Table of contents for issues of Computer Networks (Amsterdam, Netherlands: 1999)

Last update: Sat Aug 26 08:22:55 MDT 2017                Valid HTML 3.2!

Volume 32, Number 1, January, 2000
Volume 32, Number 2, February, 2000
Volume 32, Number 3, March, 2000
Volume 32, Number 4, April, 2000
Volume 32, Number 5, May 15, 2000
Volume 32, Number 6, May 30, 2000
Volume 33, Number 1--6, June, 2000
Volume 34, Number 1, July, 2000
Volume 34, Number 2, August, 2000
Volume 34, Number 3, September, 2000
Volume 34, Number 4, October, 2000
Volume 34, Number 5, November ??, 2000
Volume 34, Number 6, December ??, 2000
Volume 35, Number 1, January ??, 2001
Volume 35, Number 2--3, February ??, 2001
Volume 35, Number 4, March ??, 2001
Volume 35, Number 5, April ??, 2001
Volume 35, Number 6, May ??, 2001
Volume 36, Number 1, June ??, 2001
Volume 36, Number 2--3, July ??, 2001
Volume 36, Number 4, July 16, 2001
Volume 36, Number 5--6, August ??, 2001
Volume 37, Number 1, September ??, 2001
Volume 37, Number 2, October ??, 2001
Volume 37, Number 3--4, November 5, 2001
Volume 37, Number 5, November 22, 2001
Volume 37, Number 6, December 15, 2001
Volume 38, Number 1, January 15, 2002
Volume 38, Number 2, February 5, 2002
Volume 38, Number 3, February 21, 2002
Volume 38, Number 4, March 15, 2002
Volume 38, Number 5, April 5, 2002
Volume 38, Number 6, April 22, 2002
Volume 39, Number 1, May 15, 2002
Volume 39, Number 2, June 5, 2002
Volume 39, Number 3, June 21, 2002
Volume 39, Number 4, July 15, 2002
Volume 39, Number 5, August 5, 2002
Volume 39, Number 6, August 21, 2002
Volume 40, Number 1, September ??, 2002
Volume 40, Number 2, October 7, 2002
Volume 40, Number 3, October 22, 2002
Volume 40, Number 4, November 15, 2002
Volume 40, Number 5, December 5, 2002
Volume 40, Number 6, December 20, 2002
Volume 41, Number 1, January 15, 2003
Volume 41, Number 2, February 5, 2003
Volume 41, Number 3, February 21, 2003
Volume 41, Number 4, March 15, 2003
Volume 41, Number 5, April 5, 2003
Volume 41, Number 6, April 22, 2003
Volume 42, Number 1, May 15, 2003
Volume 42, Number 2, June 5, 2003
Volume 42, Number 3, June 21, 2003
Volume 42, Number 4, July 15, 2003
Volume 42, Number 5, August 5, 2003
Volume 42, Number 6, August 21, 2003
Volume 43, Number 1, September 16, 2003
Volume 43, Number 2, October 7, 2003
Volume 43, Number 3, October 22, 2003
Volume 43, Number 4, November 15, 2003
Volume 43, Number 5, December 5, 2003
Volume 43, Number 6, December 20, 2003
Volume 44, Number 1, January 15, 2004
Volume 44, Number 2, February 5, 2004
Volume 44, Number 3, February 20, 2004
Volume 44, Number 4, March 15, 2004
Volume 44, Number 5, April 5, 2004
Volume 44, Number 6, April 22, 2004
Volume 45, Number 1, May 15, 2004
Volume 45, Number 2, June 5, 2004
Volume 45, Number 3, June 21, 2004
Volume 45, Number 4, July 15, 2004
Volume 45, Number 5, August 5, 2004
Volume 45, Number 6, August 21, 2004
Volume 46, Number 1, September 16, 2004
Volume 46, Number 2, October 7, 2004
Volume 46, Number 3, October 22, 2004
Volume 46, Number 4, November 15, 2004
Volume 46, Number 5, December 5, 2004
Volume 46, Number 6, December 20, 2004
Volume 47, Number 1, January 14, 2005
Volume 47, Number 2, February 4, 2005
Volume 47, Number 3, February 21, 2005
Volume 47, Number 4, March 15, 2005
Volume 47, Number 5, April 5, 2005
Volume 47, Number 6, April 22, 2005
Volume 48, Number 1, May 16, 2005
Volume 48, Number 2, June 6, 2005
Volume 48, Number 3, June 21, 2005
Volume 48, Number 4, July 15, 2005
Volume 48, Number 5, August 5, 2005
Volume 48, Number 6, August 19, 2005
Volume 49, Number 1, September 15, 2005
Volume 49, Number 2, October 5, 2005
Volume 49, Number 3, October 19, 2005
Volume 49, Number 4, November 15, 2005
Volume 49, Number 5, December 5, 2005
Volume 49, Number 6, December 19, 2005
Volume 50, Number 1, January 16, 2006
Volume 50, Number 2, February 8, 2006
Volume 50, Number 3, February 22, 2006
Volume 50, Number 4, March 15, 2006
Volume 50, Number 5, April 6, 2006
Volume 50, Number 6, April 13, 2006
Volume 50, Number 7, May 15, 2006
Volume 50, Number 8, June 6, 2006
Volume 50, Number 9, June 20, 2006
Volume 50, Number 10, July 14, 2006
Volume 50, Number 11, August 10, 2006
Volume 50, Number 12, August 24, 2006
Volume 50, Number 13, September 15, 2006
Volume 50, Number 14, October 5, 2006
Volume 50, Number 15, October 18, 2006
Volume 50, Number 16, November 14, 2006
Volume 50, Number 17, December 5, 2006
Volume 50, Number 18, December 21, 2006
Volume 51, Number 1, January 17, 2007
Volume 51, Number 2, February 7, 2007
Volume 51, Number 3, February 21, 2007
Volume 51, Number 4, March 14, 2007
Volume 51, Number 5, April 11, 2007
Volume 51, Number 6, April 25, 2007
Volume 51, Number 7, May 16, 2007
Volume 51, Number 8, June 6, 2007
Volume 51, Number 9, June 20, 2007
Volume 51, Number 10, July 11, 2007
Volume 51, Number 11, August 8, 2007
Volume 51, Number 12, August 22, 2007
Volume 51, Number 13, September 12, 2007
Volume 51, Number 14, October 10, 2007
Volume 51, Number 15, October 24, 2007
Volume 51, Number 16, November 14, 2007
Volume 51, Number 17, December 5, 2007
Volume 51, Number 18, December 19, 2007
Volume 52, Number 1, January 18, 2008
Volume 52, Number 2, February 8, 2008
Volume 52, Number 3, February 22, 2008
Volume 52, Number 4, March 14, 2008
Volume 52, Number 5, April 10, 2008
Volume 52, Number 6, April 24, 2008
Volume 52, Number 7, May 15, 2008
Volume 52, Number 8, June 12, 2008
Volume 52, Number 9, June 26, 2008
Volume 52, Number 10, July 16, 2008
Volume 52, Number 11, August 8, 2008
Volume 52, Number 12, August 22, 2008
Volume 52, Number 13, September 17, 2008
Volume 52, Number 14, October 9, 2008
Volume 52, Number 15, October 23, 2008
Volume 52, Number 16, November 13, 2008
Volume 52, Number 17, December 8, 2008
Volume 52, Number 18, December 22, 2008
Volume 53, Number 1, January 16, 2009
Volume 53, Number 2, February 13, 2009
Volume 53, Number 3, February 27, 2009
Volume 53, Number 4, March 18, 2009
Volume 53, Number 5, April 9, 2009
Volume 53, Number 6, April 23, 2009
Volume 53, Number 7, May 13, 2009
Volume 53, Number 8, June 11, 2009
Volume 53, Number 9, June 25, 2009
Volume 53, Number 10, July 14, 2009
Volume 53, Number 11, July 28, 2009
Volume 53, Number 12, August 13, 2009
Volume 53, Number 13, August 28, 2009
Volume 53, Number 14, September 18, 2009
Volume 53, Number 15, October 12, 2009
Volume 53, Number 16, November 10, 2009
Volume 53, Number 17, December 3, 2009
Volume 53, Number 18, December 24, 2009
Volume 54, Number 5, April 8, 2010


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 32, Number 1, January, 2000

            Kannan Varadhan and   
            Ramesh Govindan and   
                 Deborah Estrin   Persistent route oscillations in
                                  inter-domain routing . . . . . . . . . . 1--16
   Mohamad Hossien Yaghmaee and   
             Mostafa Safavi and   
          Mohamad Bagher Menhaj   An intelligent usage parameter
                                  controller based on dynamic rate leaky
                                  bucket for ATM networks  . . . . . . . . 17--34
            Sudhir Aggarwal and   
                Sanjoy Paul and   
              Daniel Massey and   
              Daniela Caldararu   A flexible multicast routing protocol
                                  for group communication  . . . . . . . . 35--60
            Nelson O. L. Ng and   
                     C. K. Tham   Connection admission control of ATM
                                  network using integrated MLP and fuzzy
                                  controllers  . . . . . . . . . . . . . . 61--79
                       R. Sisto   Using binary decision diagrams for
                                  representation and analysis of
                                  communication protocols  . . . . . . . . 81--98
               Hongyi Zhang and   
             Oliver W. Yang and   
                     H. Mouftah   A hop-by-hop flow controller for a
                                  virtual path . . . . . . . . . . . . . . 99--119
            Ian F. Akyildiz and   
                    Harry Rudin   Editorial  . . . . . . . . . . . . . . . vi--vi
          Philip H. Enslow, Jr.   Changing the guard at Computer Networks  v--v

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 32, Number 2, February, 2000

            Wing Cheong Lau and   
                       Sanqi Li   Sojourn-time analysis on nodal
                                  congestion in broadband networks . . . . 125--147
              Bong Dae Choi and   
               Sung Ho Choi and   
                   Bara Kim and   
                  Dan Keun Sung   Analysis of priority queueing system
                                  based on thresholds and its application
                                  to signaling system no. 7 with
                                  congestion control . . . . . . . . . . . 149--170
                   B. Kraimeche   Design and analysis of the
                                  Stacked-Banyan ATM switch fabric . . . . 171--184
           Yiwei Thomas Hou and   
                         others   A differentiated services architecture
                                  for multimedia streaming in next
                                  generation Internet  . . . . . . . . . . 185--209
            Vijay Sivaraman and   
              George N. Rouskas   A reservation protocol for broadcast WDM
                                  networks and stability analysis  . . . . 211--227
             Toshihiko Ando and   
            Kaoru Takahashi and   
               Yasushi Kato and   
                Norio Shiratori   Maintenance of mobile system ambients
                                  using a process calculus . . . . . . . . 229--256

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 32, Number 3, March, 2000

               Da-Wei Chang and   
                 Hao-Ren Ke and   
               Ruei-Chuan Chang   Adaptive-level memory caches on World
                                  Wide Web servers . . . . . . . . . . . . 261--275
                Yehuda Afek and   
             Yishay Mansour and   
                    Zvi Ostfeld   Phantom: a simple and effective flow
                                  control scheme . . . . . . . . . . . . . 277--305
               Omar Elloumi and   
                Nada Golmie and   
               Hossam Afifi and   
                       David Su   A simulation-based study of TCP dynamics
                                  over HFC networks  . . . . . . . . . . . 307--323
               Shlomi Dolev and   
            Alexander Kesselman   Bounded latency scheduling scheme for
                                  ATM cells  . . . . . . . . . . . . . . . 325--331
                    Jon M. Peha   Dynamic pricing and congestion control
                                  for best-effort ATM services . . . . . . 333--345
               Sungwon Kang and   
                Jaehwi Shin and   
                  Myungchul Kim   Interoperability test suite derivation
                                  for communication protocols  . . . . . . 347--364
                 J. Mark Pullen   The Network Workbench: network
                                  simulation software for academic
                                  investigation of Internet concepts . . . 365--378

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 32, Number 4, April, 2000

                L. G. Bouma and   
             Nancy Griffeth and   
              Kristofer Kimbler   Feature Interactions in
                                  Telecommunications Systems . . . . . . . 383--387
             Nancy Griffeth and   
           Ralph Blumenthal and   
      Jean-Charles Gregoire and   
                   Tadashi Ohta   A feature interaction benchmark for the
                                  first feature interaction detection
                                  contest  . . . . . . . . . . . . . . . . 389--418
             L. du Bousquet and   
            F. Ouabdesselam and   
              J.-L. Richier and   
                      N. Zuanon   Feature interaction detection using a
                                  synchronous approach and testing . . . . 419--431
                      Q. Fu and   
                 P. Harnois and   
                L. Logrippo and   
                   J. Sincennes   Feature interaction detection: a
                                  LOTOS-based approach . . . . . . . . . . 433--448
                 Robert J. Hall   Feature combination and interaction
                                  detection via foreground/background
                                  models . . . . . . . . . . . . . . . . . 449--469
             Saheem Siddiqi and   
                Joanne M. Atlee   A hybrid model for specifying features
                                  and detecting interactions . . . . . . . 471--485
             Nancy Griffeth and   
           Ralph Blumenthal and   
      Jean-Charles Gregoire and   
                   Tadashi Ohta   Feature interaction detection contest of
                                  the Fifth International Workshop on
                                  Feature Interactions . . . . . . . . . . 487--510

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 32, Number 5, May 15, 2000

           Maurice Gagnaire and   
                Roberto Sabella   Optical networks for new generation
                                  Internet and data communication systems  515--517
                 Jan Späth   Dynamic routing and resource allocation
                                  in WDM transport networks  . . . . . . . 519--538
                  Maher Ali and   
           Byrav Ramamurthy and   
             Jitender S. Deogun   Routing and wavelength assignment with
                                  power considerations in optical networks 539--555
                 S. Binetti and   
                  G. Notaro and   
                     R. Sabella   Granularity in all-optical WDM networks
                                  for large geographical areas . . . . . . 557--562
                   S. Betti and   
                   E. Bravi and   
                     M. Giaconi   Analysis of the performance of
                                  subcarrier multiplexed (SCM) optical
                                  systems  . . . . . . . . . . . . . . . . 563--569
           Maurice Gagnaire and   
             Sa\vso Stojanovski   Stream traffic management over an ATM
                                  passive optical network  . . . . . . . . 571--586
                I. M. White and   
                         others   The architecture of HORNET: A
                                  packet-over-WDM multiple-access optical
                                  metropolitan area ring network . . . . . 587--598
           M. Ajmone Marsan and   
                E. Leonardi and   
                     M. Meo and   
                        F. Neri   Modeling slotted WDM rings with
                                  discrete-time Markovian models . . . . . 599--615
                  A. Bianco and   
               V. Distefano and   
               A. Fumagalli and   
                E. Leonardi and   
                        F. Neri   A posteriori versus a priori access
                                  strategies in slotted all-optical WDM
                                  rings  . . . . . . . . . . . . . . . . . 617--631
             Vincenzo Eramo and   
                 Marco Listanti   Wavelength converter sharing in a WDM
                                  optical packet switch: dimensioning and
                                  performance issues . . . . . . . . . . . 633--651
Gerardo Castañón and   
             Lubo Tancevski and   
                 Lakshman Tamil   Optical packet switching with multiple
                                  path routing . . . . . . . . . . . . . . 653--662

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 32, Number 6, May 30, 2000

                Simon Field and   
                Michael Waidner   Electronic Commerce  . . . . . . . . . . 667--668
                     Steve Mott   The second generation of digital
                                  commerce solutions . . . . . . . . . . . 669--683
                Gritta Wolf and   
              Andreas Pfitzmann   Properties of protection goals and their
                                  integration into a user interface  . . . 685--700
Katarina Stanoevska-Slabeva and   
                    Beat Schmid   Internet electronic product catalogs: an
                                  approach beyond simple keywords and
                                  multimedia . . . . . . . . . . . . . . . 701--715
              Yigal Hoffner and   
      Christian Facciorusso and   
                Simon Field and   
                 Andreas Schade   Distribution issues in the design and
                                  implementation of a virtual market place 717--730
         Jeffrey O. Kephart and   
            James E. Hanson and   
               Amy R. Greenwald   Dynamic pricing by software agents . . . 731--752
         Dimitri Konstantas and   
               Jean-Henry Morin   Agent-based commercial dissemination of
                                  electronic information . . . . . . . . . 753--765
                      Anonymous   Index  . . . . . . . . . . . . . . . . . 771--773
                      Anonymous   Index  . . . . . . . . . . . . . . . . . 775--776


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 33, Number 1--6, June, 2000

                Nina Bhatti and   
                 Anna Bouch and   
                Allan Kuchinsky   Integrating user-perceived quality into
                                  Web server design  . . . . . . . . . . . 1--16
  Balachander Krishnamurthy and   
                 Craig E. Wills   Analyzing factors that influence
                                  end-to-end Web performance . . . . . . . 17--32
            Pablo Rodriguez and   
                  Sandeep Sibal   SPREAD: Scalable platform for reliable
                                  and efficient automated distribution . . 33--49
           David P. Kormann and   
                 Aviel D. Rubin   Risks of the Passport single signon
                                  protocol . . . . . . . . . . . . . . . . 51--58
            Ernesto Damiani and   
Sabrina De Capitani di Vimercati and   
         Stefano Paraboschi and   
            Pierangela Samarati   Design and implementation of an access
                                  control processor for XML documents  . . 59--75
                  B. Hashii and   
               S. Malabarba and   
                  R. Pandey and   
                      M. Bishop   Supporting reconfigurable security
                                  policies for mobile programs . . . . . . 77--93
              Ellen Spertus and   
              Lynn Andrea Stein   Squeal: a structured query language for
                                  the Web  . . . . . . . . . . . . . . . . 95--103
           Thomas A. Phelps and   
                Robert Wilensky   Robust intra-document locations  . . . . 105--118
           Daniela Florescu and   
            Donald Kossmann and   
                Ioana Manolescu   Integrating keyword search into XML
                                  query processing . . . . . . . . . . . . 119--135
               Stefano Ceri and   
           Piero Fraternali and   
                    Aldo Bongio   Web Modeling Language (WebML): a
                                  modeling language for designing Web
                                  sites  . . . . . . . . . . . . . . . . . 137--157
                 Greg J. Badros   JavaML: a markup language for Java
                                  source code  . . . . . . . . . . . . . . 159--177
         Patrick van Amstel and   
           Pim van der Eijk and   
             Evert Haasdijk and   
                  David Kuilman   An interchange format for cross-media
                                  personalized publishing  . . . . . . . . 179--195
              Masahiro Hori and   
                 Goh Kondoh and   
                Kouichi Ono and   
           Shin-ichi Hirose and   
                Sandeep Singhal   Annotation-based Web content transcoding 197--211
          Orkut Buyukkokten and   
       Hector Garcia-Molina and   
                Andreas Paepcke   Focused Web searching with PDAs  . . . . 213--230
              Eija Kaasinen and   
             Matti Aaltonen and   
                Juha Kolari and   
             Suvi Melakoski and   
                    Timo Laakko   Two approaches to bringing Internet
                                  services to WAP devices  . . . . . . . . 231--246
               Raymie Stata and   
             Krishna Bharat and   
                 Farzin Maghoul   The Term Vector Database: fast access to
                                  indexing terms for Web pages . . . . . . 247--255
        Brian E. Brewington and   
                 George Cybenko   How dynamic is the Web?  . . . . . . . . 257--276
                  Jun Hirai and   
            Sriram Raghavan and   
       Hector Garcia-Molina and   
                Andreas Paepcke   WebBase: a repository of Web pages . . . 277--293
        Monika R. Henzinger and   
               Allan Heydon and   
       Michael Mitzenmacher and   
                    Marc Najork   On near-uniform URL sampling . . . . . . 295--308
              Andrei Broder and   
                 Ravi Kumar and   
             Farzin Maghoul and   
         Prabhakar Raghavan and   
        Sridhar Rajagopalan and   
               Raymie Stata and   
             Andrew Tomkins and   
                   Janet Wiener   Graph structure in the Web . . . . . . . 309--320
                  Anja Feldmann   BLT: Bi-Layer Tracing of HTTP and TCP/IP 321--335
    Christoph Hölscher and   
                 Gerhard Strube   Web search behavior of Internet experts
                                  and newbies  . . . . . . . . . . . . . . 337--346
           Kerstin Forsberg and   
                 Lars Dannstedt   Extensible use of RDF in a business
                                  context  . . . . . . . . . . . . . . . . 347--364
          Shannon L. Fowler and   
       Anne-Marie J. Novack and   
           Michael J. Stillings   The evolution of a manufacturing Web
                                  site . . . . . . . . . . . . . . . . . . 365--376
             Ramesh R. Sarukkai   Link prediction and path analysis using
                                  Markov chains  . . . . . . . . . . . . . 377--386
                  R. Lempel and   
                       S. Moran   The stochastic approach for
                                  link-structure analysis (SALSA) and the
                                  TKC effect . . . . . . . . . . . . . . . 387--401
           Harald Weinreich and   
            Winfried Lamersdorf   Concepts for improved visualization of
                                  Web link attributes  . . . . . . . . . . 403--416
            Atsushi Sugiura and   
                   Oren Etzioni   Query routing for Web search engines:
                                  architecture and experiments . . . . . . 417--429
              Lieming Huang and   
            Matthias Hemmje and   
               Erich J. Neuhold   ADMIRE: an adaptive data model for meta
                                  search engines . . . . . . . . . . . . . 431--448
                 Dell Zhang and   
                   Yisheng Dong   An efficient algorithm to rank Web
                                  resources  . . . . . . . . . . . . . . . 449--455
              Sougata Mukherjea   WTMS: a system for collecting and
                                  analyzing topic-specific Web information 457--471
                   S. Staab and   
                  J. Angele and   
                  S. Decker and   
                 M. Erdmann and   
                   A. Hotho and   
             A. Mädche and   
              H.-P. Schnurr and   
                      R. Studer   Semantic community Web portals . . . . . 473--491
                 Krishna Bharat   SearchPad: explicit capture of search
                                  context to support Web search  . . . . . 493--501
               Vinod Anupam and   
             Juliana Freire and   
               Bharat Kumar and   
                 Daniel Lieuwen   Automating Web navigation with the
                                  WebVCR . . . . . . . . . . . . . . . . . 503--517
             John C. Shafer and   
                 Rakesh Agrawal   Continuous querying in database-centric
                                  Web applications . . . . . . . . . . . . 519--531
               Sami Rollins and   
                Neel Sundaresan   AVoN calling: AXL for voice-enabled Web
                                  navigation . . . . . . . . . . . . . . . 533--551
   Kaj Grònbæk and   
              Lennert Sloth and   
              Niels Olof Bouvin   Open hypermedia as user controlled meta
                                  data for the Web . . . . . . . . . . . . 553--566
                Pengkai Pan and   
            Glorianna Davenport   I-Views: a community-oriented system for
                                  sharing streaming video on the Internet  567--581
               Stuart Goose and   
                Mike Newman and   
              Claus Schmidt and   
                    Laurent Hue   Enhancing Web accessibility via the Vox
                                  Portal and a Web-hosted dynamic HTML
                                  $\Leftrightarrow$ VoxML converter  . . . 583--592
             Mike Spreitzer and   
                   Bill Janssen   HTTP `Next Generation' . . . . . . . . . 593--607
             Venky Krishnan and   
                 S. Grace Chang   Customized Internet radio  . . . . . . . 609--618
            Andrew C. Huang and   
           Benjamin C. Ling and   
             John J. Barton and   
                    Armando Fox   Running the Web backwards: appliance
                                  data services  . . . . . . . . . . . . . 619--631
                Kun-Lung Wu and   
                   Philip S. Yu   Latency-sensitive hashing for
                                  collaborative Web caching  . . . . . . . 633--644
               Jaeyeon Jung and   
                Dongman Lee and   
                    Kilnam Chon   Proactive Web caching with cumulative
                                  prefetching for large multimedia data    645--655
            Stephane Gruber and   
           Jennifer Rexford and   
                   Andrea Basso   Protocol considerations for a
                                  prefix-caching proxy for multimedia
                                  streams  . . . . . . . . . . . . . . . . 657--668
         Soumen Chakrabarti and   
         Sandeep Srivastava and   
        Mallela Subramanyam and   
                   Mitul Tiwari   Using Memex to archive and mine
                                  community Web browsing experience  . . . 669--684
           William W. Cohen and   
                        Wei Fan   Web-collaborative filtering:
                                  recommending music by crawling the Web   685--698
            Neel Sundaresan and   
                    Jeonghee Yi   Mining the Web for relations . . . . . . 699--711
                  Alison Cawsey   Presenting tailored resource
                                  descriptions: will XSLT do the job?  . . 713--722
      Mary Fernández and   
             Wang-Chiew Tan and   
                      Dan Suciu   SilkRoute: trading between relations and
                                  XML  . . . . . . . . . . . . . . . . . . 723--745
              Marc Girardot and   
                Neel Sundaresan   Millau: an encoding format for efficient
                                  representation and exchange of XML over
                                  the Web  . . . . . . . . . . . . . . . . 747--765
                 John A. Tomlin   An entropy approach to unintrusive
                                  targeted advertising on the Web  . . . . 767--774
                  Naoki Abe and   
                 Tomonari Kamba   A Web marketing system with automatic
                                  pricing  . . . . . . . . . . . . . . . . 775--788
     José Brustoloni and   
                     Juan Garay   MicroISPs: providing convenient and
                                  low-cost high-bandwidth Internet access  789--802
              Kirk Martinez and   
                Steve Perry and   
                    John Cupitt   Object browsing using the Internet
                                  Imaging Protocol . . . . . . . . . . . . 803--810
          Takehiro Nakayama and   
                Hiroki Kato and   
                   Yohei Yamane   Discovering the gap between Web site
                                  designers' expectations and users'
                                  behavior . . . . . . . . . . . . . . . . 811--822
              Davood Rafiei and   
           Alberto O. Mendelzon   What is this page known for? Computing
                                  Web page reputations . . . . . . . . . . 823--835
                      Anonymous   Index  . . . . . . . . . . . . . . . . . 837--839
                      Anonymous   Index  . . . . . . . . . . . . . . . . . 841--843
                      Anonymous   Editorial(s) . . . . . . . . . . . . . . v--vi
                      Anonymous   Editorial(s) . . . . . . . . . . . . . . vii--viii


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 34, Number 1, July, 2000

             Demetres Kouvatsos   Performance Modelling and Evaluation of
                                  ATM Networks . . . . . . . . . . . . . . 1--2
             A. Evangelatos and   
           Th. Rapsomanikis and   
                  N. Mitrou and   
              G. Stassinopoulos   A burst-level traffic analysis tool  . . 3--22
               A. Alheraish and   
                    D. G. Smith   Cell rate moderation of VBR video under
                                  an FEC environment in ATM networks . . . 23--35
           Christos Stathis and   
                 Basil Maglaris   Modelling the self-similar behaviour of
                                  network traffic  . . . . . . . . . . . . 37--47
      Francesco Balestrieri and   
        Pantelis L. Panteli and   
   Vasillios Dionissopoulos and   
             Trevor G. Clarkson   ATM connection admission control using
                                  pRAM based artificial neural networks    49--63
                J. Soldatos and   
                  E. Vayias and   
                      N. Mitrou   CAC and traffic shaping for performance
                                  control in ATM: the two-class paradigm   65--83
                  M. Becker and   
                   A.-L. Beylot   Performance comparison criteria for ATM
                                  switch models  . . . . . . . . . . . . . 85--95
      Demetres D. Kouvatsos and   
              Irfan U. Awan and   
            Rod J. Fretwell and   
            George Dimakopoulos   A cost-effective approximation for SRD
                                  traffic in arbitrary multi-buffered
                                  networks . . . . . . . . . . . . . . . . 97--113
        Madhu D. K. Bhabuta and   
              Peter G. Harrison   Optimising bandwidth of ABR sources  . . 115--128
              Ilhem Lengliz and   
                  Farouk Kamoun   A rate-based flow control method for ABR
                                  service in ATM networks  . . . . . . . . 129--138
              Milan Vojnovi and   
                    Nikola Ro i   An evaluation of the ABR explicit-rate
                                  allocation interfering with the
                                  guaranteed services traffic  . . . . . . 139--155
                     Jan Naudts   Towards real-time measurement of traffic
                                  control parameters . . . . . . . . . . . 157--167
                 C. Casetti and   
                R. Lo Cigno and   
                      M. Mellia   Load-balancing solutions for static
                                  routing schemes in ATM networks  . . . . 169--180
    Ádám Magi and   
       Áron Szentesi and   
     Balázs Szviatovszki   Analysis of link cost functions for PNNI
                                  routing  . . . . . . . . . . . . . . . . 181--197
                Tien Van Do and   
            Thong T. Nguyen and   
               Hung T. Tran and   
       Gábor Kalvach and   
            Balázs Varga   Topology optimization of an overlay ATM
                                  network in an SDH infrastructure . . . . 199--210
               D. Denteneer and   
                   V. Pronk and   
            J. M. Griffiths and   
                 L. G. Cuthbert   Impact of the resource needed for
                                  renegotiating ATM rates  . . . . . . . . 211--225

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 34, Number 2, August, 2000

                 S. M. Poon and   
                   Song Jie and   
                  B. S. Lee and   
                      C. K. Yeo   Performance of buffer-based
                                  request-reply scheme for VoD streams
                                  over IP networks . . . . . . . . . . . . 229--240
             Ren-Hung Hwang and   
            James F. Kurose and   
                    Don Towsley   MDP routing for multi-rate loss networks 241--261
          Fabrice Guillemin and   
             Olivier Dugeon and   
           Jacqueline Boyer and   
              Christophe Mangin   Lightweight signaling in ATM networks
                                  for high quality transfer of Internet
                                  traffic  . . . . . . . . . . . . . . . . 263--278
                   Shaowen Song   A credit-based flow control algorithm
                                  for broadband access networks  . . . . . 279--295
              Mahmoud Saleh and   
           Mohammed Atiquzzaman   Analysis of shared buffer switches under
                                  non-uniform traffic pattern and global
                                  flow control . . . . . . . . . . . . . . 297--315
             Peter Herrmann and   
                    Heiko Krumm   A framework for modeling transfer
                                  protocols  . . . . . . . . . . . . . . . 317--337

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 34, Number 3, September, 2000

        Antonios F. Atlasis and   
         Nikolaos H. Loukas and   
        Athanasios V. Vasilakos   The use of learning algorithms in ATM
                                  networks call admission control problem:
                                  a methodology  . . . . . . . . . . . . . 341--353
            M. A. Al-Fawzan and   
                  Fahad Hoymany   Placement of network servers in a
                                  wide-area network  . . . . . . . . . . . 355--361
            Shatha K. Habra and   
                 Ahmed E. Kamal   An MCR-weighted protocol for
                                  multipoint-to-point communication over
                                  ABR service  . . . . . . . . . . . . . . 363--378
         Michael Montgomery and   
             Gustavo de Veciana   Hierarchical source routing using
                                  implied costs  . . . . . . . . . . . . . 379--397
                Robert Haas and   
               Patrick Droz and   
                   Daniel Bauer   PNNI Augmented Routing (PAR) and
                                  Proxy-PAR  . . . . . . . . . . . . . . . 399--418
              Wei Kuang Lai and   
                   Mu-Rung Shiu   Improving goodputs of IP packets under
                                  ATM UBR traffic with port-based queueing
                                  schemes  . . . . . . . . . . . . . . . . 419--437
               Keith Mainwaring   A role for ATM in telephony and IP
                                  networks . . . . . . . . . . . . . . . . 439--454
               Larry Hughes and   
              Omid Banyasad and   
                    Evan Hughes   Cartesian routing  . . . . . . . . . . . 455--466
             Yue-Shan Chang and   
            Shyan-Ming Yuan and   
                     Winston Lo   A new multi-search engine for querying
                                  data through an Internet search service
                                  on CORBA . . . . . . . . . . . . . . . . 467--480
              Y. Thomas Hou and   
                      Bo Li and   
        Shivendra S. Panwar and   
                    Henry Tzeng   On network bandwidth allocation policies
                                  and feedback control algorithms for
                                  packet networks  . . . . . . . . . . . . 481--501
               Eerke Boiten and   
              Howard Bowman and   
               John Derrick and   
            Peter Linington and   
                  Maarten Steen   Viewpoint consistency in ODP . . . . . . 503--537

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 34, Number 4, October, 2000

         Deborah A. Frincke and   
                 Ming-Yuh Huang   Recent advances in intrusion detection
                                  systems  . . . . . . . . . . . . . . . . 541--545
         Eugene H. Spafford and   
                  Diego Zamboni   Intrusion detection using autonomous
                                  agents . . . . . . . . . . . . . . . . . 547--570
        Stefanos Manganaris and   
         Marvin Christensen and   
                 Dan Zerkle and   
                   Keith Hermiz   A data mining analysis of RTID alarms    571--577
           Richard Lippmann and   
           Joshua W. Haines and   
             David J. Fried and   
             Jonathan Korba and   
                      Kumar Das   The 1999 DARPA off-line intrusion
                                  detection evaluation . . . . . . . . . . 579--595
        Richard P. Lippmann and   
           Robert K. Cunningham   Improving intrusion detection
                                  performance using keyword selection and
                                  neural networks  . . . . . . . . . . . . 597--603
           Richard Feiertag and   
                         others   Intrusion detection inter-component
                                  adaptive negotiation . . . . . . . . . . 605--621
              Emilie Lundin and   
                 Erland Jonsson   Anomaly-based intrusion detection:
                                  privacy concerns and other problems  . . 623--640
                 Peter Mell and   
               Donald Marks and   
                  Mark McLarnon   A denial-of-service resistant intrusion
                                  detection architecture . . . . . . . . . 641--658
            Glenn Mansfield and   
                 Kohei Ohta and   
                   Y. Takei and   
                    N. Kato and   
                      Y. Nemoto   Towards trapping wily intruders in the
                                  large  . . . . . . . . . . . . . . . . . 659--670
                   J. Yuill and   
                         others   Intrusion-detection for
                                  incident-response, using a military
                                  battlefield-intelligence process . . . . 671--697

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 34, Number 5, November ??, 2000

             Luigi Logrippo and   
                    John Visser   Future wireless networks . . . . . . . . 701--703
            Harald Schmidts and   
                    John Visser   Framework for IMT-2000 networks  . . . . 705--715
          Jean Claude Samou and   
             Drissa Houatra and   
         Philippe Godlewski and   
                      Elie Najm   IMT-2000 wireless terminal mobility over
                                  object-oriented distributed platforms    717--743
             Alfio Lombardo and   
          Ferdinando Lucidi and   
           Marina Samarotto and   
             Sebastiano Trigila   Personal mobility aspects in service
                                  architectures: extensions to TINA  . . . 745--762
              Brahim Ghribi and   
                 Luigi Logrippo   Understanding GPRS: the GSM packet radio
                                  service  . . . . . . . . . . . . . . . . 763--779
                    Fawzi Daoud   Hybrid satellite/terrestrial networks
                                  integration  . . . . . . . . . . . . . . 781--797
            Giulio Maggiore and   
            Giulio Brusasco and   
                Marco Vecchiato   Network integration testing: concepts,
                                  test specifications and tools for
                                  automatic telecommunication services
                                  verification . . . . . . . . . . . . . . 799--819

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 34, Number 6, December ??, 2000

              Claudio Allocchio   Guest editorial  . . . . . . . . . . . . 821--822
           Claudia Raibulet and   
              Claudio Demartini   Mobile agent technology for the
                                  management of distributed systems --- a
                                  case study . . . . . . . . . . . . . . . 823--830
             Torsten Bissel and   
              Manfred Bogen and   
        Christian Bonkowski and   
              Volker Hadamschek   Service level management with agent
                                  technology . . . . . . . . . . . . . . . 831--841
       Peter Òrbæk   An experimental system for distributed
                                  classroom education  . . . . . . . . . . 843--850
          Pierluigi Bonetti and   
           Stefano Ravaioli and   
             Simone Piergallini   The Italian academic community's
                                  electronic voting system . . . . . . . . 851--860
      Gregory Karvounarakis and   
             Sarantos Kapidakis   Submission and repository management of
                                  digital libraries, using WWW . . . . . . 861--872
                  Luca Deri and   
                   Stefano Suin   Practical network security: experiences
                                  with ntop  . . . . . . . . . . . . . . . 873--880
           Madalina Baltatu and   
               Antonio Lioy and   
                Fabio Maino and   
              Daniele Mazzocchi   Security issues in control, management
                                  and routing protocols  . . . . . . . . . 881--894
           Ferdinand Hommes and   
                  Eva Pless and   
                    Lothar Zier   Did MPOA achieve its objective?  . . . . 895--904
                Tiziana Ferrari   End-to-end performance analysis with
                                  traffic aggregation  . . . . . . . . . . 905--914
              Volker Sander and   
                 Ian Foster and   
                  Alain Roy and   
                  Linda Winkler   A differentiated services implementation
                                  for high-performance TCP flows . . . . . 915--929
             Thomas Boudier and   
               David M. Shotton   VIDOS, a system for video editing and
                                  format conversion over the Internet  . . 931--944
         Pantelis Balaouras and   
        Ioannis Stavrakakis and   
                Lazaros Merakos   Potential and limitations of a
                                  teleteaching environment based on H.323
                                  audio-visual communication systems . . . 945--958
              Gertraud Hoffmann   G-WiN --- the Gbit/s infrastructure for
                                  the German scientific community  . . . . 959--964
        Stanislav Milanovic and   
         Alessandro Maglianella   ATM over ADSL probe in Telecom Italia
                                  environment  . . . . . . . . . . . . . . 965--980
                      Anonymous   Index  . . . . . . . . . . . . . . . . . 981--983
                      Anonymous   Index  . . . . . . . . . . . . . . . . . 984--986


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 35, Number 1, January ??, 2001

                  Emil Lupu and   
           Subrata Mazumdar and   
                   Rolf Stadler   Selected topics in network and systems
                                  management . . . . . . . . . . . . . . . 1--4
                    P. Bhoj and   
                 S. Singhal and   
                     S. Chutani   SLA management in federated environments 5--24
                 M. Feridun and   
                      J. Krause   A framework for distributed management
                                  with mobile components . . . . . . . . . 25--38
Jürgen Schönwälder and   
            Jürgen Quittek   Secure Internet management by delegation 39--56
          P. G. S. Florissi and   
                  Y. Yemini and   
                    D. Florissi   QoSockets: a new extension to the
                                  sockets API for end-to-end application
                                  QoS management . . . . . . . . . . . . . 57--76
      Joseph L. Hellerstein and   
                  Fan Zhang and   
             Perwez Shahabuddin   A statistical approach to predictive
                                  detection  . . . . . . . . . . . . . . . 77--95

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 35, Number 2--3, February ??, 2001

        Spyros E. Polykalas and   
          George T. Kolyvas and   
            Iakovos S. Venieris   An adaptive congestion control mechanism
                                  for intelligent broadband networks . . . 97--115
                Oran Sharon and   
                 Michael Spratt   A CSMA/CD compatible MAC for real-time
                                  transmissions based on varying collision
                                  intervals  . . . . . . . . . . . . . . . 117--142
            K. R. Venugopal and   
             M. Shiva Kumar and   
            P. Sreenivasa Kumar   A heuristic for placement of limited
                                  range wavelength converters in
                                  all-optical networks . . . . . . . . . . 143--163
        Marcos Postigo-Boix and   
    Joan García-Haro and   
  Mónica Aguilar-Igartua   IMA: technical foundations, application
                                  and performance analysis . . . . . . . . 165--183
                Chunlei Liu and   
                       Raj Jain   Improving explicit congestion
                                  notification with the mark-front
                                  strategy . . . . . . . . . . . . . . . . 185--201
                   Z. G. Li and   
                 X. J. Yuan and   
                  C. Y. Wen and   
                    B. H. Soong   A switched priority scheduling mechanism
                                  for ATM switches with multi-class output
                                  buffers  . . . . . . . . . . . . . . . . 203--221
                Yvo Desmedt and   
                         others   Broadcast anti-jamming systems . . . . . 223--236
                  David Lee and   
         K. K. Ramakrishnan and   
                  W. Melody Moh   Correctness and performance of the ATM
                                  ABR rate control scheme  . . . . . . . . 237--261
         Stefaan De Cnodder and   
               Omar Elloumi and   
                  Kenny Pauwels   Rate adaptive shaping for the efficient
                                  transport of data traffic in diffserv
                                  networks . . . . . . . . . . . . . . . . 263--285
           Shih-Chiang Tsao and   
                   Ying-Dar Lin   Pre-order Deficit Round Robin: a new
                                  scheduling algorithm for packet-switched
                                  networks . . . . . . . . . . . . . . . . 287--305
     Suresh Kalyanasundaram and   
          Edwin K. P. Chong and   
                 Ness B. Shroff   Admission control schemes to provide
                                  class-level QoS in multiservice networks 307--326
              Erdal Cayirci and   
                      Cem Ersoy   A PCS based architecture for tactical
                                  mobile communications  . . . . . . . . . 327--350
      Shervin Shirmohammadi and   
           Nicolas D. Georganas   An end-to-end communication architecture
                                  for collaborative virtual environments   351--367
                      Anonymous   Call for Papers  . . . . . . . . . . . . 369--370

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 35, Number 4, March ??, 2001

                      Anonymous   Editorial  . . . . . . . . . . . . . . . 371--371
                  Dirk Husemann   Pervasive computing: Hogwarts, StarTrek,
                                  reality and back . . . . . . . . . . . . 373--375
                 Alan Jones and   
                  Andrew Hopper   The prototype embedded network (PEN) . . 377--390
                 Alex P. J. Hum   Fabric area network --- a new wireless
                                  communications infrastructure to enable
                                  ubiquitous networking and sensing on
                                  intelligent clothing . . . . . . . . . . 391--399
              Michael Beigl and   
          Hans-W. Gellersen and   
               Albrecht Schmidt   Mediacups: experience with design and
                                  use of computer-augmented everyday
                                  artifacts  . . . . . . . . . . . . . . . 401--409
               Reto Hermann and   
                         others   DEAPspace --- Transient ad hoc
                                  networking of pervasive devices  . . . . 411--428
             Natalie Glance and   
               Dave Snowdon and   
               Jean-Luc Meunier   Pollen: using people as a communication
                                  medium . . . . . . . . . . . . . . . . . 429--442
               Tim Kindberg and   
                    John Barton   A Web-based nomadic computing system . . 443--456
            Tobin J. Lehman and   
                         others   Hitting the distributed computing sweet
                                  spot with TSpaces  . . . . . . . . . . . 457--472
          Steven D. Gribble and   
                         others   The Ninja architecture for robust
                                  Internet-scale systems and services  . . 473--497
                      Anonymous   Acknowledgement to reviewers . . . . . . 499--502

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 35, Number 5, April ??, 2001

            Thomas Magedanz and   
                Mikhail Smirnov   Voice/data integration --- a snapshot of
                                  intelligent networks and Internet
                                  convergence  . . . . . . . . . . . . . . 503--505
                Xiaomin Zhu and   
               Jianxin Liao and   
                  Junliang Chen   IIN model: modifications and case study  507--519
      Jean-Emmanuel Chapron and   
                  Bruno Chatras   An analysis of the IN call model
                                  suitability in the context of VoIP . . . 521--535
            C. A. Licciardi and   
                   G. Canal and   
               A. Andreetto and   
                        P. Lago   An architecture for IN-Internet hybrid
                                  services . . . . . . . . . . . . . . . . 537--549
                 Roch H. Glitho   Emerging alternatives to today's
                                  advanced service architectures for
                                  Internet telephony: IN and beyond  . . . 551--563
      Menelaos K. Perdikeas and   
            Iakovos S. Venieris   Parlay-based service engineering in a
                                  converged Internet-PSTN environment  . . 565--578
               Farooq Anjum and   
           Francesco Caruso and   
                  Ravi Jain and   
              Paolo Missier and   
               Adalberto Zordan   CitiTime: a system for rapid creation of
                                  portable next-generation telephony
                                  services . . . . . . . . . . . . . . . . 579--595
              Raimo Kantola and   
         Jose Costa Requena and   
                 Nicklas Beijar   Interoperable routing for IN and IP
                                  Telephony  . . . . . . . . . . . . . . . 597--609

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 35, Number 6, May ??, 2001

            Rachida Dssouli and   
                     Yair Lahav   MSC and SDL in project life cycles . . . 611--612
          Michael Andersson and   
                  Anders Ek and   
                  Niklas Landin   Utilizing UML in SDL-based development   613--625
             Birgit Geppert and   
        Frank Rößler   The SDL pattern approach --- a
                                  reuse-driven SDL design methodology  . . 627--645
       Jörg Hintelmann and   
            Richard Hofmann and   
               Frank Lemmen and   
    Andreas Mitschele-Thiel and   
  Bruno Müller-Clostermann   Applying techniques and tools for the
                                  performance engineering of SDL systems   647--665
        Nikolai N. Mansurov and   
              Robert L. Probert   Improving time-to-market using SDL tools
                                  and techniques . . . . . . . . . . . . . 667--691
                C. Bourhfir and   
              E. Aboulhamid and   
                 F. Khendek and   
                     R. Dssouli   Test cases selection from SDL
                                  specifications . . . . . . . . . . . . . 693--708
                      Rick Reed   Notes on SDL-2000 for the new millennium 709--720
               Ò. Haugen   MSC-2000 interaction diagrams for the
                                  new millennium . . . . . . . . . . . . . 721--732
                      Anonymous   Author Index . . . . . . . . . . . . . . 733--735
                      Anonymous   Subject Index  . . . . . . . . . . . . . 737--739


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 36, Number 1, June ??, 2001

               J. Crowcroft and   
                         others   Active networks and services . . . . . . 1--3
                Atanu Ghosh and   
                Michael Fry and   
                  Glen MacLarty   An infrastructure for application level
                                  active networking  . . . . . . . . . . . 5--20
        Jessica A. Kornblum and   
                  Danny Raz and   
                  Yuval Shavitt   The active process interaction with its
                                  environment  . . . . . . . . . . . . . . 21--34
             Amila Fernando and   
            Darren Williams and   
                Alan Fekete and   
                 Bob Kummerfeld   Dynamic network service installation in
                                  an active network  . . . . . . . . . . . 35--48
             Daniel Villela and   
         Andrew T. Campbell and   
                   John Vicente   Virtuosity: Programmable resource
                                  management for spawning networks . . . . 49--73
            Ian W. Marshall and   
               Chris Roadknight   Provision of quality of service for
                                  active services  . . . . . . . . . . . . 75--85
            Stamatis Karnouskos   Security implications of implementing
                                  active network infrastructures using
                                  agent technology . . . . . . . . . . . . 87--100
                Ian Wakeman and   
               Alan Jeffrey and   
                   Tim Owen and   
                  Damyan Pepper   SafetyNet: A language-based approach to
                                  programmable networks  . . . . . . . . . 101--114

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 36, Number 2--3, July ??, 2001

                      Joe Touch   Overlay networks . . . . . . . . . . . . 115--116
                      Joe Touch   Dynamic Internet overlay deployment and
                                  management using the X-Bone  . . . . . . 117--135
                L. Keng Lim and   
                         others   Customizable virtual private network
                                  service with QoS . . . . . . . . . . . . 137--151
                    Gong Su and   
                 Yechiam Yemini   Virtual active networks: towards
                                  multi-edged network computing  . . . . . 153--168
                M. Ayedemir and   
                         others   Two tools for network traffic analysis   169--179
               Wee-Seng Soh and   
                Chen-Khong Tham   Modular neural networks for
                                  multi-service connection admission
                                  control  . . . . . . . . . . . . . . . . 181--202
                James Aweya and   
           Michel Ouellette and   
              Delfin Y. Montuno   A control theoretic approach to active
                                  queue management . . . . . . . . . . . . 203--235
               Changhee Joo and   
                  Saewoong Bahk   Analysis of start-up transition dynamics
                                  of TCP NewReno . . . . . . . . . . . . . 237--250
             Turgay Korkmaz and   
                   Marwan Krunz   A randomized algorithm for finding a
                                  path subject to multiple QoS
                                  requirements . . . . . . . . . . . . . . 251--268
            Ming-Feng Chang and   
                Yi-Bing Lin and   
                    Wei-Zu Yang   Performance of hot billing mobile
                                  prepaid service  . . . . . . . . . . . . 269--290
           Keiichi Yasumoto and   
            Teruo Higashino and   
              Kenichi Taniguchi   A compiler to implement LOTOS
                                  specifications in distributed
                                  environments . . . . . . . . . . . . . . 291--310
         J. González and   
                         others   Optimization of Web newspaper layout in
                                  real time  . . . . . . . . . . . . . . . 311--321
               Xiaojun Xiao and   
             Yong Huat Chew and   
         Winston K. G. Seah and   
                   Chi Chung Ko   Performance analysis for voice and data
                                  integration in hybrid fiber/coax
                                  networks . . . . . . . . . . . . . . . . 323--341
               Shlomi Dolev and   
             Boris Fitingof and   
            Avraham Melkman and   
                    Olga Tubman   Smooth and adaptive forward erasure
                                  correcting . . . . . . . . . . . . . . . 343--355
          Bülent Yener and   
                    Gong Su and   
                    Eran Gabber   Smart box architecture: a hybrid
                                  solution for IP QoS provisioning . . . . 357--375

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 36, Number 4, July 16, 2001

       Josep Domingo-Ferrer and   
                  Pieter Hartel   Current directions in smart cards  . . . 377--379
                Denis Praca and   
                  Claude Barral   From smart cards to smart objects: the
                                  road to new smart technologies . . . . . 381--389
            Isabelle Attali and   
              Denis Caromel and   
             Carine Courbis and   
             Ludovic Henrio and   
                 Henrik Nilsson   An integrated development environment
                                  for Java Card  . . . . . . . . . . . . . 391--405
                  Erik Poll and   
       Joachim van den Berg and   
                    Bart Jacobs   Formal specification of the JavaCard API
                                  in JML: the APDU class . . . . . . . . . 407--421
                Johan Borst and   
               Bart Preneel and   
                 Vincent Rijmen   Cryptography on smart cards  . . . . . . 423--435
              L. C. Guillou and   
                    M. Ugon and   
                J-J. Quisquater   Cryptographic authentication protocols
                                  for smart cards  . . . . . . . . . . . . 437--451
           David M'Ra\"\ihi and   
                      Moti Yung   E-commerce applications of smart cards   453--472
                  Dirk Husemann   Standards in the smart card world  . . . 473--487
                      Anonymous   Call for Papers  . . . . . . . . . . . . 489--490

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 36, Number 5--6, August ??, 2001

            Gabriel Dermler and   
                     Beat Liver   The economics of networking  . . . . . . 491--492
                 Andrew Odlyzko   Internet pricing and the history of
                                  communications . . . . . . . . . . . . . 493--517
          Jörn Altmann and   
                     Karyen Chu   How to charge for network services ---
                                  flat-rate or usage-based?  . . . . . . . 519--531
               Chris Kenyon and   
              Giorgos Cheliotis   Stochastic models for telecom commodity
                                  prices . . . . . . . . . . . . . . . . . 533--555
           Allan K. Y. Wong and   
           Tharam S. Dillon and   
          Wilfred W. K. Lin and   
                   May T. W. Ip   M$^2$RT: A tool developed for predicting
                                  the mean message response time of
                                  communication channels in sizeable
                                  networks exemplified by the Internet . . 557--577
             Alfio Lombardo and   
           Giacomo Morabito and   
              Giovanni Schembra   Statistical traffic modeling and
                                  guaranteed service disciplines: a
                                  performance evaluation paradigm  . . . . 579--595
     Hossam Mahmoud Ahmad Fahmy   Reliability evaluation in distributed
                                  computing environments using the AHP . . 597--615
              Gerta Köster   Improving the automatic congestion
                                  control functionality in SS7-signaling
                                  networks . . . . . . . . . . . . . . . . 617--624
                F. Bellotti and   
               A. De Gloria and   
                  D. Grosso and   
                        L. Noli   WLESS-frame: a simulation-based
                                  development environment for 802.11
                                  stations . . . . . . . . . . . . . . . . 625--641
  Mohammad Hossien Yaghmaee and   
     Mohammad Bagher Menhaj and   
                 Mostafa Safavi   A novel FLC-based approach for ATM
                                  traffic control  . . . . . . . . . . . . 643--658
            Stefano Basagni and   
            Imrich Chlamtac and   
             Violet R. Syrotiuk   Location aware, dependable multicast for
                                  mobile ad hoc networks . . . . . . . . . 659--670
               Khalil Drira and   
        Pierre Azéma and   
         Pierre de Saqui Sannes   Testability analysis in communicating
                                  systems  . . . . . . . . . . . . . . . . 671--693
         Marvin K. Nakayama and   
              Bülent Yener   Optimal information dispersal for
                                  probabilistic latency targets  . . . . . 695--707
                James Aweya and   
           Michel Ouellette and   
          Delfin Y. Montuno and   
                   Alan Chapman   A load adaptive mechanism for buffer
                                  management . . . . . . . . . . . . . . . 709--728
                      Anonymous   Author Index . . . . . . . . . . . . . . 729--731
                      Anonymous   Subject Index  . . . . . . . . . . . . . 733--734


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 37, Number 1, September ??, 2001

                  Davide Grillo   Guest Editorial: Wireless networking . . 1--4
                 L. Lenzini and   
                    E. Mingozzi   Performance evaluation of capacity
                                  request and allocation mechanisms for
                                  HiperLAN2 wireless LANs  . . . . . . . . 5--15
              Arndt Kadelka and   
                   Arno Masella   Serving IP quality of service with
                                  HiperLAN/2 . . . . . . . . . . . . . . . 17--24
           Norbert Esseling and   
        Harbinder S. Vandra and   
                 Bernhard Walke   A forwarding concept for HiperLAN/2  . . 25--32
             Raffaele Bruno and   
                Marco Conti and   
                 Enrico Gregori   A simple protocol for the dynamic tuning
                                  of the backoff mechanism in IEEE 802.11
                                  networks . . . . . . . . . . . . . . . . 33--44
                John Dunlop and   
      Gwenaël Le Bodic and   
               James Irvine and   
                 Demessie Girma   QoS management with dynamic bearer
                                  selection schemes  . . . . . . . . . . . 45--53
             N. A. Fikouras and   
                   C. Görg   Performance comparison of hinted- and
                                  advertisement-based movement detection
                                  methods for mobile IP hand-offs  . . . . 55--62
          Jörg Habetha and   
                  Martin Nadler   Outline of a centralised multihop ad hoc
                                  wireless network . . . . . . . . . . . . 63--71
                 Bangnan Xu and   
                 Bernhard Walke   Design issues of self-organizing
                                  broadband wireless networks  . . . . . . 73--81
                 Kurt Aretz and   
              Martin Haardt and   
      Walter Konhäuser and   
                    Werner Mohr   The future of wireless communications
                                  beyond the third generation  . . . . . . 83--92

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 37, Number 2, October ??, 2001

        Winfried Lamersdorf and   
            Andreas Bartelt and   
       Dietrich Fahrenholtz and   
                   Mark Tuan Tu   Guest Editorial: Electronic business
                                  systems  . . . . . . . . . . . . . . . . 93--94
         Giacomo Piccinelli and   
     Giuliano Di Vitantonio and   
               Leonid Mokrushin   Dynamic service aggregation in
                                  electronic marketplaces  . . . . . . . . 95--109
              Yigal Hoffner and   
                Simon Field and   
                Paul Grefen and   
                   Heiko Ludwig   Contract-driven creation and operation
                                  of virtual enterprises . . . . . . . . . 111--136
             Martin Bichler and   
                     Arie Segev   Methodologies for the design of
                                  negotiation protocols on E-markets . . . 137--152
             Mareike Schoop and   
                 Christoph Quix   DOC.COM: a framework for effective
                                  negotiation support in electronic
                                  marketplaces . . . . . . . . . . . . . . 153--170
         Rüdiger Grimm and   
      Peter Ochsenschläger   Binding telecooperation --- a formal
                                  model for electronic commerce  . . . . . 171--193
          Samuel P. M. Choi and   
                 Jiming Liu and   
               Sheung-Ping Chan   A genetic agent-based negotiation system 195--204
      Sebastian Clauß and   
            Marit Köhntopp   Identity management and its support of
                                  multilateral security  . . . . . . . . . 205--219
      Aphrodite Tsalgatidou and   
              Evaggelia Pitoura   Business models and transactions in
                                  mobile electronic commerce: requirements
                                  and properties . . . . . . . . . . . . . 221--236

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 37, Number 3--4, November 5, 2001

           Giacomo Morabito and   
                 Sergio Palazzo   Congestion control for ABR traffic in
                                  satellite networks . . . . . . . . . . . 237--249
                 Y. T. Chen and   
                      K. H. Lee   A flexible service model for advance
                                  reservation  . . . . . . . . . . . . . . 251--262
                Liren Zhang and   
                       Li Zheng   IPv6 traffic with multi-class QoS in VPN 263--275
                   Lili Qiu and   
                  Yin Zhang and   
              Srinivasan Keshav   Understanding the performance of many
                                  TCP flows  . . . . . . . . . . . . . . . 277--306
                M. P. Evans and   
                  S. M. Furnell   The Resource Locator Service: fixing a
                                  flaw in the web  . . . . . . . . . . . . 307--330
                Carlo Bruni and   
               Caterina Scoglio   An optimal rate control algorithm for
                                  guaranteed services in broadband
                                  networks . . . . . . . . . . . . . . . . 331--344
           P. Mariño and   
                J. Nogueira and   
           C. Sigüenza and   
                    F. Poza and   
            M. Domínguez   The PROFIBUS formal specification: a
                                  comparison between two FDTs  . . . . . . 345--362
          Mohamed Abdelaziz and   
            Ioannis Stavrakakis   Adaptive rate control in high-speed
                                  networks: performance issues . . . . . . 363--382
                     Zuhua Shao   Batch verifying multiple DSA-type
                                  digital signatures . . . . . . . . . . . 383--389
             Robert W. Todd and   
       Matthew C. Chidester and   
                 Alan D. George   Comparative performance analysis of
                                  directed flow control for real-time SCI  391--406
           Piet Van Mieghem and   
               Hans De Neve and   
               Fernando Kuipers   Hop-by-hop quality of service routing    407--423
          Igor D. D. Curcio and   
          Ville Lappalainen and   
                Miraj-E-Mostafa   QoS evaluation of 3G-324M mobile
                                  videophones over WCDMA networks  . . . . 425--445
           Stephen D. Patek and   
         Raja Venkateswaran and   
            Jörg Liebeherr   Simple alternate routing for
                                  differentiated services networks . . . . 447--466
             Yongxiang Zhao and   
                 Chang-jia Chen   Coupon TFRC: a mechanism being friendly
                                  to both TCP and continuous stream  . . . 467--479
           Carron Shankland and   
                Alberto Verdejo   A case study in abstraction using
                                  E-LOTOS and the FireWire . . . . . . . . 481--502

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 37, Number 5, November 22, 2001

        Marco Ajmone Marsan and   
                  Andrea Bianco   Guest editorial  . . . . . . . . . . . . 503--505
                  Ping Yuan and   
           Julie Schlembach and   
                Anders Skoe and   
                Edward Knightly   Design and implementation of scalable
                                  edge-based admission control . . . . . . 507--518
             Andrea Borella and   
       Giovanni Cancellieri and   
               Elena Pagani and   
               Gian Paolo Rossi   Implementation schemes for multicast
                                  bandwidth brokers in multidomain
                                  networks . . . . . . . . . . . . . . . . 519--540
           M. Ajmone Marsan and   
                  A. Bianco and   
                P. Giaccone and   
                E. Leonardi and   
                        F. Neri   Input-queued router architectures
                                  exploiting cell-based switching fabrics  541--559
                A. Francini and   
              F. M. Chiussi and   
               R. T. Clancy and   
              K. D. Drucker and   
                  N. E. Idirene   Enhanced weighted round robin schedulers
                                  for accurate bandwidth distribution in
                                  packet networks  . . . . . . . . . . . . 561--578
              Nicola Ciulli and   
               Stefano Giordano   Analysis and simulation of WF$^2$Q +
                                  based schedulers: comparisons,
                                  compliance with theoretical bounds and
                                  influence on end-to-end delay jitter . . 579--599
           George Xylomenos and   
              George C. Polyzos   Quality of service support over
                                  multi-service wireless Internet links    601--615
              G. Priggouris and   
        S. Hadjiefthymiades and   
                     L. Merakos   GPRS + IntServ/RSVP: an integrated
                                  architecture . . . . . . . . . . . . . . 617--629
           Mohamed Moustafa and   
              Ibrahim Habib and   
             Mahmoud Naghshineh   Wireless resource management using
                                  genetic algorithm for mobiles
                                  equilibrium  . . . . . . . . . . . . . . 631--643
                A. Lombardo and   
                    G. Schembra   Tspec enforcement for MPEG video
                                  transmission over the next generation
                                  Internet: an analytical framework  . . . 645--667
            Claudio Casetti and   
                    Michela Meo   An analytical framework for the
                                  performance evaluation of TCP Reno
                                  connections  . . . . . . . . . . . . . . 669--682

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 37, Number 6, December 15, 2001

                      Anonymous   Editorial: Networking middleware:
                                  selected papers from the TERENA
                                  Networking Conference 2001 . . . . . . . 683--684
                 Peter Alterman   The US Federal PKI and the Federal
                                  Bridge Certification Authority . . . . . 685--690
               Erol Gelenbe and   
               Ricardo Lent and   
                    Zhiguang Xu   Measurement and performance of a
                                  cognitive packet network . . . . . . . . 691--701
        Rodrigo Castro-Rojo and   
          Diego R. López   The PAPI system: point of access to
                                  providers of information . . . . . . . . 703--710
          Dmitry G. Dolgikh and   
               Andrei M. Sukhov   Parameters of cache systems based on a
                                  Zipf-like distribution . . . . . . . . . 711--716
       Gundula Dörries and   
                    Lothar Zier   How to do high-speed multicast right!    717--728
         Björn Feustel and   
              Thomas C. Schmidt   Media objects in time --- a multimedia
                                  streaming system --- work in progress
                                  paper v 1.5  . . . . . . . . . . . . . . 729--737
        Martí Griera and   
     Maribel Jiménez and   
   Juan Antonio Martínez   QOS evaluation model for a campus-wide
                                  network: an alternative approach
                                  focussing on availability  . . . . . . . 739--746
           Artur Binczewski and   
                         others   First experiences with the Polish
                                  Optical Internet . . . . . . . . . . . . 747--759
         Valeria Cardellini and   
       Emiliano Casalicchio and   
          Michele Colajanni and   
                Salvatore Tucci   Mechanisms for quality of service in Web
                                  clusters . . . . . . . . . . . . . . . . 761--771
         M. Konstantopoulos and   
                  T. Spyrou and   
                   J. Darzentas   The need for academic middleware to
                                  support advanced learning services . . . 773--781
                      Anonymous   Author Index: Volume 37  . . . . . . . . 783--785
                      Anonymous   Subject Index: Volume 37 . . . . . . . . 787--789


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 38, Number 1, January 15, 2002

                 M. C. Chan and   
                   P. P. To and   
                      T. T. Lee   Providing per-session deterministic
                                  quality of service guarantees in
                                  cross-path packet switch . . . . . . . . 1--23
             Nelson Antunes and   
     António Pacheco and   
                      Rui Rocha   An integrated traffic model for
                                  multimedia wireless networks . . . . . . 25--41
         Flaminio Borgonovo and   
             Antonio Capone and   
              Matteo Cesana and   
                   Luigi Fratta   Packet service in UMTS: delay-throughput
                                  performance of the downlink shared
                                  channel  . . . . . . . . . . . . . . . . 43--59
                    Fai Siu and   
              Rocky K. C. Chang   Effectiveness of optimal node
                                  assignments in wavelength division
                                  multiplexing networks with fixed regular
                                  virtual topologies . . . . . . . . . . . 61--74
               Junehwa Song and   
               Arun Iyengar and   
         Eric Levy-Abegnoli and   
                    Daniel Dias   Architecture of a Web server accelerator 75--97
                F. Dietrich and   
                   J.-P. Hubaux   Formal methods for communication
                                  services: meeting the industry
                                  expectations . . . . . . . . . . . . . . 99--120

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 38, Number 2, February 5, 2002

              Seungjoon Lee and   
                  Chongkwon Kim   A new wireless ad hoc multicast routing
                                  protocol . . . . . . . . . . . . . . . . 121--135
               Jukka Manner and   
                         others   Evaluation of mobility and quality of
                                  service interaction  . . . . . . . . . . 137--163
               K. H. Cheung and   
                   J. Mi\vsi\'c   On virtual private networks security
                                  design issues  . . . . . . . . . . . . . 165--179
           Cristina Hristea and   
                   Fouad Tobagi   A network infrastructure for IP mobility
                                  support in metropolitan areas  . . . . . 181--206
           Mirko Ferracioli and   
               Velio Tralli and   
                Roberto Verdone   Channel adaptive scheduling for a
                                  wideband TDD/TCDMA wireless system under
                                  heterogeneous traffic conditions . . . . 207--223
            Andrea Baiocchi and   
            Francesca Cuomo and   
              Cristina Martello   Optimizing the radio resource
                                  utilization of multiaccess systems with
                                  a traffic-transmission quality adaptive
                                  packet scheduling  . . . . . . . . . . . 225--246
               Jue-Sam Chou and   
                  Yi-Shiung Yeh   Mental poker game based on a bit
                                  commitment scheme through network  . . . 247--255
                Nidhi Hegde and   
                Khosrow Sohraby   On the impact of soft handoff in
                                  cellular systems . . . . . . . . . . . . 257--271

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 38, Number 3, February 21, 2002

             A. T. Campbell and   
            David Wetherall and   
                   Raj Yavatkar   Programmable Networks  . . . . . . . . . 273--275
               Scott Karlin and   
                 Larry Peterson   VERA: an extensible router architecture  277--293
            David E. Taylor and   
         Jonathan S. Turner and   
           John W. Lockwood and   
                 Edson L. Horta   Dynamic hardware plugins: exploiting
                                  reconfigurable hardware for
                                  high-performance programmable routers    295--310
                  Danny Raz and   
                  Yuval Shavitt   New models and algorithms for
                                  programmable networks  . . . . . . . . . 311--326
                     Su Wen and   
            James Griffioen and   
             Kenneth L. Calvert   Building multicast services from unicast
                                  forwarding and ephemeral state . . . . . 327--345
                     Jun Li and   
                Mark Yarvis and   
                   Peter Reiher   Securing distributed adaptation  . . . . 347--371
              Akihiro Nakao and   
             Larry Peterson and   
                    Andy Bavier   Constructing end-to-end paths for
                                  playing media objects  . . . . . . . . . 373--389

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 38, Number 4, March 15, 2002

                      Anonymous   Editorial  . . . . . . . . . . . . . . . 391--392
             I. F. Akyildiz and   
                      W. Su and   
      Y. Sankarasubramaniam and   
                     E. Cayirci   Wireless sensor networks: a survey . . . 393--422
             Taieb F. Znati and   
            Tawfig Alrabiah and   
                    Rami Melhem   Low-cost, delay-bounded
                                  point-to-multipoint communication to
                                  support multicasting over WDM networks   423--445
                  Qing Tian and   
                  Donald C. Cox   Optimal replication algorithms for
                                  hierarchical mobility management in PCS
                                  networks . . . . . . . . . . . . . . . . 447--459
               Antonio Iera and   
         Antonella Molinaro and   
               Giuseppe Araniti   Exploiting hierarchical
                                  terrestrial-satellite architectures to
                                  handle voice, symmetric data, and
                                  asymmetric data connections  . . . . . . 461--475
        Christoph Lindemann and   
              Marco Lohmann and   
             Axel Thümmler   Adaptive performance management for
                                  universal mobile telecommunications
                                  system networks  . . . . . . . . . . . . 477--496
                  Remco Litjens   The impact of mobility on UMTS network
                                  planning . . . . . . . . . . . . . . . . 497--515
              P. M. L. Chan and   
              R. E. Sheriff and   
                   Y. F. Hu and   
                P. Conforto and   
                       C. Tocci   Design and evaluation of signaling
                                  protocols for mobility management in an
                                  integrated IP environment  . . . . . . . 517--530
                 Shugong Xu and   
                  Tarek Saadawi   Revealing the problems with 802.11
                                  medium access control protocol in
                                  multi-hop wireless ad hoc networks . . . 531--548
                      Anonymous   Acknowledgement to reviewers . . . . . . 549--552

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 38, Number 5, April 5, 2002

                Injong Rhee and   
       Nallathambi Balaguru and   
              George N. Rouskas   MTCP: scalable TCP-like congestion
                                  control for reliable multicast . . . . . 553--575
                     Fei Yu and   
                   Victor Leung   Mobility-based predictive call admission
                                  control and bandwidth reservation in
                                  wireless cellular networks . . . . . . . 577--589
              Mario Kolberg and   
                 Evan H. Magill   A pragmatic approach to service
                                  interaction filtering between call
                                  control services . . . . . . . . . . . . 591--602
                Ki-Dong Lee and   
                      Sehun Kim   Modeling variable user mobility with
                                  stochastic correlation concept . . . . . 603--612
     Suresh Kalyanasundaram and   
          Edwin K. P. Chong and   
                 Ness B. Shroff   Optimal resource allocation in
                                  multi-class networks with user-specified
                                  utility functions  . . . . . . . . . . . 613--630
                Ki-Dong Lee and   
                      Sehun Kim   Optimization for adaptive bandwidth
                                  reservation in wireless multimedia
                                  networks . . . . . . . . . . . . . . . . 631--643
              Chia-Tai Chan and   
              Pi-Chung Wang and   
                 Yaw-Chung Chen   An efficient traffic control scheme for
                                  TCP over ATM GFR services  . . . . . . . 645--662
                Yijun Xiong and   
                    Lorne Mason   Comparison of two path restoration
                                  schemes in self-healing networks . . . . 663--674
              Yi-Shiung Yeh and   
               Wei-Shen Lai and   
               Chung-Jaye Cheng   Applying lightweight directory access
                                  protocol service on session
                                  certification authority  . . . . . . . . 675--692

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 38, Number 6, April 22, 2002

           Damianos Gavalas and   
          Dominic Greenwood and   
          Mohammed Ghanbari and   
                  Mike O'Mahony   Hierarchical network management: a
                                  scalable and dynamic mobile agent-based
                                  approach . . . . . . . . . . . . . . . . 693--711
                    Seonho Choi   Temporally enhanced erasure codes for
                                  reliable communication protocols . . . . 713--730
        K. R. Renjish Kumar and   
               A. L. Ananda and   
               Lillykutty Jacob   TCP-friendly traffic conditioning in
                                  DiffServ networks: a memory-based
                                  approach . . . . . . . . . . . . . . . . 731--743
               Sungjoon Ahn and   
               A. Udaya Shankar   Adapting to route-demand and mobility in
                                  ad hoc network routing . . . . . . . . . 745--764
              Yu-Kwong Kwok and   
              Vincent K. N. Lau   Optimal admission control algorithms for
                                  scheduling burst data in CDMA multimedia
                                  systems  . . . . . . . . . . . . . . . . 765--777
           Mudashiru Busari and   
               Carey Williamson   ProWGen: a synthetic workload generation
                                  tool for simulation evaluation of web
                                  proxy caches . . . . . . . . . . . . . . 779--794
                Edith Cohen and   
                    Haim Kaplan   Refreshment policies for Web content
                                  caches . . . . . . . . . . . . . . . . . 795--808
                       M. Naldi   Internet access traffic sharing in a
                                  multi-operator environment . . . . . . . 809--824
                      Anonymous   Author Index Volume 38 . . . . . . . . . 825--827
                      Anonymous   Subject Index Volume 38  . . . . . . . . 829--831


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 39, Number 1, May 15, 2002

                G. Morabito and   
                 S. Palazzo and   
                   C. Rosenberg   Guest Editorial: Broadband satellite
                                  networks: a networking perspective . . . 1--3
     Güray Açar and   
            Catherine Rosenberg   Weighted fair bandwidth-on-demand
                                  (WFBoD) for geostationary satellite
                                  networks with on-board processing  . . . 5--20
              P. M. L. Chan and   
                         others   Performance analysis of mobility
                                  procedures in a hybrid space terrestrial
                                  IP environment . . . . . . . . . . . . . 21--41
   Francesco Delli Priscoli and   
            Antonio Pietrabissa   Resource management for ATM-based
                                  geostationary satellite networks with
                                  on-board processing  . . . . . . . . . . 43--60
Özgür Erçetin and   
     Srikanth Krishnamurthy and   
                    Son Dao and   
             Leandros Tassiulas   Provision of guaranteed services in
                                  broadband LEO satellite networks . . . . 61--77
             Laurent Franck and   
            Gérard Maral   Signaling for inter-satellite link
                                  routing in broadband non-GEO satellite
                                  systems  . . . . . . . . . . . . . . . . 79--92

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 39, Number 2, June 5, 2002

          Charles Iheagwara and   
                   Andrew Blyth   Evaluation of the performance of ID
                                  systems in a switched and distributed
                                  environment: the RealSecure case study   93--112
     Jeffrey E. Wieselthier and   
              Gam D. Nguyen and   
             Anthony Ephremides   Resource management in energy-limited,
                                  bandwidth-limited, transceiver-limited
                                  wireless networks for session-based
                                  multicasting . . . . . . . . . . . . . . 113--131
              Chadi Barakat and   
                   Eitan Altman   Bandwidth tradeoff between TCP and
                                  link-level FEC . . . . . . . . . . . . . 133--150
                  Jintae Yu and   
                         others   WDM/SCM multiple access protocol with
                                  high throughput and low packet delay for
                                  passive double star networks . . . . . . 151--164
                  T. Anjali and   
                 C. Scoglio and   
          J. C. de Oliveira and   
             I. F. Akyildiz and   
                         G. Uhl   Optimal policy for label switched path
                                  setup in MPLS networks . . . . . . . . . 165--183
               Eitan Altman and   
              Chadi Barakat and   
      Víctor M. Ramos R.   Queuing analysis of simple FEC schemes
                                  for voice over IP  . . . . . . . . . . . 185--206
                  B. P. Lee and   
                R. K. Balan and   
                   L. Jacob and   
              W. K. G. Seah and   
                   A. L. Ananda   Avoiding congestion collapse on the
                                  Internet using TCP tunnels . . . . . . . 207--219

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 39, Number 3, June 21, 2002

                Mark Levene and   
        Alexandra Poulovassilis   Editorial: Web Dynamics  . . . . . . . . 221--223
               S. Abiteboul and   
                   S. Cluet and   
                  G. Ferran and   
                  M.-C. Rousset   The Xyleme project . . . . . . . . . . . 225--238
               James Bailey and   
    Alexandra Poulovassilis and   
                  Peter T. Wood   Analysis and optimisation of
                                  event-condition-action rules on XML  . . 239--259
            P. L. Krapivsky and   
                      S. Redner   A statistical physics perspective on Web
                                  growth . . . . . . . . . . . . . . . . . 261--276
                Mark Levene and   
              Trevor Fenner and   
              George Loizou and   
               Richard Wheeldon   A stochastic model for the evolution of
                                  the Web  . . . . . . . . . . . . . . . . 277--287
          Knut Magne Risvik and   
                 Rolf Michelsen   Search engines and Web dynamics  . . . . 289--302
                 Dell Zhang and   
                   Yisheng Dong   A novel Web usage mining approach for
                                  search engines . . . . . . . . . . . . . 303--310
              Wilfried Lemahieu   Context-based navigation in the Web by
                                  means of dynamically generated guided
                                  tours  . . . . . . . . . . . . . . . . . 311--328

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 39, Number 4, July 15, 2002

                 Aimin Sang and   
                      San-qi Li   A predictability analysis of network
                                  traffic  . . . . . . . . . . . . . . . . 329--345
                R. K. Balan and   
                         others   TCP HACK: a mechanism to improve
                                  performance over lossy links . . . . . . 347--361
                 L. Lenzini and   
                E. Mingozzi and   
                        G. Stea   Packet timed token service discipline: a
                                  scheduling algorithm based on the
                                  dual-class paradigm for providing QoS in
                                  integrated services networks . . . . . . 363--384
             Pravin Bhagwat and   
             David A. Maltz and   
                  Adrian Segall   MSOCKS+: an architecture for transport
                                  layer mobility . . . . . . . . . . . . . 385--403
                Jangwon Lee and   
             Gustavo de Veciana   IP multicast resource and topology
                                  discovery using a fan-out decrement
                                  mechanism  . . . . . . . . . . . . . . . 405--422
              Tijani Chahed and   
Gérard Hébuterne and   
                    Guy Pujolle   Mapping of performance metrics between
                                  IP and ATM . . . . . . . . . . . . . . . 423--436
                Edith Cohen and   
                    Haim Kaplan   Prefetching the means for document
                                  transfer: a new approach for reducing
                                  Web latency  . . . . . . . . . . . . . . 437--455
       G. Michael Schneider and   
                   Tamas Nemeth   A simulation study of the OSPF-OMP
                                  routing algorithm  . . . . . . . . . . . 457--468

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 39, Number 5, August 5, 2002

          Massimo Marchiori and   
           Mary Ellen Zurko and   
                 Michael R. Lyu   Editorial  . . . . . . . . . . . . . . . 469--471
              Peter Buneman and   
             Susan Davidson and   
                 Wenfei Fan and   
                Carmem Hara and   
                 Wang-Chiew Tan   Keys for XML . . . . . . . . . . . . . . 473--487
                 Wenfei Fan and   
           Gabriel M. Kuper and   
Jérôme Siméon   A unified constraint model for XML . . . 489--505
                Allen Brown and   
              Matthew Fuchs and   
             Jonathan Robie and   
                  Philip Wadler   MSL: a model for W3C XML Schema  . . . . 507--521
             Rakesh Agrawal and   
    Roberto J. Bayardo, Jr. and   
               Daniel Gruhl and   
           Spiros Papadimitriou   Vinci: a service-oriented architecture
                                  for rapid development of Web
                                  applications . . . . . . . . . . . . . . 523--539
       Michalis Petropoulos and   
    Yannis Papakonstantinou and   
               Vasilis Vassalos   Building XML query forms and reports
                                  with XQForms . . . . . . . . . . . . . . 541--558
                 Micah Beck and   
                Terry Moore and   
           Leif Abrahamsson and   
       Chistophe Achouiantz and   
               Patrik Johansson   Enabling full service surrogates using
                                  the portable channel representation  . . 559--576
                  David Beckett   The design and implementation of the
                                  Redland RDF application framework  . . . 577--588
                   J. Kahan and   
             M.-R. Koivunen and   
           E. Prud'Hommeaux and   
                    R. R. Swick   Annotea: an open RDF infrastructure for
                                  shared Web annotations . . . . . . . . . 589--608
             Jeen Broekstra and   
                         others   Enabling knowledge representation on the
                                  Web by extending RDF Schema  . . . . . . 609--634
                Jussi Myllymaki   Effective Web data extraction with
                                  standard XML technologies  . . . . . . . 635--644
            Angela Bonifati and   
               Stefano Ceri and   
             Stefano Paraboschi   Pushing reactive services to XML
                                  repositories using active rules  . . . . 645--660
           Michael Ströbel   An XML schema representation for the
                                  communication design of electronic
                                  negotiations . . . . . . . . . . . . . . 661--680
            Neel Sundaresan and   
                  Reshad Moussa   Algorithms and programming models for
                                  efficient representation of XML for
                                  Internet applications  . . . . . . . . . 681--697

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 39, Number 6, August 21, 2002

                 Paul Judge and   
                  Mostafa Ammar   WHIM: watermarking multicast video with
                                  a hierarchy of intermediaries  . . . . . 699--712
Luís Henrique M. K. Costa and   
                Serge Fdida and   
       Otto Carlos M. B. Duarte   Developing scalable protocols for
                                  three-metric QoS routing . . . . . . . . 713--727
                   Wen-Lin Yang   A tabu-search based algorithm for the
                                  multicast-streams distribution problem   729--747
                 Ertan Onur and   
         Hakan Deliç and   
                  Cem Ersoy and   
      M. Ufuk Ça\vglayan   Measurement-based replanning of cell
                                  capacities in GSM networks . . . . . . . 749--767
              Jeong-woo Cho and   
                    Dong-ho Cho   Dynamic buffer management scheme based
                                  on rate estimation in packet-switched
                                  networks . . . . . . . . . . . . . . . . 769--787
               Eitan Altman and   
         Kostya Avrachenkov and   
              Chadi Barakat and   
Rudesindo Núñez-Queija   State-dependent M/G/1 type queueing
                                  analysis for congestion control in data
                                  networks . . . . . . . . . . . . . . . . 789--808
            Mohiuddin Ahmed and   
     Srikanth Krishnamurthy and   
                 Randy Katz and   
                        Son Dao   Trajectory control of mobile gateways
                                  for range extension in ad hoc networks   809--825
          Charles Iheagwara and   
                   Andrew Blyth   The impact of security layering on
                                  end-to-end latency and system
                                  performance in switched and distributed
                                  e-business environments  . . . . . . . . 827--840
                      Anonymous   Author index volume 39 . . . . . . . . . 841--843
                      Anonymous   Subject index volume 39  . . . . . . . . 845--847


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 40, Number 1, September ??, 2002

             Augusto Casaca and   
               Amardeo C. Sarma   Guest editorial: Towards a new Internet
                                  architecture . . . . . . . . . . . . . . 1--4
       Kyriakos Baxevanidis and   
              Howard Davies and   
                 Ian Foster and   
             Fabrizio Gagliardi   Grids and research networks as drivers
                                  and enablers of future Internet
                                  architectures  . . . . . . . . . . . . . 5--17
       Waël Noureddine and   
                   Fouad Tobagi   Improving the performance of interactive
                                  TCP applications using service
                                  differentiation  . . . . . . . . . . . . 19--43
                Yu-Ben Miao and   
           Wen-Shyang Hwang and   
                  Ce-Kuen Shieh   A transparent deployment method of
                                  RSVP-aware applications on UNIX  . . . . 45--56
                N. Benameur and   
               S. Ben Fredj and   
       S. Oueslati-Boulahia and   
                  J. W. Roberts   Quality of service and flow level
                                  admission control in the Internet  . . . 57--71
                 G. Bianchi and   
         N. Blefari-Melazzi and   
                  M. Femminella   Per-flow QoS support over a stateless
                                  Differentiated Services IP domain  . . . 73--87
        Jörg Liebeherr and   
               Nicolas Christin   Rate allocation and buffer management
                                  for differentiated services  . . . . . . 89--110
          Daniel O. Awduche and   
                  Bijan Jabbari   Internet traffic engineering using
                                  multi-protocol label switching (MPLS)    111--129
          Clarence Filsfils and   
                     John Evans   Engineering a multiservice IP backbone
                                  to support tight SLAs  . . . . . . . . . 131--148
             Gargi Banerjee and   
                Deepinder Sidhu   Comparative analysis of path computation
                                  techniques for MPLS traffic engineering  149--165
                 Pin-Han Ho and   
                  H. T. Mouftah   Framework of spare capacity
                                  re-allocation with S-SLSP for mesh WDM
                                  networks . . . . . . . . . . . . . . . . 167--179
                A. Sanmateu and   
                         others   Seamless mobility across IP networks
                                  using Mobile IP  . . . . . . . . . . . . 181--190
  Xavier Pérez Costa and   
             Hannes Hartenstein   A simulation study on the performance of
                                  Mobile IPv6 in a WLAN-based cellular
                                  network  . . . . . . . . . . . . . . . . 191--204

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 40, Number 2, October 7, 2002

               Israel Cidon and   
                Shay Kutten and   
                     Ran Soffer   Optimal allocation of electronic content 205--218
    Ali Aydin Selçuk and   
                Deepinder Sidhu   Probabilistic optimization techniques
                                  for multicast key management . . . . . . 219--234
              Zhiguang Shan and   
                 Chuang Lin and   
           Dan C. Marinescu and   
                      Yang Yang   Modeling and performance analysis of
                                  QoS-aware load balancing of Web-server
                                  clusters . . . . . . . . . . . . . . . . 235--256
                 S. Y. Wang and   
                     H. T. Kung   A new methodology for easily
                                  constructing extensible and
                                  high-fidelity TCP/IP network simulators  257--278
             Behzad Bordbar and   
               John Derrick and   
                    Gill Waters   Using UML to specify QoS constraints in
                                  ODP  . . . . . . . . . . . . . . . . . . 279--304
                   Nader F. Mir   An efficient switching fabric for
                                  next-generation large-scale computer
                                  networking . . . . . . . . . . . . . . . 305--315
                      Anonymous   Editorial Board  . . . . . . . . . . . . CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 40, Number 3, October 22, 2002

         Mike Devetsikiotis and   
                 Nelson Fonseca   Guest Editorial: Advances in modeling
                                  and engineering of long-range dependent
                                  traffic  . . . . . . . . . . . . . . . . 317--318
                Carl Nuzman and   
                Iraj Saniee and   
               Wim Sweldens and   
                     Alan Weiss   A compound model for TCP connection
                                  arrivals for LAN and WAN applications    319--337
       Daniel R. Figueiredo and   
                Benyuan Liu and   
               Vishal Misra and   
                    Don Towsley   On the autocorrelation structure of TCP
                                  traffic  . . . . . . . . . . . . . . . . 339--361
                  N. Laskin and   
              I. Lambadaris and   
           F. C. Harmantzis and   
               M. Devetsikiotis   Fractional Lévy motion and its
                                  application to network traffic modeling  363--375
            Ronald G. Addie and   
           Timothy D. Neame and   
                 Moshe Zukerman   Performance evaluation of a queue fed by
                                  a Poisson Pareto burst process . . . . . 377--397
         Petteri Mannersalo and   
                   Ilkka Norros   A most probable path approach to
                                  queueing systems with general Gaussian
                                  input  . . . . . . . . . . . . . . . . . 399--412
       Flavio de M. Pereira and   
    Nelson L. S. da Fonseca and   
              Dalton S. Arantes   On the performance of generalized
                                  processor sharing servers under
                                  long-range dependent traffic . . . . . . 413--431
       Predrag Jelenkovi\'c and   
           Petar Mom\vcilovi\'c   Finite buffer queue with generalized
                                  processor sharing and heavy-tailed input
                                  processes  . . . . . . . . . . . . . . . 433--443
               Marwan Krunz and   
                  Ibrahim Matta   Analytical investigation of the bias
                                  effect in variance-type estimators for
                                  inference of long-range dependence . . . 445--458
      Natalia M. Markovitch and   
                 Udo R. Krieger   The estimation of heavy-tailed
                                  probability density functions, their
                                  mixtures and quantiles . . . . . . . . . 459--474
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 40, Number 4, November 15, 2002

                      Anonymous   Computer networks, the journal, and
                                  computer networks, the technology  . . . 475--475
             V. Tsaoussidis and   
                       C. Zhang   TCP-Real: receiver-oriented congestion
                                  control  . . . . . . . . . . . . . . . . 477--497
           Yannick Blanpain and   
           Raghupathy Sivakumar   An incrementally deployable approach for
                                  achieving fair rate allocations  . . . . 499--513
          Sasikanth Avancha and   
           Vladimir Korolev and   
               Anupam Joshi and   
              Timothy Finin and   
                   Yelena Yesha   On experiments with a transport protocol
                                  for pervasive computing environments . . 515--535
      Alhussein A. Abouzeid and   
                      Sumit Roy   Modeling random early detection in a
                                  differentiated services network  . . . . 537--556
               Archan Misra and   
                 Teunis Ott and   
                     John Baras   Predicting bottleneck bandwidth sharing
                                  by generalized TCP flows . . . . . . . . 557--576
            Chen-Khong Tham and   
                     Qi Yao and   
                   Yuming Jiang   Achieving differentiated services
                                  through multi-class probabilistic
                                  priority scheduling  . . . . . . . . . . 577--593
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 40, Number 5, December 5, 2002

                   K. J. Turner   Guest Editorial: Protocol animation  . . 595--598
              Pierre Combes and   
             Fabrice Dubois and   
         Béatrice Renard   An open animation tool: application to
                                  telecommunication systems  . . . . . . . 599--620
           Philipp Schaible and   
              Reinhard Gotzhein   View-based animation of communication
                                  protocols in design and in operation . . 621--638
           Keiichi Yasumoto and   
              Takaaki Umedu and   
         Hirozumi Yamaguchi and   
                Akio Nakata and   
                Teruo Higashino   Protocol animation based on event-driven
                                  visualization scenarios in real-time
                                  LOTOS  . . . . . . . . . . . . . . . . . 639--663
            Bernard Stepien and   
                 Luigi Logrippo   Graphic visualization and animation of
                                  LOTOS execution traces . . . . . . . . . 665--681
                      Anonymous   Editorial Board  . . . . . . . . . . . . CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 40, Number 6, December 20, 2002

                   Yuming Jiang   Delay bounds for a network of guaranteed
                                  rate servers with FIFO aggregation . . . 683--694
              Anwar Elwalid and   
                  Cheng Jin and   
                 Steven Low and   
                  Indra Widjaja   MATE: multipath adaptive traffic
                                  engineering  . . . . . . . . . . . . . . 695--709
           Mansour J. Karam and   
                Fouad A. Tobagi   Analysis of delay and delay jitter of
                                  voice traffic in the Internet  . . . . . 711--726
             Hoon-Tong Ngin and   
                Chen-Khong Tham   A control-theoretical approach for
                                  achieving fair bandwidth allocations in
                                  core-stateless networks  . . . . . . . . 727--741
                      Anonymous   Author Index Volume 40 . . . . . . . . . 743--745
                      Anonymous   Subject Index Volume 40  . . . . . . . . 747--748
                      Anonymous   Author Index Volumes 31--40  . . . . . . 749--777
                      Anonymous   Subject Index Volumes 31--40 . . . . . . 779--797
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 41, Number 1, January 15, 2003

        Christoph Lindemann and   
             Axel Thümmler   Performance analysis of the general
                                  packet radio service . . . . . . . . . . 1--17
                   N. Zhang and   
                     Q. Shi and   
                     M. Merabti   An efficient protocol for anonymous and
                                  fair document exchange . . . . . . . . . 19--28
              A. D'Ambrogio and   
                    G. Iazeolla   Steps towards the automatic production
                                  of performance models of web
                                  applications . . . . . . . . . . . . . . 29--39
                  S. K. Tan and   
                   G. Mohan and   
                     K. C. Chua   Algorithms for burst rescheduling in WDM
                                  optical burst switching networks . . . . 41--55
           Mohamed G. Gouda and   
                Chin-Tser Huang   A secure address resolution protocol . . 57--71
                  Liang Guo and   
                  Ibrahim Matta   Search space reduction in QoS routing    73--88
               Shuguang Yan and   
         Jitender S. Deogun and   
                      Maher Ali   Routing in sparse splitting optical
                                  networks with multicast traffic  . . . . 89--113
               Muffy Calder and   
              Mario Kolberg and   
             Evan H. Magill and   
        Stephan Reiff-Marganiec   Feature interaction: a critical review
                                  and considered forecast  . . . . . . . . 115--141
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 41, Number 2, February 5, 2003

                  Lisong Xu and   
            Harry G. Perros and   
              George N. Rouskas   A simulation study of optical burst
                                  switching and access protocols for WDM
                                  ring networks  . . . . . . . . . . . . . 143--160
               Yung-Sze Gan and   
                Chen-Khong Tham   Loss differentiated multicast congestion
                                  control  . . . . . . . . . . . . . . . . 161--176
             Jiangchuan Liu and   
               Xinyan Zhang and   
                      Bo Li and   
                 Qian Zhang and   
                      Wenwu Zhu   Distributed distance measurement for
                                  large-scale networks . . . . . . . . . . 177--192
            Y. Richard Yang and   
                Min Sik Kim and   
                   Simon S. Lam   Transient behaviors of TCP-friendly
                                  congestion control protocols . . . . . . 193--210
     Anca Dracinschi Sailer and   
                    Serge Fdida   Generic congestion control . . . . . . . 211--225
                    Yong Xu and   
                Shen-Chu Xu and   
                       Bo-Xi Wu   Strictly nonblocking grooming of dynamic
                                  traffic in unidirectional SONET/WDM
                                  rings using genetic algorithms . . . . . 227--245
                Yueyue Song and   
               Avishai Wool and   
              Bülent Yener   Combinatorial design of multi-ring
                                  networks with combined routing and flow
                                  control  . . . . . . . . . . . . . . . . 247--267
                  Sumi Choi and   
            Jonathan Turner and   
                    Tilman Wolf   Configuring sessions in programmable
                                  networks . . . . . . . . . . . . . . . . 269--284
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 41, Number 3, February 21, 2003

           Hossam Hassanein and   
              Ioanis Nikolaidis   Mobile and ad-hoc local networks . . . . 285--287
                Jingxin Xue and   
                Terence D. Todd   Basestation collaboration in Bluetooth
                                  voice networks . . . . . . . . . . . . . 289--301
               Rolf Kraemer and   
                Peter Schwander   Bluetooth based wireless Internet
                                  applications for indoor hot spots:
                                  experience of a successful experiment
                                  during CeBIT 2001  . . . . . . . . . . . 303--312
              Jeffrey Monks and   
          Jean-Pierre Ebert and   
             Wen-Mei W. Hwu and   
                    Adam Wolisz   Energy saving and capacity improvement
                                  potential of power control in multi-hop
                                  wireless networks  . . . . . . . . . . . 313--330
               Ahmed Safwat and   
           Hossam Hassanein and   
                Hussein Mouftah   Power-aware virtual base stations for
                                  wireless mobile ad hoc communications    331--346
         Azzedine Boukerche and   
               Sungbum Hong and   
                      Tom Jacob   Synchronization and handoff management
                                  schemes for wireless multimedia systems  347--362
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 41, Number 4, March 15, 2003

                 Wushao Wen and   
        Biswanath Mukherjee and   
            S.-H. Gary Chan and   
                   Dipak Ghosal   LVMSR: an efficient algorithm to
                                  multicast layered video  . . . . . . . . 363--383
           Rafael Corchuelo and   
José A. Pérez and   
     Antonio Ruiz-Cortés   Aspect-oriented interaction in
                                  multi-organisational Web-based systems   385--406
               Martin Maier and   
           Martin Reisslein and   
                    Adam Wolisz   A hybrid MAC protocol for a metro WDM
                                  network using multiple free spectral
                                  ranges of an arrayed-waveguide grating   407--433
        Mohamed A. El-Gendy and   
                   Kang G. Shin   Assured forwarding fairness using
                                  equation-based packet marking and packet
                                  separation . . . . . . . . . . . . . . . 435--450
                    Xin Liu and   
          Edwin K. P. Chong and   
                 Ness B. Shroff   A framework for opportunistic scheduling
                                  in wireless networks . . . . . . . . . . 451--474
                 C. Casetti and   
                R. Lo Cigno and   
                  M. Mellia and   
                M. Munaf\`o and   
                Z. Zsóka   A new class of QoS routing strategies
                                  based on network graph reduction . . . . 475--487
             Michel Mandjes and   
              Debasis Mitra and   
             Werner Scheinhardt   Simple models of network access, with
                                  applications to the design of joint rate
                                  and admission control  . . . . . . . . . 489--504
                   Imad Aad and   
            Claude Castelluccia   Priorities in WLANs  . . . . . . . . . . 505--526
                 Zohar Naor and   
                    Hanoch Levy   Announced dynamic access probability
                                  protocol for next generation wireless
                                  networks . . . . . . . . . . . . . . . . 527--544
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 41, Number 5, April 5, 2003

                  Ton Engbersen   Network processors . . . . . . . . . . . 545--547
                    F. Arts and   
                   P. Barri and   
               I. Clemminck and   
              A. Niemegeers and   
                 B. Pauwels and   
               G. Taildeman and   
                       M. Vrana   Network processor requirements and
                                  benchmarking . . . . . . . . . . . . . . 549--562
        Muthu Venkatachalam and   
           Prashant Chandra and   
                   Raj Yavatkar   A highly flexible, distributed
                                  multiprocessor architecture for network
                                  processing . . . . . . . . . . . . . . . 563--586
         Mohammad Peyravian and   
                 Jean Calvignac   Fundamental architectural considerations
                                  for network processors . . . . . . . . . 587--600
                Tilman Wolf and   
            Prashanth Pappu and   
               Mark A. Franklin   Predictive scheduling of network
                                  processors . . . . . . . . . . . . . . . 601--621
              Maria Gabrani and   
              Gero Dittmann and   
        Andreas Döring and   
        Andreas Herkersdorf and   
        Patricia Sagmeister and   
               Jan van Lunteren   Design methodology for a modular
                                  service-driven network processor
                                  architecture . . . . . . . . . . . . . . 623--640
       Samarjit Chakraborty and   
          Simon Künzli and   
              Lothar Thiele and   
        Andreas Herkersdorf and   
            Patricia Sagmeister   Performance evaluation of network
                                  processor architectures: combining
                                  simulation with analytical estimation    641--665
              B. D. Theelen and   
            J. P. M. Voeten and   
                R. D. J. Kramer   Performance modelling of a network
                                  processor using POOSL  . . . . . . . . . 667--684
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 41, Number 6, April 22, 2003

            Ian F. Akyildiz and   
                    Harry Rudin   Editorial  . . . . . . . . . . . . . . . 685--686
       Raghupathy Sivakumar and   
               Prasun Sinha and   
             Vaduvur Bharghavan   Braving the broadcast storm:
                                  infrastructural support for ad hoc
                                  routing  . . . . . . . . . . . . . . . . 687--706
                Edith Cohen and   
                    Haim Kaplan   Proactive caching of DNS records:
                                  addressing a performance bottleneck  . . 707--726
                  A. Bianco and   
                 G. Galante and   
                E. Leonardi and   
                    F. Neri and   
                       A. Nucci   Scheduling algorithms for multicast
                                  traffic in TDM/WDM networks with
                                  arbitrary tuning latencies . . . . . . . 727--742
               Young-Bae Ko and   
                Nitin H. Vaidya   Anycasting-based protocol for geocast
                                  service in mobile ad hoc networks  . . . 743--760
                  T. Anjali and   
                 C. Scoglio and   
                         G. Uhl   A new scheme for traffic estimation and
                                  resource allocation for bandwidth
                                  brokers  . . . . . . . . . . . . . . . . 761--777
                  Xuan Chen and   
                 John Heidemann   Preferential treatment for short flows
                                  to reduce web latency  . . . . . . . . . 779--794
   Sebasti\`a Galmés and   
                Ramon Puigjaner   Correlation analysis of a discrete-time
                                  flexible arrival process . . . . . . . . 795--814
                      Anonymous   Acknowledgement to reviewers . . . . . . 815--818
                      Anonymous   Author index . . . . . . . . . . . . . . 819--821
                      Anonymous   Subject index  . . . . . . . . . . . . . 823--824
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 42, Number 1, May 15, 2003

Marie-José Montpetit and   
              David Starobinski   Small and home networks  . . . . . . . . 1--5
                  Aura Ganz and   
       Kitti Wongthavarawat and   
                 Anan Phonphoem   Q-Soft: software framework for QoS
                                  support in home networks . . . . . . . . 7--22
             Pietro Manzoni and   
               Juan Carlos Cano   Providing interoperability between IEEE
                                  802.11 and Bluetooth protocols for Home
                                  Area Networks  . . . . . . . . . . . . . 23--37
                  Daji Qiao and   
              Sunghyun Choi and   
               Amjad Soomro and   
                   Kang G. Shin   Energy-efficient PCF operation of IEEE
                                  802.11a WLANs via transmit power control 39--54
           Christos Nomikos and   
            Aris Pagourtzis and   
                 Stathis Zachos   Satisfying a maximum number of
                                  pre-routed requests in all-optical rings 55--63
                     Xun Su and   
             Gustavo de Veciana   Predictive routing to enhance QoS for
                                  stream-based flows sharing excess
                                  bandwidth  . . . . . . . . . . . . . . . 65--80
               Marco Mellia and   
                 Ion Stoica and   
                      Hui Zhang   TCP-aware packet marking in networks
                                  with DiffServ support  . . . . . . . . . 81--100
                     S. Y. Wang   Reducing the energy consumption caused
                                  by flooding messages in mobile ad hoc
                                  networks . . . . . . . . . . . . . . . . 101--118
                Huamin Chen and   
              Prasant Mohapatra   Overload control in QoS-aware web
                                  servers  . . . . . . . . . . . . . . . . 119--133
           Seung Hyong Rhee and   
      Takis Konstantopoulos and   
               Hyukjoon Lee and   
                 Kwangsue Chung   Competitive routing and flow control in
                                  communication networks of parallel links 135--140
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 42, Number 2, June 5, 2003

           Jelena Mi\vsi\'c and   
      Vojislav B. Mi\vsi\'c and   
                  Yat Kwan Tang   On uplink call level QoS in DS-CDMA
                                  networks . . . . . . . . . . . . . . . . 141--173
                 S. Y. Wang and   
                 C. L. Chou and   
                C. H. Huang and   
                C. C. Hwang and   
                 Z. M. Yang and   
                C. C. Chiou and   
                      C. C. Lin   The design and implementation of the
                                  NCTUns 1.0 network simulator . . . . . . 175--197
Balázs Gábor Józsa and   
            Márton Makai   On the solution of reroute sequence
                                  planning problem in MPLS networks  . . . 199--210
           Matthew Stafford and   
             Xiangying Yang and   
             Gustavo de Veciana   Connection caching to reduce signaling
                                  loads with applications to softswitch
                                  telephony  . . . . . . . . . . . . . . . 211--229
                 Michel Mandjes   Pricing strategies under heterogeneous
                                  service requirements . . . . . . . . . . 231--249
           Olufemi Komolafe and   
                    David Harle   Optimal node placement in an optical
                                  packet switching Manhattan street
                                  network  . . . . . . . . . . . . . . . . 251--260
             Wesley M. Eddy and   
                    Mark Allman   A comparison of RED's byte and packet
                                  modes  . . . . . . . . . . . . . . . . . 261--280
                      Anonymous   Call for papers  . . . . . . . . . . . . 281--282
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 42, Number 3, June 21, 2003

                      Rick Reed   ITU-T system design languages (SDL)  . . 283--284
                   Daniel Amyot   Introduction to the User Requirements
                                  Notation: learning by example  . . . . . 285--301
                 Tong Zheng and   
                 Ferhat Khendek   Time consistency of MSC-2000
                                  specifications . . . . . . . . . . . . . 303--322
                Peter Graubmann   Describing interactions between MSC
                                  components: the MSC connectors . . . . . 323--342
            U. Glässer and   
                R. Gotzhein and   
                       A. Prinz   The formal semantics of SDL-2000: Status
                                  and perspectives . . . . . . . . . . . . 343--358
               W. Eric Wong and   
             Tatiana Sugeta and   
                J. Jenny Li and   
       José C. Maldonado   Coverage testing software architectural
                                  design in SDL  . . . . . . . . . . . . . 359--374
             Jens Grabowski and   
             Dieter Hogrefe and   
   György Réthy and   
         Ina Schieferdecker and   
              Anthony Wiles and   
                 Colin Willcock   An introduction to the testing and test
                                  control notation (TTCN-3)  . . . . . . . 375--403
                Nam Hee Lee and   
                  Sung Deok Cha   Generating test sequences from a set of
                                  MSCs . . . . . . . . . . . . . . . . . . 405--417
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 42, Number 4, July 15, 2003

                     Fei Hu and   
           Neeraj K. Sharma and   
                     Jim Ziobro   An accurate model for analyzing wireless
                                  TCP performance with the coexistence of
                                  Non-TCP traffic  . . . . . . . . . . . . 419--439
           Timothy X. Brown and   
                Harold N. Gabow   The limits of input-queued switch
                                  performance with future packet arrival
                                  information  . . . . . . . . . . . . . . 441--460
           E. Magaña and   
                  J. Aracil and   
                 J. Villadangos   A protocol-adaptive monitoring tree for
                                  efficient design of traffic monitoring
                                  probes . . . . . . . . . . . . . . . . . 461--479
                 Zvi Lotker and   
               Boaz Patt-Shamir   Nearly optimal FIFO buffer management
                                  for two packet classes . . . . . . . . . 481--492
              Chi-Hsiang Wu and   
                  Rong-Hong Jan   System integration of WAP and SMS for
                                  home network system  . . . . . . . . . . 493--502
                    Yi Yang and   
                  Lei Zhang and   
          Jogesh K. Muppala and   
              Samuel T. Chanson   Bandwidth-delay constrained routing
                                  algorithms . . . . . . . . . . . . . . . 503--520
                  T. Bonald and   
                  J. W. Roberts   Congestion at flow level and the impact
                                  of user behaviour  . . . . . . . . . . . 521--536
       Richard J. Boucherie and   
                Jan van der Wal   Transient handover blocking
                                  probabilities in road covering cellular
                                  mobile networks  . . . . . . . . . . . . 537--550
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 42, Number 5, August 5, 2003

                   Carole Goble   The Semantic Web: an evolution for a
                                  revolution . . . . . . . . . . . . . . . 551--556
                    R. Guha and   
                     Rob McCool   TAP: a Semantic Web platform . . . . . . 557--577
        Siegfried Handschuh and   
                  Steffen Staab   CREAM: CREAting Metadata for the
                                  Semantic Web . . . . . . . . . . . . . . 579--598
          Christian Fillies and   
          Gay Wood-Albrecht and   
              Frauke Weichhardt   Pragmatic applications of the Semantic
                                  Web using SemTalk  . . . . . . . . . . . 599--615
           G. Karvounarakis and   
             A. Magganaraki and   
                 S. Alexaki and   
           V. Christophides and   
             D. Plexousakis and   
                  M. Scholl and   
                       K. Tolle   Querying the Semantic Web with RQL . . . 617--640
           Daniela Florescu and   
     Andreas Grünhagen and   
                Donald Kossmann   XL: an XML programming language for Web
                                  service specification and composition    641--660
             David Trastour and   
          Claudio Bartolini and   
                   Chris Preist   Semantic Web support for the
                                  business-to-business e-commerce
                                  pre-contractual lifecycle  . . . . . . . 661--673
            Srini Narayanan and   
               Sheila McIlraith   Analysis and simulation of Web services  675--693
                      Anonymous   Call for Papers  . . . . . . . . . . . . 695--695
                      Anonymous   Editorial board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 42, Number 6, August 21, 2003

      Konstantinos Kalpakis and   
           Koustuv Dasgupta and   
                 Parag Namjoshi   Efficient algorithms for maximum
                                  lifetime data gathering and aggregation
                                  in wireless sensor networks  . . . . . . 697--716
                F. Baboescu and   
                    G. Varghese   Fast and scalable conflict detection for
                                  packet classifiers . . . . . . . . . . . 717--735
             Mohamed Jmaiel and   
                   Peter Pepper   Development of communication protocols
                                  using algebraic and temporal
                                  specifications . . . . . . . . . . . . . 737--764
                    Wei Cui and   
           Mostafa A. Bassiouni   Virtual private network bandwidth
                                  management with traffic prediction . . . 765--778
              Junshan Zhang and   
                    Ming Hu and   
                 Ness B. Shroff   Bursty traffic over CDMA: predictive MAI
                                  temporal structure, rate control and
                                  admission control  . . . . . . . . . . . 779--795
             Craig E. Wills and   
              Gregory Trott and   
              Mikhail Mikhailov   Using bundles for Web content delivery   797--817
                      Anonymous   Author Index Volume 42 . . . . . . . . . 819--821
                      Anonymous   Subject Index Volume 42  . . . . . . . . 822--824
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 43, Number 1, September 16, 2003

              Metin Feridun and   
              Gabi Dreo Rodosek   Management of IT services  . . . . . . . 1--2
               Peter Reichl and   
             David Hausheer and   
               Burkhard Stiller   The Cumulus Pricing model as an adaptive
                                  framework for feasible, efficient, and
                                  user-friendly tariffing of Internet
                                  services . . . . . . . . . . . . . . . . 3--24
             Marcus Brunner and   
           Alberto Gonzalez and   
                Paloma Martinez   From dynamic IP transport service
                                  ordering to DiffServ network
                                  configuration  . . . . . . . . . . . . . 25--41
            Alexander Clemm and   
                  Fong Shen and   
                     Victor Lee   Generic provisioning of heterogeneous
                                  services --- a close encounter with
                                  service profiles . . . . . . . . . . . . 43--57
           Mani Subramanian and   
                    Lundy Lewis   QoS and bandwidth management in
                                  broadband cable access network . . . . . 59--73
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 43, Number 2, October 7, 2003

            Ian F. Akyildiz and   
    Özgür B. Akan and   
                  Chao Chen and   
                  Jian Fang and   
                     Weilian Su   InterPlaNetary Internet:
                                  state-of-the-art and research challenges 75--112
                M. Mohorcic and   
                 A. Svigelj and   
                  G. Kandus and   
                   Y. F. Hu and   
                  R. E. Sheriff   Demographically weighted traffic flow
                                  models for adaptive routing in
                                  packet-switched non-geostationary
                                  satellite meshed networks  . . . . . . . 113--131
               Eitan Altman and   
           Rachid El Azouzi and   
              Odile Pourtallier   Avoiding paradoxes in multi-agent
                                  competitive routing  . . . . . . . . . . 133--146
            Chun-Chuan Yang and   
                   Kwin-Yee Lin   Distributed mobile tracking: a novel
                                  location management scheme for routing
                                  improvement in cellular IP networks  . . 147--161
                 Helen Zeng and   
                Imrich Chlamtac   Adaptive guard channel allocation and
                                  blocking probability estimation in PCS
                                  networks . . . . . . . . . . . . . . . . 163--176
              Kwan L. Yeung and   
                 Ho-Lun T. Wong   Caching policy design and cache
                                  allocation in active reliable multicast  177--193
                 Ran Giladi and   
             Ephraim Korach and   
                    Rony Ohayon   Placement of network resources in
                                  communication networks . . . . . . . . . 195--209
          Abdullah Balamash and   
                   Marwan Krunz   Modeling web requests: a multifractal
                                  approach . . . . . . . . . . . . . . . . 211--226
             Adrian Lahanas and   
           Vassilis Tsaoussidis   Exploiting the efficiency and fairness
                                  potential of AIMD-based congestion
                                  avoidance and control  . . . . . . . . . 227--245
                      Anonymous   Editorial board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 43, Number 3, October 22, 2003

         Alejandro Quintero and   
                  Samuel Pierre   Sequential and multi-population memetic
                                  algorithms for assigning cells to
                                  switches in mobile networks  . . . . . . 247--261
                     Fei Hu and   
               Neeraj K. Sharma   Multimedia call admission control in
                                  mobile networks: a dynamical
                                  reservation-pool approach  . . . . . . . 263--288
                   Q. Zheng and   
                       G. Mohan   Dynamic protection using
                                  integrated-routing approach in
                                  IP-over-WDM networks . . . . . . . . . . 289--305
                   Yuming Jiang   Relationship between guaranteed rate
                                  server and latency rate server . . . . . 307--315
              Yu-Chee Tseng and   
              Chih-Shun Hsu and   
                Ten-Yueng Hsieh   Power-saving protocols for IEEE
                                  802.11-based multi-hop ad hoc networks   317--337
              Kemal Bicakci and   
                Gene Tsudik and   
                     Brian Tung   How to construct optimal one-time
                                  signatures . . . . . . . . . . . . . . . 339--349
        Stavroula Siachalou and   
            Leonidas Georgiadis   Efficient QoS routing  . . . . . . . . . 351--367
         Catherine M. Burns and   
                Johnson Kuo and   
                      Sylvia Ng   Ecological interface design: a new
                                  approach for visualizing network
                                  management . . . . . . . . . . . . . . . 369--388
       Srinidhi Varadarajan and   
         Naren Ramakrishnan and   
    Muthukumar Thirunavukkarasu   Reinforcing reachable routes . . . . . . 389--416
                      Anonymous   Editorial board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 43, Number 4, November 15, 2003

              Erdal Cayirci and   
            Ramesh Govindan and   
                Taieb Znati and   
                Mani Srivastava   Wireless sensor networks . . . . . . . . 417--419
          Sasikanth Avancha and   
        Jeffrey Undercoffer and   
               Anupam Joshi and   
                  John Pinkston   Secure sensor networks for perimeter
                                  protection . . . . . . . . . . . . . . . 421--435
                    Ahmed Helmy   Mobility-assisted resolution of queries
                                  in large-scale mobile sensor networks
                                  (MARQ) . . . . . . . . . . . . . . . . . 437--458
              Hongwei Zhang and   
                    Anish Arora   GS 3: scalable self-configuration and
                                  self-healing in wireless sensor networks 459--480
                  Swades De and   
              Chunming Qiao and   
                      Hongyi Wu   Meshed multipath routing with selective
                                  forwarding: an efficient strategy in
                                  wireless sensor networks . . . . . . . . 481--497
            Koen Langendoen and   
                  Niels Reijers   Distributed localization in wireless
                                  sensor networks: a quantitative
                                  comparison . . . . . . . . . . . . . . . 499--518
     Enrique J. Duarte-Melo and   
                    Mingyan Liu   Data-gathering wireless sensor networks:
                                  organization and capacity  . . . . . . . 519--537
                      Anonymous   Editorial board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 43, Number 5, December 5, 2003

                  Ning Wang and   
                  George Pavlou   Scalable sender access control for
                                  bi-directional multicast routing . . . . 539--555
     Dániel Orincsay and   
 Balázs Szviatovszki and   
          Géza Böhm   Prompt partial path optimization in MPLS
                                  networks . . . . . . . . . . . . . . . . 557--572
Juan M. Estévez-Tapiador and   
Pedro García-Teodoro and   
Jesús E. Díaz-Verdejo   NSDF: a computer network system
                                  description framework and its
                                  application to network security  . . . . 573--600
                 Tom Coffey and   
               Reiner Dojen and   
                 Tomas Flanagan   Formal verification: an imperative step
                                  in the design of security protocols  . . 601--618
               Kyungsup Kim and   
                  Chong-Ho Choi   Queue delay estimation and its
                                  application to TCP Vegas . . . . . . . . 619--631
              Steven H. Low and   
          Fernando Paganini and   
               Jiantao Wang and   
                  John C. Doyle   Linear stability of TCP/RED and a
                                  scalable control . . . . . . . . . . . . 633--647
             Mohamed Younis and   
           Moustafa Youssef and   
                  Khaled Arisha   Energy-aware management for
                                  cluster-based sensor networks  . . . . . 649--668
                Kihyun Pyun and   
               Junehwa Song and   
                  Heung-Kyu Lee   A generalized hierarchical fair service
                                  curve algorithm for high network
                                  utilization and link-sharing . . . . . . 669--694
                      Anonymous   Editorial board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 43, Number 6, December 20, 2003

               Jianping Pan and   
              Y. Thomas Hou and   
                          Bo Li   An overview of DNS-based server
                                  selections in content distribution
                                  networks . . . . . . . . . . . . . . . . 695--711
             Chao-hsu Chang and   
            Eric Hsiao-kuang Wu   AMRST: adaptive multicast routing
                                  protocol for satellite--terrestrial
                                  networks . . . . . . . . . . . . . . . . 713--734
                Soonuk Seol and   
              Myungchul Kim and   
               Sungwon Kang and   
                      Jiwon Ryu   Fully automated interoperability test
                                  suite derivation for communication
                                  protocols  . . . . . . . . . . . . . . . 735--759
                Tamer Da\ug and   
            Ioannis Stavrakakis   Proactive congestion control for high
                                  speed networks . . . . . . . . . . . . . 761--775
            A. M. Barbancho and   
                     A. Peinado   Cryptanalysis of anonymous channel
                                  protocol for large-scale area in
                                  wireless communications  . . . . . . . . 777--785
        Dhananjay S. Phatak and   
                   Tom Goff and   
                Jim Plusquellic   IP-in-IP tunneling to enable the
                                  simultaneous use of multiple IP
                                  interfaces for network level connection
                                  striping . . . . . . . . . . . . . . . . 787--804
               Timo Koskela and   
            Jukka Heikkonen and   
                    Kimmo Kaski   Web cache optimization with nonlinear
                                  model using object features  . . . . . . 805--817
                      Anonymous   Author Index Volume 43 . . . . . . . . . 819--821
                      Anonymous   Subject Index Volume 43  . . . . . . . . 823--824
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 44, Number 1, January 15, 2004

        Seema Bandyopadhyay and   
                Edward J. Coyle   Minimizing communication costs in
                                  hierarchically-clustered networks of
                                  wireless sensors . . . . . . . . . . . . 1--16
              Eun-Chan Park and   
                   Hyuk Lim and   
            Kyung-Joon Park and   
                  Chong-Ho Choi   Analysis and design of the virtual rate
                                  control algorithm for stabilizing queues
                                  in TCP networks  . . . . . . . . . . . . 17--41
                   Bin Wang and   
                Jennifer C. Hou   An efficient QoS routing algorithm for
                                  quorumcast communication . . . . . . . . 43--61
             Dan Rubenstein and   
               Sneha Kasera and   
                Don Towsley and   
                     Jim Kurose   Improving reliable multicast using
                                  active parity encoding services  . . . . 63--78
         Srihari Nelakuditi and   
               Zhi-Li Zhang and   
                 David H. C. Du   On selection of candidate paths for
                                  proportional routing . . . . . . . . . . 79--102
   Cristina Hristea Seibert and   
                Fouad A. Tobagi   Assessment and optimization of schemes
                                  for tracking and routing to mobile users
                                  in packet-based networks . . . . . . . . 103--133
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 44, Number 2, February 5, 2004

              Abhinav Kamra and   
                Huzur Saran and   
                Sandeep Sen and   
                  Rajeev Shorey   Fair adaptive bandwidth allocation: a
                                  rate control based active queue
                                  management discipline  . . . . . . . . . 135--152
                 M. Garetto and   
                R. Lo Cigno and   
                     M. Meo and   
               M. Ajmone Marsan   Modeling short-lived TCP connections
                                  with open multiclass queuing networks    153--176
            Uttam K. Sarkar and   
            S. Ramakrishnan and   
                   Dilip Sarkar   Study of long-duration MPEG-trace
                                  segmentation methods for developing
                                  frame-size-based traffic models  . . . . 177--188
                  M. Rezvan and   
             K. Pawlikowski and   
                    H. Sirisena   A distributed cache architecture with
                                  snooping for QoS routing in large
                                  networks . . . . . . . . . . . . . . . . 189--209
                Ahsan Habib and   
                 Maleq Khan and   
                Bharat Bhargava   Edge-to-edge measurement-based
                                  distributed network monitoring . . . . . 211--233
               Jianping Pan and   
              Y. Thomas Hou and   
                          Bo Li   Retrieval and freshness thresholds in
                                  hierarchical caching systems . . . . . . 235--246
                    Kemal Bengi   Access protocols for an efficient and
                                  fair packet-switched IP-over-WDM metro
                                  network  . . . . . . . . . . . . . . . . 247--265
                Chang-Seop Park   Authentication protocol providing user
                                  anonymity and untraceability in wireless
                                  mobile communication systems . . . . . . 267--273
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 44, Number 3, February 20, 2004

              Mario Barbera and   
             Alfio Lombardo and   
              Giovanni Schembra   A fluid-based model of time-limited TCP
                                  flows  . . . . . . . . . . . . . . . . . 275--288
           Priyank Warkhede and   
               Subhash Suri and   
                George Varghese   Multiway range trees: scalable IP lookup
                                  with fast updates  . . . . . . . . . . . 289--303
    Helen-Catherine Leligou and   
       John D. Angelopoulos and   
     Charalambos Linardakis and   
             Alexandros Stavdas   A MAC protocol for efficient
                                  multiplexing QoS-sensitive and
                                  best-effort traffic in dynamically
                                  configurable WDM rings . . . . . . . . . 305--317
                 Chun Tung Chou   Traffic engineering for MPLS-based
                                  virtual private networks . . . . . . . . 319--333
             Paulo Salvador and   
     António Pacheco and   
                    Rui Valadas   Modeling IP traffic: joint
                                  characterization of packet arrivals and
                                  packet sizes using BMAPs . . . . . . . . 335--352
         Mohamed M. Hefeeda and   
         Bharat K. Bhargava and   
                David K. Y. Yau   A hybrid architecture for cost-effective
                                  on-demand media streaming  . . . . . . . 353--382
              Erich Plasser and   
                 Thomas Ziegler   A RED function design targeting link
                                  utilization and stable queue size
                                  behavior . . . . . . . . . . . . . . . . 383--410
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 44, Number 4, March 15, 2004

        Marco Ajmone Marsan and   
                Michela Meo and   
           Maurizio M. Munaf\`o   Selected papers from the Second
                                  International Workshop on QoS in
                                  Multiservice IP Networks (QoS-IP 2003)   411--413
                    A. Balk and   
                   M. Gerla and   
              D. Maggiorini and   
                    M. Sanadidi   Adaptive video streaming: pre-encoded
                                  MPEG-4 with bandwidth scaling  . . . . . 415--439
            Tsung-Ching Lin and   
               Yeali S. Sun and   
            Shi-Chung Chang and   
                 Shao-I Chu and   
               Yi-Ting Chou and   
                     Mei-Wen Li   Management of abusive and unfair
                                  Internet access by quota-based priority
                                  control  . . . . . . . . . . . . . . . . 441--462
              Markus Fidler and   
                  Volker Sander   A parameter based admission control for
                                  differentiated services networks . . . . 463--479
                  Ning Wang and   
                  George Pavlou   An overlay framework for provisioning
                                  differentiated services in Source
                                  Specific Multicast . . . . . . . . . . . 481--497
Sergio Herrería-Alonso and   
Andrés Suárez-González and   
Manuel Fernández-Veiga and   
Raúl F. Rodríguez-Rubio and   
Cándido López-García   Improving aggregate flow control in
                                  differentiated services networks . . . . 499--512
                S. Giordano and   
                M. Listanti and   
              F. Mustacchio and   
               S. Niccolini and   
                 S. Salsano and   
                      L. Veltri   Dynamic resource configuration in
                                  DiffServ networks: control plane
                                  mechanisms and performance evaluation of
                                  a traffic control API  . . . . . . . . . 513--527
   Gábor Tóth and   
                    Csaba Antal   Comparison of link-layer segmentation
                                  methods for UMTS terrestrial radio
                                  access networks  . . . . . . . . . . . . 529--544
  Carla-Fabiana Chiasserini and   
            Francesca Cuomo and   
        Leonardo Piacentini and   
              Michele Rossi and   
           Ilenia Tinirello and   
              Francesco Vacirca   Architectures and protocols for mobile
                                  computing applications: a reconfigurable
                                  approach . . . . . . . . . . . . . . . . 545--567
               F. Callegati and   
                 W. Cerroni and   
               C. Raffaelli and   
                     P. Zaffoni   Wavelength and time domain exploitation
                                  for QoS management in optical packet
                                  switches . . . . . . . . . . . . . . . . 569--582
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 44, Number 5, April 5, 2004

             Romeo Giuliano and   
           Gianluca Guidoni and   
              Ibrahim Habib and   
                Franco Mazzenga   Coexistence of an ultrawideband spread
                                  spectrum system with fixed wireless
                                  access systems . . . . . . . . . . . . . 583--598
                Yu-Chul Kim and   
                    Dong-Ho Cho   Considering spurious timeout in proxy
                                  for improving TCP performance in
                                  wireless networks  . . . . . . . . . . . 599--616
                   Jikai Li and   
                  Chunming Qiao   Schedule burst proactively for optical
                                  burst switched networks  . . . . . . . . 617--629
               Eitan Altman and   
           Tania Jiménez   Simulation analysis of RED with short
                                  lived TCP connections  . . . . . . . . . 631--641
        Christos Douligeris and   
          Aikaterini Mitrokotsa   DDoS attacks and defense mechanisms:
                                  classification and state-of-the-art  . . 643--666
               Konghong Pun and   
                   Mounir Hamdi   Dispatching schemes for Clos-network
                                  switches . . . . . . . . . . . . . . . . 667--679
              R. M. Hierons and   
                  T.-H. Kim and   
                        H. Ural   On the testability of SDL specifications 681--700
        Özgür B. Akan   On the throughput analysis of rate-based
                                  and window-based congestion control
                                  schemes  . . . . . . . . . . . . . . . . 701--711
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 44, Number 6, April 22, 2004

                A. Striegel and   
                   G. Manimaran   DSMCast: a scalable approach for
                                  DiffServ multicasting  . . . . . . . . . 713--735
             Hyunseok Chang and   
            Ramesh Govindan and   
                Sugih Jamin and   
           Scott J. Shenker and   
               Walter Willinger   Towards capturing representative
                                  AS-level Internet topologies . . . . . . 737--755
               Abhishek Ram and   
            Luiz A. DaSilva and   
           Srinidhi Varadarajan   Admission control by implicit signaling
                                  in support of voice over IP over ADSL    757--772
                   Maode Ma and   
                 Xiaohong Huang   Adaptive scheduling for integrated
                                  traffic on WDM optical networks  . . . . 773--788
               Rolland Vida and   
Luís Henrique M. K. Costa and   
                    Serge Fdida   Mobile hop-by-hop multicast routing  . . 789--812
     Thyagarajan Nandagopal and   
               Kang-Won Lee and   
                  Jia-Ru Li and   
             Vaduvur Bharghavan   Scalable service differentiation using
                                  purely end-to-end mechanisms: features
                                  and limitations  . . . . . . . . . . . . 813--833
           Uday Savagaonkar and   
          Edwin K. P. Chong and   
                Robert L. Givan   Online pricing for bandwidth
                                  provisioning in multi-class networks . . 835--853
             X. Brian Zhang and   
               Simon S. Lam and   
                 Dong-Young Lee   Group rekeying with limited unicast
                                  recovery . . . . . . . . . . . . . . . . 855--870
                      Anonymous   Author Index Volume 44 . . . . . . . . . 871--873
                      Anonymous   Subject Index Volume 44  . . . . . . . . 875--876
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 45, Number 1, May 15, 2004

             Markus Hofmann and   
              Robin Kravets and   
                Joseph D. Touch   The Global Internet  . . . . . . . . . . 1--3
             Suman Banerjee and   
           Chris Kommareddy and   
            Bobby Bhattacharjee   Efficient peer location on the Internet  5--17
            Norihito Fujita and   
            Yuichi Ishikawa and   
              Atsushi Iwata and   
                  Rauf Izmailov   Coarse-grain replica management
                                  strategies for dynamic replication of
                                  Web contents . . . . . . . . . . . . . . 19--34
                   Jim Gast and   
                   Paul Barford   Representing the Internet as a succinct
                                  forest . . . . . . . . . . . . . . . . . 35--44
                    Tian Bu and   
                  Lixin Gao and   
                    Don Towsley   On characterizing BGP routing table
                                  growth . . . . . . . . . . . . . . . . . 45--54
             Daniel Zappala and   
                Virginia Lo and   
           Chris GauthierDickey   The multicast address allocation
                                  problem: theory and practice . . . . . . 55--73
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 45, Number 2, June 5, 2004

            Ian F. Akyildiz and   
                    Harry Rudin   Editorial  . . . . . . . . . . . . . . . 75--76
                Ligang Wang and   
             Anjali Agarwal and   
              J. William Atwood   Modelling and verification of
                                  interworking between SIP and H.323 . . . 77--98
          Liza Lai-Yee Shek and   
                  Yu-Kwong Kwok   An integrated approach to scatternet
                                  traffic management in Bluetooth ad hoc
                                  networks . . . . . . . . . . . . . . . . 99--118
  Carlos de Morais Cordeiro and   
           Sachin Abhyankar and   
              Dharma P. Agrawal   Reducing power consumption and enhancing
                                  performance by direct slave-to-slave and
                                  group communication in Bluetooth WPANs   119--141
             Chang N. Zhang and   
                    Chunren Lai   A systematic approach for encryption and
                                  authentication with fault tolerance  . . 143--154
              Amotz Bar-Noy and   
           Vladimir Dreizin and   
               Boaz Patt-Shamir   Efficient algorithms for periodic
                                  scheduling . . . . . . . . . . . . . . . 155--173
Juan M. Estévez-Tapiador and   
Pedro García-Teodoro and   
Jesús E. Díaz-Verdejo   Measuring normality in HTTP traffic for
                                  anomaly-based intrusion detection  . . . 175--193
          Vasileios Vlachos and   
Stephanos Androutsellis-Theotokis and   
             Diomidis Spinellis   Security applications of peer-to-peer
                                  networks . . . . . . . . . . . . . . . . 195--205
               L. Galluccio and   
                A. Leonardi and   
                    G. Morabito   Tuning transmission power for TCP
                                  fairness in next generation wireless
                                  networks: an analytical paradigm . . . . 207--219
       Harsha V. Madhyastha and   
             C. Siva Ram Murthy   Efficient dynamic traffic grooming in
                                  service-differentiated WDM mesh networks 221--235
                      Anonymous   Acknowledgement to reviewers . . . . . . 237--240
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 45, Number 3, June 21, 2004

              Chris Blondia and   
            Ioannis Stavrakakis   In memory of Olga Casals . . . . . . . . 241--242
                      Anonymous   A Eulogy for Olga Casals . . . . . . . . 243--243
            Mehmet C. Vuran and   
    Özgür B. Akan and   
                Ian F. Akyildiz   Spatio-temporal correlation: theory and
                                  applications for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 245--259
      Vicente Casares-Giner and   
Pablo García-Escalle and   
                     Vicent Pla   Evaluation of C$_{\mbox{ELLULAR}}$ IP
                                  mobility tracking procedures . . . . . . 261--279
    Alicia Nicki Washington and   
                   Harry Perros   Call blocking probabilities in a
                                  traffic-groomed tandem optical network   281--294
                G. Anastasi and   
                   M. Conti and   
                 E. Gregori and   
                  A. Passarella   A performance study of power-saving
                                  polices for Wi-Fi hotspots . . . . . . . 295--318
                  J. W. Roberts   A survey on statistical bandwidth
                                  sharing  . . . . . . . . . . . . . . . . 319--332
José M. Barceló and   
Juan I. Nieto-Hipólito and   
      Jorge García-Vidal   Study of Internet autonomous system
                                  interconnectivity from BGP routing
                                  tables . . . . . . . . . . . . . . . . . 333--344
             Peter De Cleyn and   
      Nik Van den Wijngaert and   
Llorenç Cerdá and   
                  Chris Blondia   A smooth handoff scheme using IEEE802.11
                                  triggers---design and implementation . . 345--361
               P. Balaouras and   
                 I. Stavrakakis   Controlling smoothness and loss rate for
                                  elastic continuous media flows . . . . . 363--378
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2
                      Anonymous   Photo of Olga Casals . . . . . . . . . . iv--iv

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 45, Number 4, July 15, 2004

       Konstantinos Psounis and   
                     An Zhu and   
           Balaji Prabhakar and   
                 Rajeev Motwani   Modeling correlations in web traces and
                                  implications for designing replacement
                                  policies . . . . . . . . . . . . . . . . 379--398
              Dianxun Shuai and   
                   Hongbin Zhao   A new generalized cellular automata
                                  approach to optimization of fast packet
                                  switching  . . . . . . . . . . . . . . . 399--419
            Marios D. Dikaiakos   Intermediary infrastructures for the
                                  World Wide Web . . . . . . . . . . . . . 421--447
             Hoon-Tong Ngin and   
                Chen-Khong Tham   Scaled time priority: an efficient
                                  approximation to waiting time priority   449--462
               Haw-Yun Shin and   
                Jean-Lien C. Wu   The study of dynamic multi-channel
                                  scheme with channel de-allocation in
                                  wireless networks  . . . . . . . . . . . 463--482
               D. Critchlow and   
                       N. Zhang   Security enhanced accountable anonymous
                                  PKI certificates for mobile e-commerce   483--503
                  Jingyi He and   
                S.-H. Gary Chan   TCP and UDP performance for Internet
                                  over optical packet-switched networks    505--521
                 Liming Liu and   
                       Yumao Lu   Dynamic traffic controls for Web-server
                                  networks . . . . . . . . . . . . . . . . 523--536
                M. Steinder and   
                    A. S. Sethi   Probabilistic fault diagnosis in
                                  communication systems through
                                  incremental hypothesis updating  . . . . 537--562
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 45, Number 5, August 5, 2004

               Daniel Amyot and   
                 Luigi Logrippo   Directions in feature interaction
                                  research . . . . . . . . . . . . . . . . 563--567
    Stephan Reiff-Marganiec and   
              Kenneth J. Turner   Feature interaction in policies  . . . . 569--584
                 Petre Dini and   
            Alexander Clemm and   
                   Tom Gray and   
          Fuchun Joseph Lin and   
             Luigi Logrippo and   
        Stephan Reiff-Marganiec   Policy-enabled mechanisms for feature
                                  interactions: reality, expectations,
                                  challenges . . . . . . . . . . . . . . . 585--603
          Masahide Nakamura and   
         Pattara Leelaprute and   
         Ken-ichi Matsumoto and   
                   Tohru Kikuno   On detecting feature interactions in the
                                  programmable service environment of
                                  Internet telephony . . . . . . . . . . . 605--624
                Andreas Metzger   Feature interactions in embedded control
                                  systems  . . . . . . . . . . . . . . . . 625--644
                Pamela Zave and   
        Healfdene H. Goguen and   
                Thomas M. Smith   Component coordination: a
                                  telecommunication case study . . . . . . 645--664
              Kenneth J. Turner   Analysing interactive voice services . . 665--685
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 45, Number 6, August 21, 2004

                    Kui Ren and   
                  Tieyan Li and   
                 Zhiguo Wan and   
                   Feng Bao and   
             Robert H. Deng and   
                    Kwangjo Kim   Highly reliable trust establishment
                                  scheme in ad hoc networks  . . . . . . . 687--699
               Eitan Altman and   
           Rachid El Azouzi and   
           Tania Jiménez   Slotted Aloha as a game with partial
                                  information  . . . . . . . . . . . . . . 701--713
                  Shi-Wu Lo and   
                Tei-Wei Kuo and   
                Kam-Yiu Lam and   
                     Guo-Hui Li   Efficient location area planning for
                                  cellular networks with hierarchical
                                  location databases . . . . . . . . . . . 715--730
               Junfeng Wang and   
              Mingtian Zhou and   
                   Hongxia Zhou   Clock synchronization for Internet
                                  measurements: a clustering algorithm . . 731--741
                Guanghui He and   
                   Yuan Gao and   
            Jennifer C. Hou and   
                    Kihong Park   A case for exploiting self-similarity of
                                  network traffic in TCP congestion
                                  control  . . . . . . . . . . . . . . . . 743--766
     Perfecto Mariño and   
Miguel Ángel Domínguez and   
             Francisco Poza and   
        Fernando Vázquez   Using LOTOS in the specification of
                                  industrial bus communication protocols   767--799
             David Harrison and   
                   Yong Xia and   
     Shivkumar Kalyanaraman and   
              Arvind Venkatesan   An accumulation-based, closed-loop
                                  scheme for expected minimum rate and
                                  weighted rate services . . . . . . . . . 801--818
                  S. K. Tan and   
                   G. Mohan and   
                     K. C. Chua   Link scheduling state information based
                                  offset management for fairness
                                  improvement in WDM optical burst
                                  switching networks . . . . . . . . . . . 819--834
               Panos Gevros and   
                  Jon Crowcroft   Distributed resource management with
                                  heterogeneous linear controls  . . . . . 835--858
                      Anonymous   Author Index Volume 45 . . . . . . . . . 859--861
                      Anonymous   Subject Index Volume 45  . . . . . . . . 863--865
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 46, Number 1, September 16, 2004

           Burkhard Stiller and   
               Lee McKnight and   
             Martin Karsten and   
                   Peter Reichl   Internet economics: pricing and policies 1--2
         Panita Pongpaibool and   
                   Hyong S. Kim   Providing end-to-end service level
                                  agreements across multiple ISP networks  3--18
            Oliver Heckmann and   
               Jens Schmitt and   
                 Ralf Steinmetz   Optimizing interconnection policies  . . 19--39
              Errin W. Fulp and   
              Douglas S. Reeves   Bandwidth provisioning and pricing for
                                  networks with multiple classes of
                                  service  . . . . . . . . . . . . . . . . 41--52
                    Nan Jin and   
                   Scott Jordan   The effect of bandwidth and buffer
                                  pricing on resource allocation and QoS   53--71
                  David Ros and   
                   Bruno Tuffin   A mathematical model of the Paris Metro
                                  Pricing scheme for charging packet
                                  networks . . . . . . . . . . . . . . . . 73--85
                 Tianshu Li and   
              Youssef Iraqi and   
                  Raouf Boutaba   Pricing and admission control for
                                  QoS-enabled Internet . . . . . . . . . . 87--110
                   Xin Wang and   
            Henning Schulzrinne   Comparative study of two congestion
                                  pricing schemes: auction and tâtonnement  111--131
       Panayotis Antoniadis and   
        Costas Courcoubetis and   
                    Robin Mason   Comparing economic incentives in
                                  peer-to-peer networks  . . . . . . . . . 133--146
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 46, Number 2, October 7, 2004

                 Qiang Duan and   
                 John N. Daigle   Resource allocation for quality of
                                  service provision in multistage buffered
                                  crossbar switches  . . . . . . . . . . . 147--168
             Ahmed E. Kamal and   
            Hossam S. Hassanein   Performance evaluation of prioritized
                                  scheduling with buffer management for
                                  differentiated services architectures    169--180
               Kun-hong Liu and   
                        Yong Xu   A new approach to improving the grooming
                                  performance with dynamic traffic in
                                  SONET rings  . . . . . . . . . . . . . . 181--195
             Samphel Norden and   
        Milind M. Buddhikot and   
           Marcel Waldvogel and   
                   Subhash Suri   Routing bandwidth-guaranteed paths with
                                  restoration in label-switched networks   197--218
                Lavy Libman and   
                     Ariel Orda   Optimal sliding-window strategies in
                                  networks with long round-trip delays . . 219--235
                Jongmin Lee and   
                     Hojung Cha   A receiver-driven TCP flow control in
                                  CDMA2000 wireless networks with
                                  constrained mobile resources . . . . . . 237--252
               Jinliang Fan and   
                     Jun Xu and   
           Mostafa H. Ammar and   
                    Sue B. Moon   Prefix-preserving IP address
                                  anonymization: measurement-based
                                  security evaluation and a new
                                  cryptography-based scheme  . . . . . . . 253--272
             Turgay Korkmaz and   
               Marwan Krunz and   
                 Jyothi Guntaka   OSPF-based hybrid approach for scalable
                                  dissemination of QoS parameters  . . . . 273--293
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 46, Number 3, October 22, 2004

                Marjory Johnson   Networking for the earth sciences  . . . 295--298
               Joe Loiacono and   
               Andy Germain and   
                     Jeff Smith   Network performance measurements for
                                  NASA's Earth Observation System  . . . . 299--320
    Michael Hadjitheodosiou and   
                  Yingyong Chen   Communication support for future earth
                                  science space missions . . . . . . . . . 321--342
            Rajesh Krishnan and   
       James P. G. Sterbenz and   
             Wesley M. Eddy and   
            Craig Partridge and   
                    Mark Allman   Explicit transport error notification
                                  (ETEN) for error-prone wireless and
                                  satellite networks . . . . . . . . . . . 343--362
              Stephen Horan and   
        Anirban Chakraborti and   
          Sandeep Muddasani and   
             Srinivasulu Narina   Testing MDP in a simulated space channel
                                  environment  . . . . . . . . . . . . . . 363--374
             Alex T. Nguyen and   
    Michael Hadjitheodosiou and   
                  John S. Baras   Broadband communication support for
                                  earth observation from the International
                                  Space Station  . . . . . . . . . . . . . 375--388
           Chien-Chung Shen and   
       Sundaram Rajagopalan and   
              Girish Borkar and   
               Chaiporn Jaikaeo   A flexible routing architecture for ad
                                  hoc space networks . . . . . . . . . . . 389--410
         Robert L. Grossman and   
                 Yunhong Gu and   
               David Hanley and   
                Xinwei Hong and   
              Babu Krishnaswamy   Experimental studies of data transport
                                  and data access of earth-science data
                                  over networks with high bandwidth delay
                                  products . . . . . . . . . . . . . . . . 411--421
            Marjory Johnson and   
            Kenneth Freeman and   
           Raymond Gilstrap and   
                   Richard Beck   Networking technologies enable advances
                                  in Earth Science . . . . . . . . . . . . 423--435
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 46, Number 4, November 15, 2004

                Hasina Abdu and   
             Hanan Lutfiyya and   
               Michael A. Bauer   A framework for determining efficient
                                  management configurations  . . . . . . . 437--463
             E. Ilker Oyman and   
                      Cem Ersoy   Overhead energy considerations for
                                  efficient routing in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 465--478
            Alefiya Hussain and   
             John Heidemann and   
          Christos Papadopoulos   Distinguishing between single and
                                  multi-source attacks using signal
                                  processing . . . . . . . . . . . . . . . 479--503
                    Ming Hu and   
              Junshan Zhang and   
                  John Sadowsky   Traffic aided opportunistic scheduling
                                  for wireless networks: algorithms and
                                  performance bounds . . . . . . . . . . . 505--518
                 Aimin Sang and   
                      San-qi Li   Measurement-based virtual queue (VQ): to
                                  estimate the real-time bandwidth demand
                                  under loss constraint  . . . . . . . . . 519--539
                  Zhang Yan and   
                 Soong Boon-Hee   Handoff counting in hierarchical
                                  cellular system with overflow scheme . . 541--554
                  Hui Zhang and   
                Ashish Goel and   
                Ramesh Govindan   Using the small-world model to improve
                                  Freenet performance  . . . . . . . . . . 555--574
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 46, Number 5, December 5, 2004

                        G. Parr   Military communications systems and
                                  technologies . . . . . . . . . . . . . . 575--579
             John Strassner and   
                   Craig Dupler   LANS: a model-driven environment for
                                  implementing location-aware network
                                  services . . . . . . . . . . . . . . . . 581--603
                   A. Arora and   
                   P. Dutta and   
                   S. Bapat and   
             V. Kulathumani and   
                   H. Zhang and   
                    V. Naik and   
                  V. Mittal and   
                     H. Cao and   
                M. Demirbas and   
                   M. Gouda and   
                         others   A line in the sand: a wireless sensor
                                  network for target detection,
                                  classification, and tracking . . . . . . 605--634
            Ahmed Abd El Al and   
              Tarek Saadawi and   
                      Myung Lee   Improving throughput and reliability in
                                  mobile wireless networks via transport
                                  layer bandwidth aggregation  . . . . . . 635--649
             Fabrice Saffre and   
            Richard Tateson and   
          Robert Ghanea-Hercock   Reliable sensor networks using
                                  decentralised channel selection  . . . . 651--663
             V. R. Syrotiuk and   
                     M. Cui and   
                S. Ramkumar and   
                 C. J. Colbourn   Dynamic spectrum utilization in ad hoc
                                  networks . . . . . . . . . . . . . . . . 665--678
             Yuecheng Zhang and   
                    Liang Cheng   PLACE: Protocol for Location And
                                  Coordinate Estimation---a wireless
                                  sensor network approach  . . . . . . . . 679--693
                 Tolga Onel and   
                  Cem Ersoy and   
              Erdal Cayirci and   
                    Gerard Parr   A multicriteria handoff decision scheme
                                  for the next generation tactical
                                  communications systems . . . . . . . . . 695--708
                John Bigham and   
            Laurie Cuthbert and   
                    Xu Yang and   
                    Ning Lu and   
                    Damian Ryan   Using intelligent agents for managing
                                  resources in military communications . . 709--721
             Howard Chivers and   
                  John A. Clark   Smart dust, friend or foe?---Replacing
                                  identity with configuration trust  . . . 723--740
              Lina Fagoonee and   
                  Bahram Honary   Application of turbo codes to tactical
                                  communications . . . . . . . . . . . . . 741--749
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 46, Number 6, December 20, 2004

                 Ning Zhang and   
                     Qi Shi and   
             Madjid Merabti and   
                 Robert Askwith   Autonomous mobile agent based fair
                                  exchange . . . . . . . . . . . . . . . . 751--770
          A. David McKinnon and   
            David E. Bakken and   
                 John C. Shovic   A configurable cryptography subsystem in
                                  a middleware framework for embedded
                                  systems  . . . . . . . . . . . . . . . . 771--795
                    Eylem Ekici   On signaling performance bounds of
                                  location management in Next Generation
                                  Wireless Networks  . . . . . . . . . . . 797--816
              Rong-Hong Jan and   
               Hung-Chi Chu and   
                    Yi-Fang Lee   Improving the accuracy of cell-based
                                  positioning for wireless networks  . . . 817--827
                      J. Li and   
                   G. Mohan and   
              E. Cheng Tien and   
                     K. C. Chua   Dynamic routing with inaccurate link
                                  state information in integrated
                                  IP-over-WDM networks . . . . . . . . . . 829--851
               S. D'Antonio and   
               M. D'Arienzo and   
                M. Esposito and   
               S. P. Romano and   
                      G. Ventre   Managing service level agreements in
                                  Premium IP networks: a business-oriented
                                  approach . . . . . . . . . . . . . . . . 853--866
                  Huan Chen and   
                Sunil Kumar and   
                  C.-C. Jay Kuo   QoS-aware radio resource management
                                  scheme for CDMA cellular networks based
                                  on dynamic interference guard margin
                                  (IGM)  . . . . . . . . . . . . . . . . . 867--879
                      Anonymous   Author Index Volume 46 . . . . . . . . . 881--883
                      Anonymous   Subject Index Volume 46  . . . . . . . . 884--886
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 47, Number 1, January 14, 2005

                  M. Mellia and   
                R. Lo Cigno and   
                        F. Neri   Measuring IP and TCP behavior on edge
                                  nodes with Tstat . . . . . . . . . . . . 1--21
               Minseok Kwon and   
                    Sonia Fahmy   Path-aware overlay multicast . . . . . . 23--45
             Fabio Ricciato and   
                     Ugo Monaco   Routing demands with time-varying
                                  bandwidth profiles on a MPLS network . . 47--61
                Shih-Lin Wu and   
              Pao-Chu Tseng and   
                   Zi-Tsan Chou   Distributed power management protocols
                                  for multi-hop mobile ad hoc networks . . 63--85
                    Wei Liu and   
                Wenjing Lou and   
                   Yuguang Fang   An efficient quality of service routing
                                  algorithm for delay-sensitive
                                  applications . . . . . . . . . . . . . . 87--104
                K. J. Kumar and   
                B. S. Manoj and   
             C. Siva Ram Murthy   RT-MuPAC: A new multi-power architecture
                                  for voice cellular networks  . . . . . . 105--128
            Hsien-Ming Tsai and   
               Ai-Chun Pang and   
              Yung-Chun Lin and   
                    Yi-Bing Lin   Repacking on demand for speed-sensitive
                                  channel assignment . . . . . . . . . . . 129--146
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 47, Number 2, February 4, 2005

               Abbas Jamalipour   Wireless IP through integration of
                                  wireless LAN and cellular networks . . . 147--150
           Giuseppe Ruggeri and   
               Antonio Iera and   
                  Sergio Polito   802.11-Based Wireless-LAN and UMTS
                                  interworking: requirements, proposed
                                  solutions and open issues  . . . . . . . 151--166
              Xin Gang Wang and   
                 Geyong Min and   
             John E. Mellor and   
           Khalid Al-Begain and   
                       Lin Guan   An adaptive QoS framework for integrated
                                  cellular and WLAN networks . . . . . . . 167--183
              M. Ylianttila and   
        J. Mäkelä and   
                    K. Pahlavan   Analysis of handoff in a location-aware
                                  vertical multi-access network  . . . . . 185--201
            Andrea Calvagna and   
           Aurelio La Corte and   
                 Sabrina Sicari   Mobility and quality of service across
                                  heterogeneous wireless networks  . . . . 203--217
                     Kai Xu and   
                    Ye Tian and   
                  Nirwan Ansari   Improving TCP performance in integrated
                                  wireless communications networks . . . . 219--237
           Thanasis Korakis and   
             Leandros Tassiulas   Providing quality of service guarantees
                                  in wireless LANs compliant with 802.11e  239--255
             Francesco Palmieri   An MPLS-based architecture for scalable
                                  QoS and traffic engineering in converged
                                  multiservice mobile IP networks  . . . . 257--269
               Kang-Won Lee and   
               Young-Bae Ko and   
              Thyaga Nandagopal   Load mitigation in cellular data
                                  networks by peer data sharing over WLAN
                                  channels . . . . . . . . . . . . . . . . 271--286
                Tarik Taleb and   
                   Nei Kato and   
                Yoshiaki Nemoto   On-demand media streaming to hybrid
                                  wired/wireless networks over
                                  quasi-geostationary satellite systems    287--306
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 47, Number 3, February 21, 2005

               Eitan Altman and   
     Konstantin Avrachenkov and   
              Chadi Barakat and   
                   Parijat Dube   Performance analysis of AIMD mechanisms
                                  over a multi-state Markovian path  . . . 307--326
                 Samphel Norden   Analyzing the performance of deferred
                                  reservations . . . . . . . . . . . . . . 327--349
              Kemal Bicakci and   
                  Nazife Baykal   Improved server assisted signatures  . . 351--366
                 Zhiruo Cao and   
               Ellen Zegura and   
                     Zheng Wang   Rainbow fair queueing: theory and
                                  applications . . . . . . . . . . . . . . 367--392
                      J. Li and   
                   G. Mohan and   
                     K. C. Chua   Dynamic load balancing in IP-over-WDM
                                  optical burst switching networks . . . . 393--408
         Nikolaos Laoutaris and   
    Vassilios Zissimopoulos and   
            Ioannis Stavrakakis   On the optimization of storage capacity
                                  allocation for content distribution  . . 409--428
              Jack Snoeyink and   
               Subhash Suri and   
                George Varghese   A lower bound for multicast key
                                  distribution . . . . . . . . . . . . . . 429--441
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 47, Number 4, March 15, 2005

            Ian F. Akyildiz and   
                    Harry Rudin   Editorial  . . . . . . . . . . . . . . . 443--444
            Ian F. Akyildiz and   
                Xudong Wang and   
                    Weilin Wang   Wireless mesh networks: a survey . . . . 445--487
             Nissan Lev-Tov and   
                    David Peleg   Polynomial time approximation schemes
                                  for base station coverage with minimum
                                  total radii  . . . . . . . . . . . . . . 489--501
              Artur Ziviani and   
                Serge Fdida and   
  José F. de Rezende and   
       Otto Carlos M. B. Duarte   Improving the accuracy of
                                  measurement-based geographic location of
                                  Internet hosts . . . . . . . . . . . . . 503--523
             Chengnian Long and   
                   Bin Zhao and   
               Xinping Guan and   
                       Jun Yang   The Yellow active queue management
                                  algorithm  . . . . . . . . . . . . . . . 525--550
                 Ch. Bouras and   
                      A. Gkamas   SRAMT: a hybrid sender and
                                  receiver-based adaptation scheme for TCP
                                  friendly multicast transmission  . . . . 551--575
   Süleyman Altunta\cs and   
                Buyurman Baykal   Mobile multi-access IP: a proposal for
                                  mobile multi-access management in future
                                  wireless IP networks . . . . . . . . . . 577--592
                      Anonymous   Acknowledgement to reviewers . . . . . . 593--598
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 47, Number 5, April 5, 2005

                   K. B. Bhasin   Interplanetary Internet  . . . . . . . . 599--601
                Keith Hogie and   
               Ed Criscuolo and   
                     Ron Parise   Using standard Internet Protocols and
                                  applications in space  . . . . . . . . . 603--650
                 James Rash and   
                Keith Hogie and   
                Ralph Casasanta   Internet technology for future space
                                  missions . . . . . . . . . . . . . . . . 651--659
                Chunmei Liu and   
                  Eytan Modiano   On the performance of additive increase
                                  multiplicative decrease (AIMD) protocols
                                  in hybrid space-terrestrial networks . . 661--678
    Michael Hadjitheodosiou and   
                   Hui Zeng and   
                Alex Nguyen and   
                Brenda L. Ellis   Flexible access for a space
                                  communications network with IP
                                  functionality  . . . . . . . . . . . . . 679--700
             Loren P. Clare and   
                 Jay L. Gao and   
         Esther H. Jennings and   
                  Clayton Okino   Space-based multi-hop networking . . . . 701--724
              Marcos A. Bergamo   High-Throughput Distributed Spacecraft
                                  Network: architecture and multiple
                                  access technologies  . . . . . . . . . . 725--749
        Vishwanath Chukkala and   
             Phillip DeLeon and   
              Stephen Horan and   
           Vijayakumar Velusamy   Radio frequency channel modeling for
                                  proximity networks on the Martian
                                  surface  . . . . . . . . . . . . . . . . 751--763
            Richard A. Beck and   
          Robert K. Vincent and   
             Doyle W. Watts and   
            Marc A. Seibert and   
             David P. Pleva and   
          Michael A. Cauley and   
            Calvin T. Ramos and   
           Theresa M. Scott and   
             Dean W. Harter and   
             Mary Vickerman and   
                         others   A space-based end-to-end prototype
                                  geographic information network for lunar
                                  and planetary exploration and emergency
                                  response (2002 and 2003 field
                                  experiments) . . . . . . . . . . . . . . 765--783
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 47, Number 6, April 22, 2005

           Michael Q. Rieck and   
                 Sukesh Pai and   
                 Subhankar Dhar   Distributed routing algorithms for
                                  multi-hop ad hoc networks using $d$-hop
                                  connected $d$-dominating sets  . . . . . 785--799
                     Cory Beard   Preemptive and delay-based mechanisms to
                                  provide preference to emergency traffic  801--824
              Mauro Brunato and   
                Roberto Battiti   Statistical learning theory for location
                                  fingerprinting in wireless LANs  . . . . 825--845
  Mohammad Hossien Yaghmaee and   
     Mohammad Bagher Menhaj and   
                 Hale Amintoosi   Design and performance evaluation of a
                                  fuzzy based traffic conditioner for
                                  differentiated services  . . . . . . . . 847--869
             Woei-Luen Shyu and   
             Cheng-Shong Wu and   
                  Ting-Chao Hou   Aligned prefix caching based on
                                  singleton information  . . . . . . . . . 871--884
                   Yong Liu and   
            Chen-Khong Tham and   
                   Yuming Jiang   Conformance analysis in networks with
                                  service level agreements . . . . . . . . 885--906
                   Y. Hayel and   
                      B. Tuffin   A mathematical analysis of the cumulus
                                  pricing scheme . . . . . . . . . . . . . 907--921
                   Yong Cui and   
                Jianping Wu and   
                          Ke Xu   Precomputation for intra-domain QoS
                                  routing  . . . . . . . . . . . . . . . . 923--937
                      Anonymous   Author Index Volume 47 . . . . . . . . . 939--941
                      Anonymous   Subject Index Volume 47  . . . . . . . . 943--944
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 48, Number 1, May 16, 2005

            Gorry Fairhurst and   
    Marie-José Montpetit   Internet over MPEG-2 transmission
                                  networks . . . . . . . . . . . . . . . . 1--3
      Mahesh Sooriyabandara and   
            Gorry Fairhurst and   
                Anthony Ang and   
    Bernhard Collini-Nocker and   
              Hilmar Linder and   
                Wolfram Stering   A lightweight encapsulation protocol for
                                  IP over MPEG-2 networks: design,
                                  implementation and analysis  . . . . . . 5--19
             Johannes Ebert and   
                Michael Schmidt   A low overhead encapsulation method for
                                  MF-TDMA  . . . . . . . . . . . . . . . . 21--27
                   F. Arnal and   
                L. Dairaine and   
                   J. Lacan and   
                       G. Maral   Cross-layer reliability management for
                                  multicast over satellite . . . . . . . . 29--43
                G. Xilouris and   
                 A. Kourtis and   
                    G. Stefanou   A mesh topology DVB-S network
                                  architecture for node interconnection,
                                  featuring QoS capabilities . . . . . . . 45--56
             Dimitris Kouis and   
          Dimitris Loukatos and   
         Kimon Kontovasilis and   
          George Kormentzas and   
             Charalabos Skianis   On the effectiveness of DVB-T for the
                                  support of IP-based services in
                                  heterogeneous wireless networks  . . . . 57--73
             Helmut Hlavacs and   
             Michael Haddad and   
         Christophe Lafouge and   
            Delphine Kaplan and   
                   Jean Ribeiro   The CODIS Content Delivery Network . . . 75--89
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 48, Number 2, June 6, 2005

               Shengli Yuan and   
                   Jason P. Jue   Dynamic lightpath protection in WDM mesh
                                  networks under wavelength-continuity and
                                  risk-disjoint constraints  . . . . . . . 91--112
            Anirban Mahanti and   
             Derek L. Eager and   
                 Mary K. Vernon   Improving multirate congestion control
                                  using a TCP Vegas throughput model . . . 113--136
                   Zhi Quan and   
                Jong-Moon Chung   Statistical admission control for
                                  real-time services under earliest
                                  deadline first scheduling  . . . . . . . 137--154
            Swati Sinha Deb and   
                 M. E. Woodward   A new distributed QoS routing algorithm
                                  based on Fano's method . . . . . . . . . 155--174
                    Dan Pei and   
                 Matt Azuma and   
                 Dan Massey and   
                    Lixia Zhang   BGP-RCN: improving BGP convergence
                                  through root cause notification  . . . . 175--194
                Kamil Sarac and   
              Kevin C. Almeroth   Application layer reachability
                                  monitoring for IP multicast  . . . . . . 195--213
               Junfeng Wang and   
                     Lei Li and   
                 Fuchun Sun and   
                  Mingtian Zhou   A probability-guaranteed adaptive
                                  timeout algorithm for high-speed network
                                  flow detection . . . . . . . . . . . . . 215--233
          Dimitris Gavrilis and   
             Evangelos Dermatas   Real-time detection of distributed
                                  denial-of-service attacks using RBF
                                  networks and statistical features  . . . 235--245
             Emmanuel Bayse and   
                Ana Cavalli and   
 Manuel Núñez and   
                Fatiha Za\"\idi   A passive testing approach based on
                                  invariants: application to the WAP . . . 247--266
                  Wei Liang and   
                     Wenye Wang   On performance analysis of
                                  challenge/response based authentication
                                  in wireless networks . . . . . . . . . . 267--288
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 48, Number 3, June 21, 2005

      Michael Devetsikiotis and   
        Nelson L. S. da Fonseca   Modeling network traffic with long range
                                  dependence: characterization,
                                  visualization and tools  . . . . . . . . 289--291
              Darryl Veitch and   
               Nicolas Hohn and   
                   Patrice Abry   Multifractality in TCP/IP traffic: the
                                  case against . . . . . . . . . . . . . . 293--313
           Vinay J. Ribeiro and   
               Zhi-Li Zhang and   
                   Sue Moon and   
                Christophe Diot   Small-time scaling behavior of Internet
                                  backbone traffic . . . . . . . . . . . . 315--334
          Shriram Sarvotham and   
               Rudolf Riedi and   
               Richard Baraniuk   Network and user driven alpha-beta
                                  on--off source model for network traffic 335--350
           Cesar A. V. Melo and   
        Nelson L. S. da Fonseca   Envelope process and computation of the
                                  equivalent bandwidth of multifractal
                                  flows  . . . . . . . . . . . . . . . . . 351--375
                Wei-Bo Gong and   
                   Yong Liu and   
               Vishal Misra and   
                    Don Towsley   Self-similarity and long range
                                  dependence on the Internet: a second
                                  look at the evidence, origins and
                                  implications . . . . . . . . . . . . . . 377--399
              Cheolwoo Park and   
Félix Hernández-Campos and   
               J. S. Marron and   
              F. Donelson Smith   Long-range dependence in a changing
                                  Internet traffic mix . . . . . . . . . . 401--422
              Stilian Stoev and   
             Murad S. Taqqu and   
              Cheolwoo Park and   
                   J. S. Marron   On the wavelet spectrum diagnostic for
                                  Hurst parameter estimation in the
                                  analysis of Internet traffic . . . . . . 423--445
                D. A. Rolls and   
             G. Michailidis and   
     F. Hernández-Campos   Queueing analysis of network traffic:
                                  methodology and visualization tools  . . 447--473
                 Han S. Kim and   
                 Ness B. Shroff   The notion of end-to-end capacity and
                                  its application to the estimation of
                                  end-to-end network delays  . . . . . . . 475--488
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 48, Number 4, July 15, 2005

           Eren Gürses and   
         Gozde Bozdagi Akar and   
                      Nail Akar   A simple and effective mechanism for
                                  stored video streaming with TCP
                                  transport and server-side adaptive frame
                                  discard  . . . . . . . . . . . . . . . . 489--501
                   Feng Bao and   
                 Robert H. Deng   Protocols that hide user's preferences
                                  in electronic transactions . . . . . . . 503--515
                 Yu-Yi Chen and   
                Jinn-Ke Jan and   
                 Chin-Ling Chen   A fair and secure mobile billing system  517--524
            Vasil Hnatyshin and   
             Adarshpal S. Sethi   Estimating aggregate resource
                                  reservation for dynamic, scalable, and
                                  fair distribution of bandwidth . . . . . 525--547
                    Qing Ye and   
             Yuecheng Zhang and   
                    Liang Cheng   A study on the optimal time
                                  synchronization accuracy in wireless
                                  sensor networks  . . . . . . . . . . . . 549--566
            Stavros Vrontis and   
               Efstathios Sykas   Extending differentiated services
                                  architecture for multicasting
                                  provisioning . . . . . . . . . . . . . . 567--584
              S. Dharma Rao and   
             C. Siva Ram Murthy   Distributed dynamic QoS-aware routing in
                                  WDM optical networks . . . . . . . . . . 585--604
                   Jun Wang and   
                Yaling Yang and   
                    Li Xiao and   
                Klara Nahrstedt   Edge-based traffic engineering for OSPF
                                  networks . . . . . . . . . . . . . . . . 605--625
                 Min-You Wu and   
                    Yan Zhu and   
                        Wei Shu   Placement of proxy-based multicast
                                  overlays . . . . . . . . . . . . . . . . 627--655
                     Bo Zhu and   
                   Feng Bao and   
             Robert H. Deng and   
       Mohan S. Kankanhalli and   
                    Guilin Wang   Efficient and robust key management for
                                  large mobile ad hoc networks . . . . . . 657--682
          S. S. Chakraborty and   
              M. Liinaharja and   
                    P. Lindroos   Analysis of adaptive GBN schemes in a
                                  Gilbert--Elliott channel and
                                  optimisation of system parameters  . . . 683--695
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 48, Number 5, August 5, 2005

                P. McDaniel and   
                 Aviel D. Rubin   Web security . . . . . . . . . . . . . . 697--699
              David Brumley and   
                      Dan Boneh   Remote timing attacks are practical  . . 701--716
        Christopher Kruegel and   
             Giovanni Vigna and   
              William Robertson   A multi-model approach to the detection
                                  of Web-based attacks . . . . . . . . . . 717--738
              Yao-Wen Huang and   
            Chung-Hung Tsai and   
               Tsung-Po Lin and   
             Shih-Kun Huang and   
                  D. T. Lee and   
                     Sy-Yen Kuo   A testing framework for Web application
                                  security assessment  . . . . . . . . . . 739--761
      Chris Lesniewski-Laas and   
              M. Frans Kaashoek   SSL splitting: Securely serving data
                                  from untrusted caches  . . . . . . . . . 763--779
            Angelos Stavrou and   
              Debra L. Cook and   
          William G. Morein and   
       Angelos D. Keromytis and   
               Vishal Misra and   
                 Dan Rubenstein   WebSOS: an overlay-based system for
                                  protecting web servers from denial of
                                  service attacks  . . . . . . . . . . . . 781--807
             Rakesh Agrawal and   
              Jerry Kiernan and   
       Ramakrishnan Srikant and   
                      Yirong Xu   XPref: a preference language for P3P . . 809--827
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 48, Number 6, August 19, 2005

               P. Balaouras and   
                 I. Stavrakakis   A self-adjusting rate adaptation scheme
                                  with good fairness and smoothness
                                  properties . . . . . . . . . . . . . . . 829--855
           Abderraouf Bahri and   
             Steven Chamberland   On the wireless local area network
                                  design problem with performance
                                  guarantees . . . . . . . . . . . . . . . 856--866
                     Jun He and   
                 Hung Keng Pung   Fairness of medium access control
                                  protocols for multi-hop ad hoc wireless
                                  networks . . . . . . . . . . . . . . . . 867--890
              M. H. Ph\`ung and   
                 K. C. Chua and   
                   G. Mohan and   
                  M. Motani and   
                 T. C. Wong and   
                     P. Y. Kong   On ordered scheduling for optical burst
                                  switching  . . . . . . . . . . . . . . . 891--909
           F. Németh and   
                   P. Barta and   
            R. Szabó and   
          J. Bíró   Network internal traffic
                                  characterization and end-to-end delay
                                  bound calculus for generalized processor
                                  sharing scheduling discipline  . . . . . 910--940
          Roger M. Whitaker and   
             Larry Raisanen and   
                   Steve Hurley   The infrastructure efficiency of
                                  cellular wireless networks . . . . . . . 941--959
               Eitan Altman and   
              Chadi Barakat and   
      Víctor M. Ramos R.   Analysis of AIMD protocols over paths
                                  with variable delay  . . . . . . . . . . 960--971
                  E. Altman and   
             K. Avrachenkov and   
                 C. Barakat and   
              A. A. Kherani and   
                   B. J. Prabhu   Analysis of MIMD congestion control
                                  algorithm for high speed networks  . . . 972--989
                      Anonymous   Author Index . . . . . . . . . . . . . . 990--992
                      Anonymous   Subject Index  . . . . . . . . . . . . . 993--995
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 49, Number 1, September 15, 2005

                  Lars Wolf and   
             Ryohei Nakatsu and   
                   Jesse Schell   Networking issues in entertainment
                                  computing  . . . . . . . . . . . . . . . 1--3
                   V. Ghini and   
                     G. Pau and   
                M. Roccetti and   
                P. Salomoni and   
                       M. Gerla   For here or to go? Downloading music on
                                  the move with an ultra reliable wireless
                                  Internet application . . . . . . . . . . 4--26
                 Jouni Smed and   
           Henrik Niinisalo and   
                  Harri Hakonen   Realizing the bullet time effect in
                                  multiplayer games with local perception
                                  filters  . . . . . . . . . . . . . . . . 27--37
               Aameek Singh and   
                   Arup Acharya   Multiplayer networked gaming with the
                                  session initiation protocol  . . . . . . 38--51
                  Mark Claypool   The effect of latency on user
                                  performance in Real-Time Strategy games  52--70
                 Amit Sinha and   
           Kenneth Mitchell and   
                     Deep Medhi   Network game traffic: A broadband access
                                  perspective  . . . . . . . . . . . . . . 71--83
               Kang-Won Lee and   
                Bong-Jun Ko and   
                  Seraphin Calo   Adaptive server selection for large
                                  scale interactive online games . . . . . 84--102
          Thanh Vinh Nguyen and   
              Farzad Safaei and   
              Paul Boustead and   
                 Chun Tung Chou   Provisioning overlay distribution
                                  networks . . . . . . . . . . . . . . . . 103--118
                      Anonymous   Editorial board  . . . . . . . . . . . . CO2--CO2

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 49, Number 2, October 5, 2005

              Janise McNair and   
                 Tuna Tugcu and   
                 Wenye Wang and   
              Jiang (Linda) Xie   A survey of cross-layer performance
                                  enhancements for Mobile IP networks  . . 119--146
          Ioannis Ioannidis and   
                   Ananth Grama   Level compressed DAGs for lookup tables  147--160
               Fahd Alharbi and   
                  Nirwan Ansari   Distributed bandwidth allocation for
                                  resilient packet ring networks . . . . . 161--171
                Jyh-haw Yeh and   
                  Wei Zhang and   
                Wen-chen Hu and   
                  Chung-wei Lee   Design and simulation of a supplemental
                                  protocol for BGP . . . . . . . . . . . . 172--200
                   Fei Long and   
                  Gang Feng and   
               Chee Kheong Siew   Channel states dependent fair service: a
                                  new packet scheduling algorithm for CDMA 201--216
                Sungwoo Tak and   
                   Eun Kyo Park   Modeling and performance study of
                                  restoration framework in WDM optical
                                  networks . . . . . . . . . . . . . . . . 217--242
                 Nigel Bean and   
                    Andre Costa   An analytic modelling approach for
                                  network routing algorithms that use
                                  ``ant-like'' mobile agents . . . . . . . 243--268
          Michael Savori\'c and   
                Holger Karl and   
       Morten Schläger and   
          Tobias Poschwatta and   
                    Adam Wolisz   Analysis and performance evaluation of
                                  the EFCM common congestion controller
                                  for TCP connections  . . . . . . . . . . 269--294
                      Anonymous   Editorial board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 49, Number 3, October 19, 2005

             Bernhard Walke and   
            Luciano Lenzini and   
                  Bijan Jabbari   Guest editorial  . . . . . . . . . . . . 295--298
            Patrick Herhold and   
         Ernesto Zimmermann and   
               Gerhard Fettweis   Cooperative multi-hop transmission in
                                  wireless networks  . . . . . . . . . . . 299--324
                Ingo Forkel and   
            Hartmut Klenner and   
                 Andreas Kemper   High Speed Downlink Packet Access
                                  (HSDPA)---Enhanced Data Rates for UMTS
                                  Evolution  . . . . . . . . . . . . . . . 325--340
              Christian Hoymann   Analysis and performance evaluation of
                                  the OFDM-based metropolitan area network
                                  IEEE 802.16  . . . . . . . . . . . . . . 341--363
                Ian Herwono and   
              Joachim Sachs and   
                    Ralf Keller   Provisioning and performance of
                                  mobility-aware personalized push
                                  services in wireless broadband hotspots  364--384
                 Dirk Pesch and   
          Maria Isabel Pous and   
                   Gerry Foster   Performance evaluation of SIP-based
                                  multimedia services in UMTS  . . . . . . 385--403
            Javier Gozalvez and   
                    John Dunlop   System performance and adaptive
                                  configuration of link adaptation
                                  techniques in packet-switched cellular
                                  radio networks . . . . . . . . . . . . . 404--426
              Marco Liebsch and   
                Bernd Lamparter   A generic IP paging architecture and
                                  protocol . . . . . . . . . . . . . . . . 427--448
               Tianwei Chen and   
             Michel Sortais and   
   Günter Schäfer and   
               Stefan Adams and   
              Changpeng Fan and   
                    Adam Wolisz   Performance analysis of a Denial of
                                  Service protection scheme for optimized
                                  and QoS-aware handover . . . . . . . . . 449--464
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 49, Number 4, November 15, 2005

              Tat Wing Chim and   
              Kwan L. Yeung and   
                  King-Shan Lui   Traffic distribution over
                                  equal-cost-multi-paths . . . . . . . . . 465--475
               Chenghuai Lu and   
         Andre L. M. Dos Santos   A note on efficient implementation of
                                  prime generation algorithms in small
                                  portable devices . . . . . . . . . . . . 476--491
       Riccardo Lancellotti and   
          Francesca Mazzoni and   
              Michele Colajanni   Hybrid cooperative schemes for scalable
                                  and stable performance of Web content
                                  delivery . . . . . . . . . . . . . . . . 492--511
               Kemal Akkaya and   
             Mohamed Younis and   
               Meenakshi Bangad   Sink repositioning for enhanced
                                  performance in wireless sensor networks  512--534
                Rongxing Lu and   
                     Zhenfu Cao   Efficient remote user authentication
                                  scheme using smart card  . . . . . . . . 535--540
            Claudio Casetti and   
                   Marco Mellia   A lightweight marker with partial state
                                  information for DiffServ networks  . . . 541--560
       Harsha V. Madhyastha and   
        Girish V. Chowdhary and   
                N. Srinivas and   
             C. Siva Ram Murthy   Grooming of multicast sessions in
                                  metropolitan WDM ring networks . . . . . 561--579
               Fengyuan Ren and   
                 Chuang Lin and   
                         Bo Wei   A nonlinear control theoretic analysis
                                  to TCP--RED system . . . . . . . . . . . 580--592
                 Samphel Norden   Inter-domain routing: Algorithms for QoS
                                  guarantees . . . . . . . . . . . . . . . 593--619
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 49, Number 5, December 5, 2005

                      Anonymous   Contents . . . . . . . . . . . . . . . . 621--621
             Dieter Hogrefe and   
                      Rick Reed   Telecommunications and UML languages . . 622--626
                Nico de Wet and   
              Pieter Kritzinger   Using UML models for the performance
                                  analysis of network systems  . . . . . . 627--642
               Daniel Amyot and   
             Luigi Logrippo and   
                  Michael Weiss   Generation of test purposes from Use
                                  Case Maps  . . . . . . . . . . . . . . . 643--660
             A. Letichevsky and   
              J. Kapitonova and   
         A. Letichevsky Jr. and   
                  V. Volkov and   
                 S. Baranov and   
                     T. Weigert   Basic protocols, message sequence
                                  charts, and the verification of
                                  requirements specifications  . . . . . . 661--675
            Joachim Fischer and   
              Eckhardt Holz and   
              Andreas Prinz and   
               Markus Scheidgen   Tool-based language development  . . . . 676--688
              Ingmar Fliege and   
          Alexander Geraldy and   
          Reinhard Gotzhein and   
                Thomas Kuhn and   
                Christian Webel   Developing safety-critical real-time
                                  systems with SDL design patterns and
                                  components . . . . . . . . . . . . . . . 689--706
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 49, Number 6, December 19, 2005

     Lenka Motycková and   
                  David A. Carr   A cluster-tree protocol for reliable
                                  multicasting . . . . . . . . . . . . . . 707--726
                 Anwar Alyatama   Wavelength decomposition approach for
                                  computing blocking probabilities in WDM
                                  optical networks without wavelength
                                  conversions  . . . . . . . . . . . . . . 727--742
               Aline Baggio and   
              Maarten van Steen   Distributed redirection for the
                                  World-Wide Web . . . . . . . . . . . . . 743--765
           Abdelhamid Nafaa and   
                  Ahmed Mehaoua   Joint loss pattern characterization and
                                  unequal interleaved FEC protection for
                                  robust H.264 video distribution over
                                  wireless LAN . . . . . . . . . . . . . . 766--786
           Muhammed Salamah and   
                Hashem Lababidi   Dynamically adaptive channel reservation
                                  scheme for cellular networks . . . . . . 787--796
        Antonio Pietrabissa and   
          Tiziano Inzerilli and   
            Olivier Alphand and   
             Pascal Berthou and   
            Thierry Gayraud and   
            Michel Mazzella and   
             Eddy Fromentin and   
                  Fabrice Lucas   Validation of a QoS architecture for
                                  DVB-RCS satellite networks via the
                                  SATIP6 demonstration platform  . . . . . 797--815
              XiaoLin Chang and   
              Jogesh K. Muppala   On improving bandwidth assurance in
                                  AF-based DiffServ networks using a
                                  control theoretic approach . . . . . . . 816--839
              Ozgur Ercetin and   
             Leandros Tassiulas   Pricing strategies for differentiated
                                  services content delivery networks . . . 840--855
          Ronaldo M. Salles and   
               Javier A. Barria   Fair and efficient dynamic bandwidth
                                  allocation for multi-application
                                  networks . . . . . . . . . . . . . . . . 856--877
      Mozafar Bag-Mohammadi and   
                 Nasser Yazdani   Next Branch Multicast (NBM) routing
                                  protocol . . . . . . . . . . . . . . . . 878--897
                      Anonymous   Subject Index  . . . . . . . . . . . . . 898--900


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 50, Number 1, January 16, 2006

           Christos Nomikos and   
            Aris Pagourtzis and   
            Katerina Potika and   
                 Stathis Zachos   Routing and wavelength assignment in
                                  multifiber WDM networks with non-uniform
                                  fiber cost . . . . . . . . . . . . . . . 1--14
                   Yuming Jiang   Delay bound and packet scale rate
                                  guarantee for some expedited forwarding
                                  networks . . . . . . . . . . . . . . . . 15--28
            Thijs Lambrecht and   
             Bart Duysburgh and   
                Tim Wauters and   
             Filip De Turck and   
                Bart Dhoedt and   
                 Piet Demeester   Optimizing multimedia transcoding
                                  multicast trees  . . . . . . . . . . . . 29--45
               Kun-chan Lan and   
                 John Heidemann   A measurement study of correlations of
                                  Internet flow characteristics  . . . . . 46--62
           Daniele Miorandi and   
           Arzad A. Kherani and   
                   Eitan Altman   A queueing model for HTTP traffic over
                                  IEEE 802.11 WLANs  . . . . . . . . . . . 63--79
               Jun-Hong Cui and   
                     Li Lao and   
         Michalis Faloutsos and   
                    Mario Gerla   AQoSM: Scalable QoS multicast
                                  provisioning in Diff-Serv networks . . . 80--105
              An-Hsun Cheng and   
                 Yuh-Jzer Joung   Probabilistic file indexing and
                                  searching in unstructured peer-to-peer
                                  networks . . . . . . . . . . . . . . . . 106--127
               N. Bartolini and   
                 E. Casalicchio   A performance analysis of context
                                  transfer protocols for QoS enabled
                                  Internet services  . . . . . . . . . . . 128--144
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 50, Number 2, February 8, 2006

                   Harry Perros   Optical networks . . . . . . . . . . . . 145--148
                Li-Wei Chen and   
      Poompat Saengudomlert and   
                  Eytan Modiano   Uniform versus non-uniform band
                                  switching in WDM networks  . . . . . . . 149--167
                Anwar Haque and   
                 Pin-Han Ho and   
                  Raouf Boutaba   Group shared protection for spare
                                  capacity reconfiguration in optical
                                  networks . . . . . . . . . . . . . . . . 168--180
       Michael T. Frederick and   
               Pallab Datta and   
                 Arun K. Somani   Sub-graph routing: A generalized
                                  fault-tolerant strategy for link
                                  failures in WDM optical networks . . . . 181--199
        Narendra K. Singhal and   
                  Canhui Ou and   
            Biswanath Mukherjee   Cross-sharing vs. self-sharing trees for
                                  protecting multicast sessions in mesh
                                  networks . . . . . . . . . . . . . . . . 200--206
              Achille Pattavina   Performance of deflection routing
                                  algorithms in IP optical transport
                                  networks . . . . . . . . . . . . . . . . 207--218
     Tzvetelina Battestilli and   
                   Harry Perros   A performance study of an optical burst
                                  switched network with dynamic
                                  simultaneous link possession . . . . . . 219--236
          Nizar Bouabdallah and   
           Andre-Luc Beylot and   
                    Guy Pujolle   Efficient bandwidth sharing and fair
                                  access in single-hub WDM rings . . . . . 237--250
   Eva Marín-Tordera and   
         Xavier Masip-Bruin and   
Sergio Sánchez-Lopez and   
   Josep Solé-Pareta and   
          Jordi Domingo-Pascual   A hierarchical routing approach for
                                  optical transport networks . . . . . . . 251--267
                Lorne Mason and   
            Anton Vinokurov and   
                  Ning Zhao and   
                    David Plant   Topological design and dimensioning of
                                  Agile All-Photonic Networks  . . . . . . 268--287
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 50, Number 3, February 22, 2006

              Sun-Myeng Kim and   
                 Young-Jong Cho   A distributed collision resolution
                                  scheme for improving the performance in
                                  wireless LANs  . . . . . . . . . . . . . 289--300
                  Qin Zheng and   
                 Gurusamy Mohan   Multi-layer protection in IP-over-WDM
                                  networks with and with no backup
                                  lightpath sharing  . . . . . . . . . . . 301--316
             Randeep Bhatia and   
            Murali Kodialam and   
                 T. V. Lakshman   Fast network re-optimization schemes for
                                  MPLS and optical networks  . . . . . . . 317--331
         Leopoldo Angrisani and   
        Salvatore D'Antonio and   
          Marcello Esposito and   
                Michele Vadursi   Techniques for available bandwidth
                                  measurement in IP networks: A
                                  performance comparison . . . . . . . . . 332--349
               Yongqing Zhu and   
                   Maode Ma and   
                Tee Hiang Cheng   Hierarchical scheduling to support
                                  differentiated services in Ethernet
                                  passive optical networks . . . . . . . . 350--366
             Dario Di Sorte and   
           Mauro Femminella and   
        Leonardo Piacentini and   
                 Gianluca Reali   Performance evaluation of the
                                  push-mode-multicast based candidate
                                  access router discovery (PMM CARD) . . . 367--397
                    Dan Pei and   
             Beichuan Zhang and   
              Daniel Massey and   
                    Lixia Zhang   An analysis of convergence delay in path
                                  vector routing protocols . . . . . . . . 398--421
      Kartikeya Chandrayana and   
  Sthanunathan Ramakrishnan and   
              Biplab Sikdar and   
         Shivkumar Kalyanaraman   On randomizing the sending times in TCP
                                  and other window based algorithms  . . . 422--447
         Nicolas Bonmariage and   
                      Guy Leduc   A survey of optimal network congestion
                                  control for unicast and multicast
                                  transmission . . . . . . . . . . . . . . 448--468
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 50, Number 4, March 15, 2006

              Raouf Boutaba and   
                  Alan Marshall   Management in peer-to-peer systems:
                                  Trust, reputation and security . . . . . 469--471
               Sergio Marti and   
           Hector Garcia-Molina   Taxonomy of trust: Categorizing P2P
                                  reputation systems . . . . . . . . . . . 472--484
           Zoran Despotovic and   
                    Karl Aberer   P2P reputation management: Probabilistic
                                  estimation vs. social networks . . . . . 485--500
               Minaxi Gupta and   
           Mostafa H. Ammar and   
                Mustaque Ahamad   Trade-offs between reliability and
                                  overheads in peer-to-peer reputation
                                  tracking . . . . . . . . . . . . . . . . 501--522
               Rob Sherwood and   
              Seungjoon Lee and   
            Bobby Bhattacharjee   Cooperative peer groups in NICE  . . . . 523--544
             Loubna Mekouar and   
              Youssef Iraqi and   
                  Raouf Boutaba   Peer-to-peer's most wanted: Malicious
                                  peers  . . . . . . . . . . . . . . . . . 545--562
    Thanasis G. Papaioannou and   
            George D. Stamoulis   Reputation-based policies that provide
                                  the right incentives in peer-to-peer
                                  environments . . . . . . . . . . . . . . 563--578
               Vivek Pathak and   
                   Liviu Iftode   Byzantine fault tolerant public key
                                  authentication in peer-to-peer systems   579--596
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 50, Number 5, April 6, 2006

            Ian F. Akyildiz and   
                    Harry Rudin   Editorial  . . . . . . . . . . . . . . . 597--598
      Levente Tamási and   
     Dániel Orincsay and   
Balázs Gábor Józsa   Cost-optimal design of VoIP networks
                                  using the VPN concept  . . . . . . . . . 599--614
                Edith Cohen and   
      Balachander Krishnamurthy   A short walk in the Blogistan  . . . . . 615--630
          Hans van den Berg and   
             Michel Mandjes and   
         Remco van de Meent and   
                  Aiko Pras and   
              Frank Roijers and   
                Pieter Venemans   QoS-aware bandwidth provisioning for IP
                                  network links  . . . . . . . . . . . . . 631--647
                Shudong Jin and   
                 Azer Bestavros   Small-world characteristics of Internet
                                  topologies and implications on multicast
                                  scaling  . . . . . . . . . . . . . . . . 648--666
                Weiying Zhu and   
                       Min Song   Integration of unicast and multicast
                                  scheduling in input-queued packet
                                  switches . . . . . . . . . . . . . . . . 667--687
               Fulvio Risso and   
                    Mario Baldi   NetPDL: An extensible XML-based language
                                  for packet header description  . . . . . 688--706
                      Bo Li and   
            Roberto Battiti and   
                   Akira Fukuda   Performance analysis of a
                                  service-dependent handoff scheme in
                                  voice/data integrated cellular mobile
                                  systems  . . . . . . . . . . . . . . . . 707--730
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 50, Number 6, April 13, 2006

                   L. Mathy and   
               D. Hutchison and   
               T. Plagemann and   
                  P. Steenkiste   Overlay distribution structures and
                                  their applications . . . . . . . . . . . 739--741
                   Yong Zhu and   
      Constantinos Dovrolis and   
                  Mostafa Ammar   Dynamic overlay routing based on
                                  available bandwidth estimation: A
                                  simulation study . . . . . . . . . . . . 742--762
                    Ju Wang and   
                Andrew A. Chien   Understanding when location-hiding using
                                  overlay networks is feasible . . . . . . 763--780
             Beichuan Zhang and   
                Wenjie Wang and   
                Sugih Jamin and   
              Daniel Massey and   
                    Lixia Zhang   Universal IP multicast delivery  . . . . 781--806
   Karthik Lakshminarayanan and   
                 Ananth Rao and   
                 Ion Stoica and   
                  Scott Shenker   End-host controlled multicast routing    807--825
             Suman Banerjee and   
     Christopher Kommareddy and   
                Koushik Kar and   
        Bobby Bhattacharjee and   
                  Samir Khuller   OMNI: An efficient overlay multicast
                                  infrastructure for real-time
                                  applications . . . . . . . . . . . . . . 826--841
                 Jian Liang and   
               Rakesh Kumar and   
                  Keith W. Ross   The FastTrack overlay: A measurement
                                  study  . . . . . . . . . . . . . . . . . 842--858
                Xiaotao Liu and   
                  Jiang Lan and   
            Prashant Shenoy and   
              Krithi Ramaritham   Consistency maintenance in dynamic
                                  peer-to-peer overlay networks  . . . . . 859--876
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 50, Number 7, May 15, 2006

               V. C. Gungor and   
                  F. C. Lambert   A survey on communication networks for
                                  electric system automation . . . . . . . 877--897
                   M. Fazio and   
                 M. Villari and   
                   A. Puliafito   IP address autoconfiguration in ad hoc
                                  networks: Design, implementation and
                                  measurements . . . . . . . . . . . . . . 898--920
                 Hongli Luo and   
              Mei-Ling Shyu and   
                 Shu-Ching Chen   An optimal resource utilization scheme
                                  with end-to-end congestion control for
                                  continuous media stream transmission . . 921--937
              Erdal Cayirci and   
               Vedat Coskun and   
                   Caghan Cimen   Querying sensor networks by using
                                  dynamic task sets  . . . . . . . . . . . 938--952
              Rong-Hong Jan and   
             Ching-Peng Lin and   
                Maw-Sheng Chern   An optimization model for Web content
                                  adaptation . . . . . . . . . . . . . . . 953--965
             Antonio Capone and   
               Luigi Fratta and   
                Fabio Martignon   Dynamic online QoS routing schemes:
                                  Performance and bounds . . . . . . . . . 966--981
               Eitan Altman and   
              Dhiman Barman and   
           Rachid El Azouzi and   
                  David Ros and   
                   Bruno Tuffin   Pricing differentiated services: A
                                  game-theoretic approach  . . . . . . . . 982--1002
                    Xudong Wang   A capacity acquisition protocol for
                                  channel reservation in CDMA networks . . 1003--1021
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 50, Number 8, June 6, 2006

           Giuseppe Bianchi and   
             Marco Listanti and   
                Michela Meo and   
           Maurizio M. Munaf\`o   Selected papers from the 3rd
                                  international workshop on QoS in
                                  multiservice IP networks (QoS-IP 2005)   1023--1025
              Markus Fidler and   
                 Stephan Recker   Conjugate network calculus: A dual
                                  approach applying the Legendre transform 1026--1039
          Alexander Sayenko and   
Timo Hämäläinen and   
          Jyrki Joutsensalo and   
                  Lari Kannisto   Comparison and analysis of the
                                  revenue-based adaptive queuing models    1040--1058
                   J. Leino and   
                     J. Virtamo   Insensitive load balancing in data
                                  networks . . . . . . . . . . . . . . . . 1059--1068
             Raffaele Bolla and   
            Roberto Bruschi and   
                  Franco Davoli   Capacity planning in IP Virtual Private
                                  Networks under mixed traffic . . . . . . 1069--1085
         Emilio C. G. Wille and   
               Marco Mellia and   
            Emilio Leonardi and   
            Marco Ajmone Marsan   Algorithms for IP network design with
                                  end-to-end QoS constraints . . . . . . . 1086--1103
     György Dán and   
      Viktória Fodor and   
                Gunnar Karlsson   On the effects of the packet size
                                  distribution on FEC performance  . . . . 1104--1129
             Manodha Gamage and   
            Mitsuo Hayasaka and   
                   Tetsuya Miki   A connection-oriented network
                                  architecture with guaranteed QoS for
                                  future real-time applications over the
                                  Internet . . . . . . . . . . . . . . . . 1130--1144
   Cédric de Launois and   
              Bruno Quoitin and   
            Olivier Bonaventure   Leveraging network performance with IPv6
                                  multihoming and multiple
                                  provider-dependent aggregatable prefixes 1145--1157
            Liesbeth Peters and   
             Ingrid Moerman and   
                Bart Dhoedt and   
                 Piet Demeester   Q-MEHROM: Mobility support and resource
                                  reservations for mobile senders and
                                  receivers  . . . . . . . . . . . . . . . 1158--1175
            Giovanni Neglia and   
          Vincenzo Falletta and   
               Giuseppe Bianchi   An analytical model of a new packet
                                  marking algorithm for TCP flows  . . . . 1176--1191
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 50, Number 9, June 20, 2006

    Öznur Özkasap and   
           Mine Ça\uglar   Traffic characterization of transport
                                  level reliable multicasting: Comparison
                                  of epidemic and feedback controlled loss
                                  recovery . . . . . . . . . . . . . . . . 1193--1218
              Dianxun Shuai and   
                     Xiang Feng   The parallel optimization of network
                                  bandwidth allocation based on
                                  generalized particle model . . . . . . . 1219--1246
               Kuo-Feng Ssu and   
             Chih-Hsun Chou and   
     Hewijin Christine Jiau and   
                      Wei-Te Hu   Detection and diagnosis of data
                                  inconsistency failures in wireless
                                  sensor networks  . . . . . . . . . . . . 1247--1260
          Flavio De Angelis and   
              Ibrahim Habib and   
            Fabrizio Davide and   
             Mahmoud Naghshineh   Increasing revenues via adaptive
                                  filtering in wired/wireless networks . . 1261--1280
                    Tian Bu and   
             Samphel Norden and   
                     Thomas Woo   A survivable DoS-resistant overlay
                                  network  . . . . . . . . . . . . . . . . 1281--1301
                 Jiwei Chen and   
          Fernando Paganini and   
             M. Y. Sanadidi and   
                   Ren Wang and   
                    Mario Gerla   Fluid-flow analysis of TCP Westwood with
                                  RED  . . . . . . . . . . . . . . . . . . 1302--1326
       Stéphane Lafrance   Using equivalence-checking to verify
                                  robustness to denial of service  . . . . 1327--1348
       T. Bheemarjuna Reddy and   
                  S. Sriram and   
                B. S. Manoj and   
             C. Siva Ram Murthy   MuSeQoR: Multi-path failure-tolerant
                                  security-aware QoS routing in Ad hoc
                                  wireless networks  . . . . . . . . . . . 1349--1383
                 Hailong Li and   
        Malvin Wei Liak Tan and   
                Ian Li-Jin Thng   Fairness issue and monitor-based
                                  algorithm in optical burst switching
                                  networks . . . . . . . . . . . . . . . . 1384--1405
                Fu-Yuan Lee and   
                Shiuhpyng Shieh   Packet classification using
                                  diagonal-based tuple space search  . . . 1406--1423
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 50, Number 10, July 14, 2006

                Mark Levene and   
        Alexandra Poulovassilis   Special issue on Web dynamics  . . . . . 1425--1429
                  Yiping Ke and   
                   Lin Deng and   
                 Wilfred Ng and   
                    Dik-Lun Lee   Web dynamics and their ramifications for
                                  the development of Web search engines    1430--1447
             Judit Bar-Ilan and   
         Mazlita Mat-Hassan and   
                    Mark Levene   Methods for comparing rankings of search
                                  engine results . . . . . . . . . . . . . 1448--1463
        Ricardo Baeza-Yates and   
                Barbara Poblete   Dynamics of the Chilean Web structure    1464--1473
                  Hua-Fu Li and   
                Suh-Yin Lee and   
                  Man-Kwan Shan   DSM-PLW: Single-pass mining of path
                                  traversal patterns over streaming Web
                                  click-sequences  . . . . . . . . . . . . 1474--1487
              Olfa Nasraoui and   
               Carlos Rojas and   
                  Cesar Cardona   A framework for mining evolving trends
                                  in Web data streams using dynamic
                                  learning and retrospective validation    1488--1512
          George Papamarkos and   
    Alexandra Poulovassilis and   
                  Peter T. Wood   Event-condition-action rules on RDF
                                  metadata in P2P environments . . . . . . 1513--1532
               Stefano Ceri and   
             Florian Daniel and   
              Federico M. Facca   Modeling web applications reacting to
                                  user behaviors . . . . . . . . . . . . . 1533--1546
                Anoop Sanka and   
          Shravan Chamakura and   
            Sharma Chakravarthy   A dataflow approach to efficient change
                                  detection of HTML/XML documents in
                                  WebVigiL . . . . . . . . . . . . . . . . 1547--1563
         Delfina Malandrino and   
               Vittorio Scarano   Tackling Web dynamics by programmable
                                  proxies  . . . . . . . . . . . . . . . . 1564--1580
          Roberto De Prisco and   
                Sergio Rajsbaum   Algorithmic problems in distributed
                                  systems  . . . . . . . . . . . . . . . . 1581--1582
                Qixiang Sun and   
               Neil Daswani and   
           Hector Garcia-Molina   Maximizing remote work in flooding-based
                                  peer-to-peer systems . . . . . . . . . . 1583--1598
   J. J. Garcia-Luna-Aceves and   
                 Marc Mosko and   
             Charles E. Perkins   A new approach to on-demand loop-free
                                  routing in networks using sequence
                                  numbers  . . . . . . . . . . . . . . . . 1599--1615
              Ittai Abraham and   
                    Danny Dolev   Asynchronous resource discovery  . . . . 1616--1629
          Pierre Fraigniaud and   
                 Cyril Gavoille   Header-size lower bounds for end-to-end
                                  communication in memoryless networks . . 1630--1638
        Claude Castelluccia and   
         Stanis\law Jarecki and   
                  Jihye Kim and   
                    Gene Tsudik   Secure acknowledgment aggregation and
                                  multisignatures with limited robustness  1639--1652
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 50, Number 11, August 10, 2006

                    Hua Zhu and   
                Imrich Chlamtac   Admission control and bandwidth
                                  reservation in multi-hop ad hoc networks 1653--1674
              Puneet Sharma and   
               Jack Brassil and   
                Sung-Ju Lee and   
                   Kang G. Shin   Improving aggregated channel performance
                                  through decentralized channel monitoring 1675--1691
             T. Tansupasiri and   
             K. Kanchanasut and   
                 C. Barakat and   
                     P. Jacquet   Using active networks technology for
                                  dynamic QoS  . . . . . . . . . . . . . . 1692--1709
      Gustavo B. Figueiredo and   
    Nelson L. S. da Fonseca and   
     José A. S. Monteiro   A minimum interference routing algorithm
                                  with reduced computational complexity    1710--1732
                  Hao Shang and   
                 Craig E. Wills   Piggybacking related domain names to
                                  improve DNS performance  . . . . . . . . 1733--1748
              Albert Banchs and   
                   Luca Vollero   Throughput analysis and optimal
                                  configuration of 802.11e EDCA  . . . . . 1749--1768
         Serge A. Krashakov and   
           Anton B. Teslyuk and   
                  Lev N. Shchur   On the universality of rank
                                  distributions of website popularity  . . 1769--1780
                Eunjin Jung and   
                Alex X. Liu and   
               Mohamed G. Gouda   Key bundles and parcels: Secure
                                  communication in many groups . . . . . . 1781--1798
               Eitan Altman and   
           Rachid El Azouzi and   
                  David Ros and   
                   Bruno Tuffin   Loss strategies for competing AIMD flows 1799--1815
              Hyang-Won Lee and   
                     Song Chong   A distributed utility max--min flow
                                  control algorithm  . . . . . . . . . . . 1816--1830
            Florin Baboescu and   
           Priyank Warkhede and   
               Subhash Suri and   
                George Varghese   Fast packet classification for
                                  two-dimensional conflict-free filters    1831--1842
       Georgios Kambourakis and   
            Angelos Rouskas and   
         Stefanos Gritzalis and   
          Dimitrios Geneiatakis   Support of subscribers' certificates in
                                  a hybrid WLAN-3G environment . . . . . . 1843--1859
          Antonios Argyriou and   
                Vijay Madisetti   A soft-handoff transport protocol for
                                  media flows in heterogeneous mobile
                                  networks . . . . . . . . . . . . . . . . 1860--1871
              Hechmi Khlifi and   
   Jean-Charles Grégoire   Low-complexity offline and online clock
                                  skew estimation and removal  . . . . . . 1872--1884
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 50, Number 12, August 24, 2006

            Jennifer C. Hou and   
                    P. R. Kumar   Network modelling and simulation . . . . 1885--1886
                  Yijie Han and   
              Richard J. La and   
         Armand M. Makowski and   
                  Seungjoon Lee   Distribution of path durations in mobile
                                  ad-hoc networks---Palm's Theorem to the
                                  rescue . . . . . . . . . . . . . . . . . 1887--1900
            Kyung-Joon Park and   
                   Hyuk Lim and   
                  Chong-Ho Choi   Stochastic analysis of packet-pair
                                  probing for network bandwidth estimation 1901--1915
                Xiaojun Hei and   
             Brahim Bensaou and   
              Danny H. K. Tsang   Model-based end-to-end available
                                  bandwidth inference using queueing
                                  analysis . . . . . . . . . . . . . . . . 1916--1937
            Tuna Güven and   
              Richard J. La and   
            Mark A. Shayman and   
            Bobby Bhattacharjee   Measurement-based optimal routing on
                                  overlay architectures for unicast
                                  sessions . . . . . . . . . . . . . . . . 1938--1951
      Rachid El Abdouni Khayari   Design and evaluation of web proxies by
                                  leveraging self-similarity of web
                                  traffic  . . . . . . . . . . . . . . . . 1952--1973
       Daniel R. Figueiredo and   
                Benyuan Liu and   
                   Yang Guo and   
                 Jim Kurose and   
                    Don Towsley   On the efficiency of fluid simulation of
                                  networks . . . . . . . . . . . . . . . . 1974--1994
                   Hwangnam Kim   Integrating network-calculus-based
                                  simulation with packet-level simulation
                                  for TCP-operated networks  . . . . . . . 1995--2012
Xenofontas A. Dimitropoulos and   
                George F. Riley   Efficient large-scale BGP simulations    2013--2027
                     Yu Liu and   
      Boleslaw K. Szymanski and   
                   Adnan Saifee   Genesis: A scalable distributed system
                                  for large-scale parallel network
                                  simulation . . . . . . . . . . . . . . . 2028--2053
                     Li Lao and   
               Jun-Hong Cui and   
                    Mario Gerla   A framework for realistic and systematic
                                  multicast performance evaluation . . . . 2054--2070
               Assen Golaup and   
                  Hamid Aghvami   A multimedia traffic modeling framework
                                  for simulation-based performance
                                  evaluation studies . . . . . . . . . . . 2071--2087
             Mario Marchese and   
              Maurizio Mongelli   On-line bandwidth control for quality of
                                  service mapping over satellite
                                  independent service access points  . . . 2088--2111
                Frank Y. Li and   
               Norvald Stol and   
               Bjarne E. Helvik   Conformance deterioration in QoS
                                  networks: Phenomenon, analysis and
                                  elimination  . . . . . . . . . . . . . . 2112--2126
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 50, Number 13, September 15, 2006

            Ian F. Akyildiz and   
               Won-Yeol Lee and   
            Mehmet C. Vuran and   
              Shantidev Mohanty   NeXt generation/dynamic spectrum
                                  access/cognitive radio wireless
                                  networks: A survey . . . . . . . . . . . 2127--2159
               Jianping Zou and   
          M. Ümit Uyar and   
           Mariusz A. Fecko and   
                  Sunil Samtani   Throughput models for SCTP with parallel
                                  subflows . . . . . . . . . . . . . . . . 2160--2182
               Mingwei Gong and   
               Carey Williamson   Revisiting unfairness in Web server
                                  scheduling . . . . . . . . . . . . . . . 2183--2203
              Xiaolin Chang and   
              Jogesh K. Muppala   A stable queue-based adaptive controller
                                  for improving AQM performance  . . . . . 2204--2224
          Venkatesh Obanaik and   
           Lillykutty Jacob and   
                   A. L. Ananda   Secure performance enhancing proxy: To
                                  ensure end-to-end security and enhance
                                  TCP performance over IPv6 wireless
                                  networks . . . . . . . . . . . . . . . . 2225--2238
                Yunkai Zhou and   
                   Harish Sethu   On achieving fairness in the joint
                                  allocation of buffer and bandwidth
                                  resources: Principles and algorithms . . 2239--2254
             Seung Chul Han and   
               Puneet Zaroo and   
            David K. Y. Yau and   
                    Yu Dong and   
               Prem Gopalan and   
                 John C. S. Lui   Quality of service provisioning for
                                  composable routing elements  . . . . . . 2255--2270
               Lotfi Mhamdi and   
               Mounir Hamdi and   
        Christopher Kachris and   
               Stephan Wong and   
           Stamatis Vassiliadis   High-performance switching based on
                                  buffered crossbar fabrics  . . . . . . . 2271--2285
                   E. Atteo and   
                S. Avallone and   
                   S. P. Romano   A link weight assignment algorithm for
                                  traffic-engineered networks  . . . . . . 2286--2294
                   T. Heikkinen   A potential game approach to distributed
                                  power control and scheduling . . . . . . 2295--2311
                 Haibin Sun and   
             John C. S. Lui and   
                David K. Y. Yau   Distributed mechanism in detecting and
                                  defending against the low-rate TCP
                                  attack . . . . . . . . . . . . . . . . . 2312--2330
              Mina Guirguis and   
             Azer Bestavros and   
                  Ibrahim Matta   Exogenous-loss aware traffic management
                                  in overlay networks: Toward global
                                  fairness . . . . . . . . . . . . . . . . 2331--2348
            Satyajeet Ahuja and   
               Marwan Krunz and   
                 Turgay Korkmaz   Optimal path selection for minimizing
                                  the differential delay in
                                  Ethernet-over-SONET  . . . . . . . . . . 2349--2363
                   Shu Shen and   
                 Gaoxi Xiao and   
                Tee Hiang Cheng   Benefits of advertising wavelength
                                  availability in distributed lightpath
                                  establishment  . . . . . . . . . . . . . 2364--2379
            Brian F. Cooper and   
           Hector Garcia-Molina   SIL: A model for analyzing scalable
                                  peer-to-peer search networks . . . . . . 2380--2400
                    Kui Ren and   
                Wenjing Lou and   
                   Kai Zeng and   
                   Feng Bao and   
              Jianying Zhou and   
                 Robert H. Deng   Routing optimization security in mobile
                                  IPv6 . . . . . . . . . . . . . . . . . . 2401--2419
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 50, Number 14, October 5, 2006

          Bernhard Plattner and   
           James P. G. Sterbenz   Guest Editorial  . . . . . . . . . . . . 2421--2425
              Nadia Shalaby and   
          Yitzchak Gottlieb and   
            Mike Wawrzoniak and   
                 Larry Peterson   Snow on silk: Layering NodeOS
                                  functionality on conventional operating
                                  systems  . . . . . . . . . . . . . . . . 2426--2443
                Herbert Bos and   
                Bart Samwel and   
                     Ilja Booij   Dynamically extending the Corral with
                                  native code for high-speed packet
                                  processing . . . . . . . . . . . . . . . 2444--2461
                Austin Donnelly   Lightweight thread tunnelling in network
                                  applications . . . . . . . . . . . . . . 2462--2474
       Chetan Singh Dhillon and   
                  Mary Bond and   
            James Griffioen and   
             Kenneth L. Calvert   Building layered active services . . . . 2475--2487
                  S. Schmid and   
                   T. Chart and   
               M. Sifalakis and   
                    A. C. Scott   A highly flexible service composition
                                  framework for real-life networks . . . . 2488--2505
            Marcin Solarski and   
          Matthias Bossardt and   
                  Thomas Becker   Deployment and management of
                                  component-based services in active
                                  networks . . . . . . . . . . . . . . . . 2506--2518
                 Paul Smith and   
             Steven Simpson and   
                David Hutchison   Locating resources in a programmable
                                  networking environment . . . . . . . . . 2519--2531
                Amit Sehgal and   
         Kenneth L. Calvert and   
                James Griffioen   A flexible concast-based grouping
                                  service  . . . . . . . . . . . . . . . . 2532--2547
         K. G. Anagnostakis and   
            M. B. Greenwald and   
               S. Ioannidis and   
                      D. Li and   
                    J. M. Smith   Flexible network monitoring with FLAME   2548--2563
              Craig Milo Rogers   ANQL -- An Active Networks Query
                                  Language . . . . . . . . . . . . . . . . 2564--2576
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 50, Number 15, October 18, 2006

              Sangheon Pack and   
               Kyoungae Kim and   
                   Yanghee Choi   A cost-effective approach to selective
                                  IP paging scheme using explicit
                                  multicast  . . . . . . . . . . . . . . . 2577--2594
           V. Vidhyashankar and   
                B. S. Manoj and   
             C. Siva Ram Murthy   Slot allocation schemes for delay
                                  sensitive traffic support in
                                  asynchronous wireless mesh networks  . . 2595--2613
                   Jiang Li and   
               Murat Yuksel and   
         Shivkumar Kalyanaraman   Explicit rate multicast congestion
                                  control  . . . . . . . . . . . . . . . . 2614--2640
        Raj Kumar Rajendran and   
                 Dan Rubenstein   Optimizing the quality of scalable video
                                  streams on P2P networks  . . . . . . . . 2641--2658
              Ahmed Meddahi and   
                   Hossam Afifi   ``Packet-E-Model'': E-Model for VoIP
                                  quality evaluation . . . . . . . . . . . 2659--2675
              Chia Yuan Cho and   
    Winston Khoon Guan Seah and   
                 Yong Huat Chew   A framework and source model for design
                                  and evaluation of Robust Header
                                  Compression  . . . . . . . . . . . . . . 2676--2712
                 Wenye Wang and   
                   Guoliang Xue   A cost-minimization algorithm for fast
                                  location tracking in mobile wireless
                                  networks . . . . . . . . . . . . . . . . 2713--2726
              Ken Y. K. Hui and   
             John C. S. Lui and   
                David K. Y. Yau   Small-world overlay P2P networks:
                                  Construction, management and handling of
                                  dynamic flash crowds . . . . . . . . . . 2727--2746
            Marc St-Hilaire and   
         Steven Chamberland and   
                  Samuel Pierre   Uplink UMTS network design---an
                                  integrated approach  . . . . . . . . . . 2747--2761
              Jung-Shian Li and   
                 Chuan-Gang Liu   Improve TCP performance with a novel
                                  adaptive queue management scheme in IEEE
                                  802.17 RPR optical networks  . . . . . . 2762--2786
               Aparna Gupta and   
     Shivkumar Kalyanaraman and   
                   Lingyi Zhang   Pricing of risk for loss guaranteed
                                  intra-domain Internet service contracts  2787--2804
              Karol Kowalik and   
                 Martin Collier   Reducing traffic fluctuations of link
                                  state QoS routing algorithms in virtual
                                  circuit networks . . . . . . . . . . . . 2805--2819
              Xiaoqiao Meng and   
          Thyaga Nandagopal and   
                      Li Li and   
                      Songwu Lu   Contour maps: Monitoring and diagnosis
                                  in sensor networks . . . . . . . . . . . 2820--2838
                    Hai Liu and   
                Pengjun Wan and   
                    Xiaohua Jia   Maximal lifetime scheduling for $K$ to
                                  $1$ sensor--target surveillance networks 2839--2854
                   Qing Wei and   
       Károly Farkas and   
         Christian Prehofer and   
               Paulo Mendes and   
              Bernhard Plattner   Context-aware handover using active
                                  network technology . . . . . . . . . . . 2855--2872
                 Huaming Wu and   
          Alhussein A. Abouzeid   Error resilient image transport in
                                  wireless sensor networks . . . . . . . . 2873--2887
                  Ning Chai and   
              Boon Sain Yeo and   
                 Yong Huat Chew   Location management for GPRS . . . . . . 2888--2901
                Sungoh Kwon and   
                 Ness B. Shroff   Geographic routing in the presence of
                                  location errors  . . . . . . . . . . . . 2902--2917
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 50, Number 16, November 14, 2006

                Guanghui He and   
                Jennifer C. Hou   On sampling self-similar Internet
                                  traffic  . . . . . . . . . . . . . . . . 2919--2936
           Damianos Gavalas and   
         Christina Tanya Politi   Low-cost itineraries for multi-hop
                                  agents designed for scalable monitoring
                                  of multiple subnets  . . . . . . . . . . 2937--2952
           Patrick McDaniel and   
             William Aiello and   
               Kevin Butler and   
                 John Ioannidis   Origin authentication in interdomain
                                  routing  . . . . . . . . . . . . . . . . 2953--2980
          Francesco Vacirca and   
             Thomas Ziegler and   
           Eduard Hasenleithner   An algorithm to detect TCP spurious
                                  timeouts and its application to
                                  operational UMTS/GPRS networks . . . . . 2981--3001
               Kuan-Ta Chen and   
                Polly Huang and   
                 Chin-Laung Lei   Game traffic analysis: An MMORPG
                                  perspective  . . . . . . . . . . . . . . 3002--3023
                    Ming Yu and   
                  Wenjui Li and   
                Li-jin W. Chung   A practical scheme for MPLS fault
                                  monitoring and alarm correlation in
                                  backbone networks  . . . . . . . . . . . 3024--3042
                Simon Balon and   
       Laurent Mélon and   
                      Guy Leduc   A scalable and decentralized
                                  fast-rerouting scheme with efficient
                                  bandwidth sharing  . . . . . . . . . . . 3043--3063
Demetrios Zeinalipour-Yazti and   
                Vana Kalogeraki   Structuring topologically aware overlay
                                  networks using domain names  . . . . . . 3064--3082
               Simon S. Lam and   
                     Huaiyu Liu   Failure recovery for structured P2P
                                  networks: Protocol design and
                                  performance under churn  . . . . . . . . 3083--3104
               Ashraf Hamad and   
                     Tao Wu and   
             Ahmed E. Kamal and   
                 Arun K. Somani   On multicasting in wavelength-routing
                                  mesh networks  . . . . . . . . . . . . . 3105--3164
                Zhenguo Gao and   
                  Ling Wang and   
                   Mei Yang and   
                  Xiaozong Yang   CNPGSDP: An efficient group-based
                                  service discovery protocol for MANETs    3165--3182
                Danny Dolev and   
                Sugih Jamin and   
        Osnat (Ossi) Mokryn and   
                  Yuval Shavitt   Internet resiliency to attacks and
                                  failures under BGP policy routing  . . . 3183--3196
        Jean-Loup Guillaume and   
            Matthieu Latapy and   
                  Damien Magoni   Relevance of massively distributed
                                  explorations of the Internet topology:
                                  Qualitative results  . . . . . . . . . . 3197--3224
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 50, Number 17, December 5, 2006

           Christos Xenakis and   
         Nikolaos Laoutaris and   
            Lazaros Merakos and   
            Ioannis Stavrakakis   A generic characterization of the
                                  overheads imposed by IPsec and
                                  associated cryptographic algorithms  . . 3225--3241
             Corinne Touati and   
               Eitan Altman and   
    Jérôme Galtier   Generalized Nash Bargaining Solution for
                                  bandwidth allocation . . . . . . . . . . 3242--3263
              Celeste Campo and   
 Carlos García-Rubio and   
Andrés Marín López and   
       Florina Almenárez   PDP: A lightweight discovery protocol
                                  for local-scope interactions in wireless
                                  ad hoc networks  . . . . . . . . . . . . 3264--3283
               Daniel Bauer and   
             John N. Daigle and   
              Ilias Iliadis and   
                  Paolo Scotton   Topology aggregation for combined
                                  additive and restrictive metrics . . . . 3284--3299
                 Gang Cheng and   
                  Nirwan Ansari   Rate-distortion based link state update  3300--3314
                    Li Xiao and   
                Guanghui He and   
                Klara Nahrstedt   BGP session lifetime modeling in
                                  congested networks . . . . . . . . . . . 3315--3333
                      Yu Ge and   
                   Winston Seah   A method to efficiently integrate
                                  Internet Telephony call signaling with
                                  dynamic resource negotiation . . . . . . 3334--3352
           Nicolas Christin and   
            Jörg Liebeherr   The QoSbox: Quantitative service
                                  differentiation in BSD routers . . . . . 3353--3374
                 Inn Inn Er and   
             Winston K. G. Seah   Performance analysis of mobility-based
                                  $d$-hop (MobDHop) clustering algorithm
                                  for mobile ad hoc networks . . . . . . . 3375--3399
                   Shi Xiao and   
                 Gaoxi Xiao and   
                 Yiu-Wing Leung   A network flow approach for static and
                                  dynamic traffic grooming in WDM networks 3400--3415
                Xiaoming Fu and   
          Hannes Tschofenig and   
                 Dieter Hogrefe   Beyond QoS signaling: A new generic IP
                                  signaling framework  . . . . . . . . . . 3416--3433
                Jongkeun Na and   
                 Chong-kwon Kim   GLR: A novel geographic routing scheme
                                  for large wireless ad hoc networks . . . 3434--3448
                  Yaoyao Gu and   
             Doruk Bozda\ug and   
           Robert W. Brewer and   
                    Eylem Ekici   Data harvesting with mobile elements in
                                  wireless sensor networks . . . . . . . . 3449--3465
                 Tuna Tugcu and   
           H. Birkan Yilmaz and   
               Feodor Vainstein   Analytical modeling of CAC in next
                                  generation wireless systems  . . . . . . 3466--3484
                John Risson and   
                      Tim Moors   Survey of research towards robust
                                  peer-to-peer networks: Search methods    3485--3521
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 50, Number 18, December 21, 2006

                  Derek Pao and   
               Yiu Keung Li and   
                      Peng Zhou   Efficient packet classification using
                                  TCAMs  . . . . . . . . . . . . . . . . . 3523--3535
                        Miao Ma   Tabu marking scheme to speedup IP
                                  traceback  . . . . . . . . . . . . . . . 3536--3549
          Amol Sahasrabudhe and   
                   D. Manjunath   Performance of optical burst switched
                                  networks: A two moment analysis  . . . . 3550--3563
                  U. Monaco and   
                   F. Cuomo and   
                 T. Melodia and   
                F. Ricciato and   
                    M. Borghini   Understanding optimal data gathering in
                                  the energy and latency domains of a
                                  wireless sensor network  . . . . . . . . 3564--3584
              Hongwei Zhang and   
                    Anish Arora   Guaranteed fault containment and local
                                  stabilization in routing . . . . . . . . 3585--3607
          Padmavathi Mundur and   
               Poorva Arankalle   Optimal server allocations for streaming
                                  multimedia applications on the Internet  3608--3621
               Yingfei Dong and   
               Changho Choi and   
                   Zhi-Li Zhang   LIPS: A lightweight permit system for
                                  packet source origin accountability  . . 3622--3641
                 Anuj Rawat and   
                Mark A. Shayman   Preventing persistent oscillations and
                                  loops in IBGP configuration with route
                                  reflection . . . . . . . . . . . . . . . 3642--3665
                N. Rammohan and   
             C. Siva Ram Murthy   On-line multicast routing with QoS
                                  constraints in WDM networks with no
                                  wavelength converters  . . . . . . . . . 3666--3685
               Yin-Fu Huang and   
                Min-Hsiu Chuang   Fault tolerance for home agents in
                                  mobile IP  . . . . . . . . . . . . . . . 3686--3700
     Flávia Delicato and   
        Fábio Protti and   
                Luci Pirmez and   
José Ferreira de Rezende   An efficient heuristic for selecting
                                  active nodes in wireless sensor networks 3701--3720
                    Gang Wu and   
          Edwin K. P. Chong and   
                   Robert Givan   Predictive buffer control in delivering
                                  remotely stored video using proxy
                                  servers  . . . . . . . . . . . . . . . . 3721--3742
              Yanxing Zheng and   
             Turgay Korkmaz and   
                 Wenhua Dou and   
                      Jing Tian   Highly responsive and efficient QoS
                                  routing using pre- and on-demand
                                  computations along with a new normal
                                  measure  . . . . . . . . . . . . . . . . 3743--3762
              Novella Bartolini   Session based access control in
                                  geographically replicated Internet
                                  services . . . . . . . . . . . . . . . . 3763--3783
                 Kaiyu Zhou and   
              Kwan L. Yeung and   
                Victor O. K. Li   Nonlinear RED: A simple yet efficient
                                  active queue management scheme . . . . . 3784--3794
                      Anonymous   Subject Index Volume 50  . . . . . . . . 3795--3803


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 51, Number 1, January 17, 2007

       Francesc Sebé and   
           Josep Domingo-Ferrer   Scalability and security in biased
                                  many-to-one communication  . . . . . . . 1--13
                D. Careglio and   
      J. Solé Pareta and   
                     S. Spadaro   Service category-to-wavelength selection
                                  technique for QoS support in
                                  connection-oriented optical packet
                                  switching  . . . . . . . . . . . . . . . 14--30
                   K. K. To and   
                 Jack Y. B. Lee   Parallel overlays for high data-rate
                                  multicast data transfer  . . . . . . . . 31--42
               Junfeng Wang and   
                     Lei Li and   
                  Mingtian Zhou   Topological dynamics characterization
                                  for LEO satellite networks . . . . . . . 43--53
                     Zhi Li and   
              Prasant Mohapatra   On investigating overlay service
                                  topologies . . . . . . . . . . . . . . . 54--68
               Shanyu Zheng and   
                 David Manz and   
                 Jim Alves-Foss   A communication--computation efficient
                                  group key algorithm for large and
                                  dynamic groups . . . . . . . . . . . . . 69--93
             Hung Tuan Tran and   
                 Thomas Ziegler   A design framework towards the
                                  profitable operation of service overlay
                                  networks . . . . . . . . . . . . . . . . 94--113
              G. Carofiglio and   
                 M. Garetto and   
                E. Leonardi and   
                 A. Tarello and   
               M. Ajmone Marsan   Beyond fluid models: Modelling TCP mice
                                  in IP networks under non-stationary
                                  random traffic . . . . . . . . . . . . . 114--133
                    Li Feng and   
               Qinglin Zhao and   
                   Hanwen Zhang   Location management based on distance
                                  and direction for PCS networks . . . . . 134--152
       T. Bheemarjuna Reddy and   
               John P. John and   
             C. Siva Ram Murthy   Providing MAC QoS for multimedia traffic
                                  in 802.11e based multi-hop ad hoc
                                  wireless networks  . . . . . . . . . . . 153--176
                   Tao Meng and   
                   Hong-Fei Yan   On the peninsula phenomenon in web graph
                                  and its implications on web search . . . 177--189
                Shay Kutten and   
                    David Peleg   Asynchronous resource discovery in
                                  peer-to-peer networks  . . . . . . . . . 190--206
          Salvatore Spadaro and   
    Alessandro D'Alessandro and   
          Antonio Manzalini and   
       Josep Solé-Pareta   TRIDENT: An automated approach to
                                  traffic engineering in IP/MPLS over
                                  ASON/GMPLS networks  . . . . . . . . . . 207--223
              R. M. Hierons and   
                        H. Ural   Reducing the cost of applying adaptive
                                  test cases . . . . . . . . . . . . . . . 224--238
              Javed I. Khan and   
                 Raid Y. Zaghal   Symbiotic rate adaptation for time
                                  sensitive elastic traffic with
                                  interactive transport  . . . . . . . . . 239--257
         Hirozumi Yamaguchi and   
            Khaled El-Fakih and   
         Gregor v. Bochmann and   
                Teruo Higashino   Deriving protocol specifications from
                                  service specifications written as
                                  Predicate/Transition-nets  . . . . . . . 258--284
                     Fei Hu and   
            Waqaas Siddiqui and   
                 Krishna Sankar   Scalable security in Wireless Sensor and
                                  Actuator Networks (WSANs): Integration
                                  re-keying with routing . . . . . . . . . 285--308
        Marcos Postigo-Boix and   
           Joan Garcia-Haro and   
    Jose L. Melús-Moreno   A cost-efficient method for streaming
                                  stored content in a guaranteed QoS
                                  Internet . . . . . . . . . . . . . . . . 309--335
               Wenting Tang and   
                     Yun Fu and   
         Ludmila Cherkasova and   
                    Amin Vahdat   Modeling and generating realistic
                                  streaming media server workloads . . . . 336--356
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 51, Number 2, February 7, 2007

    Stephan Reiff-Marganiec and   
                   Mark D. Ryan   Guest Editorial  . . . . . . . . . . . . 357--358
                   M. Weiss and   
              B. Esfandiari and   
                         Y. Luo   Towards a classification of web service
                                  feature interactions . . . . . . . . . . 359--381
         Rui Gustavo Crespo and   
            Miguel Carvalho and   
                 Luigi Logrippo   Distributed resolution of feature
                                  interactions for Internet applications   382--397
            Mohamed Shehata and   
             Armin Eberlein and   
            Abraham O. Fapojuwo   A taxonomy for identifying requirement
                                  interactions in software systems . . . . 398--425
                 Caixia Chi and   
                    Ruibing Hao   Test generation for interaction
                                  detection in feature-rich communication
                                  systems  . . . . . . . . . . . . . . . . 426--438
                  A. Miller and   
                  M. Calder and   
                A. F. Donaldson   A template-based approach for the
                                  generation of abstractable and reducible
                                  models of featured networks  . . . . . . 439--455
      Pierre-Yves Schobbens and   
            Patrick Heymans and   
    Jean-Christophe Trigaux and   
                  Yves Bontemps   Generic semantics of feature diagrams    456--479
                Wu-Hon F. Leung   Program entanglement, feature
                                  interaction and the feature language
                                  extensions . . . . . . . . . . . . . . . 480--495
          Kenneth J. Turner and   
                    Lynne Blair   Policies and conflicts in call control   496--514
                 Xiaotao Wu and   
            Henning Schulzrinne   Handling feature interactions in the
                                  language for end system services . . . . 515--535
              Mario Kolberg and   
                 Evan H. Magill   Managing feature interactions between
                                  distributed SIP call control services    536--557
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 51, Number 3, February 21, 2007

                 B. Praveen and   
                 J. Praveen and   
             C. Siva Ram Murthy   On using forward error correction for
                                  loss recovery in optical burst switched
                                  networks . . . . . . . . . . . . . . . . 559--568
   Carlo K. da S. Rodrigues and   
         Rosa M. M. Leão   Bandwidth usage distribution of
                                  multimedia servers using Patching  . . . 569--587
                Yeim-Kuan Chang   Fast binary and multiway prefix searches
                                  for packet forwarding  . . . . . . . . . 588--605
              Sungchang Kim and   
             Young-Chon Kim and   
             Bin-Yeong Yoon and   
                     Minho Kang   An integrated congestion control
                                  mechanism for optimized performance
                                  using two-step rate controller in
                                  optical burst switching networks . . . . 606--620
            Young-June Choi and   
              Jin-Ghoo Choi and   
                  Saewoong Bahk   Upper-level scheduling supporting
                                  multimedia traffic in cellular data
                                  networks . . . . . . . . . . . . . . . . 621--631
                    Dong Yu and   
                Deborah Frincke   Improving the quality of alerts and
                                  predicting intruder's next goal with
                                  Hidden Colored Petri-Net . . . . . . . . 632--654
                 Zhiguo Wan and   
             Robert H. Deng and   
                   Feng Bao and   
           Akkihebbal L. Ananda   Access control protocols with two-layer
                                  architecture for wireless networks . . . 655--670
                 Hailong Li and   
                Ian Li-Jin Thng   Performance analysis of limited number
                                  of wavelength converters by share per
                                  node in optical switching network  . . . 671--682
   Péter Hága and   
   Krisztián Diriczi and   
        Gábor Vattay and   
           István Csabai   Granular model of packet pair separation
                                  in Poissonian traffic  . . . . . . . . . 683--698
            Jean Marc Kelif and   
               Eitan Altman and   
           Ioannis Koukoutsidis   Admission and GoS control in a
                                  multiservice WCDMA system  . . . . . . . 699--711
             Yuh-Jzer Joung and   
                Jiaw-Chang Wang   Chord$^2$: A two-layer Chord for
                                  reducing maintenance overhead via
                                  heterogeneity  . . . . . . . . . . . . . 712--731
               Zhiqiang Gao and   
                  Nirwan Ansari   A practical and robust inter-domain
                                  marking scheme for IP traceback  . . . . 732--750
                   Glenn Benson   Portable security transaction protocol   751--766
            Meng Chang Chen and   
               Li-Ping Tung and   
               Yeali S. Sun and   
                  Wei-Kuan Shih   A new per-class flow fixed proportional
                                  differentiated service for multi-service
                                  wireless LAN . . . . . . . . . . . . . . 767--780
             Michel Mandjes and   
         Petteri Mannersalo and   
                   Ilkka Norros   Gaussian tandem queues with an
                                  application to dimensioning of switch
                                  fabric interfaces  . . . . . . . . . . . 781--797
               Zhenqiang Ye and   
               Lap Kong Law and   
  Srikanth V. Krishnamurthy and   
                   Zhong Xu and   
      Suvidhean Dhirakaosal and   
         Satish K. Tripathi and   
                     Mart Molle   Predictive channel reservation for
                                  handoff prioritization in wireless
                                  cellular networks  . . . . . . . . . . . 798--822
               Lap Kong Law and   
  Srikanth V. Krishnamurthy and   
             Michalis Faloutsos   A novel adaptive protocol for
                                  lightweight efficient multicasting in ad
                                  hoc networks . . . . . . . . . . . . . . 823--834
Sergio Sánchez-Lopez and   
         Xavier Masip-Bruin and   
          Josep Sole-Pareta and   
          Jordi Domingo-Pascual   Fast setup of end-to-end paths for
                                  bandwidth constrained applications in an
                                  IP/MPLS--ATM integrated environment  . . 835--852
               Jianping Pan and   
                    Lin Cai and   
      Xuemin (Sherman) Shen and   
                    Jon W. Mark   Identity-based secure collaboration in
                                  wireless ad hoc networks . . . . . . . . 853--865
               Jenshiuh Liu and   
               Zhi-Jian Lee and   
                Yeh-Ching Chung   Dynamic probabilistic packet marking for
                                  efficient IP traceback . . . . . . . . . 866--882
               Yuh-Ren Tsai and   
                Shiuh-Jeng Wang   Two-tier authentication for cluster and
                                  individual sets in mobile ad hoc
                                  networks . . . . . . . . . . . . . . . . 883--900
             E. W. Biersack and   
                   D. Carra and   
                R. Lo Cigno and   
               P. Rodriguez and   
                      P. Felber   Overlay architectures for file
                                  distribution: Fundamental performance
                                  analysis for homogeneous and
                                  heterogeneous cases  . . . . . . . . . . 901--917
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 51, Number 4, March 14, 2007

           Ian. F. Akyildiz and   
                    Harry Rudin   Editorial  . . . . . . . . . . . . . . . 919--920
            Ian F. Akyildiz and   
            Tommaso Melodia and   
           Kaushik R. Chowdhury   A survey on wireless multimedia sensor
                                  networks . . . . . . . . . . . . . . . . 921--960
            Kurtis Kredo II and   
              Prasant Mohapatra   Medium access control in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 961--994
                      Yi Li and   
                 Gaoxi Xiao and   
             H. Ghafouri-Shiraz   Performance evaluation of multi-fiber
                                  optical packet switches  . . . . . . . . 995--1012
Gabriel Maciá-Fernández and   
Jesús E. Díaz-Verdejo and   
    Pedro García-Teodoro   Evaluation of a low-rate DoS attack
                                  against iterative servers  . . . . . . . 1013--1030
 Konstantinos P. Ferentinos and   
       Theodore A. Tsiligiridis   Adaptive design optimization of wireless
                                  sensor networks using genetic algorithms 1031--1051
         Theodore L. Willke and   
          Nicholas F. Maxemchuk   Coordinated interaction using reliable
                                  broadcast in mobile wireless networks    1052--1059
              Majid Ghaderi and   
              Raouf Boutaba and   
                Gary W. Kenward   Joint call and packet QoS in cellular
                                  packet networks  . . . . . . . . . . . . 1060--1071
                 Jinwon Lee and   
                 Hyonik Lee and   
              Seungwoo Kang and   
               Su Myeon Kim and   
                   Junehwa Song   CISS: An efficient object clustering
                                  framework for DHT-based peer-to-peer
                                  applications . . . . . . . . . . . . . . 1072--1094
          Shantidev Mohanty and   
                      Jiang Xie   Performance analysis of a novel
                                  architecture to integrate heterogeneous
                                  wireless systems . . . . . . . . . . . . 1095--1105
           Mohamed G. Gouda and   
                    Alex X. Liu   Structured firewall design . . . . . . . 1106--1120
       Praveen Jayachandran and   
        Praveen Bhamidipati and   
             C. Siva Ram Murthy   On providing elastic QoS in optical
                                  burst switched networks  . . . . . . . . 1121--1132
               Yaqing Huang and   
             Roch Guérin   A simple FIFO-based scheme for
                                  differentiated loss guarantees . . . . . 1133--1150
               Wei-Tsung Su and   
              Ko-Ming Chang and   
                  Yau-Hwang Kuo   eHIP: An energy-efficient hybrid
                                  intrusion prohibition system for
                                  cluster-based wireless sensor networks   1151--1168
        Claude Castelluccia and   
              Nitesh Saxena and   
                  Jeong Hyun Yi   Robust self-keying mobile ad hoc
                                  networks . . . . . . . . . . . . . . . . 1169--1182
          Sajjad Zarifzadeh and   
             Nasser Yazdani and   
                Hamed Khanmirza   A routing framework for load balancing
                                  of bandwidth sensitive traffic in
                                  differentiated service networks  . . . . 1183--1204
             Fabio Ricciato and   
          Francesco Vacirca and   
                Philipp Svoboda   Diagnosis of capacity bottlenecks via
                                  passive monitoring in 3G networks: An
                                  empirical analysis . . . . . . . . . . . 1205--1231
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??
                      Anonymous   List of Reviewers  . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 51, Number 5, April 11, 2007

            Deborah Frincke and   
              Andreas Wespi and   
                  Diego Zamboni   From intrusion detection to
                                  self-protection  . . . . . . . . . . . . 1233--1238
          Kenneth L. Ingham and   
              Anil Somayaji and   
                 John Burge and   
              Stephanie Forrest   Learning DFA representations of HTTP for
                                  protecting web applications  . . . . . . 1239--1255
      Georgios Portokalidis and   
                    Herbert Bos   SweetBait: Zero-hour worm detection and
                                  containment using low- and
                                  high-interaction honeypots . . . . . . . 1256--1274
                M. Laureano and   
                 C. Maziero and   
                     E. Jamhour   Protecting host-based intrusion
                                  detectors through virtual machines . . . 1275--1283
           Paul D. Williams and   
             Eugene H. Spafford   CuPIDS: An exploration of highly
                                  focused, co-processor-based information
                                  system protection  . . . . . . . . . . . 1284--1298
               Erol Gelenbe and   
                  George Loukas   A self-aware approach to denial of
                                  service defence  . . . . . . . . . . . . 1299--1314
                 Morton Swimmer   Using the danger model of immune systems
                                  for distributed defense in modern data
                                  networks . . . . . . . . . . . . . . . . 1315--1333
                 Yu-Sung Wu and   
                Bingrui Foo and   
                Yu-Chun Mao and   
             Saurabh Bagchi and   
             Eugene H. Spafford   Automated adaptive intrusion containment
                                  in systems of interacting services . . . 1334--1360
                Ashvin Goel and   
              Wu-chang Feng and   
                Wu-chi Feng and   
                    David Maier   Automatic high-performance
                                  reconstruction and recovery  . . . . . . 1361--1377
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 51, Number 6, April 25, 2007

               Hwangnam Kim and   
                Jennifer C. Hou   Mixed-mode simulation for IEEE
                                  802.11-operated WLANs  . . . . . . . . . 1379--1402
              Jeng Farn Lee and   
            Meng Chang Chen and   
                      Yeali Sun   WF$^2$ Q-M: Worst-case fair weighted
                                  fair queueing with maximum rate control  1403--1420
                   Jiang Li and   
               Murat Yuksel and   
                Xingzhe Fan and   
         Shivkumar Kalyanaraman   Generalized multicast congestion control 1421--1443
                   Lan Wang and   
              Daniel Massey and   
                    Lixia Zhang   Persistent detection and recovery of
                                  state inconsistencies  . . . . . . . . . 1444--1458
               Sasu Tarkoma and   
             Jaakko Kangasharju   On the cost and safety of handoffs in
                                  content-based routing systems  . . . . . 1459--1482
        Javier Vales-Alonso and   
  Esteban Egea-López and   
Alejandro Martínez-Sala and   
Pablo Pavón-Mariño and   
  M. Victoria Bueno-Delgado and   
        Joan García-Haro   Performance evaluation of MAC
                                  transmission power control in wireless
                                  sensor networks  . . . . . . . . . . . . 1483--1498
           Nabhendra Bisnik and   
          Alhussein A. Abouzeid   Optimizing random walk search algorithms
                                  in P2P networks  . . . . . . . . . . . . 1499--1514
            Hari Rangarajan and   
       J. J. Garcia-Luna-Aceves   Efficient use of route requests for
                                  loop-free on-demand routing in ad hoc
                                  networks . . . . . . . . . . . . . . . . 1515--1529
                B. S. Manoj and   
                K. J. Kumar and   
             C. Siva Ram Murthy   MuPAC: A new multi-power architecture
                                  for capacity enhancement in cellular
                                  networks . . . . . . . . . . . . . . . . 1530--1554
                 Y. H. Chew and   
                  B. S. Yeo and   
                  D. C. M. Kuan   Sensitivity study of location management
                                  area partitioning in cellular
                                  communication systems  . . . . . . . . . 1555--1573
                      Bo Li and   
                Roberto Battiti   Achieving optimal performance in IEEE
                                  802.11 wireless LANs with the
                                  combination of link adaptation and
                                  adaptive backoff . . . . . . . . . . . . 1574--1600
              Hechmi Khlifi and   
   Jean-Charles Grégoire   ARTP: A buffer-aware rate control
                                  protocol for media streaming . . . . . . 1601--1615
             Nikos Argiriou and   
            Leonidas Georgiadis   Channel sharing by multi-class rate
                                  adaptive streams: Performance region and
                                  optimization . . . . . . . . . . . . . . 1616--1629
              Sangheon Pack and   
             Taekyoung Kwon and   
                   Yanghee Choi   A performance comparison of mobility
                                  anchor point selection schemes in
                                  Hierarchical Mobile IPv6 networks  . . . 1630--1642
                  Mushi Jin and   
              Oliver W. W. Yang   APOSN: Operation, modeling and
                                  performance evaluation . . . . . . . . . 1643--1659
            Ashraf Al Daoud and   
                 Murat Alanyali   Loss-cognizant pricing in networks with
                                  greedy users . . . . . . . . . . . . . . 1660--1683
                 Feng Zheng and   
                    John Nelson   An $H_\infty$ approach to congestion
                                  control design for AQM routers
                                  supporting TCP flows in wireless access
                                  networks . . . . . . . . . . . . . . . . 1684--1704
                   Feng Gao and   
                 M. E. Woodward   A hybrid topological--stochastic
                                  partitioning method for scaling QoS
                                  routing algorithms . . . . . . . . . . . 1705--1724
               Gee-Swee Poo and   
                     Haibo Wang   Multi-path routing versus tree routing
                                  for VPN bandwidth provisioning in the
                                  hose model . . . . . . . . . . . . . . . 1725--1743
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 51, Number 7, May 16, 2007

         Katsushi Kobayashi and   
 Pascale Vicat-Blanc Primet and   
                      Joe Touch   Protocols for fast, long-distance
                                  networks . . . . . . . . . . . . . . . . 1745--1747
                 Sangtae Ha and   
                    Long Le and   
                Injong Rhee and   
                      Lisong Xu   Impact of background traffic on
                                  performance of high-speed TCP variant
                                  protocols  . . . . . . . . . . . . . . . 1748--1762
                  Shan Chen and   
                 Brahim Bensaou   Can high-speed networks survive with
                                  DropTail queues management?  . . . . . . 1763--1776
                 Yunhong Gu and   
             Robert L. Grossman   UDT: UDP-based data transfer for
                                  high-speed wide area networks  . . . . . 1777--1799
             Xiaomeng Huang and   
                 Chuang Lin and   
                   Fengyuan Ren   A novel high speed transport protocol
                                  based on explicit virtual load feedback  1800--1814
             Pasi Sarolahti and   
                Mark Allman and   
                    Sally Floyd   Determining an appropriate sending rate
                                  over an underutilized network path . . . 1815--1832
          Kiyohide Nakauchi and   
             Katsushi Kobayashi   An explicit router feedback framework
                                  for high bandwidth-delay product
                                  networks . . . . . . . . . . . . . . . . 1833--1846
                      Lisong Xu   Extending equation-based congestion
                                  control to high-speed and long-distance
                                  networks . . . . . . . . . . . . . . . . 1847--1859
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 51, Number 8, June 6, 2007

                Edith Cohen and   
                  Amos Fiat and   
                    Haim Kaplan   Associative search in peer to peer
                                  networks: Harnessing latent semantics    1861--1881
                   Alex Raj and   
                  Oliver C. Ibe   A survey of IP and multiprotocol label
                                  switching fast reroute schemes . . . . . 1882--1907
               Reuven Cohen and   
                  Amnon Shochot   The ``Global-ISP'' paradigm  . . . . . . 1908--1921
               Hwangnam Kim and   
            Jennifer C. Hou and   
                  Chunyu Hu and   
                          Ye Ge   QoS provisioning in IEEE
                                  802.11-compliant networks: Past,
                                  present, and future  . . . . . . . . . . 1922--1941
               Jin-Hee Choi and   
              Young-Pil Kim and   
                      Chuck Yoo   Self-prevention of socket buffer
                                  overflow . . . . . . . . . . . . . . . . 1942--1954
                      Ye Ge and   
            Jennifer C. Hou and   
                  Sunghyun Choi   An analytic study of tuning systems
                                  parameters in IEEE 802.11e enhanced
                                  distributed channel access . . . . . . . 1955--1980
               Steven Weber and   
             Gustavo de Veciana   Flow-level QoS for a dynamic load of
                                  rate adaptive sessions sharing a
                                  bottleneck link  . . . . . . . . . . . . 1981--1997
            Laura Galluccio and   
           Giacomo Morabito and   
             Sergio Palazzo and   
           Marco Pellegrini and   
             M. Elena Renda and   
                    Paolo Santi   Georoy: A location-aware enhancement to
                                  Viceroy peer-to-peer algorithm . . . . . 1998--2014
                Jianbin Wei and   
                 Cheng-Zhong Xu   Consistent proportional delay
                                  differentiation: A fuzzy control
                                  approach . . . . . . . . . . . . . . . . 2015--2032
             Ioannis Psaras and   
           Vassilis Tsaoussidis   Why TCP timers (still) don't work well   2033--2048
            Chun-Chuan Yang and   
            Chun-Shian Tsai and   
                Junn-Yen Hu and   
               Tzu-Chien Chuang   On the design of mobility management
                                  scheme for 802.16-based network
                                  environment  . . . . . . . . . . . . . . 2049--2066
Jérémie Leguay and   
            Matthieu Latapy and   
             Timur Friedman and   
         Kavé Salamatian   Describing and simulating Internet
                                  routes . . . . . . . . . . . . . . . . . 2067--2085
       Michael Cho-Hoi Chek and   
                  Yu-Kwong Kwok   Design and evaluation of practical
                                  coexistence management schemes for
                                  Bluetooth and IEEE 802.11b systems . . . 2086--2103
              S. S. Dhillon and   
                 P. Van Mieghem   Performance analysis of the AntNet
                                  algorithm  . . . . . . . . . . . . . . . 2104--2125
                B. S. Manoj and   
             Archana Sekhar and   
             C. Siva Ram Murthy   On the use of limited autonomous
                                  mobility for dynamic coverage
                                  maintenance in sensor networks . . . . . 2126--2143
              Glen MacLarty and   
                    Michael Fry   Towards a platform for wide-area overlay
                                  network deployment and management  . . . 2144--2162
 Srinivasan Ramasubramanian and   
      Harish Krishnamoorthy and   
                   Marwan Krunz   Disjoint multipath routing using colored
                                  trees  . . . . . . . . . . . . . . . . . 2163--2180
               Coskun Cetinkaya   Improving the efficiency of multipath
                                  traffic via opportunistic traffic
                                  scheduling . . . . . . . . . . . . . . . 2181--2197
           Dawn S. L. Dolcy and   
     Costas C. Constantinou and   
              Steven F. Quigley   A Fokker--Planck equation method
                                  predicting Buffer occupancy in a single
                                  queue  . . . . . . . . . . . . . . . . . 2198--2216
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 51, Number 9, June 20, 2007

       Josep Domingo-Ferrer and   
            Joachim Posegga and   
       Francesc Sebé and   
            Vicenç Torra   Advances in smart cards  . . . . . . . . 2219--2222
                   Bart Preneel   A survey of recent developments in
                                  cryptographic algorithms for smart cards 2223--2233
              HongQian Karen Lu   Network smart card review and analysis   2234--2248
             Joaquin Torres and   
          Antonio Izquierdo and   
              Jose Maria Sierra   Advances in network smart cards
                                  authentication . . . . . . . . . . . . . 2249--2261
                 J. Munilla and   
                     A. Peinado   HB-MP: A further step in the HB-family
                                  of lightweight authentication protocols  2262--2267
             Agusti Solanas and   
       Josep Domingo-Ferrer and   
Antoni Martínez-Ballesté and   
                    Vanesa Daza   A distributed architecture for scalable
                                  private RFID tag identification  . . . . 2268--2279
            Ting-Fang Cheng and   
               Jung-San Lee and   
                Chin-Chen Chang   Security enhancement of an IC-card-based
                                  remote login mechanism . . . . . . . . . 2280--2287
Andrés Marín López and   
Daniel Díaz Sánchez and   
   Florina Almenárez and   
 Carlos García Rubio and   
                  Celeste Campo   Smart card-based agents for fair
                                  non-repudiation  . . . . . . . . . . . . 2288--2298
       Francesc Sebé and   
            Alexandre Viejo and   
           Josep Domingo-Ferrer   Secure many-to-one symbol transmission
                                  for implementation on smart cards  . . . 2299--2307
            George Karetsos and   
            Angelos Rouskas and   
              Bijan Jabbari and   
                 Bernhard Walke   Topics in wireless broadband systems . . 2308--2310
         Claudio Cicconetti and   
            Luciano Lenzini and   
              Enzo Mingozzi and   
                  Giovanni Stea   Design and performance analysis of the
                                  Real-Time HCCA scheduler for IEEE
                                  802.11e WLANs  . . . . . . . . . . . . . 2311--2325
  Xavier Pérez-Costa and   
           Daniel Camps-Mur and   
                   Albert Vidal   On distributed power saving mechanisms
                                  of wireless LANs 802.11e U-APSD vs
                                  802.11 power save mode . . . . . . . . . 2326--2344
                  D. Vassis and   
                  G. Kormentzas   Performance analysis of IEEE 802.11 ad
                                  hoc networks in the presence of hidden
                                  terminals  . . . . . . . . . . . . . . . 2345--2352
              Sebastian Max and   
            Guido R. Hiertz and   
                 Erik Weiss and   
              Dee Denteneer and   
              Bernhard H. Walke   Spectrum sharing in IEEE 802.11s
                                  wireless mesh networks . . . . . . . . . 2353--2367
                 Patrick Hosein   QoS scheduling of uplink resources in
                                  OFDMA networks . . . . . . . . . . . . . 2368--2378
        Georgios A. Leoleis and   
            Iakovos S. Venieris   Fast MIPv6 extensions supporting
                                  seamless multicast handovers . . . . . . 2379--2396
         Vasileios Karyotis and   
           Symeon Papavassiliou   Risk-based attack strategies for mobile
                                  ad hoc networks under probabilistic
                                  attack modeling framework  . . . . . . . 2397--2410
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 51, Number 10, July 11, 2007

           Jelena Mi\vsi\'c and   
                  Carol J. Fung   The impact of master--slave bridge
                                  access mode on the performance of
                                  multi-cluster 802.15.4 network . . . . . 2411--2449
             Yigal Bejerano and   
              Seung-Jae Han and   
                     Amit Kumar   Efficient load-balancing routing for
                                  wireless mesh networks . . . . . . . . . 2450--2466
               Guoqiang Mao and   
       Brian D. O. Anderson and   
           Barì\cs Fidan   Path loss exponent estimation for
                                  wireless sensor network localization . . 2467--2483
          Bogdan C. Popescu and   
               Bruno Crispo and   
        Andrew S. Tanenbaum and   
                    Arno Bakker   Design and implementation of a secure
                                  wide-area object middleware  . . . . . . 2484--2513
                Supeng Leng and   
                Liren Zhang and   
                 Huirong Fu and   
                   Jianjun Yang   Mobility analysis of mobile hosts with
                                  random walking in ad hoc networks  . . . 2514--2528
               Guoqiang Mao and   
       Barì\cs Fidan and   
           Brian D. O. Anderson   Wireless sensor network localization
                                  techniques . . . . . . . . . . . . . . . 2529--2553
                    Ning Lu and   
                    John Bigham   On utility-fair bandwidth adaptation for
                                  multi-class traffic QoS provisioning in
                                  wireless networks  . . . . . . . . . . . 2554--2564
       Birger Tödtmann and   
               Erwin P. Rathgeb   Anticipatory distributed packet filter
                                  configurations for carrier-grade IP
                                  networks . . . . . . . . . . . . . . . . 2565--2579
       Dimitris Geneiatakis and   
       Georgios Kambourakis and   
      Costas Lambrinoudakis and   
            Tasos Dagiuklas and   
             Stefanos Gritzalis   A framework for protecting a SIP-based
                                  infrastructure against malformed message
                                  attacks  . . . . . . . . . . . . . . . . 2580--2593
               Vasudev Shah and   
                  Ece Gelal and   
      Srikanth V. Krishnamurthy   Handling asymmetry in power
                                  heterogeneous ad hoc networks  . . . . . 2594--2615
               Zhenhai Duan and   
               Yingfei Dong and   
                 Kartik Gopalan   DMTP: Controlling spam through message
                                  delivery differentiation . . . . . . . . 2616--2630
               I. El Khayat and   
                  P. Geurts and   
                       G. Leduc   Machine-learnt versus analytical models
                                  of TCP throughput  . . . . . . . . . . . 2631--2644
         N. Blefari-Melazzi and   
                D. Di Sorte and   
              M. Femminella and   
                       G. Reali   Autonomic control and personalization of
                                  a wireless access network  . . . . . . . 2645--2676
             Andrey Belenky and   
                  Nirwan Ansari   On deterministic packet marking  . . . . 2677--2700
            Baek-Young Choi and   
                   Sue Moon and   
                  Rene Cruz and   
               Zhi-Li Zhang and   
                Christophe Diot   Quantile sampling for practical delay
                                  monitoring in Internet backbone networks 2701--2716
              A. Kuzmanovic and   
                 E. W. Knightly   Receiver-centric congestion control with
                                  a misbehaving receiver: Vulnerabilities
                                  and end-point solutions  . . . . . . . . 2717--2737
           M. Ajmone Marsan and   
                 C. Casetti and   
                G. Mardente and   
                      M. Mellia   A framework for admission control and
                                  path allocation in DiffServ networks . . 2738--2752
               Kang-Won Lee and   
               Suresh Chari and   
               Anees Shaikh and   
                Sambit Sahu and   
                 Pau-Chen Cheng   Improving the resilience of content
                                  distribution networks to large scale
                                  distributed denial of service attacks    2753--2770
              Sun-Myeng Kim and   
                 Young-Jong Cho   Channel time allocation scheme based on
                                  feedback information in IEEE 802.11e
                                  wireless LANs  . . . . . . . . . . . . . 2771--2787
                  Yujie Zhu and   
         Aravind Velayutham and   
          Oyebamiji Oladeji and   
           Raghupathy Sivakumar   Enhancing TCP for networks with
                                  guaranteed bandwidth services  . . . . . 2788--2804
            Chun-Ying Huang and   
              Yun-Peng Chiu and   
               Kuan-Ta Chen and   
                 Chin-Laung Lei   Secure multicast in dynamic environments 2805--2817
                Shudong Jin and   
                   Hongbo Jiang   Novel approaches to efficient flooding
                                  search in peer-to-peer networks  . . . . 2818--2832
                   J. Elias and   
               F. Martignon and   
                  A. Capone and   
                     G. Pujolle   A new approach to dynamic bandwidth
                                  allocation in Quality of Service
                                  networks: Performance and bounds . . . . 2833--2853
 Srinivasan Ramasubramanian and   
             Mithun Harkara and   
                   Marwan Krunz   Linear time distributed construction of
                                  colored trees for disjoint multipath
                                  routing  . . . . . . . . . . . . . . . . 2854--2866
              Xiaolan Zhang and   
            Giovanni Neglia and   
                 Jim Kurose and   
                    Don Towsley   Performance modeling of epidemic routing 2867--2891
              Pablo Vidales and   
        Carlos J. Bernardos and   
               Ignacio Soto and   
           David Cottingham and   
           Javier Baliosian and   
                  Jon Crowcroft   MIPv6 experimental evaluation using
                                  overlay networks . . . . . . . . . . . . 2892--2915
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 51, Number 11, August 8, 2007

       Georgios Smaragdakis and   
         Nikolaos Laoutaris and   
             Azer Bestavros and   
              Ibrahim Matta and   
            Ioannis Stavrakakis   Mistreatment-resilient distributed
                                  caching  . . . . . . . . . . . . . . . . 2917--2937
              Dah Ming Chiu and   
             Adrian Sai-Wah Tam   Fairness of traffic controls for
                                  inelastic flows in the Internet  . . . . 2938--2957
            Eric W. M. Wong and   
             Andrew Zalesky and   
                Zvi Rosberg and   
                 Moshe Zukerman   A new method for approximating blocking
                                  probability in overflow loss networks    2958--2975
               Ashima Gupta and   
              Prasant Mohapatra   A survey on ultra wide band medium
                                  access control schemes . . . . . . . . . 2976--2993
         Mário Alves and   
                  Eduardo Tovar   Real-time communications over
                                  wired/wireless PROFIBUS networks
                                  supporting inter-cell mobility . . . . . 2994--3012
            Mehmet S. Kuran and   
                     Tuna Tugcu   A survey on emerging broadband wireless
                                  access technologies  . . . . . . . . . . 3013--3046
              Lixiang Xiong and   
                   Guoqiang Mao   Saturated throughput analysis of IEEE
                                  802.11e EDCA . . . . . . . . . . . . . . 3047--3068
                     Li Lao and   
               Jun-Hong Cui and   
                    Mario Gerla   Tackling group-to-tree matching in large
                                  scale group communications . . . . . . . 3069--3089
              Hualiang Chen and   
               Zhongxin Liu and   
             Zengqiang Chen and   
                    Zhuzhi Yuan   Extending TCP congestion control to
                                  multicast  . . . . . . . . . . . . . . . 3090--3109
             Timo Vanhatupa and   
Marko Hännikäinen and   
Timo D. Hämäläinen   Evaluation of throughput estimation
                                  models and algorithms for WLAN frequency
                                  planning . . . . . . . . . . . . . . . . 3110--3124
              Hanping Lufei and   
                    Weisong Shi   Energy-aware QoS for application
                                  sessions across multiple protocol
                                  domains in mobile computing  . . . . . . 3125--3141
          Anelise Munaretto and   
                  Mauro Fonseca   Routing and quality of service support
                                  for mobile ad hoc networks . . . . . . . 3142--3156
                Xiaolong Li and   
              Aaron D. Striegel   A case for Passive Application Layer
                                  Multicast  . . . . . . . . . . . . . . . 3157--3171
      Gilberto Flores Lucio and   
             Martin J. Reed and   
                 Ian D. Henning   Guided local search as a network
                                  planning algorithm that incorporates
                                  uncertain traffic demands  . . . . . . . 3172--3196
            H. Ragab Hassen and   
             A. Bouabdallah and   
                H. Bettahar and   
                     Y. Challal   Key management for content access
                                  control in a hierarchy . . . . . . . . . 3197--3219
                 Yuan-Cheng Lai   Two schedulers to provide delay
                                  proportion and reduce queueing delay
                                  simultaneously . . . . . . . . . . . . . 3220--3231
           Sebastian Kiesel and   
                 Michael Scharf   Modeling and performance evaluation of
                                  transport protocols for firewall control 3232--3251
               Jelena Mi\vsi\'c   Algorithm for equalization of cluster
                                  lifetimes in a multi-level Beacon
                                  enabled 802.15.4 sensor network  . . . . 3252--3264
                 Lin X. Cai and   
      Xuemin (Sherman) Shen and   
                Jon W. Mark and   
                        Lin Cai   Capacity analysis and MAC enhancement
                                  for UWB broadband wireless access
                                  networks . . . . . . . . . . . . . . . . 3265--3277
               Zhenjiang Li and   
       J. J. Garcia-Luna-Aceves   Loop-free constrained path computation
                                  for hop-by-hop QoS routing . . . . . . . 3278--3293
            Steven Shelford and   
         Gholamali C. Shoja and   
                Eric G. Manning   Achieving optimal revenues in
                                  dynamically priced network services with
                                  QoS guarantees . . . . . . . . . . . . . 3294--3304
               Dusit Niyato and   
                  Ekram Hossain   QoS-aware bandwidth allocation and
                                  admission control in IEEE 802.16
                                  broadband wireless access networks: A
                                  non-cooperative game theoretic approach  3305--3321
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 51, Number 12, August 22, 2007

                Ahsan Habib and   
                    John Chuang   Improving application QoS with
                                  residential multihoming  . . . . . . . . 3323--3337
             Soo Young Shin and   
            Hong Seong Park and   
                 Wook Hyun Kwon   Mutual interference analysis of IEEE
                                  802.15.4 and IEEE 802.11b  . . . . . . . 3338--3353
              Lih-Chyau Wuu and   
              Tzong-Jye Liu and   
                  Kuo-Ming Chen   A longest prefix first search tree for
                                  IP lookup  . . . . . . . . . . . . . . . 3354--3367
           Jiann-Liang Chen and   
            Ming-Chiao Chen and   
                    Yi-Ru Chian   QoS management in heterogeneous home
                                  networks . . . . . . . . . . . . . . . . 3368--3379
            Sumit Naiksatam and   
       Stephen A. Chiappari and   
                Silvia Figueira   Efficient bandwidth utilization in
                                  LambdaGrids using pricing incentives . . 3380--3391
             Vinay Sridhara and   
                Stephan Bohacek   Realistic propagation simulation of
                                  urban mesh networks  . . . . . . . . . . 3392--3412
          Luis López and   
   Antonio Fernández and   
                  Vicent Cholvi   A game theoretic comparison of TCP and
                                  digital fountain based protocols . . . . 3413--3426
  Saravanan Balasubramanian and   
                    Demet Aksoy   Adaptive energy-efficient registration
                                  and online scheduling for asymmetric
                                  wireless sensor networks . . . . . . . . 3427--3447
             Animesh Patcha and   
                  Jung-Min Park   An overview of anomaly detection
                                  techniques: Existing solutions and
                                  latest technological trends  . . . . . . 3448--3470
               S. Antonatos and   
               P. Akritidis and   
             E. P. Markatos and   
             K. G. Anagnostakis   Defending against hitlist worms using
                                  network address space randomization  . . 3471--3490
     Stylianos Karapantazis and   
          Fotini-Niovi Pavlidou   Call admission control in multiservice
                                  high altitude platform (HAP) W-CDMA
                                  cellular systems . . . . . . . . . . . . 3491--3506
      Grigorios Zachariadis and   
               Javier A. Barria   Demand management for telecommunications
                                  services . . . . . . . . . . . . . . . . 3507--3524
           Ritesh Mukherjee and   
              J. William Atwood   Scalable solutions for secure group
                                  communications . . . . . . . . . . . . . 3525--3548
            Christos Bouras and   
               Afrodite Sevasti   An analytical QoS service model for
                                  delay-based differentiation  . . . . . . 3549--3563
                  Yang Wang and   
                 Chuang Lin and   
                Quan-Lin Li and   
                   Yuguang Fang   A queueing analysis for the denial of
                                  service (DoS) attacks in computer
                                  networks . . . . . . . . . . . . . . . . 3564--3573
                  W.-Y. Tam and   
                  K.-S. Lui and   
                  S. Uludag and   
                   K. Nahrstedt   Quality-of-Service routing with path
                                  information aggregation  . . . . . . . . 3574--3594
            Himabindu Pucha and   
            Saumitra M. Das and   
                  Y. Charlie Hu   The performance impact of traffic
                                  patterns on routing protocols in mobile
                                  ad hoc networks  . . . . . . . . . . . . 3595--3616
             Patrick P. Lam and   
              Soung C. Liew and   
                 Jack Y. B. Lee   Cellular universal IP for nested network
                                  mobility . . . . . . . . . . . . . . . . 3617--3631
              Nitesh Saxena and   
                Gene Tsudik and   
                  Jeong Hyun Yi   Threshold cryptography in P2P and
                                  MANETs: The case of access control . . . 3632--3649
         Saralees Nadarajah and   
                    Samuel Kotz   On the convolution of Pareto and gamma
                                  distributions  . . . . . . . . . . . . . 3650--3654
               Do Young Eun and   
                   Xinbing Wang   Performance analysis of TCP/AQM with
                                  generalized AIMD under intermediate
                                  buffer sizes . . . . . . . . . . . . . . 3655--3671
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 51, Number 13, September 12, 2007

          Abdullah Balamash and   
               Marwan Krunz and   
                  Philippe Nain   Performance analysis of a client-side
                                  caching/prefetching system for Web
                                  traffic  . . . . . . . . . . . . . . . . 3673--3692
            Saumitra M. Das and   
            Himabindu Pucha and   
                  Y. Charlie Hu   On the scalability of rendezvous-based
                                  location services for geographic
                                  wireless ad hoc routing  . . . . . . . . 3693--3714
           Mohamed G. Gouda and   
                Alex X. Liu and   
               Lok M. Leung and   
                Mohamed A. Alam   SPP: An anti-phishing single password
                                  protocol . . . . . . . . . . . . . . . . 3715--3726
               Serdar Vural and   
                    Eylem Ekici   Probability distribution of
                                  multi-hop-distance in one-dimensional
                                  sensor networks  . . . . . . . . . . . . 3727--3749
                Issa Khalil and   
             Saurabh Bagchi and   
                 Ness B. Shroff   Lite Worp : Detection and isolation of
                                  the wormhole attack in static multihop
                                  wireless networks  . . . . . . . . . . . 3750--3772
              Marios Lestas and   
        Andreas Pitsillides and   
             Petros Ioannou and   
             George Hadjipollas   Adaptive congestion protocol: A
                                  congestion control protocol with
                                  learning capability  . . . . . . . . . . 3773--3798
            Sakib A. Mondal and   
               Faisal B. Luqman   Improving TCP performance over
                                  wired--wireless networks . . . . . . . . 3799--3811
            Baek-Young Choi and   
                   Sue Moon and   
               Zhi-Li Zhang and   
   Konstantina Papagiannaki and   
                Christophe Diot   Analysis of point-to-point packet delay
                                  in an operational network  . . . . . . . 3812--3827
                     Zhi Li and   
                 Lihua Yuan and   
          Prasant Mohapatra and   
                 Chen-Nee Chuah   On the analysis of overlay failure
                                  detection and recovery . . . . . . . . . 3828--3843
                Allen B. Downey   TCP self-clocking and bandwidth sharing  3844--3863
          Anat Bremler-Barr and   
               Nir Halachmi and   
                    Hanoch Levy   Protecting bursty applications against
                                  traffic aggressiveness . . . . . . . . . 3864--3877
          Nizar Bouabdallah and   
                   Harry Perros   Cost-effective single-hub WDM ring
                                  networks: A proposal and analysis  . . . 3878--3901
         Ignacio Más and   
                Gunnar Karlsson   Probe-based admission control for a
                                  differentiated-services Internet . . . . 3902--3918
            Yong-Xiang Zhao and   
                 Chang-Jia Chen   A redundant overbooking reservation
                                  algorithm for OBS/OPS networks . . . . . 3919--3934
             Animesh Patcha and   
                  Jung-Min Park   Network anomaly detection with
                                  incomplete audit data  . . . . . . . . . 3935--3955
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 51, Number 14, October 10, 2007

                      Qi He and   
      Constantinos Dovrolis and   
                  Mostafa Ammar   On the predictability of large transfer
                                  TCP throughput . . . . . . . . . . . . . 3959--3977
                  Yang Yang and   
                Feiyi Huang and   
                  Xiaohu Ge and   
             Xiaodong Zhang and   
                  Xuanye Gu and   
             Mohsen Guizani and   
                 Hsiao-Hwa Chen   Double sense multiple access for
                                  wireless ad hoc networks . . . . . . . . 3978--3988
         L. Sanna Randaccio and   
                      L. Atzori   Group multicast routing problem: A
                                  genetic algorithms based approach  . . . 3989--4004
           Mahasweta Sarkar and   
                   Rene L. Cruz   A MAC layer power management scheme for
                                  efficient energy delay tradeoff in a
                                  WLAN . . . . . . . . . . . . . . . . . . 4005--4031
             Tomaso de Cola and   
               Harald Ernst and   
                 Mario Marchese   Performance analysis of CCSDS File
                                  Delivery Protocol and erasure coding
                                  techniques in deep space environments    4032--4049
                   Wenji Wu and   
                  Matt Crawford   Interactivity vs. fairness in networked
                                  Linux systems  . . . . . . . . . . . . . 4050--4069
            Chih-Yung Chang and   
                Chao-Tsun Chang   TARP: A traffic-aware restructuring
                                  protocol for Bluetooth radio networks    4070--4091
                Mario Baldi and   
            Guido Marchetto and   
                     Yoram Ofek   A scalable solution for engineering
                                  streaming traffic in the future Internet 4092--4111
              A. Al Hanbali and   
              A. A. Kherani and   
              R. Groenevelt and   
                    P. Nain and   
                      E. Altman   Impact of mobility on the performance of
                                  relaying in ad hoc networks -- Extended
                                  version  . . . . . . . . . . . . . . . . 4112--4130
       Duong Nguyen Binh Ta and   
                   Suiping Zhou   A two-phase approach to interactivity
                                  enhancement for large-scale distributed
                                  virtual environments . . . . . . . . . . 4131--4152
            Mehmet H. Gunes and   
               Sevcan Bilir and   
                Kamil Sarac and   
                 Turgay Korkmaz   A measurement study on overhead
                                  distribution of value-added Internet
                                  services . . . . . . . . . . . . . . . . 4153--4173
                   Sagy Bar and   
                 Mira Gonen and   
                   Avishai Wool   A geographic directed preferential
                                  Internet topology model  . . . . . . . . 4174--4188
      Thierry Rakotoarivelo and   
       Patrick Sénac and   
          Aruna Seneviratne and   
                    Michel Diaz   SPAD: A distributed middleware
                                  architecture for QoS enhanced alternate
                                  path discovery . . . . . . . . . . . . . 4189--4211
             Samphel Norden and   
                  Katherine Guo   Support for resilient Peer-to-Peer
                                  gaming . . . . . . . . . . . . . . . . . 4212--4233
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 51, Number 15, October 24, 2007

           Abhishek Kashyap and   
                Kwangil Lee and   
            Mehdi Kalantari and   
              Samir Khuller and   
                   Mark Shayman   Integrated topology control and routing
                                  in wireless optical mesh networks  . . . 4237--4251
               Shigang Chen and   
                 Yibei Ling and   
                 Randy Chow and   
                         Ye Xia   AID: A global anti-DoS service . . . . . 4252--4269
     P. Pavon-Mariño and   
             J. Garcia-Haro and   
                   A. Jajszczyk   Parallel desynchronized block matching:
                                  A feasible scheduling algorithm for the
                                  input-buffered wavelength-routed switch  4270--4283
    Vaishnavi Krishnamurthy and   
         Michalis Faloutsos and   
              Marek Chrobak and   
               Jun-Hong Cui and   
                     Li Lao and   
                Allon G. Percus   Sampling large Internet topologies for
                                  simulation purposes  . . . . . . . . . . 4284--4302
               Weichao Wang and   
                 Tylor Stransky   Stateless key distribution for secure
                                  intra and inter-group multicast in
                                  mobile wireless network  . . . . . . . . 4303--4321
               Wesam Lootah and   
               William Enck and   
               Patrick McDaniel   TARP: Ticket-based address resolution
                                  protocol . . . . . . . . . . . . . . . . 4322--4337
               Dongwook Lee and   
    Gayathri Chandrasekaran and   
         Mukundan Sridharan and   
                   Prasun Sinha   Association management for data
                                  dissemination over wireless mesh
                                  networks . . . . . . . . . . . . . . . . 4338--4355
              E. Papapetrou and   
            S. Karapantazis and   
                 F.-N. Pavlidou   Distributed on-demand routing for LEO
                                  satellite systems  . . . . . . . . . . . 4356--4376
   Panagiotis Papadimitriou and   
           Vassilis Tsaoussidis   SSVP: A congestion control scheme for
                                  real-time video streaming  . . . . . . . 4377--4395
         Dzmitry Kliazovich and   
          Fabrizio Granelli and   
                    Mario Gerla   Performance improvement in wireless
                                  networks using cross-layer ARQ . . . . . 4396--4411
             Roberto Cusani and   
          Tiziano Inzerilli and   
                 Luca Valentini   Network monitoring and performance
                                  evaluation in a 3.5G network . . . . . . 4412--4420
          Kenneth J. Turner and   
            Koon Leai Larry Tan   A rigorous approach to orchestrating
                                  grid services  . . . . . . . . . . . . . 4421--4441
                   Hyuk Lim and   
                Jennifer C. Hou   Identifying lossy links in
                                  wired/wireless networks by exploiting
                                  sparse characteristics . . . . . . . . . 4442--4459
              Vicent Cholvi and   
              Juan Echagüe   Stability of FIFO networks under
                                  adversarial models: State of the art . . 4460--4474
                 Lijun Wang and   
                    Lin Cai and   
                 Xinzhi Liu and   
          Xuemin (Sherman) Shen   Stability and TCP-friendliness of
                                  AIMD/RED systems with feedback delays    4475--4491
              Jordi Guitart and   
              David Carrera and   
      Vicenç Beltran and   
               Jordi Torres and   
          Eduard Ayguadé   Designing an overload control strategy
                                  for secure e-commerce applications . . . 4492--4510
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 51, Number 16, November 14, 2007

           Simon Courtenage and   
                David Lewis and   
            Thanassis Tiropanis   Innovations in Web communications
                                  infrastructure . . . . . . . . . . . . . 4511--4513
             Elke Michlmayr and   
                  Arno Pany and   
                   Gerti Kappel   Using taxonomies for content-based
                                  routing with ants  . . . . . . . . . . . 4514--4528
       Juan Ignacio Vazquez and   
Diego López-de-Ipiña   mRDP: An HTTP-based lightweight semantic
                                  discovery protocol . . . . . . . . . . . 4529--4542
                     Tao Gu and   
             Hung Keng Pung and   
                   Daqing Zhang   Information retrieval in schema-based
                                  P2P systems using one-dimensional
                                  semantic space . . . . . . . . . . . . . 4543--4560
         Frank Zhigang Wang and   
                  Na Helian and   
                  Sining Wu and   
                 Yuhui Deng and   
               Vineet Khare and   
                 Michael Parker   GridJet: An underlying data-transporting
                                  protocol for accelerating Web
                                  communications . . . . . . . . . . . . . 4561--4573
               Dominik Benz and   
            Karen H. L. Tso and   
            Lars Schmidt-Thieme   Supporting collaborative hierarchical
                                  classification: Bookmarks as an example  4574--4585
              Trevor Fenner and   
                Mark Levene and   
              George Loizou and   
                 George Roussos   A stochastic evolutionary growth model
                                  for social networks  . . . . . . . . . . 4586--4595
          George Kormentzas and   
                Thomas Magedanz   Middleware challenges for next
                                  generation networks and services . . . . 4596--4598
               Pruet Boonma and   
                 Junichi Suzuki   BiSNET: A biologically-inspired
                                  middleware architecture for
                                  self-managing wireless sensor networks   4599--4616
       Yassine Hadjadj Aoul and   
              Ahmed Mehaoua and   
             Charalabos Skianis   A fuzzy logic-based AQM for real-time
                                  traffic over Internet  . . . . . . . . . 4617--4633
         Jaakko Kangasharju and   
           Tancred Lindholm and   
                   Sasu Tarkoma   XML messaging for mobile devices: From
                                  requirements to implementation . . . . . 4634--4654
        Ivar Jòrstad and   
                   Do Thanh van   Personalised ubiquitous file access with
                                  XML Web Services . . . . . . . . . . . . 4655--4668
              Eugen Borcoci and   
        Georgios Kormentzas and   
  Abolghasem (Hamid) Asgari and   
                   Toufik Ahmed   Service invocation admission control
                                  algorithm for multi-domain IP
                                  environments . . . . . . . . . . . . . . 4669--4678
      Georgios V. Lioudakis and   
Eleftherios A. Koutsoloukas and   
         Nikolaos L. Dellas and   
          Nikolaos Tselikas and   
            Sofia Kapellaki and   
       George N. Prezerakos and   
       Dimitra I. Kaklamani and   
            Iakovos S. Venieris   A middleware architecture for privacy
                                  protection . . . . . . . . . . . . . . . 4679--4696
              Muhammad Sher and   
                Thomas Magedanz   A vulnerabilities analysis and
                                  corresponding middleware security
                                  extensions for securing NGN applications 4697--4709
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 51, Number 17, December 5, 2007

               S. Jayashree and   
             C. Siva Ram Murthy   Towards estimating lifetime of ad hoc
                                  wireless networks  . . . . . . . . . . . 4711--4726
       Alireza Nemaney Pour and   
            Kazuya Kumekawa and   
             Toshihiko Kato and   
                   Shuichi Itoh   A hierarchical group key management
                                  scheme for secure multicast increasing
                                  efficiency of key distribution in leave
                                  operation  . . . . . . . . . . . . . . . 4727--4743
                  Lisong Xu and   
                    Josh Helzer   Media streaming via TFRC: An analytical
                                  study of the impact of TFRC on
                                  user-perceived media quality . . . . . . 4744--4764
         Luiz H. A. Correia and   
           Daniel F. Macedo and   
        Aldri L. dos Santos and   
     Antonio A. F. Loureiro and   
 José Marcos S. Nogueira   Transmission power control techniques
                                  for wireless sensor networks . . . . . . 4765--4779
               Jianhong Xia and   
                  Lixin Gao and   
                       Teng Fei   A measurement study of persistent
                                  forwarding loops on the Internet . . . . 4780--4796
   Luciano Paschoal Gaspary and   
       Marinho P. Barcellos and   
        André Detsch and   
             Rodolfo S. Antunes   Flexible security in peer-to-peer
                                  applications: Enabling new opportunities
                                  beyond file sharing  . . . . . . . . . . 4797--4815
                Dragos Ilie and   
                 Adrian Popescu   Statistical models for Gnutella
                                  signaling traffic  . . . . . . . . . . . 4816--4835
                   Jian Chu and   
                   Chin-Tau Lea   A restorable MPLS-based hose-model VPN
                                  network  . . . . . . . . . . . . . . . . 4836--4848
             Telemaco Melia and   
        Antonio de la Oliva and   
               Albert Vidal and   
               Ignacio Soto and   
              Daniel Corujo and   
                     Rui Aguiar   Toward IP converged heterogeneous
                                  mobility: A network controlled approach  4849--4866
                 Minh Huynh and   
              Prasant Mohapatra   Metropolitan Ethernet Network: A move
                                  from LAN to MAN  . . . . . . . . . . . . 4867--4894
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 51, Number 18, December 19, 2007

        Andreas Pitsillides and   
    Christophoros Christophorou   MBMS Handover control: A new approach
                                  for efficient handover in MBMS enabled
                                  3G cellular networks . . . . . . . . . . 4897--4918
                    Yung Yi and   
              Sanjay Shakkottai   FluNet: A hybrid Internet simulator for
                                  fast queue regimes . . . . . . . . . . . 4919--4937
                Vanesa Daza and   
             Javier Herranz and   
                Paz Morillo and   
                 Carla R\`afols   Cryptographic techniques for mobile
                                  ad-hoc networks  . . . . . . . . . . . . 4938--4950
             M. E. Kounavis and   
                   A. Kumar and   
                R. Yavatkar and   
                         H. Vin   Two stage packet classification using
                                  most specific filter matching and
                                  transport level sharing  . . . . . . . . 4951--4978
           Manos Dramitinos and   
        George D. Stamoulis and   
            Costas Courcoubetis   An auction mechanism for allocating the
                                  bandwidth of networks to their users . . 4979--4996
               Kuo-Feng Ssu and   
             Chih-Hsun Chou and   
              Wei-Tong Wang and   
                Shin-Hung Chung   Improving data transmission with helping
                                  nodes for geographical ad hoc routing    4997--5010
                  Shu Huang and   
                    Rudra Dutta   Spare capacity provisioning for
                                  quasi-static traffic . . . . . . . . . . 5011--5035
                   Kejie Lu and   
                  Dapeng Wu and   
                 Jieyan Fan and   
           Sinisa Todorovic and   
                  Antonio Nucci   Robust and efficient detection of DDoS
                                  attacks for large-scale Internet . . . . 5036--5056


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 52, Number 1, January 18, 2008

          Nael Abu-Ghazaleh and   
               Enrique Alba and   
  Carla-Fabiana Chiasserini and   
                 Renato LoCigno   Guest Editorial  . . . . . . . . . . . . 1--3
             Damien Charlet and   
     Valérie Issarny and   
                  Rafik Chibout   Energy-efficient middleware-layer
                                  multi-radio networking: An assessment in
                                  the area of service discovery  . . . . . 4--24
                 Junhua Zhu and   
                Ka-Lok Hung and   
             Brahim Bensaou and   
          Farid Nait-Abdesselam   Rate-lifetime tradeoff for reliable
                                  communication in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 25--43
                  Chen Avin and   
         Bhaskar Krishnamachari   The power of choice in random walks: An
                                  empirical study  . . . . . . . . . . . . 44--60
                  Chunyu Hu and   
               Hwangnam Kim and   
                Jennifer C. Hou   Short-term non-uniform access in IEEE
                                  802.11-compliant WLANs: A study on its
                                  impact on the saturation performance . . 61--76
     Tahiry Razafindralambo and   
Isabelle Guérin-lassous and   
              Luigi Iannone and   
                    Serge Fdida   Dynamic and distributed packet
                                  aggregation to solve the performance
                                  anomaly in 802.11 wireless networks  . . 77--95
          Alexander Sayenko and   
                Olli Alanen and   
 Timo Hämäläinen   Scheduling solution for the IEEE 802.16
                                  base station . . . . . . . . . . . . . . 96--115
             Patrick Stuedi and   
                 Gustavo Alonso   Modeling and computing throughput
                                  capacity of wireless multihop networks   116--129
           Athanasios Bamis and   
         Azzedine Boukerche and   
    Ioannis Chatzigiannakis and   
            Sotiris Nikoletseas   A mobility aware protocol synthesis for
                                  efficient routing in ad hoc mobile
                                  networks . . . . . . . . . . . . . . . . 130--154
             Luciano Bononi and   
            Marco Di Felice and   
          Gabriele D'Angelo and   
            Michele Bracuto and   
             Lorenzo Donatiello   MoVES: A framework for parallel and
                                  distributed simulation of wireless
                                  vehicular ad hoc networks  . . . . . . . 155--179
       Sherif M. ElRakabawy and   
            Alexander Klemm and   
            Christoph Lindemann   TCP with gateway adaptive pacing for
                                  multihop wireless networks with Internet
                                  connectivity . . . . . . . . . . . . . . 180--198
             Raffaele Bruno and   
                Marco Conti and   
                 Enrico Gregori   An accurate closed-form formula for the
                                  throughput of long-lived TCP connections
                                  in IEEE 802.11 WLANs . . . . . . . . . . 199--212
            Charalambos Skianis   Editorial for the special issue on
                                  synergy of telecommunication and
                                  broadcasting networks  . . . . . . . . . 213--214
        Spyridon L. Tompros and   
               Spyridon Denazis   Interworking of heterogeneous access
                                  networks and QoS provisioning via IP
                                  multimedia core networks . . . . . . . . 215--227
             Justino Santos and   
                Diogo Gomes and   
            Susana Sargento and   
              Rui L. Aguiar and   
                Nigel Baker and   
               Madiha Zafar and   
                    Ahsan Ikram   Multicast/broadcast network convergence
                                  in next generation mobile networks . . . 228--247
          Dimitris Charilas and   
            Ourania Markaki and   
      Dimitris Nikitopoulos and   
              Michael Theologou   Packet-switched network selection with
                                  the highest QoS in 4G networks . . . . . 248--258
             Joon-Sang Park and   
                  Seung-Jae Han   Load balancing for video streaming
                                  services in hierarchical wireless
                                  networks . . . . . . . . . . . . . . . . 259--274
                 Igor Bisio and   
                 Mario Marchese   Performance evaluation of bandwidth
                                  allocation methods in a geostationary
                                  satellite channel in the presence of
                                  Internet traffic . . . . . . . . . . . . 275--291
                G. Gardikis and   
                 S. Orfanos and   
              G. Kormentzas and   
                  E. Pallis and   
                     A. Kourtis   Dynamic IP configuration of terminals in
                                  broadcasting networks  . . . . . . . . . 292--302
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 52, Number 2, February 8, 2008

             Soraya Kasnavi and   
                Paul Berube and   
             Vincent Gaudet and   
      José Nelson Amaral   A cache-based Internet protocol address
                                  lookup architecture  . . . . . . . . . . 303--326
         Jamal N. Al-Karaki and   
                 Ahmed E. Kamal   Efficient virtual-backbone routing in
                                  mobile ad hoc networks . . . . . . . . . 327--350
                  Kazumasa Oida   On the impact of QoS-sensitivity on
                                  correlation structures . . . . . . . . . 351--359
                     S. Toumpis   Mother nature knows best: A survey of
                                  recent results on wireless networks
                                  based on analogies with physics  . . . . 360--383
               Changhan Kim and   
              Younghoon Kim and   
              Jae-Heon Yang and   
                     Ikjun Yeom   Analysis of bandwidth efficiency in
                                  overlay multicasting . . . . . . . . . . 384--398
                     Jun Li and   
            Jelena Mirkovic and   
            Toby Ehrenkranz and   
               Mengqiu Wang and   
               Peter Reiher and   
                    Lixia Zhang   Learning the valid incoming direction of
                                  IP packets . . . . . . . . . . . . . . . 399--417
             Chih-Hsun Chou and   
               Kuo-Feng Ssu and   
         Hewijin Christine Jiau   Dynamic route maintenance for geographic
                                  forwarding in mobile ad hoc networks . . 418--431
         Mercedes G. Merayo and   
 Manuel Núñez and   
        Ismael Rodríguez   Formal testing from timed finite state
                                  machines . . . . . . . . . . . . . . . . 432--460
              Basem Shihada and   
                     Pin-Han Ho   A novel TCP with dynamic
                                  Burst-Contention Loss notification over
                                  OBS networks . . . . . . . . . . . . . . 461--471
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 52, Number 3, February 22, 2008

            Ian F. Akyildiz and   
                    Harry Rudin   Editorial  . . . . . . . . . . . . . . . 473--474
                 M. Mandjes and   
                M. Ramakrishnan   Bandwidth trading under misaligned
                                  objectives: Decentralized
                                  measurement-based control  . . . . . . . 475--492
               Amir Nayyeri and   
          Sajjad Zarifzadeh and   
             Nasser Yazdani and   
      Mohammad Mahmoody-Ghidary   Load sensitive topology control: Towards
                                  minimum energy consumption in dense ad
                                  hoc sensor networks  . . . . . . . . . . 493--513
            Yanni Ellen Liu and   
                 Johnny W. Wong   Deadline-based scheduling in support of
                                  real-time data delivery  . . . . . . . . 514--530
             Tai-Jung Chang and   
               Kuochen Wang and   
                  Yi-Ling Hsieh   A color-theory-based energy efficient
                                  routing algorithm for mobile wireless
                                  sensor networks  . . . . . . . . . . . . 531--541
                    Yan Jin and   
                  Ling Wang and   
                Yoohwan Kim and   
                  Xiaozong Yang   EEMC: An energy-efficient multi-level
                                  clustering algorithm for large-scale
                                  wireless sensor networks . . . . . . . . 542--562
             Raffaele Bolla and   
            Roberto Bruschi and   
              Franco Davoli and   
                 Matteo Repetto   Hybrid optimization for QoS control in
                                  IP Virtual Private Networks  . . . . . . 563--580
               Chiapin Wang and   
                   Tsungnan Lin   Application of neural networks for
                                  achieving 802.11 QoS in heterogeneous
                                  channels . . . . . . . . . . . . . . . . 581--592
         Srihari Nelakuditi and   
                Zifei Zhong and   
               Junling Wang and   
             Ram Keralapura and   
                 Chen-Nee Chuah   Mitigating transient loops through
                                  interface-specific forwarding  . . . . . 593--609
         Shashidhar Gandham and   
                 Ying Zhang and   
                 Qingfeng Huang   Distributed time-optimal scheduling for
                                  convergecast in wireless sensor networks 610--629
    G. Ibáñez and   
A. García-Martínez and   
                 A. Azcorra and   
                        I. Soto   ABridges: Scalable, self-configuring
                                  Ethernet campus networks . . . . . . . . 630--649
       Tobias Hoßfeld and   
       Andreas Binzenhöfer   Analysis of Skype VoIP traffic in UMTS:
                                  End-to-end QoS and QoE measurements  . . 650--666
              Kyung Hee Kim and   
             Jang Hyun Baek and   
                  Che Soong Kim   Modeling and optimization of zone-based
                                  registration considering cell-by-cell
                                  location area for mobile communication
                                  networks . . . . . . . . . . . . . . . . 667--674
             Murat Karakaya and   
 \.Ibrahim Körpeo\uglu and   
         Özgür Ulusoy   Counteracting free riding in
                                  Peer-to-Peer networks  . . . . . . . . . 675--694
                  Chunxi Li and   
                  Changjia Chen   On Gnutella topology dynamics by
                                  studying leaf and ultra connection
                                  jointly in phase space . . . . . . . . . 695--719
          Kate Ching-Ju Lin and   
                  Cheng-Fu Chou   Cooperative content dissemination in
                                  multi-channel WLAN hotspots  . . . . . . 720--738
               Hongtao Tian and   
             Sanjay K. Bose and   
              Choi Look Law and   
                   Wendong Xiao   Joint routing and flow rate optimization
                                  in multi-rate ad hoc networks  . . . . . 739--764
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 52, Number 4, March 14, 2008

           Ye (Geoffrey) Li and   
    Petri Mähönen and   
        Milind M. Buddhikot and   
               Ying-Chang Liang   Computer Networks (Elsevier) Special
                                  Issue on Cognitive Wireless Networks . . 775--777
       Alexandre de Baynast and   
    Petri Mähönen and   
                 Marina Petrova   ARQ-based cross-layer optimization for
                                  wireless multicarrier transmission on
                                  cognitive radio networks . . . . . . . . 778--794
                  Chuan Han and   
                   Jun Wang and   
                Yaling Yang and   
                    Shaoqian Li   Addressing the control channel design
                                  problem: OFDM-based transform domain
                                  communication system in cognitive radio  795--815
                   A. Attar and   
             S. A. Ghorashi and   
          M. Sooriyabandara and   
                  A. H. Aghvami   Challenges of real-time secondary usage
                                  of spectrum  . . . . . . . . . . . . . . 816--830
   Srinivasan Krishnamurthy and   
             Mansi Thoppian and   
              Srikant Kuppa and   
          R. Chandrasekaran and   
              Neeraj Mittal and   
              S. Venkatesan and   
                   Ravi Prakash   Time-efficient distributed layer-2
                                  auto-configuration for cognitive radio
                                  networks . . . . . . . . . . . . . . . . 831--849
                   Jie Chen and   
                Chulin Liao and   
                  Chuan Han and   
                    Shaoqian Li   Extending available spectrum in
                                  cognitive radio: Hierarchical spectrum
                                  sharing network  . . . . . . . . . . . . 850--863
                   Chao Zou and   
                    Tao Jin and   
            Chunxiao Chigan and   
                       Zhi Tian   QoS-aware distributed spectrum sharing
                                  for heterogeneous wireless cognitive
                                  networks . . . . . . . . . . . . . . . . 864--878
              Sorabh Gandhi and   
      Chiranjeeb Buragohain and   
                   Lili Cao and   
               Haitao Zheng and   
                   Subhash Suri   Towards real-time dynamic spectrum
                                  auctions . . . . . . . . . . . . . . . . 879--897
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 52, Number 5, April 10, 2008

             Neelesh Bansod and   
               Ashish Malgi and   
              Byung K. Choi and   
                      Jean Mayo   MuON: Epidemic based mutual anonymity in
                                  unstructured P2P networks  . . . . . . . 915--934
                Leiwen Deng and   
                    Yan Gao and   
                   Yan Chen and   
          Aleksandar Kuzmanovic   Pollution attacks and defenses for
                                  Internet caching systems . . . . . . . . 935--956
             Amey Shevtekar and   
                  Nirwan Ansari   A router-based technique to mitigate
                                  reduction of quality (RoQ) attacks . . . 957--970
              Yung-Cheng Tu and   
            Meng Chang Chen and   
               Yeali S. Sun and   
                  Wei-Kuan Shih   Enhanced bulk scheduling for supporting
                                  delay sensitive streaming applications   971--987
                 Luo Junhai and   
                    Xue Liu and   
                      Ye Danxia   Research on multicast routing protocols
                                  for mobile ad-hoc networks . . . . . . . 988--997
               Fabien Viger and   
             Brice Augustin and   
           Xavier Cuvellier and   
    Clémence Magnien and   
            Matthieu Latapy and   
             Timur Friedman and   
                Renata Teixeira   Detection, understanding, and prevention
                                  of traceroute measurement artifacts  . . 998--1018
           Rita H. Wouhaybi and   
             Andrew T. Campbell   Building resilient low-diameter
                                  peer-to-peer topologies  . . . . . . . . 1019--1039
              Seong-il Hahm and   
               Jong-won Lee and   
                 Chong-kwon Kim   Maximizing multiuser diversity gains in
                                  IEEE 802.11 WLANs  . . . . . . . . . . . 1040--1057
                V. Sarangan and   
          M. R. Devarapalli and   
               S. Radhakrishnan   A framework for fast RFID tag reading in
                                  static and mobile environments . . . . . 1058--1073
                    Liu Bin and   
                 Lin Chuang and   
                  Qiao Jian and   
                He Jianping and   
                 Peter Ungsunan   A NetFlow based flow analysis and
                                  monitoring system in enterprise networks 1074--1092
                     Yue Ma and   
                 Chengwen Zhang   Quick convergence of genetic algorithm
                                  for QoS-driven web service selection . . 1093--1104
               Kannan Rajah and   
               Sanjay Ranka and   
                         Ye Xia   Scheduling bulk file transfers with
                                  start and end times  . . . . . . . . . . 1105--1122
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 52, Number 6, April 24, 2008

           Ernesto Exposito and   
        Nicolas Van Wambeke and   
         Christophe Chassot and   
                   Khalil Drira   Introducing a cross-layer interpreter
                                  for multimedia streams . . . . . . . . . 1125--1141
          Antonis Panagakis and   
           Athanasios Vaios and   
            Ioannis Stavrakakis   Approximate analysis of LRU in the case
                                  of short term correlations . . . . . . . 1142--1152
             Larissa Popova and   
              Thomas Herpel and   
        Wolfgang Gerstacker and   
                  Wolfgang Koch   Cooperative mobile-to-mobile file
                                  dissemination in cellular networks
                                  within a unified radio interface . . . . 1153--1165
                      Ji Li and   
              Kwan L. Yeung and   
                  Chun-Kit Chan   Efficient path protection in
                                  bi-directional WDM systems . . . . . . . 1166--1178
   Ana Paula Couto da Silva and   
       Martín Varela and   
   Edmundo de Souza e Silva and   
     Rosa M. M. Leão and   
                 Gerardo Rubino   Quality assessment of interactive voice
                                  applications . . . . . . . . . . . . . . 1179--1192
              Yueping Zhang and   
              Derek Leonard and   
                Dmitri Loguinov   Jetmax: Scalable max--min congestion
                                  control for high-speed heterogeneous
                                  networks . . . . . . . . . . . . . . . . 1193--1219
        Alexander Chobanyan and   
                 Matt Mutka and   
        Vidiadhar Mandrekar and   
                        Ning Xi   End-to-end available bandwidth as a
                                  random autocorrelated QoS-relevant
                                  time-series  . . . . . . . . . . . . . . 1220--1237
        Vilas Veeraraghavan and   
                   Steven Weber   Fundamental tradeoffs in distributed
                                  algorithms for rate adaptive multimedia
                                  streams  . . . . . . . . . . . . . . . . 1238--1251
         Gábor Fodor and   
        Miklós Telek and   
       Chrysostomos Koutsimanis   Performance analysis of scheduling and
                                  interference coordination policies for
                                  OFDMA networks . . . . . . . . . . . . . 1252--1271
           Anirban Banerjee and   
         Michalis Faloutsos and   
                   Laxmi Bhuyan   The P2P war: Someone is monitoring your
                                  activities . . . . . . . . . . . . . . . 1272--1280
        Hichem Ayed Harhira and   
                  Samuel Pierre   A novel admission control mechanism in
                                  GMPLS-based IP over optical networks . . 1281--1290
             Pietro Belotti and   
             Antonio Capone and   
           Giuliana Carello and   
             Federico Malucelli   Multi-layer MPLS network design: The
                                  impact of statistical multiplexing . . . 1291--1307
              Cheng-Yuan Ho and   
             Yaw-Chung Chen and   
              Yi-Cheng Chan and   
                   Cheng-Yun Ho   Fast retransmit and fast recovery
                                  schemes of transport protocols: A survey
                                  and taxonomy . . . . . . . . . . . . . . 1308--1327
           Shih-Chang Huang and   
              Rong-Hong Jan and   
                       Wuu Yang   SCPS: A self-configuring power-saving
                                  protocol for wireless ad hoc networks    1328--1342
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 52, Number 7, May 15, 2008

           Michal Szymaniak and   
             David Presotto and   
           Guillaume Pierre and   
              Maarten van Steen   Practical large-scale latency estimation 1343--1364
                 A. Kherani and   
               R. El-Khoury and   
               R. El-Azouzi and   
                      E. Altman   Stability--throughput tradeoff and
                                  routing in multi-hop wireless ad hoc
                                  networks . . . . . . . . . . . . . . . . 1365--1389
              Jordi Guitart and   
              David Carrera and   
      Vicenç Beltran and   
               Jordi Torres and   
          Eduard Ayguadé   Dynamic CPU provisioning for
                                  self-managed secure web applications in
                                  SMP hosting platforms  . . . . . . . . . 1390--1409
                Baochun Bai and   
              Janelle Harms and   
                        Yuxi Li   Configurable active multicast congestion
                                  control  . . . . . . . . . . . . . . . . 1410--1432
         Vitalis G. Ozianyi and   
               Neco Ventura and   
                Eugene Golovins   A novel pricing approach to support QoS
                                  in 3G networks . . . . . . . . . . . . . 1433--1450
                 Yuh-Jzer Joung   Approaching neighbor proximity and load
                                  balance for range query in P2P networks  1451--1472
 Christophe De Vleeschouwer and   
                Pascal Frossard   Loss-resilient window-based congestion
                                  control  . . . . . . . . . . . . . . . . 1473--1491
                    Lei Guo and   
               Xingwei Wang and   
                    Jin Cao and   
                       Lemin Li   Traffic recovery time constrained shared
                                  sub-path protection algorithm in
                                  survivable WDM networks  . . . . . . . . 1492--1505
           Sandeep K. Ahuja and   
     Srinivasan Ramasubramanian   All-to-all disjoint multipath routing
                                  using cycle embedding  . . . . . . . . . 1506--1517
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 52, Number 8, June 12, 2008

      Dimitrios D. Vergados and   
Alexandros Panoutsakopoulos and   
            Christos Douligeris   Group registration with distributed
                                  databases for location tracking in 3G
                                  wireless networks  . . . . . . . . . . . 1521--1544
             Seung Yeob Nam and   
                Hyu-Dae Kim and   
                   Hyong S. Kim   Detector SherLOCK: Enhancing TRW with
                                  Bloom filters under memory and
                                  performance constraints  . . . . . . . . 1545--1566
              Craig A. Shue and   
               Minaxi Gupta and   
                Matthew P. Davy   Packet forwarding with source
                                  verification . . . . . . . . . . . . . . 1567--1582
         A. Antony Franklin and   
             C. Siva Ram Murthy   A link layer adaptive pacing scheme for
                                  improving throughput of transport
                                  protocols in wireless mesh networks  . . 1583--1602
        Padmaraj M. V. Nair and   
            Suku V. S. Nair and   
            Marco Marchetti and   
           Girish Chiruvolu and   
                      Maher Ali   Bandwidth sensitive fast failure
                                  recovery scheme for Metro Ethernet . . . 1603--1616
            Pawe\l Garbacki and   
           Dick H. J. Epema and   
              Maarten van Steen   Broker-placement in latency-aware
                                  peer-to-peer networks  . . . . . . . . . 1617--1633
            Rongsheng Huang and   
             Hongqiang Zhai and   
                  Chi Zhang and   
                   Yuguang Fang   SAM-MAC: An efficient channel assignment
                                  scheme for multi-channel ad hoc networks 1634--1646
                    Qi Wang and   
            Robert Atkinson and   
                    John Dunlop   Design and evaluation of flow handoff
                                  signalling for multihomed mobile nodes
                                  in wireless overlay networks . . . . . . 1647--1674
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 52, Number 9, June 26, 2008

               Chee-Wei Ang and   
                Chen-Khong Tham   iMST: A bandwidth-guaranteed topology
                                  control algorithm for TDMA-based ad hoc
                                  networks with sectorized antennas  . . . 1675--1692
                Minghui Shi and   
      Xuemin (Sherman) Shen and   
                Jon W. Mark and   
               Dongmei Zhao and   
                    Yixin Jiang   User authentication and undeniable
                                  billing support for agent-based roaming
                                  service in WLAN/cellular integrated
                                  mobile networks  . . . . . . . . . . . . 1693--1702
                     Hui Ma and   
                   Jing Zhu and   
                  Sumit Roy and   
                 Soo Young Shin   Joint transmit power and physical
                                  carrier sensing adaptation based on loss
                                  differentiation for high density IEEE
                                  802.11 WLAN  . . . . . . . . . . . . . . 1703--1720
           Michele Flammini and   
           Gianpiero Monaco and   
           Luca Moscardelli and   
           Mordechai Shalom and   
                    Shmuel Zaks   Selfishness, collusion and power of
                                  local search for the ADMs minimization
                                  problem  . . . . . . . . . . . . . . . . 1721--1731
                    Oleg Berzin   Mobility label based network: Mobility
                                  support in label switched networks with
                                  multi-protocol BGP . . . . . . . . . . . 1732--1744
               Fetahi Wuhib and   
                   Mads Dam and   
                   Rolf Stadler   Decentralized detection of global
                                  threshold crossings using aggregation
                                  trees  . . . . . . . . . . . . . . . . . 1745--1761
          Daniel M. Batista and   
    Nelson L. S. da Fonseca and   
         Flavio K. Miyazawa and   
              Fabrizio Granelli   Self-adjustment of resource allocation
                                  for grid applications  . . . . . . . . . 1762--1781
               Qunfeng Dong and   
            Ashutosh Shukla and   
          Vivek Shrivastava and   
            Dheeraj Agrawal and   
             Suman Banerjee and   
                    Koushik Kar   Load balancing in large-scale RFID
                                  systems  . . . . . . . . . . . . . . . . 1782--1796
Charalampos Konstantopoulos and   
           Damianos Gavalas and   
              Grammati Pantziou   Clustering in mobile ad hoc networks
                                  through neighborhood stability-based
                                  mobility prediction  . . . . . . . . . . 1797--1824
                 Xue Jun Li and   
            Boon-Chong Seet and   
            Peter Han Joo Chong   Multihop cellular networks: Technology
                                  and economics  . . . . . . . . . . . . . 1825--1837
                Mo-Che Chan and   
                Shun-Yun Hu and   
                Jehn-Ruey Jiang   An efficient and secure event signature
                                  (EASES) protocol for peer-to-peer
                                  massively multiplayer online games . . . 1838--1845
            Matti Siekkinen and   
     Guillaume Urvoy-Keller and   
          Ernst W. Biersack and   
                 Denis Collange   A root cause analysis toolkit for TCP    1846--1858
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 52, Number 10, July 16, 2008

             Ioannis Tomkos and   
            Davide Careglio and   
             Anna Tzanakaki and   
       Josep Solé-Pareta   Computer Networks journal special issue
                                  on: ``Challenges and opportunities in
                                  advanced optical networking''  . . . . . 1861--1863
          Haruhisa Ichikawa and   
            Masashi Shimizu and   
           Kazunori Akabane and   
               Osamu Ishida and   
                Mitsuo Teramoto   A Ubiquitous wireless network
                                  architecture and its impact on optical
                                  networks . . . . . . . . . . . . . . . . 1864--1872
                      Anonymous   Photonics in switching: Architectures,
                                  systems and enabling technologies  . . . 1873--1890
                   Wang Yao and   
               Byrav Ramamurthy   Rerouting schemes for dynamic traffic
                                  grooming in optical WDM networks . . . . 1891--1904
       Gustavo Sousa Pavani and   
       Luiz Gustavo Zuliani and   
              Helio Waldman and   
      Mauricio Magalhães   Distributed approaches for
                                  impairment-aware routing and wavelength
                                  assignment algorithms in GMPLS networks  1905--1915
 Víctor López and   
José Alberto Hernández and   
              Javier Aracil and   
Juan P. Fernández Palacios and   
Óscar González de Dios   A Bayesian decision theory approach for
                                  the techno-economic analysis of an
                                  all-optical router (extended version)    1916--1926
             Freek Dijkstra and   
                Bert Andree and   
              Karst Koymans and   
         Jeroen van der Ham and   
               Paola Grosso and   
                   Cees de Laat   A multi-layer network model based on
                                  ITU-T G.805  . . . . . . . . . . . . . . 1927--1937
            Eduard Escalona and   
          Salvatore Spadaro and   
             Jaume Comellas and   
                Gabriel Junyent   Advance reservations for service-aware
                                  GMPLS-based optical networks . . . . . . 1938--1950
                Sarah Ruepp and   
           Nicola Andriolli and   
                Jakob Buron and   
              Lars Dittmann and   
                 Lars Ellegaard   Restoration in all-optical GMPLS
                                  networks with limited wavelength
                                  conversion . . . . . . . . . . . . . . . 1951--1964
          Massimo Tornatore and   
     Matteo Carcagní and   
            Canhui (Sam) Ou and   
        Biswanath Mukherjee and   
              Achille Pattavina   Intelligent shared-segment protection    1965--1974
               Luis Velasco and   
          Salvatore Spadaro and   
             Jaume Comellas and   
                Gabriel Junyent   Introducing OMS protection in
                                  GMPLS-based optical ring networks  . . . 1975--1987
             Christian Awad and   
           Brunilde Sans\`o and   
            André Girard   DiffServ for differentiated reliability
                                  in meshed IP/WDM networks  . . . . . . . 1988--2012
            Amin R. Mazloom and   
              Preetam Ghosh and   
                Kalyan Basu and   
                   Sajal K. Das   CoCONet : A collision-free
                                  container-based core optical network . . 2013--2032
                  Qian Chen and   
             Gurusamy Mohan and   
                Kee Chaing Chua   Route optimization in optical burst
                                  switched networks considering the
                                  streamline effect  . . . . . . . . . . . 2033--2044
               Hui-Tang Lin and   
                Wang-Rong Chang   CORNet: An OBS metro ring network with
                                  QoS support and fairness control . . . . 2045--2064
            Georgios Zervas and   
                 Yixuan Qin and   
              Reza Nejabati and   
         Dimitra Simeonidou and   
           Franco Callegati and   
                 Aldo Campi and   
                 Walter Cerroni   SIP-enabled Optical Burst Switching
                                  architectures and protocols for
                                  application-aware optical networks . . . 2065--2076
                 Nasaruddin and   
                Tetsuo Tsujioka   Design of strict variable-weight optical
                                  orthogonal codes for differentiated
                                  quality of service in optical CDMA
                                  networks . . . . . . . . . . . . . . . . 2077--2086
            Yoshinari Awaji and   
           Hideaki Furukawa and   
                 Naoya Wada and   
                 Eddie Kong and   
                 Peter Chan and   
                        Ray Man   Guidelines for amplification of optical
                                  packets in WDM environment regarding
                                  impact of transient response of
                                  erbium-doped fiber amplifier . . . . . . 2087--2093
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 52, Number 11, August 8, 2008

             Elena Meshkova and   
      Janne Riihijärvi and   
             Marina Petrova and   
        Petri Mähönen   A survey on resource discovery
                                  mechanisms, peer-to-peer and service
                                  discovery frameworks . . . . . . . . . . 2097--2128
            Tae-Young Chang and   
             Zhenyun Zhuang and   
         Aravind Velayutham and   
           Raghupathy Sivakumar   WebAccel: Accelerating Web access for
                                  low-bandwidth hosts  . . . . . . . . . . 2129--2147
                  Jian Tang and   
          Satyajayant Misra and   
                   Guoliang Xue   Joint spectrum allocation and scheduling
                                  for fair spectrum sharing in cognitive
                                  radio wireless networks  . . . . . . . . 2148--2158
                  E. Amaldi and   
                  A. Capone and   
                  M. Cesana and   
               I. Filippini and   
                   F. Malucelli   Optimization models and methods for
                                  planning wireless mesh networks  . . . . 2159--2171
                S. M. Allen and   
             R. M. Whitaker and   
                      S. Hurley   Personalised subscription pricing for
                                  optimised wireless mesh network
                                  deployment . . . . . . . . . . . . . . . 2172--2188
            Chih-Yung Chang and   
                 Hsu-Ruey Chang   Energy-aware node placement, topology
                                  control and MAC scheduling for wireless
                                  sensor networks  . . . . . . . . . . . . 2189--2204
                   Qun Zhao and   
                 Mohan Gurusamy   Connected $K$-target coverage problem in
                                  wireless sensor networks with different
                                  observation scenarios  . . . . . . . . . 2205--2220
                  W. J. Liu and   
                        J. Gong   Double sampling for flow measurement on
                                  high speed links . . . . . . . . . . . . 2221--2226
               Jelena Mi\vsi\'c   Traffic and energy consumption of an
                                  IEEE 802.15.4 network in the presence of
                                  authenticated, ECC Diffie--Hellman
                                  ephemeral key exchange . . . . . . . . . 2227--2236
            Sukrit Dasgupta and   
   Jaudelice C. de Oliveira and   
                  J.-P. Vasseur   Dynamic traffic engineering for mixed
                                  traffic on international networks:
                                  Simulation and analysis on real network
                                  and traffic scenarios  . . . . . . . . . 2237--2258
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 52, Number 12, August 22, 2008

                      Anonymous   Publisher's Note . . . . . . . . . . . . 2259--2259
            Ian F. Akyildiz and   
          Fernando Brunetti and   
       Cristina Blázquez   Nanonetworks: A new communication
                                  paradigm . . . . . . . . . . . . . . . . 2260--2279
                  Daji Qiao and   
               Kang G. Shin and   
                 Zakhia Abichar   Energy-conservation in 802.11 WLANs via
                                  transmission-strategy-aware airtime
                                  allocation . . . . . . . . . . . . . . . 2280--2291
              Jennifer Yick and   
        Biswanath Mukherjee and   
                   Dipak Ghosal   Wireless sensor network survey . . . . . 2292--2330
                  Chih-Min Chao   OVSF code assignment strategies with
                                  minimal fragmentations for WCDMA systems 2331--2343
José Gutiérrez López and   
              Mohamed Imine and   
Rubén Cuevas Rumín and   
           Jens M. Pedersen and   
                  Ole B. Madsen   Multilevel network characterization
                                  using regular topologies . . . . . . . . 2344--2359
          Mort Naraghi-Pour and   
                    Vinay Desai   Loop-free traffic engineering with path
                                  protection in MPLS VPNs  . . . . . . . . 2360--2372
                 Yalin Chen and   
               Jue-Sam Chou and   
                   Hung-Min Sun   A novel mutual authentication scheme
                                  based on quadratic residues for RFID
                                  systems  . . . . . . . . . . . . . . . . 2373--2380
               Pallab Datta and   
                 Arun K. Somani   Graph transformation approaches for
                                  diverse routing in shared risk resource
                                  group (SRRG) failures  . . . . . . . . . 2381--2394
         Dzmitry Kliazovich and   
          Fabrizio Granelli and   
               Daniele Miorandi   Logarithmic window increase for TCP
                                  Westwood+ for improvement in high speed,
                                  long distance networks . . . . . . . . . 2395--2410
                Manish Jain and   
           Constantine Dovrolis   Path selection using available bandwidth
                                  estimation in overlay-based video
                                  streaming  . . . . . . . . . . . . . . . 2411--2418
  \.I. Kuban Altìnel and   
                Necati Aras and   
           Evren Güney and   
                      Cem Ersoy   Binary integer programming formulation
                                  and heuristics for differentiated
                                  coverage in heterogeneous sensor
                                  networks . . . . . . . . . . . . . . . . 2419--2431
                  M. Benini and   
                      S. Sicari   Assessing the risk of intercepting VoIP
                                  calls  . . . . . . . . . . . . . . . . . 2432--2446
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 52, Number 13, September 17, 2008

      Fotini-Niovi Pavlidou and   
        Andreas Pitsillides and   
        Henning Schulzrinne and   
                Dorghan Sisalem   Research and trials for reliable VoIP
                                  applications . . . . . . . . . . . . . . 2447--2449
               Jianxin Liao and   
                Jingyu Wang and   
                    Xiaomin Zhu   A multi-path mechanism for reliable VoIP
                                  transmission over wireless networks  . . 2450--2460
               Maria Kalama and   
                 Guray Acar and   
                Barry Evans and   
                  Ariane Isoard   VoIP over DVB-RCS satellite systems:
                                  Trial results and the impact of adaptive
                                  speech coding using cross-layer design   2461--2472
            Sofiene Jelassi and   
                  Habib Youssef   Adaptive playout scheduling algorithm
                                  tailored for real-time packet-based
                                  voice conversations over wireless ad-hoc
                                  networks . . . . . . . . . . . . . . . . 2473--2488
             Hung-Yun Hsieh and   
                 You-En Lin and   
                   Hsiao-Pu Lin   Enhancing VoIP service for ubiquitous
                                  communication in a campus WLAN with
                                  partial coverage . . . . . . . . . . . . 2489--2504
             Antonio Estepa and   
                  Rafael Estepa   Accurate resource estimation for
                                  homogeneous VoIP aggregated traffic  . . 2505--2517
          Dimitris Zisiadis and   
            Spyros Kopsidas and   
             Leandros Tassiulas   VIPSec defined . . . . . . . . . . . . . 2518--2528
              Ozgur B. Akan and   
            Pascal Frossard and   
                 Qian Zhang and   
                   Nikil Jayant   Special issue on wireless multimedia
                                  sensor networks  . . . . . . . . . . . . 2529--2531
             Navrati Saxena and   
               Abhishek Roy and   
                     Jitae Shin   Dynamic duty cycle and adaptive
                                  contention window based QoS-MAC protocol
                                  for wireless multimedia sensor networks  2532--2542
                  Chewoo Na and   
                Yaling Yang and   
                 Amitabh Mishra   An optimal GTS scheduling algorithm for
                                  time-sensitive transactions in IEEE
                                  802.15.4 networks  . . . . . . . . . . . 2543--2557
              Nurcan Tezcan and   
                     Wenye Wang   Self-orienting wireless multimedia
                                  sensor networks for occlusion-free
                                  viewpoints . . . . . . . . . . . . . . . 2558--2567
                Changsu Suh and   
         Zeeshan Hameed Mir and   
                   Young-Bae Ko   Design and implementation of enhanced
                                  IEEE 802.15.4 for supporting multimedia
                                  service in Wireless Sensor Networks  . . 2568--2581
           Baljeet Malhotra and   
          Ioanis Nikolaidis and   
                  Janelle Harms   Distributed classification of acoustic
                                  targets in wireless audio-sensor
                                  networks . . . . . . . . . . . . . . . . 2582--2593
                     Qin Lu and   
                Wusheng Luo and   
                Jidong Wang and   
                        Bo Chen   Low-complexity and energy efficient
                                  image compression scheme for wireless
                                  sensor networks  . . . . . . . . . . . . 2594--2603
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 52, Number 14, October 9, 2008

                Edith Cohen and   
             Nadav Grossaug and   
                    Haim Kaplan   Processing top-$k$ queries from samples  2605--2622
     Karthikeyan Sundaresan and   
           Raghupathy Sivakumar   Routing in ad-hoc networks with MIMO
                                  links: Optimization considerations and
                                  protocols  . . . . . . . . . . . . . . . 2623--2644
           Alberto Dainotti and   
     Antonio Pescapé and   
      Pierluigi Salvo Rossi and   
         Francesco Palmieri and   
                 Giorgio Ventre   Internet traffic modeling by means of
                                  Hidden Markov Models . . . . . . . . . . 2645--2662
               Marco Mellia and   
                Michela Meo and   
           Luca Muscariello and   
                    Dario Rossi   Passive analysis of TCP anomalies  . . . 2663--2676
     Stênio Fernandes and   
           Carlos Kamienski and   
              Judith Kelner and   
          Dênio Mariz and   
                   Djamel Sadok   A stratified traffic sampling
                                  methodology for seeing the big picture   2677--2689
          Tristan Henderson and   
                 David Kotz and   
                    Ilya Abyzov   The changing usage of a mature
                                  campus-wide wireless network . . . . . . 2690--2712
             Dawood Al-Abri and   
                  Janise McNair   On the interaction between localization
                                  and location verification for wireless
                                  sensor networks  . . . . . . . . . . . . 2713--2727
            Mesut Ali Ergin and   
       Kishore Ramachandran and   
                 Marco Gruteser   An experimental study of inter-cell
                                  interference effects on system
                                  performance in unplanned wireless LAN
                                  deployments  . . . . . . . . . . . . . . 2728--2744
                F. Oliviero and   
                  L. Peluso and   
                   S. P. Romano   REFACING: An autonomic approach to
                                  network security based on
                                  multidimensional trustworthiness . . . . 2745--2763
            Chao-Tsun Chang and   
            Chih-Yung Chang and   
                Sheng-Wen Chang   TMCP: Two-layer multicast communication
                                  protocol for Bluetooth radio networks    2764--2778
                  K. Akkaya and   
                    S. Janapala   Maximizing connected coverage via
                                  controlled actor relocation in wireless
                                  sensor and actor networks  . . . . . . . 2779--2796
                     Yi Shi and   
                  Y. Thomas Hou   On the capacity of UWB-based wireless
                                  sensor networks  . . . . . . . . . . . . 2797--2804
              Michael Menth and   
                Stefan Kopf and   
         Joachim Charzinski and   
                   Karl Schrodi   Resilient network admission control  . . 2805--2815
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 52, Number 15, October 23, 2008

            Matthieu Latapy and   
               Walter Willinger   Complex computer and communication
                                  networks . . . . . . . . . . . . . . . . 2817--2818
                 M. Fraiwan and   
                   G. Manimaran   Scheduling algorithms for conducting
                                  conflict-free measurements in overlay
                                  networks . . . . . . . . . . . . . . . . 2819--2830
                 Mira Gonen and   
                   Dana Ron and   
              Udi Weinsberg and   
                   Avishai Wool   Finding a dense-core in Jellyfish graphs 2831--2841
                A. Scherrer and   
                 P. Borgnat and   
                  E. Fleury and   
            J.-L. Guillaume and   
                    C. Robardet   Description and simulation of dynamic
                                  mobility networks  . . . . . . . . . . . 2842--2858
              Andrej Vilhar and   
                    Roman Novak   Policy relationship annotations of
                                  predefined AS-level topologies . . . . . 2859--2871
             Knut-Helge Vik and   
        Pål Halvorsen and   
                Carsten Griwodz   Evaluating Steiner-tree heuristics and
                                  diameter variations for application
                                  layer multicast  . . . . . . . . . . . . 2872--2893
              Ivan Gojmerac and   
               Peter Reichl and   
                   Lasse Jansen   Towards low-complexity Internet traffic
                                  engineering: The Adaptive Multi-Path
                                  algorithm  . . . . . . . . . . . . . . . 2894--2907
                Josh Karlin and   
          Stephanie Forrest and   
               Jennifer Rexford   Autonomous security for autonomous
                                  systems  . . . . . . . . . . . . . . . . 2908--2923
               Hwangnam Kim and   
            Jennifer C. Hou and   
                       Hyuk Lim   TranSim: Accelerating simulation of
                                  large-scale IP networks through
                                  preserving network invariants  . . . . . 2924--2946
               Tobias Harks and   
              Tobias Poschwatta   Congestion control in utility fair
                                  networks . . . . . . . . . . . . . . . . 2947--2960
            Jessie Hui Wang and   
              Dah Ming Chiu and   
                 John C. S. Lui   A game--theoretic analysis of the
                                  implications of overlay network traffic
                                  on ISP peering . . . . . . . . . . . . . 2961--2974
              Alessio Botta and   
     Antonio Pescapé and   
                 Giorgio Ventre   An approach to the identification of
                                  network elements composing heterogeneous
                                  end-to-end paths . . . . . . . . . . . . 2975--2987
Emmanouel (Manos) Varvarigos and   
          Vasileios Sourlas and   
Konstantinos Christodoulopoulos   Routing and scheduling connections in
                                  networks that support advance
                                  reservations . . . . . . . . . . . . . . 2988--3006
       Josep Domingo-Ferrer and   
            Alexandre Viejo and   
       Francesc Sebé and   
Úrsula González-Nicolás   Privacy homomorphisms for social
                                  networks with private relationships  . . 3007--3016
                   Hui Chen and   
                  Yang Xiao and   
                Susan V. Vrbsky   Scalability study of cache access
                                  mechanisms in multiple-cell wireless
                                  networks . . . . . . . . . . . . . . . . 3017--3027
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 52, Number 16, November 13, 2008

                Junghee Han and   
               David Watson and   
                Farnam Jahanian   Enhancing end-to-end availability and
                                  performance via topology-aware overlay
                                  networks . . . . . . . . . . . . . . . . 3029--3046
             Renita Machado and   
                  Sirin Tekinay   A survey of game-theoretic approaches in
                                  wireless sensor networks . . . . . . . . 3047--3061
                 Xiuchao Wu and   
             Mun Choon Chan and   
                   A. L. Ananda   Improving TCP performance in
                                  heterogeneous mobile environments by
                                  exploiting the explicit cooperation
                                  between server and mobile host . . . . . 3062--3074
                     Zuhua Shao   Certificate-based fair exchange protocol
                                  of signatures from pairings  . . . . . . 3075--3084
             Yuan-Cheng Lai and   
                 Ching-Neng Lai   DCCP partial reliability extension with
                                  sequence number compensation . . . . . . 3085--3100
                Jen-Yu Fang and   
               Hung-Chi Chu and   
              Rong-Hong Jan and   
                       Wuu Yang   A multiple power-level approach for
                                  wireless sensor network positioning  . . 3101--3118
               Cungang Yang and   
                   Celia Li and   
                       Jie Xiao   Location-based design for secure and
                                  efficient wireless sensor networks . . . 3119--3129
               MoniaGhobadi and   
             Sudhakar Ganti and   
             Gholamali C. Shoja   Resource optimization algorithms for
                                  virtual private networks using the hose
                                  model  . . . . . . . . . . . . . . . . . 3130--3147
                  Qiang Pan and   
               Jianming Wei and   
                 Haitao Liu and   
                      Maolin Hu   Virtual field strategy for collaborative
                                  signal and information processing in
                                  wireless heterogeneous sensor networks   3148--3168
 Yaser Pourmohammadi Fallah and   
              Hussein Alnuweiri   Analysis of temporal and throughput fair
                                  scheduling in multirate WLANs  . . . . . 3169--3183
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 52, Number 17, December 8, 2008

     Marc S\`anchez-Artigas and   
Pedro García-López and   
Antonio F. Gómez-Skarmeta and   
              José Santa   TR-clustering: Alleviating the impact of
                                  false clustering on P2P overlay networks 3185--3204
                    Wei Wei and   
                  Bing Wang and   
                 Chun Zhang and   
                 Jim Kurose and   
                    Don Towsley   Classification of access network types:
                                  Ethernet, wireless LAN, ADSL, cable
                                  modem or dialup? . . . . . . . . . . . . 3205--3217
             Vijay K. Verma and   
            Ramesh C. Joshi and   
                    Bin Xie and   
              Dharma P. Agrawal   Combating the bloated state problem in
                                  mobile agents based network monitoring
                                  applications . . . . . . . . . . . . . . 3218--3228
                 Rui Campos and   
                 Manuel Ricardo   A fast algorithm for computing minimum
                                  routing cost spanning trees  . . . . . . 3229--3247
   Xenofontas Dimitropoulos and   
             Marc Stoecklin and   
                Paul Hurley and   
                   Andreas Kind   The eternal sunshine of the sketch data
                                  structure  . . . . . . . . . . . . . . . 3248--3257
                 Vicent Pla and   
              Jorma Virtamo and   
   Jorge Martínez-Bauset   Optimal robust policies for bandwidth
                                  allocation and admission control in
                                  wireless networks  . . . . . . . . . . . 3258--3272
              Sangheon Pack and   
                     Wonjun Lee   Dual home agent (DHA)-based location
                                  management scheme in integrated
                                  cellular--WLAN networks  . . . . . . . . 3273--3283
              Shigeo Shioda and   
              Kenji Ohtsuka and   
                  Takehiro Sato   An efficient network-wide broadcasting
                                  based on hop-limited shortest-path trees 3284--3295
                Jehn-Ruey Jiang   Expected quorum overlap sizes of quorum
                                  systems for asynchronous power-saving in
                                  mobile ad hoc networks . . . . . . . . . 3296--3306
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 52, Number 18, December 22, 2008

           Chih-Chiang Wang and   
                Khaled Harfoush   Shortest-path routing in randomized
                                  DHT-based Peer-to-Peer systems . . . . . 3307--3317
             Pascal Jaisson and   
               Florian De Vuyst   An innovating PDE model based on fluid
                                  flow paradigm for multithread systems    3318--3324
                  Tarik Cici\'c   On basic properties of fault-tolerant
                                  multi-topology routing . . . . . . . . . 3325--3341
               Wei-Tsung Su and   
              Yau-Hwang Kuo and   
                 Po-Cheng Huang   A QoS-driven approach for
                                  service-oriented device anycasting in
                                  ubiquitous environments  . . . . . . . . 3342--3357
    Quoc-Thinh Nguyen-Vuong and   
            Nazim Agoulmine and   
          Yacine Ghamri-Doudane   A user-centric and context-aware
                                  solution to interface management and
                                  access network selection in
                                  heterogeneous wireless environments  . . 3358--3372
              Marco Comuzzi and   
         Chiara Francalanci and   
               Paolo Giacomazzi   Pricing the quality of differentiated
                                  services for media-oriented real-time
                                  applications: A multi-attribute
                                  negotiation approach . . . . . . . . . . 3373--3391
           Shih-Chiang Tsao and   
             Yuan-Cheng Lai and   
                Le-Chi Tsao and   
                   Ying-Dar Lin   On applying fair queuing discipline to
                                  schedule requests at access gateway for
                                  downlink differential QoS  . . . . . . . 3392--3404
                  Y. C. Tay and   
           Dinh Nguyen Tran and   
                Eric Yi Liu and   
              Wei Tsang Ooi and   
                  Robert Morris   Equilibrium analysis through separation
                                  of user and network behavior . . . . . . 3405--3420
             Arunita Jaekel and   
        Subir Bandyopadhyay and   
                     Yash Aneja   A new approach for designing
                                  fault-tolerant WDM networks  . . . . . . 3421--3432
          Alireza A. Nezhad and   
                   Ali Miri and   
              Dimitris Makrakis   Location privacy and anonymity
                                  preserving routing for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 3433--3452


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 53, Number 1, January 16, 2009

               Hwangnam Kim and   
                Jennifer C. Hou   Enabling network calculus-based
                                  simulation for TCP congestion control    1--24
                Rami Langar and   
          Nizar Bouabdallah and   
                  Raouf Boutaba   Mobility-aware clustering algorithms
                                  with interference constraints in
                                  wireless mesh networks . . . . . . . . . 25--44
                    Ai Chen and   
               Dongwook Lee and   
                   Prasun Sinha   Efficient multicasting over large-scale
                                  WLANs through controlled association . . 45--59
     Srinivasan Seetharaman and   
                  Mostafa Ammar   Inter-domain policy violations in
                                  multi-hop overlay routes: Analysis and
                                  mitigation . . . . . . . . . . . . . . . 60--80
                    M. Dusi and   
                  M. Crotti and   
                F. Gringoli and   
                  L. Salgarelli   Tunnel Hunter: Detecting
                                  application-layer tunnels with
                                  statistical fingerprinting . . . . . . . 81--97
               Jongtack Kim and   
                  Saewoong Bahk   Design of certification authority using
                                  secret redistribution and multicast
                                  routing in wireless mesh networks  . . . 98--109
                     Ye Xia and   
               Shigang Chen and   
               Chunglae Cho and   
          Vivekanand Korgaonkar   Algorithms and performance of
                                  load-balancing with multiple hash
                                  functions in massive content
                                  distribution . . . . . . . . . . . . . . 110--125
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 53, Number 2, February 13, 2009

              Andrea Bianco and   
          Achille Pattavina and   
                 Alfio Lombardo   Guest editorial for the special issue    127--129
                Dario Rossi and   
               Marco Mellia and   
                    Michela Meo   Understanding Skype signaling  . . . . . 130--140
          Ilenia Tinnirello and   
       Domenico Giustiniano and   
                Luca Scalia and   
               Giuseppe Bianchi   On the side-effects of proprietary
                                  solutions for fading and interference
                                  mitigation in IEEE 802.11b/g outdoor
                                  links  . . . . . . . . . . . . . . . . . 141--152
                  Jiayue He and   
        Augustin Chaintreau and   
                Christophe Diot   A performance evaluation of scalable
                                  live video streaming with nano data
                                  centers  . . . . . . . . . . . . . . . . 153--167
           Michele Petracca and   
               Robert Birke and   
                  Andrea Bianco   HERO: High-speed enhanced routing
                                  operation in Ethernet NICs for software
                                  routers  . . . . . . . . . . . . . . . . 168--179
             Antonio Capone and   
             Jocelyne Elias and   
                Fabio Martignon   Routing and resource optimization in
                                  service overlay networks . . . . . . . . 180--190
             Paola Bermolen and   
                    Dario Rossi   Support vector regression for link load
                                  prediction . . . . . . . . . . . . . . . 191--201
                   V. Eramo and   
                 A. Germoni and   
               C. Raffaelli and   
                        M. Savi   Packet loss analysis of
                                  shared-per-wavelength multi-fiber
                                  all-optical switch with parallel
                                  scheduling . . . . . . . . . . . . . . . 202--216
               M. Bernaschi and   
                  F. Cacace and   
                G. Iannello and   
                M. Vellucci and   
                     L. Vollero   OpenCAPWAP: An open source CAPWAP
                                  implementation for the management and
                                  configuration of WiFi hot-spots  . . . . 217--230
           Paolo Giacomazzi and   
              Gabriella Saddemi   Resource allocation and admission
                                  control for the provisioning of quality
                                  of service in networks of static
                                  priority schedulers  . . . . . . . . . . 231--243
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 53, Number 3, February 27, 2009

            Ian F. Akyildiz and   
                    Harry Rudin   Editorial  . . . . . . . . . . . . . . . 245--245
         Xenia Mountrouidou and   
                   Harry Perros   On the departure process of burst
                                  aggregation algorithms in optical burst
                                  switching  . . . . . . . . . . . . . . . 247--264
        Athena Stassopoulou and   
            Marios D. Dikaiakos   Web robot detection: A probabilistic
                                  reasoning approach . . . . . . . . . . . 265--278
                 Xinming He and   
      Christos Papadopoulos and   
             John Heidemann and   
              Urbashi Mitra and   
                     Usman Riaz   Remote detection of bottleneck links
                                  using spectral and statistical methods   279--298
               Marc Ibrahim and   
               Kinda Khawam and   
        Abed Ellatif Samhat and   
                    Samir Tohme   Analytical framework for dimensioning
                                  hierarchical WiMax--WiFi networks  . . . 299--309
            Pere Barlet-Ros and   
        Gianluca Iannaccone and   
     Josep Sanju\`as-Cuxart and   
       Josep Solé-Pareta   Robust network monitoring in the
                                  presence of non-cooperative traffic
                                  queries  . . . . . . . . . . . . . . . . 310--321
             Peng-Yong Kong and   
                     Inn-Inn Er   DTSMA: Distributed time-spread multiple
                                  access for wireless mesh networks with
                                  IEEE 802.16d MAC protocol  . . . . . . . 322--337
                 Lijun Wang and   
                    Lin Cai and   
                 Xinzhi Liu and   
      Xuemin (Sherman) Shen and   
                  Junshan Zhang   Stability analysis of
                                  multiple-bottleneck networks . . . . . . 338--352
                 Junzhi Yan and   
                Jianfeng Ma and   
                    Hongyue Liu   Key hierarchies for hierarchical access
                                  control in secure group communications   353--364
                    Han Cai and   
               Do Young Eun and   
                 Sangtae Ha and   
                Injong Rhee and   
                      Lisong Xu   Stochastic convex ordering for
                                  multiplicative decrease Internet
                                  congestion control . . . . . . . . . . . 365--381
             Ilker Demirkol and   
                  Cem Ersoy and   
          Fatih Alagöz and   
             Hakan Deliç   The impact of a realistic packet traffic
                                  model on the performance of surveillance
                                  wireless sensor networks . . . . . . . . 382--399
                   Xing Fan and   
             Magnus Jonsson and   
                    Jan Jonsson   Guaranteed real-time communication in
                                  packet-switched networks with FCFS
                                  queuing  . . . . . . . . . . . . . . . . 400--417
               Hajer Derbel and   
            Nazim Agoulmine and   
        Mikaël Salaün   ANEMA: Autonomic network management
                                  architecture to support
                                  self-configuration and self-optimization
                                  in IP networks . . . . . . . . . . . . . 418--430
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 53, Number 4, March 18, 2009

           Roberto Canonico and   
            Carmen Guerrero and   
                 Andreas Mauthe   Content distribution infrastructures for
                                  community networks . . . . . . . . . . . 431--433
   Karl-André Skevik and   
                Vera Goebel and   
               Thomas Plagemann   Evaluation of a comprehensive P2P
                                  video-on-demand streaming system . . . . 434--455
    Constantinos Vassilakis and   
         Nikolaos Laoutaris and   
            Ioannis Stavrakakis   On the impact of playout scheduling on
                                  the performance of peer-to-peer live
                                  streaming  . . . . . . . . . . . . . . . 456--469
          Thomas Silverston and   
           Olivier Fourmaux and   
              Alessio Botta and   
           Alberto Dainotti and   
     Antonio Pescapé and   
             Giorgio Ventre and   
         Kavé Salamatian   Traffic analysis of peer-to-peer IPTV
                                  communities  . . . . . . . . . . . . . . 470--484
                   R. Bolla and   
                   R. Gaeta and   
                A. Magnetto and   
                  M. Sciuto and   
                      M. Sereno   A measurement study supporting P2P
                                  file-sharing community models  . . . . . 485--500
               Michael Zink and   
              Kyoungwon Suh and   
                      Yu Gu and   
                     Jim Kurose   Characteristics of YouTube network
                                  traffic at a campus network --
                                  Measurements, models, and implications   501--514
           Nazareno Andrade and   
         Elizeu Santos-Neto and   
       Francisco Brasileiro and   
                  Matei Ripeanu   Resource demand and supply in BitTorrent
                                  content-sharing communities  . . . . . . 515--527
               Ruben Cuevas and   
   Albert Cabellos-Aparicio and   
               Angel Cuevas and   
      Jordi Domingo-Pascual and   
                 Arturo Azcorra   fP2P--HN: A P2P-based route optimization
                                  architecture for mobile IP-based
                                  community networks . . . . . . . . . . . 528--540
                    P. Yang and   
                       M. Chuah   Performance evaluations of data-centric
                                  information retrieval schemes for DTNs   541--555
      Isaias Martinez-Yelmo and   
              Alex Bikfalvi and   
               Ruben Cuevas and   
            Carmen Guerrero and   
                   Jaime Garcia   H-P2PSIP: Interconnection of P2PSIP
                                  domains for global multimedia services
                                  based on a hierarchical DHT overlay
                                  network  . . . . . . . . . . . . . . . . 556--568
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 53, Number 5, April 9, 2009

        Mário Macedo and   
       António Grilo and   
             Mário Nunes   Distributed Latency-Energy Minimization
                                  and interference avoidance in TDMA
                                  Wireless Sensor Networks . . . . . . . . 569--582
             Ioannis Psaras and   
           Vassilis Tsaoussidis   On the properties of an additive
                                  increase rate accelerator  . . . . . . . 583--595
                    Y. Wang and   
             M.Ü. Uyar and   
                S. S. Batth and   
                    M. A. Fecko   Fault masking by multiple timing faults
                                  in timed EFSM models . . . . . . . . . . 596--612
                  A. Nayebi and   
                H. Sarbazi-Azad   Analysis of $k$-Neigh topology control
                                  protocol for mobile wireless networks    613--633
      Krishanthmohan Ratnam and   
             Mohan Gurusamy and   
                    Luying Zhou   Differentiated survivability with
                                  improved fairness in IP/MPLS-over-WDM
                                  optical networks . . . . . . . . . . . . 634--649
            C. Chrysostomou and   
             A. Pitsillides and   
              Y. A. Sekercioglu   Fuzzy explicit marking: A unified
                                  congestion controller for Best-Effort
                                  and Diff-Serv networks . . . . . . . . . 650--667
                Katja Gilly and   
           Salvador Alcaraz and   
                Carlos Juiz and   
                Ramon Puigjaner   Analysis of burstiness monitoring and
                                  detection in an adaptive Web system  . . 668--679
              R. M. Hierons and   
                        H. Ural   Overcoming controllability problems with
                                  fewest channels between testers  . . . . 680--690
            Chuan-Ching Sue and   
                  Jing-Ying Yeh   Utilize 100% redundancy to offer
                                  higher-level multiple fault restoration
                                  in WDM networks without wavelength
                                  conversion . . . . . . . . . . . . . . . 691--705
         N. Blefari-Melazzi and   
               J. N. Daigle and   
                  M. Femminella   Efficient and stateless deployment of
                                  VoIP services  . . . . . . . . . . . . . 706--726
          Novella Bartolini and   
      Giancarlo Bongiovanni and   
               Simone Silvestri   Self-* through self-learning: Overload
                                  control for distributed web systems  . . 727--743
  Akbar Ghaffar Pour Rahbar and   
              Oliver W. W. Yang   Distribution-based bandwidth access
                                  scheme in slotted all-optical
                                  packet-switched networks . . . . . . . . 744--758
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 53, Number 6, April 23, 2009

               Marco Mellia and   
          Antonio Pescap\`e and   
                Luca Salgarelli   Traffic classification and its
                                  applications to modern networks  . . . . 759--760
         Francesco Palmieri and   
                      Ugo Fiore   A nonlinear, recurrence-based approach
                                  to traffic classification  . . . . . . . 761--773
           Daniele Apiletti and   
              Elena Baralis and   
          Tania Cerquitelli and   
                Vincenzo D'Elia   Characterizing network traffic by means
                                  of the NetMine framework . . . . . . . . 774--789
                     Wei Li and   
               Marco Canini and   
            Andrew W. Moore and   
                 Raffaele Bolla   Efficient application identification and
                                  the temporal and spatial stability of
                                  classification schema  . . . . . . . . . 790--809
           Detlef Saß and   
               Simon Hauger and   
               Martin Köhn   Architecture and scalability of a
                                  high-speed traffic measurement platform
                                  with a highly flexible packet
                                  classification . . . . . . . . . . . . . 810--820
                  Pi-Chung Wang   Scalable packet classification with
                                  controlled cross-producting  . . . . . . 821--834
        Muhammad N. Marsono and   
      M. Watheq El-Kharashi and   
                   Fayez Gebali   Targeting spam control on middleboxes:
                                  Spam detection based on layer-3 e-mail
                                  content classification . . . . . . . . . 835--848
                     Yan Hu and   
              Dah-Ming Chiu and   
                 John C. S. Lui   Profiling and identification of P2P
                                  traffic  . . . . . . . . . . . . . . . . 849--863
           Roberto Perdisci and   
                Davide Ariu and   
              Prahlad Fogla and   
           Giorgio Giacinto and   
                      Wenke Lee   McPAD: A multiple classifier system for
                                  accurate payload-based anomaly detection 864--881
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 53, Number 7, May 13, 2009

                   Xin Wang and   
   J. J. Garcia-Luna-Aceves and   
            Hamid R. Sadjadpour   Channel access using opportunistic
                                  reservations and virtual MIMO  . . . . . 883--895
            Kyung-Joon Park and   
                   Hyuk Lim and   
            Jennifer C. Hou and   
                  Chong-Ho Choi   Feedback-assisted robust estimation of
                                  available bandwidth  . . . . . . . . . . 896--912
               Mina Youssef and   
               Caterina Scoglio   On graph-based characteristics of
                                  optimal overlay topologies . . . . . . . 913--925
         Siamak Azodolmolky and   
       Miros\law Klinkowski and   
                  Eva Marin and   
            Davide Careglio and   
   Josep Solé Pareta and   
                 Ioannis Tomkos   A survey on physical layer impairments
                                  aware routing and wavelength assignment
                                  algorithms in optical networks . . . . . 926--944
         Jamal N. Al-Karaki and   
            Raza Ul-Mustafa and   
                 Ahmed E. Kamal   Data aggregation and routing in Wireless
                                  Sensor Networks: Optimal and heuristic
                                  algorithms . . . . . . . . . . . . . . . 945--960
         Eirini Karapistoli and   
        Ioannis Gragopoulos and   
          Ioannis Tsetsinas and   
          Fotini-Niovi Pavlidou   A MAC protocol for low-rate UWB wireless
                                  sensor networks using directional
                                  antennas . . . . . . . . . . . . . . . . 961--972
      Jorge Martinez-Bauset and   
         David Garcia-Roger and   
  M. Jose Domenech-Benlloch and   
                     Vicent Pla   Maximizing the capacity of mobile
                                  cellular networks with heterogeneous
                                  traffic  . . . . . . . . . . . . . . . . 973--988
              Salekul Islam and   
              J. William Atwood   Multicast receiver access control by
                                  IGMP-AC  . . . . . . . . . . . . . . . . 989--1013
               Junko Harada and   
              Shigeo Shioda and   
                  Hiroshi Saito   Path coverage properties of randomly
                                  deployed sensors with finite
                                  data-transmission ranges . . . . . . . . 1014--1026
              Yueping Zhang and   
               Saurabh Jain and   
                Dmitri Loguinov   Towards experimental evaluation of
                                  explicit congestion control  . . . . . . 1027--1039
              Andrea Bianco and   
         Alessandra Scicchitano   Multicast support in multi-chip
                                  centralized schedulers in Input Queued
                                  switches . . . . . . . . . . . . . . . . 1040--1049
               Luis F. Caro and   
      Dimitri Papadimitriou and   
                  Jose L. Marzo   Enhancing label space usage for Ethernet
                                  VLAN-label switching . . . . . . . . . . 1050--1061
  Ákos Kovács and   
     István Gódor   Cross-layer optimized wireless multicast
                                  for layered media  . . . . . . . . . . . 1062--1072
         Mohamed Karim Sbai and   
                  Chadi Barakat   Experiences on enhancing data collection
                                  in large networks  . . . . . . . . . . . 1073--1086
           Chenn-Jung Huang and   
                 Kai-Wen Hu and   
               You-Jia Chen and   
              Chun-Hua Chen and   
                  Yun-Cheng Luo   A QoS-aware VoD resource sharing scheme
                                  for heterogeneous networks . . . . . . . 1087--1098
            Ronald G. Addie and   
           Timothy D. Neame and   
                 Moshe Zukerman   Performance analysis of a
                                  Poisson--Pareto queue over the full
                                  range of system parameters . . . . . . . 1099--1113
                  Bang Wang and   
                   Cheng Fu and   
                  Hock Beng Lim   Layered Diffusion-based Coverage Control
                                  in Wireless Sensor Networks  . . . . . . 1114--1124
             Jo\vze Mohorko and   
                  Matja\vz Fras   Mathematical model of IRIS replication
                                  mechanism for the simulation of tactical
                                  networks . . . . . . . . . . . . . . . . 1125--1136
       Natalia M. Markovich and   
             Astrid Undheim and   
                Peder J. Emstad   Classification of slice-based VBR video
                                  traffic and estimation of link loss by
                                  exceedance . . . . . . . . . . . . . . . 1137--1153
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 53, Number 8, June 11, 2009

                      Anonymous   ``Performance Modeling of Computer
                                  Networks: Special Issue in Memory of Dr.
                                  Gunter Bolch'' (Eulogies and Editorials) 1155--1157
            Xavier Gelabert and   
            Ian F. Akyildiz and   
              Oriol Sallent and   
            Ramon Agustí   Operating point selection for primary
                                  and secondary users in cognitive radio
                                  networks . . . . . . . . . . . . . . . . 1158--1170
              Thomas Herpel and   
      Kai-Steffen Hielscher and   
             Ulrich Klehmet and   
                Reinhard German   Stochastic and deterministic performance
                                  evaluation of automotive CAN
                                  communication  . . . . . . . . . . . . . 1171--1185
           Khalid Al-Begain and   
            Alexander Dudin and   
         Arseniy Kazimirsky and   
                Suleiman Yerima   Investigation of the M$_2$ / G$_2$ / 1 /
                                  $\infty$, $N$ queue with restricted
                                  admission of priority customers and its
                                  application to HSDPA mobile systems  . . 1186--1201
               Armin Heindl and   
                   Gilles Pokam   An analytic framework for performance
                                  modeling of software transactional
                                  memory . . . . . . . . . . . . . . . . . 1202--1214
           Poul E. Heegaard and   
              Kishor S. Trivedi   Network survivability modeling . . . . . 1215--1234
András Horváth and   
Gábor Horváth and   
            Miklós Telek   A traffic based decomposition of
                                  two-class queueing networks with
                                  priority service . . . . . . . . . . . . 1235--1248
                  J. Mylosz and   
                      H. Daduna   On the behavior of stable subnetworks in
                                  non-ergodic networks with unreliable
                                  nodes  . . . . . . . . . . . . . . . . . 1249--1263
       Patrick Wüchner and   
        János Sztrik and   
                Hermann de Meer   Finite-source M / M / S retrial queue
                                  with search for balking and impatient
                                  customers from the orbit . . . . . . . . 1264--1273
             D. Lüdtke and   
                      D. Tutsch   The modeling power of CINSim:
                                  Performance evaluation of
                                  interconnection networks . . . . . . . . 1274--1288
                Peter Bazan and   
                Reinhard German   Approximate transient analysis of large
                                  stochastic models with WinPEPSY-QNS  . . 1289--1301
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 53, Number 9, June 25, 2009

                   Yao Zhao and   
                       Yan Chen   FAD and SPA: End-to-end link-level loss
                                  rate inference without infrastructure    1303--1318
                Mingyu Chen and   
              Jinsong Zhang and   
          Manohar N. Murthi and   
               Kamal Premaratne   Delay-based TCP congestion avoidance: A
                                  network calculus interpretation and
                                  performance improvements . . . . . . . . 1319--1340
         Mohand Yazid Saidi and   
             Bernard Cousin and   
             Jean-Louis Le Roux   Using Shared Risk Link Groups to enhance
                                  backup path computation  . . . . . . . . 1341--1353
           Carolina Fortuna and   
                Mihael Mohorcic   Trends in the development of
                                  communication networks: Cognitive
                                  networks . . . . . . . . . . . . . . . . 1354--1376
           T. Vamsi Krishna and   
                   Amitabha Das   A survey on MAC protocols in OSA
                                  networks . . . . . . . . . . . . . . . . 1377--1394
                    Tao Shu and   
                   Marwan Krunz   Energy-efficient power/rate control and
                                  scheduling in hybrid TDMA/CDMA wireless
                                  sensor networks  . . . . . . . . . . . . 1395--1408
              Oznur Ozkasap and   
                Zulkuf Genc and   
                     Emre Atsan   Epidemic-based reliable and adaptive
                                  multicast for mobile ad hoc networks . . 1409--1430
Demetrios Zeinalipour-Yazti and   
          Zografoula Vagena and   
            Vana Kalogeraki and   
        Dimitrios Gunopulos and   
        Vassilis J. Tsotras and   
            Michail Vlachos and   
                Nick Koudas and   
              Divesh Srivastava   Finding the $K$ highest-ranked answers
                                  in a distributed network . . . . . . . . 1431--1449
     Miguel de Vega Rodrigo and   
               Guy Latouche and   
             Marie-Ange Remiche   Modeling bufferless packet-switching
                                  networks with packet dependencies  . . . 1450--1466
         Mohand Yazid Saidi and   
             Bernard Cousin and   
             Jean-Louis Le Roux   PLR-based heuristic for backup path
                                  computation in MPLS networks . . . . . . 1467--1479
             Seung Chul Han and   
                         Ye Xia   Optimal node-selection algorithm for
                                  parallel download in overlay
                                  content-distribution networks  . . . . . 1480--1496
    Ömer Korçak and   
              Fatih Alagöz   Virtual topology dynamics and handover
                                  mechanisms in Earth-fixed LEO satellite
                                  systems  . . . . . . . . . . . . . . . . 1497--1511
               Haodong Wang and   
                   Bo Sheng and   
                         Qun Li   Privacy-aware routing in sensor networks 1512--1529
              Sahel Alouneh and   
             Anjali Agarwal and   
            Abdeslam En-Nouaary   A novel path protection scheme for MPLS
                                  networks using multi-path routing  . . . 1530--1545
                Yu-Wei Chen and   
                 Chao-Yao Hsieh   SingBroad: A scheduling scheme for
                                  broadcasting continuous multimedia data
                                  over a single channel  . . . . . . . . . 1546--1554
               G. D. Pallas and   
        G. I. Papadimitriou and   
               A. S. Pomportsis   Hybrid TDMA with heuristic traffic
                                  shaping: An efficient bandwidth
                                  allocation approach for heavy loaded
                                  LANs . . . . . . . . . . . . . . . . . . 1555--1566
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 53, Number 10, July 14, 2009

               Simon Dobson and   
             John Strassner and   
                Hermann de Meer   Editorial-autonomic and self-organising
                                  systems  . . . . . . . . . . . . . . . . 1567--1569
          S. Masoud Sadjadi and   
             Philip K. McKinley   Transparent autonomization in CORBA  . . 1570--1586
        Steven Latré and   
             Pieter Simoens and   
       Bart De Vleeschauwer and   
       Wim Van de Meerssche and   
             Filip De Turck and   
                Bart Dhoedt and   
             Piet Demeester and   
      Steven Van den Berghe and   
          Edith Gilon de Lumley   An autonomic architecture for optimizing
                                  QoE in multimedia access networks  . . . 1587--1602
           Tridib Mukherjee and   
     Georgios Varsamopoulos and   
            Sandeep K. S. Gupta   Self-managing energy-efficient multicast
                                  support in MANETs under end-to-end
                                  reliability constraints  . . . . . . . . 1603--1627
             Nicola Dragoni and   
             Fabio Massacci and   
                   Ayda Saidane   A self-protecting and self-healing
                                  framework for negotiating services and
                                  trust in autonomic communication systems 1628--1648
             Shanshan Jiang and   
                   Yuan Xue and   
             Douglas C. Schmidt   Minimum disruption service composition
                                  and recovery in mobile ad hoc networks   1649--1665
 Sasitharan Balasubramaniam and   
             Dmitri Botvich and   
           Brendan Jennings and   
                Steven Davy and   
           William Donnelly and   
                 John Strassner   Policy-constrained bio-inspired
                                  processes for autonomic route management 1666--1682
                     Hui Xu and   
       J. J. Garcia-Luna-Aceves   Neighborhood tracking for mobile ad hoc
                                  networks . . . . . . . . . . . . . . . . 1683--1696
            Thomas Watteyne and   
  Isabelle Augé-Blum and   
              Mischa Dohler and   
Stéphane Ubéda and   
              Dominique Barthel   Centroid virtual coordinates -- A novel
                                  near-shortest path routing paradigm  . . 1697--1711
              Nicolas Poggi and   
                Toni Moreno and   
         Josep Lluis Berral and   
           Ricard Gavald\`a and   
                   Jordi Torres   Self-adaptive utility-based web session
                                  management . . . . . . . . . . . . . . . 1712--1721
         Luis Rodero-Merino and   
Antonio Fernández Anta and   
          Luis López and   
                  Vicent Cholvi   Self-managed topologies in P2P networks  1722--1736
             Falko Dressler and   
            Isabel Dietrich and   
            Reinhard German and   
            Bettina Krüger   A rule-based system for programming
                                  self-organized sensor and actor networks 1737--1750
               Eitan Altman and   
           Rachid El-Azouzi and   
             Yezekael Hayel and   
                Hamidou Tembine   The evolution of transport protocols: An
                                  evolutionary game perspective  . . . . . 1751--1759
        Werner Streitberger and   
                 Torsten Eymann   A simulation of an economic,
                                  self-organising resource allocation
                                  approach for application layer networks  1760--1770
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 53, Number 11, July 28, 2009

              Michael Menth and   
              Matthias Hartmann   Threshold configuration and routing
                                  optimization for PCN-based resilient
                                  admission control  . . . . . . . . . . . 1771--1783
               Naixue Xiong and   
                     Yi Pan and   
                Xiaohua Jia and   
             Jong Hyuk Park and   
                     Yingshu Li   Design and analysis of a self-tuning
                                  feedback controller for the Internet . . 1784--1797
  Mohammad Hossein Yaghmaee and   
              Donald A. Adjeroh   Priority-based rate control for service
                                  differentiation and congestion control
                                  in wireless multimedia sensor networks   1798--1811
          Sajjad Zarifzadeh and   
               Amir Nayyeri and   
             Nasser Yazdani and   
             Ahmad Khonsari and   
       Hamid Hajabdolali Bazzaz   Joint range assignment and routing to
                                  conserve energy in wireless ad hoc
                                  networks . . . . . . . . . . . . . . . . 1812--1829
             Guido Urdaneta and   
           Guillaume Pierre and   
              Maarten van Steen   Wikipedia workload analysis for
                                  decentralized hosting  . . . . . . . . . 1830--1845
            Moonjeong Chang and   
              Hyunjeong Lee and   
                   Meejeong Lee   A per-application mobility management
                                  platform for application-specific
                                  handover decision in overlay networks    1846--1858
Flávio de Melo Pereira and   
    Nelson L. S. da Fonseca and   
              Dalton S. Arantes   A fair scheduling discipline for
                                  Ethernet passive optical networks  . . . 1859--1878
                 Jaesub Kim and   
                    Kyu Ho Park   An energy-efficient,
                                  transport-controlled MAC protocol for
                                  wireless sensor networks . . . . . . . . 1879--1902
                Soohyun Cho and   
               Riccardo Bettati   Use of competition detection in TCP for
                                  simple topology networks . . . . . . . . 1903--1925
                 Eric Rosenberg   Minimizing hierarchical routing error    1926--1938
           Roberto Catanuto and   
            Stavros Toumpis and   
               Giacomo Morabito   On asymptotically optimal routing in
                                  large wireless networks and Geometrical
                                  Optics analogy . . . . . . . . . . . . . 1939--1955
              Chai-Hien Gan and   
                  Phone Lin and   
                 Chung-Min Chen   A novel prebuffering scheme for IPTV
                                  service  . . . . . . . . . . . . . . . . 1956--1966
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 53, Number 12, August 13, 2009

                   May Wong and   
                    Demet Aksoy   QUAD: Quadrant-based relative location
                                  estimates for representative topologies
                                  in wireless sensor networks  . . . . . . 1967--1979
        Eduardo F. Nakamura and   
            Heitor S. Ramos and   
          Leandro A. Villas and   
Horacio A. B. F. de Oliveira and   
      Andre L. L. de Aquino and   
         Antonio A. F. Loureiro   A reactive role assignment for data
                                  routing in event-based wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1980--1996
              Jeongkyun Yun and   
              Jin-Ghoo Choi and   
                  Saewoong Bahk   A backward-compatible multiple-round
                                  collision avoidance scheme for
                                  contention based medium access control   1997--2010
               Yuming Jiang and   
                 Qinghe Yin and   
                   Yong Liu and   
                Shengming Jiang   Fundamental calculus on generalized
                                  stochastically bounded bursty traffic
                                  for communication networks . . . . . . . 2011--2021
               Suat Ozdemir and   
                      Yang Xiao   Secure data aggregation in wireless
                                  sensor networks: A comprehensive
                                  overview . . . . . . . . . . . . . . . . 2022--2037
      Roberto García and   
    Xabiel G. Pañeda and   
              David Melendi and   
                  Victor Garcia   Probabilistic analysis and
                                  interdependence discovery in the user
                                  interactions of a video news on demand
                                  service  . . . . . . . . . . . . . . . . 2038--2049
     Stylianos Karapantazis and   
          Fotini-Niovi Pavlidou   VoIP: A comprehensive survey on a
                                  promising technology . . . . . . . . . . 2050--2090
    Abdeltouab Belbekkouche and   
           Abdelhakim Hafid and   
                Michel Gendreau   Novel reinforcement learning-based
                                  approaches to reduce loss probability in
                                  buffer-less OBS networks . . . . . . . . 2091--2105
             Ilker Demirkol and   
                      Cem Ersoy   Energy and delay optimized contention
                                  for wireless sensor networks . . . . . . 2106--2119
                 Yuedong Xu and   
             John C. S. Lui and   
                  Dah-Ming Chiu   Analysis and scheduling of practical
                                  network coding in OFDMA relay networks   2120--2139
                    Yuan He and   
                    Hao Ren and   
                 Yunhao Liu and   
                   Baijian Yang   On the reliability of large-scale
                                  distributed systems -- A topological
                                  view . . . . . . . . . . . . . . . . . . 2140--2152
                    Oleg Berzin   Mobility label based network:
                                  Hierarchical mobility management and
                                  packet forwarding architecture . . . . . 2153--2181
                 Chao-Chin Yang   High speed and secure optical CDMA-based
                                  passive optical networks . . . . . . . . 2182--2191
            Fabio Martignon and   
              Stefano Paris and   
                 Antonio Capone   Design and implementation of MobiSEC: A
                                  complete security architecture for
                                  wireless mesh networks . . . . . . . . . 2192--2207
         A. Antony Franklin and   
        Vibhav Bukkapatanam and   
             C. Siva Ram Murthy   Impact of multiple channels and radios
                                  on the performance of a TDMA based
                                  wireless mesh network  . . . . . . . . . 2208--2224
           Andy An-Kai Jeng and   
                  Rong-Hong Jan   Role and channel assignments for
                                  wireless mesh networks using hybrid
                                  approach . . . . . . . . . . . . . . . . 2225--2240
          Anat Bremler-Barr and   
                   Nir Chen and   
          Jussi Kangasharju and   
               Osnat Mokryn and   
                  Yuval Shavitt   Bringing order to BGP: Decreasing time
                                  and message complexity . . . . . . . . . 2241--2256
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 53, Number 13, August 28, 2009

       Anne-Marie Kermarrec and   
              Maarten van Steen   Editorial  . . . . . . . . . . . . . . . 2257--2258
              Oznur Ozkasap and   
                Mine Caglar and   
                  Emrah Cem and   
                  Emrah Ahi and   
                  Emre Iskender   Stepwise fair-share buffering for
                                  gossip-based peer-to-peer data
                                  dissemination  . . . . . . . . . . . . . 2259--2274
            Vinh Tran-Quang and   
                 Takumi Miyoshi   A novel gossip-based sensing coverage
                                  algorithm for dense wireless sensor
                                  networks . . . . . . . . . . . . . . . . 2275--2287
               Rena Bakhshi and   
            Daniela Gavidia and   
                Wan Fokkink and   
              Maarten van Steen   An analytical model of information
                                  dissemination for a gossip-based
                                  protocol . . . . . . . . . . . . . . . . 2288--2303
               Jay A. Patel and   
   Étienne Rivi\`ere and   
             Indranil Gupta and   
           Anne-Marie Kermarrec   Rappel: Exploiting interest and network
                                  locality to improve fairness in
                                  publish-subscribe systems  . . . . . . . 2304--2320
       Márk Jelasity and   
          Alberto Montresor and   
               Ozalp Babao\uglu   T-Man: Gossip-based fast overlay
                                  topology construction  . . . . . . . . . 2321--2339
           Edward Bortnikov and   
             Maxim Gurevich and   
                Idit Keidar and   
              Gabriel Kliot and   
               Alexander Shraer   Brahms: Byzantine resilient random
                                  membership sampling  . . . . . . . . . . 2340--2359
      Ramsés Morales and   
                 Indranil Gupta   AVCOL: Availability-aware information
                                  aggregation in large distributed systems
                                  under uncollaborative behavior . . . . . 2360--2372
                Idit Keidar and   
               Roie Melamed and   
                     Ariel Orda   EquiCast: Scalable multicast with
                                  selfish users  . . . . . . . . . . . . . 2373--2386
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 53, Number 14, September 18, 2009

    Maria Artishchev-Zapolotsky   Improved layout of the odd--even sorting
                                  network  . . . . . . . . . . . . . . . . 2387--2395
                 Junhai Luo and   
                    Xue Liu and   
                     Mingyu Fan   A trust model based on fuzzy
                                  recommendation for mobile ad-hoc
                                  networks . . . . . . . . . . . . . . . . 2396--2407
    Alexandros Tsakountakis and   
       Georgios Kambourakis and   
             Stefanos Gritzalis   A generic accounting scheme for next
                                  generation networks  . . . . . . . . . . 2408--2426
        Johannes Göbel and   
         Anthony Krzesinski and   
                 Michel Mandjes   Incentive-based control of ad hoc
                                  networks: A performance study  . . . . . 2427--2443
                  B. Behsaz and   
              P. Gburzynski and   
                   M. MacGregor   Transport-independent fairness . . . . . 2444--2457
                  Yang Xiao and   
              Yanping Zhang and   
                  Miao Peng and   
                   Hui Chen and   
               Xiaojiang Du and   
                     Bo Sun and   
                         Kui Wu   Two and three-dimensional intrusion
                                  object detection under randomized
                                  scheduling algorithms in sensor networks 2458--2475
                 Alice Este and   
         Francesco Gringoli and   
                Luca Salgarelli   Support Vector Machines for TCP traffic
                                  classification . . . . . . . . . . . . . 2476--2490
                   Hui Zang and   
                  Antonio Nucci   Traffic monitor deployment in IP
                                  networks . . . . . . . . . . . . . . . . 2491--2501
     A. Hamed Mohsenian Rad and   
             Vincent W. S. Wong   Congestion-aware channel assignment for
                                  multi-channel wireless mesh networks . . 2502--2516
   Y. Ahmet \cSekercio\uglu and   
           Milosh Ivanovich and   
                  Alper Ye\ugin   A survey of MAC based QoS
                                  implementations for WiMAX networks . . . 2517--2536
       Shahram Shah-Heydari and   
                    Oliver Yang   Heuristic algorithms for designing
                                  self-repairing protection trees in mesh
                                  networks . . . . . . . . . . . . . . . . 2537--2551
               Mark Shifrin and   
                 Isaac Keslassy   Small-buffer networks  . . . . . . . . . 2552--2565
              Ben-Jye Chang and   
                 Shu-Yu Lin and   
                     Jun-Yu Jin   LIAD: Adaptive bandwidth prediction
                                  based Logarithmic Increase Adaptive
                                  Decrease for TCP congestion control in
                                  heterogeneous wireless networks  . . . . 2566--2585
         Carlos T. Calafate and   
                 P. Manzoni and   
           Juan-Carlos Cano and   
                M. P. Malumbres   Markovian-based traffic modeling for
                                  mobile ad hoc networks . . . . . . . . . 2586--2600
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 53, Number 15, October 12, 2009

          Patrick P. C. Lee and   
                    Tian Bu and   
                     Thomas Woo   On the detection of signaling DoS
                                  attacks on 3G/WiMax wireless networks    2601--2616
             Erik Bergfeldt and   
              Svante Ekelin and   
              Johan M. Karlsson   Real-time available-bandwidth estimation
                                  using filtering and change detection . . 2617--2645
                   Wenji Wu and   
                 Phil Demar and   
                  Matt Crawford   Sorting Reordered Packets with Interrupt
                                  Coalescing . . . . . . . . . . . . . . . 2646--2662
               Kuo-Feng Ssu and   
              Chun-Hao Yang and   
             Chih-Hsun Chou and   
                    An-Kuo Yang   Improving routing distance for
                                  geographic multicast with Fermat points
                                  in mobile ad hoc networks  . . . . . . . 2663--2673
              Ian W. C. Lee and   
            Abraham O. Fapojuwo   Analysis and modeling of a campus
                                  wireless network TCP/IP traffic  . . . . 2674--2687
         Shekhar Srivastava and   
     Appie van de Liefvoort and   
                     Deep Medhi   Traffic engineering of MPLS backbone
                                  networks in the presence of
                                  heterogeneous streams  . . . . . . . . . 2688--2702
                 Sirui Yang and   
                    Hai Jin and   
                      Bo Li and   
                   Xiaofei Liao   A modeling framework of content
                                  pollution in Peer-to-Peer video
                                  streaming systems  . . . . . . . . . . . 2703--2715
         Josephina Antoniou and   
       Ioannis Koukoutsidis and   
                   Eva Jaho and   
        Andreas Pitsillides and   
            Ioannis Stavrakakis   Access network synthesis game in next
                                  generation networks  . . . . . . . . . . 2716--2726
Enrique Hernández-Orallo and   
         Joan Vila-Carbó   Web server performance analysis using
                                  histogram workload models  . . . . . . . 2727--2739
                  S. Martin and   
                       G. Leduc   A practical bytecode interpreter for
                                  programmable routers on IXP network
                                  processors . . . . . . . . . . . . . . . 2740--2751
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 53, Number 16, November 10, 2009

Lluís Parcerisa Giné and   
                Ian F. Akyildiz   Molecular communication options for long
                                  range nanonetworks . . . . . . . . . . . 2753--2766
                Jongmin Lee and   
                 Hojung Cha and   
                        Rhan Ha   Improving TCP fairness and performance
                                  with bulk transmission control over
                                  lossy wireless channel . . . . . . . . . 2767--2781
Weverton Luis da Costa Cordeiro and   
    Guilherme Sperb Machado and   
Fabrício Girardi Andreis and   
      Alan Diego dos Santos and   
      Cristiano Bonato Both and   
   Luciano Paschoal Gaspary and   
Lisandro Zambenedetti Granville and   
          Claudio Bartolini and   
                 David Trastour   Change Ledge: Change design and planning
                                  in networked systems based on reuse of
                                  knowledge and automation . . . . . . . . 2782--2799
                    Alex X. Liu   Firewall policy verification and
                                  troubleshooting  . . . . . . . . . . . . 2800--2809
                Zvi Rosberg and   
                 Fariza Sabrina   Rate control of multi class priority
                                  flows with end-to-end delay and rate
                                  constraints for QoS networks . . . . . . 2810--2824
               Meeyoung Cha and   
     W. Art Chaovalitwongse and   
             Jennifer Yates and   
                Aman Shaikh and   
                       Sue Moon   Efficient and scalable provisioning of
                                  always-on multicast streaming services   2825--2839
        Therence Houngbadji and   
                  Samuel Pierre   SubCast: A distributed addressing and
                                  routing system for large scale wireless
                                  sensor and actor networks  . . . . . . . 2840--2854
             Onkar Bhardwaj and   
            G. V. V. Sharma and   
                Manoj Panda and   
                   Anurag Kumar   Modeling finite buffer effects on TCP
                                  traffic over an IEEE 802.11
                                  infrastructure WLAN  . . . . . . . . . . 2855--2869
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 53, Number 17, December 3, 2009

               Krishna Kant and   
               Bhuvan Urgaonkar   Virtualized Data Centers . . . . . . . . 2871--2872
                  Ravi Iyer and   
            Ramesh Illikkal and   
               Omesh Tickoo and   
                    Li Zhao and   
              Padma Apparao and   
                     Don Newell   VM$^3$: Measuring, modeling and managing
                                  VM shared resources  . . . . . . . . . . 2873--2887
           Tridib Mukherjee and   
              Ayan Banerjee and   
     Georgios Varsamopoulos and   
        Sandeep K. S. Gupta and   
                  Sanjay Rungta   Spatio-temporal thermal-aware job
                                  scheduling to minimize energy
                                  consumption in virtualized heterogeneous
                                  data centers . . . . . . . . . . . . . . 2888--2904
               Daniel Gmach and   
                Jerry Rolia and   
         Ludmila Cherkasova and   
                  Alfons Kemper   Resource pool management: Reactive
                                  versus proactive or let's be friends . . 2905--2922
               Timothy Wood and   
            Prashant Shenoy and   
         Arun Venkataramani and   
                   Mazin Yousif   Sandpiper: Black-box and gray-box
                                  resource management for virtual machines 2923--2938
                   Krishna Kant   Data center evolution: A tutorial on
                                  state of the art, issues, and challenges 2939--2965
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 53, Number 18, December 24, 2009

Jaime García-Reinoso and   
          Iván Vidal and   
           Francisco Valera and   
                 Arturo Azcorra   Zero config residential gateway
                                  experiences for next generation smart
                                  homes  . . . . . . . . . . . . . . . . . 2967--2984
                    Jing Fu and   
          Peter Sjödin and   
                Gunnar Karlsson   Intra-domain routing convergence with
                                  centralized control  . . . . . . . . . . 2985--2996
              Shahab Moradi and   
     A. Hamed Mohsenian-Rad and   
             Vincent W. S. Wong   An RL-based scheduling algorithm for
                                  video traffic in high-rate wireless
                                  personal area networks . . . . . . . . . 2997--3010
           Daniel Camps Mur and   
  Xavier Pérez-Costa and   
         Sebastia Sallent Ribes   An adaptive solution for Wireless LAN
                                  distributed power saving modes . . . . . 3011--3030
                Jiming Chen and   
                   Shibo He and   
                Youxian Sun and   
       Preetha Thulasiraman and   
          Xuemin (Sherman) Shen   Optimal flow control for
                                  utility-lifetime tradeoff in wireless
                                  sensor networks  . . . . . . . . . . . . 3031--3041
               Kuo-Feng Ssu and   
              Wei-Tong Wang and   
                Wen-Chung Chang   Detecting Sybil attacks in Wireless
                                  Sensor Networks using neighboring
                                  information  . . . . . . . . . . . . . . 3042--3056
            Francesca Cuomo and   
         Emanuele Cipollone and   
                 Anna Abbagnale   Performance analysis of IEEE 802.15.4
                                  wireless sensor networks: An insight
                                  into the topology formation process  . . 3057--3075
          Mustapha Boushaba and   
           Abdelhakim Hafid and   
          Abderrahim Benslimane   High accuracy localization method using
                                  AoA in sensor networks . . . . . . . . . 3076--3088
                Yixin Jiang and   
                 Yanfei Fan and   
      Xuemin (Sherman) Shen and   
                     Chuang Lin   A self-adaptive probabilistic packet
                                  filtering scheme against entropy attacks
                                  in network coding  . . . . . . . . . . . 3089--3101


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 54, Number 5, April 8, 2010

             Guido Urdaneta and   
           Guillaume Pierre and   
              Maarten van Steen   Corrigendum to ``Wikipedia workload
                                  analysis for decentralized hosting''
                                  [Computer Networks 53 (11) (2009)
                                  1830--1845]  . . . . . . . . . . . . . . 877--878