shijun Liu and
Chenglei Yang and
Li Pan and
Lei Wu and
Xiangxu Meng A fast shapelet selection algorithm for
time series classification . . . . . . . 231--240
Parvaneh Asghari and
Amir Masoud Rahmani and
Hamid Haj Seyyed Javadi Internet of Things applications: a
systematic review . . . . . . . . . . . 241--261
Neda Petreska and
Hussein Al-Zubaidy and
Rudi Knorr and
James Gross Bound-based power optimization for
multi-hop heterogeneous wireless
industrial networks under statistical
delay constraints . . . . . . . . . . . 262--279
Matthias Schunter and
Andreas Wespi Editorial: Special issue on IoT security
and privacy . . . . . . . . . . . . . . 280--282
Mardiana binti Mohamad Noor and
Wan Haslina Hassan Current research on Internet of Things
(IoT) security: a survey . . . . . . . . 283--294
Jianwei Hou and
Leilei Qu and
Wenchang Shi A survey on Internet of Things security
from data perspectives . . . . . . . . . 295--306
Zheng Zhou and
Weiming Zhang and
Shangbin Li and
Nenghai Yu Potential risk of IoT device supporting
IR remote control . . . . . . . . . . . 307--317
Kai Yang and
Qiang Li and
Limin Sun Towards automatic fingerprinting of IoT
devices in the cyberspace . . . . . . . 318--327
Mohamed Eldefrawy and
Ismail Butun and
Nuno Pereira and
Mikael Gidlund Formal security analysis of LoRaWAN . . 328--339
Yi-Ning Liu and
Yan-Ping Wang and
Xiao-Fen Wang and
Zhe Xia and
Jing-Fang Xu Privacy-preserving raw data collection
without a trusted authority for IoT . . 340--348
Yuxian Liu and
Shaohua Tang and
Hao-Tian Wu and
Xinglin Zhang RTPT: a framework for real-time
privacy-preserving truth discovery on
crowdsensed data streams . . . . . . . . 349--360
Umair Sarfraz and
Masoom Alam and
Sherali Zeadally and
Abid Khan Privacy aware IOTA ledger: Decentralized
mixing and unlinkable IOTA transactions 361--372
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Qing Li and
Yang Liu and
Zhijie Zhu and
Hengtong Li and
Yong Jiang BOND: Flexible failure recovery in
software defined networks . . . . . . . 1--12
Cesar Bernardini and
Samuel Marchal and
Muhammad Rizwan Asghar and
Bruno Crispo PrivICN: Privacy-preserving content
retrieval in information-centric
networking . . . . . . . . . . . . . . . 13--28
Ankur Gupta and
Meenakshi Tripathi and
Tabish Jamil Shaikh and
Aakar Sharma A lightweight anonymous user
authentication and key establishment
scheme for wearable devices . . . . . . 29--42
Rodrigo Vieira Steiner and
Emil Lupu Towards more practical software-based
attestation . . . . . . . . . . . . . . 43--55
Tong Liu and
Yanmin Zhu and
Liqun Huang TGBA: a two-phase group buying based
auction mechanism for recruiting workers
in mobile crowd sensing . . . . . . . . 56--75
Mohamad Zalghout and
Ayman Khalil and
Matthieu Crussiére and
Samih Abdul-Nabi and
Jean-Francois Hélard Context-aware and priority-based user
association and resource allocation in
heterogeneous wireless networks . . . . 76--92
Sok-Ian Sou and
Ming-Ru Li and
Shan-Huei Wang and
Meng-Hsun Tsai File distribution via proximity group
communications in LTE-advanced public
safety networks . . . . . . . . . . . . 93--101
Bala Prakasa Rao Killi and
Seela Veerabhadreswara Rao Towards improving resilience of
controller placement with minimum backup
capacity in software defined networks 102--114
Martino Trevisan and
Idilio Drago and
Marco Mellia PAIN: a Passive Web performance
indicator for ISPs . . . . . . . . . . . 115--126
Rongjun Xie and
Ibrahim Khalil and
Shahriar Badsha and
Mohammed Atiquzzaman Collaborative extreme learning machine
with a confidence interval for P2P
learning in healthcare . . . . . . . . . 127--143
Xueyang Qin and
Xiaoming Wang and
Liang Wang and
Yaguang Lin and
Xinyan Wang An efficient probabilistic routing
scheme based on game theory in
opportunistic networks . . . . . . . . . 144--153
Asad Arfeen and
Krzysztof Pawlikowski and
Don McNickle and
Andreas Willig Global and local scaling analysis of
link streams in access and backbone core
networks . . . . . . . . . . . . . . . . 154--172
Tong Wang and
MengBo Tang and
Houbing Song and
Y. Cao and
Zaheer Khan Opportunistic protocol based on social
probability and resources efficiency for
the intelligent and connected
transportation system . . . . . . . . . 173--186
Leonardo Linguaglossa and
Dario Rossi and
Salvatore Pontarelli and
Dave Barach and
Damjan Marjon and
Pierre Pfister High-speed data plane and network
functions virtualization by vectorizing
packet processing . . . . . . . . . . . 187--199
L. Atzori and
J. L. Bellido and
R. Bolla and
G. Genovese and
A. Iera and
A. Jara and
C. Lombardo and
G. Morabito SDN&NFV contribution to IoT objects
virtualization . . . . . . . . . . . . . 200--212
Shiyou Qian and
Jian Cao and
Weichao Mao and
Yanmin Zhu and
Jiadi Yu and
Minglu Li and
Jie Wang A fast and anti-matchability matching
algorithm for content-based
publish/subscribe systems . . . . . . . 213--225
Partha Pratim Ray and
Dinesh Dash and
Debashis De Internet of Things-based real-time model
study on e-healthcare: Device, message
service and dew computing . . . . . . . 226--239
Xiaozheng Gao and
Kai Yang and
Nan Yang and
Jinsong Wu Energy-efficient resource block
assignment and power control for
underlay device-to-device communications
in multi-cell networks . . . . . . . . . 240--251
Israel Leyva-Mayorga and
Miguel A. Rodriguez-Hernandez and
Vicent Pla and
Jorge Martinez-Bauset and
Luis Tello-Oquendo Adaptive access class barring for
efficient mMTC . . . . . . . . . . . . . 252--264
S. Ramakrishnan and
Subrat Kar and
Dharmaraja Selvamuthu Analysis of energy efficiency in cloud
based heterogeneous RAN with large-scale
antenna systems . . . . . . . . . . . . 265--276
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Siyao Cheng and
Yingshu Li and
Zhi Tian and
Wei Cheng and
Xiuzhen Cheng A model for integrating heterogeneous
sensory data in IoT systems . . . . . . 1--14
You-Chiun Wang and
Chien-Chun Huang Efficient management of interference and
power by jointly configuring ABS and DRX
in LTE-A HetNets . . . . . . . . . . . . 15--27
Puneet Kumar and
Behnam Dezfouli Implementation and analysis of QUIC for
MQTT . . . . . . . . . . . . . . . . . . 28--45
Jin B. Hong and
Armstrong Nhlabatsi and
Dong Seong Kim and
Alaa Hussein and
Noora Fetais and
Khaled M. Khan Systematic identification of threats in
the cloud: a survey . . . . . . . . . . 46--69
Pedro Batista and
Ivanes Araújo and
Neiva Linder and
Kim Laraqui and
Aldebaro Klautau Testbed for ICN media distribution over
LTE radio access networks . . . . . . . 70--80
Sadia Din and
Anand Paul and
Abdul Rehman $5$G-enabled Hierarchical architecture
for software-defined intelligent
transportation system . . . . . . . . . 81--89
Kaiyang Li and
Ling Tian and
Wei Li and
Guangchun Luo and
Zhipeng Cai Incorporating social interaction into
three-party game towards privacy
protection in IoT . . . . . . . . . . . 90--101
Ajay Nehra and
Meenakshi Tripathi and
Manoj Singh Gaur and
Ramesh Babu Battula and
Chhagan Lal SLDP: a secure and lightweight link
discovery protocol for software defined
networking . . . . . . . . . . . . . . . 102--116
Niezi Mharsi and
Makhlouf Hadji A mathematical programming approach for
full coverage hole optimization in Cloud
Radio Access Networks . . . . . . . . . 117--126
Tiphaine Viard and
Raphaël Fournier-S'niehotta Augmenting content-based rating
prediction with link stream features . . 127--133
Ian F. Akyildiz and
Ahan Kak The Internet of Space Things/CubeSats: a
ubiquitous cyber-physical system for the
connected world . . . . . . . . . . . . 134--149
Gongbing Hong and
James Martin and
James Westall Adaptive bandwidth binning for bandwidth
management . . . . . . . . . . . . . . . 150--169
Takayuki Hatanaka and
Takuji Tachibana LE-MRC: Low-energy based multiple
routing configurations for fast failure
recovery . . . . . . . . . . . . . . . . 170--178
Aya Ayadi and
Oussama Ghorbel and
M. S. BenSalah and
Mohamed Abid Kernelized technique for outliers
detection to monitoring water pipeline
based on WSNs . . . . . . . . . . . . . 179--189
Sen Bai and
Yunhao Liu and
Zhenhua Li and
Xin Bai Detecting wormhole attacks in $3$D
wireless ad hoc networks via $3$D
forbidden substructures . . . . . . . . 190--200
Chuan-Gang Liu and
I-Hsien Liu and
Chang-De Lin and
Jung-Shian Li A novel tag searching protocol with time
efficiency and searching accuracy in
RFID systems . . . . . . . . . . . . . . 201--216
Islam Tharwat Abdel-Halim and
Hossam Mahmoud Ahmed Fahmy and
Ayman M. Bahaa-El Din Mobility prediction-based efficient
clustering scheme for connected and
automated vehicles in VANETs . . . . . . 217--233
Enrico Cambiaso and
Giovanni Chiola and
Maurizio Aiello Introducing the SlowDrop Attack . . . . 234--249
Binbin Li and
Yuan He and
Wenyuan Liu and
Lin Wang Towards time-efficient localized polling
for large-scale RFID systems . . . . . . 250--262
Matthieu Latapy and
Marco Fiore and
Artur Ziviani Link streams: Methods and applications 263--265
Feng Li and
Shibo He and
Jun Luo and
Mohan Gurusamy and
Junshan Zhang Editorial: Green computing in Wireless
Sensor Networks . . . . . . . . . . . . 266--268
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Renan Fischer e Silva and
Paul M. Carpenter TCP proactive congestion control for
east--west traffic: the marking
threshold . . . . . . . . . . . . . . . 1--11
Ilhem Souissi and
Nadia Ben Azzouna and
Lamjed Ben Said A multi-level study of information trust
models in WSN-assisted IoT . . . . . . . 12--30
Abdul Salam and
Mehmet C. Vuran and
Suat Irmak Di-Sense: In situ real-time permittivity
estimation and soil moisture sensing
using wireless underground
communications . . . . . . . . . . . . . 31--41
Yu He and
Lin Ma and
Ruiting Zhou and
Chuanhe Huang and
Zongpeng Li Online task allocation in mobile cloud
computing with budget constraints . . . 42--51
Aljawharah Alnasser and
Hongjian Sun and
Jing Jiang Cyber security challenges and solutions
for V2X communications: a survey . . . . 52--67
B. Asvija and
R. Eswari and
M. B. Bijoy Security in hardware assisted
virtualization for cloud computing ---
state of the art issues and challenges 68--92
Edmundo de Souza e Silva and
Rosa M. M. Leão and
Daniel S. Menasché and
Don Towsley On the scalability of P2P swarming
systems . . . . . . . . . . . . . . . . 93--113
Xiaocui Li and
Zhangbing Zhou and
Junqi Guo and
Shangguang Wang and
Junsheng Zhang Aggregated multi-attribute query
processing in edge computing for
industrial IoT applications . . . . . . 114--123
V. R. Kavitha and
M. Moorthi A quality of service load balanced
connected dominating set-stochastic
diffusion search (CDS-SDS) network
backbone for MANET . . . . . . . . . . . 124--131
Mohammadhasan Miri and
Kamal Mohamedpour and
Yousef Darmani and
Mahasweta Sarkar and
R. Lal Tummala An efficient resource allocation
algorithm based on vertex coloring to
mitigate interference among coexisting
WBANs . . . . . . . . . . . . . . . . . 132--146
Kelton A. P. da Costa and
João P. Papa and
Celso O. Lisboa and
Roberto Munoz and
Victor Hugo C. de Albuquerque Internet of Things: a survey on machine
learning-based intrusion detection
approaches . . . . . . . . . . . . . . . 147--157
Maicon Kist and
Juliano Araújo Wickboldt and
Lisandro Zambenedetti Granville and
Juergen Rochol and
Luiz A. DaSilva and
Cristiano Bonato Both Flexible fine-grained baseband
processing with network functions
virtualization: Benefits and impacts . . 158--165
Junqi Guo and
Lan Yang and
Rongfang Bie and
Jiguo Yu and
Yuan Gao and
Yan Shen and
Anton Kos An XGBoost-based physical fitness
evaluation model using advanced feature
selection and Bayesian hyper-parameter
optimization for wearable running
monitoring . . . . . . . . . . . . . . . 166--180
Balasubramanian Prabhu kavin and
Sannasi Ganapathy A secured storage and privacy-preserving
model using CRT for providing security
on cloud and IoT-based applications . . 181--190
Dinesh Jackson Samuel R and
E. Fenil and
Gunasekaran Manogaran and
G. N. Vivekananda and
M. Thanjaivadivel and
S. Jeeva and
A. Ahilan Real time violence detection framework
for football stadium comprising of big
data analysis and deep learning through
bidirectional LSTM . . . . . . . . . . . 191--200
Sivakumar Krishnan and
S. Lokesh and
M. Ramya Devi An efficient Elman neural network
classifier with cloud supported Internet
of Things structure for health
monitoring system . . . . . . . . . . . 201--210
K. Thangaramya and
K. Kulothungan and
R. Logambigai and
M. Selvi and
Sannasi Ganapathy and
A. Kannan Energy aware cluster and neuro-fuzzy
based routing algorithm for wireless
sensor networks in IoT . . . . . . . . . 211--223
Osama AlFarraj and
Amr Tolba and
Salem Alkhalaf and
Ahmad AlZubi Neighbor predictive adaptive handoff
algorithm for improving mobility
management in VANETs . . . . . . . . . . 224--231
Kan Yu and
Yinglong Wang and
Jiguo Yu and
Dongxiao Yu and
Xiuzhen Cheng and
Zhiguang Shan Localized and distributed link
scheduling algorithms in IoT under
Rayleigh fading . . . . . . . . . . . . 232--244
Aziza Ben Mosbah and
Seid Eddine Hammami and
Hassine Moungla and
Hossam Afifi and
Ahmed E. Kamal Enhancing Device-to-Device direct
discovery based on predicted user
density patterns . . . . . . . . . . . . 245--259
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Maram Bani Younes and
Azzedine Boukerche Safety and efficiency control protocol
for highways using intelligent vehicular
networks . . . . . . . . . . . . . . . . 1--11
Defang Li and
Peilin Hong and
Kaiping Xue and
Jianing Pei Virtual network function placement and
resource optimization in NFV and edge
computing enabled networks . . . . . . . 12--24
Carlos M. J. M. Dourado, Jr. and
Suane Pires P. da Silva and
Raul Victor M. da Nóbrega and
Antonio Carlos da S. Barros and
Pedo P. Rebouças and
Victor Hugo C. de Albuquerque Deep learning IoT system for online
stroke detection in skull computed
tomography images . . . . . . . . . . . 25--39
Sergio Barrachina-Muñoz and
Francesc Wilhelmi and
Boris Bellalta To overlap or not to overlap: Enabling
channel bonding in high-density WLANs 40--53
Francisco H. M. B. Lima and
Luiz F. M. Vieira and
Marcos A. M. Vieira and
Alex B. Vieira and
José Augusto M. Nacif Water ping: ICMP for the Internet of
Underwater Things . . . . . . . . . . . 54--63
Zhijun Wu and
Qingbo Pan and
Meng Yue and
Liang Liu Sequence alignment detection of
TCP-targeted synchronous low-rate DoS
attacks . . . . . . . . . . . . . . . . 64--77
Amr Tolba Content accessibility preference
approach for improving service
optimality in Internet of Vehicles . . . 78--86
Adelina Madhja and
Sotiris Nikoletseas and
Alexandros A. Voudouris Adaptive wireless power transfer in
mobile ad hoc networks . . . . . . . . . 87--97
Mohammed Al-Maitah and
Ahmad Ali AlZubi and
Abdulaziz Alarifi An optimal storage utilization technique
for IoT devices using sequential machine
learning . . . . . . . . . . . . . . . . 98--105
Ahmad Ali AlZubi and
Mohammed Al-Maitah and
Abdulaziz Alarifi A best-fit routing algorithm for
non-redundant communication in
large-scale IoT based network . . . . . 106--113
Yupeng Hu and
Pengjie Ren and
Wei Luo and
Peng Zhan and
Xueqing Li Multi-resolution representation with
recurrent neural networks application
for streaming time series in IoT . . . . 114--132
Rafael Leira and
Guillermo Julián-Moreno and
Iván González and
Francisco J. Gómez-Arribas and
Jorge E. López de Vergara Performance assessment of 40 Gbit/s
off-the-shelf network cards for virtual
network probes in 5G networks . . . . . 133--143
S. Baskar and
S. Periyanayagi and
P. Mohamed Shakeel and
V. R. Sarma Dhulipala An energy persistent Range-dependent
Regulated Transmission Communication
model for vehicular network applications 144--153
Jiaqing Dong and
Hao Yin and
Chen Tian and
Ahmed M. Abdelmoniem and
Huapoing Zhou and
Bo Bai and
Gong Zhang Uranus: Congestion-proportionality among
slices based on Weighted Virtual
Congestion Control . . . . . . . . . . . 154--166
Kushan Sudheera Kalupahana Liyanage and
Maode Ma and
Peter Han Joo Chong Connectivity aware tribrid routing
framework for a generalized software
defined vehicular network . . . . . . . 167--177
Chun Shan and
Shanshan Mei and
Changzhen Hu and
Liyuan Liu and
Limin Mao Software structure characteristic
measurement method based on weighted
network . . . . . . . . . . . . . . . . 178--185
Pedro M Rodriguez and
Aitor Lizeaga and
Mikel Mendicute and
Iñaki Val Spectrum handoff strategy for cognitive
radio-based MAC for real-time industrial
wireless sensor and actuator networks 186--198
Chao Zhai and
Zhiyuan Yu and
Xinhua Wang High-efficient cooperative relaying with
wireless powered source and relay . . . 199--209
Hui Xia and
Chun-qiang Hu and
Fu Xiao and
Xiang-guo Cheng and
Zhen-kuan Pan An efficient social-like semantic-aware
service discovery mechanism for
large-scale Internet of Things . . . . . 210--220
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Jialu Hao and
Cheng Huang and
Jianbing Ni and
Hong Rong and
Ming Xian and
Xuemin (Sherman) Shen Fine-grained data access control with
attribute-hiding policy for cloud-based
IoT . . . . . . . . . . . . . . . . . . 1--10
Roberto M. Oliveira and
Alex B. Vieira and
Moises V. Ribeiro EPLC--CMAC: an enhanced cooperative MAC
protocol for broadband PLC systems . . . 11--22
Caihong Kai and
Yuting Liang and
Xinyue Hu and
Zhengqiong Liu and
Lusheng Wang An effective channel allocation
algorithm to maximize system utility in
heterogeneous DCB WLANs . . . . . . . . 23--35
Anish Jindal and
Gagangeet Singh Aujla and
Neeraj Kumar SURVIVOR: a blockchain based
edge-as-a-service framework for secure
energy trading in SDN-enabled
vehicle-to-grid environment . . . . . . 36--48
Yahui Li and
Zhiliang Wang and
Jiangyuan Yao and
Xia Yin and
Xingang Shi and
Jianping Wu and
Han Zhang MSAID: Automated detection of
interference in multiple SDN
applications . . . . . . . . . . . . . . 49--62
Yu Liang and
Jidong Ge and
Sheng Zhang and
Bin Luo Modeling and deploying hybrid tenant
requests with shared networklets . . . . 63--72
Christos Tsilopoulos and
George Xylomenos Adaptive semi-stateless forwarding for
Content-Centric Networks . . . . . . . . 73--85
Fabrício N. Godoi and
Gustavo W. Denardin and
Carlos H. Barriquello Reliability enhancement of packet
delivery in multi-hop wireless sensor
network . . . . . . . . . . . . . . . . 86--91
L. Song and
K. K. Chai and
Y. Chen and
J. Loo and
S. Jimaa and
Y. Iraqi Energy efficient cooperative coalition
selection in cluster-based capillary
networks for CMIMO IoT systems . . . . . 92--102
Chuan-Sheng Lin and
Sok-Ian Sou QoS-aware dynamic bandwidth reallocation
with deadline assurance for multipath
data offloading . . . . . . . . . . . . 103--112
Mrinai M. Dhanvijay and
Shailaja C. Patil Internet of Things: a survey of enabling
technologies in healthcare and its
applications . . . . . . . . . . . . . . 113--131
Debasish Ghose and
Anders Fròytlog and
Frank Y. Li Enabling early sleeping and early data
transmission in wake-up radio-enabled
IoT networks . . . . . . . . . . . . . . 132--144
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Francisco-Javier Moreno Muro and
Nina Skorin-Kapov and
Pablo Pavon-Marino Revisiting core traffic growth in the
presence of expanding CDNs . . . . . . . 1--11
Muge Sayit and
Cihat Cetinkaya and
Huseyin Ugur Yildiz and
Bulent Tavli DASH-QoS: a scalable network layer
service differentiation architecture for
DASH over SDN . . . . . . . . . . . . . 12--25
Roberto Bruschi and
Florin Ciucu and
Thomas Zinner Application areas and fundamental
challenges in Network Functions
Virtualization . . . . . . . . . . . . . 26--27
Subir Halder and
Amrita Ghosal and
Mauro Conti Efficient physical intrusion detection
in Internet of Things: a Node deployment
approach . . . . . . . . . . . . . . . . 28--46
Cuicui Lv and
Qiang Wang and
Wenjie Yan and
Jia Li Compressive sensing-based sequential
data gathering in WSNs . . . . . . . . . 47--59
Yingya Guo and
Zhiliang Wang and
Zhifeng Liu and
Xia Yin and
Xingang Shi and
Jianping Wu and
Yang Xu and
H. Jonathan Chao SOTE: Traffic engineering in hybrid
software defined networks . . . . . . . 60--72
Xiuwu Yu and
Lixing Zhou and
Xiangyang Li A novel hybrid localization scheme for
deep mine based on wheel graph and
chicken swarm optimization . . . . . . . 73--78
Shishupal Kumar and
Nidhi Lal and
Vijay Kumar Chaurasiya An energy efficient IPv6 packet delivery
scheme for industrial IoT over G.9959
protocol based Wireless Sensor Network
(WSN) . . . . . . . . . . . . . . . . . 79--87
G. G. Md. Nawaz Ali and
Kai Liu and
Victor C. S. Lee and
Peter H. J. Chong and
Yong Liang Guan and
Jun Chen Towards efficient and scalable
implementation for coding-based
on-demand data broadcast . . . . . . . . 88--104
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Heedo Kang and
Changhoon Yoon and
Seungwon Shin Astraea: Towards an effective and usable
application permission system for SDN 1--14
Vicente Casares-Giner and
Jorge Martinez-Bauset and
Canek Portillo Performance evaluation of framed slotted
ALOHA with reservation packets and
successive interference cancelation for
M2M networks . . . . . . . . . . . . . . 15--30
Zhizhu Liu and
Yinqiao Xiong and
Xin Liu and
Wei Xie and
Peidong Zhu 6Tree: Efficient dynamic discovery of
active addresses in the IPv6 address
space . . . . . . . . . . . . . . . . . 31--46
Marco Casazza and
Mathieu Bouet and
Stefano Secci Availability-driven NFV orchestration 47--61
Zufan Zhang and
Zhangyi Wang and
Chenquan Gan and
Porui Zhang A double auction scheme of resource
allocation with social ties and
sentiment classification for
Device-to-Device communications . . . . 62--71
Radhika Sukapuram and
Gautam Barua PPCU: Proportional per-packet consistent
updates for SDNs using data plane time
stamps . . . . . . . . . . . . . . . . . 72--86
Najla Al-Nabhan and
Nadia Al-Aboody and
A. B. M. Alim Al Islam A hybrid IoT-based approach for
emergency evacuation . . . . . . . . . . 87--97
Ahmed Y. Zakariya and
Sherif I. Rabia and
Yasmine Abouelseoud An optimized general target channel
sequence for prioritized cognitive radio
networks . . . . . . . . . . . . . . . . 98--109
K. Anish Pon Yamini and
K. Suthendran and
T. Arivoli Enhancement of energy efficiency using a
transition state MAC protocol for MANET 110--118
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Yuying Qi and
Xuanxia Yao and
Tao Zhu and
Huansheng Ning A semantic-based inference control
algorithm for OWL repository privacy
protection . . . . . . . . . . . . . . . 1--8
Dylan Smyth and
Donna O'Shea and
Victor Cionca and
Sean McSweeney Attacking distributed software-defined
networks by leveraging network state
consistency . . . . . . . . . . . . . . 9--19
Ararat Shaverdian and
Jagadish Ghimire and
Catherine Rosenberg Simple and efficient network-aware user
association rules for heterogeneous
networks . . . . . . . . . . . . . . . . 20--32
R. Vishnuvarthan and
R. Sakthivel and
V. Bhanumathi and
K. Muralitharan Energy-efficient data collection in
strip-based wireless sensor networks
with optimal speed mobile data
collectors . . . . . . . . . . . . . . . 33--40
Zhenlong Peng and
Xiaolin Gui and
Jian An and
Tianjie Wu and
Ruowei Gui Multi-Task oriented data diffusion and
transmission paradigm in crowdsensing
based on city public traffic . . . . . . 41--51
Sanaa Sharafeddine and
Rania Islambouli On-demand deployment of multiple aerial
base stations for traffic offloading and
network recovery . . . . . . . . . . . . 52--61
Francisco Renato C. Araújo and
Antonio M. de Sousa and
Leobino N. Sampaio SCaN-Mob: an opportunistic caching
strategy to support producer mobility in
named data wireless networking . . . . . 62--74
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
F. AL-Tam and
N. Correia Fractional switch migration in
multi-controller software-defined
networking . . . . . . . . . . . . . . . 1--10
Ian Vilar Bastos and
Igor Monteiro Moraes A diversity-based search-and-routing
approach for named-data networking . . . 11--23
Zhiwei Yan and
Jong-Hyouk Lee Mobility capability negotiation for IPv6
based ubiquitous mobile Internet . . . . 24--28
Van-Van Huynh and
Hoang-Sy Nguyen and
Ly Tran Thai Hoc and
Thanh-Sang Nguyen and
Miroslav Voznak Optimization issues for data rate in
energy harvesting relay-enabled
cognitive sensor networks . . . . . . . 29--40
Yujun Cheng and
Dong Yang and
Huachun Zhou and
Hongchao Wang Adopting IEEE 802.11 MAC for industrial
delay-sensitive wireless control and
monitoring applications: a survey . . . 41--67
Changqing Xia and
Xi Jin and
Linghe Kong and
Chi Xu and
Peng Zeng Heterogeneous slot scheduling for
real-time industrial wireless sensor
networks . . . . . . . . . . . . . . . . 68--77
Hashim A. Hashim and
Mohammad A. Abido Location management in LTE networks
using multi-objective particle swarm
optimization . . . . . . . . . . . . . . 78--88
Cun Ji and
Chao Zhao and
Li Pan and
Shijun Liu and
Chenglei Yang and
Xiangxu Meng A just-in-time shapelet selection
service for online time series
classification . . . . . . . . . . . . . 89--98
Lu Xiaofeng and
Jiang Fangshuo and
Zhou Xiao and
Yi Shengwei and
Sha Jing and
Pietro Lio ASSCA: API sequence and statistics
features combined architecture for
malware detection . . . . . . . . . . . 99--111
T. P. Anithaashri and
G. Ravichandran and
R. Baskaran Security enhancement for software
defined network using game theoretical
approach . . . . . . . . . . . . . . . . 112--121
Mohamed Abdel-Basset and
Gunasekaran Manogaran and
Mai Mohamed A neutrosophic theory based security
approach for fog and mobile-edge
computing . . . . . . . . . . . . . . . 122--132
Qingyu Shi and
Fang Wang and
Dan Feng and
Weibin Xie Adaptive load balancing based on
accurate congestion feedback for
asymmetric topologies . . . . . . . . . 133--145
Enhuan Dong and
Mingwei Xu and
Xiaoming Fu and
Yu Cao A loss aware MPTCP scheduler for highly
lossy networks . . . . . . . . . . . . . 146--158
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Dewang Ren and
Xiaolin Gui and
Kaiyuan Zhang and
Jie Wu Hybrid collaborative caching in mobile
edge networks: an analytical approach 1--16
Khaled Hejja and
Xavier Hesselbach Offline and online power aware resource
allocation algorithms with migration and
delay constraints . . . . . . . . . . . 17--34
Soodeh Hosseini and
Mehrdad Azizi The hybrid technique for DDoS detection
with supervised learning algorithms . . 35--45
Mariusz Gajewski and
Jordi Mongay Batalla and
Albert Levi and
Cengiz Togay and
Constandinos X. Mavromoustakis and
George Mastorakis Two-tier anomaly detection based on
traffic profiling of the home automation
system . . . . . . . . . . . . . . . . . 46--60
Huan Wang and
Zhaolin Yuan and
Yibin Chen and
Bingyang Shen and
Aixiang Wu An industrial missing values processing
method based on generating model . . . . 61--68
N. L. Venkataraman and
R. Kumar Design and analysis of application
specific network on chip for reliable
custom topology . . . . . . . . . . . . 69--76
Ming Xia and
Kaikai Chi and
Xiaoyan Wang and
Zhen Cheng Mode-oriented hybrid programming of
sensor network nodes for supporting
rapid and flexible utility assembly . . 77--97
Oussama Soualah and
Marouen Mechtri and
Chaima Ghribi and
Djamal Zeghlache Online and batch algorithms for VNFs
placement and chaining . . . . . . . . . 98--113
Tao Han and
Lijuan Zhang and
Sandeep Pirbhulal and
Wanqing Wu and
Victor Hugo C. de Albuquerque A novel cluster head selection technique
for edge-computing based IoMT systems 114--122
Amit Agarwal and
Durga Toshniwal SmPFT: Social media based profile fusion
technique for data enrichment . . . . . 123--131
Jiehong Wu and
Liangkai Zou and
Liang Zhao and
Ahmed Al-Dubai and
Lewis Mackenzie and
Geyong Min A multi-UAV clustering strategy for
reducing insecure communication range 132--142
Klenilmar Lopes Dias and
Mateus Almeida Pongelupe and
Walmir Matos Caminhas and
Luciano de Errico An innovative approach for real-time
network traffic classification . . . . . 143--157
Bo Wu and
Ke Xu and
Qi Li and
Bingyang Liu and
Shoushou Ren and
Fan Yang and
Meng Shen and
Kui Ren RFL: Robust fault localization on
unreliable communication channels . . . 158--174
Mahsa Ehsanpour and
Siavash Bayat and
Ali Mohammad Afshin Hemmatyar An efficient and social-aware
distributed in-network caching scheme in
named data networks using matching
theory . . . . . . . . . . . . . . . . . 175--183
Mingkui Wei and
Zhuo Lu and
Yufei Tang and
Xiang Lu Cyber and physical interactions to
combat failure propagation in smart
grid: Characterization, analysis and
evaluation . . . . . . . . . . . . . . . 184--192
Bingchuan Tian and
Chen Tian and
Bingquan Wang and
Bo Li and
Zehao He and
Haipeng Dai and
Kexin Liu and
Wanchun Dou and
Guihai Chen Scheduling dependent coflows to minimize
the total weighted job completion time
in datacenters . . . . . . . . . . . . . 193--205
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Kun Li and
Shengling Wang and
Xiuzhen Cheng Crowdsourcee evaluation based on
persuasion game . . . . . . . . . . . . 1--9
Pasi Lassila and
Misikir Eyob Gebrehiwot and
Samuli Aalto Optimal energy-aware load balancing and
base station switch-off control in $5$G
HetNets . . . . . . . . . . . . . . . . 10--22
Amel Arfaoui and
Ali Kribeche and
Sidi-Mohammed Senouci Context-aware anonymous authentication
protocols in the Internet of Things
dedicated to e-health applications . . . 23--36
Md. Forkan Uddin Energy efficiency maximization by joint
transmission scheduling and resource
allocation in downlink NOMA cellular
networks . . . . . . . . . . . . . . . . 37--50
Bo Yi and
Xingwei Wang and
Min Huang and
Anwei Dong A multi-criteria decision approach for
minimizing the influence of VNF
migration . . . . . . . . . . . . . . . 51--62
Xuanxia Yao and
Jiafei Wang and
Mengyu Shen and
Huafeng Kong and
Huansheng Ning An improved clustering algorithm and its
application in IoT data analysis . . . . 63--72
Eduardo P. M. Câmara Júnior and
Luiz F. M. Vieira and
Marcos A. M. Vieira 3DVS: Node scheduling in underwater
sensor networks using $3$D Voronoi
diagrams . . . . . . . . . . . . . . . . 73--83
Angelos-Christos Anadiotis and
Laura Galluccio and
Sebastiano Milardo and
Giacomo Morabito and
Sergio Palazzo SD-WISE: a Software-Defined WIreless
SEnsor network . . . . . . . . . . . . . 84--95
Guillermo Caminero and
Manuel Lopez-Martin and
Belen Carro Adversarial environment reinforcement
learning algorithm for intrusion
detection . . . . . . . . . . . . . . . 96--109
Zhixin Liu and
Peng Zhang and
Kit Yan Chan and
Li Li and
Xinping Guan Robust resource allocation for rates
maximization using fuzzy estimation of
dynamic channel states in OFDMA
femtocell networks . . . . . . . . . . . 110--124
Amit Nayyer and
Aman Kumar Sharma and
Lalit Kumar Awasthi Laman: a supervisor controller based
scalable framework for software defined
networks . . . . . . . . . . . . . . . . 125--134
Michail Fasoulakis and
Eirini Eleni Tsiropoulou and
Symeon Papavassiliou Satisfy instead of maximize: Improving
operation efficiency in wireless
communication networks . . . . . . . . . 135--146
Mohamed Elhoseny and
Gui-Bin Bian and
S. K. Lakshmanaprabu and
K. Shankar and
Amit Kumar Singh and
Wanqing Wu Effective features to classify ovarian
cancer data in Internet of Medical
Things . . . . . . . . . . . . . . . . . 147--156
Haizhou Bao and
Chuanhe Huang and
Zhongzheng Tang and
Qihui Li and
Qiufen Ni and
Xiaodai Dong and
Bin Fu Coded multicasting in cache-enabled
vehicular ad hoc network . . . . . . . . 157--170
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Sarah Jenkins \booktitleComputer Networks: Publisher's
Note . . . . . . . . . . . . . . . . . . iii--iii
Anonymous Passing the BATON . . . . . . . . . . . iv--v
Anonymous Receiving the BATON . . . . . . . . . . vi--vi
Hossein Ghannadrezaii and
Jean-François Bousquet Maximizing network coverage in a
multichannel short-range underwater
acoustic sensor network . . . . . . . . 1--10
Akhlaqur Rahman and
Jiong Jin and
Ashfaqur Rahman and
Antonio Cricenti and
Mahbuba Afrin and
Yu-ning Dong Energy-efficient optimal task offloading
in cloud networked multi-robot systems 11--32
Muralitharan Krishnan and
Sangwoon Yun and
Yoon Mo Jung Enhanced clustering and ACO-based
multiple mobile sinks for efficiency
improvement of wireless sensor networks 33--40
Apoorv Saxena and
Dieter Claeys and
Herwig Bruneel and
Joris Walraevens Analysis of the age of data in data
backup systems . . . . . . . . . . . . . 41--50
Preeti A. Kale and
Manisha J. Nene Scheduling of data aggregation trees
using local heuristics to enhance
network lifetime in sensor networks . . 51--64
Gaofei Huang and
Wanqing Tu A high-throughput wireless-powered relay
network with joint time and power
allocations . . . . . . . . . . . . . . 65--76
Håkon Gunleifsen and
Thomas Kemmerich and
Vasileios Gkioulos Dynamic setup of IPsec VPNs in service
function chaining . . . . . . . . . . . 77--91
Zhixin Liu and
Guochen Hou and
Yang Liu and
Xinbin Li and
Xinping Guan Robust power control strategy based on
hierarchical game with QoS provisioning
in full-duplex femtocell networks . . . 92--104
Murtaza Cicioglu and
Ali Çalhan HUBsFLOW: a novel interface protocol for
SDN-enabled WBANs . . . . . . . . . . . 105--117
Serif Bahtiyar and
Mehmet Baris Yaman and
Can Yilmaz Altinigne A multi-dimensional machine learning
approach to predict advanced malware . . 118--129
Duc Thang Ha and
Lila Boukhatem and
Megumi Kaneko and
Nhan Nguyen-Thanh and
Steven Martin Adaptive beamforming and user
association in heterogeneous cloud radio
access networks: a mobility-aware
performance-cost trade-off . . . . . . . 130--143
Maryam Ghasemi and
Ibrahim Matta and
Flavio Esposito The effect of (non-)competing brokers on
the quality and price of differentiated
Internet services . . . . . . . . . . . 144--164
Somayye Hajiheidari and
Karzan Wakil and
Maryam Badri and
Nima Jafari Navimipour Intrusion detection systems in the
Internet of things: a comprehensive
investigation . . . . . . . . . . . . . 165--191
A. Santhanavijayan and
S. R. Balasundaram Multi swarm optimization based automatic
ontology for e-assessment . . . . . . . 192--199
Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Marinela Shehaj and
Dritan Nace and
Ilya Kalesnikau and
Micha\l Pióro Link dimensioning of hybrid FSO/fiber
networks resilient to adverse weather
conditions . . . . . . . . . . . . . . . 1--13
Ricardo José Pfitscher and
Arthur Selle Jacobs and
Luciano Zembruzki and
Ricardo Luis dos Santos and
Eder John Scheid and
Muriel Figueredo Franco and
Alberto Schaeffer-Filho and
Lisandro Zambenedetti Granville Guiltiness: a practical approach for
quantifying virtual network functions
performance . . . . . . . . . . . . . . 14--31
Manisha Chahal and
Sandeep Harit Network selection and data dissemination
in heterogeneous software-defined
vehicular network . . . . . . . . . . . 32--44
Max Alaluna and
Eric Vial and
Nuno Neves and
Fernando M. V. Ramos Secure Multi-Cloud Network
Virtualization . . . . . . . . . . . . . 45--60
Enis Kocan and
Aleksandra Lopusina and
Milica Pejanovic-Djurisic Macro diversity for mmWave cellular
communications in indoor environment . . 61--67
Xue Leng and
Kaiyu Hou and
Yan Chen and
Kai Bu and
Libin Song and
You Li A lightweight policy enforcement system
for resource protection and management
in the SDN-based cloud . . . . . . . . . 68--81
Zhixin Liu and
Changjian Liang and
Yazhou Yuan and
Xinping Guan Energy efficient resource allocation
based on relay selection and subcarrier
pairing with channel uncertainty in
cognitive radio network . . . . . . . . 82--92
Chafiq Titouna and
Farid Na\"\it-Abdesselam and
Ashfaq Khokhar DODS: a Distributed Outlier Detection
Scheme for Wireless Sensor Networks . . 93--101
Wenbin Liu and
Leye Wang and
En Wang and
Yongjian Yang and
Djamal Zeghlache and
Daqing Zhang Reinforcement learning-based cell
selection in sparse mobile crowdsensing 102--114
Jessie Hui Wang and
Jilong Wang and
Changqing An and
Qianli Zhang A survey on resource scheduling for data
transfers in inter-datacenter WANs . . . 115--137
Zhenchun Wei and
Fei Liu and
Yan Zhang and
Juan Xu and
Jianjun Ji and
Zengwei Lyu A $Q$-learning algorithm for task
scheduling based on improved SVM in
wireless sensor networks . . . . . . . . 138--149
Bin Yang and
Zhenqiang Wu and
Yulong Shen and
Xiaohong Jiang Packet delivery ratio and energy
consumption in multicast delay tolerant
MANETs with power control . . . . . . . 150--161
Elif Ak and
Berk Canberk BCDN: a proof of concept model for
blockchain-aided CDN orchestration and
routing . . . . . . . . . . . . . . . . 162--171
Hailong Huang and
Andrey V. Savkin Reactive $3$D deployment of a flying
robotic network for surveillance of
mobile targets . . . . . . . . . . . . . 172--182
Roberto P. Antonioli and
Emanuel B. Rodrigues and
Diego A. Sousa and
Igor M. Guerreiro and
Carlos F. M. e Silva and
Francisco R. P. Cavalcanti Adaptive bearer split control for $5$G
multi-RAT scenarios with dual
connectivity . . . . . . . . . . . . . . 183--196
Audrey Wilmet and
Tiphaine Viard and
Matthieu Latapy and
Robin Lamarche-Perrin Outlier detection in IP traffic modelled
as a link stream using the stability of
degree distributions over time . . . . . 197--209
Wei W and
Xu Xia and
Marcin Wozniak and
Xunli Fan and
Robertas Dama\vsevi\vcius and
Ye Li Multi-sink distributed power control
algorithm for cyber-physical-systems in
coal mine tunnels . . . . . . . . . . . 210--219
Xin Liu and
Ruisheng Zhang and
Mingqi Zhao A robust authentication scheme with
dynamic password for wireless body area
networks . . . . . . . . . . . . . . . . 220--234
Yufeng Zhan and
Yuanqing Xia and
Athanasios V. Vasilakos Future directions of networked control
systems: a combination of cloud control
and fog control approach . . . . . . . . 235--248
Gunasekaran Manogaran and
Naveen Chilamkurti and
Ching-Hsien Hsu Machine learning algorithms towards
merging of mobile edge computing and
Internet of Things . . . . . . . . . . . 249--250
Sen Wang and
Jun Bi and
Jianping Wu and
Athanasios V. Vasilakos and
Qilin Fan VNE-TD: a virtual network embedding
algorithm based on temporal-difference
learning . . . . . . . . . . . . . . . . 251--263
Tao Hu and
Peng Yi and
Julong Lan and
Yuxiang Hu and
Penghao Sun ACST: Audit-based compromised switch
tolerance for enhancing data plane
robustness in software-defined
networking . . . . . . . . . . . . . . . 264--280
Yunchuan Sun and
Xiuzhen Cheng and
Yu Bai and
Jiguo Yu Information, knowledge, and semantics
for interacting with Internet-of-Things 281--282
Faiza Al-Salti and
Nasser Alzeidi and
Khaled Day and
Abderezak Touzene An efficient and reliable grid-based
routing protocol for UWSNs by exploiting
minimum hop count . . . . . . . . . . . Article 106869
Yahya Alfadhli and
You-Wei Chen and
Siming Liu and
Shuyi Shen and
Shuang Yao and
Daniel Guidotti and
Sufian Mitani and
Gee-Kung Chang Latency performance analysis of low
layers function split for URLLC
applications in $5$G networks . . . . . Article 106865
Anonymous Editorial Board . . . . . . . . . . . . Article 106911
Anonymous Publisher Note . . . . . . . . . . . . . Article 106912
K. Tolga Bagci and
A. Murat Tekalp SDN-enabled distributed open exchange:
Dynamic QoS-path optimization in
multi-operator services . . . . . . . . Article 106845
Rihab Boussada and
Balkis Hamdane and
Mohamed Elhoucine Elhdhili and
Leila Azouz Saidane Privacy-preserving aware data
transmission for IoT-based e-health . . Article 106866
Alberto Attilio Brincat and
Alfio Lombardo and
Giacomo Morabito and
Salvatore Quattropani On the use of Blockchain technologies in
WiFi networks . . . . . . . . . . . . . Article 106855
Premkumar Chithaluru and
Rajeev Tiwari and
Kamal Kumar AREOR --- Adaptive ranking based energy
efficient opportunistic routing scheme
in Wireless Sensor Network . . . . . . . Article 106863
Mahya Mohammadi Golchi and
Shideh Saraeian and
Mehrnoosh Heydari A hybrid of firefly and improved
particle swarm optimization algorithms
for load balancing in cloud
environments: Performance evaluation . . Article 106860
Miros\law Kantor and
Edyta Biernacka and
Piotr Bory\lo and
Jerzy Dom\.za\l and
Piotr Jurkiewicz and
Mi\losz Stypi\'nski and
Robert Wójcik A survey on multi-layer IP and optical
Software-Defined Networks . . . . . . . Article 106844
M. Khalily-Dermany and
M. J. Nadjafi-Arani and
S. Doostali Combining topology control and network
coding to optimize lifetime in
wireless-sensor networks . . . . . . . . Article 106859
Morteza Kheirkhah and
Ian Wakeman and
George Parisis Multipath transport and packet spraying
for efficient data delivery in data
centres . . . . . . . . . . . . . . . . Article 106852
Mira Morcos and
Jocelyne Elias and
Fabio Martignon and
Tijani Chahed and
Lin Chen On efficient radio resource calendaring
in cloud radio access network . . . . . Article 106862
Seungmin Oh and
Hyunchong Cho and
Sang-Ha Kim and
Wanseop Lee and
Euisin Lee Continuous object tracking protocol with
selective wakeup based on practical
boundary prediction in wireless sensor
networks . . . . . . . . . . . . . . . . Article 106854
Andrea Pimpinella and
Alessandro E. C. Redondi and
Matteo Cesana Walk this way! An IoT-based urban
routing system for smart cities . . . . Article 106857
S. Sicari and
A. Rizzardi and
G. Piro and
A. Coen-Porisini and
L. A. Grieco Beyond the smart things: Towards the
definition and the performance
assessment of a secure architecture for
the Internet of Nano-Things . . . . . . Article 106856
Mohammad M. Tajiki and
Mohammad Shojafar and
Behzad Akbari and
Stefano Salsano and
Mauro Conti and
Mukesh Singhal Joint failure recovery, fault
prevention, and energy-efficient
resource management for real-time SFC in
fog-supported SDN . . . . . . . . . . . Article 106850
An Xie and
Huawei Huang and
Xiaoliang Wang and
Song Guo and
Zhuzhong Qian and
Sanglu Lu Dual: Deploy stateful virtual network
function chains by jointly allocating
data-control traffic . . . . . . . . . . Article 106868
Yan Yang and
Xia Yin and
Xingang Shi and
Zhiliang Wang and
Jiong He and
Tom Z. J. Fu and
Marianne Winslett Inter-domain routing bottlenecks and
their aggravation . . . . . . . . . . . Article 106839
Yinbo Yu and
Xing Li and
Kai Bu and
Yan Chen and
Jianfeng Yang Falcon: Differential fault localization
for SDN control plane . . . . . . . . . Article 106851
Rui Zhang and
Peng Xie and
Chen Wang and
Gaoyang Liu and
Shaohua Wan Classifying transportation mode and
speed from trajectory data via deep
multi-scale learning . . . . . . . . . . Article 106861
Shunliang Zhang and
Yongming Wang and
Weihua Zhou Towards secure $5$G networks: a survey Article 106871
Bobai Zhao and
Dali Zhu and
Tong Xi and
Chenggang Jia and
Shang Jiang and
Siye Wang Convolutional neural network and
dual-factor enhanced variational Bayes
adaptive Kalman filter based indoor
localization with Wi-Fi . . . . . . . . Article 106864
Dilara Akdogan and
Duygu Karaoglan Altop and
Albert Levi Secure key agreement based on ordered
biometric features . . . . . . . . . . . Article 106885
Anonymous Editorial Board . . . . . . . . . . . . Article 106931
O. Arana and
F. Garcia and
J. Gomez Analysis of the effectiveness of
transmission power control as a location
privacy technique . . . . . . . . . . . Article 106880
Amel Arfaoui and
Ali Kribeche and
Sidi Mohammed Senouci and
Mohamed Hamdi Game-based adaptive anomaly detection in
wireless body area networks . . . . . . Article 106870
Hassan Jameel Asghar and
Emiliano De Cristofaro and
Guillaume Jourjon and
Mohammed Ali Kaafar and
Laurent Mathy and
Luca Melis and
Craig Russell and
Mang Yu Fast privacy-preserving network function
outsourcing . . . . . . . . . . . . . . Article 106893
Amira Chriki and
Haifa Touati and
Hichem Snoussi and
Farouk Kamoun FANET: Communication, mobility models
and security issues . . . . . . . . . . Article 106877
Mohamed Mostafa Fouad and
Ahmed Ibrahem Hafez and
Aboul Ella Hassanien Optimizing topologies in wireless sensor
networks: a comparative analysis between
the Grey Wolves and the Chicken Swarm
Optimization algorithms . . . . . . . . Article 106882
Bala Prakasa Rao Killi and
Seela Veerabhadreswara Rao Controller placement in software defined
networks: a comprehensive survey . . . . Article 106883
Yeonkeun Kim and
Jaehyun Nam and
Taejune Park and
Sandra Scott-Hayward and
Seungwon Shin SODA: a software-defined security
framework for IoT environments . . . . . Article 106889
Shuangjuan Li and
Hong Shen Minimizing maximum movement of sensors
for line barrier coverage in the plane Article 106841
Jinting Lin and
Lin Cui and
Yuxiang Zhang and
Fung Po Tso and
Quanlong Guan Extensive evaluation on the performance
and behaviour of TCP congestion control
protocols under varied network scenarios Article 106872
Edoardo Longo and
Alessandro E. C. Redondi and
Matteo Cesana Accurate occupancy estimation with WiFi
and bluetooth/BLE packet capture . . . . Article 106876
Mohsen Mahmoudi and
Karim Faez and
Abdorasoul Ghasemi Uncoordinated frequency hopping scheme
for defense against primary user
emulation attack in cognitive radio
networks . . . . . . . . . . . . . . . . Article 106884
Hassan N. Noura and
Reem Melki and
Mohammad Malli and
Ali Chehab Design and realization of efficient and
secure multi-homed systems based on
random linear network coding . . . . . . Article 106886
Roberto M. Oliveira and
Lucas G. de Oliveira and
Alex B. Vieira and
Moises V. Ribeiro An enhanced cooperative MAC protocol for
hybrid PLC/wireless systems . . . . . . Article 106878
Saniya Zafar and
Rasheed Hussain and
Fatima Hussain and
Sobia Jangsher Interplay between Big Spectrum Data and
Mobile Internet of Things: Current
solutions and future challenges . . . . Article 106879
Anonymous 9 December 2019 . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . Article 106964
Hongli Xu and
Jianchun Liu and
Chen Qian and
He Huang and
Chunming Qiao Reducing controller response time with
hybrid routing in software defined
networks . . . . . . . . . . . . . . . . Article 106891
Chunlin Li and
Jianhang Tang and
Yang Zhang and
Xin Yan and
Youlong Luo Energy efficient computation offloading
for nonorthogonal multiple access
assisted mobile edge computing with
energy harvesting devices . . . . . . . Article 106890
Pinaki Sarkar and
Sukumar Nandi A class of key-node indexed hash chains
based key predistribution (KPS): Signed
weighted graphs . . . . . . . . . . . . Article 106881
Oluwatosin Ahmed Amodu and
Mohamed Othman and
Nor Kamariah Noordin and
Idawaty Ahmad Transmission capacity analysis of
relay-assisted D2D cellular networks
with M2M coexistence . . . . . . . . . . Article 106887
Wenjun Li and
Dagang Li and
Xinwei Liu and
Ting Huang and
Xianfeng Li and
Wenxia Le and
Hui Li A power-saving pre-classifier for
TCAM-based IP lookup . . . . . . . . . . Article 106898
Chi-Dung Phung and
Benevid Felix Silva and
Michele Nogueira and
Stefano Secci MPTCP robustness against large-scale
man-in-the-middle attacks . . . . . . . Article 106896
Yuki Goto and
Bryan Ng and
Winston K. G. Seah and
Yutaka Takahashi Queueing analysis of software defined
network with realistic OpenFlow-based
switch model . . . . . . . . . . . . . . Article 106892
Zakarya Benyamina and
Khelifa Benahmed and
Fateh Bounaama ANEL: a novel efficient and lightweight
authentication scheme for vehicular ad
hoc networks . . . . . . . . . . . . . . Article 106899
Mauro Conti and
Muhammad Hassan and
Chhagan Lal BlockA\em uth: BlockChain based
distributed producer authentication in
ICN . . . . . . . . . . . . . . . . . . Article 106888
Xia Wang and
Jia Liu and
Yanyan Wang and
Xingyu Chen and
Lijun Chen Efficient missing tag identification in
blocker-enabled RFID systems . . . . . . Article 106894
Mennan Selimi and
Adisorn Lertsinsrubtavee and
Arjuna Sathiaseelan and
Llorenç Cerd\`a-Alabern and
Leandro Navarro PiCasso: Enabling information-centric
multi-tenancy at the edge of community
mesh networks . . . . . . . . . . . . . Article 106897
Mohammad Noormohammadpour and
Srikanth Kandula and
Cauligi S. Raghavendra and
Sriram Rao Efficient inter-datacenter bulk
transfers with mixed completion time
objectives . . . . . . . . . . . . . . . Article 106903
Yuqing Qiu and
Chung-Horng Lung and
Samuel Ajila and
Pradeep Srivastava Experimental evaluation of LXC container
migration for cloudlets using multipath
TCP . . . . . . . . . . . . . . . . . . Article 106900
Niezi Mharsi and
Makhlouf Hadji Edge computing optimization for
efficient RRH--BBU assignment in cloud
radio access networks . . . . . . . . . Article 106901
G. Rajesh and
Ashvini Chaturvedi Correlation analysis and statistical
characterization of heterogeneous sensor
data in environmental sensor networks Article 106902
Tuan Le and
Mario Gerla Fragmented data routing based on
exponentially distributed contacts and
inter-contact times in DTNs . . . . . . Article 106917
Antoine Saverimoutou and
Bertrand Mathieu and
Sandrine Vaton A $6$-month analysis of factors
impacting web browsing quality for QoE
prediction . . . . . . . . . . . . . . . Article 106905
David Eugui and
José Alberto Hernández Analysis of a hybrid Fixed-Elastic DBA
with guaranteed fronthaul delay in
XG(s)-PONs . . . . . . . . . . . . . . . Article 106907
Madhukrishna Priyadarsini and
Joy Chandra Mukherjee and
Padmalochan Bera and
Shailesh Kumar and
A. H. M. Jakaria and
M. Ashiqur Rahman An adaptive load balancing scheme for
software-defined network controllers . . Article 106918
Xiaoyu Liang and
Taieb Znati On the performance of intelligent
techniques for intensive and stealthy
DDos detection . . . . . . . . . . . . . Article 106906
Syed Hassan Ahmed and
Ali Kashif Bashir and
Awais Ahmad and
Wael Guibene Computer networks special issue on
intelligent and connected transportation
systems . . . . . . . . . . . . . . . . Article 106895
Seungmin Oh and
Hyunchong Cho and
Sang-Ha Kim and
Wanseop Lee and
Euisin Lee Corrigendum to ``Continuous object
tracking protocol with selective wakeup
based on practical boundary prediction
in wireless sensor networks'' Computer
Networks Volume \bf 162 (2019) 106854 Article 106938
Anonymous 24 December 2019 . . . . . . . . . . . . ??
Anonymous Editorial Board . . . . . . . . . . . . Article 107000
Anonymous Publisher Note . . . . . . . . . . . . . Article 107001
Alperen Eroglu and
Okan Yaman and
Ertan Onur Density-aware cellular coverage control:
Interference-based density estimation Article 106922
Qiyue Wu and
Peng Sun and
Azzedine Boukerche Unmanned aerial vehicle-assisted
energy-efficient data collection scheme
for sustainable wireless sensor networks Article 106927
José Maurício Costa and
Pedro P. Paniago and
Joaquim de Andrade and
Thiago F. Noronha and
Marcos A. M. Vieira Integer linear programming formulations
for the variable data rate and variable
channel bandwidth scheduling problem in
wireless networks . . . . . . . . . . . Article 106939
Vineet Gokhale and
Jayakrishnan Nair and
Subhasis Chaudhuri and
Jan Fesl On QoS-compliant telehaptic
communication over shared networks . . . Article 106935
Muhammad Rizwan Asghar and
Qinwen Hu and
Sherali Zeadally Cybersecurity in industrial control
systems: Issues, technologies, and
challenges . . . . . . . . . . . . . . . Article 106946
Ze Yang and
Kwan L. Yeung Minimum weight controller tree design in
SDN . . . . . . . . . . . . . . . . . . Article 106949
Giuseppe Aceto and
Domenico Ciuonzo and
Antonio Montieri and
Antonio Pescap\`e MIMETIC: Mobile encrypted traffic
classification using multimodal deep
learning . . . . . . . . . . . . . . . . Article 106944
Lav Gupta and
Tara Salman and
Maede Zolanvari and
Aiman Erbad and
Raj Jain Fault and performance management in
multi-cloud virtual network services
using AI: a tutorial and a case study Article 106950
Ado Adamou Abba Ari and
Abdelhak Gueroui and
Chafiq Titouna and
Ousmane Thiare and
Zibouda Aliouat Resource allocation scheme for $5$G
C-RAN: a Swarm Intelligence based
approach . . . . . . . . . . . . . . . . Article 106957
Miguel López and
Alberto Peinado and
Andrés Ortiz An extensive validation of a SIR
epidemic model to study the propagation
of jamming attacks against IoT wireless
networks . . . . . . . . . . . . . . . . Article 106945
Sa'ed Abed and
Mohammad Al-Shayeji and
Fahad Ebrahim A secure and energy-efficient platform
for the integration of Wireless Sensor
Networks and Mobile Cloud Computing . . Article 106956
Faria Khandaker and
Sharief Oteafy and
Hossam S. Hassanein and
Hesham Farahat A functional taxonomy of caching
schemes: Towards guided designs in
information-centric networks . . . . . . Article 106937
Hye-Rim Cheon and
Jae-Hyun Kim Social-aware mobile data offloading
algorithm through small cell backhaul
network: Direct and indirect user
influence perspectives . . . . . . . . . Article 106951
H. -F. Bermudez and
J. -M. Martinez-Caro and
R. Sanchez-Iborra and
J. L. Arciniegas and
M. -D. Cano Live video-streaming evaluation using
the ITU-T P.1203 QoE model in LTE
networks . . . . . . . . . . . . . . . . Article 106967
Siyuan Jia and
Matthew Luckie and
Bradley Huffaker and
Ahmed Elmokashfi and
Emile Aben and
Kimberly Claffy and
Amogh Dhamdhere Tracking the deployment of IPv6:
Topology, routing and performance . . . Article 106947