


default search action
Computer Networks [and ISDN Systems], Volume 73
Volume 73, November 2014
- Xiaopei Lu, Dezun Dong, Xiangke Liao, Shanshan Li, Xiaodong Liu:

PathZip: A lightweight scheme for tracing packet path in wireless sensor networks. 1-14 - Sungwook Kim:

Learning based bandwidth management algorithms by using bargaining and fictitious play approaches. 15-21 - Giovanni Stea

, Antonio Virdis
:
A comprehensive simulation analysis of LTE Discontinuous Reception (DRX). 22-40 - Ding Wang

, Ping Wang:
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions. 41-57 - Chen-Khong Tham

, Tie Luo
:
Fairness and social welfare in service allocation schemes for participatory sensing. 58-71 - Sunggeun Jin, Daji Qiao:

Numerical analysis of the power saving with a bursty traffic model in LTE-Advanced networks. 72-83 - Dinil Mon Divakaran, Mohan Gurusamy

, Mathumitha Sellamuthu:
Bandwidth allocation with differential pricing for flexible demands in data center networks. 84-97 - Giuseppe Colistra, Virginia Pilloni

, Luigi Atzori:
The problem of task allocation in the Internet of Things and the consensus-based approach. 98-111 - Yaodong Zhang, Yue Wang, Dan Pei

, Jian Yuan:
Multi-AS cooperative incoming traffic engineering in a transit-edge separate internet. 112-127 - Furqan Hameed Khan, Young-June Choi:

Distributed games for coordinated coalition formation in femtocell networks. 128-141 - Meng-Shiuan Pan

, Ping-Lin Liu, Yen-Pei Lin:
Event data collection in ZigBee tree-based wireless sensor networks. 142-153 - Salvatore Cavalieri

, Ferdinando Chiacchio:
Limiting the loss of information in KNXnet/IP on congestion conditions. 154-172 - Abderrahmane Baadache, Ali Belmehdi:

Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks. 173-184 - Li Xu, Yuan He, Xiaofeng Chen, Xinyi Huang:

Ticket-based handoff authentication for wireless mesh networks. 185-194 - Tong Liu, Yanmin Zhu:

Social welfare maximization in participatory smartphone sensing. 195-209 - Tiphaine Phe-Neau, Marcelo Dias de Amorim, Vania Conan:

Uncovering vicinity properties in disruption-tolerant networks. 210-223
- Angelos K. Marnerides

, Alberto E. Schaeffer Filho
, Andreas Mauthe
:
Traffic anomaly diagnosis in Internet backbone networks: A survey. 224-243
- Chunqi Tian, Baijian Yang

, Jidong Zhong, Xiaojian Liu:
Trust-based incentive mechanism to motivate cooperation in hybrid P2P networks. 244-255 - Rosario Giuseppe Garroppo

, Gianfranco Nencioni
, Luca Tavanti
, Bernard Gendron:
The greening potential of content delivery in residential community networks. 256-267 - Yi-Huai Hsu

, Kuochen Wang, Yu-Chee Tseng:
Efficient cooperative access class barring with load balancing and traffic adaptive radio resource management for M2M communications over LTE-A. 268-281 - Angelo Coluccia

, Fabio Ricciato, Peter Romirer-Maierhofer:
Robust estimation of mean failure probability in access networks. 282-301 - Youngsoo Lee, Chong-Ho Choi:

Transmission Order Deducing MAC (TOD-MAC) protocol for CSMA/CA wireless networks. 302-318 - Min-Hong Han, Byung-Gook Kim, Jang-Won Lee

:
Opportunistic resource scheduling for D2D communication in OFDMA networks. 319-334

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














