default search action
Computer Networks, Volume 43
Volume 43, Number 1, September 2003
- Metin Feridun, Gabi Dreo Rodosek:
Management of IT services. 1-2 - Peter Reichl, David Hausheer, Burkhard Stiller:
The Cumulus Pricing model as an adaptive framework for feasible, efficient, and user-friendly tariffing of Internet services. 3-24 - Marcus Brunner, Alberto Gonzalez Prieto, Paloma Martínez:
From dynamic IP transport service ordering to DiffServ network configuration. 25-41 - Alexander Clemm, Fong Shen, Victor Lee:
Generic provisioning of heterogeneous services--a close encounter with service profiles. 43-57 - Mani Subramanian, Lundy Lewis:
QoS and bandwidth management in broadband cable access network. 59-73
Volume 43, Number 2, October 2003
- Ian F. Akyildiz, Özgür B. Akan, Chao Chen, Jian Fang, Weilian Su:
InterPlaNetary Internet: state-of-the-art and research challenges. 75-112 - Mihael Mohorcic, Ales Svigelj, Gorazd Kandus, Yim-Fun Hu, Ray E. Sheriff:
Demographically weighted traffic flow models for adaptive routing in packet-switched non-geostationary satellite meshed networks. 113-131 - Eitan Altman, Rachid El Azouzi, Odile Pourtallier:
Avoiding paradoxes in multi-agent competitive routing. 133-146 - Chun-Chuan Yang, Kwin-Yee Lin:
Distributed mobile tracking: a novel location management scheme for routing improvement in cellular IP networks. 147-161 - Helen Zeng, Imrich Chlamtac:
Adaptive guard channel allocation and blocking probability estimation in PCS networks. 163-176 - Kwan Lawrence Yeung, Ho-lun T. Wong:
Caching policy design and cache allocation in active reliable multicast. 177-193 - Ran Giladi, Ephraim Korach, Rony Ohayon:
Placement of network resources in communication networks. 195-209 - Abdullah Balamash, Marwan Krunz:
Modeling web requests: a multifractal approach. 211-226 - Adrian Lahanas, Vassilios Tsaoussidis:
Exploiting the efficiency and fairness potential of AIMD-based congestion avoidance and control. 227-245
Volume 43, Number 3, October 2003
- Alejandro Quintero, Samuel Pierre:
Sequential and multi-population memetic algorithms for assigning cells to switches in mobile networks. 247-261 - Fei Hu, Neeraj K. Sharma:
Multimedia call admission control in mobile networks: a dynamical reservation-pool approach. 263-288 - Qin Zheng, Gurusamy Mohan:
Dynamic protection using integrated-routing approach in IP-over-WDM networks. 289-305 - Yuming Jiang:
Relationship between guaranteed rate server and latency rate server. 307-315 - Yu-Chee Tseng, Chih-Shun Hsu, Ten-Yueng Hsieh:
Power-saving protocols for IEEE 802.11-based multi-hop ad hoc networks. 317-337 - Kemal Bicakci, Gene Tsudik, Brian Tung:
How to construct optimal one-time signatures. 339-349 - Stavroula Siachalou, Leonidas Georgiadis:
Efficient QoS routing. 351-367 - Catherine M. Burns, Johnson Kuo, Sylvia Ng:
Ecological interface design: a new approach for visualizing network management. 369-388 - Srinidhi Varadarajan, Naren Ramakrishnan, Muthukumar Thirunavukkarasu:
Reinforcing reachable route. 389-416
Volume 43, Number 4, November 2003
- Erdal Cayirci, Ramesh Govindan, Taieb Znati, Mani B. Srivastava:
Wireless sensor networks. 417-419 - Sasikanth Avancha, Jeffrey Undercoffer, Anupam Joshi, John Pinkston:
Secure sensor networks for perimeter protection. 421-435 - Ahmed Helmy:
Mobility-assisted resolution of queries in large-scale mobile sensor networks (MARQ) . 437-458 - Hongwei Zhang, Anish Arora:
GS3: scalable self-configuration and self-healing in wireless sensor networks . 459-480 - Swades De, Chunming Qiao, Hongyi Wu:
Meshed multipath routing with selective forwarding: an efficient strategy in wireless sensor networks. 481-497 - Koen Langendoen, Niels Reijers:
Distributed localization in wireless sensor networks: a quantitative compariso. 499-518 - Enrique J. Duarte-Melo, Mingyan Liu:
Data-gathering wireless sensor networks: organization and capacity. 519-537
Volume 43, Number 5, December 2003
- Ning Wang, George Pavlou:
Scalable sender access control for bi-directional multicast routing. 539-555 - Dániel Orincsay, Balázs Szviatovszki, Géza Böhm:
Prompt partial path optimization in MPLS networks. 557-572 - Juan M. Estévez-Tapiador, Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo:
NSDF: a computer network system description framework and its application to network security. 573-600 - Tom Coffey, Reiner Dojen, Tomas Flanagan:
Formal verification: an imperative step in the design of security protocols . 601-618 - Kyungsup Kim, Chong-Ho Choi:
Queue delay estimation and its application to TCP Vegas. 619-631 - Steven H. Low, Fernando Paganini, Jiantao Wang, John C. Doyle:
Linear stability of TCP/RED and a scalable control. 633-647 - Mohamed F. Younis, Moustafa Youssef, Khaled A. Arisha:
Energy-aware management for cluster-based sensor networks. 649-668 - Kihyun Pyun, Junehwa Song, Heung-Kyu Lee:
A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing. 669-694
Volume 43, Number 6, December 2003
- Jianping Pan, Yiwei Thomas Hou, Bo Li:
An overview of DNS-based server selections in content distribution networks. 695-711 - Chao-Hsu Chang, Eric Hsiao-Kuang Wu:
AMRST: adaptive multicast routing protocol for satellite-terrestrial networks. 713-734 - Soonuk Seol, Myungchul Kim, Sungwon Kang, Jiwon Ryu:
Fully automated interoperability test suite derivation for communication protocols. 735-759 - Tamer Dag, Ioannis Stavrakakis:
Proactive congestion control for high speed networks. 761-775 - Ana M. Barbancho, Alberto Peinado:
Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications. 777-785 - Dhananjay S. Phatak, Tom Goff, Jim Plusquellic:
IP-in-IP tunneling to enable the simultaneous use of multiple IP interfaces for network level connection striping. 787-804 - Timo Koskela, Jukka Heikkonen, Kimmo Kaski:
Web cache optimization with nonlinear model using object features. 805-817
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.