


default search action
Computer Networks, Volume 108
Volume 108, October 2016
- Alia Asheralieva

, Yoshikazu Miyanaga
:
Effective resource block allocation procedure for quality of service provisioning in a single-operator heterogeneous LTE-A network. 1-14 - Nasrin Taherkhani, Samuel Pierre:

Prioritizing and scheduling messages for congestion control in vehicular ad hoc networks. 15-28 - Xianfu Meng, Shuang Ren:

An outlier mining-based malicious node detection model for hybrid P2P networks. 29-39 - Molka Gharbaoui, Barbara Martini, Carol J. Fung, Francesco Paolucci

, Alessio Giorgetti
, Piero Castoldi:
An incentive-compatible and trust-aware multi-provider path computation element (PCE). 40-54 - Carlos Pereira

, Ana Aguiar
, Daniel E. Lucani
:
When are network coding based dynamic multi-homing techniques beneficial? 55-65 - Savio Sciancalepore

, Giuseppe Piro, Elvis Vogli, Gennaro Boggia, Luigi Alfredo Grieco, Giuseppe Cavone:
LICITUS: A lightweight and standard compatible framework for securing layer-2 communications in the IoT. 66-77
- Mohamed Abu Sharkh, Ali Kanso, Abdallah Shami

, Peter Öhlén:
Building a cloud on earth: A study of cloud computing data center simulators. 78-96
- Soodeh Hosseini, Mohammad Abdollahi Azgomi

:
A model for malware propagation in scale-free networks based on rumor spreading process. 97-107 - Xianda Chen, Kyung Tae Kim, Hee Yong Youn:

Integration of Markov random field with Markov chain for efficient event detection using wireless sensor network. 108-119 - Feng Li, Jun Luo

, Shi-Qing Xin, Ying He
:
Autonomous deployment of wireless sensor networks for optimal coverage with directional sensing model. 120-132 - Sabrina Sicari

, Alessandra Rizzardi, Daniele Miorandi, Cinzia Cappiello
, Alberto Coen-Porisini
:
Security policy enforcement for networked smart objects. 133-147 - Chen-Khong Tham

, Wen Sun:
A Spatio-temporal incentive scheme with consumer demand awareness for participatory sensing. 148-159 - Armir Bujari

, Andrea Marin, Claudio E. Palazzi
, Sabina Rossi:
Analysis of ECN/RED and SAP-LAW with simultaneous TCP and UDP traffic. 160-170 - Mariusz Glabowski

, Adam Kaliszan
, Maciej Stasiak
:
Modelling overflow systems with distributed secondary resources. 171-183 - Tram Truong Huu

, Mohan Gurusamy
, Vishal Girisagar:
Dynamic embedding of workflow requests for bandwidth efficiency in data centers. 184-198 - Kübra Kalkan

, Fatih Alagöz:
A distributed filtering mechanism against DDoS attacks: ScoreForCore. 199-209 - Tassos Dimitriou, Ebrahim A. Alrashed, Mehmet Hakan Karaata, Ali Hamdan:

Imposter detection for replication attacks in mobile sensor networks. 210-222 - Moumita Patra, C. Siva Ram Murthy:

Piggybacking assisted many-to-Many communication with efficient vehicle selection for improved performance in vehicular ad hoc networks. 223-232
- Robert Wójcik, Jerzy Domzal

, Zbigniew Duliñski, Grzegorz Rzym
, Andrzej Kamisinski, Piotr Gawlowicz, Piotr Jurkiewicz
, Jacek Rzasa, Rafal Stankiewicz
, Krzysztof Wajda:
A survey on methods to provide interdomain multipath transmissions. 233-259
- Rihab Chaari, Fatma Ellouze, Anis Koubâa

, Basit Qureshi
, Nuno Pereira
, Habib Youssef, Eduardo Tovar
:
Cyber-physical systems clouds: A survey. 260-278 - Molka Gharbaoui, Barbara Martini, Davide Adami

, Stefano Giordano
, Piero Castoldi:
Cloud and network orchestration in SDN data centers: Design principles and performance evaluation. 279-295 - Wayan Damayanti, Sanghyun Kim, Ji-Hoon Yun

:
Collision chain mitigation and hidden device-aware grouping in large-scale IEEE 802.11ah networks. 296-306 - Cristian Hernandez Benet, Andreas Kassler, Enrica Zola

:
Predicting expected TCP throughput using genetic algorithm. 307-322 - Emrah Çem, Kamil Saraç:

Estimation of structural properties of online social networks at the extreme. 323-344 - Siguang Chen, Chuanxin Zhao, Meng Wu, Zhixin Sun, Haijun Zhang, Victor C. M. Leung:

Compressive network coding for wireless sensor networks: Spatio-temporal coding and optimization design. 345-356 - Jan Plachy

, Zdenek Becvar
, Pavel Mach
:
Path selection enabling user mobility and efficient distribution of data for computation at the edge of mobile network. 357-370 - Afraa Khalifah, Nadine Akkari

, Ghadah Aldabbagh, Nikos Dimitriou
:
Hybrid femto/macro rate-based offloading for high user density networks. 371-380

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














