Last update: Wed May 17 09:55:33 MDT 2023
Volume 53, Number 11, July 28, 2009Guido Urdaneta and Guillaume Pierre and Maarten van Steen Wikipedia workload analysis for decentralized hosting . . . . . . . . . 1830--1845
Ian F. Akyildiz and Harry Rudin Editorial . . . . . . . . . . . . . . . 1--2 Sunmyeng Kim and Young-Jong Cho and Yong K. Kim Admission control scheme based on priority access for wireless LANs . . . 3--12 Chunxi Li and Changjia Chen Measurement-based study on the relation between users' watching behavior and network sharing in P2P VoD systems . . . 13--27 Yixin Jiang and Haojin Zhu and Minghui Shi and Xuemin (Sherman) Shen and Chuang Lin An efficient dynamic-identity based signature scheme for secure network coding . . . . . . . . . . . . . . . . . 28--40 Guillermo Ibáñez and Alberto García-Martínez and Juan A. Carral and Pedro A. González and Arturo Azcorra and José M. Arco HURP/HURBA: Zero-configuration hierarchical Up/Down routing and bridging architecture for Ethernet backbones and campus networks . . . . . 41--56 Minh Huynh and Stuart Goose and Prasant Mohapatra Resilience technologies in Ethernet . . 57--78 Jose L. Muñoz and Oscar Esparza and Mónica Aguilar and Victor Carrascal and Jordi Forné RDSR-V. Reliable Dynamic Source Routing for video-streaming over mobile ad hoc networks . . . . . . . . . . . . . . . . 79--96 Tim Stevens and Tim Wauters and Chris Develder and Filip De Turck and Bart Dhoedt and Piet Demeester Analysis of an anycast based overlay system for scalable service discovery and execution . . . . . . . . . . . . . 97--111 Suman Kumar and Seung-Jong Park and S. Sitharama Iyengar A loss-event driven scalable fluid simulation method for high-speed networks . . . . . . . . . . . . . . . . 112--132 Johan Eklund and Karl-Johan Grinnemo and Stephan Baucke and Anna Brunstrom Tuning SCTP failover for carrier grade telephony signaling . . . . . . . . . . 133--149 Yiu-Wing Leung Sparse telephone gateway for Internet telephony . . . . . . . . . . . . . . . 150--164 Deke Guo and Yuan He and Panlong Yang Receiver-oriented design of Bloom filters for data-centric routing . . . . 165--174 Anonymous Editorial Board . . . . . . . . . . . . ??
Raouf Boutaba and Seán Murphy and Albert Banchs Special issue on ``Wireless Multi-Hop Networking for Infrastructure Access'' 175--177 Jonathan Wellons and Liang Dai and Yuan Xue and Yui Cui Augmenting predictive with oblivious routing for wireless mesh networks under traffic uncertainty . . . . . . . . . . 178--195 Jian Zhang and Yuanzhu Peter Chen and Ivan Marsic MAC-layer proactive mixing for network coding in multi-hop wireless networks 196--207 Charles B. Ward and Nathan M. Wiegand Complexity results on labeled shortest path problems from wireless routing metrics . . . . . . . . . . . . . . . . 208--217 Vincent Toubiana and Houda Labiod and Laurent Reynaud and Yvon Gourhant A global security architecture for operated hybrid WLAN mesh networks . . . 218--230 Valerio Targon and Brunilde Sans\`o and Antonio Capone The joint Gateway Placement and Spatial Reuse Problem in Wireless Mesh Networks 231--240 Mahesh K. Marina and Samir R. Das and Anand Prabhu Subramanian A topology control approach for utilizing multiple channels in multi-radio wireless mesh networks . . . 241--256 Nico Bayer and Bangnan Xu and Veselin Rakocevic and Joachim Habermann Application-aware scheduling for VoIP in Wireless Mesh Networks . . . . . . . . . 257--277 Ayman Radwan and Hossam S. Hassanein and Abd-Elhamid M. Taha Identifying the capacity gains of multihop cellular networks . . . . . . . 278--290 Carlos J. Bernardos and Maria Calderon and Ignacio Soto and Ana Beatriz Solana and Kilian Weniger Building an IP-based community wireless mesh network: Assessment of PACMAN as an IP address autoconfiguration protocol 291--303 Jiazhen Zhou and Kenneth Mitchell A scalable delay based analytical framework for CSMA/CA wireless mesh networks . . . . . . . . . . . . . . . . 304--318 Katerina Papadaki and Vasilis Friderikos Gateway selection and routing in wireless mesh networks . . . . . . . . . 319--329 Cheolgi Kim and Young-Bae Ko and Nitin H. Vaidya Link-state routing without broadcast storming for multichannel mesh networks 330--340 Anonymous Editorial Board . . . . . . . . . . . . ??
Abdul Hasib and Abraham O. Fapojuwo Cross-layer radio resource management in integrated WWAN and WLAN networks . . . 341--356 Andrés Ortiz and Julio Ortega and Antonio F. Díaz and Alberto Prieto Network interfaces for programmable NICs and multicore platforms . . . . . . . . 357--376 Shucheng Yu and Kui Ren and Wenjing Lou Attribute-based on-demand multicast group setup with membership anonymity 377--386 Akbar Ghaffar Pour Rahbar and Oliver Yang Agile bandwidth management techniques in slotted all-optical packet switched networks . . . . . . . . . . . . . . . . 387--403 Erik F. Golen and Sumita Mishra and Nirmala Shenoy An underwater sensor allocation scheme for a range dependent environment . . . 404--415 Rui Gustavo Crespo Predicting feature interactions by using inconsistency models . . . . . . . . . . 416--427 Ertan Onur and Cem Ersoy and Hakan Deliç and Lale Akarun Surveillance with wireless sensor networks in obstruction: Breach paths as watershed contours . . . . . . . . . . . 428--441 Xiaowei Yang and Yanbin Lu and Lei Zan Improving XCP to achieve max--min fair bandwidth allocation . . . . . . . . . . 442--461 Satish Chand and Hari Om Efficient staircase scheme with seamless channel transition mechanism . . . . . . 462--474 Yixin Wu and Suman Kumar and Seung-Jong Park Measurement and performance issues of transport protocols over 10 Gbps high-speed optical networks . . . . . . 475--488 Chamil Kulatunga and Gorry Fairhurst Enforcing layered multicast congestion control using ECN-nonce . . . . . . . . 489--505 Xiang Feng and Francis C. M. Lau A new economic generalized particle model for flow control . . . . . . . . . 506--524 Anonymous Editorial Board . . . . . . . . . . . . ??
Violet R. Syrotiuk and Brahim Bensaou Computer networks (Elsevier) special issue on advances in wireless and mobile networks . . . . . . . . . . . . . . . . 525--526 Uichin Lee and Mario Gerla A survey of urban vehicular sensing platforms . . . . . . . . . . . . . . . 527--544 Peyman TalebiFard and Terrence Wong and Victor C. M. Leung Access and service convergence over the mobile Internet --- a survey . . . . . . 545--557 Zhenxia Zhang and Richard W. Pazzi and Azzedine Boukerche A mobility management scheme for wireless mesh networks based on a hybrid routing protocol . . . . . . . . . . . . 558--572 Zhenzhen Ye and Alhussein A. Abouzeid A unified model for joint throughput-overhead analysis of random access mobile ad hoc networks . . . . . 573--588 Chiara Boldrini and Marco Conti and Andrea Passarella Design and performance evaluation of ContentPlace, a social-aware data dissemination system for opportunistic networks . . . . . . . . . . . . . . . . 589--604 Jelena Mi\vsi\'c and Vojislav B. Mi\vsi\'c Making the best of limited resources: Optimized differential sensing in cognitive PANs . . . . . . . . . . . . . 605--617 Zhengqing Hu and Chen-Khong Tham CCMAC: Coordinated cooperative MAC for wireless LANs . . . . . . . . . . . . . 618--630 Volodymyr Pryyma and Damla Turgut and Ladislau Bölöni Active time scheduling for rechargeable sensor networks . . . . . . . . . . . . 631--640 Jeongkeun Lee and Jiho Ryu and Sung-Ju Lee and Ted Taekyoung Kwon Improved modeling of IEEE 802.11a PHY through fine-grained measurements . . . 641--657 Tal Rusak and Philip Levis Physically-based models of low-power wireless links using signal power simulation . . . . . . . . . . . . . . . 658--673 Anonymous Editorial Board . . . . . . . . . . . . ??
Stephanos Androutsellis-Theotokis and Diomidis Spinellis and Panos Louridas and Kostas Stroggylos A market-based approach to managing the risk of peer-to-peer transactions . . . 675--688 Zhonghong Ou and Erkki Harjula and Otso Kassinen and Mika Ylianttila Performance evaluation of a Kademlia-based communication-oriented P2P system under churn . . . . . . . . . 689--705 D. M. Shan and K. C. Chua and G. Mohan On burst rescheduling in OBS networks with partial wavelength conversion capability . . . . . . . . . . . . . . . 706--715 Bin Wu and Kwan L. Yeung and Pin-Han Ho ILP formulations for non-simple $p$-cycle and $p$-trail design in WDM mesh networks . . . . . . . . . . . . . 716--725 Celal Çeken and Serhan Yarkan and Hüseyin Arslan Interference aware vertical handoff decision algorithm for quality of service support in wireless heterogeneous networks . . . . . . . . . 726--740 Ioannis Anagnostopoulos and Christos Anagnostopoulos and Dimitrios D. Vergados Estimating evolution of freshness in Internet cache directories under the capture--recapture methodology . . . . . 741--765 Gagan Raj Gupta and Ness B. Shroff Practical scheduling schemes with throughput guarantees for multi-hop wireless networks . . . . . . . . . . . 766--780 Luis Rodero-Merino and Antonio Fernández Anta and Luis López and Vicent Cholvi Performance of random walks in one-hop replication networks . . . . . . . . . . 781--796 Doraid Dalalah Real-time optimization flow control . . 797--810 Ming Lei and Susan V. Vrbsky and Yang Xiao Scheduling on-demand data broadcast in mixed-type request environments . . . . 811--825 Javad Akbari Torkestani and Mohammad Reza Meybodi An intelligent backbone formation algorithm for wireless ad hoc networks based on distributed learning automata 826--843 Seungjoon Lee and Bobby Bhattacharjee and Suman Banerjee and Bo Han A general framework for efficient geographic routing in wireless networks 844--861 N. M. Mosharaf Kabir Chowdhury and Raouf Boutaba A survey of network virtualization . . . 862--876 Guido Urdaneta and Guillaume Pierre and Maarten van Steen Corrigendum to ``Wikipedia workload analysis for decentralized hosting'' [Computer Networks 53 (11) (2009) 1830--1845] . . . . . . . . . . . . . . 877--878 Anonymous Editorial Board . . . . . . . . . . . . ??
Eitan Altman and Tamer Ba\csar and Emma Hart and Daniele Miorandi and Aris L. Moustakas and Stavros Toumpis Special issue on ``New Network Paradigms'' . . . . . . . . . . . . . . 879--880 Falko Dressler and Ozgur B. Akan A survey on bio-inspired networking . . 881--900 Michael Meisel and Vasileios Pappas and Lixia Zhang A taxonomy of biologically inspired research in computer networking . . . . 901--916 Koichiro Kitagawa and Toshiyuki Tanaka Optimization of sequences in CDMA systems: a statistical--mechanics approach . . . . . . . . . . . . . . . . 917--924 Yuedong Xu and John C. S. Lui and Dah-Ming Chiu On oligopoly spectrum allocation game in cognitive radio networks with capacity constraints . . . . . . . . . . . . . . 925--943 Daniele Miorandi and Lidia Yamamoto and Francesco De Pellegrini A survey of evolutionary and embryogenic approaches to autonomic networking . . . 944--959 Andreas Konstantinidis and Kun Yang and Qingfu Zhang and Demetrios Zeinalipour-Yazti A multi-objective evolutionary algorithm for the deployment and power assignment problem in wireless sensor networks . . 960--976 Cesar D. Guerrero and Miguel A. Labrador Traceband: a fast, low overhead and accurate tool for available bandwidth estimation and monitoring . . . . . . . 977--990 Alessandro Nordio and Carla-Fabiana Chiasserini and Armando Muscariello Signal reconstruction in sensor networks with flat and clustered topologies . . . 991--1004 Alonso Silva and Eitan Altman and Pierre Bernhard and Mérouane Debbah Continuum equilibria and global optimization for routing in dense static ad hoc networks . . . . . . . . . . . . 1005--1018 Poul E. Heegaard and Otto J. Wittner Overhead reduction in a distributed path management system . . . . . . . . . . . 1019--1041 Huijuan Wang and Piet Van Mieghem Sampling networks by the union of $m$ shortest path trees . . . . . . . . . . 1042--1053 Anonymous Editorial Board . . . . . . . . . . . . ??
Ram Keralapura and Antonio Nucci and Chen-Nee Chuah A novel self-learning architecture for P2P traffic classification in high speed networks . . . . . . . . . . . . . . . . 1055--1068 Lijun Wang and Lin Cai and Xinzhi Liu and Xuemin (Sherman) Shen Bounds estimation and practical stability of AIMD/RED systems with time delays . . . . . . . . . . . . . . . . . 1069--1082 Eng Hwee Ong and Jamil Y. Khan Cooperative radio resource management framework for future IP-based multiple radio access technologies environment 1083--1107 Iksoon Hwang and Ana Cavalli Testing a probabilistic FSM using interval estimation . . . . . . . . . . 1108--1125 John Felix Charles Joseph and Amitabha Das and Bu-Sung Lee and Boon-Chong Seet CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETS . . . . . . . . . . . 1126--1141 Simon Schütz and Henrik Abrahamsson and Bengt Ahlgren and Marcus Brunner Design and implementation of the Node Identity Internetworking Architecture 1142--1154 Jinchang Lu and Maode Ma A cross-layer elastic CAC and holistic opportunistic scheduling for QoS support in WiMAX . . . . . . . . . . . . . . . . 1155--1168 Guanhua Yan and Stephan Eidenbenz and Sunil Thulasidasan and Pallab Datta and Venkatesh Ramaswamy Criticality analysis of Internet infrastructure . . . . . . . . . . . . . 1169--1182 Rajashekhar Biradar and Sunilkumar Manvi and Mylara Reddy Link stability based multicast routing scheme in MANET . . . . . . . . . . . . 1183--1196 Andrej Vilhar and Roman Novak and Gorazd Kandus The impact of network topology on the performance of MAP selection algorithms 1197--1209 Beno\^\it Garbinato and Adrian Holzer and François Vessaz Context-aware broadcasting approaches in mobile ad hoc networks . . . . . . . . . 1210--1228 Ke Xu and Ming Zhang and Jiangchuan Liu and Zhijing Qin and Mingjiang Ye Proxy caching for peer-to-peer live streaming . . . . . . . . . . . . . . . 1229--1241 Valerio Targon and Brunilde Sans\`o and Antonio Capone Erratum to ``The joint Gateway Placement and Spatial Reuse Problem in Wireless Mesh Networks'' [Computer Networks 54 (2010) 231--240] . . . . . . . . . . . . 1242--1242 Anonymous Editorial Board . . . . . . . . . . . . ??
Bernhard Plattner and David Hutchison and James P. G. Sterbenz Resilient and survivable networks . . . 1243--1244 James P. G. Sterbenz and David Hutchison and Egemen K. Çetinkaya and Abdul Jabbar and Justin P. Rohrer and Marcus Schöller and Paul Smith Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines 1245--1265 Daniel L. Guidoni and Raquel A. F. Mini and Antonio A. F. Loureiro On the design of resilient heterogeneous wireless sensor networks based on small world concepts . . . . . . . . . . . . . 1266--1281 Zhichun Li and Yan Gao and Yan Chen HiFIND: a high-speed flow-level intrusion detection approach with DoS resiliency . . . . . . . . . . . . . . . 1282--1299 Michael Menth and Matthias Hartmann and Rüdiger Martin and Tarik \vCi\vci\'c and Amund Kvalbein Loop-free alternates and not-via addresses: a proper combination for IP fast reroute? . . . . . . . . . . . . . 1300--1315 Kunwoo Park and Sangheon Pack and Ted ``Taekyoung'' Kwon An adaptive peer-to-peer live streaming system with incentives for resilience 1316--1327 P. M. Santiago del Río and J. A. Hernández and J. Aracil and J. E. López de Vergara and J. Dom\.za\l and R. Wójcik and P. Cho\lda and K. Wajda and J. P. Fernández Palacios and Ó. González de Dios and R. Duque A reliability analysis of Double-Ring topologies with Dual Attachment using $p$-cycles for optical metro networks 1328--1341 Anonymous Editorial Board . . . . . . . . . . . . ??
Alexandre Viejo and Jordi Castell\`a-Roca Using social networks to distort users' profiles generated by Web search engines 1343--1357 Zvi Rosberg and John Matthews and Moshe Zukerman A network rate management protocol with TCP congestion control and fairness for all . . . . . . . . . . . . . . . . . . 1358--1374 Xingang Shi and Dah-Ming Chiu and John C. S. Lui An online framework for catching top spreaders and scanners . . . . . . . . . 1375--1388 Pablo J. Argibay-Losada and Andrés Suárez-González and Cándido López-García and Manuel Fernández-Veiga A new design for end-to-end proportional loss differentiation in IP networks . . 1389--1403 Josep Domenech and Jose A. Gil and Julio Sahuquillo and Ana Pont Using current Web page structure to improve prefetching performance . . . . 1404--1417 Kyung-Hoe Kim and Kwang-Min Jeong and Chul-Hee Kang and Seung-Joon Seok A transmission control SCTP for real-time multimedia streaming . . . . . 1418--1425 Ming-Fei Guo and Xinbing Wang and Min-You Wu On the capacity of multi-packet reception enabled multi-channel multi-interface wireless networks . . . 1426--1439 Joydeep Chandra and Santosh Kumar Shaw and Niloy Ganguly HPC5: an efficient topology generation mechanism for Gnutella networks . . . . 1440--1459 Yao Yu and Lei Guo and Xingwei Wang and Cuixiang Liu Routing security scheme based on reputation evaluation in hierarchical ad hoc networks . . . . . . . . . . . . . . 1460--1469 Sabbir Ahmed and Gour C. Karmakar and Joarder Kamruzzaman An environment-aware mobility model for wireless ad hoc network . . . . . . . . 1470--1489 S. Laki and P. Mátray and P. Hága and I. Csabai and G. Vattay A model based approach for improving router geolocation . . . . . . . . . . . 1490--1501 Pedro Peris-Lopez and Julio C. Hernandez-Castro and Juan M. E. Tapiador and Tieyan Li and Yingjiu Li Vulnerability analysis of RFID protocols for tag ownership transfer . . . . . . . 1502--1508 Eitan Altman and Tania Jiménez and Daniel Kofman Discriminatory processor sharing queues with stationary ergodic service times and the performance of TCP in overload 1509--1519 Tsu-Yang Wu and Yuh-Min Tseng An efficient user authentication and key exchange protocol for mobile client--server environment . . . . . . . 1520--1530 Anonymous Editorial Board . . . . . . . . . . . . ??
António Pinto and Manuel Ricardo Secure multicast in IPTV services . . . 1531--1542 Yueping Zhang and Yong Xiong and Steve Liu and Dmitri Loguinov Queuing dynamics and single-link stability of delay-based window congestion control . . . . . . . . . . . 1543--1553 Sameer Qazi and Tim Moors On the impact of routing matrix inconsistencies on statistical path monitoring in overlay networks . . . . . 1554--1572 Bazil Taha Ahmed and Jose Luis Masa Campos and Jorge A. Ruiz-Cruz Impact of Ultra Wide Band emission on WiMAX systems at $ 2.5 $ and $ 3.5 $ GHz 1573--1583 Anatolij Zubow and Daniel Camps Mur and Xavier Perez Costa and Paolo Favaro Greedy scheduling algorithm (GSA) --- Design and evaluation of an efficient and flexible WiMAX OFDMA scheduling solution . . . . . . . . . . . . . . . . 1584--1606 Jesper H. Sòrensen and Rasmus Krigslund and Petar Popovski and Toshiaki Koike Akino and Torben Larsen Scalable DeNoise-and-Forward in bidirectional relay networks . . . . . . 1607--1614 Konstantinos Oikonomou and Dimitrios Kogias and Ioannis Stavrakakis Probabilistic flooding for efficient information dissemination in random graph topologies . . . . . . . . . . . . 1615--1629 Lanny Sitanayah and Amitava Datta and Rachel Cardell-Oliver Heuristic algorithm for finding boundary cycles in location-free low density wireless sensor networks . . . . . . . . 1630--1645 Salekul Islam and J. William Atwood Sender access and data distribution control for inter-domain multicast groups . . . . . . . . . . . . . . . . . 1646--1671 P. S. Kritzinger and Henry Msiska and Tino Mundangepfupfu and Paolo Pileggi and Andrew Symington Comparing the results from various performance models of IEEE 802.11g DCF 1672--1682 G. Booker and A. Sprintson and E. Zechman and C. Singh and S. Guikema Efficient traffic loss evaluation for transport backbone networks . . . . . . 1683--1691 Lyes Khoukhi and Soumaya Cherkaoui Intelligent QoS management for multimedia services support in wireless mobile ad hoc networks . . . . . . . . . 1692--1706 Kai-Wei Ke and Chen-Nien Tsai and Ho-Ting Wu Performance analysis for hierarchical resource allocation in multiplexed mobile packet data networks . . . . . . 1707--1725 Anonymous Editorial Board . . . . . . . . . . . . ??
Hyang-Won Lee and Jeong-woo Cho and Song Chong Distributed max--min flow control for multi-rate overlay multicast . . . . . . 1727--1738 Duc A. Tran and Cuong Pham Enabling content-based publish/subscribe services in cooperative P2P networks . . 1739--1749 P. Casas and S. Vaton and L. Fillatre and I. Nikiforov Optimal volume anomaly detection and isolation in large-scale IP networks using coarse-grained measurements . . . 1750--1766 Xiang Feng and Francis C. M. Lau Parallel physics-inspired waterflow particle mechanics algorithm for load rebalancing . . . . . . . . . . . . . . 1767--1777 Fragkiskos Papadopoulos On scaling the IEEE 802.11 to facilitate scalable wireless networks . . . . . . . 1778--1791 Wissam Fawaz and Iyad Ouaiss and Ken Chen and Harry Perros Deadline-based connection setup in wavelength-routed WDM networks . . . . . 1792--1804 Evren Güney and Necati Aras and \.I. Kuban Altìnel and Cem Ersoy Efficient integer programming formulations for optimum sink location and routing in heterogeneous wireless sensor networks . . . . . . . . . . . . 1805--1822 Kaikai Chi and Xiaohong Jiang and Susumu Horiguchi Network coding-based reliable multicast in wireless networks . . . . . . . . . . 1823--1836 Ruishan Zhang and Xinyuan Wang and Xiaohui Yang and Xuxian Jiang On the billing vulnerabilities of SIP-based VoIP systems . . . . . . . . . 1837--1847 Xiaohuan Yan and Y. Ahmet \cSekercio\uglu and Sathya Narayanan A survey of vertical handover decision algorithms in Fourth Generation heterogeneous wireless networks . . . . 1848--1863 Bheemarjuna Reddy Tamma and Anirudh Badam and C. Siva Ram Murthy and Ramesh R. Rao $K$-Tree: a multiple tree video multicast protocol for ad hoc wireless networks . . . . . . . . . . . . . . . . 1864--1884 Jianning Mai and Ashwin Sridharan and Hui Zang and Chen-Nee Chuah Fast Filtered Sampling . . . . . . . . . 1885--1898 Xiaofeng Lu and Pan Hui and Don Towsley and Juahua Pu and Zhang Xiong Anti-localization anonymous routing for Delay Tolerant Network . . . . . . . . . 1899--1910 Yu-Chen Kuo Quorum-based power-saving multicast protocols in the asynchronous ad hoc network . . . . . . . . . . . . . . . . 1911--1922 Anonymous Editorial Board . . . . . . . . . . . . ??
Pedro García-López and Michael W. Sobolewski and Marc Sánchez-Artigas Guest editorial for the special issue collaborative P2P systems . . . . . . . 1923--1925 Pierre St. Juste and David Wolinsky and P. Oscar Boykin and Michael J. Covington and Renato J. Figueiredo SocialVPN: Enabling wide-area collaboration with integrated social and overlay networks . . . . . . . . . . . . 1926--1938 Gérald Oster and Rubén Mondéjar and Pascal Molli and Sergiu Dumitriu Building a collaborative peer-to-peer wiki system on a structured overlay . . 1939--1952 Santosh Kulkarni and Scott Douglas and David Churchill Badumna: a decentralised network engine for virtual environments . . . . . . . . 1953--1967 Marc S\`anchez-Artigas and Jordi Pujol-Ahulló and Lluis Pamies-Juarez and Pedro García-López p2pWeb: an open, decentralized infrastructure of Web servers for sharing ephemeral Web content . . . . . 1968--1985 Krzysztof Rzadca and Jackson Tan Teck Yong and Anwitaman Datta Multi-objective optimization of multicast overlays for collaborative applications . . . . . . . . . . . . . . 1986--2006 Di Wu and Chao Liang and Yong Liu and Keith W. Ross Redesigning multi-channel P2P live video systems with View-Upload Decoupling . . 2007--2018 Odysseas Papapetrou and Wolf Siberski and Wolfgang Nejdl PCIR: Combining DHTs and peer clusters for efficient full-text P2P indexing . . 2019--2040 Nicklas S. Beijar Zone indexing: Optimizing the balance between searching and indexing in a loosely structured overlay . . . . . . . 2041--2055 Juan M. Tirado and Daniel Higuero and Florin Isaila and Jesús Carretero and Adriana Iamnitchi Affinity P2P: a self-organizing content-based locality-aware collaborative peer-to-peer network . . . 2056--2070 Rubén Cuevas and Ángel Cuevas and Albert Cabellos-Aparicio and Loránd Jakab and Carmen Guerrero A collaborative P2P scheme for NAT Traversal Server discovery based on topological information . . . . . . . . 2071--2085 Gian Paolo Jesi and Alberto Montresor and Maarten van Steen Secure peer sampling . . . . . . . . . . 2086--2098 Anonymous Editorial Board . . . . . . . . . . . . ??
Michael Menth and Frank Lehrieder PCN-based measured rate termination . . 2099--2116 Luci Pirmez and Jaime C. Carvalho, Jr. and Flávia C. Delicato and Fábio Protti and Luiz F. R. C. Carmo and Paulo F. Pires and Marcos Pirmez SUTIL --- Network selection based on utility function and integer linear programming . . . . . . . . . . . . . . 2117--2136 Xiaomao Mao and Huifang Chen and Peiliang Qiu and Zhaoyang Zhang Energy-efficient scheduling for multiple access in wireless sensor networks: a job scheduling method . . . . . . . . . 2137--2146 Yu Ge and Chen-Khong Tham and Peng-Yong Kong and Yew-Hock Ang Dynamic end-to-end capacity in IEEE 802.16 wireless mesh networks . . . . . 2147--2165 N. Akar and C. Raffaelli and M. Savi and E. Karasan Shared-per-wavelength asynchronous optical packet switching: a comparative analysis . . . . . . . . . . . . . . . . 2166--2181 Chuan Yue and Mengjun Xie and Haining Wang An automatic HTTP cookie management system . . . . . . . . . . . . . . . . . 2182--2198 C. Cano and B. Bellalta and A. Sfairopoulou and J. Barceló Tuning the EDCA parameters in WLANs with heterogeneous traffic: a flow-level analysis . . . . . . . . . . . . . . . . 2199--2214 Eliana Stavrou and Andreas Pitsillides A survey on secure multipath routing protocols in WSNs . . . . . . . . . . . 2215--2238 Josephina Antoniou and Vicky Papadopoulou and Vasos Vassiliou and Andreas Pitsillides Cooperative user--network interactions in next generation communication networks . . . . . . . . . . . . . . . . 2239--2255 Zahra Ahmadian and Somayeh Salimi and Ahmad Salahi Security enhancements against UMTS--GSM interworking attacks . . . . . . . . . . 2256--2270 Preetha Thulasiraman and Xuemin (Sherman) Shen Interference aware resource allocation for hybrid hierarchical wireless networks . . . . . . . . . . . . . . . . 2271--2280 Patrick Maillé and Bruno Tuffin Price war in heterogeneous wireless networks . . . . . . . . . . . . . . . . 2281--2292 Rully Adrian Santosa and Bu-Sung Lee and Chai Kiat Yeo Efficient DSR route request flooding with directional antennas . . . . . . . 2293--2309 Jaideep D. Padhye and Kush Kothari and Madhu Venkateshaiah and Matthew Wright Evading stepping-stone detection under the cloak of streaming media with SNEAK 2310--2325 Anonymous Editorial Board . . . . . . . . . . . . ??
Gustavo Marfia and Claudio E. Palazzi and Giovanni Pau and Mario Gerla and Marco Roccetti TCP Libra: Derivation, analysis, and comparison with other RTT-fair TCPs . . 2327--2344 Mohit Saxena and Ramana Rao Kompella CLAMP: Efficient class-based sampling for flexible flow monitoring . . . . . . 2345--2356 Oleg Berzin Hierarchical Mobility Label Based Network: System model and performance analysis . . . . . . . . . . . . . . . . 2357--2382 Robin Doss and Gang Li and Vicky Mak and Menik Tissera Information discovery in mission-critical wireless sensor networks . . . . . . . . . . . . . . . . 2383--2399 Gilvan M. Durães and André Soares and José R. Amazonas and William Giozza The choice of the best among the shortest routes in transparent optical networks . . . . . . . . . . . . . . . . 2400--2409 M. Esnaashari and M. R. Meybodi A learning automata based scheduling solution to the dynamic point coverage problem in wireless sensor networks . . 2410--2438 Junyi Zhou and Jing Shi Error analysis of non-collaborative wireless localization in circular-shaped regions . . . . . . . . . . . . . . . . 2439--2452 Stefano Secci and Jean-Louis Rougier and Achille Pattavina AS-level source routing for multi-provider connection-oriented services . . . . . . . . . . . . . . . . 2453--2467 Hyewon Lee and Ilenia Tinnirello and Jeonggyun Yu and Sunghyun Choi A performance analysis of block ACK scheme for IEEE 802.11e networks . . . . 2468--2481 Lei Zhang and Bo Qin and Qianhong Wu and Futai Zhang Efficient many-to-one authentication with certificateless aggregate signatures . . . . . . . . . . . . . . . 2482--2491 Cristel Pelsser and Steve Uhlig and Tomonori Takeda and Bruno Quoitin and Kohei Shiomoto Providing scalable NH-diverse iBGP route re-distribution to achieve sub-second switch-over time . . . . . . . . . . . . 2492--2505 Wolfgang Mühlbauer and Steve Uhlig and Anja Feldmann and Olaf Maennel and Bruno Quoitin and Bingjie Fu Impact of routing parameters on route diversity and path inflation . . . . . . 2506--2518 Xavier Gelabert and Oriol Sallent and Jordi Pérez-Romero and Ramon Agustí Spectrum sharing in cognitive radio networks with imperfect sensing: a discrete-time Markov model . . . . . . . 2519--2536 Beibei Wang and Yongle Wu and K. J. Ray Liu Game theory for cognitive radio networks: an overview . . . . . . . . . 2537--2561 Yueping Zhang and Dmitri Loguinov ABS: Adaptive buffer sizing for heterogeneous networks . . . . . . . . . 2562--2574 Anonymous Editorial Board . . . . . . . . . . . . ??
Yigal Bejerano and Seung-Jae Han and Mark Smith A novel frequency planning algorithm for mitigating unfairness in wireless LANs 2575--2590 Marcos A. Simplício, Jr. and Paulo S. L. M. Barreto and Cintia B. Margi and Tereza C. M. B. Carvalho A survey on key management mechanisms for distributed Wireless Sensor Networks 2591--2612 Hui Yang and Stephen D. Patek and Zhenyu Yan Strategies for adaptive smoothing and rebuffering via dynamic network calculus 2613--2625 P. L. Conti and L. De Giovanni and M. Naldi Blind maximum likelihood estimation of traffic matrices under long-range dependent traffic . . . . . . . . . . . 2626--2639 Navid Ghazisaidi and Martin Maier Techno-economic analysis of EPON and WiMAX for future Fiber-Wireless (FiWi) networks . . . . . . . . . . . . . . . . 2640--2650 R. Marin-Lopez and F. Pereniguez and F. Bernal and A. F. Gomez Secure three-party key distribution protocol for fast network access in EAP-based wireless networks . . . . . . 2651--2673 Fu-Yi Hung and Ivan Marsic Performance analysis of the IEEE 802.11 DCF in the presence of the hidden stations . . . . . . . . . . . . . . . . 2674--2687 Hande Alemdar and Cem Ersoy Wireless sensor networks for healthcare: a survey . . . . . . . . . . . . . . . . 2688--2710 Gabriel Maciá-Fernández and Rafael A. Rodríguez-Gómez and Jesús E. Díaz-Verdejo Defense techniques for low-rate DoS attacks against application servers . . 2711--2727 Qishi Wu and Nageswara S. V. Rao and Xukang Lu and Ki-Hyeon Kwon Stabilizing transport dynamics of control channels over wide-area networks 2728--2743 Xiaodong Lin and Rongxing Lu and Davis Kwan and Xuemin (Sherman) Shen REACT: an RFID-based privacy-preserving children tracking scheme for large amusement parks . . . . . . . . . . . . 2744--2755 Xin Sun and Ruben Torres and Sanjay Rao Preventing DDoS attacks on Internet servers exploiting P2P systems . . . . . 2756--2774 Hua Wang and Xiangxu Meng and Shuai Li and Hong Xu A tree-based particle swarm optimization for multicast routing . . . . . . . . . 2775--2786 Luigi Atzori and Antonio Iera and Giacomo Morabito The Internet of Things: a survey . . . . 2787--2805 Anonymous Editorial Board . . . . . . . . . . . . ??
Metin Feridun and Joseph Hellerstein Editorial . . . . . . . . . . . . . . . 2807--2808 Qi Liao and Andrew Blaich and Dirk VanBruggen and Aaron Striegel Managing networks through context: Graph visualization and exploration . . . . . 2809--2824 Kevin Feeney and Rob Brennan and John Keeney and Hendrik Thomas and Dave Lewis and Aidan Boran and Declan O'Sullivan Enabling decentralised management through federation . . . . . . . . . . . 2825--2839 Bin Guo and Daqing Zhang and Michita Imai Enabling user-oriented management for ubiquitous computing: The meta-design approach . . . . . . . . . . . . . . . . 2840--2855 Andreas Berl and Nicholas Race and Johnathan Ishmael and Hermann de Meer Network virtualization in energy-efficient office environments . . 2856--2868 Tridib Mukherjee and Ayan Banerjee and Georgios Varsamopoulos and Sandeep K. S. Gupta Model-driven coordinated management of data centers . . . . . . . . . . . . . . 2869--2886 Jacques M. Bahi and Michel Salomon A decentralized energy-based diffusion algorithm to increase the lifetime of MANETs . . . . . . . . . . . . . . . . . 2887--2898 Félix Gómez Mármol and Joao Girao and Gregorio Martínez Pérez TRIMS, a privacy-aware trust and reputation model for identity management systems . . . . . . . . . . . . . . . . 2899--2912 Anonymous Editorial Board . . . . . . . . . . . . ??
Hél\`ene Le Cadre and Mustapha Bouhtou An interconnection game between mobile network operators: Hidden information forecasting using expert advice fusion 2913--2942 Zhi Ang Eu and Hwee-Pink Tan and Winston K. G. Seah Opportunistic routing in wireless sensor networks powered by ambient energy harvesting . . . . . . . . . . . . . . . 2943--2966 Jongdeog Lee and Krasimira Kapitanova and Sang H. Son The price of security in wireless sensor networks . . . . . . . . . . . . . . . . 2967--2978 Daniel F. Macedo and Aldri L. dos Santos and Luiz H. A. Correia and José M. Nogueira and Guy Pujolle Transmission power and data rate aware routing on wireless networks . . . . . . 2979--2990 Luis Cobo and Alejandro Quintero and Samuel Pierre Ant-based routing for wireless multimedia sensor networks using multiple QoS metrics . . . . . . . . . . 2991--3010 Seongkwan Kim and Lochan Verma and Sunghyun Choi and Daji Qiao Collision-Aware Rate Adaptation in multi-rate WLANs: Design and implementation . . . . . . . . . . . . . 3011--3030 George Alyfantis and Stathes Hadjiefthymiades and Lazaros Merakos Distributed QoS-sensitive band selection strategies for dynamic spectrum access in unlicensed CDMA networks . . . . . . 3031--3048 Ming-Fong Tsai and Tzu-Chi Huang and Ce-Kuen Shieh and Kuo-Chih Chu Dynamical combination of byte level and Sub-Packet level FEC in HARQ mechanism to reduce error recovery overhead on video streaming over wireless networks 3049--3067 Taiming Feng and Long Long and Ahmed E. Kamal and Lu Ruan Two-link failure protection in WDM mesh networks with $p$-cycles . . . . . . . . 3068--3080 Rosario G. Garroppo and Stefano Giordano and Luca Tavanti A survey on multi-constrained optimal path computation: Exact and approximate algorithms . . . . . . . . . . . . . . . 3081--3107 Ying Zhang and Damien Fay and Liam Kilmartin and Andrew W. Moore A Garch-based adaptive playout delay algorithm for VoIP . . . . . . . . . . . 3108--3122 Pablo Belzarena and Laura Aspirot End-to-end quality of service seen by applications: a statistical learning approach . . . . . . . . . . . . . . . . 3123--3143 René Serral-Graci\`a and Marcelo Yannuzzi and Yann Labit and Philippe Owezarski and Xavi Masip-Bruin An efficient and lightweight method for Service Level Agreement assessment . . . 3144--3158 Cunqing Hua and Rong Zheng On link-level starvation in dense 802.11 wireless community networks . . . . . . 3159--3172 Shaohe Lv and Xiaodong Wang and Xingming Zhou On the rate adaptation for IEEE 802.11 wireless networks . . . . . . . . . . . 3173--3186 Yuan Rao and Ru-chuan Wang Agent-based load balancing routing for LEO satellite networks . . . . . . . . . 3187--3195 Anonymous Editorial Board . . . . . . . . . . . . ??
Gregor v. Bochmann and Dave Rayner and Colin H. West Some notes on the history of protocol engineering . . . . . . . . . . . . . . 3197--3209 Chao Chen and Zesheng Chen and Yubin Li Characterizing and defending against divide-conquer-scanning worms . . . . . 3210--3222 Eiji Oki and Ayako Iwaki Fine two-phase routing over shortest paths with traffic matrix . . . . . . . 3223--3231 Craig A. Shue and Minaxi Gupta An Internet without the Internet protocol . . . . . . . . . . . . . . . . 3232--3245 Dimitrios P. Pezaros and Konstantinos Georgopoulos and David Hutchison High-speed, in-band performance measurement instrumentation for next generation IP networks . . . . . . . . . 3246--3263 Abdeltouab Belbekkouche and Abdelhakim Hafid and Mariam Tagmouti and Michel Gendreau Topology-aware wavelength partitioning for DWDM OBS networks: a novel approach for absolute QoS provisioning . . . . . 3264--3279 Houda Labiod and Hai Lin and Riccardo Nonni Analytical study of intradomain handover in multiple-mobile-routers-based multihomed NEMO networks . . . . . . . . 3280--3294 Jongwook Lee and Saewoong Bahk and Jin-Ghoo Choi Energy efficient transmission scheduling for infrastructure sensor nodes in location systems . . . . . . . . . . . . 3295--3308 Tian Bu and Jin Cao and Aiyou Chen and Patrick P. C. Lee Sequential hashing: a flexible approach for unveiling significant patterns in high speed networks . . . . . . . . . . 3309--3326 Hongbo Jiang and Zihui Ge and Shudong Jin and Jia Wang Network prefix-level traffic profiling: Characterizing, modeling, and evaluation 3327--3340 Mustafizur Rahman and Rajiv Ranjan and Rajkumar Buyya Reputation-based dependable scheduling of workflow applications in Peer-to-Peer Grids . . . . . . . . . . . . . . . . . 3341--3359 Stylianos Dimitriou and Vassilis Tsaoussidis Promoting effective service differentiation with Size-oriented Queue Management . . . . . . . . . . . . . . . 3360--3372 Benoit Donnet and Bruno Baynat and Timur Friedman Improving retouched Bloom filter for trading off selected false positives against false negatives . . . . . . . . 3373--3387 Loránd Jakab and Albert Cabellos-Aparicio and Thomas Silverston and Marc Solé and Florin Coras and Jordi Domingo-Pascual CoreCast: How core/edge separation can help improving inter-domain live streaming . . . . . . . . . . . . . . . 3388--3401 Sara Alouf and Giovanni Neglia and Iacopo Carreras and Daniele Miorandi and Álvaro Fialho Fitting genetic algorithms to distributed on-line evolution of network protocols . . . . . . . . . . . . . . . 3402--3420 Dimitris E. Charilas and Athanasios D. Panagopoulos A survey on game theory applications in wireless networks . . . . . . . . . . . 3421--3430 Shao Tao and A. L. Ananda and Mun Choon Chan Greedy face routing with face identification support in wireless networks . . . . . . . . . . . . . . . . 3431--3448 Mehmet Yunus Donmez and Rabun Kosar and Cem Ersoy An analytical approach to the deployment quality of surveillance wireless sensor networks considering the effect of jammers and coverage holes . . . . . . . 3449--3466
Ian F. Akyildiz and Harry Rudin Editorial . . . . . . . . . . . . . . . 1--2 Daniel M. Batista and Nelson L. S. da Fonseca Robust scheduler for grid networks under uncertainties of both application demands and resource availability . . . 3--19 Ying Li and Antonis Papachristodoulou and Mung Chiang and A. Robert Calderbank Congestion control and its stability in networks with delay sensitive traffic 20--32 T. Heikkinen and A. Hottinen Distributed subchannel assignment in a two-hop network . . . . . . . . . . . . 33--44 Ihsan Ayyub Qazi and Taieb Znati On the design of load factor based congestion control protocols for next-generation networks . . . . . . . . 45--60 Mine Altunay and Sven Leyffer and Jeffrey T. Linderoth and Zhen Xie Optimal response to attacks on the open science grid . . . . . . . . . . . . . . 61--73 Juan J. Alcaraz and Esteban Egea-López and Javier Vales-Alonso and Joan García-Haro Dynamic system model for optimal configuration of mobile RFID systems . . 74--83 Nadjib Aitsaadi and Nadjib Achir and Khaled Boussetta and Guy Pujolle Artificial potential field approach in WSN deployment: Cost, QoM, connectivity, and lifetime constraints . . . . . . . . 84--105 Jocelyne Elias and Fabio Martignon and Konstantin Avrachenkov and Giovanni Neglia A game theoretic analysis of network design with socially-aware users . . . . 106--118 Josep Domingo-Ferrer and Úrsula González-Nicolás Decapitation of networks with and without weights and direction: The economics of iterated attack and defense 119--130 Zehua Zhou and Xiaojing Xiang and Xin Wang and Jianping Pan A holistic sensor network design for energy conservation and efficient data dissemination . . . . . . . . . . . . . 131--146 Younghyun Kim and Sangheon Pack and Chung Gu Kang and Soonjun Park An enhanced information server for seamless vertical handover in IEEE 802.21 MIH networks . . . . . . . . . . 147--158 Abdeltouab Belbekkouche and Jihene Rezgui and Abdelhakim Hafid Wireless mesh and optical burst switching convergence for a novel metropolitan area network architecture 159--172 Xavier Gelabert and Oriol Sallent and Jordi Pérez-Romero and Ramon Agustí Performance evaluation of radio access selection strategies in constrained multi-access/multi-service wireless networks . . . . . . . . . . . . . . . . 173--192 Darli A. A. Mello and Helio Waldman and Gustavo S. Quitério Interval availability estimation for protected connections in optical networks . . . . . . . . . . . . . . . . 193--204 Tao Zhou and Jing Xu Provable secure authentication protocol with anonymity for roaming service in global mobility networks . . . . . . . . 205--213 Ashraf Al Daoud and Murat Alanyali and David Starobinski Reservation policies for revenue maximization from secondary spectrum access in cellular networks . . . . . . 214--224 Donggook Kim and Jaesub Kim and Kyu Ho Park An event-aware MAC scheduling for energy efficient aggregation in wireless sensor networks . . . . . . . . . . . . . . . . 225--240 Kyungmin Cho and Younghyun Ju and Sungjae Jo and Yunseok Rhee and Junehwa Song SATI: a scalable and traffic-efficient data delivery infrastructure for real-time sensing applications . . . . . 241--263 S. Guo and M. Derakhshani and M. H. Falaki and U. Ismail and R. Luk and E. A. Oliver and S. Ur Rahman and A. Seth and M. A. Zaharia and S. Keshav Design and implementation of the KioskNet system . . . . . . . . . . . . 264--281 George C. Hadjichristofi and Luiz A. DaSilva and Scott F. Midkiff and Unghee Lee and Waltemar De Sousa Routing, security, resource management, and monitoring in ad hoc networks: Implementation and integration . . . . . 282--299 Sabina Serbu and Pascal Felber and Peter Kropf HyPeer: Structured overlay with flexible-choice routing . . . . . . . . 300--313 Ren-Song Ko A distributed routing algorithm for sensor networks derived from macroscopic models . . . . . . . . . . . . . . . . . 314--329 Kiam Cheng How and Maode Ma and Yang Qin Routing and QoS provisioning in cognitive radio networks . . . . . . . . 330--342 Can Zhao and Xiaojun Lin On the queue-overflow probabilities of a class of distributed scheduling algorithms . . . . . . . . . . . . . . . 343--355 Christos P. Antonopoulos On BS/BS coordination towards interference minimization in WiMAX networks . . . . . . . . . . . . . . . . 356--369 Anonymous Editorial Board . . . . . . . . . . . . ??
Eitan Altman and Sajal K. Das and Luciano Lenzini and Adam Wolisz Preface . . . . . . . . . . . . . . . . 371--373 Sabrina Gaito and Elena Pagani and Gian Paolo Rossi Strangers help friends to communicate in opportunistic networks . . . . . . . . . 374--385 Marco Ajmone Marsan and Michela Meo Energy efficient wireless Internet access with cooperative cellular networks . . . . . . . . . . . . . . . . 386--398 Ioannis Psaras and Lefteris Mamatas On Demand Connectivity Sharing: Queuing management and load balancing for User-Provided Networks . . . . . . . . . 399--414 Chakchai So-In and Raj Jain and Subharthi Paul and Jianli Pan Virtualization architecture using the ID/Locator split concept for Future Wireless Networks (FWNs) . . . . . . . . 415--430 Mariana Dirani and Zwi Altman Self-organizing networks in next generation radio access networks: Application to fractional power control 431--438 Gergely Biczók and László Toka and András Gulyás and Tuan A. Trinh and Attila Vidács Incentivizing the global wireless village . . . . . . . . . . . . . . . . 439--456 Mario Gerla and Leonard Kleinrock Vehicular networks and the future of the mobile Internet . . . . . . . . . . . . 457--469 Sulan Wong and Eitan Altman and Julio Rojas-Mora Internet access: Where law, economy, culture and technology meet . . . . . . 470--479 Lijun Chen and Steven H. Low and John C. Doyle Cross-layer design in multihop wireless networks . . . . . . . . . . . . . . . . 480--496 Anonymous Editorial Board . . . . . . . . . . . . ??
Fei Yang and Isabelle Augé-Blum Delivery ratio-maximized wakeup scheduling for ultra-low duty-cycled WSNs under real-time constraints . . . . 497--513 Josip Lorincz and Antonio Capone and Dinko Begu\vsi\'c Optimized network management for energy savings of wireless access networks . . 514--540 Stevens Le Blond and Arnaud Legout and Walid Dabbous Pushing BitTorrent locality to the limit 541--557 Luca De Cicco and Saverio Mascolo and Vittorio Palmisano Skype Video congestion control: an experimental investigation . . . . . . . 558--571 Ivan D. Barrera and Gonzalo R. Arce and Stephan Bohacek Statistical approach for congestion control in gateway routers . . . . . . . 572--582 Juan J. Gálvez and Pedro M. Ruiz and Antonio F. G. Skarmeta Multipath routing with spatial separation in wireless multi-hop networks without location information 583--599 Ivan Vidal and Jaime Garcia-Reinoso and Ignacio Soto and Francisco Valera Evaluating extensions to IMS session setup for multicast-based many-to-many services . . . . . . . . . . . . . . . . 600--621 Katarzyna Kosek-Szott and Marek Natkaniec and Andrzej R. Pach A simple but accurate throughput model for IEEE 802.11 EDCA in saturation and non-saturation conditions . . . . . . . 622--635 Pei-chun Cheng and Beichuan Zhang and Daniel Massey and Lixia Zhang Identifying BGP routing table transfers 636--649 Soonmok Kwon and Jae Hoon Ko and Jeongkyu Kim and Cheeha Kim Dynamic timeout for data aggregation in wireless sensor networks . . . . . . . . 650--664 P. Pavon-Marino and B. Garcia-Manrubia and R. Aparicio-Pardo Multi-hour network planning based on domination between sets of traffic matrices . . . . . . . . . . . . . . . . 665--675 Xingwei Wang and Weigang Hou and Lei Guo and Jiannong Cao and Dingde Jiang Energy saving and cost reduction in multi-granularity green optical networks 676--688 Christophoros Christophorou and Andreas Pitsillides and Tomas Lundborg Enhanced radio resource management algorithms for efficient MBMS service provision in UTRAN . . . . . . . . . . . 689--710 Lei Li and Baoxian Zhang and Xiaojun Shen and Jun Zheng and Zheng Yao A study on the weak barrier coverage problem in wireless sensor networks . . 711--721 Jenq-Shiou Leu and Cheng-Wei Tsai and Wei-Hsiang Lin Resource searching in an unstructured P2P network based on Cloning Random Walker assisted by Dominating Set . . . 722--733 Yan Cai and Patrick P. C. Lee and Weibo Gong and Don Towsley Analysis of traffic correlation attacks on router queues . . . . . . . . . . . . 734--747 Bin Wu and Kwan L. Yeung and Bing Hu and Pin-Han Ho $ M^2$-CYCLE: an optical layer algorithm for fast link failure detection in all-optical mesh networks . . . . . . . 748--758 Natalia Castro Fernandes and Otto Carlos Muniz Bandeira Duarte A lightweight group-key management protocol for secure ad-hoc-network routing . . . . . . . . . . . . . . . . 759--778 Maria Gregori and Ignacio Llatser and Albert Cabellos-Aparicio and Eduard Alarcón Physical channel characterization for medium-range nanonetworks using flagellated bacteria . . . . . . . . . . 779--791 Nikolaos Chrysos and Manolis Katevenis Distributed WFQ scheduling converging to weighted max--min fairness . . . . . . . 792--806 Xingwei Wang and Weigang Hou and Lei Guo and Jiannong Cao and Dingde Jiang A new multi-granularity grooming algorithm based on traffic partition in IP over WDM networks . . . . . . . . . . 807--821 Fabrice Theoleyre A route-aware MAC for wireless multihop networks with a convergecast traffic pattern . . . . . . . . . . . . . . . . 822--837 DK Lee and Keon Jang and Changhyun Lee and Gianluca Iannaccone and Sue Moon Scalable and systematic Internet-wide path and delay estimation from existing measurements . . . . . . . . . . . . . . 838--855 B. Peng and A. H. Kemp Energy-efficient geographic routing in the presence of localization errors . . 856--872 Ravish Khosla and Sonia Fahmy and Y. Charlie Hu and Jennifer Neville Prediction models for long-term Internet prefix availability . . . . . . . . . . 873--889 Anonymous Editorial Board . . . . . . . . . . . . ??
Lars Eggert and Tilman Wolf Special Issue on Architectures and Protocols for the Future Internet . . . 891--892 Xavier Sanchez-Loro and José Luis Ferrer and Carles Gomez and Jordi Casademont and Josep Paradells Can Future Internet be based on constrained networks design principles? 893--909 Denis Martin and Lars Völker and Martina Zitterbart A flexible framework for Future Internet design, assessment, and operation . . . 910--918 Joe Touch and Ilia Baldine and Rudra Dutta and Gregory G. Finn and Bryan Ford and Scott Jordan and Dan Massey and Abraham Matta and Christos Papadopoulos and Peter Reiher and George Rouskas A Dynamic Recursive Unified Internet Design (DRUID) . . . . . . . . . . . . . 919--935 Konstantinos Katsaros and George Xylomenos and George C. Polyzos MultiCache: an overlay architecture for information-centric networking . . . . . 936--947 Luigi Iannone and Damien Saucez and Olivier Bonaventure Implementing the Locator/ID Separation Protocol: Design and experience . . . . 948--958 Hongbin Luo and Hongke Zhang and Moshe Zukerman Decoupling the design of identifier-to-locator mapping services from identifiers . . . . . . . . . . . . 959--974 Jarno Rajahalme and Mikko Särelä and Kari Visala and Janne Riihijärvi On name-based inter-domain routing . . . 975--986 M. Sifalakis and A. Louca and G. Bouabene and M. Fry and A. Mauthe and D. Hutchison Functional composition in future networks . . . . . . . . . . . . . . . . 987--998 Brent Mochizuki and Firat Kiyak and Eric Keller and Matthew Caesar Better by a HAIR: hardware-amenable Internet routing . . . . . . . . . . . . 999--1010 Ines Houidi and Wajdi Louati and Walid Ben Ameur and Djamal Zeghlache Virtual network provisioning across multiple substrate networks . . . . . . 1011--1023 Jianxin Liao and Jingyu Wang and Tonghong Li and Xiaomin Zhu Introducing multipath selection for concurrent multipath transfer in the future Internet . . . . . . . . . . . . 1024--1035 Anonymous Editorial Board . . . . . . . . . . . . ??
Ehud Doron and Avishai Wool WDA: a Web farm Distributed Denial of Service attack attenuator . . . . . . . 1037--1051 Bikash Kumar Dey and D. Manjunath and Supriyo Chakraborty Estimating network link characteristics using packet-pair dispersion: a discrete-time queueing theoretic analysis . . . . . . . . . . . . . . . . 1052--1068 Choonha Hwang and Elmurod Talipov and Hojung Cha Distributed geographic service discovery for mobile sensor networks . . . . . . . 1069--1082 Valentín Carela-Español and Pere Barlet-Ros and Albert Cabellos-Aparicio and Josep Solé-Pareta Analysis of the impact of sampling on NetFlow traffic classification . . . . . 1083--1099 Lluis Pamies-Juarez and Pedro García-López and Marc Sánchez-Artigas and Blas Herrera Towards the design of optimal data redundancy schemes for heterogeneous cloud storage infrastructures . . . . . 1100--1113 Vassilis E. Zafeiris and E. A. Giakoumakis Optimized traffic flow assignment in multi-homed, multi-radio mobile hosts 1114--1131 P. Mérindol and P. François and O. Bonaventure and S. Cateloin and J.-J. Pansiot An efficient algorithm to enable path diversity in link state routing networks 1132--1149 Pu Wang and Zhi Sun and Mehmet C. Vuran and Mznah A. Al-Rodhaan and Abdullah M. Al-Dhelaan and Ian F. Akyildiz On network connectivity of wireless sensor networks for sandstorm monitoring 1150--1157 Maurizio Dusi and Francesco Gringoli and Luca Salgarelli Quantifying the accuracy of the ground truth associated with Internet traffic traces . . . . . . . . . . . . . . . . . 1158--1167 Igor Bilogrevic and Mohammad Hossein Manshaei and Maxim Raya and Jean-Pierre Hubaux OREN: Optimal revocations in ephemeral networks . . . . . . . . . . . . . . . . 1168--1180 N. Akar and M. A. Toksöz MPLS automatic bandwidth allocation via adaptive hysteresis . . . . . . . . . . 1181--1196 Tobias Hoßfeld and Frank Lehrieder and David Hock and Simon Oechsner and Zoran Despotovic and Wolfgang Kellerer and Maximilian Michel Characterization of BitTorrent swarms and their distribution in the Internet 1197--1215
Robert J. Walls and Kush Kothari and Matthew Wright Liquid: a detection-resistant covert timing channel based on IPD shaping . . 1217--1228 Srikanth Hariharan and Ness B. Shroff and Saurabh Bagchi Secure neighbor discovery through overhearing in static multihop wireless networks . . . . . . . . . . . . . . . . 1229--1241 Guoqiang Zhang and Guoqing Zhang and Suqi Cheng LANC: Locality-aware network coding for better P2P traffic localization . . . . 1242--1256 Alexander Shpiner and Isaac Keslassy Modeling the interactions of congestion control and switch scheduling . . . . . 1257--1275 Mohammad Sadegh Talebi and Ahmad Khonsari and Amin Mohtasham and Ali Abbasi Cost-aware monitoring of network-wide aggregates in wireless sensor networks 1276--1290 Jinchang Lu and Maode Ma Cognitive radio-based framework and self-optimizing temporal-spectrum block scheduling for QoS provisioning in WiMAX 1291--1309 Alex Bikfalvi and Jaime García-Reinoso and Iván Vidal and Francisco Valera and Arturo Azcorra P2P vs. IP multicast: Comparing approaches to IPTV streaming based on TV channel popularity . . . . . . . . . . . 1310--1325 Riyad Alshammari and A. Nur Zincir-Heywood Can encrypted traffic be identified without port numbers, IP addresses and payload inspection? . . . . . . . . . . 1326--1350 Takanori Kudo and Tetsuya Takine Design of a sliding window scheme for detecting high packet-rate flows via random packet sampling . . . . . . . . . 1351--1363 Christian Esteve Rothenberg and Carlos Alberto Braz Macapuna and Maurício Ferreira Magalhães and Fábio Luciano Verdi and Alexander Wiesmaier In-packet Bloom filters: Design and networking applications . . . . . . . . 1364--1378 Chi-ho Lam and Wing Cheong Lau and Onching Yue Enhancing distributed traffic monitoring via traffic digest splitting . . . . . . 1379--1393 Paola Bermolen and Marco Mellia and Michela Meo and Dario Rossi and Silvio Valenti Abacus: Accurate behavioral classification of P2P-TV traffic . . . . 1394--1411 Dimitrios Zorbas and Christos Douligeris Connected coverage in WSNs based on critical targets . . . . . . . . . . . . 1412--1425 Dogu Arifler Capacity analysis of a diffusion-based short-range molecular nano-communication channel . . . . . . . . . . . . . . . . 1426--1434 J. Ramos and P. M. Santiago del Río and J. Aracil and J. E. López de Vergara On the effect of concurrent applications in bandwidth measurement speedometers 1435--1453 Anonymous Editorial Board . . . . . . . . . . . . ??
P. Rost and R. Boutaba and K. Doppler and A. Gumaste Recent Advances in Network Convergence 1455--1458 R. Stankiewicz and A. Jajszczyk A survey of QoE assurance in converged networks . . . . . . . . . . . . . . . . 1459--1473 Ivan Vidal and Antonio de la Oliva and Jaime Garcia-Reinoso and Ignacio Soto TRIM: an architecture for transparent IMS-based mobility . . . . . . . . . . . 1474--1486 Nemanja Vucevi\'c and Jordi Pérez-Romero and Oriol Sallent and Ramon Agustí Reinforcement learning for joint radio resource management in LTE--UMTS scenarios . . . . . . . . . . . . . . . 1487--1497 Pedro Neves and João Soares and Susana Sargento and Hugo Pires and Francisco Fontes Context-aware media independent information server for optimized seamless handover procedures . . . . . . 1498--1519 Joon-Myung Kang and John Strassner and Sin-seok Seo and James Won-Ki Hong Autonomic personalized handover decisions for mobile services in heterogeneous wireless networks . . . . 1520--1532 Natasa Vulic and Sonia M. Heemstra de Groot and Ignas G. M. M. Niemegeers Vertical handovers among different wireless technologies in a UMTS radio access-based integrated architecture . . 1533--1548 Abbas Jamalipour and Farshad Javadi and Kumudu S. Munasinghe Resource competition in a converged heterogeneous networking ecosystem . . . 1549--1559 Zoltán Faigl and László Bokor and Pedro Miguel Neves and Khadija Daoud and Philippe Herbelin Evaluation of two integrated signalling schemes for the Ultra Flat Architecture using SIP, IEEE 802.21, and HIP/PMIP protocols . . . . . . . . . . . . . . . 1560--1575 Djamal-Eddine Meddour and Tinku Rasheed and Yvon Gourhant On the role of infrastructure sharing for mobile network operators in emerging markets . . . . . . . . . . . . . . . . 1576--1591 B. Ishibashi and N. Bouabdallah and R. Boutaba QoS capacity of virtual wireless networks . . . . . . . . . . . . . . . . 1592--1613 Damien Leroy and Gregory Detal and Julien Cathalo and Mark Manulis and François Koeune and Olivier Bonaventure SWISH: Secure WiFi sharing . . . . . . . 1614--1630 Anonymous Editorial Board . . . . . . . . . . . . ??
D. Benyamina and A. Hafid and M. Gendreau and J. C. Maureira On the design of reliable wireless mesh network infrastructure with QoS constraints . . . . . . . . . . . . . . 1631--1647 Ning Weng and Luke Vespa and Benfano Soewito Deep packet pre-filtering and finite state encoding for adaptive intrusion detection system . . . . . . . . . . . . 1648--1661 M. Govindarajan and R. M. Chandrasekaran Intrusion detection using neural based hybrid classification methods . . . . . 1662--1671 M. Caretti and C. Cicconetti and D. Franceschini and L. Lenzini and D. Migliorini and E. Mingozzi and R. Rossi and D. Sabella Efficient downlink scheduling with power boosting in mobile IEEE 802.16 networks 1672--1683 Michael Rossberg and Guenter Schaefer A survey on automatic configuration of virtual private networks . . . . . . . . 1684--1699 Hee-Tae Roh and Jang-Won Lee User-level satisfaction aware end-to-end rate control in communication networks 1700--1710 Jui Teng Wang Rate adaptation with joint receive diversity and power control for cognitive radio networks . . . . . . . . 1711--1718 Jen-Jee Chen and Ling Lee and Yu-Chee Tseng Integrating SIP and IEEE 802.11e to support handoff and multi-grade QoS for VoIP-over-WLAN applications . . . . . . 1719--1734 Suat Ozdemir and Yang Xiao Integrity protecting hierarchical concealed data aggregation for wireless sensor networks . . . . . . . . . . . . 1735--1746 Lei You and Lianghui Ding and Ping Wu and Zhiwen Pan and Honglin Hu and Mei Song and Junde Song Cross-layer optimization of wireless multihop networks with one-hop two-way network coding . . . . . . . . . . . . . 1747--1769 Nelson I. Dopico and Álvaro Gutiérrez and Santiago Zazo Performance analysis of a delay tolerant application for herd localization . . . 1770--1783 Anis Jdidi and Tijani Chahed Flow-level performance of proportional fairness with hierarchical modulation in OFDMA-based networks . . . . . . . . . . 1784--1793 M. Dakkak and A. Nakib and B. Daachi and P. Siarry and J. Lemoine Indoor localization method based on RTT and AOA using coordinates clustering . . 1794--1803 Rafael P. Laufer and Pedro B. Velloso and Otto Carlos M. B. Duarte A Generalized Bloom Filter to Secure Distributed Network Applications . . . . 1804--1819 A. Detti and N. Blefari-Melazzi and I. Habib and A. Ordine Per-station throughput fairness in a WLAN hot-spot with TCP traffic . . . . . 1820--1833 Daniel F. Macedo and Aldri L. dos Santos and José M. Nogueira and Guy Pujolle Fuzzy-based load self-configuration in mobile P2P services . . . . . . . . . . 1834--1848 Ali Fanian and Mehdi Berenjkoub and Hossein Saidi and T. Aaron Gulliver A high performance and intrinsically secure key establishment protocol for wireless sensor networks . . . . . . . . 1849--1863 Zhihua Wen and Michael Rabinovich Dynamic landmark triangles: a simple and efficient mechanism for inter-host latency estimation . . . . . . . . . . . 1864--1879 Konstantin Avrachenkov and Alexander Dudin and Valentina Klimenok and Philippe Nain and Olga Semenova Optimal threshold control by the robots of Web search engines with obsolescence of documents . . . . . . . . . . . . . . 1880--1893 Mamoun F. Al-Mistarihi and Mohammad Al-Shurman and Ahmad Qudaimat Tree based dynamic address autoconfiguration in mobile ad hoc networks . . . . . . . . . . . . . . . . 1894--1908 Marios Iliofotou and Hyun-chul Kim and Michalis Faloutsos and Michael Mitzenmacher and Prashanth Pappu and George Varghese Graption: a graph-based P2P traffic classification framework for the Internet backbone . . . . . . . . . . . 1909--1920 Michael Scharf Comparison of end-to-end and network-supported fast startup congestion control schemes . . . . . . . 1921--1940 Guanhua Yan and Duc T. Ha and Stephan Eidenbenz AntBot: Anti-pollution peer-to-peer botnets . . . . . . . . . . . . . . . . 1941--1956 Ramesh Viswanathan and Krishan K. Sabnani and Robert J. Holt and Arun N. Netravali Expected convergence properties of BGP 1957--1981 M. Aykut Yigitel and Ozlem Durmaz Incel and Cem Ersoy QoS-aware MAC protocols for wireless sensor networks: a survey . . . . . . . 1982--2004 Tony K. C. Chan and Yiu-Wing Leung and Gaoxi Xiao Upgrading unicast nodes to multicast-capable nodes in all-optical networks . . . . . . . . . . . . . . . . 2005--2021 Anonymous Editorial Board . . . . . . . . . . . . ??
HyunYong Lee and Akihiro Nakao and JongWon Kim BiCo: Network operator-friendly P2P traffic control through bilateral cooperation with peers . . . . . . . . . 2023--2034 Eugenio Alessandria and Massimo Gallo and Emilio Leonardi and Marco Mellia and Michela Meo Impact of adverse network conditions on P2P-TV systems: Experimental evidence 2035--2050 Sergio Herrería-Alonso and Miguel Rodríguez-Pérez and Manuel Fernández-Veiga and Cándido López-García Opportunistic power saving algorithms for Ethernet devices . . . . . . . . . . 2051--2064 Frederic Thouin and Mark Coates and Michael Rabbat Large scale probabilistic available bandwidth estimation . . . . . . . . . . 2065--2078 Hammad Iqbal and Taieb Znati On the design of network control and management plane . . . . . . . . . . . . 2079--2091 Sangtae Ha and Injong Rhee Taming the elephants: New TCP slow start 2092--2110 José Luis García-Dorado and José Alberto Hernández and Javier Aracil and Jorge E. López de Vergara and Sergio Lopez-Buedo Characterization of the busy-hour traffic of IP networks based on their intrinsic features . . . . . . . . . . . 2111--2125 Chong Tan and Junni Zou and Min Wang and Ruifeng Zhang Network lifetime optimization for wireless video sensor networks with network coding/ARQ hybrid adaptive error-control scheme . . . . . . . . . . 2126--2137 Abu (Sayeem) Reaz and Vishwanath Ramamurthi and Massimo Tornatore and Suman Sarkar and Dipak Ghosal and Biswanath Mukherjee Cost-efficient design for higher capacity hybrid wireless-optical broadband access network (WOBAN) . . . . 2138--2149 Fangmin Li and Yilin Fang and Fei Hu and Xinhua Liu Load-aware multicast routing metrics in multi-radio multi-channel wireless mesh networks . . . . . . . . . . . . . . . . 2150--2167 Sung-Guk Yoon and Changhee Joo and Saewoong Bahk Energy-efficient opportunistic scheduling schemes in wireless networks 2168--2175 Andy An-Kai Jeng and Rong-Hong Jan and Chi-Yu Li and Chien Chen Release-time-based multi-channel MAC protocol for wireless mesh networks . . 2176--2195 Yueping Zhang and Ao-Jan Su and Guofei Jiang Understanding data center network architectures in virtualized environments: a view from multi-tier applications . . . . . . . . . . . . . . 2196--2208 Wei-Chieh Ke and Bing-Hong Liu and Ming-Jer Tsai The critical-square-grid coverage problem in wireless sensor networks is NP-Complete . . . . . . . . . . . . . . 2209--2220 Seyed Hossein Ahmadinejad and Saeed Jalili and Mahdi Abadi A hybrid model for correlating alerts of known and unknown attack scenarios and updating attack graphs . . . . . . . . . 2221--2240 Vishwanath Ramamurthi and Abu (Sayeem) Reaz and Dipak Ghosal and Sudhir Dixit and Biswanath Mukherjee Channel, capacity, and flow assignment in wireless mesh networks . . . . . . . 2241--2258 Lin Chen and Jean Leneutre Fight jamming with jamming --- a game theoretic analysis of jamming attack in wireless networks and defense strategy 2259--2270 Alexander A. Kist and Abdelnour Aldraho Dynamic topologies for sustainable and energy efficient traffic routing . . . . 2271--2288 Pablo Belzarena and Fernando Paganini and Andrés Ferragut Optimizing revenue for bandwidth auctions over networks with time reservations . . . . . . . . . . . . . . 2289--2302 Rafael Estepa and Antonio Estepa and Thiago Cupertino A productivity-oriented methodology for local area network design in industrial environments . . . . . . . . . . . . . . 2303--2314 Beatrice Paillassa and Cholatip Yawut and Riadh Dhaou Network awareness and dynamic routing: The ad hoc network case . . . . . . . . 2315--2328 M. Yuksel and K. K. Ramakrishnan and R. D. Doverspike and R. K. Sinha and G. Li and K. N. Oikonomou and D. Wang Cross-layer failure restoration of IP multicast with applications to IPTV . . 2329--2351 Mathias Boc and Anne Fladenmuller and Marcelo Dias de Amorim and Laura Galluccio and Sergio Palazzo Price: Hybrid geographic and co-based forwarding in delay-tolerant networks 2352--2360 Anonymous Editorial Board . . . . . . . . . . . . ??
Glenn Carl and George Kesidis Modeling a policy-capable path-vector routing protocol using Jacobi iteration over a path algebra . . . . . . . . . . 2361--2379 Rémi Diana and Emmanuel Lochin ECN verbose mode: a statistical method for network path congestion estimation 2380--2391 Z. Dwekat and G. N. Rouskas A practical fair queuing scheduler: Simplification through quantization . . 2392--2406 I-Ta Lee and Guann-Long Chiou and Shun-Ren Yang A cooperative multicast routing protocol for mobile ad hoc networks . . . . . . . 2407--2424 Kaikai Chi and Xiaohong Jiang and Baoliu Ye and Yanjun Li Flow-oriented network coding architecture for multihop wireless networks . . . . . . . . . . . . . . . . 2425--2442 Ming Li and Kai Zeng and Wenjing Lou Opportunistic broadcast of event-driven warning messages in Vehicular Ad Hoc Networks with lossy links . . . . . . . 2443--2464 Haidar Safa and Farah Abu Shahla A Policy-Based Trust-Aware Adaptive Monitoring Scheme to enhance WiMax QoS 2465--2480 Jiming Chen and Chengqun Wang and Youxian Sun and Xuemin (Sherman) Shen Semi-supervised Laplacian regularized least squares algorithm for localization in wireless sensor networks . . . . . . 2481--2491 Wenping Deng and Merkouris Karaliopoulos and Wolfgang Mühlbauer and Peidong Zhu and Xicheng Lu and Bernhard Plattner $k$-Fault tolerance of the Internet AS graph . . . . . . . . . . . . . . . . . 2492--2503 Alessandro Amoroso and Gustavo Marfia and Marco Roccetti Going realistic and optimal: a distributed multi-hop broadcast algorithm for vehicular safety . . . . . 2504--2519 Sunggeun Jin and Munhwan Choi and Lei Wang and Sunghyun Choi Fast scanning schemes for IEEE 802.11 WLANs in virtual AP environments . . . . 2520--2533 Rongfei Zeng and Yixin Jiang and Chuang Lin and Yanfei Fan and Xuemin (Sherman) Shen A scalable and robust key pre-distribution scheme with network coding for sensor data storage . . . . . 2534--2544 Anonymous Editorial Board . . . . . . . . . . . . ??
Geyong Min and Jia Hu and Mike E. Woodward Modeling and analysis of TXOP differentiation in infrastructure-based WLANs . . . . . . . . . . . . . . . . . 2545--2557 Tony O'Donovan and Utz Roedig and Jonathan Benson and Cormac J. Sreenan Self-adaptive framelet-based communication for wireless sensor networks . . . . . . . . . . . . . . . . 2558--2575 Feng Shu and Taka Sakurai A new analytical model for the IEEE 802.15.4 CSMA--CA protocol . . . . . . . 2576--2591 Shie-Yuan Wang and Chih-Che Lin and Wei-Jyun Hong and Kuang-Che Liu On the performances of forwarding multihop unicast traffic in WBSS-based 802.11(p)/1609 networks . . . . . . . . 2592--2607 Fei Xing and Wenye Wang Toward robust multi-hop data forwarding in large scale wireless networks . . . . 2608--2621 Jing Wu A survey of WDM network reconfiguration: Strategies and triggering methods . . . 2622--2645 R. Murawski and E. Ekici Utilizing dynamic spectrum leasing for cognitive radios in 802.11-based wireless networks . . . . . . . . . . . 2646--2657 Andrés Ferragut and Fernando Paganini Resource allocation over multirate wireless networks: a Network Utility Maximization perspective . . . . . . . . 2658--2674 Anonymous Editorial Board . . . . . . . . . . . . ??
Weiyi Zhao and Jiang Xie OPNET-based modeling and simulation study on handoffs in Internet-based infrastructure wireless mesh networks 2675--2688 Salekul Islam and Jean-Charles Grégoire Multi-domain authentication for IMS services . . . . . . . . . . . . . . . . 2689--2704 Marc St-Hilaire and Shangyun Liu Comparison of different meta-heuristics to solve the global planning problem of UMTS networks . . . . . . . . . . . . . 2705--2716 Jian Qiu and Yong Liu and Gurusamy Mohan and Kee Chaing Chua Fast spanning tree reconnection mechanism for resilient Metro Ethernet networks . . . . . . . . . . . . . . . . 2717--2729 Jeff Seibert and Xin Sun and Cristina Nita-Rotaru and Sanjay Rao A design for securing data delivery in mesh-based peer-to-peer streaming . . . 2730--2745 Hyung Rai Oh and Dapeng Oliver Wu and Hwangjun Song An effective mesh-pull-based P2P video streaming system using Fountain codes with variable symbol sizes . . . . . . . 2746--2759 Xiaochao Zi and Lihong Yao and Xinghao Jiang and Li Pan and Jianhua Li Evaluating the transmission rate of covert timing channels in a network . . 2760--2771 Juliana de Santi and Nelson L. S. da Fonseca Design of optimal Active Queue Management controllers for HSTCP in large bandwidth-delay product networks 2772--2790 Matías Toril and Volker Wille and S. Luna-Ramírez and K. Jarvinen Network performance model for location area re-planning in GERAN . . . . . . . 2791--2802 Anonymous Editorial Board . . . . . . . . . . . . ??
Wagner Moro Aioffi and Cristiano Arbex Valle and Geraldo R. Mateus and Alexandre Salles da Cunha Balancing message delivery latency and network lifetime through an integrated model for clustering and routing in Wireless Sensor Networks . . . . . . . . 2803--2820 Ying Chen and Arunita Jaekel and Ataul Bari A new model for allocating resources to scheduled lightpath demands . . . . . . 2821--2837 Daniel Camps-Mur and Xavier Pérez-Costa and Sebasti\`a Sallent-Ribes Designing energy efficient access points with Wi-Fi Direct . . . . . . . . . . . 2838--2855 Prasan Kumar Sahoo and Jang-Ping Sheu Limited mobility coverage and connectivity maintenance protocols for wireless sensor networks . . . . . . . . 2856--2872 Giovanni Ciccarese and Mario De Blasi and Pierluigi Marra and Cosimo Palazzo and Luigi Patrono An algorithm for controlling packet size in IEEE 802.16e networks . . . . . . . . 2873--2885 Amir Darehshoorzadeh and Llorenç Cerd\`a-Alabern and Vicent Pla Modeling and comparison of candidate selection algorithms in opportunistic routing . . . . . . . . . . . . . . . . 2886--2898 Martin Jacobsson and Cheng Guo and Ignas Niemegeers An experimental investigation of optimized flooding protocols using a wireless sensor network testbed . . . . 2899--2913 B. Nechaev and D. Korzun and A. Gurtov CR-Chord: Improving lookup availability in the presence of malicious DHT nodes 2914--2928 Shaohe Lv and Weihua Zhuang and Xiaodong Wang and Xingming Zhou Link scheduling in wireless networks with successive interference cancellation . . . . . . . . . . . . . . 2929--2941 Ömer Korçak and Fatih Alagöz Efficient integration of HAPs and mobile satellites via free-space optical links 2942--2953 Juliano Araujo Wickboldt and Luís Armando Bianchin and Roben Castagna Lunardi and Lisandro Zambenedetti Granville and Luciano Paschoal Gaspary and Claudio Bartolini A framework for risk assessment based on analysis of historical information of workflow execution in IT systems . . . . 2954--2975 Fei Ge and Sammy Chan and Lachlan L. H. Andrew and Fan Li and Liansheng Tan and Moshe Zukerman Performance effects of two-way FAST TCP 2976--2984 Mónica Aguilar Igartua and Luis J. de la Cruz Llopis and Víctor Carrascal Frías and Emilio Sanvicente Gargallo A game-theoretic multipath routing for video-streaming services over Mobile Ad Hoc Networks . . . . . . . . . . . . . . 2985--3000 Anirban Banerjee and Md Sazzadur Rahman and Michalis Faloutsos SUT: Quantifying and mitigating URL typosquatting . . . . . . . . . . . . . 3001--3014 R. Gotzhein and T. Kuhn Black Burst Synchronization (BBS) --- a protocol for deterministic tick and time synchronization in wireless networks . . 3015--3031 Azzedine Boukerche and Begumhan Turgut and Nevin Aydin and Mohammad Z. Ahmad and Ladislau Bölöni and Damla Turgut Routing protocols in ad hoc networks: a survey . . . . . . . . . . . . . . . . . 3032--3080 Ozlem Durmaz Incel A survey on multi-channel communication in wireless sensor networks . . . . . . 3081--3099 Anonymous Editorial Board . . . . . . . . . . . . ??
R. G. Herrtwich and I. Radusch Editorial for the Special Issue: Deploying vehicle-2-x communication . . 3101--3102 Christian Weiß V2X communication in Europe --- From research projects towards standardization and field testing of vehicle communication technology . . . . 3103--3119 James A. Misener and Subir Biswas and Greg Larson Development of V-to-X systems in North America: The promise, the pitfalls and the prognosis . . . . . . . . . . . . . 3120--3133 Masao Fukushima The latest trend of V2X driver assistance systems in Japan . . . . . . 3134--3141 J. Vales-Alonso and F. Vicente-Carrasco and J. J. Alcaraz Optimal configuration of roadside beacons in V2I communications . . . . . 3142--3153 Sebastian Röglinger A methodology for testing intersection related Vehicle-2-X applications . . . . 3154--3168 Benno Schweiger and Christian Raubitschek and Bernard Bäker and Johann Schlichter Elisa\TM --- Car to infrastructure communication in the field . . . . . . . 3169--3178 Razvan Stanica and Emmanuel Chaput and André-Luc Beylot Simulation of vehicular ad-hoc networks: Challenges, review of tools and recommendations . . . . . . . . . . . . 3179--3188 Björn Schünemann V2X simulation runtime infrastructure VSimRTI: an assessment tool to design smart traffic management systems . . . . 3189--3198 Carmela Troncoso and Enrique Costa-Montenegro and Claudia Diaz and Stefan Schiffner On the difficulty of achieving anonymity for Vehicle-2-X communication . . . . . 3199--3210 Anonymous Editorial Board . . . . . . . . . . . . ??
Rolando Trujillo-Rasua and Agusti Solanas Efficient probabilistic communication protocol for the private identification of RFID tags by means of collaborative readers . . . . . . . . . . . . . . . . 3211--3223 Zheng Ruan and Edith C.-H. Ngai and Jiangchuan Liu Wireless sensor deployment for collaborative sensing with mobile phones 3224--3245 Lei Zhang and Qianhong Wu and Bo Qin and Josep Domingo-Ferrer and Úrsula González-Nicolás Asymmetric group key agreement protocol for open networks and its application to broadcast encryption . . . . . . . . . . 3246--3255 Javad Vazifehdan and R. Venkatesha Prasad and Ertan Onur and Ignas Niemegeers Energy-aware routing algorithms for wireless ad hoc networks with heterogeneous power supplies . . . . . . 3256--3274 Kuochen Wang and Chun-Ying Huang and Shang-Jyh Lin and Ying-Dar Lin A fuzzy pattern-based filtering algorithm for botnet detection . . . . . 3275--3286 Yuyan Xue and Byrav Ramamurthy and Mehmet C. Vuran SDRCS: a service-differentiated real-time communication scheme for event sensing in wireless sensor networks . . 3287--3302 Flavio Esposito and Ibrahim Matta and Debajyoti Bera and Pietro Michiardi On the impact of seed scheduling in peer-to-peer networks . . . . . . . . . 3303--3317 Dan Li and Jianping Wu and Yong Cui and Jiangchuan Liu and Ke Xu Impact of user selfishness in construction action on the streaming quality of overlay multicast . . . . . . 3318--3331 M. Alkubeily and H. Bettahar and A. Bouabdallah A new Application-Level Multicast technique for stable, robust and efficient overlay tree construction . . 3332--3350 C. Cano and B. Bellalta and A. Sfairopoulou and M. Oliver Low energy operation in WSNs: a survey of preamble sampling MAC protocols . . . 3351--3363 Ziqian Dong and Santhanakrishnan Anand and Rajarathnam Chandramouli Estimation of missing RTTs in computer networks: Matrix completion vs compressed sensing . . . . . . . . . . . 3364--3375 Liu Yang and Rezwana Karim and Vinod Ganapathy and Randy Smith Fast, memory-efficient regular expression matching with NFA-OBDDs . . . 3376--3393 Xavier León and Tuan Anh Trinh and Leandro Navarro Modeling resource usage in planetary-scale shared infrastructures: PlanetLab's case study . . . . . . . . . 3394--3407 Elmurod Talipov and Hojung Cha Communication capacity-based message exchange mechanism for delay-tolerant networks . . . . . . . . . . . . . . . . 3408--3422 Sasitharan Balasubramaniam and Dmitri Botvich and Raymond Carroll and Julien Mineraud and Tadashi Nakano and Tatsuya Suda and William Donnelly Biologically inspired future service environment . . . . . . . . . . . . . . 3423--3440 Sevil Sen and John A. Clark Evolutionary computation techniques for intrusion detection in mobile ad hoc networks . . . . . . . . . . . . . . . . 3441--3457 Damien Fay and Hamed Haddadi and Steve Uhlig and Liam Kilmartin and Andrew W. Moore and Jérôme Kunegis and Marios Iliofotou Discriminating graphs through spectral projections . . . . . . . . . . . . . . 3458--3468 Hyoungshick Kim and Jaehoon Jeong RAD: Recipient-anonymous data delivery based on public routing proxies . . . . 3469--3484 Bernhard Tellenbach and Martin Burkhart and Dominik Schatzmann and David Gugelmann and Didier Sornette Accurate network anomaly classification with generalized entropy metrics . . . . 3485--3502 Dessislava Nikolova and Chris Blondia Bonded deficit round robin scheduling for multi-channel networks . . . . . . . 3503--3516 Gianluca Ciccarelli and Renato Lo Cigno Collusion in peer-to-peer systems . . . 3517--3532 Dingde Jiang and Zhengzheng Xu and Zhenhua Chen and Yang Han and Hongwei Xu Joint time-frequency sparse estimation of large-scale network traffic . . . . . 3533--3547 Cheng Wang and Changjun Jiang and Xiang-Yang Li and Yunhao Liu On multicast throughput scaling of hybrid wireless networks with general node density . . . . . . . . . . . . . . 3548--3561 Hidayet Aksu and Demet Aksoy and Ibrahim Korpeoglu A study of localization metrics: Evaluation of position errors in wireless sensor networks . . . . . . . . 3562--3577 Daniele Migliorini and Enzo Mingozzi and Carlo Vallati Performance evaluation of H.264/SVC video streaming over mobile WiMAX . . . 3578--3591 Che-Jung Hsu and Huey-Ing Liu and Winston K. G. Seah Opportunistic routing --- a review and the challenges ahead . . . . . . . . . . 3592--3603 Wenye Wang and Yi Xu and Mohit Khanna A survey on the communication architectures in smart grid . . . . . . 3604--3629 Anonymous Editorial Board . . . . . . . . . . . . ??
Tuna Tugcu Guest Editorial . . . . . . . . . . . . 3631--3633 O. Font-Bach and N. Bartzoudis and A. Pascual-Iserte and D. López Bueno A real-time MIMO-OFDM mobile WiMAX receiver: Architecture, design and FPGA implementation . . . . . . . . . . . . . 3634--3647 HanGyu Cho and Taeyoung Kim and Yu-Tao Hsieh and Jong-Kae Fwu Physical layer structure of next generation mobile WiMAX technology . . . 3648--3658 Rafael Kunst and Cristiano Bonato Both and Lisandro Zambenedetti Granville and Juergen Rochol On the impact of hybrid errors on mobile WiMAX networks . . . . . . . . . . . . . 3659--3671 Balakrishnan Kaarthick and N. Nagarajan and E. Raguvaran and G. Saimethun Subchannel allocation and mapping algorithms for improving the QoS of VoIP traffic in IEEE 802.16e networks . . . . 3672--3679 C. Cicconetti and L. Lenzini and A. Lodi and S. Martello and E. Mingozzi and M. Monaci A fast and efficient algorithm to exploit multi-user diversity in IEEE 802.16 BandAMC . . . . . . . . . . . . . 3680--3693 G. Vejarano and D. Wang and J. McNair Stability region adaptation using transmission power control for transport capacity optimization in IEEE 802.16 wireless mesh networks . . . . . . . . . 3694--3704 Jia-Ming Liang and You-Chiun Wang and Jen-Jee Chen and Jui-Hsiang Liu and Yu-Chee Tseng Energy-efficient uplink resource allocation for IEEE 802.16j transparent-relay networks . . . . . . . 3705--3720 Jen-Jee Chen and Shih-Lin Wu and Shiou-Wen Wang and Yu-Chee Tseng Per-flow sleep scheduling for power management in IEEE 802.16 wireless networks . . . . . . . . . . . . . . . . 3721--3733 Shunfu Jin and Wuyi Yue Performance analysis for power saving class type III of IEEE 802.16 in WiMAX 3734--3743 Ronny Yongho Kim and Ritesh Kumar Kalle and Debabrata Das Joint paging area and location update optimization for IEEE 802.16m idle mode 3744--3758 Zdenek Becvar and Pavel Mach and Boris Simak Improvement of handover prediction in mobile WiMAX by using two thresholds . . 3759--3773 Sunggeun Jin and Xi Chen and Daji Qiao and Sunghyun Choi Adaptive sleep mode management in IEEE 802.16m wireless metropolitan area networks . . . . . . . . . . . . . . . . 3774--3783 T. M. Fernández-Caramés and M. González-López and L. Castedo Mobile WiMAX for vehicular applications: Performance evaluation and comparison against IEEE 802.11p/a . . . . . . . . . 3784--3795 Ming-Chin Chuang and Jeng-Farn Lee A lightweight mutual authentication mechanism for network mobility in IEEE 802.16e wireless networks . . . . . . . 3796--3809 Anonymous Editorial Board . . . . . . . . . . . . ??
Yufeng Wang and Akihiro Nakao and Athanasios V. Vasilakos and Jianhua Ma On the effectiveness of service differentiation based resource-provision incentive mechanisms in dynamic and autonomous P2P networks . . . . . . . . 3811--3831 Jocelyne Elias and Fabio Martignon and Antonio Capone and Eitan Altman Non-cooperative spectrum access in cognitive radio networks: a game theoretical model . . . . . . . . . . . 3832--3846 Sok-Ian Sou and Chuan-Sheng Lin SPR proxy mechanism for 3GPP Policy and Charging Control System . . . . . . . . 3847--3862 Sebasti\`a Galmés and Ramon Puigjaner Randomized Data-Gathering protocol for time-driven sensor networks . . . . . . 3863--3885 Chien-Chi Kao and Shun-Ren Yang and Tung-Lin Tsai Performance enhancement of repacking and borrowing mechanisms for IEEE 802.16j multihop resource scheduling . . . . . . 3886--3903 Aldar C.-F. Chan Efficient defence against misbehaving TCP receiver DoS attacks . . . . . . . . 3904--3914 Seongjin Lee and Jongwoo Song and Soohan Ahn and Youjip Won Session-based classification of Internet applications in 3G wireless networks . . 3915--3931 InKwan Yu and Richard Newman TCP slow start with fair share of bandwidth . . . . . . . . . . . . . . . 3932--3946 Christopher Page and Emad Guirguis and Mina Guirguis Performance evaluation of path splicing on the GÉANT and the Sprint networks . . 3947--3958 Jorge Londoño and Azer Bestavros and Nikolaos Laoutaris Trade & Cap: a customer-managed, market-based system for trading bandwidth allowances at a shared link 3959--3974 Georgios Theodoridis and Fotini-Niovi Pavlidou A combined resource management and admission control scheme for optimizing uplink performance of M-WiMAX systems 3975--3986 Anonymous Editorial Board . . . . . . . . . . . . ??
Ian F. Akyildiz and Harry Rudin Editorial . . . . . . . . . . . . . . . 1--2 Hyenyoung Yoon and Junseok Hwang and Martin B. H. Weiss An analytic research on secondary-spectrum trading mechanisms based on technical and market changes 3--19 Hyunsang Choi and Heejo Lee Identifying botnets by capturing group activities in DNS traffic . . . . . . . 20--33 P. D. Hossein Zadeh and C. Schlegel and M. H. MacGregor Distributed optimal dynamic base station positioning in wireless sensor networks 34--49 Alptekin Küpçü and Anna Lysyanskaya Usable optimistic fair exchange . . . . 50--63 Yun Mao and Boon Thau Loo and Zachary Ives and Jonathan M. Smith MOSAIC: Declarative platform for dynamic overlay composition . . . . . . . . . . 64--84 Ziqian Dong and Rohan D. W. Perera and Rajarathnam Chandramouli and K. P. Subbalakshmi Network measurement based modeling and optimization for IP geolocation . . . . 85--98 Salah A. Aly and Ahmed E. Kamal and Osameh M. Al-Kofahi Network protection codes: Providing self-healing in autonomic networks using network coding . . . . . . . . . . . . . 99--111 M. C. Lucas-Estañ and J. Gozalvez and J. Sanchez-Soriano Integer linear programming optimization of joint RRM policies for heterogeneous wireless systems . . . . . . . . . . . . 112--126 Amr Rizk and Markus Fidler Non-asymptotic end-to-end performance bounds for networks with long range dependent fBm cross traffic . . . . . . 127--141 Sérgio Crisóstomo and Udo Schilcher and Christian Bettstetter and João Barros Probabilistic flooding in stochastic networks: Analysis of global information outreach . . . . . . . . . . . . . . . . 142--156 Sara Modarres Razavi and Di Yuan and Fredrik Gunnarsson and Johan Moe Performance and cost trade-off in Tracking Area reconfiguration: a Pareto-optimization approach . . . . . . 157--168 Thomas Gamer Collaborative anomaly-based detection of large-scale Internet attacks . . . . . . 169--185 Nicola Cordeschi and Valentina Polli and Enzo Baccarelli Traffic Engineering for wireless connectionless access networks supporting QoS-demanding media applications . . . . . . . . . . . . . . 186--197 Yuh-Jzer Joung and Terry Hui-Ye Chiu and Shy-Min Chen Cooperating with free riders in unstructured P2P networks . . . . . . . 198--212 Yuh-Jzer Joung and Shih-Hsiang Huang and Shi-Hang Lin Making data-centric storage adaptive and cost-optimal . . . . . . . . . . . . . . 213--230 Hyuntae Park and Hyejeong Hong and Sungho Kang An efficient IP address lookup algorithm based on a small balanced tree using entry reduction . . . . . . . . . . . . 231--243 Maysam Mirahmadi and Abdallah Shami Traffic-prediction-assisted dynamic bandwidth assignment for hybrid optical wireless networks . . . . . . . . . . . 244--259 Chun-Nan Lu and Chun-Ying Huang and Ying-Dar Lin and Yuan-Cheng Lai Session level flow classification by packet size distribution and session grouping . . . . . . . . . . . . . . . . 260--272 M. Moessner and Gul N. Khan Secure authentication scheme for passive C1G2 RFID tags . . . . . . . . . . . . . 273--286 Enzo Baccarelli and Nicola Cordeschi and Tatiana Patriarca QoS Stochastic Traffic Engineering for the wireless support of real-time streaming applications . . . . . . . . . 287--302 M. Toril and P. Guerrero-García and S. Luna-Ramírez and V. Wille An efficient integer programming formulation for the assignment of base stations to controllers in cellular networks . . . . . . . . . . . . . . . . 303--314 Ji-Hoon Yun Cross-layer analysis of the random access mechanism in Universal Terrestrial Radio Access . . . . . . . . 315--328 Dagang Li and Emmanuel Van Lil and Antoine Van de Capelle Improving Slow-start based probing mechanisms for flow adaptation after handovers . . . . . . . . . . . . . . . 329--344 Mustafa O. Kilavuz and Murat Yuksel Path approximation for multi-hop wireless routing under application-based accuracy constraints . . . . . . . . . . 345--364 Yiping Chen and Erwan Le Merrer and Zhe Li and Yaning Liu and Gwendal Simon OAZE: a network-friendly distributed zapping system for peer-to-peer IPTV . . 365--377 Agapios Avramidis and Panayiotis Kotzanikolaou and Christos Douligeris and Mike Burmester Chord-PKI: a distributed trust infrastructure based on P2P networks . . 378--398 Huali Bai and Ming Chen CCIPCA-OPCSC: an online method for detecting shared congestion paths . . . 399--411 Juanjo Alins and Jorge Mata-Diaz and Jose L. Muñoz and Elizabeth Rendón-Morales and Oscar Esparza XPLIT: a cross-layer architecture for TCP services over DVB-S2/ETSI QoS BSM 412--434 Guosong Tian and Yu-Chu Tian Modelling and performance evaluation of the IEEE 802.11 DCF for real-time control . . . . . . . . . . . . . . . . 435--447 Mengjun Xie and Zhenyu Wu and Haining Wang Secure instant messaging in enterprise-like networks . . . . . . . . 448--461 C. Callegari and S. Giordano and M. Pagano and T. Pepe Behavior analysis of TCP Linux variants 462--476 Weili Han and Chang Lei A survey on policy languages in network and security management . . . . . . . . 477--489 Anonymous Editorial Board . . . . . . . . . . . . ??
Shafiullah Khan and Nabil Ali Alrajeh and Kok-Keong Loo Secure route selection in wireless mesh networks . . . . . . . . . . . . . . . . 491--503 Evangelos Papapetrou and Panos Vassiliadis and Efthymia Rova and Apostolos Zarras Cross-layer routing for peer database querying over mobile ad hoc networks . . 504--520 Dario Bruneo and Salvatore Distefano and Francesco Longo and Antonio Puliafito and Marco Scarpa Evaluating wireless sensor node longevity through Markovian techniques 521--532 Zeki Yetgìn and Turgay Çelìk Efficient progressive downloading over multimedia broadcast multicast service 533--547 Hung-Cheng Shih and Kuochen Wang An adaptive hybrid dynamic power management algorithm for mobile devices 548--565 Helena Rif\`a-Pous and Carles Garrigues Authenticating hard decision sensing reports in cognitive radio networks . . 566--576 Gustavo Carneiro and Pedro Fortuna and Jaime Dias and Manuel Ricardo Transparent and scalable terminal mobility for vehicular networks . . . . 577--597 Gabriel Maciá-Fernández and Yong Wang and Rafael A. Rodri'guez-Gómez and Aleksandar Kuzmanovic Extracting user Web browsing patterns from non-content network traces: The online advertising case study . . . . . 598--614 Sinan Isik and Mehmet Yunus Donmez and Cem Ersoy Multi-sink load balanced forwarding with a multi-criteria fuzzy sink selection for video sensor networks . . . . . . . 615--627 Fernando Silveira and Edmundo de Souza e Silva Predicting packet loss statistics with hidden Markov models for FEC control . . 628--641 Ricardo Lopes Pereira and Teresa Vazão and Rodrigo Rodrigues Adaptive Search Radius --- Using hop count to reduce P2P traffic . . . . . . 642--660 Shie-Yuan Wang and Chih-Che Lin and Yu-Chi Chang A rule-based inter-session network coding scheme over IEEE 802.16(d) mesh CDS-mode networks . . . . . . . . . . . 661--685 Felipe Mata and José Luis García-Dorado and Javier Aracil Detection of traffic changes in large-scale backbone networks: The case of the Spanish academic network . . . . 686--702 Miguel Elias M. Campista and Luís Henrique M. K. Costa and Otto Carlos M. B. Duarte A routing protocol suitable for backhaul access in wireless mesh networks . . . . 703--718 Yong Oh Lee and A. L. Narasimha Reddy Constructing disjoint paths for failure recovery and multipath routing . . . . . 719--730 Xinyu Yang and Xiaojing Fan and Wei Yu and Xinwen Fu and Shusen Yang HLLS: a History information based Light Location Service for MANETs . . . . . . 731--744 Jie Feng and Lisong Xu Stochastic TCP friendliness: Expanding the design space of TCP-friendly traffic control protocols . . . . . . . . . . . 745--761 Suhaib A. Obeidat and Abraham N. Aldaco and Violet R. Syrotiuk Cross-layer opportunistic adaptation for voice over ad hoc networks . . . . . . . 762--779 Casey Deccio and Jeff Sedayao and Krishna Kant and Prasant Mohapatra Quantifying DNS namespace influence . . 780--794 Emir Halepovic and Carey Williamson and Majid Ghaderi Enhancing redundant network traffic elimination . . . . . . . . . . . . . . 795--809 D. Marcus and Y. Shavitt RAGE --- a rapid graphlet enumerator for large networks . . . . . . . . . . . . . 810--819 Bo-Chao Cheng and Guo-Tan Liao and Ryh-Yuh Tseng and Ping-Hai Hsu Network lifetime bounds for hierarchical wireless sensor networks in the presence of energy constraints . . . . . . . . . 820--831 Burak Bayoglu and Ibrahim Sogukpinar Graph based signature classes for detecting polymorphic worms via content analysis . . . . . . . . . . . . . . . . 832--844 Mingwei Xu and Yuan Yang and Qi Li Selecting shorter alternate paths for tunnel-based IP Fast ReRoute in linear time . . . . . . . . . . . . . . . . . . 845--857 Benoit Donnet and Bamba Gueye and Mohamed Ali Kaafar Path similarity evaluation using Bloom filters . . . . . . . . . . . . . . . . 858--869 Artur Ziviani and Thiago B. Cardozo and Antônio Tadeu A. Gomes Rapid prototyping of active measurement tools . . . . . . . . . . . . . . . . . 870--883 Kamran Jamshaid and Paul A. S. Ward and Martin Karsten Mechanisms for centralized flow rate control in 802.11-based wireless mesh networks . . . . . . . . . . . . . . . . 884--901 Sajjad Zarifzadeh and Nasser Yazdani and Amir Nayyeri Energy-efficient topology control in wireless ad hoc networks with selfish nodes . . . . . . . . . . . . . . . . . 902--914 C. Cano and B. Bellalta and M. Oliver Wake up after transmissions and reduced channel contention to alleviate the hidden terminal problem in preamble sampling WSNs . . . . . . . . . . . . . 915--926 Jean-Marc Robert and Hadi Otrok and Ahmad Nahar Quttoum and Rihab Boukhris A distributed resource management model for Virtual Private Networks: Tit-for-Tat strategies . . . . . . . . . 927--939 Eiman Alotaibi and Biswanath Mukherjee A survey on routing algorithms for wireless Ad-Hoc and mesh networks . . . 940--965 Anonymous Editorial Board . . . . . . . . . . . . ??
José Ignacio Alvarez-Hamelin and Éric Fleury and Alessandro Vespignani and Artur Ziviani Complex dynamic networks: Tools and methods . . . . . . . . . . . . . . . . 967--969 N. Koenigstein and Y. Shavitt Talent scouting in P2P networks . . . . 970--982 Hyoungshick Kim and John Tang and Ross Anderson and Cecilia Mascolo Centrality prediction in dynamic human contact networks . . . . . . . . . . . . 983--996 Ana Cristina Kochem Vendramin and Anelise Munaretto and Myriam Regattieri Delgado and Aline Carneiro Viana GrAnt: Inferring best forwarders from complex networks' dynamics through a greedy Ant Colony Optimization . . . . . 997--1015 David S. Shelley and Mehmet Hadi Gunes GerbilSphere: Inner sphere network visualization . . . . . . . . . . . . . 1016--1028 Dima Feldman and Yuval Shavitt and Noa Zilberman A structural approach for PoP geo-location . . . . . . . . . . . . . . 1029--1040 Bivas Mitra and Lionel Tabourier and Camille Roth Intrinsically dynamic network communities . . . . . . . . . . . . . . 1041--1053 Matteo Varvello and Moritz Steiner and Koen Laevens Understanding BitTorrent: a reality check from the ISP's perspective . . . . 1054--1065 Meeyoung Cha and Fabrício Benevenuto and Yong-Yeol Ahn and Krishna P. Gummadi Delayed information cascades in Flickr: Measurement, analysis, and modeling . . 1066--1076 Xiaoming Fu and Yang Chen and Guy Leduc and Laurent Mathy Editorial for Computer Networks special issue on ``Measurement-based optimization of P2P networking and applications'' . . . . . . . . . . . . . 1077--1079 Ghulam Memon and Reza Rejaie and Yang Guo and Daniel Stutzbach Montra: a large-scale DHT traffic monitor . . . . . . . . . . . . . . . . 1080--1091 Noam Koenigstein and Yuval Shavitt and Ela Weinsberg and Udi Weinsberg Measuring the validity of peer-to-peer data for information retrieval applications . . . . . . . . . . . . . . 1092--1102 Zhen Ma and Ke Xu and Jiangchuan Liu and Haiyang Wang Measurement, modeling and enhancement of BitTorrent-based VoD system . . . . . . 1103--1117 Konstantin Pussep and Frank Lehrieder and Christian Gross and Simon Oechsner and Markus Guenther and Sebastian Meyer Cooperative traffic management for video streaming overlays . . . . . . . . . . . 1118--1130 Anonymous Editorial Board . . . . . . . . . . . . ??
M. Marchese and M. Mongelli Simple protocol enhancements of Rapid Spanning Tree Protocol over ring topologies . . . . . . . . . . . . . . . 1131--1151 Federico Larroca and Jean-Louis Rougier Minimum delay load-balancing via nonparametric regression and no-regret algorithms . . . . . . . . . . . . . . . 1152--1166 Haw-Yun Shin Exploiting skewed access and energy-efficient algorithm to improve the performance of wireless data broadcasting . . . . . . . . . . . . . . 1167--1182 Luis Pérez and Luis Velasco and Juan Rodríguez and Pedro Capelastegui and Guillem Hernández-Sola and Lorena Calavia and Antonio Marqués and Borja Iribarne and Amador Pozo and Antoine De Poorter Network convergence and QoS for future multimedia services in the VISION project . . . . . . . . . . . . . . . . 1183--1199 Kwan-Wu Chin and Sieteng Soh and Chen Meng Novel scheduling algorithms for concurrent transmit/receive wireless mesh networks . . . . . . . . . . . . . 1200--1214 Marcello Cinque and Catello Di Martino and Christian Esposito On data dissemination for large-scale complex critical infrastructures . . . . 1215--1235 Jeongkyun Yun and Sung-Guk Yoon and Jin-Ghoo Choi and Saewoong Bahk Contention based scheduling for femtocell access points in a densely deployed network environment . . . . . . 1236--1248 Koteswara Rao Vemu and Shalabh Bhatnagar and N. Hemachandra Optimal multi-layered congestion based pricing schemes for enhanced QoS . . . . 1249--1262 Dmitri Moltchanov A study of TCP performance in wireless environment using fixed-point approximation . . . . . . . . . . . . . 1263--1285 Praveen K. Muthuswamy and Aparna Gupta and Murat Yuksel and Koushik Kar Path-vector contracting: Profit maximization and risk management . . . . 1286--1302 Miguel S. Familiar and José F. Martínez and Iván Corredor and Carlos García-Rubio Building service-oriented Smart Infrastructures over Wireless Ad Hoc Sensor Networks: a middleware perspective . . . . . . . . . . . . . . 1303--1328 Byung-Gook Kim and Jang-Won Lee Stochastic utility-based flow control algorithm for services with time-varying rate requirements . . . . . . . . . . . 1329--1342 Aaron E. Cohen and Jian-Hung Lin and Keshab K. Parhi Variable data rate (VDR) network congestion control (NCC) applied to voice/audio communication . . . . . . . 1343--1356 Faqir Zarrar Yousaf and Christian Wietfeld Solving pinball routing, race condition and loop formation issues in nested mobile networks . . . . . . . . . . . . 1357--1375 Yossi Kanizo and David Hay and Isaac Keslassy Hash tables with finite buckets are less resistant to deletions . . . . . . . . . 1376--1389 Olabisi E. Falowo and H. Anthony Chan Dynamic RAT selection for multiple calls in heterogeneous wireless networks using group decision-making technique . . . . 1390--1401 Chih-Che Lin and Shie-Yuan Wang and Teng-Wei Hsu On the performances of IEEE 802.16(d) mesh CDS-mode networks using Single-Switched-Beam Antennas . . . . . 1402--1423 D. J. Leith and P. Clifford and V. Badarla and D. Malone WLAN channel selection without communication . . . . . . . . . . . . . 1424--1441 Ting Wang and Chor Ping Low The general Message Ferry Route (MFR$^*$) problem and the An-Improved-Route (AIR) scheme . . . . . 1442--1457 Kyong-Tak Cho and Saewoong Bahk Optimal Hop Extended MAC protocol for wireless sensor networks . . . . . . . . 1458--1469 Yunzhao Li and Don Gruenbacher and Caterina Scoglio Evaluating stranger policies in P2P file-sharing systems with reciprocity mechanisms . . . . . . . . . . . . . . . 1470--1485 Wei Zhang and Jun Bi and Jianping Wu and Baobao Zhang Catching popular prefixes at AS border routers with a prediction based method 1486--1502 M. Reza Rahimi and Abdul Bais and Nima Sarshar On fair and optimal multi-source IP-multicast . . . . . . . . . . . . . . 1503--1524 Anonymous Editorial Board . . . . . . . . . . . . ??
Ching-Lung Chang and Sih-Ping Huang The interleaved video frame distribution for P2P-based VoD system with VCR functionality . . . . . . . . . . . . . 1525--1537 J. Fitzpatrick Voice call capacity analysis of long range WiFi as a femto backhaul solution 1538--1553 Claudia Campolo and Claudio Casetti and Carla-Fabiana Chiasserini and Antonella Molinaro A multirate MAC protocol for reliable multicast in multihop wireless networks 1554--1567 Mehdi Bezahaf and Luigi Iannone and Marcelo Dias de Amorim and Serge Fdida An experimental evaluation of cross-layer routing in a wireless mesh backbone . . . . . . . . . . . . . . . . 1568--1583 Fabio R. J. Vieira and José F. de Rezende and Valmir C. Barbosa and Serge Fdida Scheduling links for heavy traffic on interfering routes in wireless mesh networks . . . . . . . . . . . . . . . . 1584--1598 Bang Wang and Hock Beng Lim and Di Ma A coverage-aware clustering protocol for wireless sensor networks . . . . . . . . 1599--1611 Jouni Mäenpää Performance evaluation of Recursive Distributed Rendezvous based service discovery for Peer-to-Peer Session Initiation Protocol . . . . . . . . . . 1612--1626 Atslands R. Rocha and Luci Pirmez and Flávia C. Delicato and Érico Lemos and Igor Santos and Danielo G. Gomes and José Neuman de Souza WSNs clustering based on semantic neighborhood relationships . . . . . . . 1627--1645 Young June Pyun and Younghee Park and Douglas S. Reeves and Xinyuan Wang and Peng Ning Interval-based flow watermarking for tracing interactive traffic . . . . . . 1646--1665 Anonymous Editorial Board . . . . . . . . . . . . ??
Frederic Raspall Efficient packet sampling for accurate traffic measurements . . . . . . . . . . 1667--1684 Javad Vazifehdan and R. Venkatesha Prasad and Ignas Niemegeers On the lifetime of node-to-node communication in wireless ad hoc networks . . . . . . . . . . . . . . . . 1685--1709 Sihyung Lee and Hyong S. Kim End-user perspectives of Internet connectivity problems . . . . . . . . . 1710--1722 Alex X. Liu and Jason M. Kovacs and Mohamed G. Gouda A secure cookie scheme . . . . . . . . . 1723--1730 Yi Hu and Laxmi N. Bhuyan and Min Feng P2P consistency support for large-scale interactive applications . . . . . . . . 1731--1744 Joo-Young Baek and Young-Joo Suh An adaptive ARQ-HARQ interworking scheme in WiMAX systems . . . . . . . . . . . . 1745--1762 Yu Lu and Mehul Motani and Wai-Choong Wong When Ambient Intelligence meets the Internet: User Module framework and its applications . . . . . . . . . . . . . . 1763--1781 Zhipeng Ouyang and Lisong Xu and Byrav Ramamurthy and Negede Yossef Partial forwarding vs. partial participation for dynamic window resizing in P2P streaming . . . . . . . 1782--1796 Xiang Cheng and Sen Su and Zhongbao Zhang and Kai Shuang and Fangchun Yang and Yan Luo and Jie Wang Virtual network embedding through topology awareness and optimization . . 1797--1813 ChengGuo Yin and ShuangQing Li and Qi Li Network traffic classification via HMM under the guidance of syntactic structure . . . . . . . . . . . . . . . 1814--1825 Jihene Rezgui and Abdelhakim Hafid and Racha Ben Ali and Michel Gendreau Optimization model for handoff-aware channel assignment problem for multi-radio wireless mesh networks . . . 1826--1846 Péter Soproni and Tibor Cinkler Preplanned restoration of multicast demands in optical networks . . . . . . 1847--1861 Anonymous Editorial Board . . . . . . . . . . . . ??
Mohammad Abdul Awal and Lila Boukhatem and Lin Chen An integrated cross-layer framework of adaptive FEedback REsource allocation and Prediction for OFDMA systems . . . . 1863--1875 Ilknur Aydin and Janardhan Iyengar and Phillip Conrad and Chien-Chung Shen and Paul Amer Evaluating TCP-friendliness in light of Concurrent Multipath Transfer . . . . . 1876--1892 Jose Saldana and Julián Fernández-Navajas and José Ruiz-Mas and Jenifer Murillo and Eduardo Viruete Navarro and José I. Aznar Evaluating the influence of multiplexing schemes and buffer implementation on perceived VoIP conversation quality . . 1893--1919 Jochen Furthmüller and Oliver P. Waldhorst Energy-aware resource sharing with mobile devices . . . . . . . . . . . . . 1920--1934 Habib M. Ammari On the problem of $k$-coverage in mission-oriented mobile wireless sensor networks . . . . . . . . . . . . . . . . 1935--1950 Anfeng Liu and Ju Ren and Xu Li and Zhigang Chen and Xuemin (Sherman) Shen Design principles and improvement of cost function based energy aware routing algorithms for wireless sensor networks 1951--1967 Bheemarjuna Reddy Tamma and B. S. Manoj and Ramesh R. Rao Traffic sensing and characterization in multi-channel wireless networks for cognitive networking . . . . . . . . . . 1968--1982 Fabricio Murai and Antonio A. de A. Rocha and Daniel R. Figueiredo and Edmundo A. de Souza e Silva Heterogeneous download times in a homogeneous BitTorrent swarm . . . . . . 1983--2000 Duc A. Tran and Khanh Nguyen and Cuong Pham S-CLONE: Socially-aware data replication for social networks . . . . . . . . . . 2001--2013 Mihaela Ion and Giovanni Russello and Bruno Crispo Design and implementation of a confidentiality and access control solution for publish/subscribe systems 2014--2037 Pietro Michiardi and Damiano Carra and Francesco Albanese and Azer Bestavros Peer-assisted content distribution on a budget . . . . . . . . . . . . . . . . . 2038--2048 Zhe Wang and Kai Hu and Ke Xu and Baolin Yin and Xiaowen Dong Structural analysis of network traffic matrix via relaxed principal component pursuit . . . . . . . . . . . . . . . . 2049--2067 Kiam Cheng How and Maode Ma and Yang Qin An altruistic differentiated service protocol in dynamic cognitive radio networks against selfish behaviors . . . 2068--2079 Mursalin Akon and Mohammad Towhidul Islam and Xuemin (Sherman) Shen and Ajit Singh A bandwidth and effective hit optimal cache scheme for wireless data access networks with client injected updates 2080--2095 Anonymous Editorial Board . . . . . . . . . . . . ??
Vincent Reinhard and Johanne Cohen and Joanna Tomasik and Dominique Barth and Marc-Antoine Weisser Optimal configuration of an optical network providing predefined multicast transmissions . . . . . . . . . . . . . 2097--2106 Hani Ragab Hassen and Hatem Bettahar and Abdalmadjid Bouadbdallah and Yacine Challal An efficient key management scheme for content access control for linear hierarchies . . . . . . . . . . . . . . 2107--2118 Jin Cao and Hui Li and Maode Ma and Yueyu Zhang and Chengzhe Lai A simple and robust handover authentication between HeNB and eNB in LTE networks . . . . . . . . . . . . . . 2119--2131 Yong Liao and Jiangtao Yin and Dong Yin and Lixin Gao DPillar: Dual-port server interconnection network for large scale data centers . . . . . . . . . . . . . . 2132--2147 Yuh-Jzer Joung and Wing-Tat Wong and Hsiao-Mei Huang and Yi-Fang Chou Building a network-aware and load-balanced peer-to-peer system for range queries . . . . . . . . . . . . . 2148--2167 Kwan-Wu Chin and Shinan Li Novel association control strategies for multicasting in relay-enabled WLANs . . 2168--2178 Antti Mäkelä and Sebastian Siikavirta and Jukka Manner Comparison of load-balancing approaches for multipath connectivity . . . . . . . 2179--2195 B. E. Bilgin and V. C. Gungor Performance evaluations of ZigBee in different smart grid environments . . . 2196--2205 Sihyung Lee and Kyriaki Levanti and Hyong S. Kim Impact analysis of BGP sessions for prioritization of maintenance operations 2206--2220 GholamHossein Ekbatanifard and Reza Monsefi and Mohammad H. Yaghmaee M. and Seyed Amin Hosseini S. Queen-MAC: a quorum-based energy-efficient medium access control protocol for wireless sensor networks 2221--2236 Anonymous Editorial Board . . . . . . . . . . . . ??
Péter Mátray and Péter Hága and Sándor Laki and Gábor Vattay and István Csabai On the spatial properties of Internet routes . . . . . . . . . . . . . . . . . 2237--2248 Carlo Fragni and Luís Henrique Maciel Kosmalski Costa ECO-ALOC: Energy-efficient resource allocation for cluster-based software routers . . . . . . . . . . . . . . . . 2249--2261 Fernando Lezama and Gerardo Castañón and Ana Maria Sarmiento Differential evolution optimization applied to the wavelength converters placement problem in all optical networks . . . . . . . . . . . . . . . . 2262--2275 Tuan-Minh Pham and Serge Fdida DTN support for news dissemination in an urban area . . . . . . . . . . . . . . . 2276--2291 Changhui Hu and Tat Wing Chim and S. M. Yiu and Lucas C. K. Hui and Victor O. K. Li Efficient HMAC-based secure communication for VANETs . . . . . . . . 2292--2303 Zheng Liu and Maode Ma and Jufeng Dai Utility-based scheduling in wireless multi-hop networks over non-deterministic fading channels . . . 2304--2315 Yuh-Jzer Joung and Wing-Tat Wong and Hsiao-Mei Huang and Yi-Fang Chou Erratum to ``Building a network-aware and load-balanced peer-to-peer system for range queries'', COMNET, \bf 56(8) 2012, 2148--2167 . . . . . . . . . . . . 2316--2316 Anonymous Editorial Board . . . . . . . . . . . . ??
Antonio Capone and Dan Kilper and Zhisheng Niu Editorial for Computer Networks special issue on ``Green communication networks'' . . . . . . . . . . . . . . . 2317--2319 Raffaele Bolla and Roberto Bruschi and Alessandro Carrega and Franco Davoli and Diego Suino and Constantinos Vassilakis and Anastasios Zafeiropoulos Cutting the energy bills of Internet Service Providers and telecoms through power management: an impact analysis . . 2320--2342 Young-Min Kim and Eun-Jung Lee and Hea-Sook Park and Jun-Kyun Choi and Hong-Shik Park Ant colony based self-adaptive energy saving routing for energy efficient Internet . . . . . . . . . . . . . . . . 2343--2354 Francesca Cuomo and Antonio Cianfrani and Marco Polverini and Daniele Mangione Network pruning for energy saving in the Internet . . . . . . . . . . . . . . . . 2355--2367 Stefano Avallone and Giorgio Ventre Energy efficient online routing of flows with additive constraints . . . . . . . 2368--2382 Weigang Hou and Lei Guo and Xuetao Wei and Xiaoxue Gong Multi-granularity and robust grooming in power- and port-cost-efficient IP over WDM networks . . . . . . . . . . . . . . 2383--2399 Jorge López Vizcaíno and Yabin Ye and Idelfonso Tafur Monroy Energy efficiency analysis for flexible-grid OFDM-based optical networks . . . . . . . . . . . . . . . . 2400--2419 Sergio Ricciardi and Francesco Palmieri and Ugo Fiore and Davide Careglio and Germán Santos-Boada and Josep Solé-Pareta An energy-aware dynamic RWA framework for next-generation wavelength-routed networks . . . . . . . . . . . . . . . . 2420--2442 Giuseppe Rizzelli and Annalisa Morea and Massimo Tornatore and Olivier Rival Energy efficient Traffic-Aware design of on-off Multi-Layer translucent optical networks . . . . . . . . . . . . . . . . 2443--2455 Sergio Herrería-Alonso and Miguel Rodri'guez-Pérez and Manuel Fernández-Veiga and Cándido López-García Optimal configuration of Energy-Efficient Ethernet . . . . . . . 2456--2467 Martin Wolkerstorfer and Driton Statovci and Tomas Nordström Energy-saving by low-power modes in ADSL2 . . . . . . . . . . . . . . . . . 2468--2480 Vincenzo Mancuso and Sara Alouf Analysis of power saving with continuous connectivity . . . . . . . . . . . . . . 2481--2493 Koen De Turck and Stijn De Vuyst and Dieter Fiems and Sabine Wittevrongel and Herwig Bruneel Performance analysis of sleep mode mechanisms in the presence of bidirectional traffic . . . . . . . . . 2494--2505 Karina Gomez and Dejene Boru and Roberto Riggio and Tinku Rasheed and Daniele Miorandi and Fabrizio Granelli Measurement-based modelling of power consumption at wireless access network gateways . . . . . . . . . . . . . . . . 2506--2521 Ana Paula Couto da Silva and Michela Meo and Marco Ajmone Marsan Energy-performance trade-off in dense WLANs: a queuing study . . . . . . . . . 2522--2537 Kim Khoa Nguyen and Mohamed Cheriet and Mathieu Lemay and Victor Reijs and Andrew Mackarel and Alin Pastrama Environmental-aware virtual data center network . . . . . . . . . . . . . . . . 2538--2550 Anonymous Editorial Board . . . . . . . . . . . . ??
Aniket Pingley and Wei Yu and Nan Zhang and Xinwen Fu and Wei Zhao A context-aware scheme for privacy-preserving location-based services . . . . . . . . . . . . . . . . 2551--2568 Weverton Luis da Costa Cordeiro and Flávio Roberto Santos and Gustavo Huff Mauch and Marinho Pilla Barcelos and Luciano Paschoal Gaspary Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks . . . . . . . . . . . . . 2569--2589 Cheng-Han Lin and Yu-Chi Wang and Ce-Kuen Shieh and Wen-Shyang Hwang An unequal error protection mechanism for video streaming over IEEE 802.11e WLANs . . . . . . . . . . . . . . . . . 2590--2599 Sara Moftah Elrabiei and Mohamed Hadi Habaebi Reliable cooperative multicasting for MBS WiMAX traffic . . . . . . . . . . . 2600--2613 Ching-Wen Chen and Chuan-Chi Weng and Po-Yueh Chen An interference avoidance MAC protocol design in mobile ad hoc networks . . . . 2614--2634 Sheng-Wei Wang Probability based dynamic-alternate routing and the corresponding converter placement algorithm in all-optical WDM networks . . . . . . . . . . . . . . . . 2635--2648 Behnam Bahrak and Amol Deshpande and Jung-Min `Jerry' Park Spectrum access policy reasoning for policy-based cognitive radios . . . . . 2649--2663 Wei Dong and Chun Chen and Xue Liu and Guodong Teng and Jiajun Bu and Yunhao Liu Bulk data dissemination in wireless sensor networks: Modeling and analysis 2664--2676 Nobuyoshi Tomita and Shahrokh Valaee Data uploading time estimation for CUBIC TCP in long distance networks . . . . . 2677--2689 Meiqin Tang and Chengnian Long and Xinping Guan and Xinjiang Wei Nonconvex dynamic spectrum allocation for cognitive radio networks via particle swarm optimization and simulated annealing . . . . . . . . . . 2690--2699 Dino Martin Lopez Pacheco and Tuan Tran Thai and Emmanuel Lochin and Fabrice Arnal An IP-ERN architecture to enable hybrid E2E/ERN protocol and application to satellite networking . . . . . . . . . . 2700--2713 Helena Fernández-López and José A. Afonso and J. H. Correia and Ricardo Simoes Towards the design of efficient nonbeacon-enabled ZigBee networks . . . 2714--2725 Péter Schaffer and Károly Farkas and Ádám Horváth and Tamás Holczer and Levente Buttyán Secure and reliable clustering in wireless sensor networks: a critical survey . . . . . . . . . . . . . . . . . 2726--2741 Nico Saputro and Kemal Akkaya and Suleyman Uludag A survey of routing protocols for smart grid communications . . . . . . . . . . 2742--2771 Anonymous Editorial Board . . . . . . . . . . . . ??
Pinghui Wang and Xiaohong Guan and Don Towsley and Jing Tao Virtual indexing based methods for estimating node connection degrees . . . 2773--2787 Sookyoung Lee and Mohamed Younis Optimized relay node placement for connecting disjoint wireless sensor networks . . . . . . . . . . . . . . . . 2788--2804 Eduardo Feitosa and Eduardo Souto and Djamel H. Sadok An orchestration approach for unwanted Internet traffic identification . . . . 2805--2831 Saeed Rashwand and Jelena Misi\'c Effects of access phases lengths on performance of IEEE 802.15.6 CSMA/CA . . 2832--2846 Jianxin Liao and Jinzhu Wang and Tonghong Li and Jing Wang and Jingyu Wang and Xiaomin Zhu A distributed end-to-end overload control mechanism for networks of SIP servers . . . . . . . . . . . . . . . . 2847--2868 Alberto Castro and Luis Velasco and Marc Ruiz and Miroslaw Klinkowski and Juan Pedro Fernández-Palacios and Davide Careglio Dynamic routing and spectrum (re)allocation in future flexgrid optical networks . . . . . . . . . . . . 2869--2883 F. Javier Ortega and José A. Troyano and Fermín L. Cruz and Carlos G. Vallejo and Fernando Enríquez Propagation of trust and distrust for the detection of trolls in a social network . . . . . . . . . . . . . . . . 2884--2895 Daniel Camps-Mur and Manil Dev Gomony and Xavier Pérez-Costa and Sebasti\`a Sallent-Ribes Leveraging 802.11n frame aggregation to enhance QoS and power consumption in Wi-Fi networks . . . . . . . . . . . . . 2896--2911 Mario Montagud and Fernando Boronat Enhanced adaptive RTCP-based Inter-Destination Multimedia Synchronization approach for distributed applications . . . . . . . . . . . . . . 2912--2933 Jae-Yong Yoo and Cigdem Sengul and Ruben Merz and JongWon Kim Backpressure scheduling in IEEE 802.11 wireless mesh networks: Gap between theory and practice . . . . . . . . . . 2934--2948 Adrian Holzer and Patrick Eugster and Beno\^\it Garbinato ALPS --- Adaptive Location-based Publish/Subscribe . . . . . . . . . . . 2949--2962 S. Chieochan and E. Hossain Network coding for unicast in a WiFi hotspot: Promises, challenges, and testbed implementation . . . . . . . . . 2963--2980 Ze Wang and Maode Ma and Jigang Wu Securing wireless mesh networks in a unified security framework with corruption-resilience . . . . . . . . . 2981--2993 Tsu-Yang Wu and Yuh-Min Tseng and Tung-Tso Tsai A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants . . . . . . . . . 2994--3006 Anonymous Editorial Board . . . . . . . . . . . . ??
Pablo Pavon-Marino and Mohammed Atiquzzaman and Joan Garcia-Haro Special issue on ``Challenges in high-performance switching and routing in the Future Internet'' . . . . . . . . 3007--3009 Hyesook Lim and Soohyun Lee and Earl E. Swartzlander, Jr. A new hierarchical packet classification algorithm . . . . . . . . . . . . . . . 3010--3022 Anat Bremler-Barr and David Hay and Danny Hendler Layered interval codes for TCAM-based classification . . . . . . . . . . . . . 3023--3039 Aleksandra Smiljani\'c and Zoran Cica A comparative review of scalable lookup algorithms for IPv6 . . . . . . . . . . 3040--3054 Nizar Ben Neji and Adel Bouhoula A prefix-based approach for managing hybrid specifications in complex packet filtering . . . . . . . . . . . . . . . 3055--3064 Mustafa Sanli and Ece Güran Schmidt and Hasan Cengiz Güran Hardware design and implementation of packet fair queuing algorithms for the quality of service support in the high-speed Internet . . . . . . . . . . 3065--3075 Andrea Francini Periodic early detection for improved TCP performance and energy efficiency 3076--3086 Dinil Mon Divakaran A spike-detecting AQM to deal with elephants . . . . . . . . . . . . . . . 3087--3098 D. Fernández Hermida and M. Rodelgo Lacruz and A. Bianco and D. Cuda and G. Gavilanes Castillo and C. López Bravo and F. J. González Castaño AWG-based optical switches performance using crosstalk limiting schedulers . . 3099--3109 Davide Cuda and Paolo Giaccone and Massimo Montalto Design and control of next generation distribution frames . . . . . . . . . . 3110--3122 Ricard Vilalta and Raul Muñoz and Ramon Casellas and Ricardo Martinez and Javier Vílchez GMPLS-enabled MPLS-TP/PWE3 node with integrated 10 Gbps tunable DWDM transponders: design and experimental evaluation . . . . . . . . . . . . . . . 3123--3135 Miklós Molnár and Alia Bellabas and Samer Lahoud The cost optimal solution of the multi-constrained multicast routing problem . . . . . . . . . . . . . . . . 3136--3149 Diego Lucerna and Massimo Tornatore and Biswanath Mukherjee and Achille Pattavina Trading availability among shared-protected dynamic connections in WDM networks . . . . . . . . . . . . . . 3150--3162 Anonymous Editorial Board . . . . . . . . . . . . ??
Olfa Gaddour and Anis Koubâa RPL in a nutshell: a survey . . . . . . 3163--3178 Xian Zhang and Xiuzhong Chen and Chris Phillips Achieving effective resilience for QoS-aware application mapping . . . . . 3179--3191 Sihyung Lee and Tina Wong and Hyong S. Kim Improving manageability through reorganization of routing-policy configurations . . . . . . . . . . . . . 3192--3205 H. Ahmadi and Y. H. Chew Evolutionary algorithms for orthogonal frequency division multiplexing-based dynamic spectrum access systems . . . . 3206--3218 Aruna Prem Bianzino and Luca Chiaraviglio and Marco Mellia and Jean-Louis Rougier GRiDA: GReen Distributed Algorithm for energy-efficient IP backbone networks 3219--3232 Amit Mondal and Ionut Trestian and Zhen Qin and Aleksandar Kuzmanovic P2P as a CDN: a new service model for file sharing . . . . . . . . . . . . . . 3233--3246 Zhiguo Hu and Dalu Zhang and Anqi Zhu and Zhiwei Chen and Hualei Zhou SLDRT: a measurement technique for available bandwidth on multi-hop path with bursty cross traffic . . . . . . . 3247--3260 Caishi Huang and Chin-Tau Lea and Albert Kai-Sun Wong A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks . . . . . . . . . . . 3261--3273 Gustavo B. Figueiredo and Eduardo Candido Xavier and Nelson L. S. da Fonseca Optimal algorithms for the batch scheduling problem in OBS networks . . . 3274--3286 Xiang Fei and Evan Magill REED: Flexible rule based programming of wireless sensor networks at runtime . . 3287--3299 Issa Khalil and Mamoun Awad and Abdallah Khreishah CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks . . . . . . . . . . . . . . . . 3300--3317 Wha Sook Jeon and Dong Geun Jeong Adaptive sensing scheduling for cognitive radio systems . . . . . . . . 3318--3332 Alexander Shpiner and Isaac Keslassy and Gabi Bracha and Eyal Dagan and Ofer Iny and Eyal Soha A switch-based approach to throughput collapse and starvation in data centers 3333--3346 Ram G. Lakshmi Narayanan and Oliver C. Ibe A joint network for disaster recovery and search and rescue operations . . . . 3347--3373 Olga León and Juan Hernández-Serrano and Miguel Soriano Cooperative detection of primary user emulation attacks in CRNs . . . . . . . 3374--3384 Anonymous Editorial Board . . . . . . . . . . . . ??
Po-Kai Tseng and Wei-Ho Chung Joint coverage and link utilization for fast IP local protection . . . . . . . . 3385--3400 Robin Doss and Wanlei Zhou and Saravanan Sundaresan and Shui Yu and Longxiang Gao A minimum disclosure approach to authentication and privacy in RFID systems . . . . . . . . . . . . . . . . 3401--3416 Changwang Zhang and Zhiping Cai and Weifeng Chen and Xiapu Luo and Jianping Yin Flow level detection and filtering of low-rate DDoS . . . . . . . . . . . . . 3417--3431 Yang Guo and Chao Liang and Yong Liu Hierarchically Clustered P2P Video Streaming: Design, implementation, and evaluation . . . . . . . . . . . . . . . 3432--3445 Yu Chen and Xuming Fang Energy-efficient dynamic resource allocation with opportunistic network coding in OFDMA relay networks . . . . . 3446--3455 Yishay Mansour and Boaz Patt-Shamir and Dror Rawitz Overflow management with multipart packets . . . . . . . . . . . . . . . . 3456--3467 Jiwoong Bang and Daewon Kim Efficient RTSP-based multiple buffering and packet transmission methods for delivering OMA PoC Box service . . . . . 3468--3478 Matheus Brenner Lehmann and Flávio Roberto Santos and Luciano Paschoal Gaspary and Marinho Pilla Barcellos Denial-of-service attacks and countermeasures on BitTorrent . . . . . 3479--3498 A. E. Krzesinski and G. Latouche and P. G. Taylor How do we encourage an egoist to act socially in an ad hoc mobile network? 3499--3510 Anatolij Zubow and Johannes Marotzke and Daniel Camps-Mur and Xavier Perez Costa sGSA: a SDMA-OFDMA greedy scheduling algorithm for WiMAX networks . . . . . . 3511--3530 Alessio Botta and Alberto Dainotti and Antonio Pescapé A tool for the generation of realistic network workload for emerging networking scenarios . . . . . . . . . . . . . . . 3531--3547 Xiangyang Zhang and Hossam Hassanein A survey of peer-to-peer live video streaming schemes --- an algorithmic perspective . . . . . . . . . . . . . . 3548--3579 Anonymous Editorial Board . . . . . . . . . . . . ??
Guang Wu and Shu Wang and Bang Wang and Yan Dong and Shu Yan A novel range-free localization based on regulated neighborhood distance for wireless ad hoc and sensor networks . . 3581--3593 Luigi Atzori and Antonio Iera and Giacomo Morabito and Michele Nitti The Social Internet of Things (SIoT) --- When social networks meet the Internet of Things: Concept, architecture and network characterization . . . . . . . . 3594--3608 Yi-Ling Hsieh and Kuochen Wang Dynamic overlay multicast for live multimedia streaming in urban VANETs . . 3609--3628 David Palma and Helder Araujo and Marilia Curado Link quality estimation in wireless multi-hop networks using Kernel based methods . . . . . . . . . . . . . . . . 3629--3638 Chien-Chi Kao and Shun-Ren Yang and Hsin-Chen Chen A sleep-mode interleaving algorithm for layered-video multicast services in IEEE 802.16e networks . . . . . . . . . . . . 3639--3654 Anonymous Editorial Board . . . . . . . . . . . . ??
Alberto Coen-Porisini and Sabrina Sicari Improving data quality using a cross layer protocol in wireless sensor networks . . . . . . . . . . . . . . . . 3655--3665 Antonio Capone and Daniele Corti and Luca Gianoli and Brunilde Sansó An optimization framework for the energy management of carrier Ethernet networks with Multiple Spanning Trees . . . . . . 3666--3681 Sungwook Kim Multi-leader multi-follower Stackelberg model for cognitive radio spectrum sharing scheme . . . . . . . . . . . . . 3682--3692 Wen-Hsing Kuo and Ting-Yang Lin Multi-hop multicast path construction in modern wireless relay networks . . . . . 3693--3704 A. Detti and M. Pomposini and N. Blefari-Melazzi and S. Salsano Supporting the Web with an information centric network that routes by name . . 3705--3722 M. Yuksel and K. K. Ramakrishnan and S. Kalyanaraman and J. D. Houle and R. Sadhvani Required extra capacity: a comparative estimation of overprovisioning needed for a classless IP backbone . . . . . . 3723--3743 Xianfu Meng and Yanli Wang and Yalin Ding An optimized strategy for update path selection in unstructured P2P networks 3744--3755 Esther Palomar and Almudena Alcaide and Arturo Ribagorda and Yan Zhang The Peer's Dilemma: a general framework to examine cooperation in pure peer-to-peer systems . . . . . . . . . . 3756--3766 Li Feng and Jianqing Li Integer-multiple-spacing-based scheduling for multimedia applications in IEEE 802.11e HCCA wireless networks 3767--3782 Jiong Jin and Marimuthu Palaniswami and Bhaskar Krishnamachari Rate control for heterogeneous wireless sensor networks: Characterization, algorithms and performance . . . . . . . 3783--3794 James Bernsen and D. Manivannan RIVER: a reliable inter-vehicular routing protocol for vehicular ad hoc networks . . . . . . . . . . . . . . . . 3795--3807 Anonymous Editorial Board . . . . . . . . . . . . ??
Dirk Husemann and Harry Rudin The WEB we live in . . . . . . . . . . . 3809--3810 Colin Allison and Alan Miller and Iain Oliver and Rosa Michaelson and Thanassis Tiropanis The Web in education . . . . . . . . . . 3811--3824 Sergey Brin and Lawrence Page Reprint of: The anatomy of a large-scale hypertextual Web search engine . . . . . 3825--3833 Jan Camenisch Information privacy?! . . . . . . . . . 3834--3848 Junghoo Cho and Hector Garcia-Molina and Lawrence Page Reprint of: Efficient crawling through URL ordering . . . . . . . . . . . . . . 3849--3858 Wendy Hall and Thanassis Tiropanis Web evolution and Web Science . . . . . 3859--3865 Julia Heidemann and Mathias Klier and Florian Probst Online social networks: a survey of a global phenomenon . . . . . . . . . . . 3866--3878 Ian Hughes Virtual worlds, augmented reality, blended reality . . . . . . . . . . . . 3879--3885 Andrew Odlyzko Web history and economics . . . . . . . 3886--3890 Ravi Sandhu Speculations on the science of Web user security . . . . . . . . . . . . . . . . 3891--3895 Anonymous Editorial Board . . . . . . . . . . . . ??
Ian F. Akyildiz and Harry Rudin COMNET editorial for 2012 . . . . . . . 1--2 Christos Papathanasiou and Nikos Dimitriou and Leandros Tassiulas Dynamic radio resource and interference management for MIMO-OFDMA mobile broadband wireless access systems . . . 3--16 Long Long and Ahmed E. Kamal Protecting multicast services in optical Internet backbones . . . . . . . . . . . 17--28 Ahmad Sardouk and Majdi Mansouri and Leila Merghem-Boulahia and Dominique Gaiti and Rana Rahim-Amoud Crisis management using MAS-based wireless sensor networks . . . . . . . . 29--45 Dong Mei Shan and Kee Chaing Chua and Gurusamy Mohan and Jian Qiu Partial spatial protection for provisioning differentiated reliability in FSTR-based Metro Ethernet networks 46--60 Seung Yeob Nam and Seong Joon Kim and Sihyung Lee and Hyong S. Kim Estimation of the available bandwidth ratio of a remote link or path segments 61--77 Kishore Angrishi An end-to-end stochastic network calculus with effective bandwidth and effective capacity . . . . . . . . . . . 78--84 Beakcheol Jang and Jun Bum Lim and Mihail L. Sichitiu An asynchronous scheduled MAC protocol for wireless sensor networks . . . . . . 85--98 Dognhyeok An and Honguk Woo and Hyunsoo Yoon and Ikjun Yeom Enhanced cooperative communication MAC for mobile wireless networks . . . . . . 99--116 Mingwei Xu and Meijia Hou and Dan Wang and Jiahai Yang An efficient critical protection scheme for intra-domain routing using link characteristics . . . . . . . . . . . . 117--133 A. Mirsayar Barkoosaraei and A. Hamid Aghvami Dynamic partitioning of IP-based wireless access networks . . . . . . . . 134--146 Addisu Eshete and Yuming Jiang Generalizing the CHOKe flow protection 147--161 Anwesha Mukherjee and Srimoyee Bhattacherjee and Sucheta Pal and Debashis De Femtocell based green power consumption methods for mobile network . . . . . . . 162--178 Weiwei Fang and Xiangmin Liang and Shengxin Li and Luca Chiaraviglio and Naixue Xiong VMPlanner: Optimizing virtual machine placement and traffic flow routing to reduce network power costs in cloud data centers . . . . . . . . . . . . . . . . 179--196 Hui Chen and Yang Xiao and Susan V. Vrbsky An update-based step-wise optimal cache replacement for wireless data access . . 197--212 Enrico Gregori and Luciano Lenzini and Chiara Orsini $k$-Dense communities in the Internet AS-level topology graph . . . . . . . . 213--227 Abderrahmen Mtibaa and Khaled A. Harras Fairness-related challenges in mobile opportunistic networking . . . . . . . . 228--242 Guang Yao and Jun Bi and Peiyao Xiao VASE: Filtering IP spoofing traffic with agility . . . . . . . . . . . . . . . . 243--257 Pablo Serrano and Paul Patras and Andrea Mannocci and Vincenzo Mancuso and Albert Banchs Control theoretic optimization of 802.11 WLANs: Implementation and experimental evaluation . . . . . . . . . . . . . . . 258--272 Fabio R. J. Vieira and José F. de Rezende and Valmir C. Barbosa and Serge Fdida Local heuristic for the refinement of multi-path routing in wireless mesh networks . . . . . . . . . . . . . . . . 273--285 C. Mbarushimana and A. Shahrabi and T. Buggy A cross-layer TCP enhancement in QoS-aware mobile ad hoc networks . . . . 286--301 Julia Amador and Jesus R. Artalejo Modeling computer virus with the BSDE approach . . . . . . . . . . . . . . . . 302--316 Toktam Mahmoodi and Vasilis Friderikos and Hamid Aghvami Using traffic asymmetry to enhance TCP performance . . . . . . . . . . . . . . 317--329 D. Unal and M. U. Caglayan A formal role-based access control model for security policies in multi-domain mobile networks . . . . . . . . . . . . 330--350 Lin Cui and Weijia Jia Cyclic stable matching for three-sided networking services . . . . . . . . . . 351--363 Berk Canberk An adaptive and QoS-based spectrum awareness framework for CR networks . . 364--373 Anonymous Editorial Board . . . . . . . . . . . . ??
Ronaldo Salles and Guofei Gu and Morton Swimmer Editorial for Computer Networks special issue on ``Botnet Activity: Analysis, Detection and Shutdown'' . . . . . . . . 375--377 Sérgio S. C. Silva and Rodrigo M. P. Silva and Raquel C. G. Pinto and Ronaldo M. Salles Botnets: a survey . . . . . . . . . . . 378--403 Masood Khosroshahy and Mustafa K. Mehmet Ali and Dongyu Qiu The SIC botnet lifecycle model: a step beyond traditional epidemiological models . . . . . . . . . . . . . . . . . 404--421 Marco Riccardi and Roberto Di Pietro and Marta Palanques and Jorge Aguil\`a Vila Titans' revenge: Detecting Zeus via its own flaws . . . . . . . . . . . . . . . 422--435 Aditya K. Sood and Richard J. Enbody and Rohit Bansal Dissecting SpyEye --- Understanding the design of third generation botnets . . . 436--450 Juan Caballero and Dawn Song Automatic protocol reverse-engineering: Message format extraction and field semantics inference . . . . . . . . . . 451--474 Christian J. Dietrich and Christian Rossow and Norbert Pohlmann CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis . . . . . . . . . 475--486 Roberto Perdisci and Davide Ariu and Giorgio Giacinto Scalable fine-grained behavioral clustering of HTTP-based malware . . . . 487--500 Hui-Tang Lin and Ying-You Lin and Jui-Wei Chiang Genetic-based real-time fast-flux service networks detection . . . . . . . 501--513 Chun-Ying Huang Effective bot host detection based on network failure models . . . . . . . . . 514--525 Pedro H. B. Las-Casas and Dorgival Guedes and Jussara M. Almeida and Artur Ziviani and Humberto T. Marques-Neto SpaDeS: Detecting spammers at the source network . . . . . . . . . . . . . . . . 526--539 Guanhua Yan Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks . . . . . . . . . . . . 540--555 Yazan Boshmaf and Ildar Muslukhov and Konstantin Beznosov and Matei Ripeanu Design and analysis of a social botnet 556--578 Jingyu Hua and Kouichi Sakurai Botnet command and control based on Short Message Service and human mobility 579--597 Anonymous Editorial Board . . . . . . . . . . . . ??
Antonio de la Oliva and Tito R. Vargas Hernández and Juan Carlos Guerri and José Alberto Hernández and Pedro Reviriego Performance analysis of Energy Efficient Ethernet on video streaming servers . . 599--608 Evan Tan and Chun Tung Chou Joint optimization of continuity and quality for streaming video . . . . . . 609--621 Chong Han and Josep Miquel Jornet and Etimad Fadel and Ian F. Akyildiz A cross-layer communication module for the Internet of Things . . . . . . . . . 622--633 Zi Chu and Steven Gianvecchio and Aaron Koehl and Haining Wang and Sushil Jajodia Blog or block: Detecting blog bots through behavioral biometrics . . . . . 634--646 Kush Kothari and Matthew Wright Mimic: an active covert channel that evades regularity-based detection . . . 647--657 Noriaki Kamiyama Designing data center network by analytic hierarchy process . . . . . . . 658--667 Yu Wang and Hari Krishna Garg and Mehul Motani Downlink scheduling for user equipment served by multiple mobile terminals in cellular systems . . . . . . . . . . . . 668--681 Tudor Dumitras and Priya Narasimhan A study of unpredictability in fault-tolerant middleware . . . . . . . 682--698 Vincent Lucas and Jean-Jacques Pansiot and Dominique Grad and Beno\^\it Hilt Robust and fair Multicast Congestion Control (M2C) . . . . . . . . . . . . . 699--724 Joo-Young Baek and Jeong-Yoon Lee and Young-Joo Suh An elastic compensation model for frame-based scheduling algorithms in wireless networks . . . . . . . . . . . 725--740 Noriaki Kamiyama and Tatsuya Mori and Ryoichi Kawahara Autonomic load balancing of flow monitors . . . . . . . . . . . . . . . . 741--761 Faqir Zarrar Yousaf and Christian Wietfeld Optimizing throughput performance of FMIPv6 over legacy 802.11 networks using iterative scanning . . . . . . . . . . . 762--781 Yi-Mao Hsiao and Yuan-Sun Chu and Jeng-Farn Lee and Jinn-Shyan Wang A high-throughput and high-capacity IPv6 routing lookup system . . . . . . . . . 782--794 Emiliano Casalicchio and Luca Silvestri Mechanisms for SLA provisioning in cloud-based service providers . . . . . 795--810 Aruna Jamdagni and Zhiyuan Tan and Xiangjian He and Priyadarsi Nanda and Ren Ping Liu RePIDS: a multi tier Real-time Payload-based Intrusion Detection System 811--824 Reduan H. Khan and Jamil Y. Khan A comprehensive review of the application characteristics and traffic requirements of a smart grid communications network . . . . . . . . . 825--845 Anonymous Editorial Board . . . . . . . . . . . . ??
Ren-Huang Liou and Yi-Bing Lin Mobility management with the central-based location area policy . . . 847--857 Wei-Tong Wang and Kuo-Feng Ssu Obstacle detection and estimation in wireless sensor networks . . . . . . . . 858--868 Zhen Ling and Junzhou Luo and Wei Yu and Xinwen Fu and Weijia Jia and Wei Zhao Protocol-level attacks against Tor . . . 869--886 Jiunn-Jye Lee and Hann-Huei Chiou and Chia-Chang Hsu and Chin-Laung Lei An adaptive sector-based routing model over structured peer-to-peer networks 887--896 Juhoon Kim and Luigi Iannone and Anja Feldmann Caching Locator/ID mappings: an experimental scalability analysis and its implications . . . . . . . . . . . . 897--909 Kaikai Chi and Xiaohong Jiang and Yi-hua Zhu and Jing Wang and Yanjun Li Block-level packet recovery with network coding for wireless reliable multicast 910--923 Mohamed Diallo and Vasilis Sourlas and Paris Flegkas and Serge Fdida and Leandros Tassiulas A content-based publish/subscribe framework for large-scale content delivery . . . . . . . . . . . . . . . . 924--943 Xiuzhong Chen and Marc De Leenheer and Rui Wang and Chaitanya S. K. Vadrevu and Lei Shi and Jie Zhang and Biswanath Mukherjee High-performance routing for hose-based VPNs in multi-domain backbone networks 944--953 Jose M. Camacho and Alberto García-Martínez and Marcelo Bagnulo and Francisco Valera BGP-XM: BGP eXtended Multipath for transit Autonomous Systems . . . . . . . 954--975 Stefano Secci and Kunpen Liu and Bijan Jabbari Efficient inter-domain traffic engineering with transit-edge hierarchical routing . . . . . . . . . . 976--989 Yuting Miao and Qiang Yang and Chunming Wu and Ming Jiang and Jinzhou Chen Multicast virtual network mapping for supporting multiple description coding-based video applications . . . . 990--1002 Rachid El-Azouzi and Francesco De Pellegrini and Habib B. A. Sidi and Vijay Kamble Evolutionary forwarding games in delay tolerant networks: Equilibria, mechanism design and stochastic approximation . . 1003--1018 Alex Borges Vieira and Rafael Barra de Almeida and Jussara Marques de Almeida and Sérgio Vale Aguiar Campos SimplyRep: a simple and effective reputation system to fight pollution in P2P live streaming . . . . . . . . . . . 1019--1036 Xiaoyuan Luo and Yanlin Yan and Shaobao Li and Xinping Guan Topology control based on optimally rigid graph in wireless sensor networks 1037--1047 Sungoh Kwon and Neung-Hyung Lee Cell ID extension in femtocell environments . . . . . . . . . . . . . . 1048--1062 Anonymous Editorial Board . . . . . . . . . . . . ??
Feng Shan and Weifa Liang and Jun Luo and Xiaojun Shen Network lifetime maximization for time-sensitive data gathering in wireless sensor networks . . . . . . . . 1063--1077 Christian Bauer A Secure Correspondent Router Protocol for NEMO Route Optimization . . . . . . 1078--1100 Mehmet Yunus Donmez and Sinan Isik and Cem Ersoy Combined analysis of contention window size and duty cycle for throughput and energy optimization in wireless sensor networks . . . . . . . . . . . . . . . . 1101--1112 M. A. Raayatpanah and H. Salehi Fathabadi and B. H. Khalaj and S. Khodayifar Minimum cost multiple multicast network coding with quantized rates . . . . . . 1113--1123 Efe Karasabun and Ibrahim Korpeoglu and Cevdet Aykanat Active node determination for correlated data gathering in wireless sensor networks . . . . . . . . . . . . . . . . 1124--1138 Donggyu Yun and Jungseul Ok and Bongjhin Shin and Soobum Park and Yung Yi Embedding of virtual network requests over static wireless multihop networks 1139--1152 Ji-Hoon Yun Performance analysis of IEEE 802.11 WLANs with rate adaptation in time-varying fading channels . . . . . . 1153--1166 Pavlos Antoniou and Andreas Pitsillides and Tim Blackwell and Andries Engelbrecht and Loizos Michael Congestion control in wireless sensor networks based on bird flocking behavior 1167--1191 Necati Kilic and V. Cagri Gungor Analysis of low power wireless links in smart grid environments . . . . . . . . 1192--1203 Gregory Detal and Christoph Paasch and Simon van der Linden and Pascal Mérindol and Gildas Avoine and Olivier Bonaventure Revisiting flow-based load balancing: Stateless path selection in data center networks . . . . . . . . . . . . . . . . 1204--1216 Slavisa Aleksic and Margot Deruyck and Willem Vereecken and Wout Joseph and Mario Pickavet and Luc Martens Energy efficiency of femtocell deployment in combined wireless/optical access networks . . . . . . . . . . . . 1217--1233 P. A. Baziana and I. E. Pountourakis An access protocol for efficiency optimization in WDM networks: a propagation delay and collisions avoidance analysis . . . . . . . . . . . 1234--1252 Lucia D'Acunto and Nitin Chiluka and Tamás Vinkó and Henk Sips BitTorrent-like P2P approaches for VoD: a comparative study . . . . . . . . . . 1253--1276 Daniele Casagrande and Pier Luca Montessoro and Franco Blanchini Fair and optimal dynamic admission control of elastic flows . . . . . . . . 1277--1288 Saeed Salah and Gabriel Maciá-Fernández and Jesús E. Díaz-Verdejo A model-based survey of alert correlation techniques . . . . . . . . . 1289--1317 Christian Esposito and Domenico Cotroneo and Stefano Russo On reliability in publish/subscribe services . . . . . . . . . . . . . . . . 1318--1343 Wenye Wang and Zhuo Lu Cyber security in the Smart Grid: Survey and challenges . . . . . . . . . . . . . 1344--1371 Anonymous Editorial Board . . . . . . . . . . . . ??
Márton Csernai and András Gulyás and Attila Körösi and Balázs Sonkoly and Gergely Biczók Incrementally upgradable data center architecture using hyperbolic tessellations . . . . . . . . . . . . . 1373--1393 Christos Anagnostopoulos and Stathes Hadjiefthymiades Multivariate context collection in mobile sensor networks . . . . . . . . . 1394--1407 Kai-Wei Ke and Chia-Hui Huang Performance evaluation of multisource Application Layer Multicast (ALM): Theoretical and simulative aspects . . . 1408--1424 Urs Hunkeler and Clemens Lombriser and Hong Linh Truong and Beat Weiss A case for centrally controlled wireless sensor networks . . . . . . . . . . . . 1425--1442 Conrado Borraz-Sánchez and Diego Klabjan Optimal placement of reconfigurable optical add/drop multiplexers with packing, blocking, and signal loss . . . 1443--1458 Adel Ali Ahmed An enhanced real-time routing protocol with load distribution for mobile wireless sensor networks . . . . . . . . 1459--1473 Linjun Fan and Yunxiang Ling and Tao Wang and Xiaomin Zhu and Xiaoyong Tang Novel clock synchronization algorithm of parametric difference for parallel and distributed simulations . . . . . . . . 1474--1487 Youghourta Benfattoum and Steven Martin and Khaldoun Al Agha QoS for real-time reliable multicasting in wireless multi-hop networks using a Generation-Based Network Coding . . . . 1488--1502 E. Amaldi and A. Capone and L. G. Gianoli Energy-aware IP traffic engineering with shortest path routing . . . . . . . . . 1503--1517 Rajarshi Mahapatra and Antonio De Domenico and Rohit Gupta and Emilio Calvanese Strinati Green framework for future heterogeneous wireless networks . . . . . . . . . . . 1518--1528 Xiaoping Wang and Yunhao Liu and Zheng Yang and Kai Lu and Jun Luo OFA: an optimistic approach to conquer flip ambiguity in network localization 1529--1544 S. Chiappetta and C. Mazzariello and R. Presta and S. P. Romano An anomaly-based approach to the analysis of the social behavior of VoIP users . . . . . . . . . . . . . . . . . 1545--1559 Ryoichi Kawahara and Tetsuya Takine and Tatsuya Mori and Noriaki Kamiyama and Keisuke Ishibashi Mean-variance relationship of the number of flows in traffic aggregation and its application to traffic management . . . 1560--1576 Anonymous Editorial Board . . . . . . . . . . . . ??
S. H. Shah Newaz and Ángel Cuevas and Gyu Myoung Lee and Noël Crespi and Jun Kyun Choi Adaptive Delay-Aware Energy Efficient TDM-PON . . . . . . . . . . . . . . . . 1577--1596 Christian Facchini and Oliver Holland and Fabrizio Granelli and Nelson L. S. da Fonseca and Hamid Aghvami Dynamic green self-configuration of 3G base stations using fuzzy cognitive maps 1597--1610 Weibo Chu and Xiaohong Guan and Zhongmin Cai and Lixin Gao Real-time volume control for interactive network traffic replay . . . . . . . . . 1611--1629 Tobias Jung and Sylvain Martin and Mohamed Nassar and Damien Ernst and Guy Leduc Outbound SPIT filter with optimal performance guarantees . . . . . . . . . 1630--1643 Jongwook Lee and Jin-Ghoo Choi and Saewoong Bahk Opportunistic downlink data delivery for mobile collaborative communities . . . . 1644--1655 T. D. Lagkas and P. Sarigiannidis and M. Louta On analyzing the intra-frame power saving potentials of the IEEE 802.16e downlink vertical mapping . . . . . . . 1656--1673 Weijie Wu and John C. S. Lui and Richard T. B. Ma On incentivizing upload capacity in P2P-VoD systems: Design, analysis and evaluation . . . . . . . . . . . . . . . 1674--1688 Wei Kuang Lai and Chang-Lung Tang QoS-aware downlink packet scheduling for LTE networks . . . . . . . . . . . . . . 1689--1698 Cristina Rottondi and Giacomo Verticale and Antonio Capone Privacy-preserving smart metering with multiple data consumers . . . . . . . . 1699--1713 Javad Akbari Torkestani An energy-efficient topology construction algorithm for wireless sensor networks . . . . . . . . . . . . 1714--1725 Ahmad Vakili and Jean-Charles Grégoire QoE management for video conferencing applications . . . . . . . . . . . . . . 1726--1738 Anonymous Editorial Board . . . . . . . . . . . . ??
Stamatios Arkoulis and Evangelos Anifantis and Vasileios Karyotis and Symeon Papavassiliou and Nikolaos Mitrou On the optimal, fair and channel-aware cognitive radio network reconfiguration 1739--1757 László Gyarmati and András Gulyás and Balázs Sonkoly and Tuan A. Trinh and Gergely Biczók Free-scaling your data center . . . . . 1758--1773 Gongqi Lin and Sieteng Soh and Kwan-Wu Chin and Mihai Lazarescu Efficient heuristics for energy-aware routing in networks with bundled links 1774--1788 Giacomo Bacci and Marco Luise QoS-aware game-theoretic rate & power control for CDMA wireless communication networks . . . . . . . . . . . . . . . . 1789--1804 Shengbo Yang and Chai Kiat Yeo and Bu Sung Lee MaxCD: Efficient multi-flow scheduling and cooperative downloading for improved highway drive-thru Internet systems . . 1805--1820 Michele Rondinone and Javier Gozalvez Contention-based forwarding with multi-hop connectivity awareness in vehicular ad-hoc networks . . . . . . . 1821--1837 Giovanna Carofiglio and Luca Muscariello and Dario Rossi and Claudio Testa and Silvio Valenti Rethinking the Low Extra Delay Background Transport (LEDBAT) Protocol 1838--1852 Zoltán Czirkos and Gábor Hosszú Solution for the broadcasting in the Kademlia peer-to-peer overlay . . . . . 1853--1862 Stefano Iellamo and Lin Chen and Marceau Coupechoux Proportional and double imitation rules for spectrum access in cognitive radio networks . . . . . . . . . . . . . . . . 1863--1879 Alexandre A. Pires and José F. de Rezende Independent links: a new approach to increase spatial reuse in wireless networks . . . . . . . . . . . . . . . . 1880--1893 Anonymous Editorial Board . . . . . . . . . . . . ??
Xi Fang and Dejun Yang and Guoliang Xue Pathbook: Cross-layer optimization for full-duplex wireless networks . . . . . 1895--1912 Habib M. Ammari On the energy-delay trade-off in geographic forwarding in always-on wireless sensor networks: a multi-objective optimization problem . . 1913--1935 Michal Ficek and Tomás Pop and Lukás Kencl Active tracking in mobile networks: an in-depth view . . . . . . . . . . . . . 1936--1954 L. Militano and A. Iera and F. Scarcello A fair cooperative content-sharing service . . . . . . . . . . . . . . . . 1955--1973 Péter Babarczi and Gergely Biczók and Harald Òverby and János Tapolcai and Péter Soproni Realization strategies of dedicated path protection: a bandwidth cost perspective 1974--1990 Waleed Alsalih and Kashif Ali and Hossam Hassanein A power control technique for anti-collision schemes in RFID systems 1991--2003 A. Coiro and M. Listanti and A. Valenti and F. Matera Energy-aware traffic engineering: a routing-based distributed solution for connection-oriented IP networks . . . . 2004--2020 Juan Felipe Botero and Xavier Hesselbach Greener networking in a network virtualization environment . . . . . . . 2021--2039 Adil Fahad and Zahir Tari and Ibrahim Khalil and Ibrahim Habib and Hussein Alnuweiri Toward an efficient and scalable feature selection approach for Internet traffic classification . . . . . . . . . . . . . 2040--2057 S. Gramatikov and F. Jaureguizar and J. Cabrera and N. García Stochastic modelling of peer-assisted VoD streaming in managed networks . . . 2058--2074 Evariste Logota and Carlos Campos and Susana Sargento and Augusto Neto Advanced multicast class-based bandwidth over-provisioning . . . . . . . . . . . 2075--2092 Giuseppe Aceto and Alessio Botta and Walter de Donato and Antonio Pescap\`e Cloud monitoring: a survey . . . . . . . 2093--2115 Anonymous Editorial Board . . . . . . . . . . . . ??
Stephan Eidenbenz and Madhav Marathe and Arunabha Sen Editorial for Computer Networks special issue on ``Towards a Science of Cyber Security'' . . . . . . . . . . . . . . . 2119--2120 Chris J. Kuhlman and V. S. Anil Kumar and S. S. Ravi Controlling opinion propagation in online networks . . . . . . . . . . . . 2121--2132 Nam P. Nguyen and Guanhua Yan and My T. Thai Analysis of misinformation containment in online social networks . . . . . . . 2133--2146 Yi Wang and Marios Iliofotou and Michalis Faloutsos and Bin Wu Analyzing Communication Interaction Networks (CINs) in enterprises and inferring hierarchies . . . . . . . . . 2147--2158 Jaafar Almasizadeh and Mohammad Abdollahi Azgomi A stochastic model of attack process for the evaluation of security metrics . . . 2159--2180 Bugra Caskurlu and Ashish Gehani and Cemal Cagatay Bilgin and K. Subramani Analytical models for risk-based intrusion response . . . . . . . . . . . 2181--2192 Udi Ben-Porat and Anat Bremler-Barr and Hanoch Levy On the exploitation of CDF based wireless scheduling . . . . . . . . . . 2193--2205 Klaus Julisch Understanding and overcoming cyber security anti-patterns . . . . . . . . . 2206--2211 Anonymous Special Issue on ``Security and identity architecture for the future Internet'' 2215--2217 Tapio Levä and Miika Komu and Ari Keränen and Sakari Luukkainen Adoption barriers of network layer protocols: the case of host identity protocol . . . . . . . . . . . . . . . . 2218--2232 Elena Torroglosa-García and Antonio D. Pérez-Morales and Pedro Martinez-Julia and Diego R. Lopez Integration of the OAuth and Web Service family security standards . . . . . . . 2233--2249 Yang Xiang and Xingang Shi and Jianping Wu and Zhiliang Wang and Xia Yin Sign what you really care about --- Secure BGP AS-paths efficiently . . . . 2250--2265 Rodrigo Roman and Jianying Zhou and Javier Lopez On the features and challenges of security and privacy in distributed Internet of Things . . . . . . . . . . . 2266--2279 Pedro Martinez-Julia and Antonio F. Skarmeta Beyond the separation of identifier and locator: Building an identity-based overlay network architecture for the Future Internet . . . . . . . . . . . . 2280--2300 Anonymous Editorial Board . . . . . . . . . . . . ??
Paola Cappanera and Luciano Lenzini and Alessandro Lori and Giovanni Stea and Gigliola Vaglini Optimal joint routing and link scheduling for real-time traffic in TDMA Wireless Mesh Networks . . . . . . . . . 2301--2312 Soham Sengupta An approach to provide a network layer security model with QR code generated with shuffled GPS parameters as embedded keys traveling over Internet using existing IPv4 mechanism . . . . . . . . 2313--2330 Fabien Tarissan and Bruno Quoitin and Pascal Mérindol and Benoit Donnet and Jean-Jacques Pansiot and Matthieu Latapy Towards a bipartite graph modeling of the Internet topology . . . . . . . . . 2331--2347 Xiao-Yang Liu and Kai-Liang Wu and Yanmin Zhu and Linghe Kong and Min-You Wu Mobility increases the surface coverage of distributed sensor networks . . . . . 2348--2363 Md. Nooruzzaman and Osanori Koyama and Yutaka Katsuyama Congestion removing performance of stackable ROADM in WDM networks under dynamic traffic . . . . . . . . . . . . 2364--2373 Mirjana D. Stojanovic and Aleksandra M. Kostic-Ljubisavljevic and Vesna M. Radonjic-Djogatovic SLA-controlled interconnection charging in next generation networks . . . . . . 2374--2394
Kenneth J. Turner and Evan H. Magill Special Issue on feature interaction in communications and software systems . . 2395--2398 Sven Apel and Alexander von Rhein and Thomas Thüm and Christian Kästner Feature-interaction detection based on feature-based specifications . . . . . . 2399--2409 M. Kolberg and J. F. Buford and K. Dhara and X. Wu and V. Krishnaswamy Feature interaction in a federated communications-enabled collaboration platform . . . . . . . . . . . . . . . . 2410--2428 Claire Maternaghan and Kenneth J. Turner Policy conflicts in home automation . . 2429--2441 Masahide Nakamura and Kousuke Ikegami and Shinsuke Matsumoto Considering impacts and requirements for better understanding of environment interactions in home network services 2442--2453 Thein Than Tun and Robin Laney and Yijun Yu and Bashar Nuseibeh Specifying software features for composition: a tool-supported approach 2454--2464 Anonymous Editorial Board . . . . . . . . . . . . ??
Yusung Kim and Ikjun Yeom Performance analysis of in-network caching for content-centric networking 2465--2482 Chao-Tsun Chang and Chih-Yung Chang and Tzu-Lin Wang and Yun-Jung Lu Throughput enhancement by exploiting spatial reuse opportunities with smart antenna systems in wireless ad hoc networks . . . . . . . . . . . . . . . . 2483--2498 Jérémy Serror and Hui Zang and Jean C. Bolot Measurement and modeling of paging channel overloads on a cellular network 2499--2513 Hui-Tang Lin and Ying-You Lin and Chung-Jui Sun Efficient and adaptive resource scheduling in IEEE 802.16j transparent relay networks . . . . . . . . . . . . . 2514--2535 Klaus Wehmuth and Artur Ziviani DACCER: Distributed Assessment of the Closeness CEntrality Ranking in complex networks . . . . . . . . . . . . . . . . 2536--2548 Jaehoon (Paul) Jeong and Tian He and David H. C. Du TMA: Trajectory-based Multi-Anycast forwarding for efficient multicast data delivery in vehicular networks . . . . . 2549--2563 Silvia Boiardi and Antonio Capone and Brunilde Sansó Radio planning of energy-aware cellular networks . . . . . . . . . . . . . . . . 2564--2577 Hasan Tuncer and Andres Kwasinski and Nirmala Shenoy Performance analysis of Virtual Mobility Domain scheme vs. IPv6 mobility protocols . . . . . . . . . . . . . . . 2578--2596 Tolga Acar and Mira Belenkiy and Alptekin Küpçü Single password authentication . . . . . 2597--2614 Jeng-Wei Lee and I-Hsun Chuang and Win-Bin Huang and Yau-Hwang Kuo An opportunistic resource allocation approach for mixed QoS and non-QoS connections in OFDMA wireless networks 2615--2627 Seungwon Shin and Zhaoyan Xu and Guofei Gu EFFORT: a new host-network cooperated framework for efficient and effective bot malware detection . . . . . . . . . 2628--2642 Ben-Jye Chang and Ying-Hsin Liang and Yu-Hsien Lee Dynamic-cost-reward connection admission control for maximizing system reward in $4$G wireless multihop relaying networks 2643--2655 Natalia Castro Fernandes and Marcelo Duffles Donato Moreira and Otto Carlos Muniz Bandeira Duarte Safeguarding ad hoc networks with a self-organized membership control system 2656--2674 Anonymous Editorial Board . . . . . . . . . . . . ??
B. Bellalta and A. Faridi and D. Staehle and J. Barcelo and A. Vinel and M. Oliver Performance analysis of CSMA/CA protocols with multi-packet transmission 2675--2688 Pengfei Zhang and Gaoxi Xiao and Hwee-Pink Tan Clustering algorithms for maximizing the lifetime of wireless sensor networks with energy-harvesting sensors . . . . . 2689--2704 Hung-Yu Chien Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices . . . . . . . . . . . . 2705--2717 José Camacho and Pablo Padilla and Pedro García-Teodoro and Jesús Díaz-Verdejo A generalizable dynamic flow pairing method for traffic classification . . . 2718--2732 Hai-Heng Ng and Wee-Seng Soh and Mehul Motani An underwater acoustic MAC protocol using reverse opportunistic packet appending . . . . . . . . . . . . . . . 2733--2751 F. Bouali and O. Sallent and J. Pérez-Romero and R. Agustí A cognitive management framework for spectrum selection . . . . . . . . . . . 2752--2765 Ibrahima Diarrassouba and Ali Lourimi and Ali Ridha Mahjoub and Habib Youssef Hose workload based exact algorithm for the optimal design of virtual private networks . . . . . . . . . . . . . . . . 2766--2774 Florian Tschorsch and Björn Scheuermann An algorithm for privacy-preserving distributed user statistics . . . . . . 2775--2787 Ze Wang and Yunlong Wang and Maode Ma and Jigang Wu Efficient localization for mobile sensor networks based on constraint rules optimized Monte Carlo method . . . . . . 2788--2801 Giuseppe Rossini and Dario Rossi and Christophe Betoule and Remi Clavier and Gilles Thouenon FIB Aplasia through probabilistic routing and autoforwarding . . . . . . . 2802--2816 Dariusz Gasior and Maciej Drwal Pareto-optimal Nash equilibrium in capacity allocation game for self-managed networks . . . . . . . . . 2817--2832 Delfina Malandrino and Vittorio Scarano Privacy leakage on the Web: Diffusion and countermeasures . . . . . . . . . . 2833--2855 Kai-Lung Hua and Ge-Ming Chiu and Hsing-Kuo Pao and Yi-Chi Cheng An efficient scheduling algorithm for scalable video streaming over P2P networks . . . . . . . . . . . . . . . . 2856--2868 Anonymous Editorial Board . . . . . . . . . . . . ??
Sunheui Ryoo and Changhee Joo and Saewoong Bahk Location-based spectrum allocation and partitioning scheme for cross-tier interference mitigation in macro-femtocell networks . . . . . . . . 2869--2879 Mingwei Xu and Yunfei Shang and Dan Li and Xin Wang Greening data center networks with throughput-guaranteed power-aware routing . . . . . . . . . . . . . . . . 2880--2899 Xiang Meng and Pui-Sze Tsang and King-Shan Lui Analysis of distribution time of multiple files in a P2P network . . . . 2900--2915 Yuh-Rong Chen and Sridhar Radhakrishnan and Sudarshan Dhall and Suleyman Karabuk On multi-stream multi-source multicast routing . . . . . . . . . . . . . . . . 2916--2930 Luca Chiaraviglio and Antonio Cianfrani and Esther Le Rouzic and Marco Polverini Sleep modes effectiveness in backbone networks with limited configurations . . 2931--2948 Duc Minh Pham and Syed Mahfuzul Aziz Object extraction scheme and protocol for energy efficient image communication over wireless sensor networks . . . . . 2949--2960 Khalim Amjad Meerja and Pin-Han Ho and Bin Wu and Hsiang-Fu Yu Media access protocol for a coexisting cognitive femtocell network . . . . . . 2961--2975 Xudong Xiang and Jianxiong Wan and Chuang Lin and Xin Chen A dynamic programming approximation for downlink channel allocation in cognitive femtocell networks . . . . . . . . . . . 2976--2991 Pramila Mouttappa and Stephane Maag and Ana Cavalli Using passive testing based on symbolic execution and slicing techniques: Application to the validation of communication protocols . . . . . . . . 2992--3008 Chao Hu and Ming Chen and Changyou Xing Towards efficient video chunk dissemination in peer-to-peer live streaming . . . . . . . . . . . . . . . 3009--3024 Stefania Tosi and Sara Casolari and Michele Colajanni Data clustering based on correlation analysis applied to highly variable domains . . . . . . . . . . . . . . . . 3025--3038 Chao Zhou and Xinggong Zhang and Zongming Guo Optimal adaptive channel scheduling for scalable video broadcasting over MIMO wireless networks . . . . . . . . . . . 3039--3050 Luca Chiaraviglio and Delia Ciullo and Marco Mellia and Michela Meo Modeling sleep mode gains in energy-aware networks . . . . . . . . . 3051--3066 Karim Habak and Moustafa Youssef and Khaled A. Harras An optimal deployable bandwidth aggregation system . . . . . . . . . . . 3067--3080 Noriaki Kamiyama and Ryoichi Kawahara and Haruhisa Hasegawa Optimum profit allocation in coalitional VoD service . . . . . . . . . . . . . . 3081--3097 Sabrina Sicari and Alberto Coen-Porisini and Roberto Riggio DARE: evaluating Data Accuracy using node REputation . . . . . . . . . . . . 3098--3111 Anonymous Editorial Board . . . . . . . . . . . . ??
Andrea Detti and Diego Perino and Mario Gerla and Yanghee Choi Editorial: Special issue on Information Centric Networking . . . . . . . . . . . 3113--3115 G. Carofiglio and G. Morabito and L. Muscariello and I. Solis and M. Varvello From content delivery today to information centric networking . . . . . 3116--3127 Guoqiang Zhang and Yang Li and Tao Lin Caching in information centric networking: a survey . . . . . . . . . . 3128--3141 HyunYong Lee and Akihiro Nakao User-assisted in-network caching in information-centric networking . . . . . 3142--3153 S. Eum and K. Nakauchi and M. Murata and Y. Shoji and N. Nishinaga Potential based routing as a secondary best-effort routing for Information Centric Networking (ICN) . . . . . . . . 3154--3164 Yi Wang and Huichen Dai and Ting Zhang and Wei Meng and Jindou Fan and Bin Liu GPU-accelerated name lookup with component encoding . . . . . . . . . . . 3165--3177 Mauro Conti and Paolo Gasti and Marco Teoli A lightweight mechanism for detection of cache pollution attacks in Named Data Networking . . . . . . . . . . . . . . . 3178--3191 Matthias Wählisch and Thomas C. Schmidt and Markus Vahlenkamp Backscatter from the data plane --- Threats to stability and security in information-centric network infrastructure . . . . . . . . . . . . . 3192--3206 S. Salsano and N. Blefari-Melazzi and A. Detti and G. Morabito and L. Veltri Information centric networking over SDN and OpenFlow: Architectural aspects and experiments on the OFELIA testbed . . . 3207--3221 Marica Amadeo and Claudia Campolo and Antonella Molinaro Enhancing content-centric networking for vehicular environments . . . . . . . . . 3222--3234 H. M. N. Dilum Bandara and Anura P. Jayasumana Distributed, multi-user, multi-application, and multi-sensor data fusion over named data networks . . . . 3235--3248 Ben Tagger and Dirk Trossen and Alexandros Kostopoulos and Stuart Porter and George Parisis Realising an application environment for information-centric networking . . . . . 3249--3266
Luiz Filipe M. Vieira and Mario Gerla and Archan Misra Fundamental limits on end-to-end throughput of network coding in multi-rate and multicast wireless networks . . . . . . . . . . . . . . . . 3267--3275 Marco Ajmone Marsan and Luca Chiaraviglio and Delia Ciullo and Michela Meo On the effectiveness of single and multiple base station sleep modes in cellular networks . . . . . . . . . . . 3276--3290 Xiaohui Chen and Jing Xu and Wei Yuan and Wei Liu and Wenqing Cheng Channel assignment in heterogeneous multi-radio multi-channel wireless networks: a game theoretic approach . . 3291--3299 Elena Baralis and Andrea Bianco and Tania Cerquitelli and Luca Chiaraviglio and Marco Mellia NetCluster: a clustering-based framework to analyze Internet passive measurements data . . . . . . . . . . . . . . . . . . 3300--3315 Ricardo C. Carrano and Diego Passos and Luiz C. S. Magalhães and Célio V. N. Albuquerque Nested block designs: Flexible and efficient schedule-based asynchronous duty cycling . . . . . . . . . . . . . . 3316--3326 Honghuing Liu and Patrick P. C. Lee and John C. S. Lui On the credit evolution of credit-based incentive protocols in wireless mesh networks . . . . . . . . . . . . . . . . 3327--3343 Genki Matsui and Takuji Tachibana and Yukinori Nakamura and Kenji Sugimoto Distributed power adjustment based on control theory for cognitive radio networks . . . . . . . . . . . . . . . . 3344--3356 João Marco C. Silva and Paulo Carvalho and Solange Rito Lima A multiadaptive sampling technique for cost-effective network measurements . . 3357--3369 Zoltán Faigl and László Bokor and Jani Pellikka and Andrei Gurtov Suitability analysis of existing and new authentication methods for future 3GPP Evolved Packet Core . . . . . . . . . . 3370--3388 Eleonora Borgia and Giuseppe Anastasi and Marco Conti Energy efficient and reliable data delivery in urban sensing applications: a performance analysis . . . . . . . . . 3389--3409 B. Hagelstein and M. Abolhasan and D. Franklin and F. Safaei Improving fairness in IEEE 802.11 networks using MAC layer opportunistic retransmission . . . . . . . . . . . . . 3410--3427 Lei Chen and Di Yuan Mathematical modeling for optimal design of in-building distributed antenna systems . . . . . . . . . . . . . . . . 3428--3445 A. Coluccia and A. D'Alconzo and F. Ricciato Distribution-based anomaly detection via generalized likelihood ratio test: a general Maximum Entropy approach . . . . 3446--3462 K. Avrachenkov and U. Ayesta and J. Doncel and P. Jacko Congestion control of TCP flows in Internet routers by means of index policy . . . . . . . . . . . . . . . . . 3463--3478 Nicola Cordeschi and Mohammad Shojafar and Enzo Baccarelli Energy-saving self-configuring networked data centers . . . . . . . . . . . . . . 3479--3491 Chengzhe Lai and Hui Li and Rongxing Lu and Xuemin (Sherman) Shen SE-AKA: a secure and efficient group authentication and key agreement protocol for LTE networks . . . . . . . 3492--3510 Ce-Kuen Shieh and Chia-Yu Yu and Cheng-Han Lin and J. Morris Chang Efficiency-driven selection of bandwidth request mechanism in broadband wireless access networks . . . . . . . . . . . . 3511--3521 Peng Zhou and Xiapu Luo and Ang Chen and Rocky K. C. Chang SGor: Trust graph based onion routing 3522--3544 Glaucio H. S. Carvalho and Isaac Woungang and Alagan Anpalagan and Rodolfo W. L. Coutinho and João C. W. A. Costa A semi-Markov decision process-based joint call admission control for inter-RAT cell re-selection in next generation wireless networks . . . . . . 3545--3562 Jihun Ha and Jiung Yu and Byungjo Kim and Hyogon Kim On UDP continuity over vertical handovers . . . . . . . . . . . . . . . 3563--3580 Le Wang and Jukka Manner Energy-efficient mobile web in a bundle 3581--3600 Nuutti Varis and Jukka Manner and Mikko Särelä and Timo Kiravuo DBridges: Flexible floodless frame forwarding . . . . . . . . . . . . . . . 3601--3616 Byung-Gook Kim and Jeong-Ahn Kwon and Jang-Won Lee Subchannel allocation for the OFDMA-based femtocell system . . . . . . 3617--3629 Yuxin Meng and Wenjuan Li and Lam-For Kwok Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection . . . . 3630--3640 M. Manzano and E. Calle and V. Torres-Padrosa and J. Segovia and D. Harle Endurance: a new robustness measure for complex networks under multiple failure scenarios . . . . . . . . . . . . . . . 3641--3653 Emre Atsan and Öznur Özkasap SCALAR: Scalable data lookup and replication protocol for mobile ad hoc networks . . . . . . . . . . . . . . . . 3654--3672 Martín Zubeldía and Andrés Ferragut and Fernando Paganini Overcoming performance pitfalls in rate-diverse high speed WLANs . . . . . 3673--3685 Matjaz Fras and Joze Mohorko and Zarko Cucej Limitations of a Mapping Algorithm with Fragmentation Mimics (MAFM) when modeling statistical data sources based on measured packet network traffic . . . 3686--3700 Cuiqin Hou and Yibin Hou and Zhangqin Huang A framework based on barycentric coordinates for localization in wireless sensor networks . . . . . . . . . . . . 3701--3712 Liliana Bolea and Jordi Pérez-Romero and Ramón Agustí ML aided context feature extraction for cognitive radio . . . . . . . . . . . . 3713--3727 A. Iacovazzi and A. D'Alconzo and F. Ricciato and M. Burkhart Elementary secure-multiparty computation for massive-scale collaborative network monitoring: a quantitative assessment 3728--3742 Giovanna Carofiglio and Massimo Gallo and Luca Muscariello On the performance of bandwidth and storage sharing in information-centric networks . . . . . . . . . . . . . . . . 3743--3758
Angelos-Christos G. Anadiotis and Charalampos Z. Patrikakis and Iakovos S. Venieris On the performance improvement of gossip protocols for content-based publish-subscribe through caching . . . 3759--3772 Peng Lin and Alan Kai-Hau Yeung and Angus Kin-Yeung Wong Multi-portal association based dispatching and a virtual-queue method in wireless mesh networks . . . . . . . 3773--3789 Nadine Akkari An IMS-based integration architecture for WiMax/LTE handover . . . . . . . . . 3790--3798 Yifeng Cai and Konstantinos Pelechrinis and Xin Wang and Prashant Krishnamurthy and Yijun Mo Joint reactive jammer detection and localization in an enterprise WiFi network . . . . . . . . . . . . . . . . 3799--3811 Fatemeh Ghods and Hamed Yousefi and Ali Mohammad Afshin Hemmatyar and Ali Movaghar MC-MLAS: Multi-channel Minimum Latency Aggregation Scheduling in Wireless Sensor Networks . . . . . . . . . . . . 3812--3825 Elias Bou-Harb and Mourad Debbabi and Chadi Assi A systematic approach for detecting and clustering distributed cyber scanning 3826--3839 Baozhi Chen and Dario Pompili Minimizing position uncertainty for under-ice autonomous underwater vehicles 3840--3854 Zohar Naor and Sajal K. Das A scalable framework for mobile real-time group communication services 3855--3865 Seung Yeob Nam and Sirojiddin Djuraev and Minho Park Collaborative approach to mitigating ARP poisoning-based Man-in-the-Middle attacks . . . . . . . . . . . . . . . . 3866--3884 Wen Sun and Yu Ge and Wai-Choong Wong A lightweight distributed scheme for mitigating inter-user interference in body sensor networks . . . . . . . . . . 3885--3896 Ignasi Paredes-Oliva and Pere Barlet-Ros and Xenofontas Dimitropoulos FaRNet: Fast recognition of high-dimensional patterns from big network traffic data . . . . . . . . . . 3897--3913 Zakwan Al-Arnaout and Qiang Fu and Marcus Frean A divide-and-conquer approach for content replication in WMNs . . . . . . 3914--3928 Weigang Wu and Jiannong Cao and Hejun Wu and Jingjing Li Robust and dynamic data aggregation in wireless sensor networks: a cross-layer approach . . . . . . . . . . . . . . . . 3929--3940 Seung-Ho Lee and Han-You Jeong and Seung-Woo Seo Optimal pricing and capacity partitioning for tiered access service in virtual networks . . . . . . . . . . 3941--3956 Wanzhi Qiu and Efstratios Skafidas Distributed routing for signal detection in wireless sensor networks . . . . . . 3957--3966 Mohammad Rajiullah and Reine Lundin and Anna Brunstrom and Stefan Lindskog Performance analysis and improvement of PR-SCTP for small messages . . . . . . . 3967--3986 Zhenhua Wu and Yu Hen Hu How many wireless resources are needed to resolve the hidden terminal problem? 3987--3996 Giovanni Accongiagioco and Matteo Andreozzi and Daniele Migliorini and Giovanni Stea Throughput-optimal resource allocation in LTE-Advanced with distributed antennas . . . . . . . . . . . . . . . . 3997--4009 M. Sarper Gokturk and Ozgur Gurbuz and Elza Erkip A cross-layer multi-hop cooperative network architecture for wireless ad hoc networks . . . . . . . . . . . . . . . . 4010--4029 Tahir Mehmood and Lavy Libman and Hooman Reisi Dehkordi and Sanjay K. Jha Optimal opportunistic routing and network coding for bidirectional wireless flows . . . . . . . . . . . . . 4030--4046 Shahabeddin Geravand and Mahmood Ahmadi Bloom filter applications in network security: a state-of-the-art survey . . 4047--4064
Ian F. Akyildiz and Harry Rudin Editorial . . . . . . . . . . . . . . . 1--1 Sangman Cho and Srinivasan Ramasubramanian Localizing link failures in all-optical networks using monitoring tours . . . . 2--12 R. Block and G. T. Peeters and B. Van Houdt A branching process approach to compute the delay and energy efficiency of tree algorithms with free access . . . . . . 13--28 Haomin Yang and Yaoxue Zhang and Yuezhi Zhou and Xiaoming Fu and Hao Liu and Athanasios V. Vasilakos Provably secure three-party authenticated key agreement protocol using smart cards . . . . . . . . . . . 29--38 Kyoung-Hak Jung and Hyo-Ryun Lee and Wan-Seon Lim and Young-Joo Suh An adaptive collision resolution scheme for energy efficient communication in IEEE 802.15.4 networks . . . . . . . . . 39--57 Mohammad Faisal Uddin and Chadi Assi and Ali Ghrayeb Joint optimal AF relay assignment and power allocation in wireless cooperative networks . . . . . . . . . . . . . . . . 58--69 Manuel Gil Pérez and Juan E. Tapiador and John A. Clark and Gregorio Martínez Pérez and Antonio F. Skarmeta Gómez Trustworthy placements: Improving quality and resilience in collaborative attack detection . . . . . . . . . . . . 70--86 Wenjie Zhang and Chai Kiat Yeo Sequential sensing based spectrum handoff in cognitive radio networks with multiple users . . . . . . . . . . . . . 87--98 Kuzman Katkalov and Nina Moebius and Kurt Stenzel and Marian Borek and Wolfgang Reif Modeling test cases for security protocols with SecureMDD . . . . . . . . 99--111 Lihua Dou and Yunchuan Wei and Jun Ni Multi-user wireless channel probing for shared key generation with a fuzzy controller . . . . . . . . . . . . . . . 112--126 Xiaofei Wu and Xin Wang and Ke Yu and Frank Y. Li A measurement-based study on the correlations of inter-domain Internet application flows . . . . . . . . . . . 127--140 Wei-Min Yao and Sonia Fahmy Flow-based partitioning of network testbed experiments . . . . . . . . . . 141--157 Jin Cheol Kim and Younghee Lee An end-to-end measurement and monitoring technique for the bottleneck link capacity and its available bandwidth . . 158--179 Laura Carrea and Alexei Vernitski and Martin Reed Optimized hash for network path encoding with minimized false positives . . . . . 180--191 Hars Vardhan and Seong-Ryong Ryu and Bhaskar Banerjee and Ravi Prakash 60 GHz wireless links in data center networks . . . . . . . . . . . . . . . . 192--205 Micah Sherr and Harjot Gill and Taher Aquil Saeed and Andrew Mao and William R. Marczak and Saravana Soundararajan and Wenchao Zhou and Boon Thau Loo and Matt Blaze The design and implementation of the $ A^3 $ application-aware anonymity platform . . . . . . . . . . . . . . . . 206--227 Hung-Quoc Lai and Yan Chen and K. J. Ray Liu Energy efficient cooperative communications using coalition formation games . . . . . . . . . . . . . . . . . 228--238 A. Shawky and R. Olsen and J. Pedersen and H. Schwefel Network aware dynamic context subscription management . . . . . . . . 239--253 Mohamed Younis and Izzet F. Senturk and Kemal Akkaya and Sookyoung Lee and Fatih Senel Topology management techniques for tolerating node failures in wireless sensor networks: a survey . . . . . . . 254--283
Lluis Pamies-Juarez and Marc Sanchez-Artigas and Pedro García-López and Rubén Mondéjar and Rahma Chaabouni On the interplay between data redundancy and retrieval times in P2P storage systems . . . . . . . . . . . . . . . . 1--16 Ali Dabirmoghaddam and Majid Ghaderi and Carey Williamson On the optimal randomized clustering in distributed sensor networks . . . . . . 17--32 Naser M. Asghari and M. Mandjes and Anwar Walid Energy-efficient scheduling in multi-core servers . . . . . . . . . . . 33--43 Vasilis Sourlas and Paris Flegkas and Leandros Tassiulas A novel cache aware routing scheme for Information-Centric Networks . . . . . . 44--61 Xiaoning Zhang and Haoran Wang and Zian Zhang Survivable green IP over WDM networks against double-link failures . . . . . . 62--76 Rubén Cuevas and Michal Kryczka and Roberto González and Angel Cuevas and Arturo Azcorra TorrentGuard: Stopping scam and malware distribution in the BitTorrent ecosystem 77--90 Sinan Toklu and O. Ayhan Erdem BSC-MAC: Energy efficiency in wireless sensor networks with base station control . . . . . . . . . . . . . . . . 91--100 Tu Ouyang and Soumya Ray and Mark Allman and Michael Rabinovich A large-scale empirical analysis of email spam detection through network characteristics in a stand-alone enterprise . . . . . . . . . . . . . . . 101--121 Mathias Fischer and Sascha Grau and Giang Nguyen and Guenter Schaefer Resilient and underlay-aware P2P live-streaming . . . . . . . . . . . . . 122--136 Alia Asheralieva and Kaushik Mahata A two-step resource allocation procedure for LTE-based cognitive radio network 137--152 Florin Coras and Jordi Domingo-Pascual and Fabio Maino and Dino Farinacci and Albert Cabellos-Aparicio Lcast: Software-defined inter-domain multicast . . . . . . . . . . . . . . . 153--170 Elias Yaacoub and Adnan Abu-Dayya Automatic meter reading in the smart grid using contention based random access over the free cellular spectrum 171--183 Jaeseong Jeong and Kyunghan Lee and Yung Yi and Injong Rhee and Song Chong ExMin: a routing metric for novel opportunity gain in Delay Tolerant Networks . . . . . . . . . . . . . . . . 184--196 Yangyang Liu and Le Chang and Jianping Pan On the performance and fairness of BitTorrent-like data swarming systems with NAT devices . . . . . . . . . . . . 197--212 Seyedeh Leili Mirtaheri and Mohsen Sharifi An efficient resource discovery framework for pure unstructured peer-to-peer systems . . . . . . . . . . 213--226 Mingwei Xu and Shu Yang and Dan Wang and Jianping Wu Efficient Two Dimensional-IP routing: an incremental deployment design . . . . . 227--243 Giorgos Papastergiou and Ioannis Alexiadis and Scott Burleigh and Vassilis Tsaoussidis Delay Tolerant Payload Conditioning protocol . . . . . . . . . . . . . . . . 244--263
Josselin Vallet and Olivier Brun Online OSPF weights optimization in IP networks . . . . . . . . . . . . . . . . 1--12 W. Ramirez and X. Masip-Bruin and M. Yannuzzi and R. Serral-Gracia and A. Martinez and M. S. Siddiqui A survey and taxonomy of ID/Locator Split Architectures . . . . . . . . . . 13--33 Adele L. Jia and Xiaowei Chen and Xiaowen Chu and Johan A. Pouwelse and Dick H. J. Epema User behaviors in private BitTorrent communities . . . . . . . . . . . . . . 34--45 Tiago Condeixa and Susana Sargento Studying the integration of distributed and dynamic schemes in the mobility management . . . . . . . . . . . . . . . 46--59 Zoltán Faigl and Jani Pellikka and László Bokor and Andrei Gurtov Performance evaluation of current and emerging authentication schemes for future 3GPP network architectures . . . 60--74 Fei Chen and Haitao Li and Jiangchuan Liu Popularity decays in peer-to-peer VoD systems: Impact, model, and design implications . . . . . . . . . . . . . . 75--87 Boris Bellalta and Azadeh Faridi and Jaume Barcelo and Vanesa Daza and Miquel Oliver Performance analysis of a Multiuser Multi-Packet Transmission system for WLANs in non-saturation conditions . . . 88--100 Kaikai Chi and Yi-hua Zhu and Xiaohong Jiang and Xianzhong Tian Practical throughput analysis for two-hop wireless network coding . . . . 101--114 Claudio Testa and Dario Rossi Delay-based congestion control: Flow vs. BitTorrent swarm perspectives . . . . . 115--128 Iván S. Razo-Zapata and Gerardo Castañón and Carlos Mex-Perera Self-healing in transparent optical packet switching mesh networks: a reinforcement learning perspective . . . 129--146 A. Gotta and M. Luglio and C. Roseti A TCP/IP satellite infrastructure for sensing operations in emergency contexts 147--159 Samil Temel and Vehbi Çagri Gungor and Taskin Koçak Routing protocol design guidelines for smart grid environments . . . . . . . . 160--170 Pascal Anelli and Rémi Diana and Emmanuel Lochin FavorQueue: a parameterless active queue management to improve TCP traffic performance . . . . . . . . . . . . . . 171--186 Felipe Mata and Piotr Zuraniewski and Michel Mandjes and Marco Mellia Anomaly detection in diurnal data . . . 187--200 J. Coimbra and G. Schütz and N. Correia Energy efficient routing algorithm for fiber-wireless access networks: a network formation game approach . . . . 201--216 Hao Cui and Xiao Su and Weijia Shang On optimal media/video distribution in closed P2P-based IPTV networks . . . . . 217--232
James P. G. Sterbenz and David Hutchison and Paul Müller and Chip Elliott Special issue on Future Internet Testbeds --- Part I: Guest Editorial . . 1--4 Mark Berman and Jeffrey S. Chase and Lawrence Landweber and Akihiro Nakao and Max Ott and Dipankar Raychaudhuri and Robert Ricci and Ivan Seskar GENI: a federated testbed for innovative network experiments . . . . . . . . . . 5--23 Nicholas Bastin and Andy Bavier and Jessica Blaine and Jim Chen and Narayan Krishnan and Joe Mambretti and Rick McGeer and Rob Ricci and Nicki Watts The InstaGENI initiative: an architecture for distributed systems and advanced programmable networks . . . . . 24--38 Dongkyun Kim and Joobum Kim and Gicheol Wang and Jin-Hyung Park and Seung-Hae Kim K-GENI testbed deployment and federated meta operations experiment over GENI and KREONET . . . . . . . . . . . . . . . . 39--50 Deep Medhi and Byrav Ramamurthy and Caterina Scoglio and Justin P. Rohrer and Egemen K. Çetinkaya and Ramkumar Cherukuri and Xuan Liu and Pragatheeswaran Angu and Andy Bavier and Cort Buffington and James P. G. Sterbenz The GpENI testbed: Network infrastructure, implementation experience, and experimentation . . . . 51--74 Ernst Gunnar Gran and Thomas Dreibholz and Amund Kvalbein $N$ or NetCore --- a multi-homed research testbed . . . . . . . . . . . . 75--87 Amund Kvalbein and Dziugas Baltrunas and Kristian Evensen and Jie Xiang and Ahmed Elmokashfi and Simone Ferlin-Oliveira The Nornet Edge platform for mobile broadband measurements . . . . . . . . . 88--101 Dennis Schwerdel and Bernd Reuther and Thomas Zinner and Paul Müller and Phouc Tran-Gia Future Internet research and experimentation: the G-Lab approach . . 102--117 Joe Mambretti and Jim Chen and Fei Yeh Creating environments for innovation: Designing and implementing advanced experimental network research testbeds based on the Global Lambda Integrated Facility and the StarLight Exchange . . 118--131 M. Suñé and L. Bergesio and H. Woesner and T. Rothe and A. Köpsel and D. Colle and B. Puype and D. Simeonidou and R. Nejabati and M. Channegowda and M. Kind and T. Dietz and A. Autenrieth and V. Kotronis and E. Salvadori and S. Salsano and M. Körner and S. Sharma Design and implementation of the OFELIA FP7 facility: the European OpenFlow testbed . . . . . . . . . . . . . . . . 132--150 Masayoshi Kobayashi and Srini Seetharaman and Guru Parulkar and Guido Appenzeller and Joseph Little and Johan van Reijendam and Paul Weissmann and Nick McKeown Maturing of OpenFlow and Software-defined Networking through deployments . . . . . . . . . . . . . . 151--175 M. Campanella and F. Farina The FEDERICA infrastructure and experience . . . . . . . . . . . . . . . 176--183 Jordi Jofre and Celia Velayos and Giada Landi and Michal Giertych and Alastair C. Hume and Gareth Francis and Albert Vico Oton Federation of the BonFIRE multi-cloud infrastructure with networking facilities . . . . . . . . . . . . . . . 184--196 Bartosz Belter and Juan Rodriguez Martinez and José Ignacio Aznar and Jordi Ferrer Riera and Luis M. Contreras and Monika Antoniak-Lewandowska and Matteo Biancani and Jens Buysse and Chris Develder and Yuri Demchenko and Pasquale Donadio and Dimitra Simeonidou and Reza Nejabati and Shuping Peng and Lukasz Drzewiecki and Eduard Escalona and Joan Antoni Garcia Espin and Steluta Gheorghiu and Mattijs Ghijsen and Jakub Gutkowski and Giada Landi and others The GEYSERS optical testbed: a platform for the integration, validation and demonstration of cloud-based infrastructure services . . . . . . . . 197--216 Luis Sanchez and Luis Muñoz and Jose Antonio Galache and Pablo Sotres and Juan R. Santana and Veronica Gutierrez and Rajiv Ramdhany and Alex Gluhak and Srdjan Krco and Evangelos Theodoridis and Dennis Pfisterer SmartSantander: IoT experimentation over a smart city testbed . . . . . . . . . . 217--238
Xianfu Meng and Changyuan Zhang An ant colony model based replica consistency maintenance strategy in unstructured P2P networks . . . . . . . 1--11 Yoh-han Lee and Daeyoung Kim Slow hopping based cooperative sensing MAC protocol for cognitive radio networks . . . . . . . . . . . . . . . . 12--28 Ahmed Amokrane and Rami Langar and Raouf Boutaba and Guy Pujolle Energy efficient management framework for multihop TDMA-based wireless networks . . . . . . . . . . . . . . . . 29--42 Mete Yilmaz and Nirwan Ansari Achieving destination differentiation in ingress aggregated fairness for resilient packet rings by weighted destination based fair dropping . . . . 43--54 Carlos Guimarães and Daniel Corujo and Antonio de la Oliva and Yoshihiro Ohba and Rui L. Aguiar Multicast group membership management in media independent handover services . . 55--68 Ilhem Fajjari and Nadjib Aitsaadi and Michal Pióro and Guy Pujolle A new virtual network static embedding strategy within the Cloud's private backbone network . . . . . . . . . . . . 69--88 P. J. Piñero and J. A. Cortés and J. Malgosa and F. J. Cañete and P. Manzanares and L. Díez Analysis and improvement of multicast communications in HomePlug AV-based in-home networks . . . . . . . . . . . . 89--100 Behnam Dezfouli and Marjan Radi and Shukor Abd Razak and Kamin Whitehouse and Kamalrulnizam Abu Bakar and Tan Hwee-Pink Improving broadcast reliability for neighbor discovery, link estimation and collection tree construction in wireless sensor networks . . . . . . . . . . . . 101--121 K. Giotis and C. Argyropoulos and G. Androulidakis and D. Kalogeras and V. Maglaris Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments . . . . . . . . . . . . . . 122--136 Hao Di and Vishal Anand and Hongfang Yu and Lemin Li and Gang Sun and Dan Liao Design of reliable virtual infrastructure with resource sharing . . 137--151 Andrea Bianco and Davide Cuda and Jorge M. Finochietto Multi-MetaRing fairness control in a WDM folded-bus architecture . . . . . . . . 152--161 Saman Hameed Amin and H. S. Al-Raweshidy and Rafed Sabbar Abbas Smart data packet ad hoc routing protocol . . . . . . . . . . . . . . . . 162--181 Jie Tian and Guiling Wang and Tan Yan and Wensheng Zhang Detect smart intruders in sensor networks by creating network dynamics 182--196 Enrico Gregori and Alessandro Improta and Luciano Lenzini and Lorenzo Rossi and Luca Sani Improving the reliability of inter-AS economic inferences through a hygiene phase on BGP data . . . . . . . . . . . 197--207 Chien-Fu Cheng and Ting-Ying Wu and Hsien-Chun Liao A density-barrier construction algorithm with minimum total movement in mobile WSNs . . . . . . . . . . . . . . . . . . 208--220 Dominic Meier and Yvonne Anne Pignolet and Stefan Schmid and Roger Wattenhofer On the Windfall and price of friendship: Inoculation strategies on social networks . . . . . . . . . . . . . . . . 221--236
James P. G. Sterbenz and David Hutchison and Paul Müller and Chip Elliott Special issue on Future Internet Testbeds --- Part II: Guest Editorial 1--4 Ali Sydney and David S. Ochs and Caterina Scoglio and Don Gruenbacher and Ruth Miller Using GENI for experimental evaluation of Software Defined Networking in smart grids . . . . . . . . . . . . . . . . . 5--16 James Griffioen and Zongming Fei and Hussamuddin Nasir and Xiongqi Wu and Jeremy Reed and Charles Carpenter Measuring experiments in GENI . . . . . 17--32 Yoshihiro Nozaki and Parth Bakshi and Hasan Tuncer and Nirmala Shenoy Evaluation of tiered routing protocol in floating cloud tiered Internet architecture . . . . . . . . . . . . . . 33--47 Stratos Keranidis and Dimitris Giatsios and Thanasis Korakis and Iordanis Koutsopoulos and Leandros Tassiulas and Thierry Rakotoarivelo and Max Ott and Thierry Parmentelat Experimentation on end-to-end performance aware algorithms in the federated environment of the heterogeneous PlanetLab and NITOS testbeds . . . . . . . . . . . . . . . . 48--67 Olivier Mehani and Guillaume Jourjon and Thierry Rakotoarivelo and Max Ott An instrumentation framework for the critical task of measurement collection in the future Internet . . . . . . . . . 68--83 Milorad Tosic and Ivan Seskar Resource specification and intelligent user interaction for federated testbeds using Semantic Web technologies . . . . 84--100 Jon Matias and Alaitz Mendiola and Nerea Toledo and Borja Tornero and Eduardo Jacob The EHU--OEF: an OpenFlow-based Layer-2 experimental facility . . . . . . . . . 101--127 Shingo Ata and Dijiang Huang and Xuan Liu and Akira Wada and Tianyi Xing and Parikshit Juluri and Chun-Jen Chung and Yasuhiro Sato and Deep Medhi SeRViTR: a framework, implementation, and a testbed for a trustworthy future Internet . . . . . . . . . . . . . . . . 128--146 M. Yannuzzi and M. S. Siddiqui and A. Sällström and B. Pickering and R. Serral-Graci\`a and A. Martínez and W. Chen and S. Taylor and F. Benbadis and J. Leguay and E. Borrelli and I. Ormaetxea and K. Campowsky and G. Giammatteo and G. Aristomenopoulos and S. Papavassiliou and T. Kuczynski and S. Zielinski and J. M. Seigneur and C. Ballester Lafuente and J. Johansson and X. Masip-Bruin and M. Caria and J. R. Ribeiro Junior and E. Salageanu and J. Latanicki TEFIS: a single access point for conducting multifaceted experiments on heterogeneous test facilities . . . . . 147--172 Thierry Rakotoarivelo and Guillaume Jourjon and Max Ott Designing and orchestrating reproducible experiments on federated networking testbeds . . . . . . . . . . . . . . . . 173--187 Sang Woo Han and Namgon Kim and JongWon Kim An experimental service composition tool for media-centric networked applications 188--204 Jordan Augé and Thierry Parmentelat and Nicolas Turro and Sandrine Avakian and Lo\"\ic Baron and Mohamed Amine Larabi and Mohammed Yasin Rahman and Timur Friedman and Serge Fdida Tools to foster a global federation of testbeds . . . . . . . . . . . . . . . . 205--220 Igor M. Moraes and Diogo M. F. Mattos and Lyno Henrique G. Ferraz and Miguel Elias M. Campista and Marcelo G. Rubinstein and Luís Henrique M. K. Costa and Marcelo D. de Amorim and Pedro B. Velloso and Otto Carlos M. B. Duarte and Guy Pujolle FITS: a flexible virtual network testbed architecture . . . . . . . . . . . . . . 221--237 Young-Hwan Kim and Alina Quereilhac and Mohamed Amine Larabi and Julien Tribino and Thierry Parmentelat and Thierry Turletti and Walid Dabbous Enabling iterative development and reproducible evaluation of network protocols . . . . . . . . . . . . . . . 238--250 Zbigniew Duli\'nski and Kamil Palkowski and Piotr Cholda A university testbed for large-scale interconnection experiments on distributed applications . . . . . . . . 251--264
Ming Li and Andrey Lukyanenko and Sasu Tarkoma and Yong Cui and Antti Ylä-Jääski Tolerating path heterogeneity in multipath TCP with bounded receive buffers . . . . . . . . . . . . . . . . 1--14 Xin Cong and Kai Shuang and Sen Su and FangChun Yang and LingLing Zi LBAS: an effective pricing mechanism towards video migration in cloud-assisted VoD system . . . . . . . 15--25 Giovanni Di Stasi and Jonas Karlsson and Stefano Avallone and Roberto Canonico and Andreas Kassler and Anna Brunstrom Combining multi-path forwarding and packet aggregation for improved network performance in wireless mesh networks 26--37 Sun-Hyun Kim and Yeonsik Jeong and Seung-Jae Han Use of contact duration for message forwarding in intermittently connected mobile networks . . . . . . . . . . . . 38--54 Oscar Mauricio Caicedo Rendon and Carlos Raniery Paula dos Santos and Arthur Selle Jacobs and Lisandro Zambenedetti Granville Monitoring Virtual Nodes using mashups 55--70 Rodrigo S. Couto and Miguel Elias M. Campista and Luís Henrique M. K. Costa Network resource control for Xen-based virtualized software routers . . . . . . 71--88 S. A. Abid and Mazliza Othman and Nadir Shah $3$D P2P overlay over MANETs . . . . . . 89--111 Daeho Kang and Sangkyu Park and Changhee Joo and Saewoong Bahk Address-free contention in wireless access networks with common control channel for throughput improvement . . . 112--124 Angelo Coiro and Luca Chiaraviglio and Antonio Cianfrani and Marco Listanti and Marco Polverini Reducing power consumption in backbone IP networks through table lookup bypass 125--142 Cristian González García and B. Cristina Pelayo G-Bustelo and Jordán Pascual Espada and Guillermo Cueva-Fernandez Midgar: Generation of heterogeneous objects interconnecting applications. A Domain Specific Language proposal for Internet of Things scenarios . . . . . . 143--158 Jasone Astorga and Eduardo Jacob and Nerea Toledo and Juanjo Unzilla Enhancing secure access to sensor data with user privacy support . . . . . . . 159--179 C. K. Tan and T. C. Chuah and S. W. Tan Subcarrier and power allocation for OFDMA-based multicast cellular networks using a coalitional game . . . . . . . . 180--194 Masud Moshtaghi and Christopher Leckie and Shanika Karunasekera and Sutharshan Rajasegarar An adaptive elliptical anomaly detection model for wireless sensor networks . . . 195--207 Christoph Neumann and Olivier Heen and Stéphane Onno DNStamp: Short-lived trusted timestamping . . . . . . . . . . . . . . 208--224 Maram Bani Younes and Azzedine Boukerche and Graciela Rom'an-Alonso An intelligent path recommendation protocol (ICOD) for VANETs . . . . . . . 225--242 Abdulhalim Dandoush and Sara Alouf and Philippe Nain Lifetime and availability of data stored on a P2P system: Evaluation of redundancy and recovery schemes . . . . 243--260 Yufei Wang and Rong Zheng and Qixin Wang Self-tuned distributed monitoring of multi-channel wireless networks using Gibbs sampler . . . . . . . . . . . . . 261--272 Yosra Ben Saied and Alexis Olivereau and Djamal Zeghlache and Maryline Laurent Lightweight collaborative key establishment scheme for the Internet of Things . . . . . . . . . . . . . . . . . 273--295 Sahar Hoteit and Stefano Secci and Stanislav Sobolevsky and Carlo Ratti and Guy Pujolle Estimating human trajectories and hotspots through mobile phone data . . . 296--307 Min Wang and Junfeng Wang and Sunyoung Han Adaptive congestion control framework and a simple implementation on high bandwidth-delay product networks . . . . 308--321 Rachid Guerraoui and Kévin Huguenin and Anne-Marie Kermarrec and Maxime Monod and Swagatika Prusty and Aline Roumy Tracking freeriders in gossip-based content dissemination systems . . . . . 322--338 Hui-Tang Lin and Chia-Lin Lai and Chin-Lien Liu Design and analysis of a frame-oriented dynamic bandwidth allocation scheme for triple-play services over EPONs . . . . 339--352 S. Gitzenis and G. S. Paschos and L. Tassiulas Enhancing wireless networks with caching: Asymptotic laws, sustainability & trade-offs . . . . . . . . . . . . . . 353--368 Yongquan Fu and Yijie Wang and Wei Peng CommonFinder: a decentralized and privacy-preserving common-friend measurement method for the distributed online social networks . . . . . . . . . 369--389
Melike Yigit and Ozlem Durmaz Incel and Vehbi Cagri Gungor On the interdependency between multi-channel scheduling and tree-based routing for WSNs in smart grid environments . . . . . . . . . . . . . . 1--20 Bruno Sousa and Kostas Pentikousis and Marilia Curado MeTHODICAL: Towards the next generation of multihomed applications . . . . . . . 21--40 Keontaek Lee and Hak-Jin Kim and Sunju Park and Seungjae Han Satisfying the target network lifetime in wireless sensor networks . . . . . . 41--55 Isaí Michel Lombera and Louise E. Moser and P. Michael Melliar-Smith and Yung-Ting Chuang Peer-to-peer publication, search and retrieval using the Android mobile platform . . . . . . . . . . . . . . . . 56--72 Bing-Hong Liu and Jyun-Yu Jhang Efficient distributed data scheduling algorithm for data aggregation in wireless sensor networks . . . . . . . . 73--83 Sihyung Lee and Kyriaki Levanti and Hyong S. Kim Network monitoring: Present and future 84--98 Issa Khalil and Abdallah Khreishah and Muhammad Azeem Consolidated Identity Management System for secure mobile cloud computing . . . 99--110 Raffaele Bolla and Roberto Bruschi and Paolo Lago Energy adaptation in multi-core software routers . . . . . . . . . . . . . . . . 111--128 Farshad Shams and Giacomo Bacci and Marco Luise A survey on resource allocation techniques in OFDM(A) networks . . . . . 129--150 Edoardo Bonetto and Alessandro Finamore and Marco Mellia and Riccardo Fiandra Energy efficiency in access and aggregation networks: From current traffic to potential savings . . . . . . 151--166 Trong-Viet Ho and Yves Deville and Olivier Bonaventure Multi-objective traffic engineering for data center networks . . . . . . . . . . 167--182 Soumyadev Maity and R. C. Hansdah Self-organized public key management in MANETs with enhanced security and without certificate-chains . . . . . . . 183--211 Nicaise Choungmo Fofack and Philippe Nain and Giovanni Neglia and Don Towsley Performance evaluation of hierarchical TTL-based cache networks . . . . . . . . 212--231 Caroline Battaglia and Véronique Bruy\`ere and Olivier Gauwin and Cristel Pelsser and Bruno Quoitin Reasoning on BGP routing filters using tree automata . . . . . . . . . . . . . 232--254 Y. Gong and D. Rossi and C. Testa and S. Valenti and M. D. Täht Fighting the bufferbloat: On the coexistence of AQM and low priority congestion control . . . . . . . . . . . 255--267
John Silvester and Parviz Kermani Professor Leonard Kleinrock --- Tribute Volume . . . . . . . . . . . . . . . . . 1--3 Parviz Kermani and Leonard Kleinrock Reprint of ``Virtual cut-through: a new computer communication switching technique'' . . . . . . . . . . . . . . 4--17 Luigi Fratta and Mario Gerla and Leonard Kleinrock Flow Deviation: 40 years of incremental flows for packets, waves, cars and tunnels . . . . . . . . . . . . . . . . 18--31 G. Tychogiorgos and K. K. Leung Optimization-based resource allocation in communication networks . . . . . . . 32--45 Yechiam Yemini A balance of power principle for decentralized resource sharing . . . . . 46--51 Y. Afek and A. Bremler-Barr and L. Schiff Recursive design of hardware priority queues . . . . . . . . . . . . . . . . . 52--67 Udi Ben-Porat and Anat Bremler-Barr and Hanoch Levy Computer and network performance: Graduating from the ``Age of Innocence'' 68--81 Marco Ajmone Marsan and Michela Meo Queueing systems to study the energy consumption of a campus WLAN . . . . . . 82--93 Aaron Yi Ding and Jon Crowcroft and Sasu Tarkoma and Hannu Flinck Software defined networking for security enhancement in wireless mobile networks 94--101 Hideaki Takagi From computer science to service science: Queues with human customers and servers . . . . . . . . . . . . . . . . 102--111 Jim Kurose Information-centric networking: the evolution from circuits to packets to content . . . . . . . . . . . . . . . . 112--120
Paolo Ferrari and Emiliano Sisinni and Alessandra Flammini and Alessandro Depari Adding accurate timestamping capability to wireless networks for smart grids . . 1--13 Ali Hammad and Reza Nejabati and Dimitra Simeonidou Novel methods for virtual network composition . . . . . . . . . . . . . . 14--25 Cristina Romero-Tris and Jordi Castell\`a-Roca and Alexandre Viejo Distributed system for private Web search with untrusted partners . . . . . 26--42 Alexandre Mouradian and Isabelle Augé-Blum and Fabrice Valois RTXP: a localized real-time MAC-routing protocol for wireless sensor networks 43--59 H. Ahmadi and Y. H. Chew and N. Reyhani and C. C. Chai and L. A. DaSilva Learning solutions for auction-based dynamic spectrum access in multicarrier systems . . . . . . . . . . . . . . . . 60--73 Murat Kuzlu and Manisa Pipattanasomporn and Saifur Rahman Communication network requirements for major smart grid applications in HAN, NAN and WAN . . . . . . . . . . . . . . 74--88 Biplob R. Ray and Jemal Abawajy and Morshed Chowdhury Scalable RFID security framework and protocol supporting Internet of Things 89--103 Tifenn Rault and Abdelmadjid Bouabdallah and Yacine Challal Energy efficiency in wireless sensor networks: a top-down survey . . . . . . 104--122 Wei-Cheng Chu and Kuo-Feng Ssu Sink discovery in location-free and mobile-sink wireless sensor networks . . 123--140 Shihong Zou and Xitao Wen and Kai Chen and Shan Huang and Yan Chen and Yongqiang Liu and Yong Xia and Chengchen Hu VirtualKnotter: Online virtual machine shuffling for congestion resolving in virtualized datacenter . . . . . . . . . 141--153 Lien-Wu Chen and Yu-Chee Tseng and Kun-Ze Syue Surveillance on-the-road: Vehicular tracking and reporting by V2V communications . . . . . . . . . . . . . 154--163 I-Hsien Liu and Chuan-Gang Liu and Chien-Tung Lu and Yi-Tsen Kuo and Jung-Shian Li A multi-hop resource scheduling algorithm for IEEE 802.16j relay networks . . . . . . . . . . . . . . . . 164--179 David Rebollo-Monedero and Javier Parra-Arnau and Jordi Forné and Claudia Diaz Optimizing the design parameters of threshold pool mixes for anonymity and delay . . . . . . . . . . . . . . . . . 180--200 Iordanis Koutsopoulos and Leandros Tassiulas and Lazaros Gkatzikis Client-server games and their equilibria in peer-to-peer networks . . . . . . . . 201--218 L. Rajya Lakshmi Handover rate based dynamic guard bandwidth allocation method for call admission control in IEEE 802.16j Mobile Multihop Relay networks . . . . . . . . 219--234 Glenn Benson and Shiu-Kai Chin and Sean Croston and Karthick Jayaraman and Susan Older Banking on interoperability: Secure, interoperable credential management . . 235--251 R. de O. Schmidt and R. Sadre and A. Sperotto and H. van den Berg and A. Pras A hybrid procedure for efficient link dimensioning . . . . . . . . . . . . . . 252--269
Raouf Boutaba and Noura Limam and Stefano Secci and Tarik Taleb Cloud networking and communications . . 1--4 Abu (Sayeem) Reaz and Vishwanath Ramamurthi and Massimo Tornatore and Biswanath Mukherjee Cloud-Integrated WOBAN: an offloading-enabled architecture for service-oriented access networks . . . . 5--19 Jaehyun Hwang and Joon Yoo and Nakjung Choi Deadline and Incast Aware TCP for cloud data center networks . . . . . . . . . . 20--34 Ahmed Amamou and Kamel Haddadou and Guy Pujolle A TRILL-based multi-tenant data center network . . . . . . . . . . . . . . . . 35--53 Juliano Araujo Wickboldt and Rafael Pereira Esteves and Márcio Barbosa de Carvalho and Lisandro Zambenedetti Granville Resource management in IaaS cloud platforms made flexible through programmability . . . . . . . . . . . . 54--70 Wenda Ni and Changcheng Huang and Jing Wu Provisioning high-availability datacenter networks for full bandwidth communication . . . . . . . . . . . . . 71--94 Zehua Guo and Mu Su and Yang Xu and Zhemin Duan and Luo Wang and Shufeng Hui and H. Jonathan Chao Improving the performance of load balancing in software-defined networks through load variance-based synchronization . . . . . . . . . . . . 95--109 Prasad Calyam and Sudharsan Rajagopalan and Sripriya Seetharam and Arunprasath Selvadhurai and Khaled Salah and Rajiv Ramnath VDC-Analyst: Design and verification of virtual desktop cloud resource allocations . . . . . . . . . . . . . . 110--122 Yiwen Wang and Sen Su and Alex X. Liu and Zhongbao Zhang Multiple bulk data transfers scheduling among datacenters . . . . . . . . . . . 123--137 Simon S. Woo and Jelena Mirkovic Optimal application allocation on multiple public clouds . . . . . . . . . 138--148 Pedro Casas and Raimund Schatz Quality of Experience in Cloud services: Survey and measurements . . . . . . . . 149--165 Subharthi Paul and Raj Jain and Mohammed Samaka and Jianli Pan Application delivery in multi-cloud environments using software defined networking . . . . . . . . . . . . . . . 166--186 Rudolf Strijkers and Marc X. Makkes and Cees de Laat and Robert Meijer Internet factories: Creating application-specific networks on-demand 187--198 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Xin Jin and Yu-Kwong Kwok Network aware peer-to-peer media streaming: Capacity or proximity? . . . 1--18 Tomaz Buh and Roman Trobec and Andrej Ciglic Adaptive network-traffic balancing on multi-core software networking devices 19--34 Jan Dvorák and Jirí Novák and Petr Kocourek Energy efficient network protocol architecture for narrowband power line communication networks . . . . . . . . . 35--50 Wojciech Bober and Chris J. Bleakley BailighPulse: a low duty cycle data gathering protocol for mostly-off Wireless Sensor Networks . . . . . . . . 51--65 Soohong Park and Jaehoon (Paul) Jeong and Choong Seon Hong QoS-guaranteed Mobile IPTV service in heterogeneous access networks . . . . . 66--81 Nadia Battat and Hamida Seba and Hamamache Kheddouci Monitoring in mobile ad hoc networks: a survey . . . . . . . . . . . . . . . . . 82--100 S. Traverso and C. Kiraly and E. Leonardi and M. Mellia A performance comparison of hose rate controller approaches for P2P-TV applications . . . . . . . . . . . . . . 101--120 Zhongjin Liu and Yong Li and Bo Cui and Li Su and Depeng Jin and Lieguang Zeng GrainFlow: Enable testing for future Internet architectures by per-bit customization . . . . . . . . . . . . . 121--132 Ji-Su Kim and Jae-Hyun Kim and Sunghyun Cho Enhanced handoff scheme based on efficient uplink quality estimation in LTE-Advanced system . . . . . . . . . . 133--146 Hui Wang and George N. Rouskas Hierarchical traffic grooming: a tutorial . . . . . . . . . . . . . . . . 147--156 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Yuan Yang and Mingwei Xu and Qi Li Towards fast rerouting-based energy efficient routing . . . . . . . . . . . 1--15 Gaofeng Wu and Gurusamy Mohan Power-efficient integrated routing of sublambda connection requests with traffic splitting in IP over WDM networks . . . . . . . . . . . . . . . . 16--29 Atef Abdelkefi and Yuming Jiang and Bjarne Emil Helvik and Gergely Biczók and Alexandru Calu Assessing the service quality of an Internet path through end-to-end measurement . . . . . . . . . . . . . . 30--44 Liang Liang and Yu Ge and Gang Feng and Wei Ni and Aung Aung Phyo Wai A low overhead tree-based energy-efficient routing scheme for multi-hop wireless body area networks 45--58 Argyrios G. Tasiopoulos and Christos Tsiaras and Stavros Toumpis Optimal and achievable cost/delay tradeoffs in delay-tolerant networks . . 59--74 Bernardetta Addis and Danilo Ardagna and Antonio Capone and Giuliana Carello Energy-aware joint management of networks and Cloud infrastructures . . . 75--95 Wei-Cheng Chu and Kuo-Feng Ssu Location-free boundary detection in mobile wireless sensor networks with a distributed approach . . . . . . . . . . 96--112 Constantinos Marios Angelopoulos and Sotiris Nikoletseas and Theofanis P. Raptis Wireless energy transfer in sensor networks with adaptive, limited knowledge protocols . . . . . . . . . . 113--141 Taeseop Lee and Sangkyu Park and Hyung-Sin Kim and Saewoong Bahk Sounding resource management for QoS support in massive MIMO systems . . . . 142--153 Chunxi Li and Changjia Chen and Yong Liu and Baoxian Zhang Threshold bipolar scheduling for P2P live streaming . . . . . . . . . . . . . 154--169 Esmat Mirzamany and Aboubaker Lasebae and Orhan Gemikonakli An efficient traffic engineering based on multi-topology routing for future Internet . . . . . . . . . . . . . . . . 170--178 Celimuge Wu and Yusheng Ji and Juan Xu and Satoshi Ohzahata and Toshihiko Kato Coded packets over lossy links: a redundancy-based mechanism for reliable and fast data collection in sensor networks . . . . . . . . . . . . . . . . 179--191 Kyeong Soo Kim The effect of ISP traffic shaping on user-perceived performance in broadband shared access networks . . . . . . . . . 192--209 Peter Terlecky and Brian Phelan and Amotz Bar-Noy and Theodore Brown and Dror Rawitz Should I stay or should I go? Maximizing lifetime with relays . . . . . . . . . . 210--224 Quang Duy La and Yong Huat Chew and Boon-Hee Soong Oligopolistic spectrum allocation game via market competition under spectrum broker . . . . . . . . . . . . . . . . . 225--239 Mario Montagud and Fernando Boronat and Hans Stokking and Pablo Cesar Design, development and assessment of control schemes for IDMS in a standardized RTCP-based solution . . . . 240--259 Sharon Goldberg and Michael Schapira and Pete Hummon and Jennifer Rexford How secure are secure interdomain routing protocols? . . . . . . . . . . . 260--287 Hyung-Sin Kim and Jae-Seok Bang and Yong-Hwan Lee Distributed network configuration in large-scale low power wireless networks 288--301 Rafael A. Rodríguez-Gómez and Gabriel Maciá-Fernández and Pedro García-Teodoro and Moritz Steiner and Davide Balzarotti Resource monitoring for the detection of parasite P2P botnets . . . . . . . . . . 302--311 Melike Yigit and V. Cagri Gungor and Selcuk Baktir Cloud computing for Smart Grid applications . . . . . . . . . . . . . . 312--329 Pantelis A. Frangoudis and George C. Polyzos On the performance of secure user-centric VoIP communication . . . . 330--344 Sérgio Figueiredo and Carlos Guimarães and Daniel Corujo and Rui L. Aguiar MI3M: a framework for media independent multicast mobility management . . . . . 345--365 Melike Yigit and V. Cagri Gungor and Gurkan Tuna and Maria Rangoussi and Etimad Fadel Power line communication technologies for smart grid applications: a review of advances and challenges . . . . . . . . 366--383 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Ian F. Akyildiz and Ahyoung Lee and Pu Wang and Min Luo and Wu Chou A roadmap for traffic engineering in SDN--OpenFlow networks . . . . . . . . . 1--30 Moad Y. Mowafi and Fahed H. Awad and Walid A. Aljoby A novel approach for extracting spatial correlation of visual information in heterogeneous wireless multimedia sensor networks . . . . . . . . . . . . . . . . 31--47 Abhijit Bhattacharya and Anurag Kumar A shortest path tree based algorithm for relay placement in a wireless sensor network and its performance analysis . . 48--62 Wenjing Wang and Mainak Chatterjee and Kevin Kwiat and Qing Li A game theoretic approach to detect and co-exist with malicious nodes in wireless networks . . . . . . . . . . . 63--83 Tiago Condeixa and Susana Sargento Context-aware adaptive IP mobility anchoring . . . . . . . . . . . . . . . 84--99 P. Muñoz and D. Laselva and R. Barco and P. Mogensen Dynamic traffic steering based on fuzzy Q-Learning approach in a multi-RAT multi-layer wireless network . . . . . . 100--116 Alia Asheralieva and Kaushik Mahata Joint power and bandwidth allocation in IEEE802.22 based cognitive LTE network 117--129 Honggang Zhang and Benyuan Liu and Bin Nie and Zhiyong Xu and Xiayin Weng and Chao Yu Leveraging online social friendship to improve data swarming performance . . . 130--143 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Marica Amadeo and Claudia Campolo and Antonella Molinaro and Giuseppe Ruggeri Content-centric wireless networking: a survey . . . . . . . . . . . . . . . . . 1--13 Ankunda R. Kiremire and Matthias R. Brust and Vir V. Phoha Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemes . . . . . 14--32 Dong Geun Jeong and Jeong Ae Han and Wha Sook Jeon Hop capacity balancing in OFDMA relay networks . . . . . . . . . . . . . . . . 33--44 Bo Zhang and Zhenhua Huang and Yang Xiang A novel multiple-level trust management framework for wireless sensor networks 45--61 Xin Kang and Yongdong Wu A trust-based pollution attack prevention scheme in peer-to-peer streaming networks . . . . . . . . . . . 62--73 Manar Jammal and Taranpreet Singh and Abdallah Shami and Rasool Asal and Yiming Li Software defined networking: State of the art and research challenges . . . . 74--98 Michele Savi and Harald Òverby and Norvald Stol and Carla Raffaelli Cost evolution model to design optical switching fabrics with wavelength converters . . . . . . . . . . . . . . . 99--112 Tien-Thinh Nguyen and Christian Bonnet Considerations of IP multicast for load balancing in Proxy Mobile IPv6 networks 113--126
Xiaopei Lu and Dezun Dong and Xiangke Liao and Shanshan Li and Xiaodong Liu PathZip: a lightweight scheme for tracing packet path in wireless sensor networks . . . . . . . . . . . . . . . . 1--14 Sungwook Kim Learning based bandwidth management algorithms by using bargaining and fictitious play approaches . . . . . . . 15--21 Giovanni Stea and Antonio Virdis A comprehensive simulation analysis of LTE Discontinuous Reception (DRX) . . . 22--40 Ding Wang and Ping Wang On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions . . . . . . . . . . . . . . . 41--57 Chen-Khong Tham and Tie Luo Fairness and social welfare in service allocation schemes for participatory sensing . . . . . . . . . . . . . . . . 58--71 Sunggeun Jin and Daji Qiao Numerical analysis of the power saving with a bursty traffic model in LTE-Advanced networks . . . . . . . . . 72--83 Dinil Mon Divakaran and Mohan Gurusamy and Mathumitha Sellamuthu Bandwidth allocation with differential pricing for flexible demands in data center networks . . . . . . . . . . . . 84--97 Giuseppe Colistra and Virginia Pilloni and Luigi Atzori The problem of task allocation in the Internet of Things and the consensus-based approach . . . . . . . . 98--111 Yaodong Zhang and Yue Wang and Dan Pei and Jian Yuan Multi-AS cooperative incoming traffic engineering in a transit-edge separate Internet . . . . . . . . . . . . . . . . 112--127 Furqan Hameed Khan and Young-June Choi Distributed games for coordinated coalition formation in femtocell networks . . . . . . . . . . . . . . . . 128--141 Meng-Shiuan Pan and Ping-Lin Liu and Yen-Pei Lin Event data collection in ZigBee tree-based wireless sensor networks . . 142--153 Salvatore Cavalieri and Ferdinando Chiacchio Limiting the loss of information in KNXnet/IP on congestion conditions . . . 154--172 Abderrahmane Baadache and Ali Belmehdi Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks . . . 173--184 Li Xu and Yuan He and Xiaofeng Chen and Xinyi Huang Ticket-based handoff authentication for wireless mesh networks . . . . . . . . . 185--194 Tong Liu and Yanmin Zhu Social welfare maximization in participatory smartphone sensing . . . . 195--209 Tiphaine Phe-Neau and Marcelo Dias de Amorim and Vania Conan Uncovering vicinity properties in disruption-tolerant networks . . . . . . 210--223 A. K. Marnerides and A. Schaeffer-Filho and A. Mauthe Traffic anomaly diagnosis in Internet backbone networks: a survey . . . . . . 224--243 Chunqi Tian and Baijian Yang and Jidong Zhong and Xiaojian Liu Trust-based incentive mechanism to motivate cooperation in hybrid P2P networks . . . . . . . . . . . . . . . . 244--255 Rosario G. Garroppo and Gianfranco Nencioni and Luca Tavanti and Bernard Gendron The greening potential of content delivery in residential community networks . . . . . . . . . . . . . . . . 256--267 Yi-Huai Hsu and Kuochen Wang and Yu-Chee Tseng Efficient cooperative access class barring with load balancing and traffic adaptive radio resource management for M2M communications over LTE-A . . . . . 268--281 A. Coluccia and F. Ricciato and P. Romirer-Maierhofer Robust estimation of mean failure probability in access networks . . . . . 282--301 Youngsoo Lee and Chong-Ho Choi Transmission Order Deducing MAC (TOD-MAC) protocol for CSMA/CA wireless networks . . . . . . . . . . . . . . . . 302--318 Min-Hong Han and Byung-Gook Kim and Jang-Won Lee Opportunistic resource scheduling for D2D communication in OFDMA networks . . 319--334 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Greg Kuperman and Eytan Modiano and Aradhana Narula-Tam Network protection with multiple availability guarantees . . . . . . . . 1--12 Jianming Lv and Tieying Zhang and Zhenhua Li and Xueqi Cheng PACOM: Parasitic anonymous communication in the BitTorrent network . . . . . . . 13--33 Lei Shi and Jianghong Han and Dong Han and Xu Ding and Zhenchun Wei The dynamic routing algorithm for renewable wireless sensor networks with wireless power transfer . . . . . . . . 34--52 Dongni Ren and Wang Kit Wong and S.-H. Gary Chan Overlay live video streaming with heterogeneous bitrate requirements . . . 53--63 Alaa Awad and Amr Mohamed and Amr A. El-Sherif and Omar A. Nasr Interference-aware energy-efficient cross-layer design for healthcare monitoring applications . . . . . . . . 64--77 Ayaz Ahmad and Naveed Ul Hassan and Nadir Shah Robust channel quality indicator reporting for multi-carrier and multi-user systems . . . . . . . . . . . 78--88 Junaid Ansari and Elena Meshkova and Wasif Masood and Arham Muslim and Janne Riihijärvi and Petri Mähönen CONFab: Ontology and component based optimization of WSN protocol stacks with deployment feedback . . . . . . . . . . 89--108 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Yulei Wu and Fei Hu and Xinheng Wang Special issue on mobile computing for content/service-oriented networking architecture . . . . . . . . . . . . . . 1--3 Ricardo Matos and Carlos Marques and Susana Sargento Context-aware control of user-centric virtual networks: Centralized vs distributed approaches . . . . . . . . . 4--21 Chathura M. Sarathchandra Magurawalage and Kun Yang and Liang Hu and Jianming Zhang Energy-efficient and network-aware offloading algorithm for mobile cloud computing . . . . . . . . . . . . . . . 22--33 Péter Vingelmann and Janus Heide and Morten Videbæk Pedersen and Qi Zhang and Frank H. P. Fitzek All-to-all data dissemination with network coding in dynamic MANETs . . . . 34--47 Gaocai Wang and Ying Peng and Peng Feng and Nao Wang An energy consumption minimization routing scheme based on rate adaptation with QoS guarantee for the mobile environment . . . . . . . . . . . . . . 48--57 Mianxiong Dong and Kaoru Ota and Laurence T. Yang and Shan Chang and Hongzi Zhu and Zhenyu Zhou Mobile agent-based energy-aware and user-centric data collection in wireless sensor networks . . . . . . . . . . . . 58--70 Guiyi Wei and Yang Xiang and Min Ji and Ping Zhu An analytical model for optimal spectrum leasing under constraints of quality of service in CRNs . . . . . . . . . . . . 71--80 Quan Liu and Hongwei Niu and Wenjun Xu and Duzhong Zhang A service-oriented spectrum allocation algorithm using enhanced PSO for cognitive wireless networks . . . . . . 81--91 Mian Ahmad Jan and Priyadarsi Nanda and Xiangjian He and Ren Ping Liu PASCCC: Priority-based application-specific congestion control clustering protocol . . . . . . . . . . 92--102 Sancheng Peng and Min Wu and Guojun Wang and Shui Yu Containing smartphone worm propagation with an influence maximization algorithm 103--113 Bhanu Kaushik and Honggang Zhang and Xinyu Yang and Xinwen Fu and Benyuan Liu and Jie Wang Providing service assurance in mobile opportunistic networks . . . . . . . . . 114--140 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Ertugrul N. Ciftcioglu and Antonios Michaloliakos and Aylin Yener and Konstantinos Psounis and Thomas F. La Porta and Ramesh Govindan Operational information content sum capacity: From theory to practice . . . 1--17 Nelson Capela and Susana Sargento Multihoming and network coding: a new approach to optimize the network performance . . . . . . . . . . . . . . 18--36 Dmitriy Kuptsov and Boris Nechaev and Andrey Lukyanenko and Andrei Gurtov How penalty leads to improvement: a measurement study of wireless backoff in IEEE 802.11 networks . . . . . . . . . . 37--57 Hanjin Park and Yung Yi and Yongdae Kim Revisiting security of proportional fair scheduler in wireless cellular networks 58--74 Sok-Ian Sou and Dung-Ru Tsai Bulk credit reservation in event-based Machine Type Communications for 3GPP online charging . . . . . . . . . . . . 75--85 Dongni Ren and S.-H. Gary Chan and Guangyu Shi and Hongbo Zhang Distributed joint optimization for large-scale video-on-demand . . . . . . 86--98 Hassan Noura and Steven Martin and Khaldoun Al Agha and Khaled Chahine ERSS--RLNC: Efficient and robust secure scheme for random linear network coding 99--112 Mehmet Fatih Tuysuz An energy-efficient QoS-based network selection scheme over heterogeneous WLAN--3G networks . . . . . . . . . . . 113--133 Xiang-Jun Shen and Lu Liu and Zheng-Jun Zha and Pei-Ying Gu and Zhong-Qiu Jiang and Ji-Ming Chen and John Panneerselvam Achieving dynamic load balancing through mobile agents in small world P2P networks . . . . . . . . . . . . . . . . 134--148 Li-Ping Tung and Ying-Dar Lin and Yu-Hsien Kuo and Yuan-Cheng Lai and Krishna M. Sivalingam Reducing power consumption in LTE data scheduling with the constraints of channel condition and QoS . . . . . . . 149--159 Wen-Kang Jia A unified MIPv6 and PMIPv6 route optimization scheme for heterogeneous mobility management domains . . . . . . 160--176 Dina S. M. Hassan and Hossam M. A. Fahmy and Ayman M. Bahaa-ElDin RCA: Efficient connected dominated clustering algorithm for mobile ad hoc networks . . . . . . . . . . . . . . . . 177--191 Yinghui Zhang and Xiaofeng Chen and Jin Li and Hui Li Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks . . . . . 192--211 Hui Wang and H. Eduardo Roman and Liyong Yuan and Yongfeng Huang and Rongli Wang Connectivity, coverage and power consumption in large-scale wireless sensor networks . . . . . . . . . . . . 212--225 Charalambos Sergiou and Vasos Vassiliou and Aristodemos Paphitis Congestion control in Wireless Sensor Networks through dynamic alternative path selection . . . . . . . . . . . . . 226--238 B. Addis and A. Capone and G. Carello and L. G. Gianoli and B. Sans\`o On the energy cost of robustness and resiliency in IP networks . . . . . . . 239--259 Cosimo Anglano and Marco Guazzone and Matteo Sereno Maximizing profit in green cellular networks through collaborative games . . 260--275 Xiuquan Qiao and Guoshun Nan and Wei Tan and Lei Guo and Junliang Chen and Wei Quan and Yukai Tu CCNxTomcat: an extended web server for Content-Centric Networking . . . . . . . 276--296 Aruna Prem Bianzino and Mikael Asplund and Ekhiotz Jon Vergara and Simin Nadjm-Tehrani Cooperative proxies: Optimally trading energy and quality of service in mobile devices . . . . . . . . . . . . . . . . 297--312 Xin Jin and Yu-Kwong Kwok and Jian Deng Variegated competing peer-to-peer systems with selfish peers . . . . . . . 313--330 Miloud Bagaa and Mohamed Younis and Abdelouahid Derhab and Nadjib Badache Intertwined path formation and MAC scheduling for fast delivery of aggregated data in WSN . . . . . . . . . 331--350 Feng Shan and Junzhou Luo and Xiaojun Shen Optimal energy efficient packet scheduling with arbitrary individual deadline guarantee . . . . . . . . . . . 351--366 Zhongxing Ming and Mingwei Xu and Dan Wang InCan: In-network cache assisted eNodeB caching mechanism in 4G LTE networks . . 367--380 Leandro Aparecido Villas and Azzedine Boukerche and Guilherme Maia and Richard Werner Pazzi and Antonio A. F. Loureiro DRIVE: an efficient and robust data dissemination protocol for highway and urban vehicular ad hoc networks . . . . 381--394 Jesús Friginal and David de Andrés and Juan-Carlos Ruiz and Miquel Martínez A survey of evaluation platforms for ad hoc routing protocols: a resilience perspective . . . . . . . . . . . . . . 395--413 Deanna Hlavacek and J. Morris Chang A layered approach to cognitive radio network security: a survey . . . . . . . 414--436 Thomas Paul and Antonino Famulari and Thorsten Strufe A survey on decentralized Online Social Networks . . . . . . . . . . . . . . . . 437--452 Akram Hakiri and Aniruddha Gokhale and Pascal Berthou and Douglas C. Schmidt and Thierry Gayraud Software-Defined Networking: Challenges and research opportunities for Future Internet . . . . . . . . . . . . . . . . 453--471 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Julia Klier and Mathias Klier and Rolf T. Wigand The connectedness, pervasiveness and ubiquity of online social networks . . . 473--476 Tobias Mutter and Dennis Kundisch Don't take away my status! --- Evidence from the restructuring of a virtual reward system . . . . . . . . . . . . . 477--490 Gongjun Yan and Wu He and Jiancheng Shen and Chuanyi Tang A bilingual approach for conducting Chinese and English social media sentiment analysis . . . . . . . . . . . 491--503 Duc A. Tran and Ting Zhang S-PUT: an EA-based framework for socially aware data partitioning . . . . 504--518 Johannes Putzke and Kai Fischbach and Detlef Schoder and Peter A. Gloor Cross-cultural gender differences in the adoption and usage of social media platforms --- an exploratory study of Last.FM . . . . . . . . . . . . . . . . 519--530 Constantinos Patsakis and Athanasios Zigomitros and Achilleas Papageorgiou and Edgar Galván-López Distributing privacy policies over multimedia content across multiple online social networks . . . . . . . . . 531--543 Junzhou Zhao and John C. S. Lui and Don Towsley and Xiaohong Guan Whom to follow: Efficient followee selection for cascading outbreak detection on online social networks . . 544--559 Sebastian Behrendt and Alexander Richter and Matthias Trier Mixed methods analysis of enterprise social networks . . . . . . . . . . . . 560--577 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Anonymous Thank you reviewers . . . . . . . . . . i--xxxi Anonymous Editorial . . . . . . . . . . . . . . . iii--iv Luiz H. A. Correia and Thanh-Dien Tran and Vasco N. S. S. Pereira and João C. Giacomin and Jorge M. Sá Silva DynMAC: a resistant MAC protocol to coexistence in wireless sensor networks 1--16 Gy\Hozö Gódor and Zoltán Jakó and Ádám Knapp and Sándor Imre A survey of handover management in LTE-based multi-tier femtocell networks: Requirements, challenges and solutions 17--41 R. Acedo-Hernández and M. Toril and S. Luna-Ramírez and I. de la Bandera and N. Faour Analysis of the impact of PCI planning on downlink throughput performance in LTE . . . . . . . . . . . . . . . . . . 42--54 Xenofon Fafoutis and Alessio Di Mauro and Madava D. Vithanage and Nicola Dragoni Receiver-initiated medium access control protocols for wireless sensor networks 55--74 Tomasz Bujlow and Valentín Carela-Español and Pere Barlet-Ros Independent comparison of popular DPI tools for traffic classification . . . . 75--89 Dionysis Xenakis and Nikos Passas and Lazaros Merakos and Christos Verikoukis Advanced mobility management for reduced interference and energy consumption in the two-tier LTE-Advanced network . . . 90--111 P. Muñoz and R. Barco and I. de la Bandera Load balancing and handover joint optimization in LTE networks using Fuzzy Logic and Reinforcement Learning . . . . 112--125 Michele Mangili and Fabio Martignon and Stefano Paraboschi A cache-aware mechanism to enforce confidentiality, trackability and access policy evolution in Content-Centric Networks . . . . . . . . . . . . . . . . 126--145 S. Sicari and A. Rizzardi and L. A. Grieco and A. Coen-Porisini Security, privacy and trust in Internet of Things: the road ahead . . . . . . . 146--164 Tengfei Chang and Thomas Watteyne and Kris Pister and Qin Wang Adaptive synchronization in multi-hop TSCH networks . . . . . . . . . . . . . 165--176 Yuansheng Wu and Bing Guo and Yan Shen and Jihe Wang and Xiaobin Liu A Cross-Layer Optimization and Design approach under QoS constraints for green IP over WDM networks . . . . . . . . . . 177--190 Xu Wang and Hailong Sun and Ting Deng and Jinpeng Huai On the tradeoff of availability and consistency for quorum systems in data center networks . . . . . . . . . . . . 191--206 Mustafa Ilhan Akbas and Matthias R. Brust and Damla Turgut and Carlos H. C. Ribeiro A preferential attachment model for primate social networks . . . . . . . . 207--226 Tugrul Çavdar and Erkan Güler and Zhaleh Sadreddini Instant overbooking framework for cognitive radio networks . . . . . . . . 227--241 Yuichi Ohsita and Takashi Miyamura and Shin'ichi Arakawa and Shohei Kamamura and Daisaku Shimazaki and Kohei Shiomoto and Atsushi Hiramatsu and Masayuki Murata Aggregation of traffic information for hierarchical routing reconfiguration . . 242--258 Martino Fornasa and Michele Stecca and Massimo Maresca and Pierpaolo Baglietto Bounded latency spanning tree reconfiguration . . . . . . . . . . . . 259--274 Bilal Gonen and Gurhan Gunduz and Murat Yuksel Automated network management and configuration using Probabilistic Trans-Algorithmic Search . . . . . . . . 275--293 Chao Gao and Guorong Zhao and Jianhua Lu and Shuang Pan A grid-based cooperative QoS routing protocol with fading memory optimization for navigation carrier ad hoc networks 294--316 Müge Erel and Zemre Arslan and Yusuf Özçevik and Berk Canberk Grade of Service (GoS) based adaptive flow management for Software Defined Heterogeneous Networks (SDHetN) . . . . 317--330 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Alfonso Iacovazzi and Andrea Baiocchi Protecting traffic privacy for massive aggregated traffic . . . . . . . . . . . 1--17 Jerzy Domzal and Zbigniew Duli\'nski and Miroslaw Kantor and Jacek Rzasa and Rafal Stankiewicz and Krzysztof Wajda and Robert Wójcik A survey on methods to provide multipath transmission in wired packet networks 18--41 Michele Albano and Stefano Chessa Replication vs erasure coding in data centric storage for wireless sensor networks . . . . . . . . . . . . . . . . 42--55 Dexiang Wang Tradeoff study among traffic egression schemes and member allocation optimization for link aggregation groups in integrated switching systems . . . . 56--72 Giovanni Accongiagioco and Enrico Gregori and Luciano Lenzini S-BITE: a Structure-Based Internet Topology gEnerator . . . . . . . . . . . 73--89 Scott Fowler and Ahmed Omar Shahidullah and Mohammed Osman and Johan M. Karlsson and Di Yuan Analytical evaluation of extended DRX with additional active cycles for light traffic . . . . . . . . . . . . . . . . 90--102 Hassan Habibi Gharakheili and Arun Vishwanath and Vijay Sivaraman Comparing edge and host traffic pacing in small buffer networks . . . . . . . . 103--116 Sebastian Neumayer and Alon Efrat and Eytan Modiano Geographic max-flow and min-cut under a circular disk failure model . . . . . . 117--127 Farzad Tashtarian and M. H. Yaghmaee Moghaddam and Khosrow Sohraby and Sohrab Effati ODT: Optimal deadline-based trajectory for mobile sinks in WSN: a decision tree and dynamic programming approach . . . . 128--143 Phuong Luu Vo and Duc Ngoc Minh Dang and Sungwon Lee and Choong Seon Hong and Quan Le-Trung A coalitional game approach for fractional cooperative caching in content-oriented networks . . . . . . . 144--152 Aristotelis Kretsis and Panagiotis Kokkinos and Kostas Christodoulopoulos and Theodora Varvarigou and Emmanouel (Manos) Varvarigos Mantis: Cloud-based optical network planning and operation tool . . . . . . 153--168 Shashank Shanbhag and Arun Reddy Kandoor and Cong Wang and Ramgopal Mettu and Tilman Wolf VHub: Single-stage virtual network mapping through hub location . . . . . . 169--180 Myungjin Lee and Mohammad Hajjat and Ramana Rao Kompella and Sanjay G. Rao A flow measurement architecture to preserve application structure . . . . . 181--195 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Anonymous Editorial Board . . . . . . . . . . . . ibc--ibc Richard Combes and Salah Eddine Elayoubi and Arshad Ali and Louai Saker and Tijani Chahed Optimal online control for sleep mode in green base stations . . . . . . . . . . ibc--ibc Chao Fang and F. Richard Yu and Tao Huang and Jiang Liu and Yunjie Liu An energy-efficient distributed in-network caching scheme for green content-centric networks . . . . . . . . ibc--ibc Fatemeh Ganji and Lukasz Budzisz and Fikru G. Debele and Nanfang Li and Michela Meo and Marco Ricca and Yi Zhang and Adam Wolisz Greening campus WLANs: Energy-relevant usage and mobility patterns . . . . . . ibc--ibc Ward Van Heddeghem and Filip Idzikowski and Francesco Musumeci and Achille Pattavina and Bart Lannoo and Didier Colle and Mario Pickavet A power consumption sensitivity analysis of circuit-switched versus packet-switched backbone networks . . . ibc--ibc Xiaoli Huan and Bang Wang and Yijun Mo and Laurence T. Yang Rechargeable router placement based on efficiency and fairness in green wireless mesh networks . . . . . . . . . ibc--ibc S. Lambert and B. Lannoo and A. Dixit and D. Colle and M. Pickavet and J. Montalvo and J. A. Torrijos and P. Vetter Energy efficiency analysis of high speed triple-play services in next-generation PON deployments . . . . . . . . . . . . ibc--ibc Nam Pham Ngoc and Thanh Nguyen Huu and Trong Vu Quang and Vu Tran Hoang and Huong Truong Thu and Phuoc Tran-Gia and Christian Schwartz A new power profiling method and power scaling mechanism for energy-aware NetFPGA gigabit router . . . . . . . . . ibc--ibc J. Peng and P. Hong and K. Xue Optimal power management under delay constraint in cellular networks with hybrid energy sources . . . . . . . . . ibc--ibc Marco Polverini and Antonio Cianfrani and Angelo Coiro and Marco Listanti and Roberto Bruschi Freezing forwarding functionality to make the network greener . . . . . . . . ibc--ibc Balaji Rengarajan and Gianluca Rizzo and Marco Ajmone Marsan Energy-optimal base station density in cellular access networks with sleep modes . . . . . . . . . . . . . . . . . ibc--ibc Pablo Serrano and Xavier Costa-Pérez and Jinsong Wu and Ken Christensen Special Issue: Green Communications . . ibc--ibc Kyuho Son and Eunsung Oh and Bhaskar Krishnamachari Energy-efficient design of heterogeneous cellular networks from deployment to operation . . . . . . . . . . . . . . . ibc--ibc Luis Suárez and Loutfi Nuaymi and Jean-Marie Bonnin Energy-efficient BS switching-off and cell topology management for macro/femto environments . . . . . . . . . . . . . . ibc--ibc Jiayuan Wang and Xin Chen and Chris Phillips and Ying Yan Energy efficiency with QoS control in dynamic optical networks with SDN enabled integrated control plane . . . . ibc--ibc M. Aykut Yigitel and Ozlem Durmaz Incel and Cem Ersoy QoS vs. energy: a traffic-aware topology management scheme for green heterogeneous networks . . . . . . . . . ibc--ibc
Pantelis A. Frangoudis and George C. Polyzos Reputation-based crowdsourced Wi-Fi topology discovery . . . . . . . . . . . 1--16 Wei Wang and Linlin Yang and Yanjiao Chen and Qian Zhang A privacy-aware framework for targeted advertising . . . . . . . . . . . . . . 17--29 Noor Al-Nakhala and Ryan Riley and Tarek Elfouly Distributed algorithms in wireless sensor networks: an approach for applying binary consensus in a real testbed . . . . . . . . . . . . . . . . 30--38 Md. Tauhiduzzaman and Mea Wang Fighting pollution attacks in P2P streaming . . . . . . . . . . . . . . . 39--52 Seil Jeon and Namhi Kang and Daniel Corujo and Rui L. Aguiar Comprehensive performance evaluation of distributed and dynamic mobility routing strategy . . . . . . . . . . . . . . . . 53--67 Revathi Bangalore Somanatha and J. William Atwood Router authentication, key management, and adjacency management for securing inter-router control messages . . . . . 68--90 Young-Hwan Kim and Roberto Konow and Diego Dujovne and Thierry Turletti and Walid Dabbous and Gonzalo Navarro PcapWT: an efficient packet extraction tool for large volume network traces . . 91--102 A. Mostefaoui and A. Boukerche and M. A. Merzoug and M. Melkemi A scalable approach for serial data fusion in Wireless Sensor Networks . . . 103--119 Elisa Rojas and Guillermo Ibañez and Jose Manuel Gimenez-Guzman and Juan A. Carral and Alberto Garcia-Martinez and Isaias Martinez-Yelmo and Jose Manuel Arco All-Path bridging: Path exploration protocols for data center and campus networks . . . . . . . . . . . . . . . . 120--132 Sangyup Han and Myungchul Kim and Ben Lee and Sungwon Kang Fast Directional Handoff and lightweight retransmission protocol for enhancing multimedia quality in indoor WLANs . . . 133--147 Róza Go\'scie\'n and Krzysztof Walkowiak and Miroslaw Klinkowski Tabu search algorithm for routing, modulation and spectrum allocation in elastic optical network with anycast and unicast traffic . . . . . . . . . . . . 148--165 Muhammad Adeel Mahmood and Winston K. G. Seah and Ian Welch Reliability in wireless sensor networks: a survey and challenges ahead . . . . . 166--187 Fabrício A. Silva and Azzedine Boukerche and Thais R. M. B. Silva and Linnyer B. Ruiz and Antonio A. F. Loureiro A novel macroscopic mobility model for vehicular networks . . . . . . . . . . . 188--202 Pablo Romero and Franco Robledo and Pablo Rodríguez-Bocca and Claudia Rostagnol Lyapunov stability and performance of user-assisted Video-on-Demand services 203--215 Behnaz Bostanipour and Beno\^\it Garbinato Effective and efficient neighbor detection for proximity-based mobile applications . . . . . . . . . . . . . . 216--235 Yousri Daldoul and Djamal-Eddine Meddour and Toufik Ahmed and Raouf Boutaba Impact of device unavailability on the reliability of multicast transport in IEEE 802.11 networks . . . . . . . . . . 236--246 Álvaro Pachón and Andrés Navarro and Ubaldo García-Palomares A flexible mid-term frequency domain scheduler for resource allocation in HetNets based on the SINR requested by users . . . . . . . . . . . . . . . . . 247--262 Michael Donohoe and Brendan Jennings and Sasitharan Balasubramaniam Context-awareness and the smart grid: Requirements and challenges . . . . . . 263--282 Ting Wang and Zhiyang Su and Yu Xia and Jogesh Muppala and Mounir Hamdi Designing efficient high performance server-centric data center network architecture . . . . . . . . . . . . . . 283--296 You-Chiun Wang and Chien-An Chuang Efficient eNB deployment strategy for heterogeneous cells in 4G LTE systems 297--312 Julio Soto and Michele Nogueira A framework for resilient and secure spectrum sensing on cognitive radio networks . . . . . . . . . . . . . . . . 313--322 Fatma Ekici and Didem Gözüpek Joint overlay routing and relay assignment for green networks . . . . . 323--344 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
M. S. Siddiqui and D. Montero and R. Serral-Graci\`a and X. Masip-Bruin and M. Yannuzzi A survey on the recent efforts of the Internet Standardization Body for securing inter-domain routing . . . . . 1--26 Gabriel Martorell and Guillem Femenias and Felip Riera-Palou Non-saturated IEEE 802.11 networks. A hierarchical $3$D Markov model . . . . . 27--50 Amin Karami and Manel Guerrero-Zapata An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking . . . . . . . . 51--65 Sergio Pastrana and Juan E. Tapiador and Agustin Orfila and Pedro Peris-Lopez DEFIDNET: a framework for optimal allocation of cyberdefenses in Intrusion Detection Networks . . . . . . . . . . . 66--88 Adelina Madhja and Sotiris Nikoletseas and Theofanis P. Raptis Distributed wireless power transfer in sensor networks with multiple Mobile Chargers . . . . . . . . . . . . . . . . 89--108 Yangming Zhao and Yifan Huang and Kai Chen and Minlan Yu and Sheng Wang and DongSheng Li Joint VM placement and topology optimization for traffic scalability in dynamic datacenter networks . . . . . . 109--123 Anita Sobe and Wilfried Elmenreich and Tibor Szkaliczki and Laszlo Böszörmenyi SEAHORSE: Generalizing an artificial hormone system algorithm to a middleware for search and delivery of information units . . . . . . . . . . . . . . . . . 124--142 Amin Azari and Jalil S. Harsini and Farshad Lahouti Performance analysis of ad-hoc routing in heterogeneous clustered multi-hop wireless networks . . . . . . . . . . . 143--154 Leng-Gan Yi and Yi-Min Lu Utility-driven relay for hybrid access femtocells based on cognitive radio spectrum auction . . . . . . . . . . . . 155--166 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Xin Jin and Yu-Kwong Kwok Coercion builds cooperation in dynamic and heterogeneous P2P live streaming networks . . . . . . . . . . . . . . . . 1--18 José Marinho and Edmundo Monteiro CORHYS: Hybrid signaling for opportunistic distributed cognitive radio . . . . . . . . . . . . . . . . . 19--42 Cristiano Rezende and Azzedine Boukerche and Mohammed Almulla and Antonio A. F. Loureiro The selective use of redundancy for video streaming over Vehicular Ad Hoc Networks . . . . . . . . . . . . . . . . 43--62 Ilaria Malanchini and Steven Weber and Matteo Cesana Stochastic characterization of the spectrum sharing game in ad-hoc networks 63--78 Hamid Farhady and HyunYong Lee and Akihiro Nakao Software-Defined Networking: a survey 79--95 Niels Bouten and Ricardo de O. Schmidt and Jeroen Famaey and Steven Latré and Aiko Pras and Filip De Turck QoE-driven in-network optimization for Adaptive Video Streaming based on packet sampling measurements . . . . . . . . . 96--115 Soochang Park and Seung-Woo Hong and Euisin Lee and Sang-Ha Kim and Noel Crespi Large-scale mobile phenomena monitoring with energy-efficiency in wireless sensor networks . . . . . . . . . . . . 116--135 Ghadah Aldabbagh and Sheikh Tahir Bakhsh and Nadine Akkari and Sabeen Tahir and Haleh Tabrizi and John Cioffi QoS-Aware Tethering in a Heterogeneous Wireless Network using LTE and TV White Spaces . . . . . . . . . . . . . . . . . 136--146 Andra Lutu and Marcelo Bagnulo and Cristel Pelsser and Kenjiro Cho and Rade Stanojevic An analysis of the economic impact of strategic deaggregation . . . . . . . . 147--163 Zhen Huang and Jinbang Chen and Yisong Lin and Pengfei You and Yuxing Peng Minimizing data redundancy for high reliable cloud storage systems . . . . . 164--177 Hakan Kardes and Mehmet Hadi Gunes and Kamil Sarac Graph Based Induction of unresponsive routers in Internet topologies . . . . . 178--200 A. Socievole and E. Yoneki and F. De Rango and J. Crowcroft ML--SOR: Message routing using multi-layer social networks in opportunistic communications . . . . . . 201--219 Christos Anagnostopoulos and Stathes Hadjiefthymiades and Kostas Kolomvatsos Time-optimized user grouping in Location Based Services . . . . . . . . . . . . . 220--244 Li Yang and Jianfeng Ma and Wenjing Lou and Qi Jiang A delegation based cross trusted domain direct anonymous attestation scheme . . 245--257 Siddhartha Sarma and Joy Kuri Optimal power allocation for protective jamming in wireless networks: a flow based model . . . . . . . . . . . . . . 258--271 Andrea Detti and Bruno Ricci and Nicola Blefari-Melazzi Mobile peer-to-peer video streaming over information-centric networks . . . . . . 272--288 Wei Yin and Peizhao Hu and Jadwiga Indulska Rate control in the mac80211 framework: Overview, evaluation and improvements 289--307 Bing Wang and Yao Zheng and Wenjing Lou and Y. Thomas Hou DDoS attack protection in the era of cloud computing and Software-Defined Networking . . . . . . . . . . . . . . . 308--319 Tobias Hoßfeld and Michael Seufert and Christian Sieber and Thomas Zinner and Phuoc Tran-Gia Identifying QoE optimal adaptation of HTTP adaptive streaming based on subjective studies . . . . . . . . . . . 320--332 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Wouter Tavernier and Deborah Frincke and Achim Autenrieth and Didier Colle Editorial . . . . . . . . . . . . . . . 1--3 Abdulaziz Alashaikh and Teresa Gomes and David Tipper The \em Spine concept for improving network availability . . . . . . . . . . 4--19 Aditya Sundarrajan and Srinivasan Ramasubramanian Fast reroute from single link and single node failures for IP multicast . . . . . 20--33 M. Todd Gardner and Rebecca May and Cory Beard and Deep Medhi A Geographic Multi-Topology Routing approach and its benefits during large-scale geographically correlated failures . . . . . . . . . . . . . . . . 34--49 Yufei Cheng and M. Todd Gardner and Junyan Li and Rebecca May and Deep Medhi and James P. G. Sterbenz Analysing GeoPath diversity and improving routing performance in optical networks . . . . . . . . . . . . . . . . 50--67 Péter Babarczi and Alija Pasi\'c and János Tapolcai and Felicián Németh and Bence Ladóczki Instantaneous recovery of unicast connections in transport networks: Routing versus coding . . . . . . . . . 68--80 Yong-Hyuk Moon and Chan-Hyun Youn Multihybrid job scheduling for fault-tolerant distributed computing in policy-constrained resource networks . . 81--95 Sergio Fortes and Raquel Barco and Alejandro Aguilar-García and Pablo Muñoz Contextualized indicators for online failure diagnosis in cellular networks 96--113 Jesús Friginal and David de Andrés and Juan-Carlos Ruiz and Miquel Martínez REFRAHN: a Resilience Evaluation Framework for Ad Hoc Routing Protocols 114--134 M. S. Siddiqui and D. Montero and R. Serral-Graci\`a and M. Yannuzzi Self-reliant detection of route leaks in inter-domain routing . . . . . . . . . . 135--155 Sahel Sahhaf and Wouter Tavernier and Didier Colle and Mario Pickavet and Piet Demeester Experimental validation of resilient tree-based greedy geometric routing . . 156--171 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Munyoung Lee and Junghwan Song and Kideok Cho and Sangheon Pack and Ted `Taekyoung' Kwon and Jussi Kangasharju and Yanghee Choi Content discovery for information-centric networking . . . . . 1--14 Carlo Vallati and Enzo Mingozzi Efficient design of wireless mesh networks with robust dynamic frequency selection capability . . . . . . . . . . 15--29 Min Luo and Yulong Zeng and Jianfei Li and Wu Chou An adaptive multi-path computation framework for centrally controlled networks . . . . . . . . . . . . . . . . 30--44 Anna Dudnikova and Daniela Panno and Antonio Mastrosimone Measurement-based coverage function for green femtocell networks . . . . . . . . 45--58 Zichuan Xu and Weifa Liang Operational cost minimization of distributed data centers through the provision of fair request rate allocations while meeting different user SLAs . . . . . . . . . . . . . . . . . . 59--75 Samil Temel and Ilker Bekmezci LODMAC: Location Oriented Directional MAC protocol for FANETs . . . . . . . . 76--84 Yaoqing Liu and Vince Lehman and Lan Wang Efficient FIB caching using minimal non-overlapping prefixes . . . . . . . . 85--99 Xiaoying Zheng and Chunglae Cho and Ye Xia Content distribution by multiple multicast trees and intersession cooperation: Optimal algorithms and approximations . . . . . . . . . . . . . 100--117 C. Cano and D. Malone On efficiency and validity of previous Homeplug MAC performance analysis . . . 118--135 Matteo Dell'Amico and Pietro Michiardi and Laszlo Toka and Pasquale Cataldi Adaptive redundancy management for durable P2P backup . . . . . . . . . . . 136--148 Adrián Sánchez-Carmona and Sergi Robles and Carlos Borrego Endeavouring to be in the good books. Awarding DTN network use for acknowledging the reception of bundles 149--166 Farha N. Ali and Yvon Feaster and Jiannan Zhai and Jason O. Hallstrom The smart surface network: a bus-based approach to dense sensing . . . . . . . 167--183 Sheng Zhang and Jie Wu and Zhuzhong Qian and Sanglu Lu MobiCache: Cellular traffic offloading leveraging cooperative caching in mobile social networks . . . . . . . . . . . . 184--198 Dexiang Wang Bandwidth-efficiency-oriented topology optimization for integrated switching systems based on circulant graphs . . . 199--216 L. Rajya Lakshmi and Vinay J. Ribeiro and B. N. Jain PRIME: a partial path establishment based handover management technique for QoS support in WiMAX based wireless mesh networks . . . . . . . . . . . . . . . . 217--234 Andrea Bianco and Davide Cuda and Jorge M. Finochietto Short-term fairness in slotted WDM rings 235--248 Martín Zubeldía and Andrés Ferragut and Fernando Paganini Neighbor selection for proportional fairness in P2P networks . . . . . . . . 249--264 Konstantin Avrachenkov and Jocelyne Elias and Fabio Martignon and Giovanni Neglia and Leon Petrosyan Cooperative network design: a Nash bargaining solution approach . . . . . . 265--279 Francesco Longo and Salvatore Distefano and Dario Bruneo and Marco Scarpa Dependability modeling of Software Defined Networking . . . . . . . . . . . 280--296 Xingkong Ma and Yijie Wang and Xiaoqiang Pei and Fangliang Xu Scalable and elastic total order in content-based publish/subscribe systems 297--314 Lei Ding and Tommaso Melodia and Stella N. Batalama and John D. Matyjas Distributed resource allocation in cognitive and cooperative ad hoc networks through joint routing, relay selection and spectrum allocation . . . 315--331 Lara Deek and Eduard Garcia-Villegas and Elizabeth Belding and Sung-Ju Lee and Kevin Almeroth A practical framework for 802.11 MIMO rate adaptation . . . . . . . . . . . . 332--348 Yuanzhu Chen and Xu Liu and Jiafen Liu and Walter Taylor and Jason H. Moore Delay-tolerant networks and network coding: Comparative studies on simulated and real-device experiments . . . . . . 349--362 Adnan Nadeem and Muhammad Azhar Hussain and Obaidullah Owais and Abdul Salam and Sarwat Iqbal and Kamran Ahsan Application specific study, analysis and classification of body area wireless sensor network applications . . . . . . 363--380 Giuseppe Aceto and Antonio Pescapé Internet Censorship detection: a survey 381--421 Vahid Nazari Talooki and Riccardo Bassoli and Daniel E. Lucani and Jonathan Rodriguez and Frank H. P. Fitzek and Hugo Marques and Rahim Tafazolli Security concerns and countermeasures in network coding based communication systems: a survey . . . . . . . . . . . 422--445 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Dingde Jiang and Yuanting Wang and Chunping Yao and Yang Han An effective dynamic spectrum access algorithm for multi-hop cognitive wireless networks . . . . . . . . . . . 1--16 Md. Rakib Hassan and Gour Karmakar and Joarder Kamruzzaman and Bala Srinivasan A comprehensive spectrum trading scheme based on market competition, reputation and buyer specific requirements . . . . 17--31 Sumanta Saha and Andrey Lukyanenko and Antti Ylä-Jääski Efficient cache availability management in Information-Centric Networks . . . . 32--45 Roberto Di Pietro and Gabriele Oligeri ESC: an efficient, scalable, and crypto-less solution to secure wireless networks . . . . . . . . . . . . . . . . 46--63 Chen Ran and Shaowei Wang and Chonggang Wang Cellular networks planning: a workload balancing perspective . . . . . . . . . 64--75 Sahar Hoteit and Stefano Secci and Guy Pujolle and Adam Wolisz and Cezary Ziemlicki and Zbigniew Smoreda Mobile data traffic offloading over Passpoint hotspots . . . . . . . . . . . 76--93 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Ian F. Akyildiz and Pu Wang and Shih-Chun Lin SoftAir: a software defined networking architecture for 5G wireless systems . . 1--18 Changhoon Yoon and Taejune Park and Seungsoo Lee and Heedo Kang and Seungwon Shin and Zonghua Zhang Enabling security functions with SDN: a feasibility study . . . . . . . . . . . 19--35 Tatsuya Otoshi and Yuichi Ohsita and Masayuki Murata and Yousuke Takahashi and Keisuke Ishibashi and Kohei Shiomoto Traffic prediction for dynamic traffic engineering . . . . . . . . . . . . . . 36--50 Jun He and Wei Song Smart routing: Fine-grained stall management of video streams in mobile core networks . . . . . . . . . . . . . 51--62 Mohammed L. Ali and Pin-Han Ho and János Tapolcai SRLG fault localization using nested $m$-trails . . . . . . . . . . . . . . . 63--79 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
João Eugenio Marynowski and Altair Olivo Santin and Andrey Ricardo Pimentel Method for testing the fault tolerance of MapReduce frameworks . . . . . . . . 1--13 Mehmet Hadi Gunes and Murat Yuksel and Hayreddin Ceker A blind processing framework to facilitate openness in smart grid communications . . . . . . . . . . . . . 14--26 Xinyun Wu and Tao Ye and Qi Guo and Zhipeng Lü GRASP for traffic grooming and routing with simple path constraints in WDM mesh networks . . . . . . . . . . . . . . . . 27--39 Eduard Garcia-Villegas and Muhammad Shahwaiz Afaqui and Elena Lopez-Aguilera A novel cheater and jammer detection scheme for IEEE 802.11-based wireless LANs . . . . . . . . . . . . . . . . . . 40--56 Yingbiao Yao and Nanlan Jiang Distributed wireless sensor network localization based on weighted search 57--75 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Jianxin Liao and Ziteng Cui and Jingyu Wang and Tonghong Li and Qi Qi and Jing Wang A coalitional game approach on improving interactions in multiple overlay environments . . . . . . . . . . . . . . 1--15 Walter Cerroni and Molka Gharbaoui and Barbara Martini and Aldo Campi and Piero Castoldi and Franco Callegati Cross-layer resource orchestration for cloud service delivery: a seamless SDN approach . . . . . . . . . . . . . . . . 16--32 Shu Fu and Bin Wu and Xiaohong Jiang and Achille Pattavina and Hong Wen and Hongfang Yu Switch cost and packet delay tradeoff in data center networks with switch reconfiguration overhead . . . . . . . . 33--43 Leovigildo Sánchez-Casado and Gabriel Maciá-Fernández and Pedro García-Teodoro and Roberto Magán-Carrión A model of data forwarding in MANETs for lightweight detection of malicious packet dropping . . . . . . . . . . . . 44--58 Carlos Borrego and Sergi Robles and Angela Fabregues and Adrián Sánchez-Carmona A mobile code bundle extension for application-defined routing in delay and disruption tolerant networking . . . . . 59--77 Lin Yao and Jing Deng and Jie Wang and Guowei Wu A-CACHE: an anchor-based public key caching scheme in large wireless networks . . . . . . . . . . . . . . . . 78--88 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Ertong Zhang and Lisong Xu Capacity and token rate estimation for networks with token bucket shapers . . . 1--11 Mustapha Reda Senouci and Abdelhamid Mellouk and Latifa Oukhellou and Amar Aissani WSNs deployment framework based on the theory of belief functions . . . . . . . 12--26 Quoc-Tuan Vien and Wanqing Tu and Huan X. Nguyen and Ramona Trestian Cross-layer topology design for network coding based wireless multicasting . . . 27--39 Kaveh Vaezi and Nail Akar Analytical performance modeling of elastic optical links with aligned spectrum allocation . . . . . . . . . . 40--50 Michele Girolami and Stefano Chessa and Antonio Caruso On service discovery in mobile social networks: Survey and perspectives . . . 51--71 Xinyu Yang and Xuebin Ren and Shusen Yang and Julie McCann A novel temporal perturbation based privacy-preserving scheme for real-time monitoring systems . . . . . . . . . . . 72--88 Victor Lira and Eduardo Tavares and Paulo Maciel An automated approach to dependability evaluation of virtual networks . . . . . 89--102 Vladimir Fux and Patrick Maillé and Matteo Cesana Road-side units operators in competition: a game-theoretical approach 103--120 Weigang Hou and Lei Guo and Yejun Liu and Cunqian Yu and Yue Zong Resource management and control in converged optical data center networks: Survey and enabling technologies . . . . 121--135 Wei Wang and Lei Chen and Qian Zhang Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation . . . . . . . . . . . . . . 136--148 Dimitris Tsolkas and Nikos Passas and Lazaros Merakos Enabling device discovery transmissions in LTE networks with fractional frequency reuse . . . . . . . . . . . . 149--160 Uthpala Subodhani Premarathne and Ibrahim Khalil and Mohammed Atiquzzaman Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications . . . . . . . . . 161--177 Haitham Y. Adarbah and Shakeel Ahmad and Alistair Duffy Impact of noise and interference on probabilistic broadcast schemes in mobile ad-hoc networks . . . . . . . . . 178--186 Georgios Papadimitriou and Nikolaos Pappas and Apostolos Traganitis and Vangelis Angelakis Network-level performance evaluation of a two-relay cooperative random access wireless system . . . . . . . . . . . . 187--201 Nicol\`o Facchi and Francesco Gringoli and Fabio Ricciato and Andrea Toma Emitter localisation from reception timestamps in asynchronous networks . . 202--217 Ahmed Makki and Abubakr Siddig and Mohamed Saad and Chris Bleakley Survey of WiFi positioning using time-based techniques . . . . . . . . . 218--233 Imran Ahmed and M. Majid Butt and Constantinos Psomas and Amr Mohamed and Ioannis Krikidis and Mohsen Guizani Survey on energy harvesting wireless communications: Challenges and opportunities for radio resource allocation . . . . . . . . . . . . . . . 234--248 Aissan Dalvandi and Mohan Gurusamy and Kee Chaing Chua Power-efficient resource-guaranteed VM placement and routing for time-aware data center applications . . . . . . . . 249--268 Nuno Coutinho and Ricardo Matos and Carlos Marques and André Reis and Susana Sargento and Jacob Chakareski and Andreas Kassler Dynamic dual-reinforcement-learning routing strategies for quality of experience-aware wireless mesh networking . . . . . . . . . . . . . . . 269--285
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc Ji-Su Kim and Jin-Ki Kim and Jae-Hyun Kim Advanced handover scheme considering downlink and uplink service traffic in asymmetric channel . . . . . . . . . . . 1--13 Jernej Kos and Mahdi Aiash and Jonathan Loo and Denis Trçek U-Sphere: Strengthening scalable flat-name routing for decentralized networks . . . . . . . . . . . . . . . . 14--31 Francesco Rossi and Giovanni Schmid Identity-based secure group communications using pairings . . . . . 32--43 Bo Fu and Yang Xiao A multi-resolution accountable logging and its applications . . . . . . . . . . 44--58 Rodrigo R. Oliveira and Daniel S. Marcon and Leonardo R. Bays and Miguel C. Neves and Luciano P. Gaspary and Deep Medhi and Marinho P. Barcellos Opportunistic Resilience Embedding (ORE): Toward cost-efficient resilient virtual networks . . . . . . . . . . . . 59--77 Roberto Rojas-Cessa and Taweesak Kijkanjanarat and Wara Wangchai and Krutika Patil and Narathip Thirapittayatakul Helix: IP lookup scheme based on helicoidal properties of binary trees 78--89 Toke Hòiland-Jòrgensen and Per Hurtig and Anna Brunstrom The Good, the Bad and the WiFi: Modern AQMs in a residential setting . . . . . 90--106 Nicola Accettura and Giovanni Neglia and Luigi Alfredo Grieco The Capture--Recapture approach for population estimation in computer networks . . . . . . . . . . . . . . . . 107--122
Tobias Hoßfeld and Phuoc Tran-Gia and Maja Vukovic Special issue on crowdsourcing . . . . . 1--4 Gianluca Demartini Hybrid human-machine information systems: Challenges and opportunities 5--13 Ognjen Scekic and Hong-Linh Truong and Schahram Dustdar PRINGL --- a domain-specific language for incentive management in crowdsourcing . . . . . . . . . . . . . 14--33 Jorge Goncalves and Simo Hosio and Jakob Rogstadius and Evangelos Karapanos and Vassilis Kostakos Motivating participation and improving quality of contribution in ubiquitous crowdsourcing . . . . . . . . . . . . . 34--48 Hayam Mousa and Sonia Ben Mokhtar and Omar Hasan and Osama Younes and Mohiy Hadhoud and Lionel Brunie Trust management and reputation systems in mobile participatory sensing applications: a survey . . . . . . . . . 49--73 Tomoyo Sasao and Shin'ichi Konomi and Masatoshi Arikawa and Hideyuki Fujita Context Weaver: Awareness and feedback in networked mobile crowdsourcing tools 74--84 Matthias Hirth and Tobias Hoßfeld and Marco Mellia and Christian Schwartz and Frank Lehrieder Crowdsourced network measurements: Benefits and best practices . . . . . . 85--98 Thomas Volk and Christian Keimel and Michael Moosmeier and Klaus Diepold Crowdsourcing vs. laboratory experiments --- QoE evaluation of binaural playback in a teleconference scenario . . . . . . 99--109 Maria Christoforaki and Panagiotis G. Ipeirotis A system for scalable and reliable technical-skill testing in online labor markets . . . . . . . . . . . . . . . . 110--120 Mahmood Hosseini and Jack Moore and Malik Almaliki and Alimohammad Shahri and Keith Phalp and Raian Ali Wisdom of the Crowd within enterprises: Practices and challenges . . . . . . . . 121--132 Jasper Oosterman and Jie Yang and Alessandro Bozzon and Lora Aroyo and Geert-Jan Houben On the impact of knowledge extraction and aggregation on crowdsourced annotation of visual artworks . . . . . 133--149 Roger Baig and Ramon Roca and Felix Freitag and Leandro Navarro \tt guifi.net, a crowdsourced network infrastructure held in common . . . . . 150--165 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Kangho Kim and Hwantae Kim and Jongtack Jung and Hwangnam Kim AFAR: a robust and delay-constrained communication framework for smart grid applications . . . . . . . . . . . . . . 1--25 Somia Sahraoui and Azeddine Bilami Efficient HIP-based approach to ensure lightweight end-to-end security in the Internet of Things . . . . . . . . . . . 26--45 Antti Juvonen and Tuomo Sipola and Timo Hämäläinen Online anomaly detection using dimensionality reduction techniques for HTTP log analysis . . . . . . . . . . . 46--56 Elissar Khloussy and Xavier Gelabert and Yuming Jiang Investigation on MDP-based radio access technology selection in heterogeneous wireless networks . . . . . . . . . . . 57--67 Angelo Trotta and Marco Di Felice and Luca Bedogni and Luciano Bononi and Fabio Panzieri Connectivity recovery in post-disaster scenarios through Cognitive Radio swarms 68--89 Bo Fan and Supeng Leng and Kun Yang and Yan Zhang Optimal storage allocation on throwboxes in Mobile Social Networks . . . . . . . 90--100 Yanjiao Chen and Qihong Chen and Fan Zhang and Qian Zhang and Kaishun Wu and Ruochen Huang and Liang Zhou Understanding viewer engagement of video service in Wi-Fi network . . . . . . . . 101--116 Biling Zhang and Yan Chen and Chih-Yu Wang and K. J. Ray Liu A Chinese restaurant game for learning and decision making in cognitive radio networks . . . . . . . . . . . . . . . . 117--134 Jiechen Yin and Yuming Mao and Supeng Leng and Yuming Jiang and Muhammad Asad Khan Access granularity control of multichannel random access in next-generation wireless LANs . . . . . 135--150 Shuhao Liu and Zhiping Cai and Hong Xu and Ming Xu Towards security-aware virtual network embedding . . . . . . . . . . . . . . . 151--163 Qianru Wu and Qixu Liu and Yuqing Zhang and Guanxing Wen TrackerDetector: a system to detect third-party trackers through machine learning . . . . . . . . . . . . . . . . 164--173 Florin Coras and Jordi Domingo-Pascual and Albert Cabellos-Aparicio On the scalability of LISP mappings caches . . . . . . . . . . . . . . . . . 174--183 Yasir Saleem and Kok-Lim Alvin Yau and Hafizal Mohamad and Nordin Ramli and Mubashir Husain Rehmani SMART: a SpectruM-Aware ClusteR-based rouTing scheme for distributed cognitive radio networks . . . . . . . . . . . . . 196--224 Sandip Chakraborty and Sukumar Nandi Data rate, path length and network contention trade-off in IEEE 802.11s mesh networks: a dynamic data rate selection approach . . . . . . . . . . . 225--243 Xiaoying Zheng and Ye Xia Optimizing network objectives in collaborative content distribution . . . 244--261 Kai Liu and Xiaoying Chang and Feng Liu and Xin Wang and Athanasios V. Vasilakos A cooperative MAC protocol with rapid relay selection for wireless ad hoc networks . . . . . . . . . . . . . . . . 262--282 Dinil Mon Divakaran and Le Su and Yung Siang Liau and Vrizlynn L. L. Thing SLIC: Self-Learning Intelligent Classifier for network traffic . . . . . 283--297 Qun Huang and Patrick P. C. Lee A hybrid local and distributed sketching design for accurate and scalable heavy key detection in network data streams 298--315 N. Chrysos and F. Neeser and M. Gusat and C. Minkenberg and W. Denzel and C. Basso and M. Rudquist and K. Valk and B. Vanderpool Large switches or blocking multi-stage networks? An evaluation of routing strategies for datacenter fabrics . . . 316--328 Jenq-Shiou Leu and Min-Chieh Yu and Hung-Jie Tzeng Improving indoor positioning precision by using received signal strength fingerprint and footprint based on weighted ambient Wi-Fi signals . . . . . 329--340 Wassef Louati and Walid Ben-Ameur and Djamal Zeghlache A bottleneck-free tree-based name resolution system for Information-Centric Networking . . . . . 341--355 Xia Yin and Dan Wu and Zhiliang Wang and Xingang Shi and Jianping Wu DIMR: Disjoint Interdomain Multipath Routing . . . . . . . . . . . . . . . . 356--375 Donghai Zhu and Xinyu Yang and Wei Yu SPAIS: a novel Self-checking Pollution Attackers Identification Scheme in network coding-based wireless mesh networks . . . . . . . . . . . . . . . . 376--389 Gongbing Hong and James Martin and James M. Westall On fairness and application performance of active queue management in broadband cable networks . . . . . . . . . . . . . 390--406 Chien-Fu Cheng and Chih-Wei Huang and Lung-Hao Li Mobile sensor relocation problem: Finding the optimal (nearest) redundant sensor with low message overhead . . . . 407--424 Vitaly Milyeykovski and Michael Segal and Vladimir Katz Using central nodes for efficient data collection in wireless sensor networks 425--437 Maurizio Giacobbe and Antonio Celesti and Maria Fazio and Massimo Villari and Antonio Puliafito Towards energy management in Cloud federation: a survey in the perspective of future sustainable and cost-saving strategies . . . . . . . . . . . . . . . 438--452 Shahin Vakilinia and Mustafa Mehmet Ali and Dongyu Qiu Modeling of the resource allocation in cloud computing centers . . . . . . . . 453--470 Quoc-Viet Pham and Hoang-Linh To and Won-Joo Hwang A multi-timescale cross-layer approach for wireless ad hoc networks . . . . . . 471--482 Chen Tian and Jingdong Sun and Weimin Wu and Yan Luo Optimal bandwidth allocation for hybrid Video-on-Demand streaming with a distributed max flow algorithm . . . . . 483--494 Feng Xia and Qiuyuan Yang and Jie Li and Jiannong Cao and Li Liu and Ahmedin Mohammed Ahmed Data dissemination using interest-tree in socially aware networking . . . . . . 495--507 Amir Rahimzadeh Ilkhechi and Ibrahim Korpeoglu and Özgür Ulusoy Network-aware virtual machine placement in cloud data centers with multiple traffic-intensive components . . . . . . 508--527 Bin Wang and Zhengwei Qi and Ruhui Ma and Haibing Guan and Athanasios V. Vasilakos A survey on data center networking for cloud computing . . . . . . . . . . . . 528--547 Bong-Hwan Oh and Jaiyong Lee Constraint-based proactive scheduling for MPTCP in wireless networks . . . . . 548--563 Sotirios K. Goudos and David Plets and Ning Liu and Luc Martens and Wout Joseph A multi-objective approach to indoor wireless heterogeneous networks planning based on biogeography-based optimization 564--576 Xu Zhang and Ning Wang and Vassilios G. Vassilakis and Michael P. Howarth A distributed in-network caching scheme for P2P-like content chunk delivery . . 577--592 Guo Chen and Youjian Zhao and Dan Pei Alleviating flow interference in data center networks through fine-grained switch queue management . . . . . . . . 593--613 Jun Kawahara and Koji M. Kobayashi and Tomotaka Maeda Tight analysis of priority queuing for egress traffic . . . . . . . . . . . . . 614--624 Sok-Ian Sou and Hung-Yang Hsieh Modeling application-based charging management with traffic detection function in 3GPP . . . . . . . . . . . . 625--637 Michele Mangili and Fabio Martignon and Antonio Capone Optimal design of Information Centric Networks . . . . . . . . . . . . . . . . 638--653 Satish Kumar and Arnab Sarkar and Santhosh Sriram and Arijit Sur A three level LTE downlink scheduling framework for RT VBR traffic . . . . . . 654--674 T. Panayiotou and G. Ellinas and N. Antoniades and A. Hadjiantonis Impairment-aware multicast session provisioning in metro optical networks 675--688 Mahmood Ahmadi and Sara Mehdizadeh Khalifani A new look at hybrid Aloha: an analytical approach . . . . . . . . . . 689--699 Waya Fadini and Bijoy Chand Chatterjee and Eiji Oki A subcarrier-slot partition scheme with first-last fit spectrum allocation for elastic optical networks . . . . . . . . 700--711 L. F. Xie and Peter H. J. Chong and Ivan W. H. Ho and Y. L. Guan A survey of inter-flow network coding in wireless mesh networks with unicast traffic . . . . . . . . . . . . . . . . 738--751 Antonello Rizzi and Alfonso Iacovazzi and Andrea Baiocchi and Silvia Colabrese A low complexity real-time Internet traffic flows neuro-fuzzy classifier . . 752--771 Jee Hun Song and Hee-Tae Roh and Jang-Won Lee Opportunistic scheduling and incentive mechanism for OFDMA networks with D2D relaying . . . . . . . . . . . . . . . . 772--787 J. Camilo Cardona and Pierre François and Bruno Decraene and John Scudder and Adam Simpson and Keyur Patel Bringing high availability to BGP: a survey . . . . . . . . . . . . . . . . . 788--803 Jun Kawahara and Koji M. Kobayashi Optimal buffer management for $2$-frame throughput maximization . . . . . . . . 804--820 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Ioannis D. Moscholios and Michael D. Logothetis and John S. Vardakas and Anthony C. Boucouvalas Congestion probabilities of elastic and adaptive calls in Erlang--Engset multirate loss models under the threshold and bandwidth reservation policies . . . . . . . . . . . . . . . . 1--23 Changwon Nam and Saewoong Bahk $ \Delta $ SNR--MAC: a priority-based multi-round contention scheme for MU--MIMO WLANs . . . . . . . . . . . . . 24--40 Péter Megyesi and Géza Szabó and Sándor Molnár User behavior based traffic emulator: a framework for generating test data for DPI tools . . . . . . . . . . . . . . . 41--54 Xiao-Hui Lin and Yu Tan and Yu-Kwong Kwok and Hui Wang and Mingjun Dai and Bin Chen and Gong Chao Su Balancing time and energy efficiencies with identification reliability constraint for portable reader in mobile RFID systems . . . . . . . . . . . . . . 55--71 Shouxi Luo and Hongfang Yu and Lemin Li Practical flow table aggregation in SDN 72--88 Silvia Fichera and Laura Galluccio and Salvatore C. Grancagnolo and Giacomo Morabito and Sergio Palazzo OPERETTA: an OPEnflow-based REmedy to mitigate TCP SYNFLOOD Attacks against web servers . . . . . . . . . . . . . . 89--100 Zhiyang Su and Ting Wang and Yu Xia and Mounir Hamdi CeMon: a cost-effective flow monitoring system in software defined networks . . 101--115 Hyunbum Kim and Jorge A. Cobb Optimization algorithms for transmission range and actor movement in wireless sensor and actor networks . . . . . . . 116--133 Yung-Tsung Weng and Chi-Huang Shih and Chun-I Kuo and Ce-Kuen Shieh Real-time video streaming using prediction-based forward error correction . . . . . . . . . . . . . . . 134--147 Farah Moety and Samer Lahoud and Bernard Cousin and Kinda Khawam Optimization models for the joint power-delay minimization problem in green wireless access networks . . . . . 148--167 Karim Habak and Khaled A. Harras and Moustafa Youssef Bandwidth aggregation techniques in heterogeneous multi-homed devices: a survey . . . . . . . . . . . . . . . . . 168--188 Anderson Santos da Silva and Paul Smith and Andreas Mauthe and Alberto Schaeffer-Filho Resilience support in software-defined networking: a survey . . . . . . . . . . 189--207 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Alberto Leon-Garcia and Peter Ashwood-Smith and Yashar Ganjali Software Defined Networks . . . . . . . 209--210 Luis M. Contreras and Paul Doolan and Håkon Lònsethagen and Diego R. López Operational, organizational and business challenges for network operators in the context of SDN and NFV . . . . . . . . . 211--217 Syed Naveed Rizvi and Daniel Raumer and Florian Wohlfart and Georg Carle Towards carrier grade SDNs . . . . . . . 218--226 Vasileios Kotronis and Adrian Gämperli and Xenofontas Dimitropoulos Routing centralization across domains via SDN: a model and emulation framework for BGP evolution . . . . . . . . . . . 227--239 Ryo Nakamura and Kouji Okada and Yuji Sekiya and Hiroshi Esaki A common data plane for multiple overlay networks . . . . . . . . . . . . . . . . 240--250 Huu Thanh Nguyen and Anh Vu Vu and Duc Lam Nguyen and Van Huynh Nguyen and Manh Nam Tran and Quynh Thu Ngo and Thu-Huong Truong and Tai Hung Nguyen and Thomas Magedanz A generalized resource allocation framework in support of multi-layer virtual network embedding based on SDN 251--269 Peter Peresíni and Maciej Ku\'zniar and Marco Canini and Daniele Venzano and Dejan Kosti\'c and Jennifer Rexford Systematically testing OpenFlow controller applications . . . . . . . . 270--286 Qing Li and Kun Zhao and Yong Jiang and Mingwei Xu and Shu-Tao Xia SARD: a Smart Approach of Rule Division for fast flow-level consistent update in SDN . . . . . . . . . . . . . . . . . . 287--299 Zehua Guo and Yang Xu and Marco Cello and Junjie Zhang and Zicheng Wang and Mingjian Liu and H. Jonathan Chao JumpFlow: Reducing flow table usage in software-defined networks . . . . . . . 300--315 Won-Suk Kim and Sang-Hwa Chung and Jae-Won Moon Improved content management for information-centric networking in SDN-based wireless mesh network . . . . 316--329 Saumya Hegde and Shashidhar G. Koolagudi and Swapan Bhattacharya Scalable and fair forwarding of elephant and mice traffic in software defined networks . . . . . . . . . . . . . . . . 330--340 Harold Owens II and Arjan Durresi Video over Software-Defined Networking (VSDN) . . . . . . . . . . . . . . . . . 341--356 Tuba Uzakgider and Cihat Cetinkaya and Muge Sayit Learning-based approach for layered adaptive video streaming over SDN . . . 357--368 Ángel Leonardo Valdivieso Caraguay and Jesús Antonio Puente Fernández and Luis Javier García Villalba Framework for optimized multimedia routing over software defined networks 369--379 Ivano Cerrato and Alex Palesandro and Fulvio Risso and Marc Suñé and Vinicio Vercellone and Hagen Woesner Toward dynamic virtualized network services in telecom operator networks 380--395 Guozhen Cheng and Hongchang Chen and Hongchao Hu and Zhiming Wang and Julong Lan Enabling network function combination via service chain instantiation . . . . 396--407 Peng Wang and Julong Lan and Xiaohui Zhang and Yuxiang Hu and Shuqiao Chen Dynamic function composition for network service chain: Model and optimization 408--418 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Enzo Baccarelli and Danilo Amendola and Nicola Cordeschi Minimum-energy bandwidth management for QoS live migration of virtual machines 1--22 Francisco A. Gonzalez-Horta and Pedro Mejia-Alvarez and Eldamira Buenfil-Alpuche Multipurpose mobility services for the Future Internet . . . . . . . . . . . . 23--40 Shaahin Madani and Ibrahim Khalil Multi-Binomial mixes: a proposal for secure and efficient anonymous communication . . . . . . . . . . . . . 41--53 Maurizio Casoni and Carlo Augusto Grazia and Martin Klapez and Natale Patriciello QRM: a queue rate management for fairness and TCP flooding protection in mission-critical networks . . . . . . . 54--65 Ian F. Akyildiz and Shih-Chun Lin and Pu Wang Wireless software-defined networks (W-SDNs) and network function virtualization (NFV) for 5G cellular systems: an overview and qualitative evaluation . . . . . . . . . . . . . . . 66--79 Shoushou Ren and Tao Lin and Wei An and Guoqiang Zhang and Dalei Wu and Laxmi Narayan Bhuyan and Zhen Xu Design and analysis of collaborative EPC and RAN caching for LTE mobile networks 80--95 Marco Savi and Roberto Fratini and Giacomo Verticale and Massimo Tornatore Performance evaluation of video server replication in metro/access networks . . 96--110 Hei-Chia Wang and Wei-Pin Chiu and Suei-Chih Wu QoS-driven selection of web service considering group preference . . . . . . 111--124 A. Aguilar-Garcia and S. Fortes and Mariano Molina-García and Jaime Calle-Sánchez and José I. Alonso and Aaron Garrido and Alfonso Fernández-Durán and R. Barco Location-aware self-organizing methods in femtocell networks . . . . . . . . . 125--140 Hicham Lakhlef and Julien Bourgeois Fast and robust self-organization for micro-electro-mechanical robotic systems 141--152 Samah Mansour and Intissar Harrabi and Martin Maier and Géza Joós Co-simulation study of performance trade-offs between centralised, distributed, and hybrid adaptive PEV charging algorithms . . . . . . . . . . 153--165 Jaehoon Paul Jeong and Jinyong Kim and Taehwan Hwang and Fulong Xu and Shuo Guo and Yu Jason Gu and Qing Cao and Ming Liu and Tian He TPD: Travel Prediction-based Data Forwarding for light-traffic vehicular networks . . . . . . . . . . . . . . . . 166--182 Konglin Zhu and Wenzhong Li and Xiaoming Fu and Lin Zhang Data routing strategies in opportunistic mobile social networks: Taxonomy and open challenges . . . . . . . . . . . . 183--198 Tian Wang and Yiqiao Cai and Weijia Jia and Sheng Wen and Guojun Wang and Hui Tian and Yonghong Chen and Bineng Zhong Maximizing real-time streaming services based on a multi-servers networking framework . . . . . . . . . . . . . . . 199--212 Wei Wang and Linlin Yang and Qian Zhang Privacy preservation in location-based advertising: a contract-based approach 213--224 Xingwei Wang and Dapeng Qu and Min Huang and Keqin Li and Sajal K. Das and Jinhong Zhang and Ruiyun Yu Multiple many-to-many multicast routing scheme in green multi-granularity transport networks . . . . . . . . . . . 225--242
Bart Braem and Felix Freitag and Roger Baig Viñas Community networks . . . . . . . . . . . 243--244 Javier Simo-Reigadas and Esteban Municio and Eduardo Morgado and Eva M. Castro and Andres Martinez and Luis F. Solorzano and Ignacio Prieto-Egido Sharing low-cost wireless infrastructures with telecommunications operators to bring $3$G services to rural communities . . . . . . . . . . . 245--259 Davide Vega and Roger Baig and Llorenç Cerd\`a-Alabern and Esunly Medina and Roc Meseguer and Leandro Navarro A technological overview of the guifi.net community network . . . . . . 260--278 Jernej Kos and Mitar Milutinovi\'c and Luka Cehovin \tt nodewatcher: a substrate for growing your own community network . . . . . . . 279--296 Roger Pueyo Centelles and Victor Oncins and Axel Neumann Enhancing reflection and self-determination in a real-life community mesh network . . . . . . . . . 297--307 Axel Neumann and Ester López and Leandro Navarro Evaluation of mesh routing protocols for wireless community networks . . . . . . 308--323 Christoph Barz and Christoph Fuchs and Jonathan Kirchhoff and Julia Niewiejska and Henning Rogge OLSRv2 for Community Networks: Using Directional Airtime Metric with external radios . . . . . . . . . . . . . . . . . 324--341 Pere Millan and Carlos Molina and Esunly Medina and Davide Vega and Roc Meseguer and Bart Braem and Chris Blondia Time series analysis to predict link quality of wireless community networks 342--358 Ahmed Abujoda and David Dietrich and Panagiotis Papadimitriou and Arjuna Sathiaseelan Software-defined wireless mesh networks for Internet access sharing . . . . . . 359--372 Mennan Selimi and Amin M. Khan and Emmanouil Dimogerontakis and Felix Freitag and Roger Pueyo Centelles Cloud services in the Guifi.net community network . . . . . . . . . . . 373--388 Luca Baldesi and Leonardo Maccari and Renato Lo Cigno Improving P2P streaming in Wireless Community Networks . . . . . . . . . . . 389--403
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Raouf Boutaba and Nelson Fonseca and Dzmitry Kliazovich and Noura Limam Cloud networking and communications II 405--407 Valerio Persico and Pietro Marchetta and Alessio Botta and Antonio Pescap\`e Measuring network throughput in the cloud: the case of Amazon EC2 . . . . . 408--422 Rodrigo S. Couto and Stefano Secci and Miguel Elias M. Campista and Luís Henrique M. K. Costa Server placement with shared backups for disaster-resilient clouds . . . . . . . 423--434 Eleni Kavvadia and Spyros Sagiadinos and Konstantinos Oikonomou and Giorgos Tsioutsiouliklis and Sonia A\"\issa Elastic virtual machine placement in cloud computing network environments . . 435--447 Zhongbao Zhang and Sen Su and Junchi Zhang and Kai Shuang and Peng Xu Energy aware virtual network embedding with dynamic demands: Online and offline 448--459 Ebrahim Ghazisaeedi and Changcheng Huang Energy-aware node and link reconfiguration for virtualized network environments . . . . . . . . . . . . . . 460--479 Yosr Jarraya and Arash Eghtesadi and Sahba Sadri and Mourad Debbabi and Makan Pourzandi Verification of firewall reconfiguration for virtual machines migrations in the cloud . . . . . . . . . . . . . . . . . 480--491 Sahel Sahhaf and Wouter Tavernier and Matthias Rost and Stefan Schmid and Didier Colle and Mario Pickavet and Piet Demeester Network service chaining with optimized network function embedding supporting service decompositions . . . . . . . . . 492--505 Paolo Bellavista and Franco Callegati and Walter Cerroni and Chiara Contoli and Antonio Corradi and Luca Foschini and Alessandro Pernafini and Giuliano Santandrea Virtual network function embedding in real cloud environments . . . . . . . . 506--517 Wenjie Lin and Puneet Sharma and Sarbajit Chatterjee and Deepti Sharma and David Lee and Subu Iyer and Ajay Gupta Scaling persistent connections for cloud services . . . . . . . . . . . . . . . . 518--530 Marcelo Antonio Marotta and Leonardo Roveda Faganello and Matias Artur Klafke Schimuneck and Lisandro Zambenedetti Granville and Juergen Rochol and Cristiano Bonato Both Managing mobile cloud computing considering objective and subjective perspectives . . . . . . . . . . . . . . 531--542 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Anonymous Thank you reviewers . . . . . . . . . . I--IX Ian F. Akyildiz and Harry Rudin Comnet Editorial for 2015 . . . . . . . iii--iv Pedro H. P. Castro and Vívian L. Barreto and Sand Luz Corrêa and Lisandro Zambenedetti Granville and Kleber Vieira Cardoso A joint CPU--RAM energy efficient and SLA-compliant approach for cloud data centers . . . . . . . . . . . . . . . . 1--13 Sebastian Neumayer and Eytan Modiano Network reliability under geographically correlated line and disk failure models 14--28 Margot Deruyck and Emmeric Tanghe and David Plets and Luc Martens and Wout Joseph Optimizing LTE wireless access networks towards power consumption and electromagnetic exposure of human beings 29--40 M. Isabel Sanchez and Antonio de la Oliva and Carlos J. Bernardos Experimental analysis of connectivity management in mobile operating systems 41--61 Huichen Dai and Bin Liu CONSERT: Constructing optimal name-based routing tables . . . . . . . . . . . . . 62--79 Michele Mangili and Fabio Martignon and Antonio Capone Performance analysis of Content-Centric and Content-Delivery networks with evolving object popularity . . . . . . . 80--98 Rosario G. Garroppo and Gianfranco Nencioni and Gregorio Procissi and Luca Tavanti The impact of the access point power model on the energy-efficient management of infrastructured wireless LANs . . . . 99--111 Alaitz Mendiola and Victor Fuentes and Jon Matias and Jasone Astorga and Nerea Toledo and Eduardo Jacob and Maider Huarte An architecture for dynamic QoS management at Layer 2 for DOCSIS access networks using OpenFlow . . . . . . . . 112--128 Tien-Thinh Nguyen and Christian Bonnet DMMS: a flexible architecture for multicast listener support in a distributed mobility management environment . . . . . . . . . . . . . . 129--144 Fikadu B. Degefa and Donghoon Lee and Jiye Kim and Younsung Choi and Dongho Won Performance and security enhanced authentication and key agreement protocol for SAE/LTE network . . . . . . 145--163 Sudeepta Mishra and C. Siva Ram Murthy An efficient location aware distributed physical resource block assignment for dense closed access femtocell networks 164--175 Song Han and Xinbin Li and Zhixin Liu and Xinping Guan Distributed hierarchical game-based algorithm for downlink power allocation in OFDMA femtocell networks . . . . . . 176--188 Panayiotis Kolios and Katerina Papadaki and Vasilis Friderikos Energy efficient mobile video streaming using mobility . . . . . . . . . . . . . 189--204 Riccardo Pecori S-Kademlia: a trust and reputation method to mitigate a Sybil attack in Kademlia . . . . . . . . . . . . . . . . 205--218 Guoqiang Zhang and Ziqu Xu Combing CCN with network coding: an architectural perspective . . . . . . . 219--230 Jianbing Ding and Zhenjie Zhang and Richard T. B. Ma and Yin Yang Auction-based cloud service differentiation with service level objectives . . . . . . . . . . . . . . . 231--249 Qiaoni Han and Bo Yang and Cailian Chen and Xinping Guan Energy-aware and QoS-aware load balancing for HetNets powered by renewable energy . . . . . . . . . . . . 250--262 Federico Patota and Luca Chiaraviglio and Francesco Bella and Vincenzo Deriu and Silvia Fortunato and Francesca Cuomo DAFNES: a distributed algorithm for network energy saving based on stress-centrality . . . . . . . . . . . 263--284 Oscar Mauricio Caicedo Rendon and Felipe Estrada-Solano and Vinicius Guimarães and Liane Margarida Rockenbach Tarouco and Lisandro Zambenedetti Granville Rich dynamic mashments: an approach for network management based on mashups and situation management . . . . . . . . . . 285--306 Melih Onus and Andréa W. Richa Parameterized maximum and average degree approximation in topic-based publish-subscribe overlay network design 307--317 Yang Wang and Qian Hu and Xiaojun Cao A branch-and-price framework for optimal virtual network embedding . . . . . . . 318--326 Elias Bou-Harb and Mourad Debbabi and Chadi Assi A novel cyber security capability: Inferring Internet-scale infections by correlating malware and probing activities . . . . . . . . . . . . . . . 327--343 You-Chiun Wang and Song-Yun Hsieh Service-differentiated downlink flow scheduling to support QoS in long term evolution . . . . . . . . . . . . . . . 344--359 Jie Zhang and Dafang Zhang and Kun Huang and Zheng Qin Minimizing datacenter flow completion times with server-based flow scheduling 360--374 Tzu-Chin Liu and Kuochen Wang and Chia-Yu Ku and Yi-Huai Hsu QoS-aware resource management for multimedia traffic report systems over LTE-A . . . . . . . . . . . . . . . . . 375--389 Stefano Ferretti and Vittorio Ghini and Fabio Panzieri A survey on handover management in mobility architectures . . . . . . . . . 390--413 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Jia Peng and Yanmin Zhu and Wei Shu and Min-You Wu When data contributors meet multiple crowdsourcers: Bilateral competition in mobile crowdsourcing . . . . . . . . . . 1--14 Amira Meharouech and Jocelyne Elias and Ahmed Mehaoua A two-stage game theoretical approach for interference mitigation in Body-to-Body Networks . . . . . . . . . 15--34 Matthias Hartmann and David Hock and Michael Menth Routing optimization for IP networks with loop-free alternates . . . . . . . 35--50 Robson D. A. Timoteo and Lizandro N. Silva and Daniel C. Cunha and George D. C. Cavalcanti An approach using support vector regression for mobile location in cellular networks . . . . . . . . . . . 51--61 Roberto M. Oliveira and Michelle S. P. Facina and Moises V. Ribeiro and Alex B. Vieira Performance evaluation of in-home broadband PLC systems using a cooperative MAC protocol . . . . . . . . 62--76 Stefano Tennina and Olfa Gaddour and Anis Koubâa and Fernando Royo and Mário Alves and Mohamed Abid Z-Monitor: a protocol analyzer for IEEE 802.15.4-based low-power wireless networks . . . . . . . . . . . . . . . . 77--96 Weverton Luis da Costa Cordeiro and Flávio Roberto Santos and Marinho Pilla Barcelos and Luciano Paschoal Gaspary and Hanna Kavalionak and Alessio Guerrieri and Alberto Montresor Making puzzles green and useful for adaptive identity management in large-scale distributed systems . . . . 97--114 Pouya Ostovari and Jie Wu Robust wireless transmission of scalable coded videos using two-dimensional network coding . . . . . . . . . . . . . 115--126 I. Michel Lombera and L. E. Moser and P. M. Melliar-Smith and Y. T. Chuang Corrigendum to ``Peer-to-Peer Publication, Search and Retrieval Using the Android Mobile Platform'' [Computer Networks \bf 65(2014) 56--72] . . . . . 127 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Eirini Eleni Tsiropoulou and Aggelos Kapoukakis and Symeon Papavassiliou Uplink resource allocation in SC-FDMA wireless networks: a survey and taxonomy 1--28 Mohammad Al Mojamed and Mario Kolberg Structured Peer-to-Peer overlay deployment on MANET: a survey . . . . . 29--47 Junichi Nagano and Norihiko Shinomiya Efficient switch clustering for distributed controllers of OpenFlow network with bi-connectivity . . . . . . 48--57 Kyu-Hwan Lee and Jae-Hyun Kim and Sunghyun Cho Power saving mechanism with network coding in the bottleneck zone of multimedia sensor networks . . . . . . . 58--68 Shih-Chun Lin and Pu Wang and Min Luo Jointly optimized QoS-aware virtualization and routing in software defined networks . . . . . . . . . . . . 69--78 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Frederic Raspall Building Nemo, a system to monitor IP routing and traffic paths in real time 1--30 Zubair A. Baig and Sadiq M. Sait and Farid Binbeshr Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks . . . . . 31--47 Jonghoon Kwon and Jehyun Lee and Heejo Lee and Adrian Perrig PsyBoG: a scalable botnet detection method for large-scale DNS traffic . . . 48--73 G. Brandner and U. Schilcher and C. Bettstetter Firefly synchronization with phase rate equalization and its experimental analysis in wireless systems . . . . . . 74--87 Yang Sui and Xiumin Wang and Jin Wang and Lusheng Wang and Saihang Hou Deadline-aware cooperative data exchange with network coding . . . . . . . . . . 88--97 Adelina Madhja and Sotiris Nikoletseas and Theofanis P. Raptis Hierarchical, collaborative wireless energy transfer in sensor networks with multiple Mobile Chargers . . . . . . . . 98--112 Louai Al-Awami and Hossam S. Hassanein Distributed Data Storage Systems for Data Survivability in Wireless Sensor Networks using Decentralized Erasure Cod's . . . . . . . . . . . . . . . . . 113--127 Onkar Bhardwaj and Elliot Anshelevich and Koushik Kar Coalitionally stable pricing schemes for inter-domain forwarding . . . . . . . . 128--146 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Yi Gai and Hua Liu and Bhaskar Krishnamachari A packet dropping mechanism for efficient operation of M/M/1 queues with selfish users . . . . . . . . . . . . . 1--13 Eun Kyung Lee and Hariharasudhan Viswanathan and Dario Pompili RescueNet: Reinforcement-learning-based communication framework for emergency networking . . . . . . . . . . . . . . . 14--28 Changyan Yi and Zhen Zhao and Jun Cai and Ricardo Lobato de Faria and Gong (Michael) Zhang Priority-aware pricing-based capacity sharing scheme for beyond-wireless body area networks . . . . . . . . . . . . . 29--43 Luyao Wang and Kwan-Wu Chin and Sieteng Soh Joint routing and scheduling in multi-Tx/Rx wireless mesh networks with random demands . . . . . . . . . . . . . 44--56 M. Sarper Gokturk and Ozgur Gurbuz and Murat Erman A practical cross layer cooperative MAC framework for WSNs . . . . . . . . . . . 57--71 Mustafa Ilhan Akbas and Gürkan Solmaz and Damla Turgut Molecular geometry inspired positioning for aerial networks . . . . . . . . . . 72--88 Jeroen Avonts and Chris Blondia A framework to compare topology algorithms in multi-channel multi-radio wireless mesh networks . . . . . . . . . 89--108 Muhammad Faisal Amjad and Mainak Chatterjee and Cliff C. Zou Coexistence in heterogeneous spectrum through distributed correlated equilibrium in cognitive radio networks 109--122 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Alexandre Jaron and Andrej Mihailovic and A. H. Aghvami QoS-aware multi-plane routing method for OSPF-based IP access networks . . . . . 1--14 Xu Ding and Xinjiang Sun and Cheng Huang and Xiaobei Wu Cluster-level based link redundancy with network coding in duty cycled relay wireless sensor networks . . . . . . . . 15--36 Gil Einziger and Roy Friedman and Yoav Kantor Shades: Expediting Kademlia's lookup process . . . . . . . . . . . . . . . . 37--50 Xun Xiao and Rui Zhang and Jianping Wang and Chunming Qiao and Kejie Lu An optimal pricing scheme to improve transmission opportunities for a mobile virtual network operator . . . . . . . . 51--65 Chengzhe Lai and Rongxing Lu and Dong Zheng and Hui Li and Xuemin (Sherman) Shen GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications . . . . . . . . . . . . . 66--81 Xiangmao Chang and Jin Wang and Jianping Wang and Kejie Lu and Yi Zhuang On the optimal design of secure network coding against wiretapping attack . . . 82--98 Haithem Al-Mefleh and Osameh Al-Kofahi Taking advantage of jamming in wireless networks: a survey . . . . . . . . . . . 99--124 Fabio R. J. Vieira and José F. de Rezende and Valmir C. Barbosa Scheduling wireless links by vertex multicoloring in the physical interference model . . . . . . . . . . . 125--133 M. Iqbal and M. Naeem and A. Anpalagan and N. N. Qadri and M. Imran Multi-objective optimization in sensor networks: Optimization classification, applications and solution approaches . . 134--161 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Meiqin Tang and Yalin Xin Energy efficient power allocation in cognitive radio network using coevolution chaotic particle swarm optimization . . . . . . . . . . . . . . 1--11 Ahmad Jakalan and Jian Gong and Qi Su and Xiaoyan Hu and Abdeldime M. S. Abdelgder Social relationship discovery of IP addresses in the managed IP networks by observing traffic at network boundary 12--27 Andreas Berger and Alessandro D'Alconzo and Wilfried N. Gansterer and Antonio Pescapé Mining agile DNS traffic using graph analysis for cybercrime detection . . . 28--44 Hongbin Chen and Qiong Zhang and Feng Zhao Energy-efficient joint BS and RS sleep scheduling in relay-assisted cellular networks . . . . . . . . . . . . . . . . 45--54 Sungwook Kim Asymptotic Shapley value based resource allocation scheme for IoT services . . . 55--63 Dionysis Xenakis and Nikos Passas and Lazaros Merakos and Christos Verikoukis Handover decision for small cells: Algorithms, lessons learned and simulation study . . . . . . . . . . . . 64--74 Syed Arefinul Haque and Salekul Islam and Md. Jahidul Islam and Jean-Charles Grégoire An architecture for client virtualization: a case study . . . . . . 75--89 Miguel Eguizábal and Ángela Hernández Joint dynamic resource allocation and load balancing-cell selection in LTE-A HetNet scenarios based on Type 1 inband relay deployments . . . . . . . . . . . 90--109 Ilaria Malanchini and Stefan Valentin and Osman Aydin Wireless resource sharing for multiple operators: Generalization, fairness, and the value of prediction . . . . . . . . 110--123 Gurhan Gunduz and Murat Yuksel Popularity-based scalable peer-to-peer topology growth . . . . . . . . . . . . 124--140 Oran Sharon and Yaron Alpert Coupled IEEE 802.11ac and TCP performance evaluation in various aggregation schemes and Access Categories . . . . . . . . . . . . . . . 141--156 Bruna L. R. Melo and Daniel C. Cunha and Cecilio Pimentel Optimal power distribution in non-binary LDPC code-based cooperative wireless networks . . . . . . . . . . . . . . . . 157--165 Gin-Xian Kok and Chee-Onn Chow and Yi-Han Xu and Hiroshi Ishii Sensor-free route stability metric for mobile ad hoc networks . . . . . . . . . 166--178 Rafael L. Gomes and Luiz F. Bittencourt and Edmundo R. M. Madeira and Eduardo Cerqueira and Mario Gerla Bandwidth-aware allocation of resilient Virtual Software Defined Networks . . . 179--194 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Daqiang Zhang and Jiafu Wan and Ching-Hsien (Robert) Hsu and Ammar Rayes Industrial technologies and applications for the Internet of Things . . . . . . . 1--4 Min Xia and Teng Li and Yunfei Zhang and Clarence W. de Silva Closed-loop design evolution of engineering system using condition monitoring through Internet of Things and cloud computing . . . . . . . . . . 5--18 Guangjie Han and Aihua Qian and Jinfang Jiang and Ning Sun and Li Liu A grid-based joint routing and charging algorithm for industrial wireless rechargeable sensor networks . . . . . . 19--28 Bo Zhang and Chi Harold Liu and Jianyu Lu and Zheng Song and Ziyu Ren and Jian Ma and Wendong Wang Privacy-preserving QoI-aware participant coordination for mobile crowdsourcing 29--41 Ruhul Amin and Sk Hafizul Islam and G. P. Biswas and Muhammad Khurram Khan and Lu Leng and Neeraj Kumar Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks 42--62 M. Mazhar Rathore and Awais Ahmad and Anand Paul and Seungmin Rho Urban planning and building smart cities based on the Internet of Things using Big Data analytics . . . . . . . . . . . 63--80 Xiong Luo and Ji Liu and Dandan Zhang and Xiaohui Chang A large-scale web QoS prediction scheme for the Industrial Internet of Things based on a kernel machine learning algorithm . . . . . . . . . . . . . . . 81--89 Wei Huang and Liangmin Wang ECDS: Efficient collaborative downloading scheme for popular content distribution in urban vehicular networks 90--103 Qiang Liu and Yujun Ma and Musaed Alhussein and Yin Zhang and Limei Peng Green data center with IoT sensing and cloud-assisted smart temperature control system . . . . . . . . . . . . . . . . . 104--112 Kai Lin and Wenjian Wang and Yuanguo Bi and Meikang Qiu and Mohammad Mehedi Hassan Human localization based on inertial sensors and fingerprints in the Industrial Internet of Things . . . . . 113--126 Tie Qiu and Diansong Luo and Feng Xia and Nakema Deonauth and Weisheng Si and Amr Tolba A greedy model with small world for improving the robustness of heterogeneous Internet of Things . . . . 127--143 Linghe Kong and Qiao Xiang and Xue Liu and Xiao-Yang Liu and Xiaofeng Gao and Guihai Chen and Min-You Wu ICP: Instantaneous clustering protocol for wireless sensor networks . . . . . . 144--157 Shiyong Wang and Jiafu Wan and Daqiang Zhang and Di Li and Chunhua Zhang Towards smart factory for industry 4.0: a self-organized multi-agent system with big data based feedback and coordination 158--168 Loizos Kanaris and Akis Kokkinis and Giancarlo Fortino and Antonio Liotta and Stavros Stavrou Sample Size Determination Algorithm for fingerprint-based indoor localization systems . . . . . . . . . . . . . . . . 169--177 Chun-Wei Tsai An effective WSN deployment algorithm via search economics . . . . . . . . . . 178--191 M. Shamim Hossain and Ghulam Muhammad Cloud-assisted Industrial Internet of Things (IIoT) --- Enabled framework for health monitoring . . . . . . . . . . . 192--202 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Hiroaki Yamanaka and Eiji Kawai and Shinji Shimojo A technique for full flow virtualization of multi-tenant OpenFlow networks . . . 1--19 Ke Wang and Teck Yoong Chai and Wai-Choong Wong Routing, power control and rate adaptation: a Q-learning-based cross-layer design . . . . . . . . . . . 20--37 Qahhar Muhammad Qadir and Alexander A. Kist and Zhongwei Zhang A quality of experience-aware cross-layer architecture for optimizing video streaming services . . . . . . . . 38--49 Mehdi Nikkhah Maintaining the progress of IPv6 adoption . . . . . . . . . . . . . . . . 50--69 V. Udaya Sankar and Vinod Sharma QoS provisioning for multiple Femtocells via game theory . . . . . . . . . . . . 70--82 Lukas Malina and Jan Hajny and Radek Fujdiak and Jiri Hosek On perspective of security and privacy-preserving solutions in the Internet of Things . . . . . . . . . . . 83--95 Ahmed Jedda and Mazen G. Khair and Hussein T. Mouftah Decentralized RFID coverage algorithms using writeable tags . . . . . . . . . . 96--108 Bing Li and J. William Atwood Secure receiver access control for IP multicast at the network level: Design and validation . . . . . . . . . . . . . 109--128 Tao Zhao and Tao Li and Biao Han and Zhigang Sun and Jinfeng Huang Design and implementation of Software Defined Hardware Counters for SDN . . . 129--144 Zhixin Liu and Peng Zhang and Xinping Guan and Hongjiu Yang Robust power control for femtocell networks under outage-based QoS constraints . . . . . . . . . . . . . . 145--156 Yingjie Wang and Zhipeng Cai and Guisheng Yin and Yang Gao and Xiangrong Tong and Guanying Wu An incentive mechanism with privacy protection in mobile crowdsourcing systems . . . . . . . . . . . . . . . . 157--171 Bing Xiong and Kun Yang and Jinyuan Zhao and Wei Li and Keqin Li Performance evaluation of OpenFlow-based software-defined networks based on queueing model . . . . . . . . . . . . . 172--185 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
L. Militano and M. Nitti and L. Atzori and A. Iera Enhancing the navigability in a social network of smart objects: a Shapley-value based approach . . . . . . 1--14 Hél\`ene Le Cadre and Jean-Sébastien Bedo Dealing with uncertainty in the smart grid: a learning game approach . . . . . 15--32 Wei Li and Yuwei Wu Tree-based coverage hole detection and healing method in wireless sensor networks . . . . . . . . . . . . . . . . 33--43 Ming-Chieh Lee and Jang-Ping Sheu An efficient routing algorithm based on segment routing in software-defined networking . . . . . . . . . . . . . . . 44--55 Lisheng Ma and Xiaohong Jiang and Bin Wu and Achille Pattavina and Norio Shiratori Probabilistic region failure-aware data center network and content placement . . 56--66 Vasilis Sourlas and Ioannis Psaras and Lorenzo Saino and George Pavlou Efficient Hash-routing and Domain Clustering Techniques for Information-Centric Networks . . . . . . 67--83 Olfa Ben Rhaiem and Lamia Chaari Fourati and Wessam Ajib Network coding-based approach for efficient video streaming over MANET . . 84--100 Sang-Seon Byun TCP over scarce transmission opportunity in cognitive radio networks . . . . . . 101--114 Shiguo Wang and Rukhsana Ruby and Victor C. M. Leung and Zhiqiang Yao Energy-efficient power allocation for multi-user single-AF-relay underlay cognitive radio networks . . . . . . . . 115--128 Sahar Hoteit and Mahmoud El Chamie and Damien Saucez and Stefano Secci On fair network cache allocation to content providers . . . . . . . . . . . 129--142 Oguzhan Erdem Pipelined hierarchical architecture for high performance packet classification 143--164 Víctor M. López Millán and Vicent Cholvi and Antonio Fernández Anta and Luis López Resource location based on precomputed partial random walks in dynamic networks 165--180 Costas K. Constantinou and Georgios Ellinas Heuristic algorithms for efficient allocation of multicast-capable nodes in sparse-splitting optical networks . . . 181--195 A. Socievole and F. De Rango and C. Scoglio and P. Van Mieghem Assessing network robustness under SIS epidemics: the relationship between epidemic threshold and viral conductance 196--206 Keyur Parmar and Devesh C. Jinwala Concealed data aggregation in wireless sensor networks: a comprehensive survey 207--227 Xiapu Luo and Haocheng Zhou and Le Yu and Lei Xue and Yi Xie Characterizing mobile $^*$-box applications . . . . . . . . . . . . . . 228--239 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Vanniyarajan Chellappan and Krishna M. Sivalingam and Kamala Krithivasan A Centrality Entropy Maximization Problem in Shortest Path Routing Networks . . . . . . . . . . . . . . . . 1--15 Yanming Sun and Min Chen and Abel Bacchus and Xiaodong Lin Towards collusion-attack-resilient group key management using one-way function tree . . . . . . . . . . . . . . . . . . 16--26 Ognjen Joldzic and Zoran Djuric and Pavle Vuletic A transparent and scalable anomaly-based DoS detection method . . . . . . . . . . 27--42 Mehmet Karaca and Ozgur Ercetin and Tansu Alpcan Entropy-based active learning for wireless scheduling with incomplete channel feedback . . . . . . . . . . . . 43--54 Yang Wang and Phanvu Chau and Fuyu Chen Towards a secured network virtualization 55--65 Adel Mounir Said and Michel Marot and Ashraf William Ibrahim and Hossam Afifi Modeling interactive real-time applications in VANETs with performance evaluation . . . . . . . . . . . . . . . 66--78 Ashutosh Bhatia and R. C. Hansdah TRM-MAC: a TDMA-based reliable multicast MAC protocol for WSNs with flexibility to trade-off between latency and reliability . . . . . . . . . . . . . . 79--93 Gaofei Huang and Wanqing Tu Optimal resource allocation in wireless-powered OFDM relay networks . . 94--107 Nusrat Mehajabin and Md. Abdur Razzaque and Mohammad Mehedi Hassan and Ahmad Almogren and Atif Alamri Energy-sustainable relay node deployment in wireless sensor networks . . . . . . 108--121 Alysson Bessani and Nuno F. Neves and Paulo Veríssimo and Wagner Dantas and Alexandre Fonseca and Rui Silva and Pedro Luz and Miguel Correia JITeR: Just-in-time application-layer routing . . . . . . . . . . . . . . . . 122--136 Shipra Kumari and Hari Om Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines . . . . . . . . 137--154 D. Yi and H. Yang HEER --- a delay-aware and energy-efficient routing protocol for wireless sensor networks . . . . . . . . 155--173 Mingkui Wei and Wenye Wang Data-centric threats and their impacts to real-time communications in smart grid . . . . . . . . . . . . . . . . . . 174--188 Deyu Zhang and Zhigang Chen and Haibo Zhou and Long Chen and Xuemin (Sherman) Shen Energy-balanced cooperative transmission based on relay selection and power control in energy harvesting wireless sensor network . . . . . . . . . . . . . 189--197 Faqir Zarrar Yousaf and Christian Wietfeld and Sahibzada Ali Mahmud Optimizing tunnel management in predictive handover protocols . . . . . 198--212 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Kiran Yedugundla and Simone Ferlin and Thomas Dreibholz and Özgü Alay and Nicolas Kuhn and Per Hurtig and Anna Brunstrom Is multi-path transport suitable for latency sensitive traffic? . . . . . . . 1--21 Sung-Guk Yoon and Jeong-O Seo and Saewoong Bahk Regrouping algorithm to alleviate the hidden node problem in 802.11ah networks 22--32 Thanh Dinh and Younghan Kim and Tao Gu and Athanasios V. Vasilakos L-MAC: a wake-up time self-learning MAC protocol for wireless sensor networks 33--46 Tianjie Cao and Xiuqing Chen and Robin Doss and Jingxuan Zhai and Lucas J. Wise and Qiang Zhao RFID ownership transfer protocol based on cloud . . . . . . . . . . . . . . . . 47--59 Mohamed-Lamine Messai and Hamida Seba A survey of key management schemes in multi-phase wireless sensor networks . . 60--74 Andrea Bianco and Paolo Giaccone and Marco Ricca Scheduling traffic for maximum switch lifetime in optical data center fabrics 75--88 Chi-Huang Shih and Chun-I Kuo and Yeh-Kai Chou Frame-based forward error correction using content-dependent coding for video streaming applications . . . . . . . . . 89--98 Ngoc-Tu Nguyen and Bing-Hong Liu and Van-Trung Pham and Yi-Sheng Luo On maximizing the lifetime for data aggregation in wireless sensor networks using virtual data aggregation trees . . 99--110 Ling Fu Xie and Peter Han Joo Chong and Ivan Wang-Hei Ho and Henry C. B. Chan Virtual overhearing: an effective way to increase network coding opportunities in wireless ad-hoc networks . . . . . . . . 111--123 Lucas R. Costa and Guilherme N. Ramos and André C. Drummond Leveraging adaptive modulation with multi-hop routing in elastic optical networks . . . . . . . . . . . . . . . . 124--137 Peyman Pahlevani and Hana Khamfroush and Daniel E. Lucani and Morten V. Pedersen and Frank H. P. Fitzek Network coding for hop-by-hop communication enhancement in multi-hop networks . . . . . . . . . . . . . . . . 138--149 Antonios Michaloliakos and Ryan Rogalin and Yonglong Zhang and Konstantinos Psounis and Giuseppe Caire Performance modeling of next-generation WiFi networks . . . . . . . . . . . . . 150--165 Wenzhi Cui and Ye Yu and Chen Qian DiFS: Distributed Flow Scheduling for adaptive switching in FatTree data center networks . . . . . . . . . . . . 166--179 Yao Zhang and Xiaoyou Wang and Adrian Perrig and Zhiming Zheng Tumbler: Adaptable link access in the bots-infested Internet . . . . . . . . . 180--193 Jing Chen and Kun He and Quan Yuan and Ruiying Du and Lina Wang and Jie Wu Distributed Greedy Coding-aware Deterministic Routing for multi-flow in wireless networks . . . . . . . . . . . 194--206 Pantelis A. Frangoudis and George C. Polyzos and Gerardo Rubino Relay-based multipoint content delivery for wireless users in an information-centric network . . . . . . 207--223 Qiao Hu and Lavinia Mihaela Dinca and Anjia Yang and Gerhard Hancke Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization 224--236 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
A. Aguilar-Garcia and R. Barco and S. Fortes Coordinated location-based self-optimization for indoor femtocell networks . . . . . . . . . . . . . . . . 1--16 Ian F. Akyildiz and Shuai Nie and Shih-Chun Lin and Manoj Chandrasekaran 5G roadmap: 10 key enabling technologies 17--48 Filippo Rebecchi and Marcelo Dias de Amorim and Vania Conan Circumventing plateaux in cellular data offloading using adaptive content reinjection . . . . . . . . . . . . . . 49--63 Olga Goussevskaia and Luiz F. M. Vieira and Marcos A. M. Vieira Wireless scheduling with multiple data rates: From physical interference to disk graphs . . . . . . . . . . . . . . 64--76 Yuanyuan Zhang and Mingwei Xu and Ning Wang and Jun Li and Penghan Chen and Fei Liang Compressing IP Forwarding Tables with Small Bounded Update Time . . . . . . . 77--90 Dionysis Xenakis and Nikos Passas and Lazaros Merakos and Christos Verikoukis ANDSF-Assisted vertical handover decisions in the IEEE 802.11/LTE-Advanced network . . . . . . 91--108 Xiaoyan Lu and Eyuphan Bulut and Boleslaw Szymanski Towards limited scale-free topology with dynamic peer participation . . . . . . . 109--121 Jun Zheng and Peng Yang and Jingjing Luo and Qiuming Liu and Li Yu Per-user throughput analysis for secondary users in multi-hop cognitive radio networks . . . . . . . . . . . . . 122--133 Ali Sehati and Majid Ghaderi Network assisted latency reduction for mobile web browsing . . . . . . . . . . 134--150 Hao Xu and Huafei Sun and Yongqiang Cheng and Hao Liu Wireless sensor networks localization based on graph embedding with polynomial mapping . . . . . . . . . . . . . . . . 151--160 L. Boero and M. Cello and C. Garibotto and M. Marchese and M. Mongelli BeaQoS: Load balancing and deadline management of queues in an OpenFlow SDN switch . . . . . . . . . . . . . . . . . 161--170 Minh Tuan Nguyen and Keith A. Teague and Nazanin Rahnavard CCS: Energy-efficient data collection in clustered wireless sensor networks utilizing block-wise compressive sensing 171--185 Michele Mangili and Jocelyne Elias and Fabio Martignon and Antonio Capone Optimal planning of virtual content delivery networks under uncertain traffic demands . . . . . . . . . . . . 186--195 Ting Wang and Mounir Hamdi Presto: Towards efficient online virtual network embedding in virtualized cloud data centers . . . . . . . . . . . . . . 196--208 Fung Po Tso and Simon Jouet and Dimitrios P. Pezaros Network and server resource management strategies for data centre infrastructures: a survey . . . . . . . 209--225 Kyung-Wook Hwang and Vijay Gopalakrishnan and Rittwik Jana and Seungjoon Lee and Vishal Misra and K. K. Ramakrishnan and Dan Rubenstein Joint-family: Adaptive bitrate video-on-demand streaming over peer-to-peer networks with realistic abandonment patterns . . . . . . . . . . 226--244 Dimitris Tsolkas and Nikos Passas and Lazaros Merakos Device discovery in LTE networks: a radio access perspective . . . . . . . . 245--259 Shih-Chun Lin and Pu Wang and Min Luo Control traffic balancing in software defined networks . . . . . . . . . . . . 260--271 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Alessandro D'Alconzo and Pere Barlet-Ros and Kensuke Fukuda and David Choffnes Machine learning, data mining and Big Data frameworks for network monitoring and troubleshooting . . . . . . . . . . 1--4 Arian Baer and Pedro Casas and Alessandro D'Alconzo and Pierdomenico Fiadino and Lukasz Golab and Marco Mellia and Erich Schikuta DBStream: a holistic approach to large-scale network traffic monitoring and analysis . . . . . . . . . . . . . . 5--19 Enrico Bocchi and Ali Safari Khatouni and Stefano Traverso and Alessandro Finamore and Maurizio Munaf\`o and Marco Mellia and Dario Rossi Statistical network monitoring: Methodology and application to carrier-grade NAT . . . . . . . . . . . 20--35 François Espinet and Diana Joumblatt and Dario Rossi Framework, models and controlled experiments for network troubleshooting 36--54 Martin Grill and Tomás Pevný Learning combination of anomaly detectors for security domain . . . . . 55--63 Félix Iglesias and Tanja Zseby Time-activity footprints in IP traffic 64--75 Andra Lutu and Yuba Raj Siwakoti and Özgü Alay and Dziugas Baltrunas and Ahmed Elmokashfi The good, the bad and the implications of profiling mobile broadband coverage 76--93 Zahaib Akhtar and Alefiya Hussain and Ethan Katz-Bassett and Ramesh Govindan DBit: Assessing statistically significant differences in CDN performance . . . . . . . . . . . . . . 94--103 Ondrej Tomanek and Pavol Mulinka and Lukas Kencl Multidimensional cloud latency monitoring and evaluation . . . . . . . 104--120 Stuart E. Middleton and Stefano Modafferi Scalable classification of QoS for real-time interactive applications from IP traffic measurements . . . . . . . . 121--132 Qishan Zhang and Qirong Qiu and Wenzhong Guo and Kun Guo and Naixue Xiong A social community detection algorithm based on parallel grey label propagation 133--143 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Marilia Curado and Ivan Ganchev and Andreas Kassler and Yevgeni Koucheryavy Guest editorial: Special issue on mobile wireless networks . . . . . . . . . . . 145--147 Xiuxiu Wen and Guangsheng Feng and Huiqiang Wang and Hongwu Lv and Junyu Lin An adaptive disorder-avoidance cooperative downloading method . . . . . 148--162 Jose Moura and Christopher Edwards Efficient access of mobile flows to heterogeneous networks under flash crowds . . . . . . . . . . . . . . . . . 163--177 Ólafur Helgason and Sylvia T. Kouyoumdjieva and Ljubica Pajevi\'c and Emre A. Yavuz and Gunnar Karlsson A middleware for opportunistic content distribution . . . . . . . . . . . . . . 178--193 Carlos Anastasiades and Tobias Schmid and Jürg Weber and Torsten Braun Information-centric content retrieval for delay-tolerant networks . . . . . . 194--207 Carlos Anastasiades and Jürg Weber and Torsten Braun Dynamic Unicast: Information-centric multi-hop routing for mobile ad-hoc networks . . . . . . . . . . . . . . . . 208--219 G. E. M. Zhioua and J. Zhang and H. Labiod and N. Tabbane and S. Tabbane A joint active time and flow selection model for cellular content retrieval through ITS . . . . . . . . . . . . . . 220--232 Peng Zhou and Yanheng Liu and Jian Wang and Weiwen Deng and Heekuck Oh Performance analysis of prioritized broadcast service in WAVE/IEEE 802.11p 233--245 Ahmed D. Kora and Brice A. Elono Ongbwa and Jean-Pierre Cances and Vahid Meghdadi Accurate radio coverage assessment methods investigation for 3G/4G networks 246--257 Alexander Dudin and Chesoong Kim and Sergey Dudin and Olga Dudina Analysis and optimization of Guard Channel Policy with buffering in cellular mobile networks . . . . . . . . 258--269 Felipe S. Dantas Silva and Augusto Venâncio Neto and Douglas Maciel and José Castillo-Lema and Flávio Silva and Pedro Frosi and Eduardo Cerqueira An innovative software-defined WiNeMO architecture for advanced QoS-guaranteed mobile service transport . . . . . . . . 270--291 E. Zola and A. J. Kassler Minimizing the impact of the handover for mobile users in WLAN: a study on performance optimization . . . . . . . . 292--303 Mohamed Abdelkrim Senouci and M. Sajid Mushtaq and Said Hoceini and Abdelhamid Mellouk TOPSIS-based dynamic approach for mobile network interface selection . . . . . . 304--314 Bart Jooris and Jan Bauwens and Peter Ruckebusch and Peter De Valck and Christophe Van Praet and Ingrid Moerman and Eli De Poorter TAISC: a cross-platform MAC protocol compiler and execution engine . . . . . 315--326 Aleksandr Ometov and Antonino Orsino and Leonardo Militano and Giuseppe Araniti and Dmitri Moltchanov and Sergey Andreev A novel security-centric framework for D2D connectivity based on spatial and social proximity . . . . . . . . . . . . 327--338 Afonso Oliveira and Teresa Vazão Low-power and lossy networks under mobility: a survey . . . . . . . . . . . 339--352 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Alia Asheralieva and Yoshikazu Miyanaga Effective resource block allocation procedure for quality of service provisioning in a single-operator heterogeneous LTE-A network . . . . . . 1--14 Nasrin Taherkhani and Samuel Pierre Prioritizing and scheduling messages for congestion control in vehicular ad hoc networks . . . . . . . . . . . . . . . . 15--28 Xianfu Meng and Shuang Ren An outlier mining-based malicious node detection model for hybrid P2P networks 29--39 Molka Gharbaoui and Barbara Martini and Carol. J. Fung and Francesco Paolucci and Alessio Giorgetti and Piero Castoldi An incentive-compatible and trust-aware multi-provider path computation element (PCE) . . . . . . . . . . . . . . . . . 40--54 Carlos Pereira and Ana Aguiar and Daniel E. Lucani When are network coding based dynamic multi-homing techniques beneficial? . . 55--65 S. Sciancalepore and G. Piro and E. Vogli and G. Boggia and L. A. Grieco and G. Cavone LICITUS: a lightweight and standard compatible framework for securing layer-2 communications in the IoT . . . 66--77 Mohamed Abu Sharkh and Ali Kanso and Abdallah Shami and Peter Öhlén Building a cloud on Earth: a study of cloud computing data center simulators 78--96 Soodeh Hosseini and Mohammad Abdollahi Azgomi A model for malware propagation in scale-free networks based on rumor spreading process . . . . . . . . . . . 97--107 Xianda Chen and Kyung Tae Kim and Hee Yong Youn Integration of Markov random field with Markov chain for efficient event detection using wireless sensor network 108--119 Feng Li and Jun Luo and Shiqing Xin and Ying He Autonomous deployment of wireless sensor networks for optimal coverage with directional sensing model . . . . . . . 120--132 Sabrina Sicari and Alessandra Rizzardi and Daniele Miorandi and Cinzia Cappiello and Alberto Coen-Porisini Security policy enforcement for networked smart objects . . . . . . . . 133--147 Chen-Khong Tham and Wen Sun A spatio-temporal incentive scheme with consumer demand awareness for participatory sensing . . . . . . . . . 148--159 Armir Bujari and Andrea Marin and Claudio E. Palazzi and Sabina Rossi Analysis of ECN/RED and SAP-LAW with simultaneous TCP and UDP traffic . . . . 160--170 Mariusz Glabowski and Adam Kaliszan and Maciej Stasiak Modelling overflow systems with distributed secondary resources . . . . 171--183 Tram Truong-Huu and Mohan Gurusamy and Vishal Girisagar Dynamic embedding of workflow requests for bandwidth efficiency in data centers 184--198 Kübra Kalkan and Fatih Alagöz A distributed filtering mechanism against DDoS attacks: ScoreForCore . . . 199--209 Tassos Dimitriou and Ebrahim A. Alrashed and Mehmet Hakan Karaata and Ali Hamdan Imposter detection for replication attacks in mobile sensor networks . . . 210--222 Moumita Patra and C. Siva Ram Murthy Piggybacking assisted many-to-many communication with efficient vehicle selection for improved performance in vehicular ad hoc networks . . . . . . . 223--232 Robert Wójcik and Jerzy Domzal and Zbigniew Duli\'nski and Grzegorz Rzym and Andrzej Kamisi\'nski and Piotr Gawlowicz and Piotr Jurkiewicz and Jacek Rzasa and Rafal Stankiewicz and Krzysztof Wajda A survey on methods to provide interdomain multipath transmissions . . 233--259 Rihab Chaâri and Fatma Ellouze and Anis Koubâa and Basit Qureshi and Nuno Pereira and Habib Youssef and Eduardo Tovar Cyber-physical systems clouds: a survey 260--278 M. Gharbaoui and B. Martini and D. Adami and S. Giordano and P. Castoldi Cloud and network orchestration in SDN data centers: Design principles and performance evaluation . . . . . . . . . 279--295 Wayan Damayanti and Sanghyun Kim and Ji-Hoon Yun Collision chain mitigation and hidden device-aware grouping in large-scale IEEE 802.11ah networks . . . . . . . . . 296--306 Cristian Hernandez Benet and Andreas Kassler and Enrica Zola Predicting expected TCP throughput using genetic algorithm . . . . . . . . . . . 307--322 Emrah Cem and Kamil Sarac Estimation of structural properties of online social networks at the extreme 323--344 Siguang Chen and Chuanxin Zhao and Meng Wu and Zhixin Sun and Haijun Zhang and Victor C. M. Leung Compressive network coding for wireless sensor networks: Spatio-temporal coding and optimization design . . . . . . . . 345--356 Jan Plachy and Zdenek Becvar and Pavel Mach Path selection enabling user mobility and efficient distribution of data for computation at the edge of mobile network . . . . . . . . . . . . . . . . 357--370 Afraa Khalifah and Nadine Akkari and Ghadah Aldabbagh and Nikos Dimitriou Hybrid femto/macro rate-based offloading for high user density networks . . . . . 371--380 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Gerhard Hancke and Aikaterini Mitrokotsa and Reihaneh Safavi-Naini and Damien Sauveron Special issue on recent advances in physical-layer security . . . . . . . . 1--3 Nguyen Xuan Quyen and Trung Q. Duong and Nguyen-Son Vo and Qingqing Xie and Lei Shu Chaotic direct-sequence spread-spectrum with variable symbol period: a technique for enhancing physical layer security 4--12 Pedro H. J. Nardelli and Hirley Alves and Carlos H. M. de Lima and Matti Latva-aho Throughput maximization in multi-hop wireless networks under a secrecy constraint . . . . . . . . . . . . . . . 13--20 Giulio Aliberti and Roberto Di Pietro and Stefano Guarino Reliable and perfectly secret communication over the generalized Ozarow--Wyner's wire-tap channel . . . . 21--30 Nils Ole Tippenhauer and Kasper Bonne Rasmussen and Srdjan Capkun Physical-layer integrity for wireless messages . . . . . . . . . . . . . . . . 31--38 Nikolaos E. Petroulakis and George Spanoudakis and Ioannis G. Askoxylakis Patterns for the design of secure and dependable software defined networks . . 39--49 Suman Bhunia and Vahid Behzadan and Paulo Alexandre Regis and Shamik Sengupta Adaptive beam nulling in multihop ad hoc networks against a jammer in motion . . 50--66 Il-Gu Lee and Myungchul Kim Persistent jamming in wireless local area networks: Attack and defense . . . 67--83 Christopher Huth and René Guillaume and Thomas Strohm and Paul Duplys and Irin Ann Samuel and Tim Güneysu Information reconciliation schemes in physical-layer security: a survey . . . 84--104 Christian T. Zenger and Mario Pietersz and Jan Zimmer and Jan-Felix Posielek and Thorben Lenze and Christof Paar Authenticated key establishment for low-resource devices exploiting correlated random channels . . . . . . . 105--123 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Michela Meo and Sabine Wittevrongel Traffic and performance in the big data era . . . . . . . . . . . . . . . . . . 125--126 Mirco Marchetti and Fabio Pierazzi and Michele Colajanni and Alessandro Guido Analysis of high volumes of network traffic for Advanced Persistent Threat detection . . . . . . . . . . . . . . . 127--141 Enrico Bocchi and Luigi Grimaudo and Marco Mellia and Elena Baralis and Sabyasachi Saha and Stanislav Miskovic and Gaspar Modelo-Howard and Sung-Ju Lee MAGMA network behavior classifier for malware traffic . . . . . . . . . . . . 142--156 Gaurav Somani and Manoj Singh Gaur and Dheeraj Sanghi and Mauro Conti DDoS attacks in cloud computing: Collateral damage to non-targets . . . . 157--171 Taejin Ha and Sunghwan Kim and Namwon An and Jargalsaikhan Narantuya and Chiwook Jeong and JongWon Kim and Hyuk Lim Suspicious traffic sampling for intrusion detection in software-defined networks . . . . . . . . . . . . . . . . 172--182 Glauber D. Gonçalves and Idilio Drago and Alex B. Vieira and Ana Paula Couto da Silva and Jussara M. Almeida and Marco Mellia Workload models and performance evaluation of cloud storage services . . 183--199 Hadrien Hours and Ernst Biersack and Patrick Loiseau and Alessandro Finamore and Marco Mellia A study of the impact of DNS resolvers on CDN performance using a causal approach . . . . . . . . . . . . . . . . 200--210 Florian Wamser and Pedro Casas and Michael Seufert and Christian Moldovan and Phuoc Tran-Gia and Tobias Hossfeld Modeling the YouTube stack: From packets to quality of experience . . . . . . . . 211--224 T. Bonald and C. Comte The multi-source model for dimensioning data networks . . . . . . . . . . . . . 225--233 Jan Willem Kleinrouweler and Sergio Cabrero and Rob van der Mei and Pablo Cesar A model for evaluating sharing policies for network-assisted HTTP adaptive streaming . . . . . . . . . . . . . . . 234--245 Florian Metzger and Eirini Liotou and Christian Moldovan and Tobias Hoßfeld TCP video streaming and mobile networks: Not a love story, but better with context . . . . . . . . . . . . . . . . 246--256 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Jin Wang and Jing Ren and Kejie Lu and Jianping Wang and Shucheng Liu and Cedric Westphal A minimum cost cache management framework for information-centric networks with network coding . . . . . . 1--17 Si Quoc Viet Trang and Emmanuel Lochin FLOWER, an innovative Fuzzy Lower-than-Best-Effort transport protocol . . . . . . . . . . . . . . . . 18--30 Meng Chen and Mingwei Xu and Qing Li and Yuan Yang Measurement of large-scale BGP events: Definition, detection, and analysis . . 31--45 Yuqi Fan and Hongli Ding and Lusheng Wang and Xiaojing Yuan Green latency-aware data placement in data centers . . . . . . . . . . . . . . 46--57 Yu Wang and Mehul Motani and Hari Krishna Garg and Xin Kang and Qian Chen Throughput maximization for cooperative 60 GHz wireless personal area networks 58--68 Yi Guo and Haixin Duan and Jikun Chen and Fu Miao MAF-SAM: an effective method to perceive data plane threats of inter domain routing system . . . . . . . . . . . . . 69--78 Sungwook Kim Cognitive hierarchy thinking based behavioral game model for IoT power control algorithm . . . . . . . . . . . 79--90 Jianbiao Mao and Biao Han and Zhigang Sun and Xicheng Lu and Ziwen Zhang Efficient mismatched packet buffer management with packet order-preserving for OpenFlow networks . . . . . . . . . 91--103 Giovanna Carofiglio and Massimo Gallo and Luca Muscariello Optimal multipath congestion control and request forwarding in information-centric networks: Protocol design and experimentation . . . . . . . 104--117 Allan M. de Souza and R. S. Yokoyama and Azzedine Boukerche and Guilherme Maia and Eduardo Cerqueira and Antonio A. F. Loureiro and Leandro Aparecido Villas ICARUS: Improvement of traffic Condition through an Alerting and Re-routing System . . . . . . . . . . . . . . . . . 118--132 Giovanna Carofiglio and Léonce Mekinda and Luca Muscariello Joint forwarding and caching with latency awareness in information-centric networking . . . . . . . . . . . . . . . 133--153 Heitor S. Ramos and Azzedine Boukerche and Alyson L. C. Oliveira and Alejandro C. Frery and Eduardo M. R. Oliveira and Antonio A. F. Loureiro On the deployment of large-scale wireless sensor networks considering the energy hole problem . . . . . . . . . . 154--167 Arslan Ahmad and Alessandro Floris and Luigi Atzori QoE-centric service delivery: a collaborative approach among OTTs and ISPs . . . . . . . . . . . . . . . . . . 168--179 V. V. Mandhare and V. R. Thool and R. R. Manthalkar QoS Routing enhancement using metaheuristic approach in mobile ad-hoc network . . . . . . . . . . . . . . . . 180--191 Husnu S. Narman and Mohammed Atiquzzaman and Mehdi Rahmani-andebili and Haiying Shen Joint and selective periodic component carrier assignment for LTE-A . . . . . . 192--205 Esmaeil Nik Maleki and Ghasem Mirjalily Fault-tolerant interference-aware topology control in multi-radio multi-channel wireless mesh networks . . 206--222 Luca Valcarenghi and Koteswararao Kondepu and Piero Castoldi Delay fairness in reconfigurable and energy efficient TWDM PON . . . . . . . 223--231 Sudip Misra and Samaresh Bera and Tamoghna Ojha and Hussein T. Mouftah and Alagan Anpalagan ENTRUST: Energy trading under uncertainty in smart grid systems . . . 232--242 Xin Li and Haotian Wu and Don Gruenbacher and Caterina Scoglio and Tricha Anjali Efficient routing for middlebox policy enforcement in software-defined networking . . . . . . . . . . . . . . . 243--252 Jinho Lee and Jaehoon (Paul) Jeong and David H. C. Du Two-way traffic link delay modeling in vehicular networks . . . . . . . . . . . 253--265 Yuemei Xu and Song Ci and Yang Li and Tao Lin and Gang Li Design and evaluation of coordinated in-network caching model for content centric networking . . . . . . . . . . . 266--283 Tashnim J. S. Chowdhury and Colin Elkin and Vijay Devabhaktuni and Danda B. Rawat and Jared Oluoch Advances on localization techniques for wireless sensor networks: a survey . . . 284--305 Xenofon Vasilakos and Vasilios A. Siris and George C. Polyzos Addressing niche demand based on joint mobility prediction and content popularity caching . . . . . . . . . . . 306--323 Kun Xie and Jiannong Cao and Xin Wang and Jigang Wen Pre-scheduled handoff for service-aware and seamless Internet access . . . . . . 324--337 Nguyen Xuan Tien and Semog Kim and Jong Myung Rhee A novel ring-based dual paths approach for reducing redundant traffic in HSR networks . . . . . . . . . . . . . . . . 338--350 Run Ye and Azzedine Boukerche and Houjun Wang and Xiaojia Zhou and Bin Yan RECODAN: an efficient redundancy coding-based data transmission scheme for wireless sensor networks . . . . . . 351--363 Yang Xu and Yong Liu and Rahul Singh and Shu Tao SDN state inconsistency verification in openstack . . . . . . . . . . . . . . . 364--376 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
A. Socievole and A. Ziviani and F. De Rango and A. V. Vasilakos and E. Yoneki Cyber-physical systems for Mobile Opportunistic Networking in Proximity (MNP) . . . . . . . . . . . . . . . . . 1--5 Kassio Machado and Azzedine Boukerche and Pedro O. S. Vaz de Melo and Eduardo Cerqueira and Antonio A. F. Loureiro Pervasive forwarding mechanism for mobile social networks . . . . . . . . . 6--16 Jingwei Miao and Omar Hasan and Sonia Ben Mokhtar and Lionel Brunie and Ammar Hasan 4PR: Privacy preserving routing in mobile delay tolerant networks . . . . . 17--28 Victor Ramiro and Emmanuel Lochin and Patrick Sénac Characterization and applications of temporal random walks on opportunistic networks . . . . . . . . . . . . . . . . 29--44 Enrique Hernández-Orallo and Marina Murillo-Arcila and Carlos T. Calafate and Juan Carlos Cano and J. Alberto Conejero and Pietro Manzoni Analytical evaluation of the performance of contact-based messaging applications 45--54 Carlos Oberdan Rolim and Anubis G. Rossetto and Valderi R. Q. Leithardt and Guilherme A. Borges and Cláudio F. R. Geyer and Tatiana F. M. dos Santos and Adriano M. Souza Situation awareness and computational intelligence in opportunistic networks to support the data transmission of urban sensing applications . . . . . . . 55--70 Xiao Chen and Charles Shang and Britney Wong and Wenzhong Li and Suho Oh Efficient Multicast Algorithms in Opportunistic Mobile Social Networks using Community and Social Features . . 71--81 Adrian Holzer and Sven Reber and Jonny Quarta and Jorge Mazuze and Denis Gillet Padoc: Enabling social networking in proximity . . . . . . . . . . . . . . . 82--92 Okan Turkes and Hans Scholten and Paul J. M. Havinga Cocoon: a lightweight opportunistic networking middleware for community-oriented smart mobile applications . . . . . . . . . . . . . . 93--108 Marc-Olivier Killijian and Roberto Pasqua and Matthieu Roy and Gilles Trédan and Christophe Zanon Souk: Spatial Observation of Human Kinetics . . . . . . . . . . . . . . . . 109--119 Cristian-Octavian Ojog and Radu-Corneliu Marin and Radu-Ioan Ciobanu and Ciprian Dobre Multi-criteria optimization of wireless connectivity over sparse networks . . . 120--128 Thiago Rodrigues Oliveira and Cristiano M. Silva and Daniel F. Macedo and José Marcos S. Nogueira SNVC: Social Networks for Vehicular Certification . . . . . . . . . . . . . 129--140 L. Militano and A. Orsino and G. Araniti and M. Nitti and L. Atzori and A. Iera Trust-based and social-aware coalition formation game for multihop data uploading in 5G systems . . . . . . . . 141--151 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Anonymous Editorial for Computer Networks Journal 2016 . . . . . . . . . . . . . . . . . . iii--iii Giulia Mauri and Giacomo Verticale Up-to-date key retrieval for information centric networking . . . . . . . . . . . 1--11 Yi Zhang and Michela Meo and Raffaella Gerboni and Marco Ajmone Marsan Minimum cost solar power systems for LTE macro base stations . . . . . . . . . . 12--23 Jianxin Liao and Haifeng Sun and Jingyu Wang and Qi Qi and Kai Li and Tonghong Li Density cluster based approach for controller placement problem in large-scale software defined networkings 24--35 Lyno Henrique G. Ferraz and Rafael Laufer and Diogo M. F. Mattos and Otto Carlos M. B. Duarte and Guy Pujolle A high-performance Two-Phase Multipath scheme for data-center networks . . . . 36--51 Nagao Ogino and Takeshi Kitahara and Shin'ichi Arakawa and Masayuki Murata Virtual network embedding with multiple priority classes sharing substrate resources . . . . . . . . . . . . . . . 52--66 Valerio Persico and Alessio Botta and Pietro Marchetta and Antonio Montieri and Antonio Pescapé On the performance of the wide-area networks interconnecting public-cloud datacenters around the globe . . . . . . 67--83 Meng Zheng and Chi Xu and Wei Liang and Haibin Yu and Lin Chen Time-efficient cooperative spectrum sensing via analog computation over multiple-access channel . . . . . . . . 84--94 Meng-Shiuan Pan and Shu-Wei Yang A lightweight and distributed geographic multicast routing protocol for IoT applications . . . . . . . . . . . . . . 95--107 Mustafa Ismael Salman and Muntadher Qasim Abdulhasan and Chee Kyun Ng and Nor Kamariah Noordin and Borhanuddin Mohd Ali and Aduwati Sali A partial feedback reporting scheme for LTE mobile video transmission with QoS provisioning . . . . . . . . . . . . . . 108--121 Ahmed Abdelsalam and Michele Luglio and Cesare Roseti and Francesco Zampognaro TCP Wave: a new reliable transport approach for future Internet . . . . . . 122--143 Emmanuel Ndashimye and Sayan K. Ray and Nurul I. Sarkar and Jairo A. Gutiérrez Vehicle-to-infrastructure communication over multi-tier heterogeneous networks: a survey . . . . . . . . . . . . . . . . 144--166 Jinfa Yao and Baoqun Yin and Xiaobin Tan and Xiaofeng Jiang A POMDP framework for forwarding mechanism in named data networking . . . 167--175 Eduardo Mucelli Rezende Oliveira and Aline Carneiro Viana and K. P. Naveen and Carlos Sarraute Mobile data traffic modeling: Revealing temporal facets . . . . . . . . . . . . 176--193 Cong Xu and Jiahai Yang and Kevin Yin and Hui Yu Optimal construction of virtual networks for Cloud-based MapReduce workflows . . 194--207 Pablo Adasme and Rafael Andrade and Abdel Lisser Minimum cost dominating tree sensor networks under probabilistic constraints 208--222 Cheng Ren and Sheng Wang and Jing Ren and Weizhong Qian and Xiaoning Zhang and Jie Duan Energy-efficient virtual topology design in IP over WDM mesh networks . . . . . . 223--236 Aafaf Ouaddah and Hajar Mousannif and Anas Abou Elkalam and Abdellah Ait Ouahman Access control in the Internet of Things: Big challenges and new opportunities . . . . . . . . . . . . . 237--262 Qiufen Xia and Weifa Liang and Zichuan Xu The operational cost minimization in distributed clouds via community-aware user data placements of social networks 263--278 Murat Karakus and Arjan Durresi A survey: Control plane scalability issues and approaches in Software-Defined Networking (SDN) . . . 279--293 Behnaz Bostanipour and Beno\^\it Garbinato A neighbor detection algorithm based on multiple virtual mobile nodes for mobile ad hoc networks . . . . . . . . . . . . 294--313 Zhibo Wang and Honglong Chen and Qing Cao and Hairong Qi and Zhi Wang and Qian Wang Achieving location error tolerant barrier coverage for wireless sensor networks . . . . . . . . . . . . . . . . 314--328 Ben-Jye Chang and Gunag-Jie Jhang Minimizing contention collision probability and guaranteeing packet delay for cloud big data transmissions in 4G LTE-A packet random access . . . . 329--344 Ebrahim Ghazisaeedi and Changcheng Huang GreenMap: Green mapping of MapReduce-based virtual networks onto a data center network and managing incast queueing delay . . . . . . . . . . . . . 345--359 Shaowei Liu and Weimin Lei and Wei Zhang and Yunchong Guan CMT--SR: a selective retransmission based concurrent multipath transmission mechanism for conversational video . . . 360--371 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Liudong Zuo and Michelle M. Zhu and Chase Q. Wu and Jason Zurawski Fault-tolerant bandwidth reservation strategies for data transfers in high-performance networks . . . . . . . 1--16 Mehmet Fatih Tuysuz and Murat Uçan Energy-aware network/interface selection and handover application for Android-based mobile devices . . . . . . 17--28 Alejandro Erickson and Iain A. Stewart and Javier Navaridas and Abbas E. Kiasari The stellar transformation: From interconnection networks to datacenter networks . . . . . . . . . . . . . . . . 29--45 Wilfried Yoro and Tijani Chahed and Mamdouh El-Tabach and Taoufik En-Najjary and Azeddine Gati Service-oriented sharing of energy in wireless access networks using Shapley value . . . . . . . . . . . . . . . . . 46--57 Konstantinos Deltouzos and Spyros Denazis Tackling energy and battery issues in mobile P2P VoD systems . . . . . . . . . 58--71 Yan Yan and Baoxian Zhang and Cheng Li Opportunistic network coding based cooperative retransmissions in D2D communications . . . . . . . . . . . . . 72--83 M. Itani and S. Sharafeddine and I. Elkabani Dynamic single node failure recovery in distributed storage systems . . . . . . 84--93 Christoforos Panos and Christoforos Ntantogian and Stefanos Malliaros and Christos Xenakis Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks . . . . . . 94--110 Jenq-Shiou Leu and Min-Chieh Yu and Chun-Yao Liu and Alrezza Pradanta Bagus Budiarsa and Vincent Utomo Energy efficient streaming for smartphone by video adaptation and backlight control . . . . . . . . . . . 111--123 Sokratis Barmpounakis and Alexandros Kaloxylos and Panagiotis Spapis and Nancy Alonistioti Context-aware, user-driven, network-controlled RAT selection for 5G networks . . . . . . . . . . . . . . . . 124--147 Bitan Banerjee and Anand Seetharam and Amitava Mukherjee and Mrinal Kanti Naskar Characteristic time routing in information centric networks . . . . . . 148--158 João Taveira Araujo and Raul Landa and Richard G. Clegg and George Pavlou and Kensuke Fukuda On rate limitation mechanisms for TCP throughput: a longitudinal analysis . . 159--175 Jeffrey Lai and Qiang Fu and Tim Moors Using SDN and NFV to enhance request rerouting in ISP-CDN collaborations . . 176--187 Mehmet Fatih Tuysuz and Zekiye Kubra Ankarali and Didem Gözüpek A survey on energy efficiency in software defined networks . . . . . . . 188--204 Joshua Stein and Han Hee Song and Mario Baldi and Jun Li On the most representative summaries of network user activities . . . . . . . . 205--217 Uzzam Javed and Azeem Iqbal and Saad Saleh and Syed Ali Haider and Muhammad U. Ilyas A stochastic model for transit latency in OpenFlow SDNs . . . . . . . . . . . . 218--229 Junling Shi and Xingwei Wang and Min Huang and Keqin Li and Sajal K. Das Social-based routing scheme for fixed-line VANET . . . . . . . . . . . . 230--243 Abdur Rahim Mohammad Forkan and Ibrahim Khalil and Mohammed Atiquzzaman ViSiBiD: a learning model for early discovery and real-time prediction of severe clinical events using vital signs as big data . . . . . . . . . . . . . . 244--257 Carlos Vega and Paula Roquero and Javier Aracil Multi-Gbps HTTP traffic analysis in commodity hardware based on local knowledge of TCP streams . . . . . . . . 258--268 Mohammed Gharib and Zahra Moradlou and Mohammed Ali Doostari and Ali Movaghar Fully distributed ECC-based key management for mobile ad hoc networks 269--283 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Xuetao Wei and Nicholas C. Valler and Harsha V. Madhyastha and Iulian Neamtiu and Michalis Faloutsos Characterizing the behavior of handheld devices and its implications . . . . . . 1--12 Le\"\ila Gazzah and Le\"\ila Najjar Trade-off between node selection and space diversity for accurate uncooperative localization . . . . . . . 13--22 Eduardo Moreno and Alejandra Beghelli and Filippo Cugini Traffic engineering in segment routing networks . . . . . . . . . . . . . . . . 23--31 Madhusanka Liyanage and An Braeken and Anca Delia Jurcut and Mika Ylianttila and Andrei Gurtov Secure communication channel architecture for Software Defined Mobile Networks . . . . . . . . . . . . . . . . 32--50 Reem E. Mohemed and Ahmed I. Saleh and Maher Abdelrazzak and Ahmed S. Samra Energy-efficient routing protocols for solving energy hole problem in wireless sensor networks . . . . . . . . . . . . 51--66 Xin Kang and Jing Yang Viewing experience optimization for peer-to-peer streaming networks with credit-based incentive mechanisms . . . 67--79 Linfeng Liu and Ping Wang and Ran Wang Propagation control of data forwarding in opportunistic underwater sensor networks . . . . . . . . . . . . . . . . 80--94 Selma Khebbache and Makhlouf Hadji and Djamal Zeghlache Virtualized network functions chaining and routing algorithms . . . . . . . . . 95--110 Julia Klier and Mathias Klier and Alexander Richter and Rolf T. Wigand Special issue on social media networks in business . . . . . . . . . . . . . . 111--113 Libo Li and Frank Goethals and Bart Baesens and Monique Snoeck Predicting software revision outcomes on GitHub using structural holes theory . . 114--124 Benjamin Wehner and Christian Ritter and Susanne Leist Enterprise social networks: a literature review and research agenda . . . . . . . 125--142 Stoney Brooks and Christopher Califf Social media-induced technostress: Its impact on the job performance of it professionals and the moderating role of job characteristics . . . . . . . . . . 143--153 Haishuai Wang and Jia Wu and Shirui Pan and Peng Zhang and Ling Chen Towards large-scale social networks with online diffusion provenance detection 154--166 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Abhishek Sinha and Pradeepkumar Mani and Jie Liu and Ashley Flavel and Dave Maltz Distributed load management algorithms in anycast-based CDNs . . . . . . . . . 1--15 Ben-Jye Chang and Syuan-Hong Liou Adaptive cooperative communication for maximizing reliability and reward in ultra-dense small cells LTE-A toward 5G cellular networking . . . . . . . . . . 16--28 Salvatore D'Oro and Laura Galluccio and Panayotis Mertikopoulos and Giacomo Morabito and Sergio Palazzo Auction-based resource allocation in OpenFlow multi-tenant networks . . . . . 29--41 Rui Wang and Suixiang Gao and Wenguo Yang and Zhipeng Jiang Energy aware routing with link disjoint backup paths . . . . . . . . . . . . . . 42--53 Sangkyu Park and Hyunjoong Lee and Chan-Byoung Chae and Saewoong Bahk Massive MIMO operation in partially centralized cloud radio access networks 54--64 Udo Schilcher and Günther Brandner and Christian Bettstetter Quantifying inhomogeneity of spatial point patterns . . . . . . . . . . . . . 65--81 Tsung-Yu Tsai and Yi-Hsueh Tsai and Zsehong Tsai and Shiann-Tsong Sheu A Novel Description approach based on sorted rectangles for scheduling information bearing in OFDMA systems . . 82--99 Jing Wang and Jian Tang and Guoliang Xue and Dejun Yang Towards energy-efficient task scheduling on smartphones in mobile crowd sensing systems . . . . . . . . . . . . . . . . 100--109 Wai-Xi Liu and Shun-Zheng Yu and Guang Tan and Jun Cai Information-centric networking with built-in network coding to achieve multisource transmission at network-layer . . . . . . . . . . . . . 110--128 Julio Soto and Michele Nogueira Corrigendum to ``A framework for resilient and secure spectrum sensing on cognitive radio networks'' [Computer Networks volume \bf 79 (2015) 313--322] 129--129 Julio Soto and Michele Nogueira A framework for resilient and secure spectrum sensing on cognitive radio networks . . . . . . . . . . . . . . . . 130--138 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Matthieu Coudron and Stefano Secci An implementation of multipath TCP in \tt ns3 . . . . . . . . . . . . . . . . 1--11 Douglas C. MacFarland and Craig A. Shue and Andrew J. Kalafut The best bang for the byte: Characterizing the potential of DNS amplification attacks . . . . . . . . . 12--21 Gloria Ciavarrini and Valerio Luconi and Alessio Vecchio Smartphone-based geolocation of Internet hosts . . . . . . . . . . . . . . . . . 22--32 Roberto Di Pietro and Gabriele Oligeri Enabling broadcast communications in presence of jamming via probabilistic pairing . . . . . . . . . . . . . . . . 33--46 Purnima Murali Mohan and Tram Truong-Huu and Mohan Gurusamy Fault tolerance in TCAM-limited software defined networks . . . . . . . . . . . . 47--62 Geng Sun and Yanheng Liu and Ming Yang and Aimin Wang and Shuang Liang and Ying Zhang Coverage optimization of VLC in smart homes based on improved cuckoo search algorithm . . . . . . . . . . . . . . . 63--78 Nasreen Anjum and Dmytro Karamshuk and Mohammad Shikh-Bahaei and Nishanth Sastry Survey on peer-assisted content delivery networks . . . . . . . . . . . . . . . . 79--95 Sunny Behal and Krishan Kumar Detection of DDoS attacks and flash events using novel information theory metrics . . . . . . . . . . . . . . . . 96--110 Mohamed Koub\`aa and Maroua Bakri and Ammar Bouall\`egue and Maurice Gagnaire QoT-aware elastic bandwidth allocation and spare capacity assignment in flexible island-based optical transport networks under shared risk link group constraints . . . . . . . . . . . . . . 111--140 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Reza Malekian and Kui Wu and Gianluca Reali and Ning Ye and Kevin Curran Cyber-physical systems and context-aware sensing and computing . . . . . . . . . 1--4 Shu-Yu Kuo and Yao-Hsin Chou and Chi-Yuan Chen Quantum-inspired algorithm for cyber-physical visual surveillance deployment systems . . . . . . . . . . . 5--18 Wenlin Han and Yang Xiao A novel detector to detect colluded non-technical loss frauds in smart grid 19--31 Xu Zhang and Mi Wen and Kejie Lu and Jingsheng Lei A privacy-aware data dissemination scheme for smart grid with abnormal data traceability . . . . . . . . . . . . . . 32--41 Guoming Tang and Zhen Ling and Fengyong Li and Daquan Tang and Jiuyang Tang Occupancy-aided energy disaggregation 42--51 David Rodriguez-Lozano and Juan A. Gomez-Pulido and Jose M. Lanza-Gutierrez and Arturo Duran-Dominguez and Ramon A. Fernandez-Diaz Context-aware prediction of access points demand in Wi-Fi networks . . . . 52--61 Abdelrahman Abuarqoub and Mohammad Hammoudeh and Bamidele Adebisi and Sohail Jabbar and Ahc\`ene Bounceur and Hashem Al-Bashar Dynamic clustering and management of mobile wireless sensor networks . . . . 62--75 Fuliang Li and Zhihan Lv Reliable vehicle type recognition based on information fusion in multiple sensor networks . . . . . . . . . . . . . . . . 76--84 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Alexandre Fontinele and Iallen Santos and Juarez Nolêto Neto and Divanilson R. Campelo and André Soares An Efficient IA-RMLSA Algorithm for Transparent Elastic Optical Networks . . 1--14 Ajay Kumar Yadav and Santosh Kumar Das and Sachin Tripathi EFMMRP: Design of efficient fuzzy based multi-constraint multicast routing protocol for wireless ad-hoc network . . 15--23 Aveek K. Das and Parth H. Pathak and Chen-Nee Chuah and Prasant Mohapatra Privacy-aware contextual localization using network traffic analysis . . . . . 24--36 Dinil Mon Divakaran and Li Ling Ko and Le Su and Vrizlynn L. L. Thing REX: Resilient and efficient data structure for tracking network flows . . 37--53 Penghao Sun and Julong Lan and Peng Wang and Teng Ma RFC: Range feature code for TCAM-based packet classification . . . . . . . . . 54--61 Yao-Jen Tang and Jian-Jhih Kuo and Ming-Jer Tsai Zero-knowledge GPS-free data replication and retrieval scheme in mobile ad hoc networks using double-ruling and landmark-labeling techniques . . . . . . 62--77 Song Yang and Philipp Wieder and Ramin Yahyapour and Xiaoming Fu Energy-Aware Provisioning in Optical Cloud Networks . . . . . . . . . . . . . 78--95 Hugo Marques and Hélio Silva and Evariste Logota and Jonathan Rodriguez and Seiamak Vahid and Rahim Tafazolli Multiview real-time media distribution for next generation networks . . . . . . 96--124 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Hongtao Shi and Hongping Li and Dan Zhang and Chaqiu Cheng and Wei Wu Efficient and robust feature extraction and selection for traffic classification 1--16 Guilherme Domingues and Edmundo de Souza e Silva and Rosa M. M. Leão and Daniel S. Menasché and Don Towsley Enabling opportunistic search and placement in cache networks . . . . . . 17--34 Julius Rückert and Julian Wulfheide and Tamara Knierim and David Hausheer On clubs, screaming peers, and duplicates: a comprehensive study of BitTorrent Live . . . . . . . . . . . . 35--55 Sebastian Zander and Lachlan L. H. Andrew and Grenville Armitage Collaborative and privacy-preserving estimation of IP address space utilisation . . . . . . . . . . . . . . 56--70 Siba Narayan Swain and Rahul Thakur and C. Siva Ram Murthy Design and stochastic geometric analysis of an efficient Q-Learning based physical resource block allocation scheme to maximize the spectral efficiency of Device-to-Device overlaid cellular networks . . . . . . . . . . . 71--85 Georgios Z. Papadopoulos and Antoine Gallais and Guillaume Schreiner and Emery Jou and Thomas Noel Thorough IoT testbed characterization: From proof-of-concept to repeatable experimentations . . . . . . . . . . . . 86--101 Yu-ning Dong and Jia-jie Zhao and Jiong Jin Novel feature selection and classification of Internet video traffic based on a hierarchical scheme . . . . . 102--111 R. Acedo-Hernández and M. Toril and S. Luna-Ramírez and C. Úbeda A PCI planning algorithm for jointly reducing reference signal collisions in LTE uplink and downlink . . . . . . . . 112--123 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Yi Wu and Ge Nong and Mounir Hamdi Scalable pipelined IP lookup with prefix tries . . . . . . . . . . . . . . . . . 1--11 Hatem Ibn-Khedher and Emad Abd-Elrahman and Ahmed E. Kamal and Hossam Afifi OPAC: an optimal placement algorithm for virtual CDN . . . . . . . . . . . . . . 12--27 Gianpiero Costantino and Rajib Maiti and Fabio Martinelli and Paolo Santi Private mobility-cast for opportunistic networks . . . . . . . . . . . . . . . . 28--42 Tong Guan and Le Fang and Wen Dong and Dimitrios Koutsonikolas and Geoffrey Challen and Chunming Qiao Robust, cost-effective and scalable localization in large indoor areas . . . 43--55 Xiaofeng Qiu and Kai Zhang and Qiuzheng Ren Global Flow Table: a convincing mechanism for security operations in SDN 56--70 Mohammad Mahdi Tajiki and Behzad Akbari and Nader Mokari Optimal Qos-aware network reconfiguration in software defined cloud data centers . . . . . . . . . . . 71--86 Pedro Moreira da Silva and Jaime Dias and Manuel Ricardo Mistrustful P2P: Deterministic privacy-preserving P2P file sharing model to hide user content interests in untrusted peer-to-peer networks . . . . 87--104 Zhang Bo and Zhang Huan and Li Meizi and Zhao Qin and Huang Jifeng Trust Traversal: a trust link detection scheme in social network . . . . . . . . 105--125 Carlo Galiotto and Nuno K. Pratas and Linda Doyle and Nicola Marchetti Effect of LOS/NLOS propagation on 5G ultra-dense networks . . . . . . . . . . 126--140 Chiraz Houaidia and Hanen Idoudi and Adrien Van Den Bossche and Leila Azouz Saidane and Thierry Val Inter-flow and intra-flow interference mitigation routing in wireless mesh networks . . . . . . . . . . . . . . . . 141--156 Tongqing Zhou and Zhiping Cai and Kui Wu and Yueyue Chen and Ming Xu FIDC: a framework for improving data credibility in mobile crowdsensing . . . 157--169 Wenzhong Li and Xiao Chen and Sanglu Lu Content synchronization using device-to-device communication in smart cities . . . . . . . . . . . . . . . . . 170--185 Yuxiang Zhang and Lin Cui and Yuan Zhang A stable matching based elephant flow scheduling algorithm in data center networks . . . . . . . . . . . . . . . . 186--197 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Liljana Gavrilovska and Pero Latkoski and Vladimir Atanasovski and Ramjee Prasad and Albena Mihovska and Octavian Fratu and Pavlos Lazaridis Radio Spectrum: Evaluation approaches, coexistence issues and monitoring . . . 1--12 Tao Zhang and Jing Liu An efficient and fast kinematics-based algorithm for RFID network planning . . 13--24 Hossein Hadian Jazi and Hugo Gonzalez and Natalia Stakhanova and Ali A. Ghorbani Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling . . . . . . . . . . 25--36 Ricardo Macedo and Leonardo Melniski and Aldri Santos and Yacine Ghamri-Doudane and Michele Nogueira SPARTA: a survival performance degradation framework for identity federations . . . . . . . . . . . . . . 37--52 Mohammad Rmayti and Rida Khatoun and Youcef Begriche and Lyes Khoukhi and Dominique Gaiti A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks . . . . . . . . . . . . . . 53--64 Ming Chen and Ke Ding and Jie Hao and Chao Hu and Gaogang Xie and Changyou Xing and Bing Chen LCMSC: a lightweight collaborative mechanism for SDN controllers . . . . . 65--75 Jung-Woong Sung and Seung-Jae Han Data bundling for energy efficient communication of wearable devices . . . 76--88 Cihangir Besiktas and Didem Gözüpek and Aydin Ulas and Erhan Lokman Secure virtual network embedding with flexible bandwidth-based revenue maximization . . . . . . . . . . . . . . 89--99 Yustus Eko Oktian and SangGon Lee and HoonJae Lee and JunHuy Lam Distributed SDN controller system: a survey on design choice . . . . . . . . 100--111 Nir Gazit and Francesco Malandrino and David Hay Mobile operators and content providers in next-generation SDN/NFV core networks: Between cooperation and competition . . . . . . . . . . . . . . 112--123 Luca Cominardi and Fabio Giust and Carlos J. Bernardos and Antonio De La Oliva Distributed mobility management solutions for next mobile network architectures . . . . . . . . . . . . . 124--136 Lazaros Gkatzikis and Vasilis Sourlas and Carlo Fischione and Iordanis Koutsopoulos Low complexity content replication through clustering in Content-Delivery Networks . . . . . . . . . . . . . . . . 137--151 Muhammad Mohsin Mehdi and Imran Raza and Syed Asad Hussain A game theory based trust model for Vehicular Ad hoc Networks (VANETs) . . . 152--172 Juraj Gazda and Gabriel Bugár and Marcel Volosin and Peter Drotár and Denis Horváth and Vladimír Gazda Dynamic spectrum leasing and retail pricing using an experimental economy 173--184 Myriana Rifai and Nicolas Huin and Christelle Caillouet and Frederic Giroire and Joanna Moulierac and Dino Lopez Pacheco and Guillaume Urvoy-Keller Minnie: an SDN world with few compressed forwarding rules . . . . . . . . . . . . 185--207 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Bing Leng and Liusheng Huang and Chunming Qiao and Hongli Xu and Xinglong Wang FTRS: a mechanism for reducing flow table entries in software defined networks . . . . . . . . . . . . . . . . 1--15 Jonathan Lutz and Charles J. Colbourn and Violet R. Syrotiuk Variable-weight topology-transparent scheduling . . . . . . . . . . . . . . . 16--28 Jorge Werner and Carla Merkle Westphall and Carlos Becker Westphall Cloud identity management: a survey on privacy strategies . . . . . . . . . . . 29--42 Hongli Xu and Xiang-Yang Li and Liusheng Huang and Yang Du and Zichun Liu Partial flow statistics collection for load-balanced routing in software defined networks . . . . . . . . . . . . 43--55 Dongyue Xue and Eylem Ekici and Rania Ibrahim and Moustafa Youssef A novel queue-length-based CSMA algorithm with improved delay characteristics . . . . . . . . . . . . 56--69 Saravanan Sundaresan and Robin Doss and Selwyn Piramuthu and Wanlei Zhou A secure search protocol for low cost passive RFID tags . . . . . . . . . . . 70--82 Thibaut Stimpfling and Normand Bélanger and Omar Cherkaoui and André Béliveau and Ludovic Béliveau and Yvon Savaria Extensions to decision-tree based packet classification algorithms to address new classification paradigms . . . . . . . . 83--95 Michal Morawski and Przemyslaw Ignaciuk Network nodes play a game --- a routing alternative in multihop ad-hoc environments . . . . . . . . . . . . . . 96--104 Yi Wang and Ye Xia Improving the queue size and delay performance with the I-CSMA link scheduling algorithm . . . . . . . . . . 105--119 Rahul Hiran and Niklas Carlsson and Nahid Shahmehri Collaborative framework for protection against attacks targeting BGP and edge networks . . . . . . . . . . . . . . . . 120--137 Li Chunlin and Yan Xin and Zhang Yang and Luo Youlong Multiple context based service scheduling for balancing cost and benefits of mobile users and cloud datacenter supplier in mobile cloud . . 138--152 Antônio J. Pinheiro and Ethel B. Gondim and Divanilson R. Campelo An efficient architecture for dynamic middlebox policy enforcement in SDN networks . . . . . . . . . . . . . . . . 153--162 Mahmood Salehi and Azzedine Boukerche A novel packet salvaging model to improve the security of opportunistic routing protocols . . . . . . . . . . . 163--178 Zhixin Liu and Shiyi Li and Kai Ma and Xinping Guan and Xinbin Li Robust power allocation based on hierarchical game with consideration of different user requirements in two-tier femtocell networks . . . . . . . . . . . 179--190 Min Sang Yoon and Ahmed E. Kamal and Zhengyuan Zhu Adaptive data center activation with user request prediction . . . . . . . . 191--204 Leng-Gan Yi Rate-sensitive CoMP beamforming plus sensible snooze for energy-QoE tradeoff in cognitive small cell networks . . . . 205--216 Jinli Meng and Fengyuan Ren and Chuang Lin Modeling and understanding burst transmission for energy efficient Ethernet . . . . . . . . . . . . . . . . 217--230 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Asmita Roy and Sadip Midya and Koushik Majumder and Santanu Phadikar and Anurag Dasgupta Optimized secondary user selection for quality of service enhancement of two-tier multi-user Cognitive Radio Network: a game theoretic approach . . . 1--18 Faizan Qamar and Kaharudin Bin Dimyati and Mhd Nour Hindia and Kamarul Ariffin Bin Noordin and Ahmed M. Al-Samman A comprehensive review on coordinated multi-point operation for LTE-A . . . . 19--37 Peng Wu and Li Pan Scalable influence blocking maximization in social networks under competitive independent cascade models . . . . . . . 38--50 Carlos Borrego and Adrián Sánchez-Carmona and Zhiyuan Li and Sergi Robles Explore and wait: a composite routing-delivery scheme for relative profile-casting in opportunistic networks . . . . . . . . . . . . . . . . 51--63 Sandip Karar and Abhirup Das Barman Opportunistic spectrum access for cooperative unlicensed femtocells in two-tier heterogeneous networks utilizing HARQ feedback . . . . . . . . 64--76 Yang Xu and Jia Liu and Yulong Shen and Xiaohong Jiang and Norio Shiratori Physical layer security-aware routing and performance tradeoffs in ad hoc networks . . . . . . . . . . . . . . . . 77--87 Jianhui Lv and Xingwei Wang and Min Huang and Junling Shi and Keqin Li and Jie Li RISC: ICN routing mechanism incorporating SDN and community division 88--103 Rodolfo I. Meneguette and Azzedine Boukerche SERVitES: an efficient search and allocation resource protocol based on V2V communication for vehicular cloud 104--118 Lorenzo Donatiello and Gustavo Marfia Models and performance evaluation of event goodput in sensor platforms . . . 119--136 Jasaswi Prasad Mohanty and Chittaranjan Mandal and Chris Reade Distributed construction of minimum Connected Dominating Set in wireless sensor network using two-hop information 137--152 Sergio Barrachina-Muñoz and Boris Bellalta and Toni Adame and Albert Bel Multi-hop communication in the uplink for LPWANs . . . . . . . . . . . . . . . 153--168 Roberto Bonafiglia and Amedeo Sapio and Mario Baldi and Fulvio Risso and Paolo C. Pomi Enforcement of dynamic HTTP policies on resource-constrained residential gateways . . . . . . . . . . . . . . . . 169--183 Sain Saginbekov and Arshad Jhumka Many-to-many data aggregation scheduling in wireless sensor networks with two sinks . . . . . . . . . . . . . . . . . 184--199 Yang Wang and Shuang Wu and Zhiyin Chen and Xiaofeng Gao and Guihai Chen Coverage problem with uncertain properties in wireless sensor networks: a survey . . . . . . . . . . . . . . . . 200--232 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Sotiris Nikoletseas and Theofanis P. Raptis and Christoforos Raptopoulos Radiation-constrained algorithms for Wireless Energy Transfer in Ad hoc Networks . . . . . . . . . . . . . . . . 1--10 S. Gheisari and M. R. Meybodi A new reasoning and learning model for Cognitive Wireless Sensor Networks based on Bayesian networks and learning automata cooperation . . . . . . . . . . 11--26 Philippe Ezran and Yoram Haddad and Mérouane Debbah Availability optimization in a ring-based network topology . . . . . . 27--32 Qamas Gul Khan Safi and Senlin Luo and Chao Wei and Limin Pan and Qianrou Chen PIaaS: Cloud-oriented secure and privacy-conscious parking information as a service using VANETs . . . . . . . . . 33--45 Lei Xu and Ke Xu and Yong Jiang and Fengyuan Ren and Haiyang Wang Throughput optimization of TCP incast congestion control in large-scale datacenter networks . . . . . . . . . . 46--60 Zi-Yang Yang and Yaw-Wen Kuo Efficient resource allocation algorithm for overlay D2D communication . . . . . 61--71 Milan Erdelj and Michal Król and Enrico Natalizio Wireless Sensor Networks and Multi-UAV systems for natural disaster management 72--86 Mohsen Riahi Manesh and Sririam Subramaniam and Hector Reyes and Naima Kaabouch Real-time spectrum occupancy monitoring using a probabilistic model . . . . . . 87--96 Xuming Fang and Lei Nan and Zonghua Jiang and Lijun Chen Noise-aware fingerprint localization algorithm for wireless sensor network based on adaptive fingerprint Kalman filter . . . . . . . . . . . . . . . . . 97--107 Azzedine Boukerche and Xiaoli Zhou MAC transmission protocols for delay-tolerant sensor networks . . . . . 108--125 Nikolaos Baroutis and Mohamed Younis Load-conscious maximization of base-station location privacy in wireless sensor networks . . . . . . . . 126--139 Gaogang Xie and Jingxiu Su and Xin Wang and Taihua He and Guangxing Zhang and Steve Uhlig and Kave Salamatian Index-Trie: Efficient archival and retrieval of network traffic . . . . . . 140--156 Rasmus L. Olsen and Jacob Theilgaard Madsen and Jakob G. Rasmussen and Hans-Peter Schwefel On the use of information quality in stochastic networked control systems . . 157--169 Xuya Jia and Qing Li and Yong Jiang and Zehua Guo and Jie Sun A low overhead flow-holding algorithm in software-defined networks . . . . . . . 170--180 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Tobias Hoßfeld and S.-H. Gary Chan and Brian L. Mark and Andreas Timm-Giel Softwarization and caching in NGN . . . 1--3 Thomas Zinner and Stefan Geissler and Stanislav Lange and Steffen Gebert and Michael Seufert and Phuoc Tran-Gia A discrete-time model for optimizing the processing time of virtualized network functions . . . . . . . . . . . . . . . 4--14 Zehua Guo and Ruoyan Liu and Yang Xu and Andrey Gushchin and Anwar Walid and H. Jonathan Chao STAR: Preventing flow-table overflow in software-defined networks . . . . . . . 15--25 Sai Qian Zhang and Qi Zhang and Ali Tizghadam and Byungchul Park and Hadi Bannazadeh and Raouf Boutaba and Alberto Leon-Garcia TCAM space-efficient routing in a software defined network . . . . . . . . 26--40 Qing Li and Lei Wang and Yong Jiang and Mingwei Xu and Jianping Wu A fast and incremental update scheme for SDN based on a relation graph . . . . . 41--52 Qiang Gao and Weiqin Tong and Samina Kausar and Lei Huang and Chao Shen and Shenan Zheng Congestion-aware multicast plug-in for an SDN network operating system . . . . 53--63 Antonio Marotta and Fabio D'Andreagiovanni and Andreas Kassler and Enrica Zola On the energy cost of robustness for green virtual network function placement in 5G virtualized infrastructures . . . 64--75 Tran Manh Nam and Nguyen Huu Thanh and Hoang Trung Hieu and Nguyen Tien Manh and Nguyen Van Huynh and Hoang Duong Tuan Joint network embedding and server consolidation for energy-efficient dynamic data center virtualization . . . 76--89 Mirza Mohd Shahriar Maswood and Chris Develder and Edmundo Madeira and Deep Medhi Energy-Efficient dynamic virtual network traffic engineering for north-south traffic in multi-location data center networks . . . . . . . . . . . . . . . . 90--102 Muhammad Faran Majeed and Syed Hassan Ahmed and Siraj Muhammad and Houbing Song and Danda B. Rawat Multimedia streaming in information-centric networking: a survey and future perspectives . . . . . . . . 103--121 Thomas Bonald and Léonce Mekinda and Luca Muscariello Fair throughput allocation in Information-Centric Networks . . . . . . 122--131 Rodrigo B. Mansilha and Marinho P. Barcellos and Emilio Leonardi and Dario Rossi Exploiting parallelism in hierarchical content stores for high-speed ICN routers . . . . . . . . . . . . . . . . 132--145 M. Tortelli and D. Rossi and E. Leonardi A hybrid methodology for the performance evaluation of Internet-scale cache networks . . . . . . . . . . . . . . . . 146--159 Sladana Josilo and Valentino Pacifici and György Dán Distributed algorithms for content placement in hierarchical cache networks 160--171 Gerhard Hasslinger and Konstantinos Ntougias and Frank Hasslinger and Oliver Hohlfeld Performance evaluation for new web caching strategies combining LRU with score based object selection . . . . . . 172--186 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Rodolfo W. L. Coutinho and Azzedine Boukerche and Luiz F. M. Vieira and Antonio A. F. Loureiro Performance modeling and analysis of void-handling methodologies in underwater wireless sensor networks . . 1--14 HR Shamna and Jacob Lillykutty An energy and throughput efficient distributed cooperative MAC protocol for multihop wireless networks . . . . . . . 15--30 Tao Wang and Baoxian Zhang and Zheng Yao and Hussein T. Mouftah Network coding based adaptive CSMA for network utility maximization . . . . . . 31--43 Abolfazl Hajisami and Dario Pompili Dynamic joint processing: Achieving high spectral efficiency in uplink 5G cellular networks . . . . . . . . . . . 44--56 Merve Ekmen and Aysegül Altin-Kayhan Reliable and energy efficient wireless sensor network design via conditional multi-copying for multiple central nodes 57--68 Xing Ye and Guozhen Cheng and Xingguo Luo Maximizing SDN control resource utilization via switch migration . . . . 69--80 Salvatore d'Ambrosio and Salvatore de Pasquale and Gerardo Iannone and Delfina Malandrino and Alberto Negro and Giovanni Patimo and Vittorio Scarano and Raffaele Spinelli and Rocco Zaccagnino Privacy as a proxy for Green Web browsing: Methodology and experimentation . . . . . . . . . . . . 81--99 Charu C. Aggarwal and Amotz Bar-Noy and Simon Shamoun On sensor selection in linked information networks . . . . . . . . . . 100--113 Michele Luvisotto and Federico Tramarin and Stefano Vitturi A learning algorithm for rate selection in real-time wireless LANs . . . . . . . 114--124 Thomas Clausen and Jiazi Yi and Ulrich Herberg Lightweight On-demand Ad hoc Distance-vector Routing --- Next Generation (LOADng): Protocol, extension, and applicability . . . . . . 125--140 Zhenchun Wei and Yan Zhang and Xiangwei Xu and Lei Shi and Lin Feng A task scheduling algorithm based on Q-learning and shared value function for WSNs . . . . . . . . . . . . . . . . . . 141--149 Hyung-Sin Kim and Hosoo Cho and Hongchan Kim and Saewoong Bahk DT-RPL: Diverse bidirectional traffic delivery through RPL routing protocol in low power and lossy networks . . . . . . 150--161 Enrico Gregori and Barbara Guidi and Alessandro Improta and Luca Sani ICE: a memory-efficient BGP route collecting engine . . . . . . . . . . . 162--173 Claudio Casetti and Carla-Fabiana Chiasserini and Francesco Malandrino and Carlo Borgiattino Area formation and content assignment for LTE broadcasting . . . . . . . . . . 174--186 Yingya Guo and Zhiliang Wang and Xia Yin and Xingang Shi and Jianping Wu Traffic engineering in hybrid SDN networks with multiple traffic matrices 187--199 Jianhui Lv and Xingwei Wang and Kexin Ren and Min Huang and Keqin Li ACO-inspired Information-Centric Networking routing mechanism . . . . . . 200--217 Dohyung Kim and Younghoon Kim Enhancing NDN feasibility via dedicated routing and caching . . . . . . . . . . 218--228 Xingwei Wang and Jinhong Zhang and Min Huang and Shengxiang Yang A green intelligent routing algorithm supporting flexible QoS for many-to-many multicast . . . . . . . . . . . . . . . 229--245 Guangwei Xu and Yanke Bai and Qiao Pan and Qiubo Huang and Yanbin Yang Data verification tasks scheduling based on dynamic resource allocation in mobile big data storage . . . . . . . . . . . . 246--255 Lin Yang and Mingxuan Yuan and Yanjiao Chen and Wei Wang and Qian Zhang and Jia Zeng Personalized user engagement modeling for mobile videos . . . . . . . . . . . 256--267 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Manel Chenait and Bahia Zebbane and Chafika Benzaid and Nadjib Badache Energy-efficient coverage protocol based on stable and predictive scheduling in wireless sensor networks . . . . . . . . 1--12 Shreyasee Mukherjee and Shravan Sriram and Tam Vu and Dipankar Raychaudhuri EIR: Edge-aware inter-domain routing protocol for the future mobile Internet 13--30 Yaw-Wen Kuo and Jane-Hwa Huang A CSMA-based MAC protocol for WLANs with automatic synchronization capability to provide hard quality of service guarantees . . . . . . . . . . . . . . . 31--42 Deke Guo and Xiaoqiang Teng and Zhiyao Hu and Junjie Xie and Bangbang Ren Source selection problem in multi-source multi-destination multicasting . . . . . 43--55 Chia-Cheng Hu and Chin-Feng Lai and Ji-Gong Hou and Yueh-Min Huang Timely scheduling algorithm for P2P streaming over MANETs . . . . . . . . . 56--67 Santiago Egea Gómez and Belén Carro Martínez and Antonio J. Sánchez-Esguevillas and Luis Hernández Callejo Ensemble network traffic classification: Algorithm comparison and novel ensemble scheme proposal . . . . . . . . . . . . 68--80 Fadoua Hassen and Lotfi Mhamdi A scalable packet-switch architecture based on OQ NoCs for data center networks . . . . . . . . . . . . . . . . 81--93 Ivan O. Nunes and Clayson Celes and Pedro O. S. Vaz de Melo and Antonio A. F. Loureiro GROUPS-NET: Group meetings aware routing in multi-hop D2D networks . . . . . . . 94--108 Daniel S. Marcon and Fabrício M. Mazzola and Marinho P. Barcellos Achieving minimum bandwidth guarantees and work-conservation in large-scale, SDN-based datacenter networks . . . . . 109--125 Wahida Mansouri and Faouzi Zarai and Kais Mnif and Lotfi Kamoun Cross layer architecture with integrated MIH in heterogeneous wireless networks 126--137 Yongbin Yim and Hyunchong Cho and Sang-Ha Kim and Euisin Lee and Mario Gerla Vehicle location service scheme based on road map in Vehicular Sensor Networks 138--150 Farshad Keyvan Ghazvini and Mustafa Mehmet-Ali and Mahmoud Doughan Scalable hybrid MAC protocol for M2M communications . . . . . . . . . . . . . 151--160 Yongqiang Wang and Krishna Mosalakanti and Felipe Núñez and Socrates Deligeorges and Francis J. Doyle III A kernel module for pulse-coupled time synchronization of sensor networks . . . 161--172 Hamed Hellaoui and Mouloud Koudil and Abdelmadjid Bouabdallah Energy-efficient mechanisms in security of the Internet of Things: a survey . . 173--189 Kyu-Hwan Lee and Dong-Hyuk Jang and Sung-Jae Lee and Jae-Ryong Cha Target BER selection scheme in LMS networks using AL-FEC systems . . . . . 190--199 Eduardo K. Viegas and Altair O. Santin and Luiz S. Oliveira Toward a reliable anomaly-based intrusion detection in real-world environments . . . . . . . . . . . . . . 200--216 Pradipta Ghosh and He Ren and Reza Banirazi and Bhaskar Krishnamachari and Edmond Jonckheere Empirical evaluation of the heat-diffusion collection protocol for wireless sensor networks . . . . . . . . 217--232 Frank Wetzels and Hans van den Berg and Joost Bosman and Rob van der Mei Flow termination signaling in the centralized pre-congestion notification architecture . . . . . . . . . . . . . . 233--242 Krisztián Németh and Attila K\Horösi and Gábor Rétvári Optimal resource pooling over legacy equal-split load balancing schemes . . . 243--265 Manassés Ferreira Neto and Olga Goussevskaia and Vinícius Fernandes dos Santos Connectivity with backbone structures in obstructed wireless networks . . . . . . 266--281 Samira Chouikhi and In\`es El Korbi and Yacine Ghamri-Doudane and Leila Azouz Saidane Distributed connectivity restoration in multichannel wireless sensor networks 282--295 Thomas Valerrian Pasca Santhappan and Sumanta Patro and Bheemarjuna Reddy Tamma and Antony Franklin A. Network Coordination Function for uplink traffic steering in tightly coupled LTE Wi-Fi networks . . . . . . . . . . . . . 296--316 Agnese V. Ventrella and Giuseppe Piro and L. Alfredo Grieco Publish--subscribe in mobile information centric networks: Modeling and performance evaluation . . . . . . . . . 317--339 Salman Goli-Bidgoli and Naser Movahhedinia Determining vehicles' radio transmission range for increasing cognitive radio VANET (CR-VANET) reliability using a trust management system . . . . . . . . 340--351 Han Zhang and Xingang Shi and Yingya Guo and Zhiliang Wang and Xia Yin More load, more differentiation --- Let more flows finish before deadline in data center networks . . . . . . . . . . 352--367 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Ahmed E. Kamal and Muhammad Imran and Hsiao-Hwa Chen and Athanasios V. Vasilakos Survivability strategies for emerging wireless networks . . . . . . . . . . . 1--4 Muhammad Zeeshan Asghar and Paavo Nieminen and Seppo Hämäläinen and Tapani Ristaniemi and Muhammad Ali Imran and Timo Hämäläinen Towards proactive context-aware self-healing for $5$G networks . . . . . 5--13 Sonia Ben Rejeb and Nidal Nasser and Samer Mansour and Massa Boujlbane Centralized SON function for operator optimal strategies in heterogeneous networks . . . . . . . . . . . . . . . . 14--27 Lang Xie and Poul E. Heegaard and Yuming Jiang Survivability analysis of a two-tier infrastructure-based wireless network 28--40 Louai Al-Awami and Hossam S. Hassanein Robust decentralized data storage and retrieval for wireless networks . . . . 41--50 Bhaskar Das and Jalal Almhana A new cooperative communication algorithm for improving connectivity in the event of network failure in VANETs 51--62 Wassila Lalouani and Mohamed Younis and Nadjib Badache Optimized repair of a partitioned network topology . . . . . . . . . . . . 63--77 Enver Ever and Fadi M. Al-Turjman and Hadi Zahmatkesh and Mustafa Riza Modelling green HetNets in dynamic ultra large-scale applications: a case-study for femtocells in smart-cities . . . . . 78--93 Seif eddine Hammami and Hossam Afifi Fault-tolerant dynamic planning for wireless mesh networks based on real load profiles . . . . . . . . . . . . . 94--107 Sanaa Sharafeddine and Karim Jahed and Omar Farhat and Zaher Dawy Failure recovery in wireless content distribution networks with device-to-device cooperation . . . . . . 108--122 Olga Galinina and Sergey Andreev and Mikhail Komarov and Svetlana Maltseva Leveraging heterogeneous device connectivity in a converged 5G-IoT ecosystem . . . . . . . . . . . . . . . 123--132 Di Li and Xiaomin Li and Jiafu Wan A cloud-assisted handover optimization strategy for mobile nodes in industrial wireless networks . . . . . . . . . . . 133--141 A. Tahir and S. A. Abid and Nadir Shah Logical clusters in a DHT-paradigm for scalable routing in MANETs . . . . . . . 142--153 Debiao He and Sherali Zeadally and Libing Wu and Huaqun Wang Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography . . . . . . . . . . . . . . 154--163 Caidan Zhao and Minmin Huang and Lianfen Huang and Xiaojiang Du and Mohsen Guizani A robust authentication scheme based on physical-layer phase noise fingerprint for emerging wireless networks . . . . . 164--171 Prasenjit Bhavathankar and Subhadeep Sarkar and Sudip Misra Optimal decision rule-based ex-ante frequency hopping for jamming avoidance in wireless sensor networks . . . . . . 172--185 Hossein Soleimani and Thomas Begin and Azzedine Boukerche Safety message generation rate adaptation in LTE-based vehicular networks . . . . . . . . . . . . . . . . 186--196 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Sanaa Sharafeddine and Karim Jahed and Marwan Fawaz Optimized device centric aggregation mechanisms for mobile devices with multiple wireless interfaces . . . . . . 1--16 Yi-Ting Peng and Sok-Ian Sou and Meng-Hsun Tsai and Chuan-Sheng Lin Multipath mobile data offloading of deadline assurance with policy and charging control in cellular/WiFi networks . . . . . . . . . . . . . . . . 17--27 Erfaneh Vahedi and Majid Bayat and Mohammad Reza Pakravan and Mohammad Reza Aref A secure ECC-based privacy preserving data aggregation scheme for smart grids 28--36 Jian Zhang and Yang Yang and Yanjiao Chen and Jing Chen and Qian Zhang A general framework to design secure cloud storage protocol using homomorphic encryption scheme . . . . . . . . . . . 37--50 Haojun Huang and Junbao Zhang and Xu Zhang and Benshun Yi and Qilin Fan and Feng Li EMGR: Energy-efficient multicast geographic routing in wireless sensor networks . . . . . . . . . . . . . . . . 51--63 YiPeng Wang and Xiaochun Yun and Yongzheng Zhang and Liwei Chen and Tianning Zang Rethinking robust and accurate application protocol identification . . 64--78 Soojeon Lee and Dongman Lee and Myungjin Lee and Hyungsoo Jung and Byoung-Sun Lee Randomizing TCP payload size for TCP fairness in data center networks . . . . 79--92 Mehdi Malboubi and Yanlei Gong and Zijun Yang and Xiong Wang and Chen-Nee Chuah and Puneet Sharma Software defined network inference with evolutionary optimal observation matrices . . . . . . . . . . . . . . . . 93--104 Amin Ghalami Osgouei and Amir Khorsandi Koohanestani and Hossein Saidi and Ali Fanian Online assignment of non-SDN virtual network nodes to a physical SDN . . . . 105--116 Bruno P. Santos and Luiz F. M. Vieira and Marcos A. M. Vieira CGR: Centrality-based green routing for Low-power and Lossy Networks . . . . . . 117--128 Sara El Alaoui and Byrav Ramamurthy EAODR: a novel routing algorithm based on the Modified Temporal Graph network model for DTN-based Interplanetary Networks . . . . . . . . . . . . . . . . 129--141 K. Katsalis and B. Rofoee and G. Landi and J. F. Riera and K. Kousias and M. Anastasopoulos and L. Kiraly and A. Tzanakaki and T. Korakis Implementation experience in multi-domain SDN: Challenges, consolidation and future directions . . 142--158 Orhan Ermis and Serif Bahtiyar and Emin Anarim and M. Ufuk Çaglayan A key agreement protocol with partial backward confidentiality . . . . . . . . 159--177 Lei Ding and Jun Liu and Tao Qin and Haifei Li Internet traffic classification based on expanding vector of flow . . . . . . . . 178--192 Jianwei Niu and Shihao Wang and Wei Niu and Mohammed Atiquzzaman User-aware partitioning algorithm for mobile cloud computing based on maximum graph cuts . . . . . . . . . . . . . . . 193--206 Gabriel Scalosub Towards optimal buffer management for streams with packet dependencies . . . . 207--214 Ying Qu and Bryan Ng and Michael Homer Optimising channel assignment to prevent flow starvation and improve fairness for planning single radio WMNs in built environments . . . . . . . . . . . . . . 215--231 Phi Le Nguyen and Yusheng Ji and Zhi Liu and Huy Vu and Khanh-Van Nguyen Distributed hole-bypassing protocol in WSNs with constant stretch and load balancing . . . . . . . . . . . . . . . 232--250 Ji Qi and Fei Hu and Xin Li and Koushik A. M. and Sunil Kumar 3-ent (resili-ent, intellig-ent, and effici-ent) medium access control for full-duplex, jamming-aware, directional airborne networks . . . . . . . . . . . 251--260 João Marcelo Ceron and Cíntia Borges Margi and Lisandro Zambenedetti Granville MARS: From traffic containment to network reconfiguration in malware-analysis systems . . . . . . . . 261--272 Rahul Thakur and Vijeth J. Kotagi and C. Siva Ram Murthy Resource allocation and cell selection framework for LTE-Unlicensed femtocell networks . . . . . . . . . . . . . . . . 273--283 Hyunjoong Lee and Sangkyu Park and Saewoong Bahk An opportunistic scheduling algorithm using aged CSI in massive MIMO systems 284--296 Jia Wu and Zhigang Chen and Ming Zhao Effective information transmission based on socialization nodes in opportunistic networks . . . . . . . . . . . . . . . . 297--305 Yue Qiu and Maode Ma and Shuo Chen An anonymous authentication scheme for multi-domain machine-to-machine communication in cyber-physical systems 306--318 Aya Ayadi and Oussama Ghorbel and Abdulfattah M. Obeid and Mohamed Abid Outlier detection approaches for wireless sensor networks: a survey . . . 319--333 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Harry Rudin Change at the Helm: Welcome, Farewell, Advice, Thanks: Special Issues . . . . . iii--iii J. J. P. C. Rodrigues and S. Zeadally and N. Kumar and G. Han Special Issue on 5G Wireless Networks for IoT and Body Sensors . . . . . . . . 335--339 Jaime Lloret and Lorena Parra and Miran Taha and Jesus Tomás An architecture and protocol for smart continuous eHealth monitoring using 5G 340--351 Radu-Corneliu Marin and Radu-Ioan Ciobanu and Ciprian Dobre and Constandinos X. Mavromoustakis and George Mastorakis A context-aware collaborative model for smartphone energy efficiency over 5G wireless networks . . . . . . . . . . . 352--362 Ilsun You and Jong-Hyouk Lee SPFP: Ticket-based secure handover for fast proxy mobile IPv6 in 5G networks 363--372 Carolina Fortuna and Adnan Bekan and Tomaz Javornik and Gregor Cerar and Mihael Mohorcic Software interfaces for control, optimization and update of 5G machine type communication networks . . . . . . 373--383 Shuai Han and Cheng Guo and Weixiao Meng and Cheng Li A flexible resource scheduling scheme for an adaptive SCMA system . . . . . . 384--391 Yujie Li and Zhibin Gao and Lianfen Huang and Xiaojiang Du and Mohsen Guizani Resource management for future mobile networks: Architecture and technologies 392--398 Yang Liu and Changqiao Xu and Yufeng Zhan and Zhixin Liu and Jianfeng Guan and Hongke Zhang Incentive mechanism for computation offloading using edge computing: a Stackelberg game approach . . . . . . . 399--409 Lijun Yang and Chao Ding and Meng Wu and Kun Wang Robust detection of false data injection attacks for data aggregation in an Internet of Things-based environmental surveillance . . . . . . . . . . . . . . 410--428 Xiong Li and Maged Hamada Ibrahim and Saru Kumari and Arun Kumar Sangaiah and Vidushi Gupta and Kim-Kwang Raymond Choo Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks . . . . . . 429--443 Ibrar Yaqoob and Ejaz Ahmed and Muhammad Habib ur Rehman and Abdelmuttlib Ibrahim Abdalla Ahmed and Mohammed Ali Al-garadi and Muhammad Imran and Mohsen Guizani The rise of ransomware and emerging security challenges in the Internet of Things . . . . . . . . . . . . . . . . . 444--458 Ejaz Ahmed and Ibrar Yaqoob and Ibrahim Abaker Targio Hashem and Imran Khan and Abdelmuttlib Ibrahim Abdalla Ahmed and Muhammad Imran and Athanasios V. Vasilakos The role of big data analytics in Internet of Things . . . . . . . . . . . 459--471 Chi-Yuan Chen and Hsin-Min Wu and Lei Wang and Chia-Mu Yu Practical integrity preservation for data streaming in cloud-assisted healthcare sensor systems . . . . . . . 472--480 Tie Qiu and Xize Liu and Min Han and Mingchu Li and Yushuang Zhang SRTS: a Self-Recoverable Time Synchronization for sensor networks of healthcare IoT . . . . . . . . . . . . . 481--492 Zhenyu Zhou and Junhao Feng and Yunjian Jia and Shahid Mumtaz and Kazi Mohammed Saidul Huq and Jonathan Rodriguez and Di Zhang Energy-efficient game-theoretical random access for M2M communications in overlapped cellular networks . . . . . . 493--501 Long Zhao and Kan Zheng and Periklis Chatzimisios Hybrid information and energy transfer in ultra-dense HetNets . . . . . . . . . 502--509 Jacopo De Benedetto and Paolo Bellavista and Luca Foschini Proximity discovery and data dissemination for mobile crowd sensing using LTE direct . . . . . . . . . . . . 510--521 Bang Wang and Qiang Yang and Laurence T. Yang and Chunsheng Zhu On minimizing energy consumption cost in green heterogeneous wireless networks 522--535 Chun-Cheng Lin and Ching-Tsorng Tsai and Der-Jiunn Deng and I-Hsin Tsai and Shun-Yu Jhong Minimizing electromagnetic pollution and power consumption in green heterogeneous small cell network deployment . . . . . 536--547 Ahmed Harbouche and Noureddine Djedi and Mohammed Erradi and Jalel Ben-Othman and Abdellatif Kobbane Model driven flexible design of a wireless body sensor network for health monitoring . . . . . . . . . . . . . . . 548--571 Satya J. Borah and Sanjay Kumar Dhurandher and Isaac Woungang and Vinesh Kumar A game theoretic context-based routing protocol for opportunistic networks in an IoT scenario . . . . . . . . . . . . 572--584 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Ian F. Akyildiz and Harry Rudin and Burkhard Stiller Editorial for COMNET 2017 . . . . . . . iii--iii Ashanie Gunathillake and Andrey V. Savkin and Anura P. Jayasumana Topology mapping algorithm for $2$D and $3$D Wireless Sensor Networks based on maximum likelihood estimation . . . . . 1--15 A. Hafsaoui and A. Dandoush and G. Urvoy-Keller and M. Siekkinen and D. Collange A fine-grained response time analysis technique in heterogeneous environments 16--33 Islam Tharwat Abdel-Halim and Hossam Mahmoud Ahmed Fahmy Prediction-based protocols for vehicular Ad Hoc Networks: Survey and taxonomy . . 34--50 Ran Shu and Fengyuan Ren and Jiao Zhang and Tong Zhang and Chuang Lin Analysing and improving convergence of quantized congestion notification in Data Center Ethernet . . . . . . . . . . 51--64 Antonio Marotta and Stefano Avallone and Andreas Kassler A Joint Power Efficient Server and Network Consolidation approach for virtualized data centers . . . . . . . . 65--80 Surabhi Abhimithra Karthikeya and Revathy Narayanan and Siva Ram Murthy C. Power-aware gateway connectivity in battery-powered dynamic IoT networks . . 81--93 Kashif Bilal and Osman Khalid and Aiman Erbad and Samee U. Khan Potentials, trends, and prospects in edge technologies: Fog, cloudlet, mobile edge, and micro data centers . . . . . . 94--120 Animesh Roy and Tamaghna Acharya and Sipra DasBit Quality of service in delay tolerant networks: a survey . . . . . . . . . . . 121--133 Anand Seetharam and Arti Ramesh On the goodput of flows in heterogeneous mobile networks . . . . . . . . . . . . 134--144 Hoda Ayatollahi and Mohammad Khansari and Hamid R. Rabiee A push-pull network coding protocol for live peer-to-peer streaming . . . . . . 145--155 A. Meloni and P. A. Pegoraro and L. Atzori and A. Benigni and S. Sulis Cloud-based IoT solution for state estimation in smart grids: Exploiting virtualization and edge-intelligence technologies . . . . . . . . . . . . . . 156--165
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Weibo Chu and Mostafa Dehghan and John C. S. Lui and Don Towsley and Zhi-Li Zhang Joint cache resource allocation and request routing for in-network caching services . . . . . . . . . . . . . . . . 1--14 Reza Ghebleh A comparative classification of information dissemination approaches in vehicular ad hoc networks from distinctive viewpoints: a survey . . . . 15--37 Xingwei Wang and Jianhui Lv and Min Huang and Keqin Li and Jie Li and Kexin Ren Energy-efficient ICN routing mechanism with QoS support . . . . . . . . . . . . 38--51 Daeho Kang and Hyung-Sin Kim and Changhee Joo and Saewoong Bahk ORGMA: Reliable opportunistic routing with gradient forwarding for MANETs . . 52--64 Xuya Jia and Yong Jiang and Zehua Guo and Gengbiao Shen and Lei Wang Intelligent path control for energy-saving in hybrid SDN networks . . 65--76 Giovanni Nardini and Giovanni Stea and Antonio Virdis A scalable data-plane architecture for one-to-one device-to-device communications in LTE-Advanced . . . . . 77--95 Zhibo Wang and Ran Tan and Jiahui Hu and Jing Zhao and Qian Wang and Feng Xia and Xiaoguang Niu Heterogeneous incentive mechanism for time-sensitive and location-dependent crowdsensing networks with random arrivals . . . . . . . . . . . . . . . . 96--109 Xiaonan Wang and Zhengxiong Dou and Dong Wang and Qi Sun Mobility management for 6LoWPAN WSN . . 110--128 Fátima Castro-Jul and Rebeca P. Díaz-Redondo and Ana Fernández-Vilas Collaboratively assessing urban alerts in ad hoc participatory sensing . . . . 129--143 Durbadal Chattaraj and Monalisa Sarma and Ashok Kumar Das A new two-server authentication and key agreement protocol for accessing secure cloud services . . . . . . . . . . . . . 144--164
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Hui Cai and Yanmin Zhu and Zhenni Feng A truthful incentive mechanism for mobile crowd sensing with location-sensitive weighted tasks . . . 1--14 Junxiao He and Oliver Yang and Yifeng Zhou Using flow cost to globally allocate and optimize limited bandwidth in multipath routing . . . . . . . . . . . . . . . . 15--25 Meitian Huang and Weifa Liang and Zichuan Xu and Wenzheng Xu and Song Guo and Yinlong Xu Online unicasting and multicasting in software-defined networks . . . . . . . 26--39 Yufeng Zhan and Yuanqing Xia and Jinhui Zhang Incentive mechanism in platform-centric mobile crowdsensing: a one-to-many bargaining approach . . . . . . . . . . 40--52 Abdullah Yasin Nur and Mehmet Engin Tozal Cross-AS (X-AS) Internet topology mapping . . . . . . . . . . . . . . . . 53--67 Miguel L. Bote-Lorenzo and Eduardo Gómez-Sánchez and Carlos Mediavilla-Pastor and Juan I. Asensio-Pérez Online machine learning algorithms to predict link quality in community wireless mesh networks . . . . . . . . . 68--80 Hongtao Shi and Hongping Li and Dan Zhang and Chaqiu Cheng and Xuanxuan Cao An efficient feature generation approach based on deep learning and feature selection techniques for traffic classification . . . . . . . . . . . . . 81--98 Hideo Kobayashi and Eiichi Kameda and Yoshiaki Terashima and Norihiko Shinomiya Towards sustainable heterogeneous wireless networks: a decision strategy for AP selection with dynamic graphs . . 99--107 Fu Xiao and Qianwen Miao and Xiaohui Xie and Lijuan Sun and Ruchuan Wang SHMO: a seniors health monitoring system based on energy-free sensing . . . . . . 108--117 Yue Li and Luigi Iannone Assessing Locator/Identifier Separation Protocol interworking performance through RIPE Atlas . . . . . . . . . . . 118--128 Mumtaz Karatas Optimal deployment of heterogeneous sensor networks for a hybrid point and barrier coverage application . . . . . . 129--144 Quang-Tuan Thieu and Hung-Yun Hsieh Outage protection for cellular-mode users in device-to-device communications through stochastic optimization . . . . 145--160 Mourad Benmalek and Yacine Challal and Abdelouahid Derhab and Abdelmadjid Bouabdallah VerSAMI: Versatile and Scalable key management for Smart Grid AMI systems 161--179 Mohammed S. Hadi and Ahmed Q. Lawey and Taisir E. H. El-Gorashi and Jaafar M. H. Elmirghani Big data analytics for wireless and wired network design: a survey . . . . . 180--199
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Abhishek Gupta and M. Farhan Habib and Uttam Mandal and Pulak Chowdhury and Massimo Tornatore and Biswanath Mukherjee On service-chaining strategies using Virtual Network Functions in operator networks . . . . . . . . . . . . . . . . 1--16 J. Carmona-Murillo and V. Friderikos and J. L. González-Sánchez A hybrid DMM solution and trade-off analysis for future wireless networks 17--32 Wei Li and Changxin Huang and Chao Xiao and Songchen Han A heading adjustment method in wireless directional sensor networks . . . . . . 33--41 Abbas Arghavani and Mahdi Arghavani and Mahmood Ahmadi and Paul Crane Attacker-Manager Game Tree (AMGT): A new framework for visualizing and analysing the interactions between attacker and network security manager . . . . . . . . 42--58 Yiran Shen and Chengwen Luo and Dan Yin and Hongkai Wen and Rus Daniela and Wen Hu Privacy-preserving sparse representation classification in cloud-enabled mobile applications . . . . . . . . . . . . . . 59--72 Piotr Borylo and Jerzy Domzal and Robert Wójcik Survivable automatic hidden bypasses in Software-Defined Networks . . . . . . . 73--89 Ibrahim Ayad and Youngbin Im and Eric Keller and Sangtae Ha A Practical Evaluation of Rate Adaptation Algorithms in HTTP-based Adaptive Streaming . . . . . . . . . . . 90--103 Jun Xu and Chengcheng Guo and Hao Zhang Joint channel allocation and power control based on PSO for cellular networks with D2D communications . . . . 104--119 Chaonong Xu and Kaichi Ma and Yongjun Xu Complexity of minimum uplink scheduling in backbone-assisted successive interference cancellation-based wireless networks . . . . . . . . . . . . . . . . 120--129 Tian Wang and Jiandian Zeng and MD Zakirul Alam Bhuiyan and Yonghong Chen and Yiqiao Cao and Hui Tian and Mande Xie Energy-efficient relay tracking with multiple mobile camera sensors . . . . . 130--140 Sana Belguith and Nesrine Kaaniche and Maryline Laurent and Abderrazak Jemai and Rabah Attia PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT . . . . . . . . . . . . . . 141--156 Hui Cui and Robert H. Deng and Junzuo Lai and Xun Yi and Surya Nepal An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited . . . . . . 157--165 Huan Chen and Xiong Wang and Yangming Zhao and Tongyu Song and Yang Wang and Shizhong Xu and Lemin Li MOSC: a method to assign the outsourcing of service function chain across multiple clouds . . . . . . . . . . . . 166--182 Jessie Hui Wang and Changqing An A study on geographic properties of Internet routing . . . . . . . . . . . . 183--194 Shadi Moazzeni and Mohammad Reza Khayyambashi and Naser Movahhedinia and Franco Callegati On reliability improvement of Software-Defined Networks . . . . . . . 195--211 Bo Yi and Xingwei Wang and Keqin Li and Sajal K. Das and Min Huang A comprehensive survey of Network Function Virtualization . . . . . . . . 212--262
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Sergio M. Martínez-Chavez and Mario E. Rivero-Angeles and Laura I. Garay-Jimenez and Elena F. Ruiz-Ledesma Cognitive radio system for interference reduction in BANETs focused on epilepsy diagnosis . . . . . . . . . . . . . . . 1--22 G. Stergiopoulos and D. Gritzalis and V. Kouktzoglou Using formal distributions for threat likelihood estimation in cloud-enabled IT risk assessment . . . . . . . . . . . 23--45 Javier Lopez and Juan E. Rubio Access control for cyber-physical systems interconnected to the cloud . . 46--54 Andrea Detti and Lorenzo Bracciale and Pierpaolo Loreti and Nicola Blefari Melazzi Modeling LRU cache with invalidation . . 55--65 Long Cheng and Jianwei Niu and Chengwen Luo and Lei Shu and Linghe Kong and Zhiwei Zhao and Yu Gu Towards minimum-delay and energy-efficient flooding in low-duty-cycle wireless sensor networks 66--77 Seyed Morteza Pournaghi and Behnam Zahednejad and Majid Bayat and Yaghoub Farjami NECPPA: A novel and efficient conditional privacy-preserving authentication scheme for VANET . . . . 78--92 Francesco Malandrino and Carla-Fabiana Chiasserini and Claudio Casetti Virtualization-based evaluation of backhaul performance in vehicular applications . . . . . . . . . . . . . . 93--104 Daisuke Satoh and Yuji Takano and Ryunosuke Sudo and Takemi Mochida Reduction of communication demand under disaster congestion using control to change human communication behavior without direct restriction . . . . . . . 105--115 Xiaoxiong Weng and Yongxin Liu and Houbing Song and Shushen Yao and Pengfei Zhang Mining urban passengers' travel patterns from incomplete data with use cases . . 116--126 Mario Collotta and Giovanni Pau and Daniel G. Costa A fuzzy-based approach for energy-efficient Wi-Fi communications in dense wireless multimedia sensor networks . . . . . . . . . . . . . . . . 127--139 Ilhan Demirci and Ömer Korçak Cell breathing algorithms for load balancing in Wi-Fi/cellular heterogeneous networks . . . . . . . . . 140--151 Aous Thabit Naman and Yu Wang and Hassan Habibi Gharakheili and Vijay Sivaraman and David Taubman Responsive high throughput congestion control for interactive applications over SDN-enabled networks . . . . . . . 152--166 Wei Feng and Yu Qin and Shijun Zhao and Dengguo Feng AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS . . . . . . . . . . . . . . 167--182 A. K. Marnerides and D. P. Pezaros and D. Hutchison Internet traffic characterisation: Third-order statistics and higher-order spectra for precise traffic modelling 183--201 Quanzhong Li and Sai Zhao Secure transmission for multi-antenna wireless powered communication with co-channel interference and self-energy recycling . . . . . . . . . . . . . . . 202--214 Lakshmikanth Guntupalli and Jorge Martinez-Bauset and Frank Y. Li Performance of frame transmissions and event-triggered sleeping in duty-cycled WSNs with error-prone wireless links . . 215--227 Rafael Kunst and Leandro Avila and Edison Pignaton and Sergio Bampi and Juergen Rochol Improving network resources allocation in smart cities video surveillance . . . 228--244 G. Siracusano and S. Salsano and P. L. Ventre and A. Detti and O. Rashed and N. Blefari-Melazzi A framework for experimenting ICN over SDN solutions using physical and virtual testbeds . . . . . . . . . . . . . . . . 245--259 Yanxiao Zhao and MD Nashid Anjum and Lina Pu and Guodong Wang and Yu Luo Optimal On Demand Delay-constrained Fair Distribution for self-coexistence WRAN 260--271 Ismail Bennis and Hac\`ene Fouchal and Kandaraj Piamrat and Marwane Ayaida Efficient queuing scheme through cross-layer approach for multimedia transmission over WSNs . . . . . . . . . 272--282
Saptarshi Chaudhuri and Irfan Baig and Debabrata Das A novel QoS aware medium access control scheduler for LTE-advanced network . . . 1--14 Hui Xia and Bin Fang and Matthew Roughan and Kenjiro Cho and Paul Tune A BasisEvolution framework for network traffic anomaly detection . . . . . . . 15--31 Yingjie Wang and Zhipeng Cai and Xiangrong Tong and Yang Gao and Guisheng Yin Truthful incentive mechanism with location privacy-preserving for mobile crowdsourcing systems . . . . . . . . . 32--43 Mohiyeddin Mozaffari and Behrouz Safarinejadian and Mokhtar Shasadeghi Probability density estimation in sensor networks based on distributed mixture of factor analyzers, mobile agents and stochastic sensor selection . . . . . . 44--53 Geraldo P. R. Filho and Leandro A. Villas and Heitor Freitas and Alan Valejo and Daniel L. Guidoni and Jó Ueyama ResiDI: Towards a smarter smart home system for decision-making using wireless sensors and actuators . . . . . 54--69 Gloria Ciavarrini and Maria S. Greco and Alessio Vecchio Geolocation of Internet hosts: Accuracy limits through Cramér--Rao lower bound 70--80 Murat Karakus and Arjan Durresi Economic Viability of Software Defined Networking (SDN) . . . . . . . . . . . . 81--95 E. Schiller and N. Nikaein and E. Kalogeiton and M. Gasparyan and T. Braun CDS-MEC: NFV/SDN-based Application Management for MEC in 5G Systems . . . . 96--107 Charalampos Konstantopoulos and Nikolaos Vathis and Grammati Pantziou and Damianos Gavalas Employing mobile elements for delay-constrained data gathering in WSNs 108--131 Arvind Merwaday and Murat Yuksel and Thomas Quint and Ismail Güvenç and Walid Saad and Naim Kapucu Incentivizing spectrum sharing via subsidy regulations for future wireless networks . . . . . . . . . . . . . . . . 132--146 Andrés F. Murillo Piedrahita and Vikram Gaur and Jairo Giraldo and Alvaro A. Cardenas and Sandra Julieta Rueda Virtual incident response functions in control systems . . . . . . . . . . . . 147--159 Walid Khallef and Sylvain Durand and Miklós Molnár ILP formulation of the exact solution of multi-constrained minimum cost multicast 160--170 Azzedine Boukerche and Robson E. De Grande Vehicular cloud computing: Architectures, applications, and mobility . . . . . . . . . . . . . . . . 171--189 Haitao Zhao and Lingchu Mao and Jibo Wei Coverage on demand: A simple motion control algorithm for autonomous robotic sensor networks . . . . . . . . . . . . 190--200 Sana Rekik and Nouha Baccour and Mohamed Jmaiel and Khalil Drira and Luigi Alfredo Grieco Autonomous and traffic-aware scheduling for TSCH networks . . . . . . . . . . . 201--212 Marcos R. M. Falcão and Andson M. Balieiro and Kelvin L. Dias A flexible-bandwidth model with channel reservation and channel aggregation for three-layered Cognitive Radio Networks 213--225 Kushan Sudheera Kalupahana Liyanage and Maode Ma and Peter Han Joo Chong Controller placement optimization in hierarchical distributed software defined vehicular networks . . . . . . . 226--239 Mira Morcos and Tijani Chahed and Lin Chen and Jocelyne Elias and Fabio Martignon A two-level auction for resource allocation in multi-tenant C-RAN . . . . 240--252 Sven Hager and Patrik John and Stefan Dietzel and Björn Scheuermann RuleBender: Tree-based policy transformations for practical packet classification systems . . . . . . . . . 253--265 Heng Zhang and Wei Xing Zheng Optimum transmission policy for remote state estimation with opportunistic energy harvesting . . . . . . . . . . . 266--274 Alexandra Cetto and Mathias Klier and Alexander Richter and Jan Felix Zolitschka ``Thanks for sharing'' --- Identifying users' roles based on knowledge contribution in Enterprise Social Networks . . . . . . . . . . . . . . . . 275--288 José Suárez-Varela and Pere Barlet-Ros Flow monitoring in Software-Defined Networks: Finding the accuracy/performance tradeoffs . . . . . 289--301
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Yehuda Afek and Anat Bremler-Barr and Shir Landau Feibish and Liron Schiff Detecting heavy flows in the SDN match and action model . . . . . . . . . . . . 1--12 Miguel Sepulcre and Javier Gozalvez Context-aware heterogeneous V2X communications for connected vehicles 13--21 Maciej Ku\'zniar and Peter Peresíni and Dejan Kosti\'c and Marco Canini Methodology, measurement and analysis of flow table update characteristics in hardware OpenFlow switches . . . . . . . 22--36 Vajiheh Hajisalem and Shahram Babaie A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection . . . . . . . . . 37--50 Ivano Cerrato and Fulvio Risso Enabling precise traffic filtering based on protocol encapsulation rules . . . . 51--67 Junmei Yao and Wei Lou and Chao Yang and Kaishun Wu Efficient Interference-Aware Power Control for Wireless Networks . . . . . 68--79 Zhaomin Chen and Chai Kiat Yeo and Bu Sung Lee and Chiew Tong Lau Power spectrum entropy based detection and mitigation of low-rate DoS attacks 80--94 Tingting Yang and Xiang Long and Arun Kumar Sangaiah and Zhigao Zheng and Chao Tong Deep detection network for real-life traffic sign in vehicular networks . . . 95--104 Seilendria A. Hadiwardoyo and Enrique Hernández-Orallo and Carlos T. Calafate and Juan Carlos Cano and Pietro Manzoni Experimental characterization of UAV-to-car communications . . . . . . . 105--118 Ming Li and Joseph Reeves and Carlos Moreno Multi-level sample importance ranking based progressive transmission strategy for time series body sensor data . . . . 119--127 Siqian Yang and Cheng Wang and Changjun Jiang Centron: Cooperative neighbor discovery in mobile Ad-hoc networks . . . . . . . 128--136 Murat Semerci and Ali Taylan Cemgil and Bülent Sankur An intelligent cyber security system against DDoS attacks in SIP networks . . 137--154 Lijie Xu and Geng Yang and Jia Xu and Lei Wang and Haipeng Dai Achieving adaptive broadcasting performance tradeoff for energy-critical sensor networks: a bottom-up approach 155--170
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Yu-Ting Lin and Thomas Bonald and Salah Eddine Elayoubi Flow-level traffic model for adaptive streaming services in mobile networks 1--16 Ryoichi Shinkuma and Yusuke Tanaka and Yoshinobu Yamada and Eiji Takahashi and Takeo Onishi User instruction mechanism for temporal traffic smoothing in mobile networks . . 17--26 Muhammad Awais Javed and Sherali Zeadally and Zara Hamid Trust-based security adaptation mechanism for Vehicular Sensor Networks 27--36 Sabrina Sicari and Alessandra Rizzardi and Daniele Miorandi and Alberto Coen-Porisini REATO: REActing TO Denial of Service attacks in the Internet of Things . . . 37--48 ChunSheng Xin and Sharif Ullah and Min Song and Zhao Wu and Qiong Gu and Huanqing Cui Throughput oriented lightweight near-optimal rendezvous algorithm for cognitive radio networks . . . . . . . . 49--60 Zhengyu Zhu and Zhongyong Wang and Zheng Chu and Di Zhang and Byonghyo Shim Robust energy harvest balancing optimization with V2X-SWIPT over MISO secrecy channel . . . . . . . . . . . . 61--68 Mahdi Zareei and Cesar Vargas-Rosales and Rafaela Villalpando-Hernandez and Leyre Azpilicueta and Mohammad Hossein Anisi and Mubashir Husain Rehmani The effects of an Adaptive and Distributed Transmission Power Control on the performance of energy harvesting sensor networks . . . . . . . . . . . . 69--82 Suman Bhunia and Paulo Alexandre Regis and Shamik Sengupta Distributed adaptive beam nulling to survive against jamming in $3$D UAV mesh networks . . . . . . . . . . . . . . . . 83--97 Danda B. Rawat and Reham Alsabet and Chandra Bajracharya and Min Song On the performance of cognitive internet-of-vehicles with unlicensed user-mobility and licensed user-activity 98--106 N. Anand and Sarath Babu and B. S. Manoj On detecting compromised controller in software defined networks . . . . . . . 107--118 Sungjin Kim and Jinkook Kim and Seokwoo Nam and Dohoon Kim WebMon: ML- and YARA-based malicious webpage detection . . . . . . . . . . . 119--131 Yunchong Guan and Weimin Lei and Wei Zhang and Shaowei Liu and Hao Li Scalable orchestration of software defined service overlay network for multipath transmission . . . . . . . . . 132--146 Ali Safa Sadiq and Suleman Khan and Kayhan Zrar Ghafoor and Mohsen Guizani and Seyedali Mirjalili Transmission power adaption scheme for improving IoV awareness exploiting: evaluation weighted matrix based on piggybacked information . . . . . . . . 147--159 Wei Guo and V. Mahendran and Sridhar Radhakrishnan Join and spilt TCP for SDN networks: Architecture, implementation, and evaluation . . . . . . . . . . . . . . . 160--172 Mohammed Amer and Anthony Busson and Isabelle Guérin Lassous Association optimization based on access fairness for Wi-Fi networks . . . . . . 173--188
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Quang Do and Ben Martini and Kim-Kwang Raymond Choo Cyber-physical systems information gathering: A smart home case study . . . 1--12 Cristina Alcaraz and Xinyi Huang and Erich Rome Security and privacy in cloud-assisted cyber-physical systems . . . . . . . . . 13--14 David Hausheer and Oliver Hohlfeld and Stefan Schmid and Guofei Gu Security and performance of software-defined networks and functions virtualization . . . . . . . . . . . . . 15--17 Qamas Gul Khan Safi and Senlin Luo and Limin Pan and Wangtong Liu and Rasheed Hussain and Safdar H. Bouk SVPS: Cloud-based smart vehicle parking system over ubiquitous VANETs . . . . . 18--30 Afraa Attiah and Muhammad Faisal Amjad and Mainak Chatterjee and Cliff Zou An evolutionary routing game for energy balance in Wireless Sensor Networks . . 31--43 Ali M. Mahmood and Adil Al-Yasiri and Omar Y. Alani Latency reduction by dynamic channel estimator selection in C-RAN networks using fuzzy logic . . . . . . . . . . . 44--56 Yantao Liu and Yasser Morgan Security against passive attacks on network coding system --- a survey . . . 57--76 Jianwei Zhang and Xinchang Zhang and Chunling Yang Towards the multi-request mechanism in pull-based peer-to-peer live streaming systems . . . . . . . . . . . . . . . . 77--89 Karishma Singh and Karan Singh and Le Hoang Son and Ahmed Aziz Congestion control in wireless sensor networks by hybrid multi-objective optimization algorithm . . . . . . . . . 90--107 Lin Cui and Fung Po Tso and Weijia Jia Enforcing network policy in heterogeneous network function box environment . . . . . . . . . . . . . . 108--118 Iván García-Magariño and Guillermo Palacios-Navarro and Raquel Lacuesta and Jaime Lloret ABSCEV: An agent-based simulation framework about smart transportation for reducing waiting times in charging electric vehicles . . . . . . . . . . . 119--135 O. Arana and F. Garcia and J. Gomez and V. Rangel MSP: Providing location privacy in WLAN networks with a MAC Swapping Protocol 136--148 Xiaofeng Gao and Tao Chen and Zongchen Chen and Guihai Chen NEMO: Novel and efficient multicast routing schemes for Hybrid Data Center Networks . . . . . . . . . . . . . . . . 149--163 Katty Rohoden and Rebeca Estrada and Hadi Otrok and Zbigniew Dziong Game theoretical framework for clustering and resource allocation in macro-femtocell networks . . . . . . . . 164--176 Javier Ramos and David Muelas and Jorge E. López de Vergara and Javier Aracil Estimation of the parameters of token-buckets in multi-hop environments 177--191 Qing Yang and Yiran Shen and Fengyuan Yang and Jianpei Zhang and Wanli Xue and Hongkai Wen HealCam: Energy-efficient and privacy-preserving human vital cycles monitoring on camera-enabled smart devices . . . . . . . . . . . . . . . . 192--200 Shireesh Bhat and George N. Rouskas and Iyad Katib On time dependent routing algorithms for open marketplaces of path services with support for in-advance path reservation 201--212
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Anand M. Baswade and Touheed Anwar Atif and Bheemarjuna Reddy Tamma and Antony Franklin A novel coexistence scheme for IEEE 802.11 for user fairness and efficient spectrum utilization in the presence of LTE-U . . . . . . . . . . . . . . . . . 1--18 Shabnam Shadroo and Amir Masoud Rahmani Systematic survey of big data and data mining in Internet of Things . . . . . . 19--47 Dan Xu and Wenli Jiao and Zhuang Yin and Junjie Huang and Yao Peng and Xiaojiang Chen and Dingyi Fang and Zhanyong Tang Maximizing throughput for low duty-cycled sensor networks . . . . . . 48--59 Masahiro Sasabe Analysis of optimal piece flow in tit-for-tat-based P2P streaming . . . . 60--69 Lingnan Gao and George N. Rouskas A spectral clustering approach to network-aware virtual request partitioning . . . . . . . . . . . . . . 70--80 Chenhong Cao and Yi Gao and Wei Dong and Jiajun Bu Accurate per-link loss tomography in dynamic sensor networks . . . . . . . . 81--91 Kawther Hassine and Mounir Frikha and Tijani Chahed Access point backhaul capacity aggregation as a matching game in the context of Wireless Local Area Networks 92--108 Aaqib Khalid and Tariq Umer and Muhammad Khalil Afzal and Sheraz Anjum and Adnan Sohail and Hafiz Muhammad Asif Autonomous data driven surveillance and rectification system using in-vehicle sensors for intelligent transportation systems (ITS) . . . . . . . . . . . . . 109--118 Rui Wang and Zhiyong Zhang and Zhiwei Zhang and Zhiping Jia ETMRM: An Energy-efficient Trust Management and Routing Mechanism for SDWSNs . . . . . . . . . . . . . . . . . 119--135 Lars Kröhnke and Jelte Jansen and Harald Vranken Resilience of the Domain Name System: A case study of the \tt .nl-domain . . . . 136--150 Ivano Cerrato and Fulvio Risso and Roberto Bonafiglia and Kostas Pentikousis and Gergely Pongrácz and Hagen Woesner COMPOSER: A compact open-source service platform . . . . . . . . . . . . . . . . 151--174
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Pratima Biswas and Ashok Singh Sairam Modeling privacy approaches for location based services . . . . . . . . . . . . . 1--14 Ahmed Salim Chekkouri and Abdellatif Ezzouhairi and Samuel Pierre A new integrated VANET-LTE --- a architecture for enhanced mobility in small cells HetNet using dynamic gateway and traffic forwarding . . . . . . . . . 15--27 Bruna Peres and Bruno P. Santos and Otavio A. de O. Souza and Olga Goussevskaia and Marcos A. M. Vieira and Luiz F. M. Vieira and Antonio A. F. Loureiro Matrix: Multihop Address allocation and dynamic any-To-any Routing for 6LoWPAN 28--40 Hasmukh Patel and Devesh C. Jinwala LPM: A lightweight authenticated packet marking approach for IP traceback . . . 41--50 George Koufoudakis and Konstantinos Oikonomou and Konstantinos Giannakis and Sonia A\"\issa Probabilistic flooding coverage analysis for efficient information dissemination in wireless networks . . . . . . . . . . 51--61 Jingyu Hua and Laiping Zhao and Suohao Zhang and Yangyang Liu and Xin Ge and Sheng Zhong Topology-Preserving Traffic Engineering for Hierarchical Multi-Domain SDN . . . 62--77 Bitan Banerjee and Adita Kulkarni and Anand Seetharam Greedy Caching: An optimized content placement strategy for information-centric networks . . . . . . 78--91 Guoquan Li and Ying Zhou and Tong Bai and Jinzhao Lin and Yu Pang and Wei Wu and Sadia Din and Gwanggil Jeon Performance analysis for low-complexity detection of MIMO V2V communication systems . . . . . . . . . . . . . . . . 92--100 Mohammed Yazid Lyazidi and Nadjib Aitsaadi and Rami Langar A dynamic resource allocation framework in LTE downlink for Cloud-Radio Access Network . . . . . . . . . . . . . . . . 101--111 Adele Lu Jia and Siqi Shen and Dongsheng Li and Shengling Chen Predicting the implicit and the explicit video popularity in a User Generated Content site with enhanced social features . . . . . . . . . . . . . . . . 112--125 Moustafa M. Nasralla and Manzoor Razaak and Ikram U. Rehman and Maria G. Martini Content-aware packet scheduling strategy for medical ultrasound videos over LTE wireless networks . . . . . . . . . . . 126--137 Aneesh M. Koya and Deepthi P. P. Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network . . . . . . . . . . . 138--151 Seyyed Naser Seyyed Hashemi and Ali Bohlooli Analytical modeling of multi-source content delivery in information-centric networks . . . . . . . . . . . . . . . . 152--162 Qian He and Ning Zhang and Yongzhuang Wei and Yan Zhang Lightweight attribute based encryption scheme for mobile cloud assisted cyber-physical systems . . . . . . . . . 163--173
Hui Cai and Yanmin Zhu and Zhenni Feng and Hongzi Zhu and Jiadi Yu and Jian Cao Truthful incentive mechanisms for mobile crowd sensing with dynamic smartphones ii--ii Tongxiang Wang and Xianglin Wei and Jianhua Fan and Tao Liang Adaptive jammer localization in wireless networks . . . . . . . . . . . . . . . . 1--16 Anonymous Editorial Board . . . . . . . . . . . . 1--234 A. Serdar Tan and Engin Zeydan Performance maximization of network assisted mobile data offloading with opportunistic Device-to-Device communications . . . . . . . . . . . . . 17--30 Yu Li and Xiaotian Wang and Dae Wook Kim and Junjie Zhang and Rui Dai Designing self-destructing wireless sensors with security and performance assurance . . . . . . . . . . . . . . . 31--43 Qing Yang and Paolo Gasti and Kiran Balagani and Yantao Li and Gang Zhou USB side-channel attack on Tor . . . . . 44--56 Ramin Karimi and Saeed Shokrollahi PGRP: Predictive geographic routing protocol for VANETs . . . . . . . . . . 57--66 Haibo Wang and Hongli Xu and Liusheng Huang and Jianxin Wang and Xuwei Yang Load-balancing routing in software defined networks with multiple controllers . . . . . . . . . . . . . . 67--81 Anubhab Banerjee and Bitan Banerjee and Anand Seetharam and Chintha Tellambura Content search and routing under custodian unavailability in information-centric networks . . . . . . 82--91 Yuan Yang and Mingwei Xu Demand-oblivious routing with planned link pruning . . . . . . . . . . . . . . 92--101 Dali Zhu and Bobai Zhao and Siye Wang Mobile target indoor tracking based on Multi-Direction Weight Position Kalman Filter . . . . . . . . . . . . . . . . . 102--114 Kyubo Shin and Hyoil Kim and Se Young Chun and Donghoon Shin TVWS assisted performance anomaly mitigation exploiting spectrum heterogeneity . . . . . . . . . . . . . 115--127 Cuicui Lv and Qiang Wang and Wenjie Yan and Jia Li A sparsity feedback-based data gathering algorithm for Wireless Sensor Networks 128--144 Morteza Tavana and Ali Rahmati and Vahid Shah-Mansouri Congestion control with adaptive access class barring for LTE M2M overload using Kalman filters . . . . . . . . . . . . . 145--156 Georgios Tsoumanis and Konstantinos Oikonomou and George Koufoudakis and Sonia A\"\issa Energy-efficient sink placement in wireless sensor networks . . . . . . . . 157--165 Zhuo Wang and Xiaoning Feng and Guangjie Han and Yancheng Sui and Hongde Qin EODL: Energy Optimized Distributed Localization Method in three-dimensional underwater acoustic sensors networks . . 166--178 Chi Xu and Chunhe Song and Peng Zeng and Haibin Yu Secure resource allocation for energy harvesting cognitive radio sensor networks without and with cooperative jamming . . . . . . . . . . . . . . . . 179--188 Heyuan Shi and Xibin Zhao and Hai Wan and Huihui Wang and Jian Dong and Kun Tang and Anfeng Liu Multi-model induced network for participatory-sensing-based classification tasks in intelligent and connected transportation systems . . . . 199--221 Djamel Eddine Kouicem and Abdelmadjid Bouabdallah and Hicham Lakhlef Internet of Things security: a top-down survey . . . . . . . . . . . . . . . . . 222--233
Kamal Adli Mehr and Javad Musevi Niya and Nail Akar Queue management for two-user cognitive radio with delay-constrained primary user . . . . . . . . . . . . . . . . . . ii--ii Andrea Detti and Lorenzo Bracciale and Pierpaolo Loreti and Giulio Rossi and Nicola Blefari Melazzi A cluster-based scalable router for information centric networks . . . . . . 1--12 Anonymous Editorial Board . . . . . . . . . . . . 1--290 Saifur Rahman Sabuj and Masanori Hamamura Two-slope path-loss design of energy harvesting in random cognitive radio networks . . . . . . . . . . . . . . . . 13--23 Dilara Akdogan and Duygu Karaoglan Altop and Laleh Eskandarian and Albert Levi Secure key agreement protocols: Pure biometrics and cancelable biometrics . . 24--32 Ram Narayan Yadav and Rajiv Misra Approximating the largest connected topology in cognitive radio networks . . 33--48 Mahya Mohammadi Golchi and Homayun Motameni Evaluation of the improved particle swarm optimization algorithm efficiency inward peer to peer video streaming . . 49--63 Ali Safari Khatouni and Marco Ajmone Marsan and Marco Mellia and Reza Rejaie Deadline-constrained content upload from multihomed devices: Formulations and algorithms . . . . . . . . . . . . . . . 64--75 Meihui Gao and Bernardetta Addis and Mathieu Bouet and Stefano Secci Optimal orchestration of virtual network functions . . . . . . . . . . . . . . . 76--92 Sourav Kumar Bhoi and Deepak Puthal and Pabitra Mohan Khilar and Joel J. P. C. Rodrigues and Sanjaya Kumar Panda and Laurence T. Yang Adaptive routing protocol for urban vehicular networks to support sellers and buyers on wheels . . . . . . . . . . 93--107 Malak Sadik and Nadine Akkari and Ghadah Aldabbagh SDN-based handover scheme for multi-tier LTE/Femto and D2D networks . . . . . . . 108--127 Reem E. Mohamed and Walid R. Ghanem and Abeer T. Khalil and Mohamed Elhoseny and Muhammad Sajjad and Mohamed A. Mohamed Energy efficient collaborative proactive routing protocol for Wireless Sensor Network . . . . . . . . . . . . . . . . 128--141 Weiwei Li and Petros Spachos and Mark Chignell and Alberto Leon-Garcia and Leon Zucherman and Jie Jiang A quantitative relationship between Application Performance Metrics and Quality of Experience for Over-The-Top video . . . . . . . . . . . . . . . . . 142--153 Salma Bradai and Sofien Khemakhem and Mohamed Jmaiel Real-time and energy aware opportunistic mobile crowdsensing framework based on people's connectivity habits . . . . . . 154--167 Zhetao Li and YuXin Liu and Ming Ma and Anfeng Liu and Xiaozhi Zhang and Gungming Luo MSDG: a novel green data gathering scheme for wireless sensor networks . . 179--193 Rubén Rumipamba-Zambrano and Jordi Perelló and Joan M. Gené and Salvatore Spadaro On the scalability of dynamic Flex-Grid/SDM optical core networks . . 194--207 Samoda Gamage and Jamil Y. Khan and Duy T. Ngo Adaptive resource allocation with traffic peak duration prediction and admission control for cognitive Wi-Fi networks . . . . . . . . . . . . . . . . 208--222 Sheneela Naz and Rao Naveed Bin Rais and Peer Azmat Shah and Sadaf Yasmin and Amir Qayyum and Seungmin Rho and Yunyoung Nam A dynamic caching strategy for CCN-based MANETs . . . . . . . . . . . . . . . . . 223--239 Wenbo Zhao and Xueyan Tang and Luping Xu Constructing routing structures for sensor data collection with dynamic traffic patterns . . . . . . . . . . . . 240--252 Fanzi Zeng and Jisheng Xu and Yongfeng Li and Kang Li and Lei Jiao Performance analysis of underlay two-way relay cooperation in cognitive radio networks with energy harvesting . . . . 253--271 Shenghong Li and Wei Ni and Chang Kyung Sung and Mark Hedley Recent advances on cooperative wireless localization and their application in inhomogeneous propagation environments 272--290
Junfeng Li and Dan Li and Yirong Yu and Yukai Huang and Jing Zhu and Jinkun Geng Towards full virtualization of SDN infrastructure . . . . . . . . . . . . . ii--ii Zichuan Xu and Weifa Liang and Alex Galis and Yu Ma and Qiufen Xia and Wenzheng Xu Throughput optimization for admitting NFV-enabled requests in cloud networks 1--14 Anonymous Editorial Board . . . . . . . . . . . . 1--288 Pengchao Han and Yejun Liu and Lei Guo QoS satisfaction aware and network reconfiguration enabled resource allocation for virtual network embedding in Fiber--Wireless access network . . . 15--29 Weibin Xie and Fang Wang and Dan Feng and Lingling Zhang and Tingwei Zhu and Qingyu Shi Host-based scheduling: Achieving near-optimal transport for datacenter networks . . . . . . . . . . . . . . . . 30--48 Gokhan Sagirlar and Barbara Carminati and Elena Ferrari Decentralizing privacy enforcement for Internet of Things smart objects . . . . 49--61 Junchao Wang and Kaining Han and Anastasios Alexandridis and Zeljko Zilic and Yu Pang and Wei Wu and Sadia Din and Gwanggil Jeon A novel security scheme for Body Area Networks compatible with smart vehicles 62--73 Joaquim Ferreira and Muhammad Alam and Bruno Fernandes and Luis Silva and João Almeida and Lara Moura and Rui Costa and Giovanni Iovino and Elena Cordiviola Cooperative sensing for improved traffic efficiency: the highway field trial . . 74--81 Sijia Chen and Bin Song and Jie Guo and Yanling Zhang and Xiaojiang Du and Mohsen Guizani FPAN: Fine-grained and progressive attention localization network for data retrieval . . . . . . . . . . . . . . . 82--97 Khalil Al-Hussaeni and Benjamin C. M. Fung and Farkhund Iqbal and Gaby G. Dagher and Eun G. Park SafePath: Differentially-private publishing of passenger trajectories in transportation systems . . . . . . . . . 98--111 P. A. Baziana Exploring the optimum number of receivers per station in WDM networks 112--125 Claudia Campolo and Antonella Molinaro and Antonio Iera A reference framework for social-enhanced Vehicle-to-Everything communications in 5G scenarios . . . . . 126--139 Gagangeet Singh Aujla and Anish Jindal and Neeraj Kumar EVaaS: Electric vehicle-as-a-service for energy trading in SDN-enabled smart transportation system . . . . . . . . . 140--152 Ming Li and Dejun Yang and Jian Lin and Ming Li and Jian Tang SpecWatch: a framework for adversarial spectrum monitoring with unknown statistics . . . . . . . . . . . . . . . 153--165 Chen Liu and Dingyi Fang and Yue Hu and Shensheng Tang and Dan Xu and Wen Cui and Xiaojiang Chen and Baoying Liu and Guangquan Xu and Hao Chen EasyGo: Low-cost and robust geographic opportunistic sensing routing in a strip topology wireless sensor network . . . . 166--175 Jie Li and Xingwei Wang and Min Huang SVDR: a scalable virtual domain-based routing scheme for CCN . . . . . . . . . 176--190 Faisal Riaz and Sania Khadim and Rabia Rauf and Mudassar Ahmad and Sohail Jabbar and Junaid Chaudhry A validated fuzzy logic inspired driver distraction evaluation system for road safety using artificial human driver emotion . . . . . . . . . . . . . . . . 191--205 Mustapha Khiati and Djamel Djenouri Adaptive learning-enforced broadcast policy for solar energy harvesting wireless sensor networks . . . . . . . . 206--220 Haibin Zhang and Jiajia Liu and Ai-Chun Pang A Bayesian network model for data losses and faults in medical body sensor networks . . . . . . . . . . . . . . . . 221--246 Vijayalakshmi Murugesan and Mercy Shalinie Selvaraj and Ming-Hour Yang HPSIPT: a high-precision single-packet IP traceback scheme . . . . . . . . . . 263--274 Ola Salman and Imad Elhajj and Ali Chehab and Ayman Kayssi IoT survey: an SDN and fog computing perspective . . . . . . . . . . . . . . 275--288
Tim Strayer and Samuel Nelson and Amando Caro and Joud Khoury and Bryan Tedesco and Olivia DeRosa and Carsten Clark and Kolia Sadeghi and Michael Matthews and Jake Kurzer and Philip Lundrigan and Vikas Kawadia and Dorene Ryder and Keith Gremban and Wayne Phoel Content sharing with mobility in an infrastructure-less environment . . . . ii--ii Xi Chen and Chuanhe Huang and Xiying Fan and Di Liu and Peng Li LDMAC: a propagation delay-aware MAC scheme for long-distance UAV networks 1--16 Anonymous Editorial Board . . . . . . . . . . . . 1--296 Fatma Karray and Mohamed W. Jmal and Alberto Garcia-Ortiz and Mohamed Abid and Abdulfattah M. Obeid A comprehensive survey on wireless sensor node hardware platforms . . . . . 17--39 Bahare M. Khorsandi and Carla Raffaelli BBU location algorithms for survivable 5G C-RAN over WDM . . . . . . . . . . . 40--52 Jung-Han Han and Seung-Jae Han Non-intrusive estimation of available throughput for IEEE 802.11 link . . . . 53--63 Lei Wang and Qing Li and Richard Sinnott and Yong Jiang and Jianping Wu An intelligent rule management scheme for Software Defined Networking . . . . 64--76 Tamer Aldwairi and Dilina Perera and Mark A. Novotny An evaluation of the performance of Restricted Boltzmann Machines as a model for anomaly network intrusion detection 77--88 Hadi Habibzadeh and Tolga Soyata and Burak Kantarci and Azzedine Boukerche and Cem Kaptan Sensing, communication and security planes: a new challenge for a smart city system design . . . . . . . . . . . . . 89--110 Mikhail Zolotukhin and Alexander Sayenko and Timo Hämäläinen On optimal deployment of low power nodes for high frequency next generation wireless systems . . . . . . . . . . . . 111--119 Sohail Sarang and Micheal Drieberg and Azlan Awang and Rizwan Ahmad A QoS MAC protocol for prioritized data in energy harvesting wireless sensor networks . . . . . . . . . . . . . . . . 120--140 Natthanan Promsuk and Attaphongse Taparugssanagorn and Johanna Vartiainen Probability of false alarm based interference suppression methods in Internet of Things (IoT) systems . . . . 141--153 Priyan Malarvizhi Kumar and Usha Devi G and Gunasekaran Manogaran and Revathi Sundarasekar and Naveen Chilamkurti and Ramachandran Varatharajan Ant colony optimization algorithm with Internet of Vehicles for intelligent traffic control system . . . . . . . . . 163--200 Simon Yusuf Enoch and Mengmeng Ge and Jin B. Hong and Hani Alzaid and Dong Seong Kim A systematic evaluation of cybersecurity metrics for dynamic networks . . . . . . 201--215 Chun-Chih Lo and Yau-Hwang Kuo A geo-temporal mobility prediction method for cooperative time-validity-constrained content delivery in opportunistic networks . . . 216--229 Sadananda Behera and Jithin George and Goutam Das Effect of transmission impairments in CO-OFDM based Elastic Optical Network design . . . . . . . . . . . . . . . . . 230--241 Fawaz AL-Hazemi and Yuyang Peng and Chan-Hyun Youn and Josip Lorincz and Chao Li and Guo Song and Raouf Boutaba Dynamic allocation of power delivery paths in consolidated data centers based on adaptive UPS switching . . . . . . . 242--253 Julian Andres Caicedo-Muñoz and Agapito Ledezma Espino and Juan Carlos Corrales and Alvaro Rendón QoS-Classifier for VPN and Non-VPN traffic based on time-related features 254--270 Yuhang Ye and Brian Lee and Ronan Flynn and Niall Murray and Guiming Fang and Jianwen Cao and Yuansong Qiao PTP: Path-specified transport protocol for concurrent multipath transmission in named data networks . . . . . . . . . . 271--279 Alem Colakovi\'c and Mesud Hadziali\'c Internet of Things (IoT): a review of enabling technologies, challenges, and open research issues . . . . . . . . . . 280--296
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Jonas Hansen and Jeppe Krigslund and Daniel E. Lucani and Peyman Pahlevani and Frank H. P. Fitzek Bridging inter-flow and intra-flow network coding in wireless mesh networks: From theory to implementation 1--12 Carles Angl\`es-Tafalla and Jordi Castell\`a-Roca and Maci\`a Mut-Puigserver and M. Magdalena Payeras-Capell\`a and Alexandre Viejo Secure and privacy-preserving lightweight access control system for low emission zones . . . . . . . . . . . 13--26 G. Reali and M. Femminella and E. Nunzi and D. Valocchi Genomics as a service: a joint computing and networking perspective . . . . . . . 27--51 Adel Abusitta and Martine Bellaiche and Michel Dagenais On trustworthy federated clouds: a coalitional game approach . . . . . . . 52--63 I-Fen Chao and Chain-Hung Lee AWG-based WDM ring networks: High-performance and low-cost system designs . . . . . . . . . . . . . . . . 64--75 Won-Suk Kim and Sang-Hwa Chung User incentive model and its optimization scheme in user-participatory fog computing environment . . . . . . . . . . . . . . 76--88 Mohamed Saad Non-isotonic routing metrics solvable to optimality via shortest path . . . . . . 89--95 Fahed H. Awad Optimization of relay node deployment for multisource multipath routing in Wireless Multimedia Sensor Networks using Gaussian distribution . . . . . . 96--106 Tao Wu and Panlong Yang and Haipeng Dai and Ping Li and Xunpeng Rao Near optimal bounded route association for drone-enabled rechargeable WSNs . . 107--117 Koki Inoue and Shin'ichi Arakawa and Satoshi Imai and Toru Katagiri and Masayuki Murata Noise-induced VNE method for software-defined infrastructure with uncertain delay behaviors . . . . . . . 118--127 Iftikhar Ahmad and Rafidah Md Noor and Ismail Ahmedy and Syed Adeel Ali Shah and Ibrar Yaqoob and Ejaz Ahmed and Muhammad Imran VANET-LTE based heterogeneous vehicular clustering for driving assistance and route planning applications . . . . . . 128--140 Fatima Zohra Bousbaa and Nasreddine Lagraa and Chaker Abdelaziz Kerrache and Fen Zhou and Mohamed Bachir Yagoubi and Rasheed Hussain A distributed time-limited multicast algorithm for VANETs using incremental power strategy . . . . . . . . . . . . . 141--155 Chuan Zhu and Kangning Quan and Guangjie Han and Joel J. P. C. Rodrigues A high-available and location predictive data gathering scheme with mobile sinks for wireless sensor networks . . . . . . 156--164 Xiaoyun Yan and Ping Dong and Xiaojiang Du and Tao Zheng and Jianan Sun and Mohsen Guizani Improving flow delivery with link available time prediction in software-defined high-speed vehicular networks . . . . . . . . . . . . . . . . 165--174 Chun-Yu Wang and Chi-Lung Ou and Yu-En Zhang and Feng-Min Cho and Pin-Hao Chen and Jyh-Biau Chang and Ce-Kuen Shieh BotCluster: a session-based P2P botnet clustering system on NetFlow . . . . . . 175--189 Sunder Ali Khowaja and Aria Ghora Prabono and Feri Setiawan and Bernardo Nugroho Yahya and Seok-Lyong Lee Contextual activity based Healthcare Internet of Things, Services, and People (HIoTSP): an architectural framework for healthcare monitoring using wearable sensors . . . . . . . . . . . . . . . . 190--206 Ismaeel Al Ridhawi and Moayad Aloqaily and Burak Kantarci and Yaser Jararweh and Hussein T. Mouftah A continuous diversified vehicular cloud service availability framework for smart cities . . . . . . . . . . . . . . . . . 207--218 Madhusudan Singh and Shiho Kim Branch based blockchain technology in intelligent vehicle . . . . . . . . . . 219--231 Xin Chen and Guoqiang Zhang and Qian Gao and Huajun Cui Improving NDN forwarding engine performance by rendezvous-based caching and forwarding . . . . . . . . . . . . . 232--242 Alassane Samba and Yann Busnel and Alberto Blanc and Philippe Dooze and Gwendal Simon Predicting file downloading time in cellular network: Large-scale analysis of machine learning approaches . . . . . 243--254 Oluwatosin Ahmed Amodu and Mohamed Othman Machine-to-Machine Communication: an Overview of Opportunities . . . . . . . 255--276
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Israel L. C. Vasconcelos and Ivan C. Martins and Carlos M. S. Figueiredo and Andre L. L. Aquino A data sample algorithm applied to wireless sensor network with disruptive connections . . . . . . . . . . . . . . 1--11 Diego Cruz Abrahão and Flávio Henrique Teles Vieira Scheduling algorithm for the LTE downlink with F-OFDM using adaptive multifractal envelope process and minimum service curve . . . . . . . . . 12--32 Farzad Tashtarian and Alireza Erfanian and Amir Varasteh $S$2VC: an SDN-based framework for maximizing QoE in SVC-based HTTP adaptive streaming . . . . . . . . . . . 33--46 Behrouz Shahgholi Ghahfarokhi and Maryam Azadmanesh and Samaneh Khadem Khorasani Energy and spectrum efficient mobility-aware resource management for D2D multicasting . . . . . . . . . . . . 47--64 Massimo Condoluci and Toktam Mahmoodi Softwarization and virtualization in 5G mobile networks: Benefits, trends and challenges . . . . . . . . . . . . . . . 65--84 Jain-Shing Liu Joint downlink resource allocation in LTE-Advanced heterogeneous networks . . 85--103 Chuanwen Luo and Jiguo Yu and Deying Li and Honglong Chen and Yi Hong and Lina Ni A novel distributed algorithm for constructing virtual backbones in wireless sensor networks . . . . . . . . 104--114 Yoshinobu Yamada and Ryoichi Shinkuma and Takanori Iwai and Takeo Onishi and Takahiro Nobukiyo and Kozo Satoda Temporal traffic smoothing for IoT traffic in mobile networks . . . . . . . 115--124 Jack Kirton and Matthew Bradbury and Arshad Jhumka Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks . . . . . . . . . . . . 125--137 Lun Tang and Guofan Zhao and Chenmeng Wang and Peipei Zhao and Qianbin Chen Queue-aware reliable embedding algorithm for 5G network slicing . . . . . . . . . 138--150 Tarek Gaber and Sarah Abdelwahab and Mohamed Elhoseny and Aboul Ella Hassanien Trust-based secure clustering in WSN-based intelligent transportation systems . . . . . . . . . . . . . . . . 151--158 Hao Yang and Xiwei Wang ECO CS: Energy consumption optimized compressive sensing in group sensor networks . . . . . . . . . . . . . . . . 159--166 Piotr Lechowicz and Krzysztof Walkowiak and Miroslaw Klinkowski Greedy randomized adaptive search procedure for joint optimization of unicast and anycast traffic in spectrally-spatially flexible optical networks . . . . . . . . . . . . . . . . 167--182 Dan Xu and Wenli Jiao and Zhuang Yin and Bin Wu and Yao Peng and Xiaojiang Chen and Feng Chen and Dingyi Fang Enabling robust and reliable transmission in Internet of Things with multiple gateways . . . . . . . . . . . 183--199 Gewu Bu and Maria Potop-Butucaru FIFO order reliable convergecast in WBAN 200--216 Peng Sun and Azzedine Boukerche Performance modeling and analysis of a UAV path planning and target detection in a UAV-based wireless sensor network 217--231 Khaled Almi'ani and Young Choon Lee and Bernard Mans On efficient resource use for scientific workflows in clouds . . . . . . . . . . 232--242
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Lei Wang and Qing Li and Yong Jiang and Xuya Jia and Jianping Wu Woodpecker: Detecting and mitigating link-flooding attacks via SDN . . . . . 1--13 Yongwook Ra and June-Koo Kevin Rhee and Junseong Bang and Yunjoo Kim Photonic-Frame-Based TCP proxy architecture in optically interconnected data center networks . . . . . . . . . . 14--26 Prabhat Thakur and Alok Kumar and S. Pandit and G. Singh and S. N. Satashia Analysis of high-traffic cognitive radio network with imperfect spectrum monitoring technique . . . . . . . . . . 27--37 Jianhua Huang and Danwei Ruan and Weiqiang Meng An annulus sector grid aided energy-efficient multi-hop routing protocol for wireless sensor networks 38--48 Yu Zhao and Yunhuai Liu and Tingting Yu and Tian He and Chen Qian FREDI: Robust RSS-based ranging with multipath effect and radio interference 49--63 Xiaodong Wang and Ye Tian and Min Zhao and Mingzheng Li and Lei Mei and Xinming Zhang PNPL: Simplifying programming for protocol-oblivious SDN networks . . . . 64--80 Sylvie Delaët and Shlomi Dolev and Daniel Khankin and Shimrit Tzur-David Make&activate-before-break for seamless SDN route updates . . . . . . . . . . . 81--97 Kai Bu and Kaiwen Zhu and Yi Zheng and Yuanyuan Yang and Yutian Yang and Linfeng Cheng Fastlane-ing more flows with less bandwidth for software-defined networking . . . . . . . . . . . . . . . 98--111 Nils Dorsch and Fabian Kurtz and Christian Wietfeld Enabling hard service guarantees in Software-Defined Smart Grid infrastructures . . . . . . . . . . . . 112--131 Luigi Atzori and Alessandro Floris and Roberto Girau and Michele Nitti and Giovanni Pau Towards the implementation of the Social Internet of Vehicles . . . . . . . . . . 132--145 Slawomir Hanczewski and Maciej Stasiak and Joanna Weissenberg Queueing model of a multi-service system with elastic and adaptive traffic . . . 146--161 Chedia Jarray and Anastasios Giovanidis Successful file transmission in mobile D2D networks with caches . . . . . . . . 162--179 Abolfazl Hajisami and Dario Pompili Cloud-BSS: Joint intra- and inter-cluster interference cancellation in uplink 5G cellular networks . . . . . 180--190 A. Grassi and G. Piro and G. Boggia and M. Kurras and W. Zirwas and R. SivaSiva Ganesan and K. Pedersen and L. Thiele Massive MIMO interference coordination for 5G broadband access: Integration and system level study . . . . . . . . . . . 191--203 Itamar Cohen and Gabriel Scalosub Queueing in the mist: Buffering and scheduling with limited knowledge . . . 204--220 Maroua Ben Attia and Kim-Khoa Nguyen and Mohamed Cheriet QoS-aware software-defined routing in smart community network . . . . . . . . 221--235 Xiaoqian Li and Kwan L. Yeung Bandwidth-efficient network monitoring algorithms based on segment routing . . 236--245 Muhammad Jawad Khokhar and Nawfal Abbassi Saber and Thierry Spetebroot and Chadi Barakat An intelligent sampling framework for controlled experimentation and QoE modeling . . . . . . . . . . . . . . . . 246--261 I. F. Akyildiz and A. Kak and E. Khorov and A. Krasilov and A. Kureev ARBAT: a flexible network architecture for QoE-aware communications in 5G systems . . . . . . . . . . . . . . . . 262--279
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Ian F. Akyildiz and Harry Rudin and Burkhard Stiller Computer Networks (COMNET) Editorial for 2018 . . . . . . . . . . . . . . . . . . iii--iv Hailong Huang and Andrey V. Savkin and Ming Ding and Chao Huang Mobile robots in wireless sensor networks: a survey on tasks . . . . . . 1--19 Jaehyun Park and Jaehee Ha and Brent Byunghoon Kang and Myungchul Kim MoHoP: a protocol providing for both mobility management and host privacy . . 20--33 Yazhou Yuan and Xiaoqin Sun and Zhixin Liu and Yuefeng Li and Xinping Guan Approach of personnel location in roadway environment based on multi-sensor fusion and activity classification . . . . . . . . . . . . . 34--45 Yanling Shao and Chunlin Li and Hengliang Tang A data replica placement strategy for IoT workflows in collaborative edge and cloud environments . . . . . . . . . . . 46--59 Konrad-Felix Krentz and Christoph Meinel Denial-of-sleep defenses for IEEE 802.15.4 coordinated sampled listening (CSL) . . . . . . . . . . . . . . . . . 60--71 Chi Lin and Yu Sun and Kai Wang and Zhunyue Chen and Bo Xu and Guowei Wu Double warning thresholds for preemptive charging scheduling in Wireless Rechargeable Sensor Networks . . . . . . 72--87 Rafael B. R. Lourenço and Gustavo B. Figueiredo and Massimo Tornatore and Biswanath Mukherjee Data evacuation from data centers in disaster-affected regions through software-defined satellite networks . . 88--100 Huansheng Ning and Feifei Shi and Tao Zhu and Qingjuan Li and Liming Chen A novel ontology consistent with acknowledged standards in smart homes 101--107 Yannick Léo and Christophe Crespelle and Eric Fleury Non-altering time scales for aggregation of dynamic networks into series of graphs . . . . . . . . . . . . . . . . . 108--119 Yuan Chai and Xiao-Jun Zeng Regional condition-aware hybrid routing protocol for hybrid wireless mesh network . . . . . . . . . . . . . . . . 120--128 Thi-Minh Nguyen and Michel Minoux and Serge Fdida Optimizing resource utilization in NFV dynamic systems: New exact and heuristic approaches . . . . . . . . . . . . . . . 129--141 Hao Wang and Guangjie Han and Lina Zhou and James Adu Ansere and Wenbo Zhang A source location privacy protection scheme based on ring-loop routing for the IoT . . . . . . . . . . . . . . . . 142--150 Mojtaba Ghermezcheshmeh and Vahid Shah-Mansouri and Mohammad Ghanbari Analysis and performance evaluation of scalable video coding over heterogeneous cellular networks . . . . . . . . . . . 151--163 Fadi Salo and Ali Bou Nassif and Aleksander Essex Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection . . . . . . . . . . 164--175 Francesco Marino and Corrado Moiso and Matteo Petracca Automatic contract negotiation, service discovery and mutual authentication solutions: a survey on the enabling technologies of the forthcoming IoT ecosystems . . . . . . . . . . . . . . . 176--195 Marko Kompara and SK Hafizul Islam and Marko Hölbl A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANs . . . . . 196--213 Abdul Wahid and Humera Yasmeen and Munam Ali Shah and Masoom Alam and Sayed Chhattan Shah Holistic approach for coupling privacy with safety in VANETs . . . . . . . . . 214--230 Cun Ji and Chao Zhao and Shijun Liu and Chenglei Yang and Li Pan and Lei Wu and Xiangxu Meng A fast shapelet selection algorithm for time series classification . . . . . . . 231--240 Parvaneh Asghari and Amir Masoud Rahmani and Hamid Haj Seyyed Javadi Internet of Things applications: a systematic review . . . . . . . . . . . 241--261 Neda Petreska and Hussein Al-Zubaidy and Rudi Knorr and James Gross Bound-based power optimization for multi-hop heterogeneous wireless industrial networks under statistical delay constraints . . . . . . . . . . . 262--279 Matthias Schunter and Andreas Wespi Editorial: Special issue on IoT security and privacy . . . . . . . . . . . . . . 280--282 Mardiana binti Mohamad Noor and Wan Haslina Hassan Current research on Internet of Things (IoT) security: a survey . . . . . . . . 283--294 Jianwei Hou and Leilei Qu and Wenchang Shi A survey on Internet of Things security from data perspectives . . . . . . . . . 295--306 Zheng Zhou and Weiming Zhang and Shangbin Li and Nenghai Yu Potential risk of IoT device supporting IR remote control . . . . . . . . . . . 307--317 Kai Yang and Qiang Li and Limin Sun Towards automatic fingerprinting of IoT devices in the cyberspace . . . . . . . 318--327 Mohamed Eldefrawy and Ismail Butun and Nuno Pereira and Mikael Gidlund Formal security analysis of LoRaWAN . . 328--339 Yi-Ning Liu and Yan-Ping Wang and Xiao-Fen Wang and Zhe Xia and Jing-Fang Xu Privacy-preserving raw data collection without a trusted authority for IoT . . 340--348 Yuxian Liu and Shaohua Tang and Hao-Tian Wu and Xinglin Zhang RTPT: a framework for real-time privacy-preserving truth discovery on crowdsensed data streams . . . . . . . . 349--360 Umair Sarfraz and Masoom Alam and Sherali Zeadally and Abid Khan Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions 361--372
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Qing Li and Yang Liu and Zhijie Zhu and Hengtong Li and Yong Jiang BOND: Flexible failure recovery in software defined networks . . . . . . . 1--12 Cesar Bernardini and Samuel Marchal and Muhammad Rizwan Asghar and Bruno Crispo PrivICN: Privacy-preserving content retrieval in information-centric networking . . . . . . . . . . . . . . . 13--28 Ankur Gupta and Meenakshi Tripathi and Tabish Jamil Shaikh and Aakar Sharma A lightweight anonymous user authentication and key establishment scheme for wearable devices . . . . . . 29--42 Rodrigo Vieira Steiner and Emil Lupu Towards more practical software-based attestation . . . . . . . . . . . . . . 43--55 Tong Liu and Yanmin Zhu and Liqun Huang TGBA: a two-phase group buying based auction mechanism for recruiting workers in mobile crowd sensing . . . . . . . . 56--75 Mohamad Zalghout and Ayman Khalil and Matthieu Crussiére and Samih Abdul-Nabi and Jean-Francois Hélard Context-aware and priority-based user association and resource allocation in heterogeneous wireless networks . . . . 76--92 Sok-Ian Sou and Ming-Ru Li and Shan-Huei Wang and Meng-Hsun Tsai File distribution via proximity group communications in LTE-advanced public safety networks . . . . . . . . . . . . 93--101 Bala Prakasa Rao Killi and Seela Veerabhadreswara Rao Towards improving resilience of controller placement with minimum backup capacity in software defined networks 102--114 Martino Trevisan and Idilio Drago and Marco Mellia PAIN: a Passive Web performance indicator for ISPs . . . . . . . . . . . 115--126 Rongjun Xie and Ibrahim Khalil and Shahriar Badsha and Mohammed Atiquzzaman Collaborative extreme learning machine with a confidence interval for P2P learning in healthcare . . . . . . . . . 127--143 Xueyang Qin and Xiaoming Wang and Liang Wang and Yaguang Lin and Xinyan Wang An efficient probabilistic routing scheme based on game theory in opportunistic networks . . . . . . . . . 144--153 Asad Arfeen and Krzysztof Pawlikowski and Don McNickle and Andreas Willig Global and local scaling analysis of link streams in access and backbone core networks . . . . . . . . . . . . . . . . 154--172 Tong Wang and MengBo Tang and Houbing Song and Y. Cao and Zaheer Khan Opportunistic protocol based on social probability and resources efficiency for the intelligent and connected transportation system . . . . . . . . . 173--186 Leonardo Linguaglossa and Dario Rossi and Salvatore Pontarelli and Dave Barach and Damjan Marjon and Pierre Pfister High-speed data plane and network functions virtualization by vectorizing packet processing . . . . . . . . . . . 187--199 L. Atzori and J. L. Bellido and R. Bolla and G. Genovese and A. Iera and A. Jara and C. Lombardo and G. Morabito SDN&NFV contribution to IoT objects virtualization . . . . . . . . . . . . . 200--212 Shiyou Qian and Jian Cao and Weichao Mao and Yanmin Zhu and Jiadi Yu and Minglu Li and Jie Wang A fast and anti-matchability matching algorithm for content-based publish/subscribe systems . . . . . . . 213--225 Partha Pratim Ray and Dinesh Dash and Debashis De Internet of Things-based real-time model study on e-healthcare: Device, message service and dew computing . . . . . . . 226--239 Xiaozheng Gao and Kai Yang and Nan Yang and Jinsong Wu Energy-efficient resource block assignment and power control for underlay device-to-device communications in multi-cell networks . . . . . . . . . 240--251 Israel Leyva-Mayorga and Miguel A. Rodriguez-Hernandez and Vicent Pla and Jorge Martinez-Bauset and Luis Tello-Oquendo Adaptive access class barring for efficient mMTC . . . . . . . . . . . . . 252--264 S. Ramakrishnan and Subrat Kar and Dharmaraja Selvamuthu Analysis of energy efficiency in cloud based heterogeneous RAN with large-scale antenna systems . . . . . . . . . . . . 265--276
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Siyao Cheng and Yingshu Li and Zhi Tian and Wei Cheng and Xiuzhen Cheng A model for integrating heterogeneous sensory data in IoT systems . . . . . . 1--14 You-Chiun Wang and Chien-Chun Huang Efficient management of interference and power by jointly configuring ABS and DRX in LTE-A HetNets . . . . . . . . . . . . 15--27 Puneet Kumar and Behnam Dezfouli Implementation and analysis of QUIC for MQTT . . . . . . . . . . . . . . . . . . 28--45 Jin B. Hong and Armstrong Nhlabatsi and Dong Seong Kim and Alaa Hussein and Noora Fetais and Khaled M. Khan Systematic identification of threats in the cloud: a survey . . . . . . . . . . 46--69 Pedro Batista and Ivanes Araújo and Neiva Linder and Kim Laraqui and Aldebaro Klautau Testbed for ICN media distribution over LTE radio access networks . . . . . . . 70--80 Sadia Din and Anand Paul and Abdul Rehman $5$G-enabled Hierarchical architecture for software-defined intelligent transportation system . . . . . . . . . 81--89 Kaiyang Li and Ling Tian and Wei Li and Guangchun Luo and Zhipeng Cai Incorporating social interaction into three-party game towards privacy protection in IoT . . . . . . . . . . . 90--101 Ajay Nehra and Meenakshi Tripathi and Manoj Singh Gaur and Ramesh Babu Battula and Chhagan Lal SLDP: a secure and lightweight link discovery protocol for software defined networking . . . . . . . . . . . . . . . 102--116 Niezi Mharsi and Makhlouf Hadji A mathematical programming approach for full coverage hole optimization in Cloud Radio Access Networks . . . . . . . . . 117--126 Tiphaine Viard and Raphaël Fournier-S'niehotta Augmenting content-based rating prediction with link stream features . . 127--133 Ian F. Akyildiz and Ahan Kak The Internet of Space Things/CubeSats: a ubiquitous cyber-physical system for the connected world . . . . . . . . . . . . 134--149 Gongbing Hong and James Martin and James Westall Adaptive bandwidth binning for bandwidth management . . . . . . . . . . . . . . . 150--169 Takayuki Hatanaka and Takuji Tachibana LE-MRC: Low-energy based multiple routing configurations for fast failure recovery . . . . . . . . . . . . . . . . 170--178 Aya Ayadi and Oussama Ghorbel and M. S. BenSalah and Mohamed Abid Kernelized technique for outliers detection to monitoring water pipeline based on WSNs . . . . . . . . . . . . . 179--189 Sen Bai and Yunhao Liu and Zhenhua Li and Xin Bai Detecting wormhole attacks in $3$D wireless ad hoc networks via $3$D forbidden substructures . . . . . . . . 190--200 Chuan-Gang Liu and I-Hsien Liu and Chang-De Lin and Jung-Shian Li A novel tag searching protocol with time efficiency and searching accuracy in RFID systems . . . . . . . . . . . . . . 201--216 Islam Tharwat Abdel-Halim and Hossam Mahmoud Ahmed Fahmy and Ayman M. Bahaa-El Din Mobility prediction-based efficient clustering scheme for connected and automated vehicles in VANETs . . . . . . 217--233 Enrico Cambiaso and Giovanni Chiola and Maurizio Aiello Introducing the SlowDrop Attack . . . . 234--249 Binbin Li and Yuan He and Wenyuan Liu and Lin Wang Towards time-efficient localized polling for large-scale RFID systems . . . . . . 250--262 Matthieu Latapy and Marco Fiore and Artur Ziviani Link streams: Methods and applications 263--265 Feng Li and Shibo He and Jun Luo and Mohan Gurusamy and Junshan Zhang Editorial: Green computing in Wireless Sensor Networks . . . . . . . . . . . . 266--268
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Renan Fischer e Silva and Paul M. Carpenter TCP proactive congestion control for east--west traffic: the marking threshold . . . . . . . . . . . . . . . 1--11 Ilhem Souissi and Nadia Ben Azzouna and Lamjed Ben Said A multi-level study of information trust models in WSN-assisted IoT . . . . . . . 12--30 Abdul Salam and Mehmet C. Vuran and Suat Irmak Di-Sense: In situ real-time permittivity estimation and soil moisture sensing using wireless underground communications . . . . . . . . . . . . . 31--41 Yu He and Lin Ma and Ruiting Zhou and Chuanhe Huang and Zongpeng Li Online task allocation in mobile cloud computing with budget constraints . . . 42--51 Aljawharah Alnasser and Hongjian Sun and Jing Jiang Cyber security challenges and solutions for V2X communications: a survey . . . . 52--67 B. Asvija and R. Eswari and M. B. Bijoy Security in hardware assisted virtualization for cloud computing --- state of the art issues and challenges 68--92 Edmundo de Souza e Silva and Rosa M. M. Leão and Daniel S. Menasché and Don Towsley On the scalability of P2P swarming systems . . . . . . . . . . . . . . . . 93--113 Xiaocui Li and Zhangbing Zhou and Junqi Guo and Shangguang Wang and Junsheng Zhang Aggregated multi-attribute query processing in edge computing for industrial IoT applications . . . . . . 114--123 V. R. Kavitha and M. Moorthi A quality of service load balanced connected dominating set-stochastic diffusion search (CDS-SDS) network backbone for MANET . . . . . . . . . . . 124--131 Mohammadhasan Miri and Kamal Mohamedpour and Yousef Darmani and Mahasweta Sarkar and R. Lal Tummala An efficient resource allocation algorithm based on vertex coloring to mitigate interference among coexisting WBANs . . . . . . . . . . . . . . . . . 132--146 Kelton A. P. da Costa and João P. Papa and Celso O. Lisboa and Roberto Munoz and Victor Hugo C. de Albuquerque Internet of Things: a survey on machine learning-based intrusion detection approaches . . . . . . . . . . . . . . . 147--157 Maicon Kist and Juliano Araújo Wickboldt and Lisandro Zambenedetti Granville and Juergen Rochol and Luiz A. DaSilva and Cristiano Bonato Both Flexible fine-grained baseband processing with network functions virtualization: Benefits and impacts . . 158--165 Junqi Guo and Lan Yang and Rongfang Bie and Jiguo Yu and Yuan Gao and Yan Shen and Anton Kos An XGBoost-based physical fitness evaluation model using advanced feature selection and Bayesian hyper-parameter optimization for wearable running monitoring . . . . . . . . . . . . . . . 166--180 Balasubramanian Prabhu kavin and Sannasi Ganapathy A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications . . 181--190 Dinesh Jackson Samuel R and E. Fenil and Gunasekaran Manogaran and G. N. Vivekananda and M. Thanjaivadivel and S. Jeeva and A. Ahilan Real time violence detection framework for football stadium comprising of big data analysis and deep learning through bidirectional LSTM . . . . . . . . . . . 191--200 Sivakumar Krishnan and S. Lokesh and M. Ramya Devi An efficient Elman neural network classifier with cloud supported Internet of Things structure for health monitoring system . . . . . . . . . . . 201--210 K. Thangaramya and K. Kulothungan and R. Logambigai and M. Selvi and Sannasi Ganapathy and A. Kannan Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT . . . . . . . . . 211--223 Osama AlFarraj and Amr Tolba and Salem Alkhalaf and Ahmad AlZubi Neighbor predictive adaptive handoff algorithm for improving mobility management in VANETs . . . . . . . . . . 224--231 Kan Yu and Yinglong Wang and Jiguo Yu and Dongxiao Yu and Xiuzhen Cheng and Zhiguang Shan Localized and distributed link scheduling algorithms in IoT under Rayleigh fading . . . . . . . . . . . . 232--244 Aziza Ben Mosbah and Seid Eddine Hammami and Hassine Moungla and Hossam Afifi and Ahmed E. Kamal Enhancing Device-to-Device direct discovery based on predicted user density patterns . . . . . . . . . . . . 245--259 Anonymous Editorial Board . . . . . . . . . . . . ii--ii
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Maram Bani Younes and Azzedine Boukerche Safety and efficiency control protocol for highways using intelligent vehicular networks . . . . . . . . . . . . . . . . 1--11 Defang Li and Peilin Hong and Kaiping Xue and Jianing Pei Virtual network function placement and resource optimization in NFV and edge computing enabled networks . . . . . . . 12--24 Carlos M. J. M. Dourado, Jr. and Suane Pires P. da Silva and Raul Victor M. da Nóbrega and Antonio Carlos da S. Barros and Pedo P. Rebouças and Victor Hugo C. de Albuquerque Deep learning IoT system for online stroke detection in skull computed tomography images . . . . . . . . . . . 25--39 Sergio Barrachina-Muñoz and Francesc Wilhelmi and Boris Bellalta To overlap or not to overlap: Enabling channel bonding in high-density WLANs 40--53 Francisco H. M. B. Lima and Luiz F. M. Vieira and Marcos A. M. Vieira and Alex B. Vieira and José Augusto M. Nacif Water ping: ICMP for the Internet of Underwater Things . . . . . . . . . . . 54--63 Zhijun Wu and Qingbo Pan and Meng Yue and Liang Liu Sequence alignment detection of TCP-targeted synchronous low-rate DoS attacks . . . . . . . . . . . . . . . . 64--77 Amr Tolba Content accessibility preference approach for improving service optimality in Internet of Vehicles . . . 78--86 Adelina Madhja and Sotiris Nikoletseas and Alexandros A. Voudouris Adaptive wireless power transfer in mobile ad hoc networks . . . . . . . . . 87--97 Mohammed Al-Maitah and Ahmad Ali AlZubi and Abdulaziz Alarifi An optimal storage utilization technique for IoT devices using sequential machine learning . . . . . . . . . . . . . . . . 98--105 Ahmad Ali AlZubi and Mohammed Al-Maitah and Abdulaziz Alarifi A best-fit routing algorithm for non-redundant communication in large-scale IoT based network . . . . . 106--113 Yupeng Hu and Pengjie Ren and Wei Luo and Peng Zhan and Xueqing Li Multi-resolution representation with recurrent neural networks application for streaming time series in IoT . . . . 114--132 Rafael Leira and Guillermo Julián-Moreno and Iván González and Francisco J. Gómez-Arribas and Jorge E. López de Vergara Performance assessment of 40 Gbit/s off-the-shelf network cards for virtual network probes in 5G networks . . . . . 133--143 S. Baskar and S. Periyanayagi and P. Mohamed Shakeel and V. R. Sarma Dhulipala An energy persistent Range-dependent Regulated Transmission Communication model for vehicular network applications 144--153 Jiaqing Dong and Hao Yin and Chen Tian and Ahmed M. Abdelmoniem and Huapoing Zhou and Bo Bai and Gong Zhang Uranus: Congestion-proportionality among slices based on Weighted Virtual Congestion Control . . . . . . . . . . . 154--166 Kushan Sudheera Kalupahana Liyanage and Maode Ma and Peter Han Joo Chong Connectivity aware tribrid routing framework for a generalized software defined vehicular network . . . . . . . 167--177 Chun Shan and Shanshan Mei and Changzhen Hu and Liyuan Liu and Limin Mao Software structure characteristic measurement method based on weighted network . . . . . . . . . . . . . . . . 178--185 Pedro M Rodriguez and Aitor Lizeaga and Mikel Mendicute and Iñaki Val Spectrum handoff strategy for cognitive radio-based MAC for real-time industrial wireless sensor and actuator networks 186--198 Chao Zhai and Zhiyuan Yu and Xinhua Wang High-efficient cooperative relaying with wireless powered source and relay . . . 199--209 Hui Xia and Chun-qiang Hu and Fu Xiao and Xiang-guo Cheng and Zhen-kuan Pan An efficient social-like semantic-aware service discovery mechanism for large-scale Internet of Things . . . . . 210--220
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Jialu Hao and Cheng Huang and Jianbing Ni and Hong Rong and Ming Xian and Xuemin (Sherman) Shen Fine-grained data access control with attribute-hiding policy for cloud-based IoT . . . . . . . . . . . . . . . . . . 1--10 Roberto M. Oliveira and Alex B. Vieira and Moises V. Ribeiro EPLC--CMAC: an enhanced cooperative MAC protocol for broadband PLC systems . . . 11--22 Caihong Kai and Yuting Liang and Xinyue Hu and Zhengqiong Liu and Lusheng Wang An effective channel allocation algorithm to maximize system utility in heterogeneous DCB WLANs . . . . . . . . 23--35 Anish Jindal and Gagangeet Singh Aujla and Neeraj Kumar SURVIVOR: a blockchain based edge-as-a-service framework for secure energy trading in SDN-enabled vehicle-to-grid environment . . . . . . 36--48 Yahui Li and Zhiliang Wang and Jiangyuan Yao and Xia Yin and Xingang Shi and Jianping Wu and Han Zhang MSAID: Automated detection of interference in multiple SDN applications . . . . . . . . . . . . . . 49--62 Yu Liang and Jidong Ge and Sheng Zhang and Bin Luo Modeling and deploying hybrid tenant requests with shared networklets . . . . 63--72 Christos Tsilopoulos and George Xylomenos Adaptive semi-stateless forwarding for Content-Centric Networks . . . . . . . . 73--85 Fabrício N. Godoi and Gustavo W. Denardin and Carlos H. Barriquello Reliability enhancement of packet delivery in multi-hop wireless sensor network . . . . . . . . . . . . . . . . 86--91 L. Song and K. K. Chai and Y. Chen and J. Loo and S. Jimaa and Y. Iraqi Energy efficient cooperative coalition selection in cluster-based capillary networks for CMIMO IoT systems . . . . . 92--102 Chuan-Sheng Lin and Sok-Ian Sou QoS-aware dynamic bandwidth reallocation with deadline assurance for multipath data offloading . . . . . . . . . . . . 103--112 Mrinai M. Dhanvijay and Shailaja C. Patil Internet of Things: a survey of enabling technologies in healthcare and its applications . . . . . . . . . . . . . . 113--131 Debasish Ghose and Anders Fròytlog and Frank Y. Li Enabling early sleeping and early data transmission in wake-up radio-enabled IoT networks . . . . . . . . . . . . . . 132--144
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Francisco-Javier Moreno Muro and Nina Skorin-Kapov and Pablo Pavon-Marino Revisiting core traffic growth in the presence of expanding CDNs . . . . . . . 1--11 Muge Sayit and Cihat Cetinkaya and Huseyin Ugur Yildiz and Bulent Tavli DASH-QoS: a scalable network layer service differentiation architecture for DASH over SDN . . . . . . . . . . . . . 12--25 Roberto Bruschi and Florin Ciucu and Thomas Zinner Application areas and fundamental challenges in Network Functions Virtualization . . . . . . . . . . . . . 26--27 Subir Halder and Amrita Ghosal and Mauro Conti Efficient physical intrusion detection in Internet of Things: a Node deployment approach . . . . . . . . . . . . . . . . 28--46 Cuicui Lv and Qiang Wang and Wenjie Yan and Jia Li Compressive sensing-based sequential data gathering in WSNs . . . . . . . . . 47--59 Yingya Guo and Zhiliang Wang and Zhifeng Liu and Xia Yin and Xingang Shi and Jianping Wu and Yang Xu and H. Jonathan Chao SOTE: Traffic engineering in hybrid software defined networks . . . . . . . 60--72 Xiuwu Yu and Lixing Zhou and Xiangyang Li A novel hybrid localization scheme for deep mine based on wheel graph and chicken swarm optimization . . . . . . . 73--78 Shishupal Kumar and Nidhi Lal and Vijay Kumar Chaurasiya An energy efficient IPv6 packet delivery scheme for industrial IoT over G.9959 protocol based Wireless Sensor Network (WSN) . . . . . . . . . . . . . . . . . 79--87 G. G. Md. Nawaz Ali and Kai Liu and Victor C. S. Lee and Peter H. J. Chong and Yong Liang Guan and Jun Chen Towards efficient and scalable implementation for coding-based on-demand data broadcast . . . . . . . . 88--104
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Heedo Kang and Changhoon Yoon and Seungwon Shin Astraea: Towards an effective and usable application permission system for SDN 1--14 Vicente Casares-Giner and Jorge Martinez-Bauset and Canek Portillo Performance evaluation of framed slotted ALOHA with reservation packets and successive interference cancelation for M2M networks . . . . . . . . . . . . . . 15--30 Zhizhu Liu and Yinqiao Xiong and Xin Liu and Wei Xie and Peidong Zhu 6Tree: Efficient dynamic discovery of active addresses in the IPv6 address space . . . . . . . . . . . . . . . . . 31--46 Marco Casazza and Mathieu Bouet and Stefano Secci Availability-driven NFV orchestration 47--61 Zufan Zhang and Zhangyi Wang and Chenquan Gan and Porui Zhang A double auction scheme of resource allocation with social ties and sentiment classification for Device-to-Device communications . . . . 62--71 Radhika Sukapuram and Gautam Barua PPCU: Proportional per-packet consistent updates for SDNs using data plane time stamps . . . . . . . . . . . . . . . . . 72--86 Najla Al-Nabhan and Nadia Al-Aboody and A. B. M. Alim Al Islam A hybrid IoT-based approach for emergency evacuation . . . . . . . . . . 87--97 Ahmed Y. Zakariya and Sherif I. Rabia and Yasmine Abouelseoud An optimized general target channel sequence for prioritized cognitive radio networks . . . . . . . . . . . . . . . . 98--109 K. Anish Pon Yamini and K. Suthendran and T. Arivoli Enhancement of energy efficiency using a transition state MAC protocol for MANET 110--118
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Yuying Qi and Xuanxia Yao and Tao Zhu and Huansheng Ning A semantic-based inference control algorithm for OWL repository privacy protection . . . . . . . . . . . . . . . 1--8 Dylan Smyth and Donna O'Shea and Victor Cionca and Sean McSweeney Attacking distributed software-defined networks by leveraging network state consistency . . . . . . . . . . . . . . 9--19 Ararat Shaverdian and Jagadish Ghimire and Catherine Rosenberg Simple and efficient network-aware user association rules for heterogeneous networks . . . . . . . . . . . . . . . . 20--32 R. Vishnuvarthan and R. Sakthivel and V. Bhanumathi and K. Muralitharan Energy-efficient data collection in strip-based wireless sensor networks with optimal speed mobile data collectors . . . . . . . . . . . . . . . 33--40 Zhenlong Peng and Xiaolin Gui and Jian An and Tianjie Wu and Ruowei Gui Multi-Task oriented data diffusion and transmission paradigm in crowdsensing based on city public traffic . . . . . . 41--51 Sanaa Sharafeddine and Rania Islambouli On-demand deployment of multiple aerial base stations for traffic offloading and network recovery . . . . . . . . . . . . 52--61 Francisco Renato C. Araújo and Antonio M. de Sousa and Leobino N. Sampaio SCaN-Mob: an opportunistic caching strategy to support producer mobility in named data wireless networking . . . . . 62--74
Anonymous Editorial Board . . . . . . . . . . . . ii--ii F. AL-Tam and N. Correia Fractional switch migration in multi-controller software-defined networking . . . . . . . . . . . . . . . 1--10 Ian Vilar Bastos and Igor Monteiro Moraes A diversity-based search-and-routing approach for named-data networking . . . 11--23 Zhiwei Yan and Jong-Hyouk Lee Mobility capability negotiation for IPv6 based ubiquitous mobile Internet . . . . 24--28 Van-Van Huynh and Hoang-Sy Nguyen and Ly Tran Thai Hoc and Thanh-Sang Nguyen and Miroslav Voznak Optimization issues for data rate in energy harvesting relay-enabled cognitive sensor networks . . . . . . . 29--40 Yujun Cheng and Dong Yang and Huachun Zhou and Hongchao Wang Adopting IEEE 802.11 MAC for industrial delay-sensitive wireless control and monitoring applications: a survey . . . 41--67 Changqing Xia and Xi Jin and Linghe Kong and Chi Xu and Peng Zeng Heterogeneous slot scheduling for real-time industrial wireless sensor networks . . . . . . . . . . . . . . . . 68--77 Hashim A. Hashim and Mohammad A. Abido Location management in LTE networks using multi-objective particle swarm optimization . . . . . . . . . . . . . . 78--88 Cun Ji and Chao Zhao and Li Pan and Shijun Liu and Chenglei Yang and Xiangxu Meng A just-in-time shapelet selection service for online time series classification . . . . . . . . . . . . . 89--98 Lu Xiaofeng and Jiang Fangshuo and Zhou Xiao and Yi Shengwei and Sha Jing and Pietro Lio ASSCA: API sequence and statistics features combined architecture for malware detection . . . . . . . . . . . 99--111 T. P. Anithaashri and G. Ravichandran and R. Baskaran Security enhancement for software defined network using game theoretical approach . . . . . . . . . . . . . . . . 112--121 Mohamed Abdel-Basset and Gunasekaran Manogaran and Mai Mohamed A neutrosophic theory based security approach for fog and mobile-edge computing . . . . . . . . . . . . . . . 122--132 Qingyu Shi and Fang Wang and Dan Feng and Weibin Xie Adaptive load balancing based on accurate congestion feedback for asymmetric topologies . . . . . . . . . 133--145 Enhuan Dong and Mingwei Xu and Xiaoming Fu and Yu Cao A loss aware MPTCP scheduler for highly lossy networks . . . . . . . . . . . . . 146--158
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Dewang Ren and Xiaolin Gui and Kaiyuan Zhang and Jie Wu Hybrid collaborative caching in mobile edge networks: an analytical approach 1--16 Khaled Hejja and Xavier Hesselbach Offline and online power aware resource allocation algorithms with migration and delay constraints . . . . . . . . . . . 17--34 Soodeh Hosseini and Mehrdad Azizi The hybrid technique for DDoS detection with supervised learning algorithms . . 35--45 Mariusz Gajewski and Jordi Mongay Batalla and Albert Levi and Cengiz Togay and Constandinos X. Mavromoustakis and George Mastorakis Two-tier anomaly detection based on traffic profiling of the home automation system . . . . . . . . . . . . . . . . . 46--60 Huan Wang and Zhaolin Yuan and Yibin Chen and Bingyang Shen and Aixiang Wu An industrial missing values processing method based on generating model . . . . 61--68 N. L. Venkataraman and R. Kumar Design and analysis of application specific network on chip for reliable custom topology . . . . . . . . . . . . 69--76 Ming Xia and Kaikai Chi and Xiaoyan Wang and Zhen Cheng Mode-oriented hybrid programming of sensor network nodes for supporting rapid and flexible utility assembly . . 77--97 Oussama Soualah and Marouen Mechtri and Chaima Ghribi and Djamal Zeghlache Online and batch algorithms for VNFs placement and chaining . . . . . . . . . 98--113 Tao Han and Lijuan Zhang and Sandeep Pirbhulal and Wanqing Wu and Victor Hugo C. de Albuquerque A novel cluster head selection technique for edge-computing based IoMT systems 114--122 Amit Agarwal and Durga Toshniwal SmPFT: Social media based profile fusion technique for data enrichment . . . . . 123--131 Jiehong Wu and Liangkai Zou and Liang Zhao and Ahmed Al-Dubai and Lewis Mackenzie and Geyong Min A multi-UAV clustering strategy for reducing insecure communication range 132--142 Klenilmar Lopes Dias and Mateus Almeida Pongelupe and Walmir Matos Caminhas and Luciano de Errico An innovative approach for real-time network traffic classification . . . . . 143--157 Bo Wu and Ke Xu and Qi Li and Bingyang Liu and Shoushou Ren and Fan Yang and Meng Shen and Kui Ren RFL: Robust fault localization on unreliable communication channels . . . 158--174 Mahsa Ehsanpour and Siavash Bayat and Ali Mohammad Afshin Hemmatyar An efficient and social-aware distributed in-network caching scheme in named data networks using matching theory . . . . . . . . . . . . . . . . . 175--183 Mingkui Wei and Zhuo Lu and Yufei Tang and Xiang Lu Cyber and physical interactions to combat failure propagation in smart grid: Characterization, analysis and evaluation . . . . . . . . . . . . . . . 184--192 Bingchuan Tian and Chen Tian and Bingquan Wang and Bo Li and Zehao He and Haipeng Dai and Kexin Liu and Wanchun Dou and Guihai Chen Scheduling dependent coflows to minimize the total weighted job completion time in datacenters . . . . . . . . . . . . . 193--205
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Kun Li and Shengling Wang and Xiuzhen Cheng Crowdsourcee evaluation based on persuasion game . . . . . . . . . . . . 1--9 Pasi Lassila and Misikir Eyob Gebrehiwot and Samuli Aalto Optimal energy-aware load balancing and base station switch-off control in $5$G HetNets . . . . . . . . . . . . . . . . 10--22 Amel Arfaoui and Ali Kribeche and Sidi-Mohammed Senouci Context-aware anonymous authentication protocols in the Internet of Things dedicated to e-health applications . . . 23--36 Md. Forkan Uddin Energy efficiency maximization by joint transmission scheduling and resource allocation in downlink NOMA cellular networks . . . . . . . . . . . . . . . . 37--50 Bo Yi and Xingwei Wang and Min Huang and Anwei Dong A multi-criteria decision approach for minimizing the influence of VNF migration . . . . . . . . . . . . . . . 51--62 Xuanxia Yao and Jiafei Wang and Mengyu Shen and Huafeng Kong and Huansheng Ning An improved clustering algorithm and its application in IoT data analysis . . . . 63--72 Eduardo P. M. Câmara Júnior and Luiz F. M. Vieira and Marcos A. M. Vieira 3DVS: Node scheduling in underwater sensor networks using $3$D Voronoi diagrams . . . . . . . . . . . . . . . . 73--83 Angelos-Christos Anadiotis and Laura Galluccio and Sebastiano Milardo and Giacomo Morabito and Sergio Palazzo SD-WISE: a Software-Defined WIreless SEnsor network . . . . . . . . . . . . . 84--95 Guillermo Caminero and Manuel Lopez-Martin and Belen Carro Adversarial environment reinforcement learning algorithm for intrusion detection . . . . . . . . . . . . . . . 96--109 Zhixin Liu and Peng Zhang and Kit Yan Chan and Li Li and Xinping Guan Robust resource allocation for rates maximization using fuzzy estimation of dynamic channel states in OFDMA femtocell networks . . . . . . . . . . . 110--124 Amit Nayyer and Aman Kumar Sharma and Lalit Kumar Awasthi Laman: a supervisor controller based scalable framework for software defined networks . . . . . . . . . . . . . . . . 125--134 Michail Fasoulakis and Eirini Eleni Tsiropoulou and Symeon Papavassiliou Satisfy instead of maximize: Improving operation efficiency in wireless communication networks . . . . . . . . . 135--146 Mohamed Elhoseny and Gui-Bin Bian and S. K. Lakshmanaprabu and K. Shankar and Amit Kumar Singh and Wanqing Wu Effective features to classify ovarian cancer data in Internet of Medical Things . . . . . . . . . . . . . . . . . 147--156 Haizhou Bao and Chuanhe Huang and Zhongzheng Tang and Qihui Li and Qiufen Ni and Xiaodai Dong and Bin Fu Coded multicasting in cache-enabled vehicular ad hoc network . . . . . . . . 157--170
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Sarah Jenkins \booktitleComputer Networks: Publisher's Note . . . . . . . . . . . . . . . . . . iii--iii Anonymous Passing the BATON . . . . . . . . . . . iv--v Anonymous Receiving the BATON . . . . . . . . . . vi--vi Hossein Ghannadrezaii and Jean-François Bousquet Maximizing network coverage in a multichannel short-range underwater acoustic sensor network . . . . . . . . 1--10 Akhlaqur Rahman and Jiong Jin and Ashfaqur Rahman and Antonio Cricenti and Mahbuba Afrin and Yu-ning Dong Energy-efficient optimal task offloading in cloud networked multi-robot systems 11--32 Muralitharan Krishnan and Sangwoon Yun and Yoon Mo Jung Enhanced clustering and ACO-based multiple mobile sinks for efficiency improvement of wireless sensor networks 33--40 Apoorv Saxena and Dieter Claeys and Herwig Bruneel and Joris Walraevens Analysis of the age of data in data backup systems . . . . . . . . . . . . . 41--50 Preeti A. Kale and Manisha J. Nene Scheduling of data aggregation trees using local heuristics to enhance network lifetime in sensor networks . . 51--64 Gaofei Huang and Wanqing Tu A high-throughput wireless-powered relay network with joint time and power allocations . . . . . . . . . . . . . . 65--76 Håkon Gunleifsen and Thomas Kemmerich and Vasileios Gkioulos Dynamic setup of IPsec VPNs in service function chaining . . . . . . . . . . . 77--91 Zhixin Liu and Guochen Hou and Yang Liu and Xinbin Li and Xinping Guan Robust power control strategy based on hierarchical game with QoS provisioning in full-duplex femtocell networks . . . 92--104 Murtaza Cicioglu and Ali Çalhan HUBsFLOW: a novel interface protocol for SDN-enabled WBANs . . . . . . . . . . . 105--117 Serif Bahtiyar and Mehmet Baris Yaman and Can Yilmaz Altinigne A multi-dimensional machine learning approach to predict advanced malware . . 118--129 Duc Thang Ha and Lila Boukhatem and Megumi Kaneko and Nhan Nguyen-Thanh and Steven Martin Adaptive beamforming and user association in heterogeneous cloud radio access networks: a mobility-aware performance-cost trade-off . . . . . . . 130--143 Maryam Ghasemi and Ibrahim Matta and Flavio Esposito The effect of (non-)competing brokers on the quality and price of differentiated Internet services . . . . . . . . . . . 144--164 Somayye Hajiheidari and Karzan Wakil and Maryam Badri and Nima Jafari Navimipour Intrusion detection systems in the Internet of things: a comprehensive investigation . . . . . . . . . . . . . 165--191 A. Santhanavijayan and S. R. Balasundaram Multi swarm optimization based automatic ontology for e-assessment . . . . . . . 192--199
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Marinela Shehaj and Dritan Nace and Ilya Kalesnikau and Micha\l Pióro Link dimensioning of hybrid FSO/fiber networks resilient to adverse weather conditions . . . . . . . . . . . . . . . 1--13 Ricardo José Pfitscher and Arthur Selle Jacobs and Luciano Zembruzki and Ricardo Luis dos Santos and Eder John Scheid and Muriel Figueredo Franco and Alberto Schaeffer-Filho and Lisandro Zambenedetti Granville Guiltiness: a practical approach for quantifying virtual network functions performance . . . . . . . . . . . . . . 14--31 Manisha Chahal and Sandeep Harit Network selection and data dissemination in heterogeneous software-defined vehicular network . . . . . . . . . . . 32--44 Max Alaluna and Eric Vial and Nuno Neves and Fernando M. V. Ramos Secure Multi-Cloud Network Virtualization . . . . . . . . . . . . . 45--60 Enis Kocan and Aleksandra Lopusina and Milica Pejanovic-Djurisic Macro diversity for mmWave cellular communications in indoor environment . . 61--67 Xue Leng and Kaiyu Hou and Yan Chen and Kai Bu and Libin Song and You Li A lightweight policy enforcement system for resource protection and management in the SDN-based cloud . . . . . . . . . 68--81 Zhixin Liu and Changjian Liang and Yazhou Yuan and Xinping Guan Energy efficient resource allocation based on relay selection and subcarrier pairing with channel uncertainty in cognitive radio network . . . . . . . . 82--92 Chafiq Titouna and Farid Na\"\it-Abdesselam and Ashfaq Khokhar DODS: a Distributed Outlier Detection Scheme for Wireless Sensor Networks . . 93--101 Wenbin Liu and Leye Wang and En Wang and Yongjian Yang and Djamal Zeghlache and Daqing Zhang Reinforcement learning-based cell selection in sparse mobile crowdsensing 102--114 Jessie Hui Wang and Jilong Wang and Changqing An and Qianli Zhang A survey on resource scheduling for data transfers in inter-datacenter WANs . . . 115--137 Zhenchun Wei and Fei Liu and Yan Zhang and Juan Xu and Jianjun Ji and Zengwei Lyu A $Q$-learning algorithm for task scheduling based on improved SVM in wireless sensor networks . . . . . . . . 138--149 Bin Yang and Zhenqiang Wu and Yulong Shen and Xiaohong Jiang Packet delivery ratio and energy consumption in multicast delay tolerant MANETs with power control . . . . . . . 150--161 Elif Ak and Berk Canberk BCDN: a proof of concept model for blockchain-aided CDN orchestration and routing . . . . . . . . . . . . . . . . 162--171 Hailong Huang and Andrey V. Savkin Reactive $3$D deployment of a flying robotic network for surveillance of mobile targets . . . . . . . . . . . . . 172--182 Roberto P. Antonioli and Emanuel B. Rodrigues and Diego A. Sousa and Igor M. Guerreiro and Carlos F. M. e Silva and Francisco R. P. Cavalcanti Adaptive bearer split control for $5$G multi-RAT scenarios with dual connectivity . . . . . . . . . . . . . . 183--196 Audrey Wilmet and Tiphaine Viard and Matthieu Latapy and Robin Lamarche-Perrin Outlier detection in IP traffic modelled as a link stream using the stability of degree distributions over time . . . . . 197--209 Wei W and Xu Xia and Marcin Wozniak and Xunli Fan and Robertas Dama\vsevi\vcius and Ye Li Multi-sink distributed power control algorithm for cyber-physical-systems in coal mine tunnels . . . . . . . . . . . 210--219 Xin Liu and Ruisheng Zhang and Mingqi Zhao A robust authentication scheme with dynamic password for wireless body area networks . . . . . . . . . . . . . . . . 220--234 Yufeng Zhan and Yuanqing Xia and Athanasios V. Vasilakos Future directions of networked control systems: a combination of cloud control and fog control approach . . . . . . . . 235--248 Gunasekaran Manogaran and Naveen Chilamkurti and Ching-Hsien Hsu Machine learning algorithms towards merging of mobile edge computing and Internet of Things . . . . . . . . . . . 249--250 Sen Wang and Jun Bi and Jianping Wu and Athanasios V. Vasilakos and Qilin Fan VNE-TD: a virtual network embedding algorithm based on temporal-difference learning . . . . . . . . . . . . . . . . 251--263 Tao Hu and Peng Yi and Julong Lan and Yuxiang Hu and Penghao Sun ACST: Audit-based compromised switch tolerance for enhancing data plane robustness in software-defined networking . . . . . . . . . . . . . . . 264--280 Yunchuan Sun and Xiuzhen Cheng and Yu Bai and Jiguo Yu Information, knowledge, and semantics for interacting with Internet-of-Things 281--282
Faiza Al-Salti and Nasser Alzeidi and Khaled Day and Abderezak Touzene An efficient and reliable grid-based routing protocol for UWSNs by exploiting minimum hop count . . . . . . . . . . . Article 106869 Yahya Alfadhli and You-Wei Chen and Siming Liu and Shuyi Shen and Shuang Yao and Daniel Guidotti and Sufian Mitani and Gee-Kung Chang Latency performance analysis of low layers function split for URLLC applications in $5$G networks . . . . . Article 106865 Anonymous Editorial Board . . . . . . . . . . . . Article 106911 Anonymous Publisher Note . . . . . . . . . . . . . Article 106912 K. Tolga Bagci and A. Murat Tekalp SDN-enabled distributed open exchange: Dynamic QoS-path optimization in multi-operator services . . . . . . . . Article 106845 Rihab Boussada and Balkis Hamdane and Mohamed Elhoucine Elhdhili and Leila Azouz Saidane Privacy-preserving aware data transmission for IoT-based e-health . . Article 106866 Alberto Attilio Brincat and Alfio Lombardo and Giacomo Morabito and Salvatore Quattropani On the use of Blockchain technologies in WiFi networks . . . . . . . . . . . . . Article 106855 Premkumar Chithaluru and Rajeev Tiwari and Kamal Kumar AREOR --- Adaptive ranking based energy efficient opportunistic routing scheme in Wireless Sensor Network . . . . . . . Article 106863 Mahya Mohammadi Golchi and Shideh Saraeian and Mehrnoosh Heydari A hybrid of firefly and improved particle swarm optimization algorithms for load balancing in cloud environments: Performance evaluation . . Article 106860 Miros\law Kantor and Edyta Biernacka and Piotr Bory\lo and Jerzy Dom\.za\l and Piotr Jurkiewicz and Mi\losz Stypi\'nski and Robert Wójcik A survey on multi-layer IP and optical Software-Defined Networks . . . . . . . Article 106844 M. Khalily-Dermany and M. J. Nadjafi-Arani and S. Doostali Combining topology control and network coding to optimize lifetime in wireless-sensor networks . . . . . . . . Article 106859 Morteza Kheirkhah and Ian Wakeman and George Parisis Multipath transport and packet spraying for efficient data delivery in data centres . . . . . . . . . . . . . . . . Article 106852 Mira Morcos and Jocelyne Elias and Fabio Martignon and Tijani Chahed and Lin Chen On efficient radio resource calendaring in cloud radio access network . . . . . Article 106862 Seungmin Oh and Hyunchong Cho and Sang-Ha Kim and Wanseop Lee and Euisin Lee Continuous object tracking protocol with selective wakeup based on practical boundary prediction in wireless sensor networks . . . . . . . . . . . . . . . . Article 106854 Andrea Pimpinella and Alessandro E. C. Redondi and Matteo Cesana Walk this way! An IoT-based urban routing system for smart cities . . . . Article 106857 S. Sicari and A. Rizzardi and G. Piro and A. Coen-Porisini and L. A. Grieco Beyond the smart things: Towards the definition and the performance assessment of a secure architecture for the Internet of Nano-Things . . . . . . Article 106856 Mohammad M. Tajiki and Mohammad Shojafar and Behzad Akbari and Stefano Salsano and Mauro Conti and Mukesh Singhal Joint failure recovery, fault prevention, and energy-efficient resource management for real-time SFC in fog-supported SDN . . . . . . . . . . . Article 106850 An Xie and Huawei Huang and Xiaoliang Wang and Song Guo and Zhuzhong Qian and Sanglu Lu Dual: Deploy stateful virtual network function chains by jointly allocating data-control traffic . . . . . . . . . . Article 106868 Yan Yang and Xia Yin and Xingang Shi and Zhiliang Wang and Jiong He and Tom Z. J. Fu and Marianne Winslett Inter-domain routing bottlenecks and their aggravation . . . . . . . . . . . Article 106839 Yinbo Yu and Xing Li and Kai Bu and Yan Chen and Jianfeng Yang Falcon: Differential fault localization for SDN control plane . . . . . . . . . Article 106851 Rui Zhang and Peng Xie and Chen Wang and Gaoyang Liu and Shaohua Wan Classifying transportation mode and speed from trajectory data via deep multi-scale learning . . . . . . . . . . Article 106861 Shunliang Zhang and Yongming Wang and Weihua Zhou Towards secure $5$G networks: a survey Article 106871 Bobai Zhao and Dali Zhu and Tong Xi and Chenggang Jia and Shang Jiang and Siye Wang Convolutional neural network and dual-factor enhanced variational Bayes adaptive Kalman filter based indoor localization with Wi-Fi . . . . . . . . Article 106864
Dilara Akdogan and Duygu Karaoglan Altop and Albert Levi Secure key agreement based on ordered biometric features . . . . . . . . . . . Article 106885 Anonymous Editorial Board . . . . . . . . . . . . Article 106931 O. Arana and F. Garcia and J. Gomez Analysis of the effectiveness of transmission power control as a location privacy technique . . . . . . . . . . . Article 106880 Amel Arfaoui and Ali Kribeche and Sidi Mohammed Senouci and Mohamed Hamdi Game-based adaptive anomaly detection in wireless body area networks . . . . . . Article 106870 Hassan Jameel Asghar and Emiliano De Cristofaro and Guillaume Jourjon and Mohammed Ali Kaafar and Laurent Mathy and Luca Melis and Craig Russell and Mang Yu Fast privacy-preserving network function outsourcing . . . . . . . . . . . . . . Article 106893 Amira Chriki and Haifa Touati and Hichem Snoussi and Farouk Kamoun FANET: Communication, mobility models and security issues . . . . . . . . . . Article 106877 Mohamed Mostafa Fouad and Ahmed Ibrahem Hafez and Aboul Ella Hassanien Optimizing topologies in wireless sensor networks: a comparative analysis between the Grey Wolves and the Chicken Swarm Optimization algorithms . . . . . . . . Article 106882 Bala Prakasa Rao Killi and Seela Veerabhadreswara Rao Controller placement in software defined networks: a comprehensive survey . . . . Article 106883 Yeonkeun Kim and Jaehyun Nam and Taejune Park and Sandra Scott-Hayward and Seungwon Shin SODA: a software-defined security framework for IoT environments . . . . . Article 106889 Shuangjuan Li and Hong Shen Minimizing maximum movement of sensors for line barrier coverage in the plane Article 106841 Jinting Lin and Lin Cui and Yuxiang Zhang and Fung Po Tso and Quanlong Guan Extensive evaluation on the performance and behaviour of TCP congestion control protocols under varied network scenarios Article 106872 Edoardo Longo and Alessandro E. C. Redondi and Matteo Cesana Accurate occupancy estimation with WiFi and bluetooth/BLE packet capture . . . . Article 106876 Mohsen Mahmoudi and Karim Faez and Abdorasoul Ghasemi Uncoordinated frequency hopping scheme for defense against primary user emulation attack in cognitive radio networks . . . . . . . . . . . . . . . . Article 106884 Hassan N. Noura and Reem Melki and Mohammad Malli and Ali Chehab Design and realization of efficient and secure multi-homed systems based on random linear network coding . . . . . . Article 106886 Roberto M. Oliveira and Lucas G. de Oliveira and Alex B. Vieira and Moises V. Ribeiro An enhanced cooperative MAC protocol for hybrid PLC/wireless systems . . . . . . Article 106878 Saniya Zafar and Rasheed Hussain and Fatima Hussain and Sobia Jangsher Interplay between Big Spectrum Data and Mobile Internet of Things: Current solutions and future challenges . . . . Article 106879
Anonymous 9 December 2019 . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . Article 106964 Hongli Xu and Jianchun Liu and Chen Qian and He Huang and Chunming Qiao Reducing controller response time with hybrid routing in software defined networks . . . . . . . . . . . . . . . . Article 106891 Chunlin Li and Jianhang Tang and Yang Zhang and Xin Yan and Youlong Luo Energy efficient computation offloading for nonorthogonal multiple access assisted mobile edge computing with energy harvesting devices . . . . . . . Article 106890 Pinaki Sarkar and Sukumar Nandi A class of key-node indexed hash chains based key predistribution (KPS): Signed weighted graphs . . . . . . . . . . . . Article 106881 Oluwatosin Ahmed Amodu and Mohamed Othman and Nor Kamariah Noordin and Idawaty Ahmad Transmission capacity analysis of relay-assisted D2D cellular networks with M2M coexistence . . . . . . . . . . Article 106887 Wenjun Li and Dagang Li and Xinwei Liu and Ting Huang and Xianfeng Li and Wenxia Le and Hui Li A power-saving pre-classifier for TCAM-based IP lookup . . . . . . . . . . Article 106898 Chi-Dung Phung and Benevid Felix Silva and Michele Nogueira and Stefano Secci MPTCP robustness against large-scale man-in-the-middle attacks . . . . . . . Article 106896 Yuki Goto and Bryan Ng and Winston K. G. Seah and Yutaka Takahashi Queueing analysis of software defined network with realistic OpenFlow-based switch model . . . . . . . . . . . . . . Article 106892 Zakarya Benyamina and Khelifa Benahmed and Fateh Bounaama ANEL: a novel efficient and lightweight authentication scheme for vehicular ad hoc networks . . . . . . . . . . . . . . Article 106899 Mauro Conti and Muhammad Hassan and Chhagan Lal BlockA\em uth: BlockChain based distributed producer authentication in ICN . . . . . . . . . . . . . . . . . . Article 106888 Xia Wang and Jia Liu and Yanyan Wang and Xingyu Chen and Lijun Chen Efficient missing tag identification in blocker-enabled RFID systems . . . . . . Article 106894 Mennan Selimi and Adisorn Lertsinsrubtavee and Arjuna Sathiaseelan and Llorenç Cerd\`a-Alabern and Leandro Navarro PiCasso: Enabling information-centric multi-tenancy at the edge of community mesh networks . . . . . . . . . . . . . Article 106897 Mohammad Noormohammadpour and Srikanth Kandula and Cauligi S. Raghavendra and Sriram Rao Efficient inter-datacenter bulk transfers with mixed completion time objectives . . . . . . . . . . . . . . . Article 106903 Yuqing Qiu and Chung-Horng Lung and Samuel Ajila and Pradeep Srivastava Experimental evaluation of LXC container migration for cloudlets using multipath TCP . . . . . . . . . . . . . . . . . . Article 106900 Niezi Mharsi and Makhlouf Hadji Edge computing optimization for efficient RRH--BBU assignment in cloud radio access networks . . . . . . . . . Article 106901 G. Rajesh and Ashvini Chaturvedi Correlation analysis and statistical characterization of heterogeneous sensor data in environmental sensor networks Article 106902 Tuan Le and Mario Gerla Fragmented data routing based on exponentially distributed contacts and inter-contact times in DTNs . . . . . . Article 106917 Antoine Saverimoutou and Bertrand Mathieu and Sandrine Vaton A $6$-month analysis of factors impacting web browsing quality for QoE prediction . . . . . . . . . . . . . . . Article 106905 David Eugui and José Alberto Hernández Analysis of a hybrid Fixed-Elastic DBA with guaranteed fronthaul delay in XG(s)-PONs . . . . . . . . . . . . . . . Article 106907 Madhukrishna Priyadarsini and Joy Chandra Mukherjee and Padmalochan Bera and Shailesh Kumar and A. H. M. Jakaria and M. Ashiqur Rahman An adaptive load balancing scheme for software-defined network controllers . . Article 106918 Xiaoyu Liang and Taieb Znati On the performance of intelligent techniques for intensive and stealthy DDos detection . . . . . . . . . . . . . Article 106906 Syed Hassan Ahmed and Ali Kashif Bashir and Awais Ahmad and Wael Guibene Computer networks special issue on intelligent and connected transportation systems . . . . . . . . . . . . . . . . Article 106895 Seungmin Oh and Hyunchong Cho and Sang-Ha Kim and Wanseop Lee and Euisin Lee Corrigendum to ``Continuous object tracking protocol with selective wakeup based on practical boundary prediction in wireless sensor networks'' Computer Networks Volume \bf 162 (2019) 106854 Article 106938
Anonymous 24 December 2019 . . . . . . . . . . . . ?? Anonymous Editorial Board . . . . . . . . . . . . Article 107000 Anonymous Publisher Note . . . . . . . . . . . . . Article 107001 Alperen Eroglu and Okan Yaman and Ertan Onur Density-aware cellular coverage control: Interference-based density estimation Article 106922 Qiyue Wu and Peng Sun and Azzedine Boukerche Unmanned aerial vehicle-assisted energy-efficient data collection scheme for sustainable wireless sensor networks Article 106927 José Maurício Costa and Pedro P. Paniago and Joaquim de Andrade and Thiago F. Noronha and Marcos A. M. Vieira Integer linear programming formulations for the variable data rate and variable channel bandwidth scheduling problem in wireless networks . . . . . . . . . . . Article 106939 Vineet Gokhale and Jayakrishnan Nair and Subhasis Chaudhuri and Jan Fesl On QoS-compliant telehaptic communication over shared networks . . . Article 106935 Muhammad Rizwan Asghar and Qinwen Hu and Sherali Zeadally Cybersecurity in industrial control systems: Issues, technologies, and challenges . . . . . . . . . . . . . . . Article 106946 Ze Yang and Kwan L. Yeung Minimum weight controller tree design in SDN . . . . . . . . . . . . . . . . . . Article 106949 Giuseppe Aceto and Domenico Ciuonzo and Antonio Montieri and Antonio Pescap\`e MIMETIC: Mobile encrypted traffic classification using multimodal deep learning . . . . . . . . . . . . . . . . Article 106944 Lav Gupta and Tara Salman and Maede Zolanvari and Aiman Erbad and Raj Jain Fault and performance management in multi-cloud virtual network services using AI: a tutorial and a case study Article 106950 Ado Adamou Abba Ari and Abdelhak Gueroui and Chafiq Titouna and Ousmane Thiare and Zibouda Aliouat Resource allocation scheme for $5$G C-RAN: a Swarm Intelligence based approach . . . . . . . . . . . . . . . . Article 106957 Miguel López and Alberto Peinado and Andrés Ortiz An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against IoT wireless networks . . . . . . . . . . . . . . . . Article 106945 Sa'ed Abed and Mohammad Al-Shayeji and Fahad Ebrahim A secure and energy-efficient platform for the integration of Wireless Sensor Networks and Mobile Cloud Computing . . Article 106956 Faria Khandaker and Sharief Oteafy and Hossam S. Hassanein and Hesham Farahat A functional taxonomy of caching schemes: Towards guided designs in information-centric networks . . . . . . Article 106937 Hye-Rim Cheon and Jae-Hyun Kim Social-aware mobile data offloading algorithm through small cell backhaul network: Direct and indirect user influence perspectives . . . . . . . . . Article 106951 H. -F. Bermudez and J. -M. Martinez-Caro and R. Sanchez-Iborra and J. L. Arciniegas and M. -D. Cano Live video-streaming evaluation using the ITU-T P.1203 QoE model in LTE networks . . . . . . . . . . . . . . . . Article 106967 Siyuan Jia and Matthew Luckie and Bradley Huffaker and Ahmed Elmokashfi and Emile Aben and Kimberly Claffy and Amogh Dhamdhere Tracking the deployment of IPv6: Topology, routing and performance . . . Article 106947