


default search action
Computer Networks, Volume 88
Volume 88, September 2015
- Ertong Zhang, Lisong Xu:
Capacity and token rate estimation for networks with token bucket shapers. 1-11 - Mustapha Réda Senouci
, Abdelhamid Mellouk, Latifa Oukhellou
, Amar Aissani
:
WSNs deployment framework based on the theory of belief functions. 12-26 - Quoc-Tuan Vien
, Wanqing Tu
, Huan Xuan Nguyen
, Ramona Trestian
:
Cross-layer topology design for network coding based wireless multicasting. 27-39 - Kaveh Vaezi
, Nail Akar
:
Analytical performance modeling of elastic optical links with aligned spectrum allocation. 40-50 - Michele Girolami
, Stefano Chessa
, Antonio Caruso
:
On service discovery in mobile social networks: Survey and perspectives. 51-71 - Xinyu Yang, Xuebin Ren, Shusen Yang
, Julie A. McCann:
A novel temporal perturbation based privacy-preserving scheme for real-time monitoring systems. 72-88 - Victor Lira, Eduardo Antonio Guimarães Tavares
, Paulo Romero Martins Maciel:
An automated approach to dependability evaluation of virtual networks. 89-102 - Vladimir Fux, Patrick Maillé
, Matteo Cesana
:
Road-side units operators in competition: A game-theoretical approach. 103-120 - Weigang Hou, Lei Guo, Yejun Liu, Cunqian Yu, Yue Zong:
Resource management and control in converged optical data center networks: Survey and enabling technologies. 121-135 - Wei Wang, Lei Chen
, Qian Zhang
:
Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation. 136-148 - Dimitris Tsolkas, Nikos I. Passas, Lazaros F. Merakos
:
Enabling device discovery transmissions in LTE networks with fractional frequency reuse. 149-160 - Uthpala Subodhani Premarathne, Ibrahim Khalil
, Mohammed Atiquzzaman
:
Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications. 161-177 - Haitham Y. Adarbah, Shakeel Ahmad, Alistair Duffy
:
Impact of noise and interference on probabilistic broadcast schemes in mobile ad-hoc networks. 178-186 - Georgios Papadimitriou
, Nikolaos Pappas
, Apostolos Traganitis, Vangelis Angelakis:
Network-level performance evaluation of a two-relay cooperative random access wireless system. 187-201 - Nicolò Facchi, Francesco Gringoli
, Fabio Ricciato, Andrea Toma:
Emitter localisation from reception timestamps in asynchronous networks. 202-217 - Ahmed Makki, Abubakr Siddig, Mohamed M. Saad, Chris J. Bleakley:
Survey of WiFi positioning using time-based techniques. 218-233
- Imran Ahmed, M. Majid Butt
, Constantinos Psomas, Amr Mohamed
, Ioannis Krikidis
, Mohsen Guizani:
Survey on energy harvesting wireless communications: Challenges and opportunities for radio resource allocation. 234-248
- Aissan Dalvandi, Mohan Gurusamy
, Kee Chaing Chua:
Power-efficient resource-guaranteed VM placement and routing for time-aware data center applications. 249-268 - Nuno Filipe Coutinho, Ricardo Matos, Carlos Marques
, Andre B. Reis
, Susana Sargento
, Jacob Chakareski, Andreas Kassler:
Dynamic dual-reinforcement-learning routing strategies for quality of experience-aware wireless mesh networking. 269-285

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.