ebook img

Computer Communications 2009: Vol 32 Index PDF

2009·7.2 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Computer Communications 2009: Vol 32 Index

Computer Communications 32 (2009) I-XIX Contents lists available at ScienceDirect computer Mmunications Computer Communications journal homepage: www.elsevier.com/locate/comcom Subject Index of Volume 32 802.11e Adaptive modulation and coding (AMC) Supporting QoS in IEEE 802.11e wireless LANs over fading Cross-layer adaptive modulation and coding design for channel 985 space-time block coded MIMO-OFDM systems 540 Throughput analysis of IEEE 802.11e EDCA under Adaptive transmission heterogeneous traffic 935 Space-time code selection for OFDM-MISO systems 477 An 802.11e HCCA scheduler with an end-to-end quality aware Agent middleware territory method 1281 Agent mobility architecture based on IEEE-FIPA standards 712 Agent standards Active measurement Agent mobility architecture based on IEEE-FIPA standards 712 Locating congested segments over the Internet by clustering Aggregate signature the delay performance of multiple paths 1642 A new certificateless aggregate signature scheme 1079 Active queue management AIFS CDM-based design and performance evaluation of a robust Throughput analysis of IEEE 802.11e EDCA under AQM method for dynamic TCP/AQM networks 213 heterogeneous traffic 935 Active queue management (AQM) Alamouti space-time coding Robust active queue management design: A loop-shaping Design of ARQ protocols for two-user cooperative diversity approach 324 systems in wireless networks 1111 Active scan Alarms clustering Energy-aware WLAN scanning in integrated IEEE 802.16 Intrusion detection alarms reduction using root cause analysis e/802.11 networks 1588 and clustering 419 Ad hoc Algorithm An optimized ant colony algorithm based on the gradual Highest Urgency First (HUF): A latency and modulation changing orientation factor for multi-constraint QoS aware bandwidth allocation algorithm for WiMAX base routing 586 Stations 332 Ad hoc network Algorithm design and analysis An efficient bow-based on-demand QoS routing protocoi for Hierarchical power management in disruption tolerant MIMO ad hoc networks 1613 networks using traffic-aware optimization 1710 Ad hoc networks Algorithm/protocol design and analysis A distributed group mobility adaptive clustering algorithm for Buffer Coding for Reliable Transmissions over Wireless mobile ad hoc networks 189 Networks 111 Accurate available bandwidth estimation in IEEE 802.1 1-based Allocation unit ad hoc networks 1050 Competitive scheduling for OFDMA systems with guaranteed APS-FeW: Improving TCP throughput over multihop adhoc transmission rate 501 networks 19 Alternating step generators Distributed topology control algorithm based on Modified clock-controlled alternating step generators 787 one- and two-hop neighbors’ information for ad hoc AMC networks 368 An adaptive cross-layer design for multiservice scheduling in User-input driven QoS management in ad hoc OFDMA based mobile WiMAX systems 531 networks 1306 Analysis Ad hoc Networks An encounter-based multicast scheme for disruption tolerant Data aggregation in partially connected networks 594 networks 1742 Ad-hoc network ‘ Analytical model Connection-oriented multi-channel MAC protocol for ad-hoc TCP-Cherry for satellite IP networks: Analytical model and networks 169 performance evaluation 1377 Ad-hoc networks Ant colony algorithm Search: A routing protocol for mobile cognitive radio ad-hoc An optimized ant colony algorithm based on the gradual networks 1983 changing orientation factor for multi-constraint QoS Adaptive ARQ routing 586 Efficient multimedia transmission using adaptive packet Antenna selection bursting for wireless LANs 1271 Space-time code selection for OFDM-MISO systems 477 Adaptive modulation Anti-collision OFDMA techniques in multicellular networks with total Adaptive splitting and pre-signaling for RFID tag frequency reuse 522 anti-collision 1862 Subject index of Volume 32 / Computer Communications 32 (2009) I-X1X Application layer multicast Bandwidth request An application layer multicast approach based on Impact of bandwidth request schemes for Best-Effort traffic in topology-aware clustering 1095 IEEE 802.16 networks 235 Applications Bandwidth utilization The design and implementation of a session layer for Next generation CATV networks with QoS guarantees 766 delay-tolerant networks 1724 Behavior classes Approximate agreement Efficient deterministic method for detecting new U2R Data aggregation in partially connected networks 594 attacks 1104 APS-FeW Bilinear Diffie-Hellman problem APS-FeW: Improving TCP throughput over multihop adhoc An ID-based group-oriented decryption scheme secure against networks 19 adaptive chosen-ciphertext attacks 1829 AQM Bit error Adaptive Head-to-Tail: Active Queue Management based on Transmission distortion estimation for real-time video implicit congestion signals 246 delivery over hybrid channels with bit errors and packet ARQ erasures 431 Design of ARQ protocols for two-user cooperative diversity BitTorrent Attack systems in wireless networks 1111 Measurement and mitigation of BitTorrent leecher ASI attacks 1852 A new distributed management mechanism for ASI based Block Ack networks 294 Efficient multimedia transmission using adaptive packet Attacks bursting for wireless LANs 1271 Practical attacks on a mutual authentication scheme under the Blocking probability EPC Class-1 Generation-2 standard 1185 Design and analysis of a TDMA call assignment scheme for Audio codec cellular networks 1200 Voice transmission over ad hoc network adapting optimum Bloom filter approaches to maximize the performance 634 Power efficient packet classification using cascaded bloom filter Authentication and off-the-shelf ternary CAM for WDM networks 349 A more efficient and secure dynamic ID-based remote user Border Gateway Protocol (BGP) authentication scheme 583 BGP convergence delay after multiple simultaneous router Cryptanalysis of a mutual authentication scheme based on failures: Characterization and solutions 1207 nonce and smart cards 1015 Broadcast scheme Enhanced authentication scheme with anonymity for roaming A passive tree-based backbone construction scheme for service in global mobility networks 611 MANETs 1631 Mobile services access and payment through reusable Broadcast traffic tickets 602 The influence of broadcast traffic on IEEE 802.11 DCF More secure remote user authentication scheme 1018 networks 439 PAP: A privacy and authentication protocol for passive RFID Broadcasting protocols tags 1194 Interactive slotted stream tapping 653 Security flaw of H6lbi et al.’s protocol 736 Buffer management Weaknesses and improvements of the Yoon-Ryu-Yoo remote LGRR: A new packet scheduling algorithm for differentiated user authentication scheme using smart cards 649 services packet-switched networks 357 Autocorrelation Buffered crossbar FDF: Frequency detection-based filtering of scanning Trends in highly scalable crossbar-based packet switch worms 847 architecture 7490 Automatic repeat request (ARQ) Cross-layer adaptive modulation and coding design for Call admission control space-time block coded MIMO-OFDM systems 540 Call admission control policies in cellular wireless networks Available Bandwidth (“AB”) with spectrum renting 1905 Accurate available bandwidth estimation in IEEE 802.11-based Design and analysis of a TDMA call assignment scheme for ad hoc networks 1050 cellular networks 1200 Average delay Pricing-based call admission control for wireless MPEG-4 Analytical evaluation of average delay and maximum stable traffic 1781 throughput along a typical two-way street for vehicular ad hoc Utilizing call admission control for pricing optimization networks in sparse situations 1768 of multiple service classes in wireless cellular networks 317 Backbone Carrier sensing A passive tree-based backbone construction scheme for Improving throughput by tuning carrier sensing in 802.11 MANETs 1631 wireless networks 1263 Band selectivity factor Carrier-to-noise and interference ratio Competitive scheduling for OFDMA systems with guaranteed UMTS-HSDPA in High Altitude Platforms (HAPs) transmission rate 50i communications with finite transmitted power and unequal Bandwidth allocation cell's load 828 Highest Urgency First (HUF): A latency and modulation aware CDMA bandwidth allocation algorithm for WiMAX base stations 332 A cooperative CDMA-based multi-channel MAC protocol for Bandwidth loan mobile ad hoc networks 1810 LGRR: A new packet scheduling algorithm for differentiated Multiple level orthogonal codes and their application in services packet-switched networks 357 MC-CDMA systems 492 Subject Index of Volume 32 / Computer Communications 32 (2009) |-XIX Cellular networks Coding gain improvement Pricing-based call admission contro! for wireless MPEG-4 Improvement of turbo decoding using cross-entropy 1034 traffic 1781 Coefficient diagram method Resource management policies for fixed relays in cellular CDM-based design and performance evaluation of networks 703 a robust AQM method for dynamic TCP/AQM Cellular systems networks 213 Design and analysis of a TDMA call assignment scheme for Cognitive cooperation cellular networks 1200 Cross layer multicarrier MIMO cognitive cooperation scheme Cellular wireless networks for wireless hybrid ad hoc networks 546 Call admission control policies in cellular wireless networks Cognitive radio with spectrum renting 1905 Adaptive power allocation with quality-of-service guarantee in Centrality cognitive radio networks 1S75 Mobile IPv6 deployments: Graph-based analysis and practical Efficient spectrum utilization via cross-layer optimization in guidelines 1871 distributed cognitive radio networks 1931 Centralized optimization Mutual interference considered power allocation in QoS constrained resource allocation to secondary users in OFDM-based cognitive networks: The single SU case 1965 cognitive radio networks 1923 Search: A routing protocol for mobile cognitive radio ad-hoc Centralized scheduling networks 1983 Slot allocation algorithms in centralized scheduling Cognitive radio network scheme for IEEE 802.16 based wireless mesh QoS constrained resource allocation to secondary users in networks 943 cognitive radio networks 1922 Centralized vs. distributed architecture Cognitive radio networks A comparison of centralized and distributed meta-scheduling On game theoretic DSA-driven MAC for cognitive radio architectures for computation and communication tasks in Grid networks 1944 networks 1172 Cognitive radio technology Certificateless aggregate signature Reducing sensing error in cognitive PANs through reduction of A new certificateless aggregate signature scheme 1079 the channel set and split sensing 1326 Certificateless cryptography Collision probability A new certificateless aggregate signature scheme 1079 Opportunistic channel selection approach under collision Channel assignment probability constraint in cognitive radio systems 1914 Channel assignment using block design in wireless mesh Collision rate networks 1148 Opportunistic channel selection approach under collision Characterization and response probability constraint in cognitive radio systems 1914 An auto-responsive honeypot architecture for dynamic Collision resolution resource allocation and QoS adaptation in DDoS attacked Adaptive splitting and pre-signaling for RFID tag anti- networks 1384 collision 1862 Chosen-ciphertext security Collision Resolution Protocol An ID-based group-oriented decryption scheme secure against Next generation CATV networks with QoS guarantees 766 adaptive chosen-ciphertext attacks 1829 Collision tolerable level CICQ switches Opportunistic channel selection approach under collision Trends in highly scalable crossbar-based packet switch probability constraint in cognitive radio systems 1914 architecture 740 Combinatorial algorithms Cigar-shaped cell A combinatorial algorithm for the maximum lifetime data Infostations for highway cigar-shaped cells 730 gathering with aggregation problem in sensor networks 1655 Circulant graphs Combined uplink and downlink slot allocation Restricted shortest paths in 2-circulant graphs 685 Slot allocation algorithms in centralized scheduling scheme for Class-based packet scheduling IEEE 802.16 based wireless mesh networks 943 LGRR: A new packet scheduling algorithm for differentiated Communication services packet-switched networks 357 Application-driven, energy-efficient communication in wireless Closest vector problem sensor networks 896 Restricted shortest paths in 2-circulant graphs 685 Competition factor Cluster Competitive scheduling for OFDMA systems with guaranteed An application layer multicast approach based on transmission rate 501 topology-aware clustering 1095 Computational Diffie-Hellman problem Joint rate and cooperative MIMO scheme optiimization for A new certificateless aggregate signature scheme 1079 uniform energy distribution in Wireless Sensor Concurrent Multipath Transfer (CMT) Networks 1072 Concurrent Multipath Transfer during path failure 1577 Clustering Congestion Exploiting semantic proximities for content search over p2p On the implications of routing metric staleness in delay tolerant networks 814 networks 1699 Locating congested segments over the Internet by clustering Congestion control the delay performance of multiple paths 1642 A comprehensive TCP fairness analysis in high speed Clustering algorithm networks 1460 A distributed group mobility adaptive clustering algorithm for An efficient and fair explicit congestion control protocol for mobile ad hoc networks 189 high bandwidth-delay product networks 1138 Co-channel! interference LTRES: A loss-tolerant reliable event sensing protocol for Downlink co-channel interference cancellation in multihop wireless sensor networks 1666 relay networks 1131 On the properties of an adaptive TCP Minimum RTO 888 Subject Index of Volume 32 / Computer Communications 32 (2009) I-XIX TCP-Cherry for satellite IP networks: Analytical model and Cross-layer design performance evaluation 1377 Cross-layer adaptive modulation and coding design for The mechanism of adapting RED parameters to TCP space-time block coded MIMO-OFDM systems 540 traffic 1525 Cross-layer link adaptation design for UWB-based sensor Utility function of TCP 800 networks 1568 Connectivity Cryptanalysis An investigation of the Internet’s IP-layer connectivity 913 Security flaw of H6lbl et al.’s protocol 736 Channel assignment using block design in wireless mesh Cryptography networks 1148 Preserving user’s privacy in web search engines 1541 Connectivity information Weaknesses and improvements of the Yoon-Ryu-Yoo remote L-VIRT: Range-free 3-D localization of RFID tags based on user authentication scheme using smart cards 649 topological constraints 1485 CSMA/CA Consistency On avoiding RTS collisions for IEEE 802.11-based wireless ad Constructing PEKS schemes secure against keyword guessing hoc networks 69 attacks is possible? 394 k-ary n-cube networks Content distribution networks Off-chip communication architectures for high throughput Network load-aware content distribution in overlay network processors 867 networks 51 Cyclic block design Content search Dual wakeup design for wireless sensor networks 1 Exploiting semantic proximities for content search over p2p networks 814 Dandelion encoding Control system A dandelion-encoded evolutionary algorithm for the Discrete-time contro! analysis of transport channel delay-constrained capacitated minimum spanning tree synchronization in 3G radio access networks 1505 problem 154 Control theory Data aggregation ODMCA: An adaptive data mining control algorithm in An efficient location tracking structure for wireless sensor multicarrier networks 560 networks 1495 The mechanism of adapting RED parameters to TCP EEHC: Energy efficient heterogeneous clustered scheme for traffic 1525 wireless sensor networks 662 Convergence delay Data collection BGP convergence delay after multiple simultaneous router Topology control for delay-constraint data collection in failures: Characterization and solutions 1207 wireless sensor networks 1820 Convex optimization Data fusion Adaptive power allocation with quality-of-service guarantee in Data aggregation in partially connected networks 594 cognitive radio networks 1975 Data mining Cooperation ODMCA: An adaptive data mining control algorithm in A cooperative CDMA-based multi-channel MAC protocol for multicarrier networks 560 mobile ad hoc networks 1810 Data mining (KDD) dataset Cooperative diversity Efficient deterministic method for detecting new U2R Design of ARQ protocols for two-user cooperative diversity attacks 1104 systems in wireless networks 1111 Data streams Cooperative multi-input-multi-output (MIMO) ODMCA: An adaptive data mining control algorithm in Joint rate and cooperative MIMO scheme optimization for multicarrier networks 560 uniform energy distribution in Wireless Sensor Deep-space communications Networks 1072 Deep-Space Transport Protocol: A novel transport scheme for Cooperative sensing Space DTINs 1757 Reducing sensing error in cognitive PANs through reduction of Deep-Space Transport Protocol the channel set and split sensing 1326 Deep-Space Transport Protocol: A novel transport scheme for Cost Space DTNs 1757 Design and implenientation of light-weight mobile multicast Defense Mechanism for fast MIPV6 552 Measurement and mitigation of BitTorrent leecher 3-D coverage attacks 1852 Self-deployment of sensors for maximized coverage in Delay underwater acoustic sensor networks 1233 Topology control for delay-constraint data collection in Coverage wireless sensor networks 1820 A survey of movement strategies for improving network Delay analysis coverage in wireless sensor networks 1427 The influence of broadcast traffic on IEEE 802.11 DCF Cramér-Rao bound networks 439 Localization refinement for wireless sensor networks 1515 Delay compensation Cross layer Transparency analysis and delay compensation scheme for Cross layer multicarrier MIMO cognitive cooperation scheme haptic-based networked virtual environments 992 for wireless hybrid ad hoc networks 546 Delay distribution Cross-entropy concept Closed-form analysis of end-to-end network delay with Improvement of turbo decoding using cross-entropy 1034 Markov-modulated Poisson and fluid traffic 640 Cross-layer Delay Tolerant Networks An adaptive cross-layer design for multiservice scheduling in DBS-IC: An adaptive Data Bundling System for Intermittent OFDMA based mobile WiMAX systems 531 Connectivity 1687 Subject index of Volume 32 /C omputer Communications 32 (2009) i-XIX Delay-constrained capacitated minimum spanning tree Double Automatic Retransmission A dandelion-encoded evolutionary algorithm for the Deep-Space Transport Protocol: A novel transport scheme for delay-constrained capacitated minimum spanning tree Space DTNs 1757 problem 154 DSA-driven MAC Delay-tolerant network On game theoretic DSA-driven MAC for cognitive radio Analysis and design of mobile Wireless Social Model 927 networks 1944 Delivery DTN An encounter-based multicast scheme for disruption tolerant Analytical evaluation of average delay and maximum stable networks 1742 throughput along a typical two-way street for vehicular ad hoc Design networks in sparse situations 1768 The design and implementation of a session layer for On the implications of routing metric staleness in delay tolerant delay-tolerant networks 1724 networks 1699 DFT-S-GMC Dual wakeup design Frequency domain discrete fourier transform spread Dual wakeup design for wireless sensor networks 1 generalized multi-carrier system and its performance Dynamic honeypots analysis 456 An auto-responsive honeypot architecture for dynamic Diophantine equation resource allocation and QoS adaptation in DDoS attacked Restricted shortest paths in 2-circulant graphs 685 networks 1384 Discrete logarithms Dynamic multicasting Convertible multi-authenticated encryption scheme with Performance comparison of different multicast routing one-way hash function 783 strategies in disruption tolerant networks 1731 Disjoint paths Dynamic network An adaptive stabilizing algorithm for finding all disjoint paths Design and performance analysis of an inductive QoS routing in anonymous mesh networks 858 algorithm 1371 Disruption time Dynamic spectrum access Design and implementation of light-weight mobile multicast Mutual interference considered power allocation in for fast MIPv6 552 OFDM-based cognitive networks: The single SU case 1965 Disruption tolerant networking Spatial statistics and models of spectrum use 1998 An encounter-based multicast scheme for disruption tolerant Dynamic spectrum allocation networks 1742 General distributed economic framework for dynamic Disruption tolerant networks spectrum allocation 1955 Hierarchical power management in disruption tolerant Dynamic users’ behavior networks using traffic-aware optimization 1710 Dweb model: Representing Web 2.0 dynamism 1118 Disruption/delay tolerant networks Performance comparison of different multicast routing E-Model strategies in disruption tolerant networks 1731 Using cross-layer metrics to improve the performance of Distributed algorithms end-to-end handover mechanisms 1600 Distributed topology control algorithm based on Echo one- and two-hop neighbors’ information for ad hoc Using cross-layer metrics to improve the performance of networks 368 end-to-end handover mechanisms 1600 Distributed denial of service ECMA-368 An auto-responsive honeypot architecture for dynamic Bandwidth allocation in UWB WPANs with ECMA-368 resource allocation and QoS adaptation in DDoS attacked MAC 954 networks 1384 EDCA Distributed hash tables Supporting QoS in IEEE 802.11e wireless LANs over fading An emulator for peer-to-peer distributed hash tables 1559 channel 985 Distributed Hash Tables Electronic voting Reputation management algorithms for DHT-based New voter verification scheme using pre-encrypted peer-to-peer environment 1400 ballots 1219 Distributed management Elliptic curve General distributed economic framework for dynamic New stream ciphers based on elliptic curve point spectrum allocation 1955 multiplication 25 Distributed systems Emulator An adaptive stabilizing algorithm for finding all disjoint paths An emulator for peer-to-peer distributed hash tables 1559 in anonymous mesh networks 858 Encryption Dynamic nodelD based heterogeneity aware p2p system 1062 Modified clock-controlled alternating step generators 787 Diversity End-to-end protocols Combined switching and power control for diversity and End-to-end epidemic multicast loss recovery: Analysis of multiplexing in MIMO systems with cochannel scalability and robustness 668 interference 231 Energy conservation Diversity reception Dual wakeup design for wireless sensor networks 1 Uplink multiservice capacity and interference statistics of Energy consumption WCDMA macrocells with antenna diversity reception in a Enhanced authentication scheme with anonymity for roaming multipath fading environment 907 service in global mobility networks 611 Dolphin Express Joint rate and cooperative MIMO scheme optimization for A new distributed management mechanism for ASI based uniform energy distribution in Wireless Sensor networks 294 Networks 1072 VI Subject Index of Volume 32 / Computer Communications 32 (2029) I-XIX Energy efficiency Fault tolerance Extending network lifetime for ALLIANCES 1837 Data aggregation in partially connected networks 594 Energy efficient Fault-tolerance Distributed topology control algorithm based on An adaptive stabilizing algorithm for finding all disjoint paths one- and two-hop neighbors’ information for ad hoc in anonymous mesh networks 858 networks 368 File sharing On the energy consumption of Pure and Slotted Aloha based A peer-to-peer file search and download protocol for wireless RFID anti-collision protocols 961 ad-hoc networks 41 Topology control for delay-constraint data collection in Measuring web feature impacts in Peer-to-Peer file sharing wireless sensor networks 1820 systems 1418 Energy hole problem Fine granularity scalability (FGS) Maximizing network lifetime based on transmission range Objective quality definition of scalable video coding and its adjustment in wireless sensor networks 1316 application for optimal streaming of FGS-coded videos 34 Energy management Fixed relay Application-driven, energy-efficient communication in wireless Resource management policies for fixed relays in cellular sensor networks 896 networks 703 Energy-efficiency Flow anomaly detection ERTP: Energy-efficient and Reliable Transport Protocol for data A TCAM-based solution for integrated traffic anomaly detection streaming in Wireless Sensor Networks 1154 and policy filtering 1893 Entropic detection Flow contention An auto-responsive honeypot architecture for dynamic On the properties of an adaptive TCP Minimum RTO 888 resource allocation and QoS adaptation in DDoS attacked Forged login attack networks 1384 Cryptanalysis of a mutual authentication scheme based on EPC-C1G2 standard nonce and smart cards 1015 Practical attacks on a mutual authentication scheme under the Frame aggregation EPC Class-1 Generation-2 standard 1185 QoS based scheduling in the downlink of multi-user wireless Epidemic communication systems (extended) 1257 End-to-end epidemic multicast loss recovery: Analysis of Frame protocol scalability and robustness 668 Discrete-time control analysis of transport channel EuQoS synchronization in 3G radio access networks 1505 EuQoS: End-to-End Quality of Service over Heterogeneous Frequency characteristic Networks 1355 FDF: Frequency detection-based filtering of scanning Evaluation worms 847 An emulator for peer-to-peer distributed hash tables 1559 Frequency domain transceiver Event sensing Frequency domain discrete fourier transform spread LTRES: A loss-tolerant reliable event sensing protocol for generalized multi-carrier system and its performance wireless sensor networks 1666 analysis 456 Evolutionary algorithms Frequency reuse A dandelion-encoded evolutionary algorithm for the Muitiple frequency reuse schemes in the two-hop delay-constrained capacitated minimum spanning tree IEEE 802.16) wireless relay networks with asymmetrical problem 154 topology 1298 Expert system Fuzzy logic Network forensics based on fuzzy logic and expert Network forensics based on fuzzy logic and expert system 1881 system 1881 Fabric scheduler Game theory Fast and noniterative scheduling in input-queued switches: General distributed economic framework for dynamic Supporting QoS 834 spectrum allocation 1955 Fair rate control On game theoretic DSA-driven MAC for cognitive radio LTRES: A loss-tolerant reliable event sensing protocol for networks 1944 wireless sensor networks 1666 Perfectly fair channel assignment in non-cooperative Fairness multi-radio multi-channel wireless networks 1058 An efficient and fair explicit congestion control protocol for Generation-2 RFID high bandwidth-delay product networks 1138 Optimization of tag reading performance in generation-2 RFID Perfectly fair channel assignment in non-cooperative protocol 1346 multi-radio multi-channel wireless networks 1058 Genetic algorithm Fairness analysis A genetic algorithm for solving virtual source placement A comprehensive TCP fairness analysis in high speed problem on WDM networks 2987 networks 1460 Genetic algorithms False positive Efficient spectrum utilization via cross-layer optimization in Intrusion detection alarms reduction using root cause analysis distributed cognitive radio networks 1931 and clustering 419 Genetic simulated annealing Fast broadcasting scheme A method for least-cost QoS multicast routing based on genetic Segmented patching broadcasting protocol for video data 679 simulated annealing algorithm 105 Fast MIPv6 Geographic-based routing Design and implementation of light-weight mobile multicast Performance model and evaluation on geographic-based for fast MIPV6 552 routing 343 Subject Index of Volume 32 / Computer Communications 32 (2009) I-X1X GPRS Heuristics Increasing wide-area download throughputs 9n the roads by A dandelion-encoded evolutionary algorithm for the trunking multiple cellular channels over a vehicular ad hoc delay-constrained capacitated minimum spanning tree network 268 problem 154 Graph Priority-aware optical shared protection: An offline evaluation Mobile IPv6 deployments: Graph-based analysis and practical study 1677 guidelines 1871 Hierarchical routing protocol Grid computing EEHC: Energy efficient heterogeneous clustered scheme for Semantic partitioning of peer-to-peer search space 619 wireless sensor networks 662 Grid networks Hierarchical structure A comparison of centralized and distributed meta-scheduling Fast and proximity-aware multi-source overlay multicast under architectures for computation and communication tasks in Grid heterogeneous environment 257 networks 1172 High Packet Error Rate Group mobility Deep-Space Transport Protocol: A novel transport scheme for A distributed group mobility adaptive clustering algorithm for Space DTNs 1757 mobile ad hoc networks 189 High speed networks Group partition A comprehensive TCP fairness analysis in high speed A distributed group mobility adaptive clustering algorithm for networks 1460 mobile ad hoc networks 189 High speed TCP variants Group-oriented decryption A comprehensive TCP fairness analysis in high speed An ID-based group-oriented decryption scheme secure against networks 1460 adaptive chosen-ciphertext attacks 1829 High-speed network Guard channel reservation handoff scheme An efficient and fair explicit congestion control protocol for Completed analysis of cellular networks with PH-renewal high bandwidth-delay product networks 1138 arrival call 1039 High-speed networks implementation and experimental performance evaluation of a Handoff hybrid interrupt-handling scheme 179 Completed analysis of cellular networks with PH-renewal Packet reordering in high-speed networks and its impact on arrival call 1039 high-speed TCP variants 62 Handoff rate Highlight effect Opportunistic channel selection approach under collision Measuring web feature impacts in Peer-to-Peer file sharing probability constraint in cognitive radio systems 1914 systems 1418 HAPs HSDPA UMTS-HSDPA in High Altitude Platforms (HAPs) UMTS-HSDPA in High Altitude Platforms (HAPs) communications with finite transmitted power and unequal communications with finite transmitted power and unequal cell’s load 828 cell's load 828 Haptic interaction Hybrid ad hoc networks Transparency analysis and delay compensation scheme for Cross layer multicarrier MIMO cognitive cooperation scheme haptic-based networked virtual environments 992 for wireless hybrid ad hoc networks 546 HARQ Hybrid channel allocation Dynamic hybrid automatic repeat request (DHARQ) A hybrid channel allocation algorithm with priority to handoff for WiMAX - Mobile multihop relay using adaptive calls in mobile cellular networks 880 power control 806 Hypercube Hash Network load-aware content distribution in overlay Security flaw of H6lbl et al.’s protocol 736 networks 51 Hash chain An efficient and scalable pairwise key pre-distribution ID-based scheme for sensor networks using deployment A novel identity-based multi-signcryption scheme 14 knowledge 124 ID-based cryptography Mobile services access and payment through reusable An ID-based group-oriented decryption scheme secure against tickets 602 adaptive chosen-ciphertext attacks 1829 HCCA IEEE 802.11 An 802.11e HCCA scheduler with an end-to-end quality aware Accurate available bandwidth estimation in IEEE 802.1 1-based territory method 1281 ad hoc networks 1050 Heterogeneity APS-FeW: Improving TCP throughput over multihop adhoc Dynamic nodelD based heterogeneity aware p2p networks 19 system 1062 Efficient multimedia transmission using adaptive packet EuQoS: End-to-End Quality of Service over Heterogeneous bursting for wireless LANs 1271 Networks 1355 Energy-aware WLAN scanning in integrated IEEE 802.16 Heterogeneous e/802.11 networks 1588 EEHC: Energy efficient heterogeneous clustered scheme for On avoiding RTS collisions for IEEE 802.11-based wireless ad wireless sensor networks 662 hoc networks 69 Heterogeneous environment IEEE 802.11 DCF Fast and proximity-aware multi-source overlay multicast under A packet scheduling algorithm for max-min fairness in heterogeneous environment 257 multihop wireless LANs 1437 Heterogeneous traffic IEEE 802.11 MAC Throughput analysis of IEEE 802.11e EDCA under The influence of broadcast traffic on IEEE 802.11 DCF heterogeneous traffic 935 networks 439 Vill Subject Index of Volume 32 / Computer Communications 32 (2009) I-X1X IEEE 802.15.4 Intermittently connected networks Secured communication protocol for internetworking ZigBee Performance comparison of different multicast routing cluster networks 1531 strategies in disruption tolerant networks 1731 IEEE 802.16 Internet Fast system load estimation in the IEEE 802.16 OFDMA An investigation of the Internet's IP-layer connectivity 913 network 1228 Locating congested segments over the Internet by clustering Impact of bandwidth request schemes for Best-Effort traffic in the delay performance of multiple paths 1642 IEEE 802.16 networks 235 On scalability of proximity-aware peer-to-peer streaming 144 Slot allocation algorithms in centralized scheduling Internet voting scheme for IEEE 802.16 based wireless mesh New voter verification scheme using pre-encrypted networks 943 ballots 1219 IEEE 802.16e Interoperability An adaptive cross-layer design for multiservice scheduling in Agent mobility architecture based on IEEE-FIPA standards 712 OFDMA based mobile WiMAX systems 531 Interrupts Energy-aware WLAN scanning in integrated IEEE 802.16 Implementation and experimental performance evaluation of a e/802.11 networks 1588 hybrid interrupt-handling scheme 179 IEEE 802.21 Intrusion detection system Implementation and performance study of IEEE 802.21 in FDF: Frequency detection-based filtering of scanning integrated IEEE 802.11/802.16e networks 134 worms 847 Impersonation Intrusion detection alarms reduction using root cause analysis Cryptanalysis of a mutual authentication scheme based on and clustering 419 nonce and smart cards 1015 Network forensics based on fuzzy logic and expert Implementation system 1881 An emulator for peer-to-peer distributed hash tables IP over DWDM 1559 An adaptive-evolution-based quantum-inspired evolutionary The design and implementation of a session layer for algorithm for QoS multicasting in IP/DWDM delay-tolerant networks 1724 networks 1086 IMS Isolation band Quality of protection analysis and performance modeling in IP Multiple frequency reuse schemes in the two-hop IEEE multimedia subsystem 1336 802.16j wireless relay networks with asymmetrical Indoors positioning topology 1298 Tracking mobile targets indoors using WLAN and time of Iterative detection arrival 1552 Downlink co-channel interference cancellation in multihop Information security relay networks 1131 More secure remote user authentication scheme 1018 lub Infostations Discrete-time control analysis of transport channel Infostations for highway cigar-shaped cells 730 synchronization in 3G radio access networks 1505 Initial ranging An efficient initial ranging algorithm for WiMAX (802.16e) Kalman filtering OFDMA 159 Design of an adaptive positioning system based on WiFi radio Integer linear programing signals 1245 Priority-aware optical shared protection: An offline evaluation Key agreement study 1677 Enhanced authentication scheme with anonymity for roaming Integrity measurement service in global mobility networks 611 Trustworthy clients: Extending TNC to web-based Key management environments 1006 Secured communication protocol for internetworking ZigBee Inter-domain routing cluster networks 1531 Performance model and evaluation on geographic-based Keyword guessing attack routing 343 Constructing PEKS schemes secure against keyword guessing Interactivity attacks is possible? 394 Interactive slotted stream tapping 653 Keyword search Interface Constructing PEKS schemes secure against keyword guessing User-input driven QoS management in ad hoc networks 1306 attacks is possible? 394 Interference Knowledge discovery Channel assignment using block design in wireless mesh Efficient deterministic method for detecting new U2R networks 1148 attacks 1104 Improving throughput by tuning carrier sensing in 802.11 wireless networks 1263 Latency Interference cancellation Highest Urgency First (HUF): A latency and modulation aware Downlink co-channel interference cancellation in multihop bandwidth allocation algorithm for WiMAX base stations 332 relay networks 1131 £,-lattice Intermediate buffering Restricted shortest paths in 2-circulant graphs 685 Trends in highly scalable crossbar-based packet switch Least squares architecture 740 Localization refinement for wireless sensor networks 1515 Intermittent connectivity Lifetime DBS-IC: An adaptive Data Bundling System for Intermittent EEHC: Energy efficient heterogeneous clustered scheme for Connectivity 1687 wireless sensor networks 662 Subject Index of Volume 32 / Computer Communications 32 (2009) 1-X1X Lifetime maximization Markov chain A combinatorial algorithm for the maximum lifetime data Design and analysis of a TDMA call assignment scheme for gathering with aggregation problem in sensor networks 1655 cellular networks 1200 Light-weight Throughput analysis of IEEE 802.11e EDCA under Design and implementation of light-weight mobile multicast heterogeneous traffic 935 for fast MIPV6 552 Markov-modulated traffic Line cards Closed-form analysis of end-to-end network delay with Off-chip communication architectures for high throughput Markov-modulated Poisson and fluid traffic 640 network processors 867 Mathematical modelling Linear feedback shift-registers Energy-aware WLAN scanning in integrated IEEE 802.16 Modified clock-controlled alternating step generators 787 e/802.11 networks 1588 Linear programming Matrix-analytic approach A combinatorial algorithm for the maximum lifetime data Completed analysis of cellular networks with PH-renewal gathering with aggregation problem in sensor networks 1655 arrival call 1039 Linear programming system Max-min fairness Efficient deterministic method for detecting new U2R A packet scheduling algorithm for max-min fairness in attacks 1104 multihop wireless LANs 1437 Link adaptation Maximum rate limitation Cross-layer link adaptation design for UWB-based sensor Competitive scheduling for OFDMA systems with guaranteed networks 1568 transmission rate 501 Link prediction Maximum stable throughput QoS routing with traffic distribution in mobile ad hoc Analytical evaluation of average delay and maximum stable networks 305 throughput along a typical two-way street for vehicular ad hoc Linux networks in sparse situations 1768 Implementation and experimental performance evaluation of a MC-CDMA hybrid interrupt-handling scheme 179 Multiple level orthogonal codes and their application in Load baiancing MC-CDMA systems 492 QoS routing with traffic distribution in mobile ad hoc Media independent handover networks 305 Implementation and performance study of IEEE 802.21 in Spanning tree elevation protocol: Enhancing metro Ethernet integrated IEEE 802.11/802.16e networks 134 performance and QoS 750 Medium access control (MAC) Localization High throughput MAC layer multicasting over time-varying L-VIRT: Range-free 3-D localization of RFID tags based on channels 94 topological constraints 1485 Improving throughput by tuning carrier sensing in 802.11 Localization refinement for wireless sensor networks 1515 wireless networks 1263 Lonely node Memory access Dual wakeup design for wireless sensor networks 1 Off-chip communication architectures for high throughput Loop-shaping approach network processors 867 Robust active queue management design: A loop-shaping Mesh networks approach 324 An adaptive stabilizing algorithm for finding all disjoint paths in anonymous mesh networks 858 MAC Message complexity On avoiding RTS collisions for IEEE 802.11-based wireless ad Secured communication protocol for internetworking ZigBee hoc networks 69 cluster networks 1531 User-input driven QoS management in ad hoc networks 1306 Metro Ethernet Network MAC layer sensing Spanning tree elevation protocol: Enhancing metro Ethernet Reducing sensing error in cognitive PANs through reduction of performance and QoS 750 the channel set and split sensing 1326 MIMO MAC protocol An efficient bow-based on-demand QoS routing protocol for A cooperative CDMA-based multi-channel MAC protocol for MIMO ad hoc networks 1613 mobile ad hoc networks 1810 Cross-layer adaptive modulation and coding Connection-oriented multi-channel MAC protocol for ad-hoc design for space-time block coded MIMO-OFDM networks 169 systems 540 Extending network lifetime for ALLIANCES 1837 Joint rate and cooperative MIMO scheme optimization for Macrocells uniform energy distribution in Wireless Sensor Uplink multiservice capacity and interference statistics of Networks 1072 WCDMA macrocells with antenna diversity reception in a Minimum mean square error multipath fading environment 907 Optimisation of the pilot-to-data power ratio in the wireless MANET MIMO-OFDM system with low-complexity MMSE channel A distributed group mobility adaptive clustering algorithm for estimation 465 mobile ad hoc networks 189 Minimum rate guaranteed service A passive tree-based backbone construction scheme for Utility function of TCP 800 MANETs 1631 Minimum Route Advertisement Interval (MRAI) Increasing wide-area download throughputs on the roads by BGP convergence delay after multiple simultaneous router trunking multiple cellular channels over a vehicular ad hoc failures: Characterization and solutions 1207 network 268 Misuse detection Voice transmission over ad hoc network adapting optimum Efficient deterministic method for detecting new U2R approaches to maximize the performance 634 attacks 1104 Subject Index of Volume 32 /C omputer Communications 32 (2009) I-XIX Mitigation Model reference adaptive control An auto-responsive honeypot architecture for dynamic CDM-based design and performance evaluation of a robust resource allocation and QoS adaptation in DDoS attacked AQM method for dynamic TCP/AQM networks 213 networks 1384 Modeling MLSD Performance model and evaluation on geographic-based Multiple level orthogonal codes and their application in routing 343 MC-CDMA systems 492 Modeling dynamic workload MMSE detectors Dweb model: Representing Web 2.0 dynamism 1118 Efficient groupwise multiuser detection with iterative soft Modulation interference cancellation for multi-rate MC-CDMA 482 Highest Urgency First (HUF): A latency and modulation aware Mobile ad hoc networks bandwidth allocation algorithm for WiMAX base stations 332 Enhancing peer-to-peer content discovery techniques over Movement strategy mobile ad hoc networks 1445 A survey of movement strategies for improving network QoS routing with traffic distribution in mobile ad hoc coverage in wireless sensor networks 1427 networks 305 MPEG-4 videoconference Mobile ad hoc networks (MANETs) Pricing-based call admission control for wireless MPEG-4 On avoiding RTS collisions for IEEE 802.11-based wireless ad traffic 1781 hoc networks 69 MUD Mobile agent Efficient groupwise multiuser detection with iterative soft New routing framework base on rumor routing in wireless interference cancellation for multi-rate MC-CDMA 482 sensor networks 86 MUI/MAI Mobile agents Multiple level orthogonal codes and their application in Agent mobility architecture based on IEEE-FIPA standards 712 MC-CDMA systems 492 Mobile computing Mulitiplexing An efficient location tracking structure for wireless sensor Combined switching and power control for diversity and networks 1495 multiplexing in MIMO systems with cochannel Mobile IP interference 231 Mobility-Aware RSVP: A framework for improving the Multi-authenticated encryption scheme performance of multimedia services over wireless IP-based Convertible multi-authenticated encryption scheme with mobile networks 569 one-way hash function 783 Mobile IPv6 Multi-channel Mobile IPv6 deployments: Graph-based analysis and practical A cooperative CDMA-based multi-channel MAC protocol for guidelines 1871 mobile ad hoc networks 1810 Mobile multicast Connection-oriented multi-channel MAC protocol for ad-hoc Design and implementation of light-weight mobile multicast networks 169 for fast MIPV6 552 Multi-hop paths Mobile multihop relay Closed-form analysis of end-to-end network delay with Dynamic hybrid automatic repeat request (DHARQ) for Markov-modulated Poisson and fluid traffic 640 WiMAX - Mobile multihop relay using adaptive power Multi-layer network control 806 Path selection in multi-layer networks 78 Mobile networks Multi-objective optimization problem A hybrid channel allocation algorithm with priority to handoff Maximizing network lifetime based on transmission range calls in mobile cellular networks 880 adjustment in wireless sensor networks 1316 DBS-IC: An adaptive Data Bundling System for Intermittent Multi-Priority Connectivity 1687 Next generation CATV networks with QoS guarantees 766 Mobile node Multi-radio wireless networks A survey of movement strategies for improving network Perfectly fair channel assignment in non-cooperative coverage in wireless sensor networks 1427 multi-radio multi-channel wireless networks 1058 Mobile readers Multi-rate MC-CDMA L-VIRT: Range-free 3-D localization of RFID tags based on Efficient groupwise multiuser detection with iterative soft topological constraints 1485 interference cancellation for multi-rate MC-CDMA 482 Mobile value-added services Multi-signcryption Mobile services access and payment through reusable A novel identity-based multi-signcryption scheme 14 tickets 602 Multi-source Mobile WiMAX Fast and proximity-aware multi-source overlay multicast under An adaptive cross-layer design for multiservice scheduling in heterogeneous environment 257 OFDMA based mobile WiMAX systems 531 Multi-user detection Mobility Downlink co-channel interference cancellation in multihop Agent mobility architecture based on IEEE-FIPA standards 712 relay networks 1131 QoS routing with traffic distribution in mobile ad hoc Multi-user wireless networks networks 305 QoS based scheduling in the downlink of multi-user wireless Search: A routing protocol for mobile cognitive radio ad-hoc systems (extended) 1257 networks 1983 Multicarrier communications Mobility management ODMCA: An adaptive data mining control algorithm in Mobile IPv6 deployments: Graph-based analysis and practical multicarrier networks 560 guidelines 1871 Multicarrier MIMO Mobility models Cross layer multicarrier MIMO cognitive cooperation scheme Analysis and design of mobile Wireless Social Model 927 for wireless hybrid ad hoc networks 546

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.