Last update: Tue Sep 3 09:12:14 MDT 2024
Volume 19, Number 1, January, 1996Hermann Maurer Editorial . . . . . . . . . . . . . . . 1 L. C. Jain Editorial . . . . . . . . . . . . . . . 3 Herbert Dawid and Kurt Hornik The dynamics of genetic algorithms in interactive environments . . . . . . . . 5--19 Charles L. Karr Adaptive process control using biological paradigms . . . . . . . . . . 21--44 Kaihei Kuwata and Yuji Kajitani and Masahide Watanabe and Ryu Katayama Chaos simulator as a developing tool and a research environment for applications of chaos engineering . . . . . . . . . . 45--66 Ranjit Bose and Vijayan Sugumaran Knowledge-based approach to domain modeling: organizational process modeling application . . . . . . . . . . 67--89 Dinesh P. Mital and Eam Khwang Teoh and P. N. Suganthan Learning parameters for object recognition by the self-organizing Hopfield network . . . . . . . . . . . . 91--108
L. C. Jain Guest Editorial: Intelligent systems: design and applications. Part 2 . . . . 109 David V. Sánchez A. On the design of a class of neural networks . . . . . . . . . . . . . . . . 111--118 Ferda N. Civelek-Alpaslan and Kathleen M. Swigger A temporal neural network model for constructing connectionist expert system knowledge bases . . . . . . . . . . . . 119--133 Krishna Kottathra and Yianni Attikiouzel A novel multicriteria optimization algorithm for the structure determination of multilayer feedforward neural networks . . . . . . . . . . . . 135--147 Ibikunle Ashiru and Chris Czarnecki and Tom Routen Characteristics of a genetic based approach to path planning for mobile robots . . . . . . . . . . . . . . . . . 149--169 Walter Cedeño and Rao V. Vemuri Genetic algorithms in aquifer management 171--187 John E. Hunt and Denise E. Cooke Learning using an artificial immune system . . . . . . . . . . . . . . . . . 189--212 Larry R. Medsker Microcomputer applications of hybrid intelligent systems . . . . . . . . . . 213--234
Yi Pan and Mounir Hamdi Singular value decomposition on processor arrays with a pipelined bus system . . . . . . . . . . . . . . . . . 235--248 J. M. Kuhlman and M. J. Lyell Development of a user-friendly software planning tool to assess effects of biofilm activity on contaminant reduction in streams . . . . . . . . . . 249--264 Sun-Teck Tan Architecture of a generic instructional planner . . . . . . . . . . . . . . . . 265--274 N. Bourbakis and N. Pereira and S. Mertoguno Hardware design of a letter-driven OCR and document processing system . . . . . 275--294 Jian Tao Wang and Dinesh P. Mital A microcomputer-based prototype for ECG paper record conversion . . . . . . . . 295--307 Gokul Rajaram and V. Rajaraman A probabilistic method for calculating hit ratios in direct mapped caches . . . 309--319 K. Padmanabhan and D. Nedumaran and S. Ananthi Bedside monitor for combined ECG and ultrasound Doppler-echo observations using a microprocessor . . . . . . . . . 321--334
Anonymous Index . . . . . . . . . . . . . . . . . i--vi P. G. O'Donoghue and M. H. Murphy Object modelling and formal specification during real-time system development . . . . . . . . . . . . . . 335--352 Roger Nkambou and Gilles Gauthier Integrating WWW resources in an Intelligent Tutoring System . . . . . . 353--366 Hueyching Janice Jih The impact of learners' pathways on learning performance in multimedia Computer Aided Learning . . . . . . . . 367--380 Daniel J. Helm and Raymond J. D'Amore and Puck-Fai Yan MIDS: a framework for information organization and discovery . . . . . . . 381--394 K. Maly and C. Wild and C. M. Overstreet and H. Abdel-Wahab and A. Gupta and A. Youssef and E. Stoica and R. Talla and A. Prabhu Interactive remote instruction: lessons learned . . . . . . . . . . . . . . . . 395--404 D. Radhakrishnan A microcontroller based pacemaker tester 405--413 Benjamin Singer and George Saon An efficient algorithm for parallel integer multiplication . . . . . . . . . 415--418
Anonymous Guest Editorial: Special issue of JNCA on the digital libraries . . . . . . . . 1--2 Ee-Peng Lim and Ying Lu Integrated queries to existing bibliographic and structured databases 3--24 Shigeo Sugimoto and Akira Maeda and Tetsuo Sakaguchi and Koichi Tabata and Takehisa Fujita Experimental studies on software tools to enhance accessibility to information in digital libraries . . . . . . . . . . 25--44 Alfredo J. Sánchez and John J. Leggett Agent services for users of digital libraries . . . . . . . . . . . . . . . 45--58 Klaus Tochtermann and Thomas Alders and Andreas Seifert DogitaLS1: the Dortmund digital library system . . . . . . . . . . . . . . . . . 59--73 Gene Alloway and Nathan Bos and Kathleen Hamel and Tracy Hammerman and Elisabeth Klann and Joseph Krajcik and David Lyons and Terry Madden and Jon Margerum-Leys and James Reed and Nancy Scala and Elliot Soloway and Ioanna Vekiri and Raven Wallace Creating an inquiry-learning environment using the World Wide Web . . . . . . . . 75--85 John L. Schnase and Deborah L. Kama and Kay L. Tomlinson and José Alfredo Sánchez and Edward L. Cunnius and Nancy R. Morin The Flora of North America digital library: a case study in biodiversity database publishing . . . . . . . . . . 87--103
Gerald Tripp On the design of an ATM interface with facilities for traffic monitoring and generation . . . . . . . . . . . . . . . 105--121 Paul Losleben and Alice S. Tull and Erming Zhou Help-Exchange: an arbitrated system for a help network . . . . . . . . . . . . . 123--134 Richard H. Fowler and Wendy A. L. Fowler and Jorge L. Williams $3$D visualization of WWW semantic content for browsing and query formulation . . . . . . . . . . . . . . 135--149 Daniel R. Bielenberg and Ted Carpenter-Smith Efficacy of story in multimedia training 151--159 B. S. Lee and T. K. Y. Chan and P. C. Leong A `pay-as-you-use' controller for networked laser printers . . . . . . . . 161--169 S. C. Hui and K. Y. Chan and G. Y. Qian Distributed fax message processing system . . . . . . . . . . . . . . . . . 171--190 L. P. Khoo and M. Y. Teo A prototype fuzzy-based classifier system for trajectory planning . . . . . 191--202 Hock C. Chan Visual query languages for entity relationship model databases . . . . . . 203--221
Sumit Ghosh An asynchronous approach to efficient execution of programs on adaptive architectures utilizing FPGAs . . . . . 223--252 Ellen Yu Borkowski and David Henry and Lida L. Larsen and Deborah Mateik Supporting teaching and learning via the Web: transforming hard-copy linear mindsets into Web-flexible creative thinking . . . . . . . . . . . . . . . . 253--265 Jianying Zhou and Dieter Gollmann Evidence and non-repudiation . . . . . . 267--281 Renji Tao and Shihua Chen A variant of the public key cryptosystem FAPKC3 . . . . . . . . . . . . . . . . . 283--303 H. J. Schumacher and Sumit Ghosh A fundamental framework for network security . . . . . . . . . . . . . . . . 305--322
Anonymous Index and Contents to Volume 20 . . . . i--x Holger Bock and Wolfgang Mayerwieser and Karl C. Posch and Reinhard Posch and Volker Schindler An integrated co-processor architecture for a smartcard . . . . . . . . . . . . 323--337 Sandra L. Esler and Michael L. Nelson NASA indexing benchmarks: evaluating text search engines . . . . . . . . . . 339--353 Michal Iglewski and Tomasz Müldner Comparison of formal specification methods and object-oriented paradigms 355--377 Don E. George and E. Salari Real-time pitch extraction of voiced speech . . . . . . . . . . . . . . . . . 379--387 Schubert Foo and Siu Cheung Hui Delivery of video mail on the World Wide Web . . . . . . . . . . . . . . . . . . 389--403 Bernhard Leisch and Peter Schuhmayer An architecture for distributed visualization of technical processes . . 405--420
Guojun Lu and Chester Kang An efficient communication scheme for media on-demand services with hard QoS guarantees . . . . . . . . . . . . . . . 1--15 P. Blenkhorn and D. G. Evans Using speech and touch to enable blind people to access schematic diagrams . . 17--29 Nader Mir-Fakhraei An efficient multicast approach in an ATM switching network for multimedia applications . . . . . . . . . . . . . . 31--39 Ee-Luang Ang and Syin Chan and Bu-Sung Lee Deployment of VCR services on a computer network . . . . . . . . . . . . . . . . 41--52 Mark Ratcliffe and Tim Paul Davies Using MBone technology to support a framework for a remote advisory service 53--68
Imran Khan and Howard C. Card Adaptive information agents using competitive learning . . . . . . . . . . 69--89 N. Vlajic and H. C. Card Categorizing Web pages on the subject of neural networks . . . . . . . . . . . . 91--105 Sherali Zeadally and Weiyou Cui Experiences with multimedia applications over native ATM . . . . . . . . . . . . 107--123 E. C. Tan and A. Wahab and H. W. Yong Interfacing reprogrammable universal remote controller with multimedia PC . . 125--134 C. C. Charlton and P. H. Leng and R. K. Lloyd and R. Turnbull The use of macroprocessing for Web site standardization . . . . . . . . . . . . 135--148 Gerard Parr and Kevin Curran Optimal multimedia transport on the Internet . . . . . . . . . . . . . . . . 149--161
Johnny S. K. Wong and Rishi Nayar and Armin R. Mikler A framework for a World Wide Web-based Data Mining system . . . . . . . . . . . 163--185 P. C. Saxena and Sangita Gupta A performance comparison of token- and tree-based mutual exclusion algorithms on Chordal Rings . . . . . . . . . . . . 187--201 K. V. Chin and S. C. Hui and S. Foo Enhancing the quality of Internet voice communication for Internet telephony systems . . . . . . . . . . . . . . . . 203--218
Anonymous Contents and Index to Volume 21 . . . . i--viii Bor Prihavec and Franc Solina User interface for video observation over the Internet . . . . . . . . . . . 219--237 Nikolas M. Mitrou and Konstantine Kavidopoulos Traffic engineering using a class of M/G/1 models . . . . . . . . . . . . . . 239--271 Nasser-Eddine Rikli An effective model for VBR video with application to an ATM multiplexer . . . 273--285 L. Moreno and R. M. Aguilar and C. A. Martin and J. D. Piñeiro and J. I. Estévez and J. L. Sánchez and J. F. Sigut and V. I. Jiménez Patient-centered computer simulation in hospital management . . . . . . . . . . 287--310
Wei-Chou Chen and Tzung-Pei Hong and Rong Jeng A framework of decision support systems for use on the World Wide Web . . . . . 1--17 Denis Helic and Hermann Maurer and Nick Scherbakov Introducing hypermedia composites to WWW 19--32 Hamesh Chawla and Geoff Dillon and Riccardo Bettati HYDRANET: Network support for scaling of large-scale services . . . . . . . . . . 33--50 Joachim Hasebrook Web-based training, performance and controlling . . . . . . . . . . . . . . 51--64 Claude Ghaoui and M. J. Taylor Special issue on: `Support for Open and Distance Learning on the WWW' . . . . . 65--68
Harri Klapuri and Jarmo Takala and Jukka Saarinen Safety, liveness and real-time in embedded system design . . . . . . . . . 69--89 M. Kumar and S. Venkatesh and K.-Y. Lim and H. Santoso Information access and QoS issues in a mobile computing environment . . . . . . 91--118 K. Hanner and R. Hörmanseder Managing Windows NT$^\reg $ file system permissions --- a security tool to master the complexity of Microsoft Windows NT$^\reg $ file system permissions . . . . . . . . . . . . . . 119--131 Christine Steeples and Peter Goodyear Enabling professional learning in distributed communities of practice: Descriptors for multimedia objects . . . 133--145 Uffe Kock Wiil and Kenneth M. Anderson and Michael Bieber Call for Papers: Special Issue on: Hypermedia Extensibility Mechanisms and Scripting Languages . . . . . . . . . . 147--148
J. E. Gilbert and C. Y. Han Adapting instruction in search of `a significant difference' . . . . . . . . 149--160 Brian M. Slator and Paul Juell and Philip E. McClean and Bernhardt Saini-Eidukat and Donald P. Schwert and Alan R. White and Curt Hill Virtual environments for education . . . 161--174 Guojun Lu Design issues of multimedia information indexing and retrieval systems . . . . . 175--198 Gail J. Ahn and Ravi Sandhu Towards role-based administration in network information services . . . . . . 199--213
Anonymous Index and Contents to Volume 22 . . . . i--viii Hongbo Du and Laurent Wery Micro: a normalization tool for relational database designers . . . . . 215--232 David Mioduser and Rafi Nachmias and Avigail Oren and Orly Lahav Web-based learning environments (WBLE): Current implementation and evolving trends . . . . . . . . . . . . . . . . . 233--247 Rosa María Carro and Estrella Pulido and Pilar Rodríguez Dynamic generation of adaptive Internet-based courses . . . . . . . . . 249--257 Luca Iocchi The Web-OEM approach to Web information extraction . . . . . . . . . . . . . . . 259--269
Wolfgang Hürst User interfaces for telepresentations --- Input devices, interaction concepts and design issues . . . . . . . . . . . 1--15 Wim de Boer and Betty Collis Instructors' choices for a WWW-based course-support environment . . . . . . . 17--26 Chih-Hsiung Tu On-line learning migration: from social learning theory to social presence theory in a CMC environment . . . . . . 27--37 Chih-Hsiung Tu Critical examination of factors affecting interaction on CMC . . . . . . 39--58
Chwei-King Mok and Nader F. Mir An efficient interconnection network for large-scale computer communications applications . . . . . . . . . . . . . . 59--75 Dave Berque and Andrew Hutcheson and David K. Johnson and Larry Jovanovic and Kyle Moore and Carl Singer and Kevin M. Slattery The design of an interface for student note annotation in a networked electronic classroom . . . . . . . . . . 77--91 Colin Pattinson A simulated network management information base . . . . . . . . . . . . 93--107 Gerhard Eschelbeck Active Security --- a proactive approach for computer security systems . . . . . 109--130 Jon Dron and Richard Mitchell and Phil Siviter and Chris Boyne CoFIND --- an experiment in $N$-dimensional collaborative filtering 131--142 Bu-Sung Lee and Chiew-Tong Lau and Nicholas C. H. Vun Power LAN MIB for management of intelligent telecommunication equipment 143--154
Anonymous Preface by the Editor in Chief . . . . . 155 Bert J. Dempsey and Micah Beck Preface to `Developing New Network-based Storage Services for Internet-supported Collaborative Communities' . . . . . . . 157--159 Ivan Tomek Preface to `Virtual Environments' . . . 161--162 John Chung-I Chuang and Marvin A. Sirbu Distributed network storage service with quality-of-service guarantees . . . . . 163--185 Ann Chervenak and Ian Foster and Carl Kesselman and Charles Salisbury and Steven Tuecke The data grid: Towards an architecture for the distributed management and analysis of large scientific datasets 187--200 Bert J. Dempsey Performance analysis of a scaleable design for replicating file collections in wide-area networks . . . . . . . . . 201--218 Laura Slaughter and Gary Marchionini and Gary Geisler Open video: a framework for a test collection . . . . . . . . . . . . . . . 219--245 Anna Cicognani Language and design in text-based virtual worlds . . . . . . . . . . . . . 247--274 Ivan Tomek The design and implementation of a MOO 275--289 Alicia Díaz and Alejandro Fernández A pattern language for virtual environments . . . . . . . . . . . . . . 291--309 Zi\`ed Choukair and Damien Retailleau A QoS model for collaboration through Distributed Virtual Environments . . . . 311--334
Anonymous Index and contents to volume 23 . . . . iii--viii H. Maurer Preface for the special issue `Support for flexible e-Learning on the WWW' . . 335 Claude Ghaoui and M. J. Taylor Support for flexible e-Learning on the WWW: a special issue . . . . . . . . . . 337--338 O. Brand and L. Petrak and D. Sturzebecher and M. Zitterbart Supporting Tele-Teaching: visualization aspects . . . . . . . . . . . . . . . . 339--355 Weigang Wang and Jörg M. Haake and Jessica Rubart and Daniel A. Tietze Hypermedia-based support for cooperative learning of process knowledge . . . . . 357--379 Samuli Pekkola and Mike Robinson and Jonni Korhonen and Saku Hujala and Tero Toivonen Multimedia application to support distance learning and other social interactions in real-time . . . . . . . 381--399 Hans-Peter Dommel and J. J. Garcia-Luna-Aceves A coordination framework and architecture for Internet groupware . . 401--427 Stuart K. MacGlashan and Malcolm J. Taylor MUSiCAL: an object-oriented hypermedia data model for the reuse of museum information for computer-aided learning and the World-Wide Web . . . . . . . . . 429--453 Claude Ghaoui Document icon bar for the support of authoring, learning and navigation on the Web: Usability issues . . . . . . . 455--475
Uffe Kock Wiil and Kenneth M. Anderson Preface to `Hypermedia extensibility mechanisms and scripting languages' . . 1--5 Uffe Kock Wiil A framework for classifying extensibility mechanisms in hypermedia systems . . . . . . . . . . . . . . . . 7--18 Peter J. Nürnberg Extensibility in component-based open hypermedia systems . . . . . . . . . . . 19--38 John Noll and Walt Scacchi Specifying process-oriented hypertext for organizational computing . . . . . . 39--61 Serge Demeyer Extensibility via a meta-level architecture . . . . . . . . . . . . . . 63--74 Kenneth M. Anderson The extensibility mechanisms of the Chimera open hypermedia system . . . . . 75--86
Gail-Joon Ahn and Kwangjo Kim CONUGA: Constrained User-Group Assignment . . . . . . . . . . . . . . . 87--100 Harri Klapuri and Jarmo Takala and Jukka Saarinen Implementing reactive closed-system specifications . . . . . . . . . . . . . 101--123 Guoyi Li and Ian Li-Jin Thng and Lawrence Wai Choong Wong ABR services for overcoming misbehaving sources in a heterogeneous environment 125--149 David Hua Min Tan and Siu Cheung Hui and Chiew Tong Lau Wireless messaging services for mobile users . . . . . . . . . . . . . . . . . 151--166 Igor Djurovic and Srdjan Stankovic and Ioannis Pitas Digital watermarking in the fractional Fourier transformation domain . . . . . 167--173
C. Bouras and A. Philopoulos and Th. Tsiatsos e-Learning through distributed virtual environments . . . . . . . . . . . . . . 175--199 Duen-Ren Liu and Yuh-Jaan Lin and Chung-Min Chen and Ya-Wen Huang Deployment of personalized e-catalogues: an agent-based framework integrated with XML metadata and user models . . . . . . 201--228 W. F. Poon and K. T. Lo Design of a starvation-free storage system for a multicast video-on-demand system using a double-rate batching policy . . . . . . . . . . . . . . . . . 229--247 Ming-Chung Tang and Chun-Nun Chou and Ching-Hui Tang and D. C. Pan and Wei-Kuan Shih Exploiting GSM short message service for ubiquitous accessing . . . . . . . . . . 249--267 Uffe Kock Wiil and David L. Hicks and Peter J. Nürnberg Special Issue on `Structural Computing' 269--271
Anonymous Volume Contents . . . . . . . . . . . . i--viii J. A. Lennon and H. Maurer MUSLI: a hypermedia interface for dynamic, interactive, and symbolic communication . . . . . . . . . . . . . 273--291 J. A. Lennon and H. Maurer Augmenting text and voice conversations with dynamic, interactive abstractions using P2P networking . . . . . . . . . . 293--306 Nawel Sabri and Chantal Taconet A generic tool to federate WAN servers 307--331 Rached N. Zantout and Ahmed A. Guessoum An automatic English--Arabic HTML page translation system . . . . . . . . . . . 333--357
P. C. Saxena and D. R. Choudhury and G. Gabrani and S. Gupta and M. Bhardwaj and M. Chopra A heuristic approach to resource locations in broadband networks . . . . 1--35 M. Kouadio and U. Pooch Technology on social issues of videoconferencing on the Internet: a survey . . . . . . . . . . . . . . . . . 37--56 Yoon-Jung Rhee and Eun-Sil Hyun and Tai-Yun Kim Connection management for QoS service on the Web . . . . . . . . . . . . . . . . 57--68
Heejin Jang and Sangwook Kim Intruder tracing through dynamic extension of a security domain . . . . . 69--91 Chun-I Fan and Chin-Laung Lei An unlinkably divisible and intention attachable ticket scheme for runoff elections . . . . . . . . . . . . . . . 93--107 Waleed E. Farag and Hussein Abdel-Wahab A new paradigm for analysis of MPEG compressed videos . . . . . . . . . . . 109--127 T. Morris and P. Blenkhorn and Farhan Zaidi Blink detection for real-time eye tracking . . . . . . . . . . . . . . . . 129--143 Bu-Sung Lee and Chai-Kiat Yeo and Ruijin Fu Hybrid quality adaptation mechanism for layered multicast over the Internet . . 145--159
Chih-Yung Chang and Shin-Chih Tu Active route-maintenance protocol for signal-based communication path in ad hoc networks . . . . . . . . . . . . . . 161--177 Nischal M. Piratla and Anura P. Jayasumana A neural network based real-time gaze tracker . . . . . . . . . . . . . . . . 179--196 Anita Behle and Michael Kirchhof and Manfred Nagl and Ralf Welter Retrieval of software components using a distributed web system . . . . . . . . . 197--222 Rudolf Hörmanseder and Johann Murauer and Jörg R. Mühlbacher Managing data flow in a DAC supporting security system . . . . . . . . . . . . 223--238
Fawzi Daoud and Takahiko Nomura Preface to `smart spaces' . . . . . . . 239--242 Daphne Economou and William L. Mitchell and Steve R. Pettifer Problem driven CVE technology development . . . . . . . . . . . . . . 243--262 Takahiko Nomura Design of `Ba' for successful Knowledge Management --- how enterprises should design the places of interaction to gain competitive advantage . . . . . . . . . 263--278 Masakatsu Kosuga and Naoki Kirimoto and Tatsuya Yamazaki and Tomonori Nakanishi and Masakazu Masuzaki and Kazuo Hasuike A multimedia service composition scheme for ubiquitous networks . . . . . . . . 279--293 Christopher Maher and Margaret Corbit Creating genetic applications for informal science learning in multi-user virtual environments . . . . . . . . . . 295--308 Tatsuya Yamazaki QoS-based media retrieval for networked digital archives . . . . . . . . . . . . 309--317 Stéphane Lo Presti and Didier Bert and Andrzej Duda TAO: Temporal Algebraic Operators for modeling multimedia presentations . . . 319--342
Hilde van der Togt Publisher's Note . . . . . . . . . . . . 1--2 Uffe K. Wiil and Peter J. Nürnberg and David L. Hicks Structural computing: research directions, systems and issues . . . . . 3--9 Peter J. Nürnberg and Monica M. C. Schraefel Relationships among structural computing and other fields . . . . . . . . . . . . 11--26 David L. Hicks and Uffe K. Wiil Searching for revolution in structural computing . . . . . . . . . . . . . . . 27--45 Kenneth M. Anderson and Susanne A. Sherba and William Van Lepthien Structural templates and transformations: the Themis structural computing environment . . . . . . . . . 47--71 Weigang Wang Visualizing and interacting with hypermedia-based process-centric enterprise models . . . . . . . . . . . 73--93 David E. Millard Discussions at the data border: from generalised hypertext to structural computing . . . . . . . . . . . . . . . 95--114 Uffe K. Wiil and Samir Tata and David L. Hicks Cooperation services in the Construct structural computing environment . . . . 115--137 Manolis Tzagarakis and Dimitris Avramidis and Maria Kyriakopoulou and Monica M. C. Schraefel and Michalis Vaitis and Dimitris Christodoulakis Structuring primitives in the Callimachus component-based open hypermedia system . . . . . . . . . . . 139--162 Anonymous Calendar . . . . . . . . . . . . . . . . ifc--ifc
B. Prabhakaran and Yuguang Tu and Yin Wu Experiences with an object-level scalable web framework . . . . . . . . . 163--196 K. Komathy and V. Ramachandran and P. Vivekanandan Security for XML messaging services --- a component-based approach . . . . . . . 197--211 Gareth Evans and Paul Blenkhorn Architectures of assistive software applications for Windows-based computers 213--228
M. Zaki and M. G. Darwish and G. Osman GBF: a grammar based filter for Internet applications . . . . . . . . . . . . . . 229--257 Nikitas M. Sgouros and Stelios Gerogiannakis Robot teleoperation environments featuring WAP-based wireless devices . . 259--271 C. K. Yeo and B. S. Lee and M. H. Er A framework for multicast video streaming over IP networks . . . . . . . 273--289
Anonymous Index to volume 26 . . . . . . . . . . . III--IV Ching-Lung Chang and Kuo-Sheng Hsu Design and implementation of MP3-music on demand system using streaming technology . . . . . . . . . . . . . . . 291--321 Li Chunlin and Li Layuan Apply agent to build grid service management . . . . . . . . . . . . . . . 323--340
Jasmine Banks and Geoffery Ericksson and Kevin Burrage and Peter Yellowlees and Sean Ivermee and Jennifer Tichon Constructing the hallucinations of psychosis in Virtual Reality . . . . . . 1--11 Wassim Itani and Ayman Kayssi J2ME application-layer end-to-end security for m-commerce . . . . . . . . 13--32 Duen-Ren Liu and Tzyy-Feng Hwang An agent-based approach to flexible commerce in intermediary-centric electronic markets . . . . . . . . . . . 33--48 Asrar Sheikh and Tao Wan and Zaki Alakhdhar A unified approach to analyze multiple access protocols for buffered finite users . . . . . . . . . . . . . . . . . 49--76
Heng Wang and Jie Fang and Hua Wang and Ya-Min Sun TSDLMRA: an efficient multicast routing algorithm based on Tabu search . . . . . 77--90 C. Bouras and Th. Tsiatsos Distributed virtual reality: building a multi-user layer for the EVE Platform 91--111 G. A. Aderounmu Performance comparison of remote procedure calling and mobile agent approach to control and data transfer in distributed computing environment . . . 113--129
A. U. H. Sheikh and T. Wan and S. Z. Alakhdhar and I. Lambadaris and M. Devetsikiotis Performance analysis of buffered R-ALOHA systems using tagged user approach . . . 131--150 Wen-Lin Yang A comparison of two optimal approaches for the MCOP problem . . . . . . . . . . 151--162 Denis Helic and Hermann Maurer and Nick Scerbakov Knowledge transfer processes in a modern WBT system . . . . . . . . . . . . . . . 163--190
Anonymous Index . . . . . . . . . . . . . . . . . III--IV Wei-Bin Lee and Kuan-Chieh Liao Constructing identity-based cryptosystems for discrete logarithm based cryptosystems . . . . . . . . . . 191--199 M. Zaki and Tarek S. Sobh A cooperative agent-based model for active security systems . . . . . . . . 201--220 Sergio A. Velastin and Benny Lo and Jie Sun A flexible communications protocol for a distributed surveillance system . . . . 221--253
Tao Gu and Hung Keng Pung and Da Qing Zhang A service-oriented middleware for building context-aware services . . . . 1--18 M. Khedr and A. Karmouch ACAI: agent-based context-aware infrastructure for spontaneous applications . . . . . . . . . . . . . . 19--44 Ismail Erturk A new method for transferring CAN messages using wireless ATM . . . . . . 45--56 Huamin Chen and Prasant Mohapatra Using service brokers for accessing backend servers for web applications . . 57--74
Anonymous Announcement . . . . . . . . . . . . . . I Anonymous Announcement . . . . . . . . . . . . . . II Anonymous Preface . . . . . . . . . . . . . . . . 75--76 Reginald L. Walker Hierarchical task topology for retrieving information from within a simulated information ecosystem . . . . 77--96 A. Rungsawang and N. Angkawattanawit Learnable topic-specific web crawler . . 97--114 Wataru Sunayama and Masahiko Yachida Panoramic View System for extracting key sentences based on viewpoints and application to a search engine . . . . . 115--127 Mark P. Sinka and David W. Corne The BankSearch web document dataset: investigating unsupervised clustering and category similarity . . . . . . . . 129--146 Xiaozhe Wang and Ajith Abraham and Kate A. Smith Intelligent web traffic mining and analysis . . . . . . . . . . . . . . . . 147--165 Srinivas Mukkamala and Andrew H. Sung and Ajith Abraham Intrusion detection using an ensemble of intelligent paradigms . . . . . . . . . 167--182
Elhadi Shakshuki and Zhonghai Luo and Jing Gong An agent-based approach to security service . . . . . . . . . . . . . . . . 183--208 Ch. Bouras and A. Gkamas and I. Nave and D. Primpas and A. Shani and O. Sheory and K. Stamos and Y. Tzruya Application on demand system over the Internet . . . . . . . . . . . . . . . . 209--232 Tao Gu and Hung Keng Pung and Jian Kang Yao Towards a flexible service discovery . . 233--248
Anonymous Index to Volume 28 . . . . . . . . . . . III--IV D. Di Sorte and G. Reali Pricing and brokering services over interconnected IP networks . . . . . . . 249--283 Christos Bouras and Afrodite Sevasti Service level agreements for DiffServ-based services' provisioning 285--302
Bing-Yi Zhang and Ya-Min Sun Fractional alpha stable network traffic model and its application in QoS routing 1--10 Elizabeth A. Thompson and Eric Harmison and Robert Carper and Robert Martin and Jim Isaacs Robot teleoperation featuring commercially available wireless network cards . . . . . . . . . . . . . . . . . 11--24 Leonardo Bidese de Pinho and Claudio Luis de Amorim Assessing the efficiency of stream reuse techniques in P2P video-on-demand systems . . . . . . . . . . . . . . . . 25--45 N. Zhang and Q. Shi and M. Merabti and R. Askwith Practical and efficient fair document exchange over networks . . . . . . . . . 46--61 T. Morris and V. Chauhan Facial feature tracking for cursor control . . . . . . . . . . . . . . . . 62--80 Anonymous Editorial board . . . . . . . . . . . . CO2
Nikhil Ichalkaranje Editorial . . . . . . . . . . . . . . . 81--82 Yukiko I. Nakano and Toshihiro Murayama and Masashi Okamoto and Daisuke Kawahara and Qing Li and Sadao Kurohashi and Toyoaki Nishida Cards-to-presentation on the web: generating multimedia contents featuring agent animations . . . . . . . . . . . . 83--104 Pierre Urlings and Christos Sioutis and Jeff Tweedale and Nikhil Ichalkaranje and Lakhmi Jain A future framework for interfacing BDI agents in a real-time teaming environment . . . . . . . . . . . . . . 105--123 E. V. Krishnamurthy and V. K. Murthy Distributed agent paradigm for soft and hard computation . . . . . . . . . . . . 124--146 Colin Fyfe and Lakhmi Jain Teams of intelligent agents which learn using artificial immune systems . . . . 147--159 J. Jarvis and R. Rönnquist and D. McFarlane and L. Jain A team-based holonic approach to robotic assembly cell control . . . . . . . . . 160--176 Anders I. Mòrch and Jan A. Dolonen and Jan Eirik B. Nævdal An evolutionary approach to prototyping pedagogical agents: from simulation to integrated system . . . . . . . . . . . 177--199 Weiqin Chen Supporting teachers' intervention in collaborative knowledge building . . . . 200--215 Anonymous Editorial board . . . . . . . . . . . . CO2
A. A. Akintola and G. A. Aderounmu and M. O. Adigun Performance analysis of double buffer technique (DBT) model for mobility support in wireless IP networks . . . . 217--234 Shih-Lin Wu and Sui Fan-Jiang and Zi-Tsan Chou An efficient quality-of-service MAC protocol for infrastructure WLANs . . . 235--261 Hea-Sook Park and Doo-Kwon Baik A study for control of client value using cluster analysis . . . . . . . . . 262--276 Susanne Loidl Towards pervasive learning: WeLearn.Mobile. A CPS package viewer for handhelds . . . . . . . . . . . . . . . 277--293 Peng Liu and Hai Wang and Lunquan Li Real-time data attack isolation for commercial database applications . . . . 294--320 Crescencio Bravo and Miguel Á. Redondo and Manuel Ortega and M. Felisa Verdejo Collaborative distributed environments for learning design tasks by means of modelling and simulation . . . . . . . . 321--342 M. Avvenuti and A. Vecchio Application-level network emulation: the EmuSocket toolkit . . . . . . . . . . . 343--360 Anonymous Editorial board . . . . . . . . . . . . CO2
Ajith Abraham and Kate Smith and Ravi Jain and Lakhmi Jain Network and information security: a computational intelligence approach: Special Issue of Journal of Network and Computer Applications . . . . . . . . . 1--3 Feng-Hsing Wang and Lakhmi C. Jain and Jeng-Shyang Pan VQ-based watermarking scheme with genetic codebook partition . . . . . . . 4--23 Tai-Wen Yue and Suchen Chiang The semipublic encryption for visual cryptography using Q'tron neural networks . . . . . . . . . . . . . . . . 24--41 Gail-Joon Ahn and Badrinath Mohan and Seng-Phil Hong Towards secure information sharing using role-based delegation . . . . . . . . . 42--59 Yihua Liao and V. Rao Vemuri and Alejandro Pasos Adaptive anomaly detection with evolving connectionist systems . . . . . . . . . 60--80 Ajith Abraham and Ravi Jain and Johnson Thomas and Sang Yong Han D-SCIDS: Distributed soft computing intrusion detection system . . . . . . . 81--98 Tansel Özyer and Reda Alhajj and Ken Barker Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening . . . . . . . . . . . . . 99--113 Sandhya Peddabachigari and Ajith Abraham and Crina Grosan and Johnson Thomas Modeling intrusion detection system using hybrid intelligent systems . . . . 114--132 Ali El Kateeb High-speed routers design using data stream distributor unit . . . . . . . . 133--144 Chen Hongsong and Ji Zhenzhou and Hu Mingzeng and Fu Zhongchuan and Jiang Ruixiang Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol . . . . . . . . . . . . . . . . 145--166 Khong Neng Choong and B. M. Ali and V. Prakash and Yoke Chek Yee The case for a dynamic proxy framework with voluntary/incentive-based client hosting scheme . . . . . . . . . . . . . 167--185 Hojjat Jafarpour and Nasser Yazdani and Navid Bazzaz-zadeh A scalable group communication mechanism for mobile agents . . . . . . . . . . . 186--208 V. Kalogeraki and D. Zeinalipour-Yazti and D. Gunopulos and A. Delis Distributed middleware architectures for scalable media services . . . . . . . . 209--243 Tainchi Lu and Chinghao Hsu Mobile agents for information retrieval in hybrid simulation environment . . . . 244--264 Hui Guo and Guobin Shen and Zhiguang Wang and Shipeng Li Optimized streaming media proxy and its applications . . . . . . . . . . . . . . 265--281 Lei Guo and Hongfang Yu and Lemin Li Dynamic survivable algorithm for meshed WDM optical networks . . . . . . . . . . 282--295 Jenq-Shiou Leu and Yuan-Po Chi and Wei-Kuan Shih Design and implementation of Blog Rendering and Accessing INstantly system (BRAINS) . . . . . . . . . . . . . . . . 296--307 Lijun Qian and Ning Song and Xiangfang Li Detection of wormhole attacks in multi-path routed wireless ad hoc networks: a statistical analysis approach . . . . . . . . . . . . . . . . 308--330 Kwang Sik Shin and Jin Ha Jung and Jin Young Cheon and Sang Bang Choi Real-time network monitoring scheme based on SNMP for dynamic information 331--353 Xiaobo Zhou and Jianbin Wei and Cheng-Zhong Xu Quality-of-service differentiation on the Internet: a taxonomy . . . . . . . . 354--383 Suneuy Kim and Chita R. Das An analytical model for interval caching in interactive video servers . . . . . . 384--413 M. Saniee Abadeh and J. Habibi and C. Lucas Intrusion detection using a fuzzy genetics-based learning algorithm . . . 414--428 Anonymous Editorial board . . . . . . . . . . . . CO2
Rongxi He and Bin Lin and Lemin Li Dynamic service-level-agreement aware shared-path protection in WDM mesh networks . . . . . . . . . . . . . . . . 429--444 B. Stephen and L. Petropoulakis The design and implementation of an agent-based framework for acceptable usage policy monitoring and enforcement 445--465 Wang Liang and Guo Yi-Ping and Fang Ming Web search engine based on DNS . . . . . 466--478 M. Esteve and C. E. Palau and J. Martínez-Nohales and B. Molina A video streaming application for urban traffic management . . . . . . . . . . . 479--498 M. Can Filibeli and Oznur Ozkasap and M. Reha Civanlar Embedded web server-based home appliance networks . . . . . . . . . . . . . . . . 499--514 Xiaobo Zhou and Cheng-Zhong Xu Efficient algorithms of video replication and placement on a cluster of streaming servers . . . . . . . . . . 515--540 Kenneth J. Turner Representing and analysing composed web services using \sc Cress . . . . . . . . 541--562 Bouras Christos and Kounenis Giorgos and Misedakis Ioannis A web content manipulation technique based on page Fragmentation . . . . . . 563--585 Siti Z. Z. Abidin and Min Chen and Phil W. Grant Designing interaction protocols using noughts and crosses type games . . . . . 586--613 Alejandro Quintero and Da Yu Li and Harold Castro A location routing protocol based on smart antennas for ad hoc networks . . . 614--636 Y. Bai and M. R. Ito A new technique for minimizing network loss from users' perspective . . . . . . 637--649 Lei Guo and Jin Cao and Hongfang Yu and Lemin Li A new shared-risk link groups (SRLG)-disjoint path provisioning with shared protection in WDM optical networks . . . . . . . . . . . . . . . . 650--661 Chin-Chen Chang and Chih-Yang Lin and Keng-Chu Lin Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots . . . . . . . . . . . 662--676 Jin Cao and Lei Guo and Hongfang Yu and Lemin Li A novel recursive shared segment protection algorithm in survivable WDM networks . . . . . . . . . . . . . . . . 677--694 Rongping Lin and Sheng Wang and Lemin Li Protections for multicast session in WDM optical networks under reliability constraints . . . . . . . . . . . . . . 695--705 Chan-Ho Min and Sehun Kim On-demand utility-based power control routing for energy-aware optimization in mobile ad hoc networks . . . . . . . . . 706--727 Gwo-Jong Yu and Chih-Yung Chang and Kuei-Ping Shih and Shih-Chieh Lee Relay reduction and disjoint routes construction for scatternet over Bluetooth radio system . . . . . . . . . 728--749 Kwang-Sik Shin and Jin-Ha Jung and Wan-Oh Yoon and Sang-Bang Choi P2P transfer of partial stream in multimedia multicast . . . . . . . . . . 750--774 Yiqun Xu and Luigi Logrippo and Jacques Sincennes Detecting feature interactions in CPL 775--799 Ibrahim Özçelik and Hüseyin Ekiz Building an interconnection between PROFIBUS and ATM networks . . . . . . . 800--817 Anonymous Editorial board . . . . . . . . . . . . CO2
Xiaobo Zhou and Cheng-Zhong Xu Distributed denial-of-service and intrusion detection . . . . . . . . . . 819--822 Shigang Chen and Yong Tang and Wenliang Du Stateful DDoS attacks and targeted filtering . . . . . . . . . . . . . . . 823--840 Matthias Bossardt and Thomas Dübendorfer and Bernhard Plattner Enhanced Internet security by a distributed traffic control service based on traffic ownership . . . . . . . 841--857 Vasilios A. Siris and Ilias Stavrakis Provider-based deterministic packet marking against distributed DoS attacks 858--876 Tao Peng and Christopher Leckie and Kotagiri Ramamohanarao Information sharing for distributed intrusion detection systems . . . . . . 877--899 Gabriel López and Oscar Cánovas and Antonio F. Gómez and Jesús D. Jiménez and Rafael Marín A network access control approach based on the AAA architecture and authorization attributes . . . . . . . . 900--919 Celia Li and Cungang Yang and Richard Cheung Key management for role hierarchy in distributed systems . . . . . . . . . . 920--936 Bing Wu and Jie Wu and Eduardo B. Fernandez and Mohammad Ilyas and Spyros Magliveras Secure and efficient key management in mobile ad hoc networks . . . . . . . . . 937--954 George D. Magoulas and George Ghinea Intelligence-based adaptation for ubiquitous multimedia communications . . 955--957 Dietmar Jannach and Klaus Leopold Knowledge-based multimedia adaptation for ubiquitous multimedia consumption 958--982 Nicola Cranley and Philip Perry and Liam Murphy Dynamic content-based adaptation of streamed multimedia . . . . . . . . . . 983--1006 M. J. O'Grady and G. M. P. O'Hare and C. Donaghey Delivering adaptivity through context-awareness . . . . . . . . . . . 1007--1033 Vincent Charvillat and Romulus Grigoras Reinforcement learning for dynamic multimedia adaptation . . . . . . . . . 1034--1058 Johan Bollen and Michael L. Nelson and Gary Geisler and Raquel Araujo Usage derived recommendations for a video digital library . . . . . . . . . 1059--1083 Gloria Phillips-Wren and Anders Morch and Jeff Tweedale and Nikhil Ichalkaranje Innovations in agent collaboration, cooperation and Teaming, Part 2 . . . . 1085--1088 J. Tweedale and N. Ichalkaranje and C. Sioutis and B. Jarvis and A. Consoli and G. Phillips-Wren Innovations in multi-agent systems . . . 1089--1115 Lin Padgham and Wei Liu Internet collaboration and service composition as a loose form of teamwork 1116--1135 Antonella Di Stefano and Giuseppe Pappalardo and Corrado Santoro and Emiliano Tramontana A framework for the design and automated implementation of communication aspects in multi-agent systems . . . . . . . . . 1136--1152 Wei Xu and Jiannong Cao and Beihong Jin and Jing Li and Liang Zhang GCS-MA: a group communication system for mobile agents . . . . . . . . . . . . . 1153--1172 Tom Wanyama and Behrouz Homayoun Far A protocol for multi-agent negotiation in a group-choice decision making process . . . . . . . . . . . . . . . . 1173--1195 Gerhard Weiß and Matthias Nickles and Michael Rovatsos and Felix Fischer Specifying the intertwining of cooperation and autonomy in agent-based systems . . . . . . . . . . . . . . . . 1196--1215 Justin Zhan and Stan Matwin and LiWu Chang Privacy-preserving collaborative association rule mining . . . . . . . . 1216--1227 Abdelhamid Ouardani and Samuel Pierre and Hanifa Boucheneb A security protocol for mobile agents based upon the cooperation of sedentary agents . . . . . . . . . . . . . . . . . 1228--1243 Ruth Aguilar-Ponce and Ashok Kumar and J. Luis Tecpanecatl-Xihuitl and Magdy Bayoumi A network of sensor-based framework for automated visual surveillance . . . . . 1244--1271 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Xiangjian He Editorial . . . . . . . . . . . . . . . 1273--1274 Shinichi Suzuki and Yasushi Shinjo and Toshio Hirotsu and Kozo Itano and Kazuhiko Kato Capability-based egress network access control by using DNS server . . . . . . 1275--1282 Yanni Wu and Kuo Zhang and Xiaoge Wang and Jinlan Tian Extending metadata with scenarios in adaptive distributed system . . . . . . 1283--1294 M. J. Callaghan and J. Harkin and E. McColgan and T. M. McGinnity and L. P. Maguire Client-server architecture for collaborative remote experimentation . . 1295--1308 Carolyn McGregor and Bruce Kneale and Mark Tracy On-demand Virtual Neonatal Intensive Care units supporting rural, remote and urban healthcare with Bush Babies Broadband . . . . . . . . . . . . . . . 1309--1323 Wenjing Jia and Huaifeng Zhang and Xiangjian He Region-based license plate detection . . 1324--1333 Hatice Gunes and Massimo Piccardi Bi-modal emotion recognition from expressive face and body gestures . . . 1334--1345 Junjun Xia and Lin Ni and Y. Miao A new digital implementation of ridgelet transform for images of dyadic length 1346--1355 Donn Morrison and Liyanage C. De Silva Voting ensembles for spoken affect classification . . . . . . . . . . . . . 1356--1365 Ben-Nian Wang and Yang Gao and Zhao-Qian Chen and Jun-Yuan Xie and Shi-Fu Chen A two-layered multi-agent reinforcement learning model and algorithm . . . . . . 1366--1376 Jung-San Lee and Chin-Chen Chang Secure communications for cluster-based ad hoc networks using node identities 1377--1396 Christopher J. Martinez and Wei-Ming Lin and Parimal Patel Optimal XOR hashing for non-uniformly distributed address lookup in computer networks . . . . . . . . . . . . . . . . 1397--1427 Bart Duysburgh and Thijs Lambrecht and Filip De Turck and Bart Dhoedt and Piet Demeester Design and analysis of a stable set-up protocol for transcoding multicast trees in active networks . . . . . . . . . . . 1428--1444 S. A. Al-Talib and B. M. Ali and S. Khatun and S. Subramaniam Improving the multicast state scalability in Internet routers by integrating hash algorithm with recursive unicast . . . . . . . . . . . 1445--1454 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Hsu-Yang Kung and Hao-Hsiang Ku and Che-I Wu and Ching-Yu Lin Intelligent and situation-aware pervasive system to support debris-flow disaster prediction and alerting in Taiwan . . . . . . . . . . . . . . . . . 1--18 Mosaab Daoud and Qusay H. Mahmoud Monte Carlo simulation-based algorithms for estimating the reliability of mobile agent-based systems . . . . . . . . . . 19--31 Xiao Qin Performance comparisons of load balancing algorithms for I/O-intensive workloads on clusters . . . . . . . . . 32--46 Ming-Tsung Chen and B. M. T. Lin and Shian-Shyong Tseng Multicast routing and wavelength assignment with delay constraints in WDM networks with heterogeneous capabilities 47--65 Tushar M. Raste and D. B. Kulkarni Design and implementation scheme for deploying IPv4 over IPv6 tunnel . . . . 66--72 Anonymous Editorial board . . . . . . . . . . . . CO2
Christos Makris and Athanasios Tsakalidis Trends in peer to peer and service oriented computing . . . . . . . . . . . 73--74 Sinuhe Arroyo and Miguel-Angel Sicilia and José-Manuel López-Cobo Patterns of message interchange in decoupled hypermedia systems . . . . . . 75--92 Serena Pastore The service discovery methods issue: a web services UDDI specification framework integrated in a grid environment . . . . . . . . . . . . . . 93--107 Vassiliki Diamadopoulou and Christos Makris and Yannis Panagis and Evangelos Sakkopoulos Techniques to support Web Service selection and consumption with QoS characteristics . . . . . . . . . . . . 108--130 K. Votis and C. Alexakos and B. Vassiliadis and S. Likothanassis An ontologically principled service-oriented architecture for managing distributed e-government nodes 131--148 S. Sioutas and E. Sakkopoulos and L. Drossos and S. Sirmakessis Balanced distributed web service lookup system . . . . . . . . . . . . . . . . . 149--162 Sampath N. Ranasinghe and Vasilis Friderikos and Hamid Aghvami Dynamic proxy assisted mobility support for third generation peer-to-peer networks . . . . . . . . . . . . . . . . 163--178 Dimitris N. Kanellopoulos and Alkiviadis A. Panagopoulos Exploiting tourism destinations' knowledge in an RDF-based P2P network 179--200 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Gwo-Jong Yu and Chih-Yung Chang Congestion control of Bluetooth radio system by piconet restructuring . . . . 201--223 Dhouha Ayed and Chantal Taconet and Guy Bernard and Yolande Berbers CADeComp: Context-aware deployment of component-based applications . . . . . . 224--257 Li Chunlin and Li Layuan Cross-layer optimization policy for QoS scheduling in computational grid . . . . 258--284 Lin Chen and Changjun Jiang and Junjie Li VGITS: ITS based on intervehicle communication networks and grid technology . . . . . . . . . . . . . . . 285--302 Luhua Liao and Lemin Li and Sheng Wang Multicast protection scheme in survivable WDM optical networks . . . . 303--316 James Lembke and Byung Kyu Choi Edge-limited scalable QoS flow set-up 317--337 Ferhat Khendek and Tong Zheng Modeling and analysis of value added services using message sequence charts 338--356 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Javier Varona and Cristina Manresa-Yee and Francisco J. Perales Hands-free vision-based interface for computer accessibility . . . . . . . . . 357--374 Hongjun Liu and Ping Luo and Daoshun Wang A scalable authentication model based on public keys . . . . . . . . . . . . . . 375--386 Wen-Hwa Liao and Yucheng Kao and Chien-Ming Fan Data aggregation in wireless sensor networks using ant colony algorithm . . 387--401 Vidhyacharan Bhaskar and Patrick Lallement Activity routing in a distributed supply chain: Performance evaluation with two inputs . . . . . . . . . . . . . . . . . 402--428 Bing Zheng and Mohammed Atiquzzaman A framework to determine bounds of maximum loss rate parameter of RED queue for next generation routers . . . . . . 429--445 K. Komathy and P. Narayanasamy Trust-based evolutionary game model assisting AODV routing against selfishness . . . . . . . . . . . . . . 446--471 Hongjun Liu and Ping Luo and Daoshun Wang A distributed expansible authentication model based on Kerberos . . . . . . . . 472--486 Carles Garrigues and Sergi Robles and Joan Borrell Securing dynamic itineraries for mobile agent applications . . . . . . . . . . . 487--508 Haidar Safa and Mohamad Chouman and Hassan Artail and Marcel Karam A collaborative defense mechanism against SYN flooding attacks in IP networks . . . . . . . . . . . . . . . . 509--534 Prasan Kumar Sahoo and Chih-Yung Chang and Sheng-Wen Chang Novel route maintenance protocols for the Bluetooth ad hoc network with mobility . . . . . . . . . . . . . . . . 535--558 Weili Han and Xingdong Shi and Ronghua Chen Process-context aware matchmaking for web service composition . . . . . . . . 559--576 G. Varaprasad and R. S. D. Wahidabanu and P. Venkataram An efficient resource allocation scheme for multimedia applications in MANET . . 577--584 Eric Gamess and Rina Surós An upper bound model for TCP and UDP throughput in IPv4 and IPv6 . . . . . . 585--602 Yiouli Kritikou and Panagiotis Demestichas and Evgenia Adamopoulou and Konstantinos Demestichas and Michael Theologou and Maria Paradia User Profile Modeling in the context of web-based learning management systems 603--627 Venet Osmani and Sasitharan Balasubramaniam and Dmitri Botvich Human activity recognition in pervasive health-care: Supporting efficient remote collaboration . . . . . . . . . . . . . 628--655 P. Khadivi and S. Samavi and T. D. Todd Multi-constraint QoS routing using a new single mixed metrics . . . . . . . . . . 656--676 Beatriz Prieto and Fernando Tricas and Juan J. Merelo and Antonio Mora and Alberto Prieto Visualizing the evolution of a web-based social network . . . . . . . . . . . . . 677--698 Mouhammd Al-Kasassbeh and Mo Adda Analysis of mobile agents in network fault management . . . . . . . . . . . . 699--711 Janus S. Liang The troubleshooting task implementation in automotive chassis using virtual interactive technique and knowledge-based approach . . . . . . . . 712--734 Xiang-Yang Wang and Pan-Pan Niu and Wei Qi A new adaptive digital audio watermarking based on support vector machine . . . . . . . . . . . . . . . . 735--749 Hussein Abdel-Jaber and Mike Woodward and Fadi Thabtah and Amer Abu-Ali Performance evaluation for DRED discrete-time queueing network analytical model . . . . . . . . . . . . 750--770 Y. C. Yee and K. N. Choong and Andy L. Y. Low and S. W. Tan SIP-based proactive and adaptive mobility management framework for heterogeneous networks . . . . . . . . . 771--792 Juan J. Samper and Pedro A. Castillo and Lourdes Araujo and J. J. Merelo and Óscar Cordón and Fernando Tricas NectaRSS, an intelligent RSS feed reader 793--806 Wen-Hwa Liao and Hsiao-Hsien Wang An asynchronous MAC protocol for wireless sensor networks . . . . . . . . 807--820 Jianjun Zhang and Ling Liu and Lakshmish Ramaswamy and Calton Pu PeerCast: Churn-resilient end system multicast on heterogeneous overlay networks . . . . . . . . . . . . . . . . 821--850 Kazuya Odagiri and Rihito Yaegashi and Masaharu Tadauchi and Naohiro Ishii Secure DACS Scheme . . . . . . . . . . . 851--861 Javed I. Khan and Sajid S. Shaikh Computing in social networks with relationship algebra . . . . . . . . . . 862--878 Ibrahim Ozcelik Interconnection of CAN segments through IEEE 802.16 wireless MAN . . . . . . . . 879--890 Bhuvan Urgaonkar and Prashant Shenoy Cataclysm: Scalable overload policing for Internet applications . . . . . . . 891--920 K. Salah and P. Calyam and M. I. Buhari Assessing readiness of IP networks to support desktop videoconferencing using OPNET . . . . . . . . . . . . . . . . . 921--943 Haibin Cai and Fang Pu and Runcai Huang and Qiying Cao A novel ANN-based service selection model for ubiquitous computing environments . . . . . . . . . . . . . . 944--965 Eleni Georgiou and Marios D. Dikaiakos and Athena Stassopoulou On the properties of spam-advertised URL addresses . . . . . . . . . . . . . . . 966--985 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Tzu-Chi Huang and Ce-Kuen Shieh and Yu-Ben Miao Bottleneck Active Node Detouring for capsule-based active network . . . . . . 1--30 Xiaohong Guan and Wei Wang and Xiangliang Zhang Fast intrusion detection based on a non-negative matrix factorization model 31--44 Di Wu and Ye Tian and Kam-Wing Ng Resilient and efficient load balancing in distributed hash tables . . . . . . . 45--60 JungYul Choi and Jaebong Lee and ShinJung Woo and ByoungKwon Shim An engineering approach to the design of a BcN control network . . . . . . . . . 61--77 Pete Davies and Theodore Tryfonas A lightweight web-based vulnerability scanner for small-scale computer network security assessment . . . . . . . . . . 78--95 Hassan Artail and Manal Shihab and Haidar Safa A distributed mobile database implementation on Pocket PC mobile devices communicating over Bluetooth . . 96--115 Konstantinos P. Demestichas and Evgenia F. Adamopoulou and John G. Markoulidakis and Michael E. Theologou Towards Anonymous Mobile Community services . . . . . . . . . . . . . . . . 116--134 Giancarlo Fortino and Carlo Mastroianni and Wilma Russo A hierarchical control protocol for group-oriented playbacks supported by content distribution networks . . . . . 135--157 Meng Yu and Peng Liu and Wanyu Zang The implementation and evaluation of a recovery system for workflows . . . . . 158--183 Wade A. Fagen and João W. Cangussu and Ram Dantu A virtual environment for network testing . . . . . . . . . . . . . . . . 184--214 Chryssa A. Papagianni and Nikolaos D. Tselikas and Evangelos A. Kosmatos and Stauros Papapanagiotou and Iakovos S. Venieris Performance evaluation study for QoS-aware triple play services over entry-level xDSL connections . . . . . . 215--225 Chin-Chen Chang and Jung-San Lee Robust $t$-out-of-$n$ oblivious transfer mechanism based on CRT . . . . . . . . . 226--235 Muhammad N. Marsono and M. Watheq El-Kharashi and Fayez Gebali A spam rejection scheme during SMTP sessions based on layer-3 e-mail classification . . . . . . . . . . . . . 236--257 Hua Wang and Zhao Shi and Shuai Li Multicast routing for delay variation bound using a modified ant colony algorithm . . . . . . . . . . . . . . . 258--272 Yuh-Shyan Chen and Yun-Wei Lin and Chih-Yung Chang An overlapping communication protocol using improved time-slot leasing for Bluetooth WPANs . . . . . . . . . . . . 273--292 Francisco Almeida and Vicente Blanco and Carlos Delgado and Francisco de Sande and Adrián Santos IDEWEP: Web service for astronomical parallel image deconvolution . . . . . . 293--313 D. Di Sorte and M. Femminella and G. Reali QoS-enabled multicast for delivering live events in a Digital Cinema scenario 314--344 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Wanlei Zhou and Yang Xiang Network and system security . . . . . . 345--346 Chuan Yue and Haining Wang Profit-aware overload protection in E-commerce Web sites . . . . . . . . . . 347--356 Md Rafiqul Islam and Wanlei Zhou and Minyi Guo and Yang Xiang An innovative analyser for multi-classifier e-mail classification based on grey list analysis . . . . . . 357--366 Wei-Zhou Lu and Wei-Xuan Gu and Shun-Zheng Yu One-way queuing delay measurement and its application on detecting DDoS attack 367--376 Bai Li and Lynn Batten Using mobile agents to recover from node and database compromise in path-based DoS attacks in wireless sensor networks 377--387 Suriadi Suriadi and Ernest Foo and Audun Jòsang A user-centric federated single sign-on system . . . . . . . . . . . . . . . . . 388--401 Deqing Zou and Ligang He and Hai Jin and Xueguang Chen CRBAC: Imposing multi-grained constraints on the RBAC model in the multi-application environment . . . . . 402--411 Jian Cao and Jinjun Chen and Haiyan Zhao and Minglu Li A policy-based authorization model for workflow-enabled dynamic process management . . . . . . . . . . . . . . . 412--422 Wenyu Qu and Masaru Kitsuregawa and Hong Shen and Zhiguang Shan A novel fault-tolerant execution model by using of mobile agents . . . . . . . 423--432 Muhammad Younas and Irfan Awan and Laurence T. Yang Special issue on service oriented computing and advanced network applications . . . . . . . . . . . . . . 433 Agustinus Borgy Waluyo and David Taniar and Wenny Rahayu and Bala Srinivasan Mobile service oriented architectures for NN-queries . . . . . . . . . . . . . 434--447 Arjan Durresi and Vamsi Paruchuri and Leonard Barolli Fast autonomous system traceback . . . . 448--454 D. R. W. Holton and I. Nafea and M. Younas and I. Awan A class-based scheme for E-commerce web servers: Formal specification and performance evaluation . . . . . . . . . 455--460 I. Al-Oqily and A. Karmouch Towards automating overlay network management . . . . . . . . . . . . . . . 461--473 M. Lozano and P. Morillo and J. M. Orduña and V. Cavero and G. Vigueras A new system architecture for crowd simulation . . . . . . . . . . . . . . . 474--482 Yan Zhang and Laurence T. Yang and Jianhua Ma and Jun Zheng Quantitative analysis of location management and QoS in wireless networks 483--489 Mieso K. Denko and Elhadi Shakshuki and Haroon Malik Enhanced cross-layer based middleware for mobile ad hoc networks . . . . . . . 490--499 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mostafa Abd-El-Barr Topological network design: a survey . . 501--509 Byoung-Dai Lee and Jon B. Weissman and Young-Kwang Nam Adaptive middleware supporting scalable performance for high-end network services . . . . . . . . . . . . . . . . 510--524 Chunlin Li and Layuan Li Three-layer control policy for grid resource management . . . . . . . . . . 525--537 Yuh-Jzer Joung and Chu-Jui Yang Email licensing . . . . . . . . . . . . 538--549 Selim Ciraci and Ibrahim Körpeo\ugu and Özgür Ulusoy Reducing query overhead through route learning in unstructured peer-to-peer network . . . . . . . . . . . . . . . . 550--567 Songtao Guo and Gang Feng and Xiaofeng Liao and Qun Liu Novel delay-range-dependent stability analysis of the second-order congestion control algorithm with heterogeneous communication delays . . . . . . . . . . 568--577 Eric Jui-Lin Lu and Yung-Fa Huang and Shu-Chiu Lu ML-Chord: a multi-layered P2P resource sharing model . . . . . . . . . . . . . 578--588 Shi-Jen Lin and Ding-Chyu Liu An incentive-based electronic payment scheme for digital content transactions over the Internet . . . . . . . . . . . 589--598 Thomas E. Carroll and Daniel Grosu A secure and anonymous voter-controlled election scheme . . . . . . . . . . . . 599--606 Y. Tachwali and W. J. Barnes and H. Refai Configurable symbol synchronizers for software-defined radio applications . . 607--615 I-Ching Hsu and Li-Pin Chi and Sheau-Shong Bor A platform for transcoding heterogeneous markup documents using ontology-based metadata . . . . . . . . . . . . . . . . 616--629 Konstantinos Samdanis and Vasilis Friderikos and A. Hamid Aghvami Autonomic hierarchical reconfiguration for wireless access networks . . . . . . 630--641 Li Ou and Xubin He and Jizhong Han An efficient design for fast memory registration in RDMA . . . . . . . . . . 642--651 Jenn-Hwan Tarng and Bing-Wen Chuang and Pei-Chen Liu A relay node deployment method for disconnected wireless sensor networks: Applied in indoor environments . . . . . 652--659 Satish Chand and Bijendra Kumar and Hari Om Video Data Delivery using Slotted Patching . . . . . . . . . . . . . . . . 660--665 Oznur Ozkasap and Mine Caglar and Ali Alagoz Principles and performance analysis of SeCond: a system for epidemic peer-to-peer content distribution . . . 666--683 Lambros Boukas and Georgios Kambourakis and Stefanos Gritzalis Pandora: an SMS-oriented m-informational system for educational realms . . . . . 684--702 Babek Abbasov and Serdar Korukoglu Effective RED: an algorithm to improve RED's performance by reducing packet loss rate . . . . . . . . . . . . . . . 703--709 Zonghua Zhang and Pin-Han Ho Janus: a dual-purpose analytical model for understanding, characterizing and countermining multi-stage collusive attacks in enterprise networks . . . . . 710--720 Li Feng and Wei Wang and Lina Zhu and Yi Zhang Predicting intrusion goal using dynamic Bayesian network with transfer probability estimation . . . . . . . . . 721--732 Mohammad Hamed Firooz and Alireza Nasiri Avanaki and Mohammad Reza Pakravan and Keivan Ronasi A fast and reliable multi-sender algorithm for peer-to-peer networks . . 733--740 Tzu-Chi Huang and Sherali Zeadally and Naveen Chilamkurti and Ce-Kuen Shieh Design, implementation, and evaluation of a Programmable Bandwidth Aggregation System for home networks . . . . . . . . 741--759 Li Chunlin and Zhong Jin Xiu and Li Layuan Resource scheduling with conflicting objectives in grid environments: Model and evaluation . . . . . . . . . . . . . 760--769 J. H. Abawajy Adaptive hierarchical scheduling policy for enterprise grid computing systems 770--779 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Li Feng and Zili Li and Yi Zhang Security bootstrap model of key pre-sharing by polynomial group in mobile Ad Hoc Network . . . . . . . . . 781--787 Jiankun Hu and Fengling Han A pixel-based scrambling scheme for digital medical images protection . . . 788--794 C. Bouras and E. Giannaka and Thrasyvoulos Tsiatsos Identifying best practices for supporting broadband growth: Methodology and analysis . . . . . . . . . . . . . . 795--807 Manuel Sánchez and Gabriel López and Óscar Cánovas and Antonio F. Gómez-Skarmeta Performance analysis of a cross-layer SSO mechanism for a roaming infrastructure . . . . . . . . . . . . . 808--823 Mouhammd Al-Kasassbeh and Mo Adda Network fault detection with Wiener filter-based agent . . . . . . . . . . . 824--833 Chao-Tung Yang and Ming-Feng Yang and Wen-Chung Chiang Enhancement of anticipative recursively adjusting mechanism for redundant parallel file transfer in data grids . . 834--845 Sergio Ilarri and Eduardo Mena and Arantza Illarramendi A system based on mobile agents to test mobile computing applications . . . . . 846--865 Kuei-Ping Shih and Hung-Chang Chen and Chien-Min Chou and Bo-Jun Liu On target coverage in wireless heterogeneous sensor networks with multiple sensing units . . . . . . . . . 866--877 Prasan Kumar Sahoo and Jang-Ping Sheu and Yu-Chia Chang Performance evaluation of wireless sensor network with hybrid channel access mechanism . . . . . . . . . . . . 878--888 Dan Wu and Chi Hong Cheong and Man Hon Wong Supporting asynchronous update for distributed data cubes . . . . . . . . . 889--900 Jiaming Li and Chai Kiat Yeo Content and overlay-aware scheduling for peer-to-peer streaming in fluctuating networks . . . . . . . . . . . . . . . . 901--912 Javed I. Khan and Sajid S. Shaikh A phenotype reputation estimation function and its study of resilience to social attacks . . . . . . . . . . . . . 913--924 Robert L. R. Mattson and Somnath Ghosh HTTP-MPLEX: an enhanced hypertext transfer protocol and its performance evaluation . . . . . . . . . . . . . . . 925--939 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Giancarlo Fortino and Carlo Mastroianni Next generation content networks . . . . 941--942 Jayashree Ravi and Zhifeng Yu and Weisong Shi A survey on dynamic Web content generation and delivery techniques . . . 943--960 Gilles Fedak and Haiwu He and Franck Cappello BitDew: a data management and distribution service with multi-protocol file transfer and metadata abstraction 961--975 Mukaddim Pathan and Rajkumar Buyya Resource discovery and request-redirection for dynamic load sharing in multi-provider peering content delivery networks . . . . . . . 976--990 Jaime Lloret and Miguel Garcia and Diana Bri and Juan R. Diaz Study and performance of a group-based Content Delivery Network . . . . . . . . 991--999 Benjamin Molina and Salvatore F. Pileggi and Manuel Esteve and Carlos E. Palau A negotiation framework for content distribution in mobile transient networks . . . . . . . . . . . . . . . . 1000--1011 James Broberg and Rajkumar Buyya and Zahir Tari MetaCDN: Harnessing `Storage Clouds' for high performance content delivery . . . 1012--1022 Ying-Dar Lin and Chun-Nan Lu and Yuan-Cheng Lai and Wei-Hao Peng and Po-Ching Lin Application classification using packet size distribution and port association 1023--1030 Ling Wang and Yahia Tachwali and Pramode Verma and Anjan Ghosh Impact of bounded delay on throughput in multi-hop networks . . . . . . . . . . . 1031--1038 K. Salah and M. Hamawi Comparative packet-forwarding measurement of three popular operating systems . . . . . . . . . . . . . . . . 1039--1048 Behnoosh Hariri and Shervin Shirmohammadi and Mohammad Reza Pakravan and Mohammad Hossein Alavi An adaptive latency mitigation scheme for massively multiuser virtual environments . . . . . . . . . . . . . . 1049--1063 Yuhui Deng Deconstructing Network Attached Storage systems . . . . . . . . . . . . . . . . 1064--1072 Fang-Yie Leu A novel network mobility handoff scheme using SIP and SCTP for multimedia applications . . . . . . . . . . . . . . 1073--1091 Iván Martínez-Ortiz and José-Luis Sierra and Baltasar Fernández-Manjón and Alfredo Fernández-Valmayor Language engineering techniques for the development of e-learning applications 1092--1105 Chenfeng Vincent Zhou and Christopher Leckie and Shanika Karunasekera Decentralized multi-dimensional alert correlation for collaborative intrusion detection . . . . . . . . . . . . . . . 1106--1123 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mohammed Tarique and Kemal E. Tepe and Sasan Adibi and Shervin Erfani Survey of multipath routing protocols for mobile ad hoc networks . . . . . . . 1125--1143 Wen-Hwa Liao and Wen-Ming Yen Power-saving scheduling with a QoS guarantee in a mobile WiMAX system . . . 1144--1152 Neng-Chung Wang and Chao-Yang Lee A reliable QoS aware routing protocol with slot assignment for mobile ad hoc networks . . . . . . . . . . . . . . . . 1153--1166 R. Martí and S. Robles and A. Martín-Campillo and J. Cucurull Providing early resource allocation during emergencies: the mobile triage tag . . . . . . . . . . . . . . . . . . 1167--1182 Mohamed K. Watfa and Omar Mirza and Jad Kawtharani BARC: a Battery Aware Reliable Clustering algorithm for sensor networks 1183--1193 Martín López-Nores and Jorge García-Duque and José J. Pazos-Arias and Yolanda Blanco-Fernández and Manuel Ramos-Cabrer and Alberto Gil-Solla and Rebeca P. Díaz-Redondo and Ana Fernández-Vilas KEPPAN: Knowledge exploitation for proactively-planned ad-hoc networks . . 1194--1209 Cuneyt Bayilmis and Ersoy Kelebekler and Ismail Erturk and Celal Ceken and Ibrahim Ozcelik Integration of a speech activated control system and a wireless interworking unit for a CAN-based distributed application . . . . . . . . 1210--1218 Xuan Dau Hoang and Jiankun Hu and Peter Bertok A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference 1219--1228 Chien-Chih Lai and Ren-Guey Lee and Chun-Chieh Hsiao and Hsin-Sheng Liu and Chun-Chang Chen A H-QoS-demand personalized home physiological monitoring system over a wireless multi-hop relay network for mobile home healthcare applications . . 1229--1241 Bruno Van Den Bossche and Bart De Vleeschauwer and Tom Verdickt and Filip De Turck and Bart Dhoedt and Piet Demeester Autonomic microcell assignment in massively distributed online virtual environments . . . . . . . . . . . . . . 1242--1256 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Chun-Ta Li and Min-Shiang Hwang An efficient biometrics-based remote user authentication scheme using smart cards . . . . . . . . . . . . . . . . . 1--5 K. Salah and A. Kahtani Performance evaluation comparison of Snort NIDS under Linux and Windows Server . . . . . . . . . . . . . . . . . 6--15 Giorgos Karopoulos and Georgios Kambourakis and Stefanos Gritzalis and Elisavet Konstantinou A framework for identity privacy in SIP 16--28 Jianhong Zhang and Chenglian Liu and Yixian Yang An efficient secure proxy verifiably encrypted signature scheme . . . . . . . 29--34 Nader Mohamed and Jameela Al-Jaroodi Self-configured multiple-network-interface socket . . . 35--42 Ming-Wen Tong and Zong-Kai Yang and Qing-Tang Liu A novel model of adaptation decision-taking engine in multimedia adaptation . . . . . . . . . . . . . . . 43--49 Youtao Zhang and Jun Yang and Weijia Li and Linzhang Wang and Lingling Jin An authentication scheme for locating compromised sensor nodes in WSNs . . . . 50--62 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Junqi Zhang and Vijay Varadharajan Wireless sensor network key management survey and taxonomy . . . . . . . . . . 63--75 Weili Han and Min Xu and Weidong Zhao and Guofu Li A trusted decentralized access control framework for the client/server architecture . . . . . . . . . . . . . . 76--83 Matthias Strobbe and Olivier Van Laere and Samuel Dauwe and Bart Dhoedt and Filip De Turck and Piet Demeester and Christof van Nimwegen and Jeroen Vanattenhoven Interest based selection of user generated content for rich communication services . . . . . . . . . . . . . . . . 84--97 Cheng-Fu Chou and William C. Cheng and Leana Golubchik Performance study of online batch-based digital signature schemes . . . . . . . 98--114 Ming Xu and Shuigeng Zhou and Jihong Guan and Xiaohua Hu A path-traceable query routing mechanism for search in unstructured peer-to-peer networks . . . . . . . . . . . . . . . . 115--127 Eduardo Moschetta and Rodolfo S. Antunes and Marinho P. Barcellos Flexible and secure service discovery in ubiquitous computing . . . . . . . . . . 128--140 Jenn-Wei Lin and Wei-Shou Wang An efficient reconstruction approach for improving Bluetree scatternet formation in personal area networks . . . . . . . 141--155 Ming-Yang Su Discovery and prevention of attack episodes by frequent episodes mining and finite state machines . . . . . . . . . 156--167 Haidar Safa and Hassan Artail and Mirna Nahhas A cache invalidation strategy for mobile networks . . . . . . . . . . . . . . . . 168--182 Yuh-Jzer Joung and Zhang-Wen Lin On the self-organization of a hybrid peer-to-peer system . . . . . . . . . . 183--202 Anonymous Special Issue of Journal of Network and Computer Applications on ``Dependable Multimedia Communications: Systems, Services, and Applications'' . . . . . . 203 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Muhammad Khurram Khan and Mohamed Kamel and Xudong Jiang Special issue on: Recent advances and future directions in biometrics personal identification . . . . . . . . . . . . . 205--206 Peng Li and Xin Yang and Kai Cao and Xunqiang Tao and Ruifang Wang and Jie Tian An alignment-free fingerprint cryptosystem based on fuzzy vault scheme 207--220 Eryun Liu and Jimin Liang and Liaojun Pang and Min Xie and Jie Tian Minutiae and modified Biocode fusion for fingerprint-based key generation . . . . 221--235 Chulhan Lee and Jaihie Kim Cancelable fingerprint templates using minutiae-based bit-strings . . . . . . . 236--246 Miao Qi and Yinghua Lu and Ning Du and Yinan Zhang and Chengxi Wang and Jun Kong A novel image hiding approach based on correlation analysis for secure multimodal biometrics . . . . . . . . . 247--257 Kai Cao and Xin Yang and Xunqiang Tao and Peng Li and Yali Zang and Jie Tian Combining features for distorted fingerprint matching . . . . . . . . . . 258--267 Neyire Deniz Sarier Improving the accuracy and storage cost in biometric remote authentication schemes . . . . . . . . . . . . . . . . 268--274 Zhi Liu and Yilong Yin and Hongjun Wang and Shangling Song and Qingli Li Finger vein recognition with manifold learning . . . . . . . . . . . . . . . . 275--282 Dong-Ju Kim and Jeong-Hoon Shin and Kwang-Seok Hong Teeth recognition based on multiple attempts in mobile device . . . . . . . 283--292 David Delgado-Gómez and Federico Sukno and David Aguado and Carlos Santacruz and Antonio Artés-Rodriguez Individual identification using personality traits . . . . . . . . . . . 293--299 Hunny Mehrotra and Banshidhar Majhi and Phalguni Gupta Robust iris indexing scheme using geometric hashing of SIFT keypoints . . 300--313 Jian-Gang Wang and Eric Sung and Wei-Yun Yau Incremental two-dimensional linear discriminant analysis with applications to face recognition . . . . . . . . . . 314--322 Jianzhong Wang and Baoxue Zhang and Shuyan Wang and Miao Qi and Jun Kong An adaptively weighted sub-pattern locality preserving projection for face recognition . . . . . . . . . . . . . . 323--332 Kumiko Yasuda and Daigo Muramatsu and Satoshi Shirato and Takashi Matsumoto Visual-based online signature verification using features extracted from video . . . . . . . . . . . . . . . 333--341 Siraj A. Shaikh and Joseph R. Rabaiotti Characteristic trade-offs in designing large-scale biometric-based identity management systems . . . . . . . . . . . 342--351 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Chung-Nan Lee and Yung-Cheng Kao and Ming-Te Tsai A vEB-tree-based architecture for interactive video on demand services in peer-to-peer networks . . . . . . . . . 353--362 Neelofer Tamboli and Mohamed Younis Coverage-aware connectivity restoration in mobile sensor networks . . . . . . . 363--374 Leo Carro-Calvo and Sancho Salcedo-Sanz and Jose A. Portilla-Figueras and E. G. Ortiz-García A genetic algorithm with switch-device encoding for optimal partition of switched industrial Ethernet networks 375--382 Lei Wang and Ruizhong Wei and Yaping Lin and Bo Wang A clique base node scheduling method for wireless sensor networks . . . . . . . . 383--396 Feng Zhong and Chai Kiat Yeo and Bu Sung Lee Enabling inter-PMIPv6-domain handover with traffic distributors . . . . . . . 397--409 Christos Bouras and Vassilis Poulopoulos and Vassilis Tsogkas Adaptation of RSS feeds based on the user profile and on the end device . . . 410--421 Yuwang Yang and Chunshan Zhong and Yamin Sun and Jingyu Yang Network coding based reliable disjoint and braided multipath routing for sensor networks . . . . . . . . . . . . . . . . 422--432 Arthur Callado and Judith Kelner and Djamel Sadok and Carlos Alberto Kamienski and Stênio Fernandes Better network traffic identification through the independent combination of techniques . . . . . . . . . . . . . . . 433--446 D. González-Ortega and F. J. Díaz-Pernas and M. Martínez-Zarzuela and M. Antón-Rodríguez and J. F. Díez-Higuera and D. Boto-Giralda Real-time hands, face and facial features detection and tracking: Application to cognitive rehabilitation tests monitoring . . . . . . . . . . . . 447--466 Chih-Peng Lin and Jenhui Chen and Hsing-Lung Chen An efficient bandwidth allocation algorithm for real-time VBR stream transmission under IEEE 802.16 wireless networks . . . . . . . . . . . . . . . . 467--476 Javad Akbari Torkestani and Mohammad Reza Meybodi An efficient cluster-based CDMA/TDMA scheme for wireless mobile ad-hoc networks: a learning automata approach 477--490 Abdun Naser Mahmood and Jiankun Hu and Zahir Tari and Christopher Leckie Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic . . . . . . . . . . . . 491--502 Henrique S. L. Pequeno and George A. M. Gomes and Rossana M. C. Andrade and José N. de Souza and Miguel F. de Castro FrameIDTV: a framework for developing interactive applications on digital television environments . . . . . . . . 503--511 Hui Cheng and Xingwei Wang and Shengxiang Yang and Min Huang and Jiannong Cao QoS multicast tree construction in IP/DWDM optical Internet by bio-inspired algorithms . . . . . . . . . . . . . . . 512--522 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Jameela Al-Jaroodi and Nader Mohamed Middleware trends for network applications . . . . . . . . . . . . . . 523--524 C. Boldrini and M. Conti and F. Delmastro and A. Passarella Context- and social-aware middleware for opportunistic networks . . . . . . . . . 525--541 Praveen Madiraju and Srilaxmi Malladi and Janaka Balasooriya and Arthi Hariharan and Sushil K. Prasad and Anu Bourgeois A methodology for engineering collaborative and ad-hoc mobile applications using SyD middleware . . . 542--555 Jordi Pujol-Ahulló and Pedro García-López Enabling portability in advanced information-centric services over structured peer-to-peer systems . . . . 556--568 Bruno P. S. Rocha and Daniel N. O. Costa and Rande A. Moreira and Cristiano G. Rezende and Antonio A. F. Loureiro and Azzedine Boukerche Adaptive security protocol selection for mobile computing . . . . . . . . . . . . 569--587 Pedro García López and Raúl Gracia Tinedo and Josep M. Banús Alsina Moving routing protocols to the user space in MANET middleware . . . . . . . 588--602 Víctor Manuel Álvarez García and María del Puerto Paule Ruiz and Juan Ramón Pérez Pérez Voice interactive classroom, a service-oriented software architecture for speech-enabled learning . . . . . . 603--610 Yasser Gadallah and Mohamed Adel Serhani and Nader Mohamed Middleware support for service discovery in special operations mobile ad hoc networks . . . . . . . . . . . . . . . . 611--619 Cheng Bo and Zhang Yang and Zhou Peng and Duan Hua and Hu Xiaoxiao and Wang Zheng and Chen Junliang Development of Web-Telecom based hybrid services orchestration and execution middleware over convergence networks . . 620--630 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Jason J. Jung and Chung-Ming Ou and Ngoc Thanh Nguyen and Chong Gun Kim Advances on agent-based network management . . . . . . . . . . . . . . . 631--632 Bo Chen Agent-based artificial immune system approach for adaptive damage detection in monitoring networks . . . . . . . . . 633--645 Mary Wu and ChongGun Kim A cost matrix agent for shortest path routing in ad hoc networks . . . . . . . 646--652 Pradeep Ray and N. Parameswaran and Lundy Lewis Distributed autonomic management: an approach and experiment towards managing service-centric networks . . . . . . . . 653--660 S. Venkatesan and C. Chellappan and T. Vengattaraman and P. Dhavachelvan and Anurika Vaish Advanced mobile agent security models for code integrity and malicious availability check . . . . . . . . . . . 661--671 Yao-Tien Wang A dynamic resource management in mobile agent by artificial neural network . . . 672--681 Yue-Shan Chang and Pei-Chun Shih A resource-awareness information extraction architecture on mobile grid environment . . . . . . . . . . . . . . 682--695 Umar Manzoor and Samia Nefti QUIET: a Methodology for Autonomous Software Deployment using Mobile Agents 696--706 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
S. Subashini and V. Kavitha A survey on security issues in service delivery models of cloud computing . . . 1--11 Dai-Rui Lin and Chih-I Wang and D. J. Guan Efficient vehicle ownership identification scheme based on triple-trapdoor chameleon hash function 12--19 Sireesha Muppala and Xiaobo Zhou Coordinated session-based admission control with statistical learning for multi-tier Internet applications . . . . 20--29 Neeraj Kumar and Manoj Kumar and R. B. Patel Capacity and interference aware link scheduling with channel assignment in wireless mesh networks . . . . . . . . . 30--38 Marcela Mejia and Néstor Peña and Jose L. Muñoz and Oscar Esparza and Marco A. Alzate A game theoretic trust model for on-line distributed evolution of cooperation in MANETs . . . . . . . . . . . . . . . . . 39--51 Sanaa Sharafeddine and Rakan Maddah A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications . . . . . . . . . . . . . . 52--61 Sanaa Sharafeddine Capacity assignment in multiservice packet networks with soft maximum waiting time guarantees . . . . . . . . 62--72 Xiong Li and Jian-Wei Niu and Jian Ma and Wen-Dong Wang and Cheng-Lian Liu Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards 73--79 Biming Tian and Song Han and Jiankun Hu and Tharam Dillon A mutual-healing key distribution scheme in wireless sensor networks . . . . . . 80--88 Christos Bouras and Eri Giannaka and Thrasyvoulos Tsiatsos A dynamic management scheme for DVEs . . 89--101 Hyuck Han and Hyungsoo Jung and Hyeonsang Eom and H. Y. Yeom An efficient skyline framework for matchmaking applications . . . . . . . . 102--115 Song Wang and Jinli Cao and Jiankun Hu A frequency domain subspace blind channel estimation method for trailing zero OFDM systems . . . . . . . . . . . 116--120 Chih-Lin Hu and Chien-An Cho User-provided multimedia content distribution architecture in mobile and ubiquitous communication networks . . . 121--136 Istemi Ekin Akkus and Öznur Özkasap and M. Reha Civanlar Peer-to-peer multipoint video conferencing with layered video . . . . 137--150 Joel J. P. C. Rodrigues and Orlando R. E. Pereira and Paulo A. C. S. Neves Biofeedback data visualization for body sensor networks . . . . . . . . . . . . 151--158 Atif Bin Mansoor and Hassan Masood and Mustafa Mumtaz and Shoab A. Khan A feature level multimodal approach for palmprint identification using directional subband energies . . . . . . 159--171 Mingyu Lim and Bart Kevelham and Niels Nijdam and Nadia Magnenat-Thalmann Rapid development of distributed applications using high-level communication support . . . . . . . . . 172--182 Xiaohong Huang and Maode Ma A performance model for differentiated service over single-hop passive star coupled WDM optical networks . . . . . . 183--193 Aristides Mpitziopoulos and Charalampos Konstantopoulos and Damianos Gavalas and Grammati Pantziou A pervasive assistive environment for visually impaired people using wireless sensor network infrastructure . . . . . 194--206 Ameneh Daeinabi and Akbar Ghaffar Pour Rahbar and Ahmad Khademzadeh VWCA: an efficient clustering algorithm in vehicular ad hoc networks . . . . . . 207--222 Pejman Goudarzi Improving rate allocation for ephemeral traffic using a second-order algorithm 223--231 Tzu-Chi Huang Universal connection architecture for interactive applications to achieve distributed computing . . . . . . . . . 232--251 Song Fu and Cheng-Zhong Xu and Haiying Shen Randomized load balancing strategies with churn resilience in peer-to-peer networks . . . . . . . . . . . . . . . . 252--261 Bo Zhang and Fangguo Zhang An efficient public key encryption with conjunctive-subset keywords search . . . 262--267 Jesús Ibáñez and Carlos Delgado-Mata Lessons from research on interaction with virtual environments . . . . . . . 268--281 Fahim Sufi and Ibrahim Khalil Faster person identification using compressed ECG in time critical wireless telecardiology applications . . . . . . 282--293 Antonio Ruiz-Martínez and Juan Sánchez-Montesinos and Daniel Sánchez-Martínez A mobile network operator-independent mobile signature service . . . . . . . . 294--311 Wenjia Niu and Gang Li and Zhijun Zhao and Hui Tang and Zhongzhi Shi Multi-granularity context model for dynamic Web service composition . . . . 312--326 Hadi Goudarzi and Amir Hesam Salavati and Mohammad Reza Pakravan An ant-based rate allocation algorithm for media streaming in peer to peer networks: Extension to multiple sessions and dynamic networks . . . . . . . . . . 327--340 Marc Liberatore and Bikas Gurung and Brian Neil Levine and Matthew Wright Empirical tests of anonymous voice over IP . . . . . . . . . . . . . . . . . . . 341--350 Patrik Moravek and Dan Komosny and Radim Burget and Jaroslav Sveda and Tomas Handl and Lucie Jarosova Study and performance of localization methods in IP based networks: Vivaldi algorithm . . . . . . . . . . . . . . . 351--367 E. Costa-Montenegro and J. C. Burguillo-Rial and F. Gil-Castiñeira and F. J. González-Castaño Implementation and analysis of the BitTorrent protocol with a multi-agent model . . . . . . . . . . . . . . . . . 368--383 Elisavet Konstantinou Efficient cluster-based group key agreement protocols for wireless ad hoc networks . . . . . . . . . . . . . . . . 384--393 Jung Yul Choi and Shin Jung Woo and Byoung Kwon Shim Reliable service provisioning in converged multimedia network environment 394--401 Prajakta Kulkarni and Yusuf Ozturk mPHASiS: Mobile patient healthcare and sensor information system . . . . . . . 402--417 William R. Claycomb and Dongwan Shin A novel node level security policy framework for wireless sensor networks 418--428 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Jonathan Loo Special issue on: Efficient and robust security and services of wireless mesh networks . . . . . . . . . . . . . . . . 429--431 Frank A. Zdarsky and Sebastian Robitzsch and Albert Banchs Security analysis of wireless mesh backhauls for mobile networks . . . . . 432--442 Shanshan Jiang and Yuan Xue Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks . . . . . . . . . 443--454 Zorana Bankovic and David Fraga and José Manuel Moya and Juan Carlos Vallejo and Pedro Malagón and Álvaro Araujo and Juan-Mariano de Goyeneche and Elena Romero and Javier Blesa and Daniel Villanueva and Octavio Nieto-Taladriz Improving security in WMNs with reputation systems and self-organizing maps . . . . . . . . . . . . . . . . . . 455--463 Ching-Fang Hsu and Guo-Hua Cui and Qi Cheng and Jing Chen A novel linear multi-secret sharing scheme for group communication in wireless mesh networks . . . . . . . . . 464--468 Yiliang Han and Xiaolin Gui and Xuguang Wu and Xiaoyuan Yang Proxy encryption based secure multicast in wireless mesh networks . . . . . . . 469--477 Okechukwu E. Muogilim and Kok-Keong Loo and Richard Comley Wireless mesh network security: a traffic engineering management approach 478--491 Raquel Lacuesta and Jaime Lloret and Miguel Garcia and Lourdes Peñalver Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks . . . . . . . . . . . . . . . . 492--505 Rafael Lopes Gomes and Waldir Moreira Junior and Eduardo Cerqueira and Antônio Jorge Abelém Using fuzzy link cost and dynamic choice of link quality metrics to achieve QoS and QoE in wireless mesh networks . . . 506--516 Altaf Mukati A survey of memory error correcting techniques for improved reliability . . 517--522 Lucas D. P. Mendes and Joel J. P. C. Rodrigues A survey on cross-layer solutions for wireless sensor networks . . . . . . . . 523--534 Tingting Chen and Ankur Bansal and Sheng Zhong A reputation system for wireless mesh networks using network coding . . . . . 535--541 Pere Montolio-Aranda and Joaquin Garcia-Alfaro and David Megías Improved flooding of broadcast messages using extended multipoint relaying . . . 542--550 Duong Nguyen Binh Ta and Suiping Zhou and Wentong Cai and Xueyan Tang and Rassul Ayani Multi-objective zone mapping in large-scale distributed virtual environments . . . . . . . . . . . . . . 551--561 Niels Sluijs and Frédéric Iterbeke and Tim Wauters and Filip De Turck and Bart Dhoedt and Piet Demeester Cooperative caching versus proactive replication for location dependent request patterns . . . . . . . . . . . . 562--574 Mohammad Bsoul and Ahmad Al-Khasawneh and Emad Eddien Abdallah and Yousef Kilani Enhanced Fast Spread Replication strategy for Data Grid . . . . . . . . . 575--580 Xiaohong Huang and Maode Ma A heuristic adaptive QoS prediction scheme in single-hop passive star coupled WDM optical networks . . . . . . 581--588 Cynthia Villalba and Franco Zambonelli Towards nature-inspired pervasive service ecosystems: Concepts and simulation experiences . . . . . . . . . 589--602 Jianyong Chen and Huawang Zeng and Cunying Hu and Zhen Ji Optimization between security and delay of quality-of-service . . . . . . . . . 603--608 Sandeep K. Sood and Anil K. Sarje and Kuldip Singh A secure dynamic identity based authentication protocol for multi-server architecture . . . . . . . . . . . . . . 609--618 Hai Dong and Farookh Khadeer Hussain and Elizabeth Chang A service concept recommendation system for enhancing the dependability of semantic service matchmakers in the service ecosystem environment . . . . . 619--631 Fang-Yie Leu and Ilsun You and Yao-Tien Huang A coordinated multiple channel assignment scheme and AP deployment for channel reuse in metropolitan scale wireless networks . . . . . . . . . . . 632--643 Mohamed Saad Joint admission and power control for quality-of-service in the wireless downlink . . . . . . . . . . . . . . . . 644--652 Q. Shi and N. Zhang and M. Merabti and R. Askwith Achieving autonomous fair exchange in ubiquitous network settings . . . . . . 653--667 Anabela Moreira Bernardino and Eugénia Moreira Bernardino and Juan Manuel Sanchez-Perez and Juan Antonio Gomez-Pulido and Miguel Angel Vega-Rodriguez Solving ring loading problems using bio-inspired algorithms . . . . . . . . 668--685 Zoran Milicevic and Zoran Bojkovic H.264/AVC standard: a proposal for selective intra- and optimized inter-prediction . . . . . . . . . . . . 686--691 Yebin Chen and Ying Li and Jiankun Wang On the wide diameter of directed double-loop networks . . . . . . . . . . 692--696 Fatna Belqasmi and Roch Glitho and Rachida Dssouli An overlay network for autonomous information discovery in the post-composition registries of ambient networks . . . . . . . . . . . . . . . . 697--707 Huo Zhihong and Zheng Yuan and Xu Chang A robust fault-tolerant control strategy for networked control systems . . . . . 708--714 Yusuf Sani and Mohamed Othman A provision-aware fair bandwidth distribution marker algorithm for DiffServ networks . . . . . . . . . . . 715--721 Ming-Yang Su Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification . . . . . 722--730 Naser Movahhedinia and Behrouz Shahgholi Ghahfarokhi Performance analysis of Bluetooth asynchronous connection-less service . . 731--738 Chunlin Li and Layuan Li Two-level market solution for services composition optimization in mobile grid 739--749 Li Yu and Maode Ma and Weidong Hu and Zibo Shi and Yantai Shu Design of parameter tunable robust controller for active queue management based on $ H_\infty $ control theory . . 750--764 Jinchang Lu and Maode Ma Cross-layer QoS support framework and holistic opportunistic scheduling for QoS in single carrier WiMAX system . . . 765--773 Li Chunlin and Li Layuan Context aware service provisioning in mobile grid . . . . . . . . . . . . . . 774--782 Congduc Pham and Abdallah Makhoul and Rachid Saadi Risk-based adaptive scheduling in randomly deployed video sensor networks for critical surveillance applications 783--795 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Quan Z. Sheng and Sherali Zeadally and Aikaterini Mitrokotsa and Zakaria Maamar RFID technology, systems, and applications . . . . . . . . . . . . . . 797--798 Wen Yao and Chao-Hsien Chu and Zang Li Leveraging complex event processing for smart hospitals using RFID . . . . . . . 799--810 Yi-Wei Ma and Han-Chieh Chao and Jiann-Liang Chen and Cheng-Yen Wu Load-balancing mechanism for the RFID middleware applications over grid networking . . . . . . . . . . . . . . . 811--820 Filippo Gandino and Renato Ferrero and Bartolomeo Montrucchio and Maurizio Rebaudengo Probabilistic DCS: an RFID reader-to-reader anti-collision protocol 821--832 Pedro Peris-Lopez and Agustin Orfila and Julio C. Hernandez-Castro and Jan C. A. van der Lubbe Flaws on RFID grouping-proofs. Guidelines for future sound protocols 833--845 Francesco Rizzo and Marcello Barboni and Lorenzo Faggion and Graziano Azzalin and Marco Sironi Improved security for commercial container transports using an innovative active RFID system . . . . . . . . . . . 846--852 Roberto Di Pietro and Refik Molva An optimal probabilistic solution for information confinement, privacy, and security in RFID systems . . . . . . . . 853--863 M. V. Bueno-Delgado and J. Vales-Alonso On the optimal frame-length configuration on real passive RFID systems . . . . . . . . . . . . . . . . 864--876 G. P. Hancke Design of a secure distance-bounding channel for RFID . . . . . . . . . . . . 877--887 Hanning Chen and Yunlong Zhu and Kunyuan Hu and Tao Ku RFID network planning using a multi-swarm optimizer . . . . . . . . . 888--901 Apostolia Papapostolou and Hakima Chaouchi RFID-assisted indoor localization and the impact of interference on its performance . . . . . . . . . . . . . . 902--913 Wei-Shinn Ku and Kazuya Sakai and Min-Te Sun The optimal $k$-covering tag deployment for RFID-based localization . . . . . . 914--924 Pilar Manzanares-Lopez and Juan Pedro Muñoz-Gea and Josemaria Malgosa-Sanahuja and Juan Carlos Sanchez-Aarnoutse An efficient distributed discovery service for EPCglobal network in nested package scenarios . . . . . . . . . . . 925--937 Huanjia Yang and Lili Yang and Shuang-Hua Yang Hybrid ZigBee RFID sensor network for humanitarian logistics centre management 938--948 Worapot Jakkhupan and Somjit Arch-int and Yuefeng Li Business process analysis and simulation for the RFID and EPCglobal Network enabled supply chain: a proof-of-concept approach . . . . . . . . . . . . . . . . 949--957 Taewoo Nam and Keunhyuk Yeom Business-aware framework for supporting RFID-enabled applications in EPC Network 958--971 Leonardo A. Amaral and Fabiano P. Hessel and Eduardo A. Bezerra and Jerônimo C. Corrêa and Oliver B. Longhi and Thiago F. O. Dias eCloudRFID --- a mobile software framework architecture for pervasive RFID-based applications . . . . . . . . 972--979 Pablo Najera and Javier Lopez and Rodrigo Roman Real-time location and inpatient care systems based on passive RFID . . . . . 980--989 Chuong C. Vo and Naveen Chilamkurti and Seng W. Loke and Torab Torabi Radio-Mama: an RFID based business process framework for asset management 990--997 Maria Chaudhry and Ali Hammad Akbar and Qanita Ahmad and Imran Sarwar SOARware$^1$: Treading through the crossroads of RFID middleware and SOA paradigm . . . . . . . . . . . . . . . . 998--1014 Damith C. Ranasinghe and Mark Harrison and Kary Främling and Duncan McFarlane Enabling through life product-instance management: Solutions and challenges . . 1015--1031 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Keqiu Li and Laurence T. Yang and Xuemin Lin Advanced topics in cloud computing . . . 1033--1034 Gang Chen and Yongwei Wu and Jia Liu and Guangwen Yang and Weimin Zheng Optimization of sub-query processing in distributed data integration systems . . 1035--1042 Z. Zhou and L. T. Yang and S. Bhiri and L. Shu and N. Xiong and M. Hauswirth Verifying mediated service interactions considering expected behaviours . . . . 1043--1053 Yuqing Zhu and Jianmin Wang and Chaokun Wang Ripple: a publish/subscribe service for multidata item updates propagation in the cloud . . . . . . . . . . . . . . . 1054--1067 Xiangzhen Kong and Chuang Lin and Yixin Jiang and Wei Yan and Xiaowen Chu Efficient dynamic task scheduling in virtualized data centers with fuzzy prediction . . . . . . . . . . . . . . . 1068--1077 Weidong Shi and Yang Lu and Zhu Li and Jonathan Engelsma SHARC: a scalable $3$D graphics virtual appliance delivery framework in cloud 1078--1087 Hai Jin and Wei Gao and Song Wu and Xuanhua Shi and Xiaoxin Wu and Fan Zhou Optimizing the live migration of virtual machine by CPU scheduling . . . . . . . 1088--1096 Ashley Chonka and Yang Xiang and Wanlei Zhou and Alessio Bonti Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks . . . . . . . . . . . . . . . . 1097--1107 Yanming Shen and Keqiu Li and Junfeng Xu and Lu Li Layered video multicast with a P2P cooperation approach . . . . . . . . . . 1108--1112 Flavio Lombardi and Roberto Di Pietro Secure virtualization for cloud computing . . . . . . . . . . . . . . . 1113--1122 Fouzi Semchedine and Louiza Bouallouche-Medjkoune and Djamil A\"\issani Task assignment policies in distributed server systems: a survey . . . . . . . . 1123--1130 Tien-Ho Chen and Yen-Chiu Chen and Wei-Kuan Shih and Hsin-Wen Wei An efficient anonymous authentication protocol for mobile pay-TV . . . . . . . 1131--1137 Jian Wang and Yanheng Liu and Yu Jiao Building a trusted route in a mobile ad hoc network considering communication reliability and path length . . . . . . 1138--1149 J. Hu and I. Khalil and S. Han and A. Mahmood Seamless integration of dependability and security concepts in SOA: a feedback control system based framework and taxonomy . . . . . . . . . . . . . . . . 1150--1159 Hyun Sung Kim Location-based authentication protocol for first cognitive radio networking standard . . . . . . . . . . . . . . . . 1160--1167 David G. Rosado and Eduardo Fernández-Medina and Javier López and Mario Piattini Systematic design of secure Mobile Grid systems . . . . . . . . . . . . . . . . 1168--1183 Fatemeh Amiri and MohammadMahdi Rezaei Yousefi and Caro Lucas and Azadeh Shakery and Nasser Yazdani Mutual information-based feature selection for intrusion detection systems . . . . . . . . . . . . . . . . 1184--1199 Rafael Duque and Crescencio Bravo and Manuel Ortega A model-based framework to automate the analysis of users' activity in collaborative systems . . . . . . . . . 1200--1209 Meirong Liu and Timo Koskela and Zhonghong Ou and Jiehan Zhou and Jukka Riekki and Mika Ylianttila Super-peer-based coordinated service provision . . . . . . . . . . . . . . . 1210--1224 Jaime Chen and Manuel Díaz and Luis Llopis and Bartolomé Rubio and José M. Troya A survey on quality of service support in wireless sensor and actor networks: Requirements and challenges in the context of critical infrastructure protection . . . . . . . . . . . . . . . 1225--1239 Mahmut Tenruh Message scheduling with reduced matrix cycle and evenly distributed sparse allocation for time-triggered CAN . . . 1240--1251 Sheikh Tahir Bakhsh and Halabi Hasbullah and Sabeen Tahir Dynamic Congestion Control through backup relay in Bluetooth scatternet . . 1252--1262 Xingwei Liu and Xuming Fang and Xu Chen and Xuesong Peng A bidding model and cooperative game-based vertical handoff decision algorithm . . . . . . . . . . . . . . . 1263--1271 Qi Lu and Maode Ma Group mobility support in mobile WiMAX networks . . . . . . . . . . . . . . . . 1272--1282 Jesús Ibáñez Minimalist approach to show emotions via a flock of smileys . . . . . . . . . . . 1283--1291 Chun-Ying Huang and Shang-Pin Ma and Kuan-Ta Chen Using one-time passwords to prevent password phishing attacks . . . . . . . 1292--1301 Miao Xie and Song Han and Biming Tian and Sazia Parvin Anomaly detection in wireless sensor networks: a survey . . . . . . . . . . . 1302--1325 Sinan Senol and Kemal Leblebicioglu and Ece G. Schmidt INtERCEDE: an algorithmic approach to networked control system design . . . . 1326--1341 Rafael Teigão and Carlos Maziero and Altair Santin Applying a usage control model in an operating system kernel . . . . . . . . 1342--1352 Songtao Guo and Chuangyin Dang and Xiaofeng Liao Joint opportunistic power and rate allocation for wireless ad hoc networks: an adaptive particle swarm optimization approach . . . . . . . . . . . . . . . . 1353--1365 Justin Dean and Andrew Harrison and Robert N. Lass and Joe Macker and David Millar and Ian Taylor Client/server messaging protocols in serverless environments . . . . . . . . 1366--1379 Y. Challal and A. Ouadjaout and N. Lasla and M. Bagaa and A. Hadjidj Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks . . . . . . 1380--1397 Wenfeng Li and Weiming Shen Swarm behavior control of mobile multi-robots with wireless sensor networks . . . . . . . . . . . . . . . . 1398--1407 R. O. Ocaya A framework for collaborative remote experimentation for a physical laboratory using a low cost embedded web server . . . . . . . . . . . . . . . . . 1408--1415 Wenjun Xu and Zude Zhou and D. T. Pham and C. Ji and M. Yang and Quan Liu Hybrid congestion control for high-speed networks . . . . . . . . . . . . . . . . 1416--1428 Javad Akbari Torkestani and Mohammad Reza Meybodi A link stability-based multicast routing protocol for wireless mobile ad hoc networks . . . . . . . . . . . . . . . . 1429--1440 André Vicente Calvinho and Rui Gustavo Crespo Email FI identification and resolution with model checking . . . . . . . . . . 1441--1446 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Han-Chieh Chao and Jean-Pierre Seifert and Shiguo Lian and Liang Zhou Dependable multimedia communications: Systems, services, and applications . . 1447--1448 Rongbo Zhu Intelligent rate control for supporting real-time traffic in WLAN mesh networks 1449--1458 Po-Yi Shih and Po-Chuan Lin and Jhing-Fa Wang and Yuan-Ning Lin Robust several-speaker speech recognition with highly dependable online speaker adaptation and identification . . . . . . . . . . . . . 1459--1467 Der-Jiunn Deng PSSB: Priority enforced slow-start backoff algorithm for multimedia transmission in wireless ad-hoc networks 1468--1473 Philip Leroux and Steven Latré and Nicolas Staelens and Piet Demeester and Filip De Turck Mobile TV services through IP Datacast over DVB-H: Dependability of the quality of experience on the IP-based distribution network quality of service 1474--1488 Wen Ji and Min Chen and Xiaohu Ge and Peng Li and Yiqiang Chen A perceptual macroblock layer power control for energy scalable video encoder based on just noticeable distortion principle . . . . . . . . . . 1489--1497 Sanjay K. Dhurandher and Sudip Misra and Puneet Pruthi and Shubham Singhal and Saurabh Aggarwal and Isaac Woungang Using bee algorithm for peer-to-peer file searching in mobile ad hoc networks 1498--1508 I.-Ju Liao and Tin-Yu Wu and Jen-Wen Ding and Wei-Tsong Lee A novel $3$D streaming protocol supported multi-mode display . . . . . . 1509--1517 Rashid Mehmood and Raad Alturki and Sherali Zeadally Multimedia applications over metropolitan area networks (MANs) . . . 1518--1529 Sudip Misra and Ankur Jain Policy controlled self-configuration in unattended wireless sensor networks . . 1530--1544 Chia-Hui Wang and Yu-Shun Liu A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie--Hellman and dynamic key changes 1545--1556 Guangjie Liu and Junwen Wang and Shiguo Lian and Zhiquan Wang A passive image authentication scheme for detecting region-duplication forgery with rotation . . . . . . . . . . . . . 1557--1565 Yeong-Sheng Chen and Yuan-Wei Lee and Jong Hyuk Park Enhanced HCCA mechanism for multimedia traffics with QoS support in IEEE 802.11e networks . . . . . . . . . . . . 1566--1571 Kevin J. Ma and Radim Bartos and Swapnil Bhatia A survey of schemes for Internet-based video delivery . . . . . . . . . . . . . 1572--1586 Neyre Tekbiyik and Elif Uysal-Biyikoglu Energy efficient wireless unicast routing alternatives for machine-to-machine networks . . . . . . 1587--1614 Ching-Hao Mao and Hahn-Ming Lee and Che-Fu Yeh Adaptive e-mails intention finding system based on words social networks 1615--1622 Jun Yang and Bin Dai and Benxiong Huang and Shui Yu Orthogonal feedback scheme for network coding . . . . . . . . . . . . . . . . . 1623--1633 Jordán Pascual Espada and Oscar Sanjuán Martínez and Juan Manuel Cueva Lovelle and B. Cristina Pelayo G-Bustelo and Manuel Álvarez Álvarez and Alejandro González García Modeling architecture for collaborative virtual objects based on services . . . 1634--1647 Ting Chen and Xiao-song Zhang and Hua Li and Xiong-da Li and Yue Wu Fast quarantining of proactive worms in unstructured P2P networks . . . . . . . 1648--1659 Anindya Tahsin Prodhan and Rajkumar Das and Humayun Kabir and Gholamali C. Shoja TTL based routing in opportunistic networks . . . . . . . . . . . . . . . . 1660--1670 Imad Jawhar and Nader Mohamed and Dharma P. Agrawal Linear wireless sensor networks: Classification and applications . . . . 1671--1682 Stenio Fernandes and Judith Kelner and Djamel Sadok An adaptive-predictive architecture for video streaming servers . . . . . . . . 1683--1694 Liqiang Zhang and Yu-Jen Cheng and Xiaobo Zhou Enhanced statistics-based rate adaptation for 802.11 wireless networks 1695--1706 Martin Kuehnhausen and Victor S. Frost Application of the Java Message Service in mobile monitoring environments . . . 1707--1716 Zac Sadan and David G. Schwartz Social network analysis of web links to eliminate false positives in collaborative anti-spam systems . . . . 1717--1723 Chien-Lung Hsu and Han-Yu Lin New identity-based key-insulated convertible multi-authenticated encryption scheme . . . . . . . . . . . 1724--1731 Tao Qin and Xiaohong Guan and Wei Li and Pinghui Wang and Qiuzhen Huang Monitoring abnormal network traffic based on blind source separation approach . . . . . . . . . . . . . . . . 1732--1742 Hwa-Chun Ma and Prasan Kumar Sahoo and Yen-Wen Chen Computational geometry based distributed coverage hole detection protocol for the wireless sensor networks . . . . . . . . 1743--1756 Wenjia Niu and Gang Li and Hui Tang and Xu Zhou and Zhongzhi Shi CARSA: a context-aware reasoning-based service agent model for AI planning of web service composition . . . . . . . . 1757--1770 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Jiming Chen and David K. Y. Yau Control and optimization over wireless networks . . . . . . . . . . . . . . . . 1771--1772 Ning Weng and I-Hung Li and Lucas Vespa Information quality model and optimization for 802.15.4-based wireless sensor networks . . . . . . . . . . . . 1773--1783 Rabun Kosar and Ilir Bojaxhiu and Ertan Onur and Cem Ersoy Lifetime extension for surveillance wireless sensor networks with intelligent redeployment . . . . . . . . 1784--1793 Wahabou Abdou and Adrien Henriet and Christelle Bloch and Dominique Dhoutaut and Damien Charlet and François Spies Using an evolutionary algorithm to optimize the broadcasting methods in mobile ad hoc networks . . . . . . . . . 1794--1804 Dang Tu Nguyen and Wook Choi and Minh Thiep Ha and Hyunseung Choo Design and analysis of a multi-candidate selection scheme for greedy routing in wireless sensor networks . . . . . . . . 1805--1817 Wenjia Liu and Bo Chen Optimal control of mobile monitoring agents in immune-inspired wireless monitoring networks . . . . . . . . . . 1818--1826 Qing Chen and Zubair Md. Fadlullah and Xiaodong Lin and Nei Kato A clique-based secure admission control scheme for mobile ad hoc networks (MANETs) . . . . . . . . . . . . . . . . 1827--1835 Bader Al-Manthari and Nidal Nasser and Najah Abu Ali and Hossam Hassanein Congestion prevention in broadband wireless access systems: an economic approach . . . . . . . . . . . . . . . . 1836--1847 Jihoon Ryoo and Hwangnam Kim Multi-sector multi-range control for self-organizing wireless networks . . . 1848--1860 Zhaoming Lu and Yan Yang and Xiangming Wen and Ying Ju and Wei Zheng A cross-layer resource allocation scheme for ICIC in LTE-Advanced . . . . . . . . 1861--1868 M. Jahanshahi and M. Dehghan and M. R. Meybodi A mathematical formulation for joint channel assignment and multicast routing in multi-channel multi-radio wireless mesh networks . . . . . . . . . . . . . 1869--1882 Juan Rodríguez-Covili and Sergio F. Ochoa and José A. Pino and Roc Messeguer and Esunly Medina and Dolors Royo A communication infrastructure to ease the development of mobile collaborative applications . . . . . . . . . . . . . . 1883--1893 Bin Li and Zheng Zhou and Dejian Li and Weixia Zou A novel Parzen probabilistic neural network based noncoherent detection algorithm for distributed ultra-wideband sensors . . . . . . . . . . . . . . . . 1894--1902 Kyusuk Han and Youngjoon Seo and Sungjune Yoon and James J. (Jong Hyuk) Park and Taeshik Shon Providing security vertical handoff in SARAH for heterogeneous networks . . . . 1903--1907 Muhammad Ayaz and Imran Baig and Azween Abdullah and Ibrahima Faye A survey on routing techniques in underwater wireless sensor networks . . 1908--1927 Sarogini Grace Pease and Lin Guan and Iain Phillips and Alan Grigg Cross-layer signalling and middleware: a survey for inelastic soft real-time applications in MANETs . . . . . . . . . 1928--1941 David Antolino Rivas and José M. Barceló-Ordinas and Manel Guerrero Zapata and Julián D. Morillo-Pozo Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation . . . . . . . . . . . . . . 1942--1955 Muhammad Azhar Iqbal and Bin Dai and Benxiong Huang and A. Hassan and Shui Yu Survey of network coding-aware routing protocols in wireless networks . . . . . 1956--1970 M. Bakhouya and J. Gaber and P. Lorenz An adaptive approach for information dissemination in Vehicular Ad hoc Networks . . . . . . . . . . . . . . . . 1971--1978 Lu Leng and Jiashu Zhang Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security . . . . . . . . 1979--1989 Jeremiah D. Deng and Martin K. Purvis Multi-core application performance optimization using a constrained tandem queueing model . . . . . . . . . . . . . 1990--1996 Pedro M. Wightman and Miguel A. Labrador A family of simple distributed minimum connected dominating set-based topology construction algorithms . . . . . . . . 1997--2010 Sanjay Kumar Biswash and Chiranjeev Kumar An efficient metric-based (EM-B) location management scheme for wireless cellular networks . . . . . . . . . . . 2011--2026 Tzu-Chi Huang and Kuo-Chih Chu Networking without Dynamic Host Configuration Protocol server in Ethernet and Wireless Local Area Network 2027--2041 Maziar Ahmad Sharbafi and Mohammad Javad Yazdanpanah IDFC: a new approach to control bifurcation in TCP/RED . . . . . . . . . 2042--2050 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Anonymous Contents list continued . . . . . . . . II Weiming Shen and Yinsheng Li and Anne James Collaborative computing and applications 1--2 Hugo Paredes and F. Mario Martins Social interaction regulation in virtual web environments using the Social Theatres model . . . . . . . . . . . . . 3--19 Weizhan Zhang and Qinghua Zheng and Haifei Li and Feng Tian An overlay multicast protocol for live streaming and delay-guaranteed interactive media . . . . . . . . . . . 20--28 Min Liu and Shijun Xu and Siyi Sun An agent-assisted QoS-based routing algorithm for wireless sensor networks 29--36 Tossaporn Srisooksai and Kamol Keamarungsi and Poonlap Lamsrichan and Kiyomichi Araki Practical data compression in wireless sensor networks: a survey . . . . . . . 37--59 Junzhou Luo and Xiaogang Wang and Ming Yang An interval centroid based spread spectrum watermarking scheme for multi-flow traceback . . . . . . . . . . 60--71 Kyuyong Shin and Douglas S. Reeves Winnowing: Protecting P2P systems against pollution through cooperative index filtering . . . . . . . . . . . . 72--84 Guoqiang Gao and Ruixuan Li and Kunmei Wen and Xiwu Gu Proactive replication for rare objects in unstructured peer-to-peer networks 85--96 Kwanghoon Kim A model-driven workflow fragmentation framework for collaborative workflow architectures and systems . . . . . . . 97--110 Junpeng Du and Shikai Jing and Jihong Liu Creating shared design thinking process for collaborative design . . . . . . . . 111--120 Yunjiao Xue and Hamada H. Ghenniwa and Weiming Shen Frame-based ontological view for semantic integration . . . . . . . . . . 121--131 Hongbo Sun and Wenhui Fan and Weiming Shen and Tianyuan Xiao Ontology-based interoperation model of collaborative product development . . . 132--144 Juan Rodríguez-Covili and Sergio F. Ochoa and José A. Pino High level MANET protocol: Enhancing the communication support for mobile collaborative work . . . . . . . . . . . 145--155 Yuqing Sun and Dickson K. W. Chiu and Bin Gong and Xiangxu Meng and Peng Zhang Scheduling mobile collaborating workforce for multiple urgent events . . 156--163 Fabrício Enembreck and Jean-Paul André Barth\`es Distributed constraint optimization with MULBS: a case study on collaborative meeting scheduling . . . . . . . . . . . 164--175 Mar Pérez-Sanagustín and Gustavo Ramirez-Gonzalez and Davinia Hernández-Leo and Mario Muñoz-Organero and Patricia Santos and Josep Blat and Carlos Delgado Kloos Discovering the campus together: a mobile and computer-based learning experience . . . . . . . . . . . . . . . 176--188 Adriana S. Vivacqua and Marcos R. S. Borges Taking advantage of collective knowledge in emergency response systems . . . . . 189--198 Amir Talaei-Khoei and Pradeep Ray and Nandan Parameshwaran and Lundy Lewis A framework for awareness maintenance 199--210 Jameela Al-Jaroodi and Nader Mohamed Service-oriented middleware: a survey 211--220 Rajashekhar C. Biradar and Sunilkumar S. Manvi Review of multicast routing mechanisms in mobile ad hoc networks . . . . . . . 221--239 Xianhui Che and Barry Ip Packet-level traffic analysis of online games from the genre characteristics perspective . . . . . . . . . . . . . . 240--252 Kok-Lim Alvin Yau and Peter Komisarczuk and Paul D. Teal Reinforcement learning for context awareness and intelligence in wireless networks: Review, new features and open issues . . . . . . . . . . . . . . . . . 253--267 Mawloud Omar and Yacine Challal and Abdelmadjid Bouabdallah Certification-based trust models in mobile ad hoc networks: a survey and taxonomy . . . . . . . . . . . . . . . . 268--286 Eleftherios Stergiou and John Garofalakis Performance estimation of banyan semi layer networks with drop resolution mechanism . . . . . . . . . . . . . . . 287--294 Ibrahim Al-Surmi and Mohamed Othman and Borhanuddin Mohd Ali Mobility management for IP-based next generation mobile networks: Review, challenge and perspective . . . . . . . 295--315 Feng Zhong and Chai Kiat Yeo and Bu Sung Lee Adaptive load balancing algorithm for multiple homing mobile nodes . . . . . . 316--327 Marinho P. Barcellos and Rodolfo S. Antunes and Hisham H. Muhammad and Ruthiano S. Munaretti Beyond network simulators: Fostering novel distributed applications and protocols through extendible design . . 328--339 Fagen Li and Muhammad Khurram Khan and Khaled Alghathbar and Tsuyoshi Takagi Identity-based online/offline signcryption for low power devices . . . 340--347 Walid Saad and Zaher Dawy and Sanaa Sharafeddine A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks . . . . . . . . . . . 348--356 Jing Nie IPv6 based relay gateway protocol in hybrid networks . . . . . . . . . . . . 357--364 Dhiah Al-Shammary and Ibrahim Khalil Redundancy-aware SOAP messages compression and aggregation for enhanced performance . . . . . . . . . . . . . . 365--381 Eduardo Cañete and Jaime Chen and R. Marcos Luque and Bartolomé Rubio NeuralSens: a neural network based framework to allow dynamic adaptation in wireless sensor and actor networks . . . 382--393 Mohammad Javad Rostami and Azadeh Alsadat Emrani Zarandi and Seyed Mohamad Hoseininasab MSDP with ACO: a maximal SRLG disjoint routing algorithm based on ant colony optimization . . . . . . . . . . . . . . 394--402 Ronald Beaubrun and Jhon-Fredy Llano-Ruiz and Benoit Poirier and Alejandro Quintero A middleware architecture for disseminating delay-constrained information in wireless sensor networks 403--411 Jasma Balasangameshwara and Nedunchezhian Raju A hybrid policy for fault tolerant load balancing in grid computing environments 412--422 Tzu-Chi Huang Program Ultra-Dispatcher for launching applications in a customization manner on cloud computing . . . . . . . . . . . 423--446 Chao-Tsun Chang Hash caching mechanism in source-based routing for wireless ad hoc networks . . 447--458 Sajjad Zare and Akbar Ghaffarpour Rahbar An FEC scheme combined with weighted scheduling to reduce multicast packet loss in IPTV over PON . . . . . . . . . 459--468 Jun Huang and Xiaohong Huang and Yan Ma Routing with multiple quality-of-services constraints: an approximation perspective . . . . . . . 469--479 Serif Bahtiyar and Mehmet Ufuk Çaglayan Extracting trust information from security system of a service . . . . . . 480--490 Jorge Blasco and Julio Cesar Hernandez-Castro and José María de Fuentes and Benjamín Ramos A framework for avoiding steganography usage over HTTP . . . . . . . . . . . . 491--501 Bing Hu and Kwan L. Yeung and Zhaoyang Zhang Load-balanced three-stage switch . . . . 502--509 Ioannis Krikidis and John S. Thompson MIMO two-way relay channel with superposition coding and imperfect channel estimation . . . . . . . . . . . 510--516 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mesut Günes and Yan Zhang In memory of Mieso Denko . . . . . . . . 517 Ming-Tuo Zhou and Hiroshi Harada Cognitive maritime wireless mesh/ad hoc networks . . . . . . . . . . . . . . . . 518--526 Theofanis P. Lambrou and Christos G. Panayiotou A testbed for coverage control using mixed wireless sensor networks . . . . . 527--537 Joachim Fischer and Jens-Peter Redlich and Jochen Zschau and Claus Milkereit and Matteo Picozzi and Kevin Fleming and Mihal Brumbulli and Björn Lichtblau and Ingmar Eveslage A wireless mesh sensing network for early warning . . . . . . . . . . . . . 538--547 Evangelos Theodoridis and Ioannis Chatzigiannakis and Stefan Dulman Post-processing in wireless sensor networks: Benchmarking sensor trace files for in-network data aggregation 548--561 Iván Corredor and José F. Martínez and Miguel S. Familiar and Lourdes López Knowledge-Aware and Service-Oriented Middleware for deploying pervasive services . . . . . . . . . . . . . . . . 562--576 Bo Yang and Manohar Mareboyana Similarity search in sensor networks using semantic-based caching . . . . . . 577--583 Mari Carmen Domingo An overview of the Internet of Things for people with disabilities . . . . . . 584--596 Sajjad Rizvi and Hassaan Khaliq Qureshi and Syed Ali Khayam and Veselin Rakocevic and Muttukrishnan Rajarajan A1: an energy efficient topology control algorithm for connected area coverage in wireless sensor networks . . . . . . . . 597--605 Malabika Sengupta and Swapan Kumar Mondal and Debashis Saha A comparison of wavelength reservation protocols for WDM optical networks . . . 606--618 Chuan Zhu and Chunlin Zheng and Lei Shu and Guangjie Han A survey on coverage and connectivity issues in wireless sensor networks . . . 619--632 Jingyu Wang and Jianxin Liao and Tonghong Li OSIA: Out-of-order Scheduling for In-order Arriving in concurrent multi-path transfer . . . . . . . . . . 633--643 Sanaa Sharafeddine and Ibrahim Al-Kassem and Zaher Dawy A scatternet formation algorithm for Bluetooth networks with a non-uniform distribution of devices . . . . . . . . 644--656 Wenjie Zhang and Chai Kiat Yeo Throughput and delay scaling laws for mobile overlaid wireless networks . . . 657--667 Hoda Hassan and Mohamed Eltoweissy CORM: a reference model for future computer networks . . . . . . . . . . . 668--680 Nicola Cordeschi and Tatiana Patriarca and Enzo Baccarelli Stochastic traffic engineering for real-time applications over wireless networks . . . . . . . . . . . . . . . . 681--694 Francisco Jurado and Miguel A. Redondo and Manuel Ortega Using fuzzy logic applied to software metrics and test cases to assess programming assignments and give advice 695--712 Golnaz Vakili and Siavash Khorsandi Coordination of cooperation policies in a peer-to-peer system using swarm-based RL . . . . . . . . . . . . . . . . . . . 713--722 Radim Burget and Dan Komosny and Kathiravelu Ganeshan Topology aware feedback transmission for real-time control protocol . . . . . . . 723--730 Mahboobeh Sedighizad and Babak Seyfe and Keivan Navaie MR-BART: Multi-Rate Available Bandwidth Estimation in Real-Time . . . . . . . . 731--742 Yi-hua Zhu and Hui Xu and Kai-kai Chi and Hua Hu Accumulating error-free frame blocks to improve throughput for IEEE 802.11-based WLAN . . . . . . . . . . . . . . . . . . 743--752 Carlos T. Calafate and Giancarlo Fortino and Sascha Fritsch and Janio Monteiro and Juan-Carlos Cano and Pietro Manzoni An efficient and robust content delivery solution for IEEE 802.11p vehicular environments . . . . . . . . . . . . . . 753--762 Xiong Li and Yongping Xiong and Jian Ma and Wendong Wang An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards . . . . . . . . . . . . . . 763--769 Min-Feng Wang and Meng-Feng Tsai and Sie-Long Jheng and Cheng-Hsien Tang Social feature-based enterprise email classification without examining email contents . . . . . . . . . . . . . . . . 770--777 Waltenegus Dargie A medium access control protocol that supports a seamless handover in wireless sensor networks . . . . . . . . . . . . 778--786 Rajesh Karunamurthy and Ferhat Khendek and Roch H. Glitho A novel architecture for Web service composition . . . . . . . . . . . . . . 787--802 Georgios Kastaniotis and Elias Maragos and Christos Douligeris and Dimitris K. Despotis Using data envelopment analysis to evaluate the efficiency of web caching object replacement strategies . . . . . 803--817 Wen-Hwa Liao and Hung-Chun Yang A power-saving data storage scheme for wireless sensor networks . . . . . . . . 818--825 Gildas Avoine and Xavier Carpent and Benjamin Martin Privacy-friendly synchronized ultralightweight authentication protocols in the storm . . . . . . . . . 826--843 Muhammad Imran and Mohamed Younis and Abas Md Said and Halabi Hasbullah Localized motion-based connectivity restoration algorithms for wireless sensor and actor networks . . . . . . . 844--856 Mohit P. Tahiliani and K. C. Shet and T. G. Basavaraju CARED: Cautious Adaptive RED gateways for TCP/IP networks . . . . . . . . . . 857--864 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Laurence T. Yang and Guojun Wang Special issue on trusted computing and communications . . . . . . . . . . . . . 865--866 Yanli Yu and Keqiu Li and Wanlei Zhou and Ping Li Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures . . . . . . . . . . . . 867--880 Lei Jiang and Lixin Ding and Jianxun Liu and Jinjun Chen Reputation rating modeling for open environment lack of communication by using online social cognition . . . . . 881--891 Weizhong Qiang and Aleksandr Konstantinov and Deqing Zou and Laurence T. Yang A standards-based interoperable single sign-on framework in ARC Grid middleware 892--904 Zhongtian Jia and Xiaodong Lin and Seng-Hua Tan and Lixiang Li and Yixian Yang Public key distribution scheme for delay tolerant networks based on two-channel cryptography . . . . . . . . . . . . . . 905--913 Fei Wang and Furong Wang and Benxiong Huang and Laurence T. Yang SONR: a reliable reputation system of self-organized network . . . . . . . . . 914--926 Qin Liu and Guojun Wang and Jie Wu Secure and privacy preserving keyword searching for cloud storage services . . 927--933 Félix Gómez Mármol and Gregorio Martínez Pérez TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks . . . . . . . 934--941 Mohammad-Amin Kharraz and Hamid Sarbazi-Azad and Albert Y. Zomaya On-demand multicast routing protocol with efficient route discovery . . . . . 942--950 Huanyu Zhao and Xin Yang and Xiaolin Li An incentive mechanism to reinforce truthful reports in reputation systems 951--961 Laiping Zhao and Yizhi Ren and Mingchu Li and Kouichi Sakurai Flexible service selection with user-specific QoS support in service-oriented architecture . . . . . 962--973 Liang Gu and Guangdong Bai and Yao Guo and Xiangqun Chen and Hong Mei Security model oriented attestation on dynamically reconfigurable component-based systems . . . . . . . . 974--981 Min Choi and Jong Hyuk Park and Seungho Lim and Young-Sik Jeong Achieving reliable system performance by fast recovery of branch miss prediction 982--991 Yu Wang and Yang Xiang and Wanlei Zhou and Shunzheng Yu Generating regular expression signatures for network traffic classification in trusted network management . . . . . . . 992--1000 Jin-Hee Cho and Ananthram Swami and Ing-Ray Chen Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks . . . . . . . 1001--1012 Ousmane Diallo and Joel J. P. C. Rodrigues and Mbaye Sene Real-time data management on wireless sensor networks: a survey . . . . . . . 1013--1021 Wen Tao Zhu and Jianying Zhou and Robert H. Deng and Feng Bao Detecting node replication attacks in wireless sensor networks: a survey . . . 1022--1034 Jihao Yin and Yifei Wang and Jiankun Hu Free Search with Adaptive Differential Evolution Exploitation and Quantum-Inspired Exploration . . . . . . 1035--1051 Panho Lee and Anura P. Jayasumana and H. M. N. Dilum Bandara and Sanghun Lim and V. Chandrasekar A peer-to-peer collaboration framework for multi-sensor data fusion . . . . . . 1052--1066 Chao-Yang Lee and Shou-Jen Lin and Chen-Wei Lee and Chu-Sing Yang An efficient continuous tracking system in real-time surveillance application 1067--1073 Rajashekhar C. Biradar and Sunilkumar S. Manvi Neighbor supported reliable multipath multicast routing in MANETs . . . . . . 1074--1085 Jesús Gallardo and Crescencio Bravo and Miguel A. Redondo A model-driven development method for collaborative modeling tools . . . . . . 1086--1105 S. Suraprasert and J. Fakcharoenphol Comparison of recovery schemes to maximize restorable throughput in multicast networks . . . . . . . . . . . 1106--1115 Bettahally N. Keshavamurthy and Durga Toshniwal and Bhavani K. Eshwar Hiding co-occurring prioritized sensitive patterns over distributed progressive sequential data streams . . 1116--1129 Abderrahmane Baadache and Ali Belmehdi Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks . . . . . . . . . . . . . . . . 1130--1139 M. C. Batistatos and G. V. Tsoulos and G. E. Athanasiadou Mobile telemedicine for moving vehicle scenarios: Wireless technology options and challenges . . . . . . . . . . . . . 1140--1150 Zubair A. Baig Multi-agent systems for protecting critical infrastructures: a survey . . . 1151--1161 Abhik Banerjee and Chuan Heng Foh and Chai Kiat Yeo and Bu Sung Lee Performance improvements for network-wide broadcast with instantaneous network information . . . 1162--1174 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Alfredo Cuzzocrea Intelligent algorithms for data-centric sensor networks . . . . . . . . . . . . 1175--1176 Aris Papadopoulos and Alfredo Navarra and Julie A. McCann and Cristina M. Pinotti VIBE: an energy efficient routing protocol for dense and mobile sensor networks . . . . . . . . . . . . . . . . 1177--1190 Mark Roantree and Jie Shi and Paolo Cappellari and Martin F. O'Connor and Michael Whelan and Niall Moyna Data transformation and query management in personal health sensor networks . . . 1191--1202 Paolo Bellavista and Giuseppe Cardone and Antonio Corradi and Luca Foschini The Future Internet convergence of IMS and ubiquitous smart environments: an IMS-based solution for energy efficiency 1203--1209 Alfredo Cuzzocrea and Alexis Papadimitriou and Dimitrios Katsaros and Yannis Manolopoulos Edge betweenness centrality: a novel algorithm for QoS-based topology control over wireless sensor networks . . . . . 1210--1217 Gianluca Moro and Gabriele Monti W-Grid: a scalable and efficient self-organizing infrastructure for multi-dimensional data management, querying and routing in wireless data-centric sensor networks . . . . . . 1218--1234 R. Madhusudhan and R. C. Mittal Dynamic ID-based remote user password authentication schemes using smart cards: a review . . . . . . . . . . . . 1235--1248 Jan von Mulert and Ian Welch and Winston K. G. Seah Security threats and solutions in MANETs: a case study using AODV and SAODV . . . . . . . . . . . . . . . . . 1249--1259 Chien-Fu Cheng and Kuo-Tang Tsai Eventual strong consensus with fault detection in the presence of dual failure mode on processors under dynamic networks . . . . . . . . . . . . . . . . 1260--1276 Dong Kun Noh and Junbeom Hur Using a dynamic backbone for efficient data delivery in solar-powered WSNs . . 1277--1284 Longxiang Gao and Ming Li and Alessio Bonti and Wanlei Zhou and Shui Yu $M$-Dimension: Multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models . . . . . . . 1285--1296 Najme Mansouri and Gholam Hosein Dastghaibyfard A dynamic replica management strategy in data grid . . . . . . . . . . . . . . . 1297--1303 Kenneth J. Turner and Koon Leai Larry Tan Rigorous development of composite grid services . . . . . . . . . . . . . . . . 1304--1316 Mustapha Reda Senouci and Abdelhamid Mellouk and Hadj Senouci and Amar Aissani Performance evaluation of network lifetime spatial-temporal distribution for WSN routing protocols . . . . . . . 1317--1328 Hassen A. Mogaibel and Mohamed Othman and Shamala Subramaniam and Nor Asilah Wati Abdul Hamid On-demand channel reservation scheme for common traffic in wireless mesh networks 1329--1351 Elizabeth A. Thompson and Nathan Clem and Isaac Renninger and Timothy Loos Software-defined GPS receiver on USRP-platform . . . . . . . . . . . . . 1352--1360 Ameen M. Alkharasani and Mohamed Othman M$^2$I$^2$ tswTCM: a new efficient optimization marker algorithm to improve fairness bandwidth in DiffServ networks 1361--1366 Miao Zhou and Yi Mu and Willy Susilo and Jun Yan and Liju Dong Privacy enhanced data outsourcing in the cloud . . . . . . . . . . . . . . . . . 1367--1373 Bettahally N. Keshavamurthy and Durga Toshniwal and Bhavani K. Eshwar Corrigendum to ``Hiding co-occurring prioritized sensitive patterns over distributed progressive sequential data streams'' [J. Network Comput. Appl. \bf 35 (3) (2012) 1116--1129] . . . . . . . 1374 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Paolo Bellavista and Chi-Ming Chen and Hossam Hassanein Special issue on service delivery management in broadband networks . . . . 1375--1376 Djamal-Eddine Meddour and Alaeddine Abdallah and Toufik Ahmed and Raouf Boutaba A cross layer architecture for multicast and unicast video transmission in mobile broadband networks . . . . . . . . . . . 1377--1391 Cristiano Bonato Both and Clarissa Cassales Marquezan and Rafael Kunst and Lisandro Zambenedetti Granville and Juergen Rochol A self-adapting connection admission control solution for mobile WiMAX: Enabling dynamic switching of admission control algorithms based on predominant network usage profiles . . . . . . . . . 1392--1401 Giuseppe Aceto and Alessio Botta and Antonio Pescapé and Maurizio D'Arienzo Unified architecture for network measurement: the case of available bandwidth . . . . . . . . . . . . . . . 1402--1414 Werner Sandmann Delays in a series of queues with correlated service times . . . . . . . . 1415--1423 Kaouther Abrougui and Azzedine Boukerche and Hussam Ramadan Performance evaluation of an efficient fault tolerant service discovery protocol for vehicular networks . . . . 1424--1435 Nassima Hadid and Alexandre Guitton and Michel Misson Exploiting a meeting channel to interconnect mobile robots . . . . . . . 1436--1445 Christos Bouras and Vassilis Poulopoulos Enhancing meta-portals using dynamic user context personalization techniques 1446--1453 Ahmed A. Mosa and Aisha H. Abdalla and Rashid A. Saeed Evaluation of MANEMO route optimization schemes . . . . . . . . . . . . . . . . 1454--1472 A. Ruiz-Martínez A survey on solutions and main free tools for privacy enhancing Web communications . . . . . . . . . . . . . 1473--1492 Mohammad Masdari and Mehdi Maleknasab and Moazam Bidaki A survey and taxonomy of name systems in mobile ad hoc networks . . . . . . . . . 1493--1507 Adamu Murtala Zungeru and Li-Minn Ang and Kah Phooi Seng Classical and swarm intelligence based routing protocols for wireless sensor networks: a survey and comparison . . . 1508--1536 Liang Liu and Xiao-Lin Qin and Gui-Neng Zheng Reliable spatial window aggregation query processing algorithm in wireless sensor networks . . . . . . . . . . . . 1537--1547 Kranthi K. Mamidisetty and Michael J. Ferrara and Shivakumar Sastry Systematic selection of cluster heads for data collection . . . . . . . . . . 1548--1558 Rosen Ivanov Real-time GPS track simplification algorithm for outdoor navigation of visually impaired . . . . . . . . . . . 1559--1567 Yun He and Zhongyang Xiong and Yufang Zhang and Xiaolin Tan and Zhixing Li Modeling and analysis of multi-channel P2P VoD systems . . . . . . . . . . . . 1568--1578 Patrick Battistello and Joaquin Garcia-Alfaro and Cyril Delétré Transaction-based authentication and key agreement protocol for inter-domain VoIP 1579--1597 Samia A. Ali and Khaled M. Shaaban and Islam M. Alkabbany Distributed patching for mobile wireless sensor networks . . . . . . . . . . . . 1598--1605 Jipeng Zhou and Liyang Peng and Yuhui Deng and Jianzhu Lu An on-demand routing protocol for improving channel use efficiency in multichannel ad hoc networks . . . . . . 1606--1614 Seiven Leu and Ruay-Shiung Chang A weight-value algorithm for finding connected dominating sets in a MANET . . 1615--1619 Bert Vankeirsbilck and Dieter Verslype and Nicolas Staelens and Pieter Simoens and Chris Develder and Bart Dhoedt and Filip De Turck and Piet Demeester Automatic fine-grained area detection for thin client systems . . . . . . . . 1620--1632 Javad Akbari Torkestani Mobility prediction in mobile wireless networks . . . . . . . . . . . . . . . . 1633--1645 Ashok Kumar Das and Pranay Sharma and Santanu Chatterjee and Jamuna Kanta Sing A dynamic password-based user authentication scheme for hierarchical wireless sensor networks . . . . . . . . 1646--1656 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Peer Azmat Shah and Muhammad Yousaf and Amir Qayyum and Halabi B. Hasbullah Performance comparison of end-to-end mobility management protocols for TCP 1657--1673 Allen L. Ramaboli and Olabisi E. Falowo and Anthony H. Chan Bandwidth aggregation in heterogeneous wireless networks: a survey of current approaches and issues . . . . . . . . . 1674--1690 Sazia Parvin and Farookh Khadeer Hussain and Omar Khadeer Hussain and Song Han and Biming Tian and Elizabeth Chang Cognitive radio network security: a survey . . . . . . . . . . . . . . . . . 1691--1708 Shajulin Benedict Energy-aware performance analysis methodologies for HPC architectures --- an exploratory study . . . . . . . . . . 1709--1719 Tarek Moulahi and Salem Nasri and Hervé Guyennet Broadcasting based on dominated connecting sets with MPR in a realistic environment for WSNs & ad hoc . . . . . . 1720--1727 JungYul Choi and Min-Gon Kim and Hongkyu Jeong and Hong-Shik Park Power-saving mechanisms for energy efficient IEEE 802.16e/m . . . . . . . . 1728--1739 Jihao Yin and Chongyang Fu and Jiankun Hu Using incremental subspace and contour template for object tracking . . . . . . 1740--1748 Hamid Shokrzadeh and Siavash Khorsandi and Abolfazl Toroghi Haghighat Optimized query-driven appointment routing based on Expectation-Maximization in wireless sensor networks . . . . . . . . . . . . 1749--1761 Kwangcheol Shin and Kyungjun Kim and Soontae Kim Traffic management strategy for delay-tolerant networks . . . . . . . . 1762--1770 M. S. Kakkasageri and S. S. Manvi Multiagent driven dynamic clustering of vehicles in VANETs . . . . . . . . . . . 1771--1780 Alexandre Aguiar Amaral and Bruno Bogaz Zarpelão and Leonardo de Souza Mendes and Joel José Puga Coelho Rodrigues and Mario Lemes Proença Junior Inference of network anomaly propagation using spatio-temporal correlation . . . 1781--1792 Q. Shi and N. Zhang and D. Llewellyn-Jones Efficient autonomous signature exchange on ubiquitous networks . . . . . . . . . 1793--1806 Victoria Ying Zhang and Albert Kai-sun Wong Kernel-based particle filtering for indoor tracking in WLANs . . . . . . . . 1807--1817 Mourad Amad and Ahmed Meddahi and Djamil A\"\issani and Zonghua Zhang HPM: a novel hierarchical Peer-to-Peer model for lookup acceleration with provision of physical proximity . . . . 1818--1830 Sandeep K. Sood A combined approach to ensure data security in cloud computing . . . . . . 1831--1838 Zuowen Tan A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments . . . . . . . . . 1839--1846 Bo Dong and Qinghua Zheng and Feng Tian and Kuo-Ming Chao and Rui Ma and Rachid Anane An optimized approach for storing and accessing small files on cloud storage 1847--1862 Rafael Antonello and Stenio Fernandes and Carlos Kamienski and Djamel Sadok and Judith Kelner and István Gódor and Géza Szabó and Tord Westholm Deep packet inspection tools and techniques in commodity platforms: Challenges and trends . . . . . . . . . 1863--1878 Mari Carmen Domingo An overview of the Internet of underwater things . . . . . . . . . . . 1879--1890 Javier Barrachina and Piedad Garrido and Manuel Fogue and Francisco J. Martinez and Juan-Carlos Cano and Carlos T. Calafate and Pietro Manzoni VEACON: a Vehicular Accident Ontology designed to improve safety on the roads 1891--1900 Adamu Murtala Zungeru and Li-Minn Ang and Kah Phooi Seng Termite-hill: Performance optimized swarm intelligence based routing algorithm for wireless sensor networks 1901--1917 Mohamed Bakillah and Mir Abolfazl Mostafavi and Steve H. L. Liang and Alexander Zipf Real time query propagation strategies with Lightweight Coordination Calculus (LCC) for ad hoc networks of geospatial databases . . . . . . . . . . . . . . . 1918--1933 G. Fortino and A. Guerrieri and G. M. P. O'Hare and A. Ruzzelli A flexible building management framework based on wireless sensor and actuator networks . . . . . . . . . . . . . . . . 1934--1952 Linfeng Liu and Ruchuan Wang and Fu Xiao Topology control algorithm for underwater wireless sensor networks using GPS-free mobile sensor nodes . . . 1953--1963 Gurpreet Singh and Neeraj Kumar and Anil Kumar Verma Ant colony algorithms in MANETs: a review . . . . . . . . . . . . . . . . . 1964--1972 S. Sudha and N. Ammasaigounden An aggregate marker for bandwidth fairness in DiffServ . . . . . . . . . . 1973--1978 Li Li and Qing-Shan Jia and Hengtao Wang and Ruixi Yuan and Xiaohong Guan A systematic method for network topology reconfiguration with limited link additions . . . . . . . . . . . . . . . 1979--1989 Chih-Lin Hu and Tzu-Han Kuo A hierarchical overlay with cluster-based reputation tree for dynamic peer-to-peer systems . . . . . . 1990--2002 Miguel Franklin de Castro and Levi Bayde Ribeiro and Camila Helena Souza Oliveira An autonomic bio-inspired algorithm for wireless sensor network self-organization and efficient routing 2003--2015 Mohammad H. Hajiesmaili and Ahmad Khonsari and Ali Sehati and Mohammad Sadegh Talebi Content-aware rate allocation for efficient video streaming via dynamic network utility maximization . . . . . . 2016--2027 Javad Akbari Torkestani A distributed resource discovery algorithm for P2P grids . . . . . . . . 2028--2036 D. Gregor and S. L. Toral and T. Ariza and F. Barrero An ontology-based semantic service for cooperative urban equipments . . . . . . 2037--2050 Qingyang Song and Zhaolong Ning and Shiqiang Wang and Abbas Jamalipour Link stability estimation based on link connectivity changes in mobile ad-hoc networks . . . . . . . . . . . . . . . . 2051--2058 Süleyman Kardas and Serkan Çelik and Muhammet Yildiz and Albert Levi PUF-enhanced offline RFID security and privacy . . . . . . . . . . . . . . . . 2059--2067 Khalid A. Darabkh and Shereen S. Ismail and Mohammad Al-Shurman and Iyad F. Jafar and Eman Alkhader and Mamoun F. Al-Mistarihi Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks . . . . . 2068--2080 Yi Xie and J. Hu and S. Tang and X. Huang A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network 2081--2091 Yuan-Cheng Lai and Yen-Hung Chen A best block exploring algorithm for two-dimensional downlink burst construction in IEEE 802.16 networks . . 2092--2104 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Abdelkrim Hadjidj and Marion Souil and Abdelmadjid Bouabdallah and Yacine Challal and Henry Owen Wireless sensor networks for rehabilitation applications: Challenges and opportunities . . . . . . . . . . . 1--15 Hung-Jen Liao and Chun-Hung Richard Lin and Ying-Chih Lin and Kuang-Yuan Tung Intrusion detection system: a comprehensive review . . . . . . . . . . 16--24 Ahmed Patel and Mona Taghavi and Kaveh Bakhtiyari and Joaquim Celestino Júnior An intrusion detection and prevention system in cloud computing: a systematic review . . . . . . . . . . . . . . . . . 25--41 Chirag Modi and Dhiren Patel and Bhavesh Borisaniya and Hiren Patel and Avi Patel and Muttukrishnan Rajarajan A survey of intrusion detection techniques in Cloud . . . . . . . . . . 42--57 Fadoua Mhiri and Kaouthar Sethom and Ridha Bouallegue A survey on interference management techniques in femtocell self-organizing networks . . . . . . . . . . . . . . . . 58--65 Md. Mahedi Hassan and Poo Kuan Hoong Seamless handover integrated solution for video transmission over proxy mobile IPv6 in a micro mobility domain . . . . 66--76 Rodrigo Palucci Pantoni and Dennis Brandão A gradient based routing scheme for street lighting wireless sensor networks 77--90 D. Satish Kumar and N. Nagarajan Relay technologies and technical issues in IEEE 802.16j Mobile Multi-hop Relay (MMR) networks . . . . . . . . . . . . . 91--102 Christos Emmanouilidis and Remous-Aris Koutsiamanis and Aimilia Tasidou Mobile guides: Taxonomy of architectures, context awareness, technologies and applications . . . . . 103--125 Saleem-ullah Lar and Xiaofeng Liao An initiative for a classified bibliography on TCP/IP congestion control . . . . . . . . . . . . . . . . 126--133 A. J. Dinusha Rathnayaka and Vidyasagar M. Potdar Wireless Sensor Network transport protocol: a critical review . . . . . . 134--146 Slimane Bah and Roch Glitho and Rachida Dssouli A SIP servlets-based framework for service provisioning in stand-alone MANETs . . . . . . . . . . . . . . . . . 147--155 Seung-Wan Han and In-Seon Jeong and Seung-Ho Kang Low latency and energy efficient routing tree for wireless sensor networks with multiple mobile sinks . . . . . . . . . 156--166 Junjie Xiong and Yangfan Zhou and Michael R. Lyu and Evan F. Y. Young MDiag: Mobility-assisted diagnosis for wireless sensor networks . . . . . . . . 167--177 Wen Tao Zhu Towards secure and communication-efficient broadcast encryption systems . . . . . . . . . . . 178--186 Bing Hu and Kwan L. Yeung and Zhaoyang Zhang An efficient single-iteration single-bit request scheduling algorithm for input-queued switches . . . . . . . . . 187--194 Kemal Akkaya and Izzet F. Senturk and Shanthi Vemulapalli Handling large-scale node failures in mobile sensor/robot networks . . . . . . 195--210 Zhan-feng Wang and Ming Chen and Chang-you Xing and Jing Feng and Xiang-lin Wei and Hua-li Bai Multi-manifold model of the Internet delay space . . . . . . . . . . . . . . 211--218 Jeroen Famaey and Frédéric Iterbeke and Tim Wauters and Filip De Turck Towards a predictive cache replacement strategy for multimedia content . . . . 219--227 Huan Dai and Zhao-min Zhu and Xiao-Feng Gu Multi-target indoor localization and tracking on video monitoring system in a wireless sensor network . . . . . . . . 228--234 Adeela Waqar and Asad Raza and Haider Abbas and Muhammad Khurram Khan A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata . . . . . . . 235--248 Pekka Jäppinen and Renata Guarneri and Luis M. Correia An applications perspective into the Future Internet . . . . . . . . . . . . 249--254 Isabel de la Torre-Díez and Saúl Álvaro-Muñoz and Miguel López-Coronado and Joel Rodrigues Development and performance evaluation of a new RSS tool for a Web-based system: RSS\_PROYECT . . . . . . . . . . 255--261 Marjan Naderan and Mehdi Dehghan and Hossein Pedram Sensing task assignment via sensor selection for maximum target coverage in WSNs . . . . . . . . . . . . . . . . . . 262--273 Reinaldo B. Braga and Igor A. Chaves and Carina T. de Oliveira and Rossana M. C. Andrade and José Neuman de Souza and Hervé Martin and Bruno Schulze RETENTION: a reactive trust-based mechanism to detect and punish malicious nodes in ad hoc grid environments . . . 274--283 Lo-Yao Yeh and Chun-Chuan Yang and Jee-Gong Chang and Yi-Lang Tsai A secure and efficient batch binding update scheme for route optimization of nested NEtwork MObility (NEMO) in VANETs 284--292 Minwoo Kim and Karam Park and Won W. Ro Benefits of using parallelized non-progressive network coding . . . . . 293--305 Ting Yang and Yugeng Sun and Javid Taheri and Albert Y. Zomaya DLS: a dynamic local stitching mechanism to rectify transmitting path fragments in wireless sensor networks . . . . . . 306--315 Kaiping Xue and Changsha Ma and Peilin Hong and Rong Ding A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks . . . . . . 316--323 Rafiqul Islam and Jemal Abawajy A multi-tier phishing detection and filtering approach . . . . . . . . . . . 324--335 Vishnu Monn Baskaran and Yoong Choon Chang and Jonathan Loo and KokSheik Wong Software-based serverless endpoint video combiner architecture for high-definition multiparty video conferencing . . . . . . . . . . . . . . 336--352 Mingfu Li and Yueh-Lin Wu and Chia-Rong Chang Available bandwidth estimation for the network paths with multiple tight links and bursty traffic . . . . . . . . . . . 353--367 Fadi M. Al-Turjman and Hossam S. Hassanein and Mohamad Ibnkahla Quantifying connectivity in wireless sensor networks with grid-based deployments . . . . . . . . . . . . . . 368--377 Xun Yi and Eiji Okamoto Practical Internet voting system . . . . 378--387 Yuehua Wang and Zhong Zhou and Ling Liu and Wei Wu Replica-aided load balancing in overlay networks . . . . . . . . . . . . . . . . 388--401 D. Rosaci and G. M. L. Sarné Cloning mechanisms to improve agent performances . . . . . . . . . . . . . . 402--408 M. Hooshmand and S. M. R. Soroushmehr and P. Khadivi and S. Samavi and S. Shirani Visual sensor network lifetime maximization by prioritized scheduling of nodes . . . . . . . . . . . . . . . . 409--419 Weigang Hou and Lei Guo and Xiaoxue Gong Survivable power efficiency oriented integrated grooming in green networks 420--428 Jesús L. Alvaro and Beatriz Barros A new cloud computing architecture for music composition . . . . . . . . . . . 429--443 I-Hsuan Peng and Yen-Wen Chen Energy consumption bounds analysis and its applications for grid based wireless sensor networks . . . . . . . . . . . . 444--451 K. Salah and M. Hamawi Performance of IP-forwarding of Linux hosts with multiple network interfaces 452--465 Imran Baig and Muhammad Ayaz and Varun Jeoti On the peak-to-average power ratio reduction in mobile WiMAX: a discrete cosine transform matrix precoding based random-interleaved orthogonal frequency division multiple access uplink system 466--475 Mary Looney and Oliver Gough A provision aware proportional fair sharing three colour marker . . . . . . 476--483 Maria-Victoria Belmonte and Manuel Díaz and Jose-Luis Pérez-de-la-Cruz and Ana Reyna COINS: COalitions and INcentiveS for effective Peer-to-Peer downloads . . . . 484--497 Chao Lv and Maode Ma and Hui Li and Jianfeng Ma and Yaoyu Zhang An novel three-party authenticated key exchange protocol using one-time key . . 498--503 Eugénia Moreira Bernardino and Anabela Moreira Bernardino and Juan Manuel Sánchez-Pérez and Juan Antonio Gómez Pulido and Miguel A. Vega Rodríguez Swarm optimisation algorithms applied to large balanced communication networks 504--522 Haythem Bany Salameh and Osamah S. Badarneh Opportunistic medium access control for maximizing packet delivery rate in dynamic access networks . . . . . . . . 523--532 Ting-Yi Chang and Yan-Ru Ke A personalized e-course composition based on a genetic algorithm with forcing legality in an adaptive learning system . . . . . . . . . . . . . . . . . 533--542 Sepideh Adabi and Ali Movaghar and Amir Masoud Rahmani and Hamid Beigy Market-based grid resource allocation using new negotiation model . . . . . . 543--565 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Bingdong Li and Jeff Springer and George Bebis and Mehmet Hadi Gunes A survey of network flow applications 567--581 Shams Qazi and Raad Raad and Yi Mu and Willy Susilo Securing DSR against wormhole attacks in multirate ad hoc networks . . . . . . . 582--592 Ahmed Hassan Mohammed and Bin Dai and Benxiong Huang and Muhammad Azhar and Guan Xu and Peng Qin and Shui Yu A survey and tutorial of wireless relay network protocols based on network coding . . . . . . . . . . . . . . . . . 593--610 Xiaobing He and Michael Niedermeier and Hermann de Meer Dynamic key management in wireless sensor networks: a survey . . . . . . . 611--622 Sudhanshu Tyagi and Neeraj Kumar A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks 623--645 Rafiqul Islam and Ronghua Tian and Lynn M. Batten and Steve Versteeg Classification of malware based on integrated static and dynamic features 646--656 Kun Huang and Gaogang Xie and Rui Li and Shuai Xiong Fast and deterministic hash table lookup using discriminative Bloom filters . . . 657--666 Chiapin Wang Dynamic ARF for throughput improvement in 802.11 WLAN via a machine-learning approach . . . . . . . . . . . . . . . . 667--676 Eyüp S. Canlar and Mauro Conti and Bruno Crispo and Roberto Di Pietro Windows Mobile LiveSD Forensics . . . . 677--684 Sardar Muhammad Bilal and Carlos Jesus Bernardos and Carmen Guerrero Position-based routing in vehicular networks: a survey . . . . . . . . . . . 685--697 M. Kretschmer and P. Batroff and G. Ghinea Topology forming and optimization framework for heterogeneous wireless back-haul networks supporting unidirectional technologies . . . . . . 698--710 Najme Mansouri and Gholam Hosein Dastghaibyfard and Ehsan Mansouri Combination of data replication and scheduling algorithm for improving data availability in Data Grids . . . . . . . 711--722 D. C. Vasiliadis and G. E. Rizos and C. Vassilakis Modelling and performance study of finite-buffered blocking multistage interconnection networks supporting natively $2$-class priority routing traffic . . . . . . . . . . . . . . . . 723--737 Shiliang Luo and Xu Lu and Lianglun Cheng TSOIA: an efficient node selection algorithm facing the uncertain process for Internet of Things . . . . . . . . . 738--743 Gimer Cervera and Michel Barbeau and Joaquin Garcia-Alfaro and Evangelos Kranakis A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs . . . 744--755 Kuang-Yow Lian and Sung-Jung Hsiao and Wen-Tsai Sung Intelligent multi-sensor control system based on innovative technology integration via ZigBee and Wi-Fi networks . . . . . . . . . . . . . . . . 756--767 Po-Ching Lin and Jia-Hau Lee Re-examining the performance bottleneck in a NIDS with detailed profiling . . . 768--780 Yan Yang and Yulong Zhang and Alex Hai Wang and Meng Yu and Wanyu Zang and Peng Liu and Sushil Jajodia Quantitative survivability evaluation of three virtual machine-based server architectures . . . . . . . . . . . . . 781--790 C. Xu and C. Du and G. F. Zhao and S. Yu A novel model for user clicks identification based on hidden semi-Markov . . . . . . . . . . . . . . 791--798 Jian An and Xiaolin Gui and Wendong Zhang and Jinhua Jiang and Jianwei Yang Research on social relations cognitive model of mobile nodes in Internet of Things . . . . . . . . . . . . . . . . . 799--810 Yanheng Liu and Longxiang Suo and Dayang Sun and Aimin Wang A virtual square grid-based coverage algorithm of redundant node for wireless sensor network . . . . . . . . . . . . . 811--817 Peng Xiao and Zhigang Hu and Dongbo Liu and Guofeng Yan and Xilong Qu Virtual machine power measuring technique with bounded error in cloud environments . . . . . . . . . . . . . . 818--828 Gaik-Yee Chan and Chien-Sing Lee and Swee-Huay Heng Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks . . . . 829--842 Yuhuai Peng and Yao Yu and Lei Guo and Dingde Jiang and Qiming Gai An efficient joint channel assignment and QoS routing protocol for IEEE 802.11 multi-radio multi-channel wireless mesh networks . . . . . . . . . . . . . . . . 843--857 Shahram Jamali and Seyyed Nasser Seyyed Hashemi and Amir Masoud Eftekhari Moghadam On the use of a full information feedback to stabilize RED . . . . . . . 858--869 Abraham Martín-Campillo and Jon Crowcroft and Eiko Yoneki and Ramon Martí Evaluating opportunistic networks in disaster scenarios . . . . . . . . . . . 870--880 Mahesh Kumar and Shishir Kumar AGRIB-BHF: a sustainable and fault tolerant aggregation . . . . . . . . . . 881--886 Mahmoud Al-shugran and Osman Ghazali and Suhaidi Hassan and Kashif Nisar and A. Suki M. Arif A qualitative comparison evaluation of the greedy forwarding strategies in Mobile Ad Hoc Network . . . . . . . . . 887--897 Laisen Nie and Dingde Jiang and Lei Guo A power laws-based reconstruction approach to end-to-end network traffic 898--907 Enver Ever and Orhan Gemikonakli and Altan Kocyigit and Eser Gemikonakli A hybrid approach to minimize state space explosion problem for the solution of two stage tandem queues . . . . . . . 908--926 Hu Xiong and Zhong Chen and Fagen Li New identity-based three-party authenticated key agreement protocol with provable security . . . . . . . . . 927--932 Kashif Nisar and Angela Amphawan and Suhaidi Hassan and Nurul I. Sarkar A comprehensive survey on scheduler for VoIP over WLAN . . . . . . . . . . . . . 933--948 Mohamed K. Watfa and Haitham Al-Hassanieh and Samir Salmen A novel solution to the energy hole problem in sensor networks . . . . . . . 949--958 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Joel J. P. C. Rodrigues and Russel Hsing and Min Chen and Bingli Jiao and Binod Vaidya Guest Editorial on Vehicular Networking Protocols . . . . . . . . . . . . . . . 959--960 António Fonseca and Teresa Vazão Applicability of position-based routing for VANET in highways and urban environment . . . . . . . . . . . . . . 961--973 Rajashree Nair and Ben Soh and Naveen Chilamkurti and James J. (Jong Hyuk) Park Structure-free message aggregation and routing in traffic information system (SMART) . . . . . . . . . . . . . . . . 974--980 Salim Bitam and Abdelhamid Mellouk Bee life-based multi constraints multicast routing optimization for vehicular ad hoc networks . . . . . . . 981--991 Zhenxia Zhang and Azzedine Boukerche and Hussam Ramadan Design and evaluation of a fast MAC layer handoff management scheme for WiFi-based multichannel Vehicular Mesh Networks . . . . . . . . . . . . . . . . 992--1000 Angelos Antonopoulos and Charalabos Skianis and Christos Verikoukis Network coding-based cooperative ARQ scheme for VANETs . . . . . . . . . . . 1001--1007 Navid Tadayon and Sasan Khoshroo and Elaheh Askari and Honggang Wang and Howard Michel Power management in SMAC-based energy-harvesting wireless sensor networks using queuing analysis . . . . 1008--1017 Youxiang Wang and Jianquan Wang and Lu Zhaobiao and Xingang Liu Performance improvement of QO-STBC over time-selective channel for wireless network . . . . . . . . . . . . . . . . 1018--1026 Jaime Lloret and Alejandro Canovas and Angel Catalá and Miguel Garcia Group-based protocol and mobility model for VANETs to offer Internet access . . 1027--1038 Md. Humayun Kabir and Mohammad Mukhtaruzzaman and Mohammed Atiquzzaman Efficient route optimization scheme for nested-NEMO . . . . . . . . . . . . . . 1039--1049 Liren Zhang and Abderrahmane Lakas and Hesham El-Sayed and Ezedin Barka Mobility analysis in vehicular ad hoc network (VANET) . . . . . . . . . . . . 1050--1056 Yejun Liu and Qingyang Song and Rui Ma and Bing Li and Bo Gong Protection based on backup radios and backup fibers for survivable Fiber-Wireless (FiWi) access network . . 1057--1069 Jian-Zhen Luo and Shun-Zheng Yu Position-based automatic reverse engineering of network protocols . . . . 1070--1077 Masoud Zarifneshat and Pejman Khadivi Using mobile node speed changes for movement direction change prediction in a realistic category of mobility models 1078--1090 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Ebrahim Mahdipour and Amir Masoud Rahmani and Saeed Setayeshi Importance sampling for Jackson networks with customer impatience until the end of service . . . . . . . . . . . . . . . 1091--1101 C. Dumez and M. Bakhouya and J. Gaber and M. Wack and P. Lorenz Model-driven approach supporting formal verification for web service composition protocols . . . . . . . . . . . . . . . 1102--1115 Nader Mohamed and Jameela Al-Jaroodi and Abdulla Eid A dual-direction technique for fast file downloads with dynamic load balancing in the Cloud . . . . . . . . . . . . . . . 1116--1130 Ammar Haider and Iqbal Gondal and Joarder Kamruzzaman Social-connectivity-aware vertical handover for heterogeneous wireless networks . . . . . . . . . . . . . . . . 1131--1139 A. Cagatay Talay and D. Turgay Altilar Self adaptive routing for dynamic spectrum access in cognitive radio networks . . . . . . . . . . . . . . . . 1140--1151 Jasone Astorga and Marina Aguado and Nerea Toledo and Marivi Higuero A high performance link layer mobility management strategy for professional private broadband networks . . . . . . . 1152--1163 Chien-Chao Tseng and Chia-Liang Lin and Li-Hsing Yen and Jyun-Yan Liu and Cheng-Yuan Ho Can: a context-aware NAT traversal scheme . . . . . . . . . . . . . . . . . 1164--1173 D. D. Geeta and N. Nalini and Rajashekhar C. Biradar Fault tolerance in wireless sensor network using hand-off and dynamic power adjustment approach . . . . . . . . . . 1174--1185 Chao-Yang Lee and Liang-Cheng Shiu and Fu-Tian Lin and Chu-Sing Yang Distributed topology control algorithm on broadcasting in wireless sensor network . . . . . . . . . . . . . . . . 1186--1195 El-Sayed M. El-Alfy and Syed N. Mujahid and Shokri Z. Selim A Pareto-based hybrid multiobjective evolutionary approach for constrained multipath traffic engineering optimization in MPLS/GMPLS networks . . 1196--1207 Ying-Dar Lin and Cheng-Yuan Ho and Yuan-Cheng Lai and Tzu-Hsiung Du and Shun-Lee Chang Booting, browsing and streaming time profiling, and bottleneck analysis on Android-based systems . . . . . . . . . 1208--1218 Anwar Saif and Mohamed Othman SRA-MSDU: Enhanced A-MSDU frame aggregation with selective retransmission in 802.11n wireless networks . . . . . . . . . . . . . . . . 1219--1229 Muhammad Hamad Alizai and Hanno Wirtz and Bernhard Kirchen and Klaus Wehrle Portable wireless-networking protocol evaluation . . . . . . . . . . . . . . . 1230--1242 Mohammad Masdari and Sadegh Mohammadzadeh Bazarchi and Moazam Bidaki Analysis of Secure LEACH-Based Clustering Protocols in Wireless Sensor Networks . . . . . . . . . . . . . . . . 1243--1260 Aishwarya Bakshi and Amir Talaei-Khoei and Pradeep Ray Adaptive policy framework: a systematic review . . . . . . . . . . . . . . . . . 1261--1271 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Joel J. P. C. Rodrigues and Russel Hsing and Min Chen and Bingli Jiao and Binod Vaidya Guest editorial on vehicular communications and applications . . . . 1273--1274 C. Campolo and H. A. Cozzetti and A. Molinaro and R. Scopigno Augmenting Vehicle-to-Roadside connectivity in multi-channel vehicular Ad Hoc Networks . . . . . . . . . . . . 1275--1286 Yazhi Liu and Jianwei Niu and Jian Ma and Lei Shu and Takahiro Hara and Wendong Wang The insights of message delivery delay in VANETs with a bidirectional traffic model . . . . . . . . . . . . . . . . . 1287--1294 R. Bauza and J. Gozalvez Traffic congestion detection in large-scale scenarios using vehicle-to-vehicle communications . . . 1295--1307 Nitin Maslekar and Joseph Mouzna and Mounir Boussedjra and Houda Labiod CATS: an adaptive traffic signal system based on car-to-car communication . . . 1308--1315 Kai Lin Research on adaptive target tracking in vehicle sensor networks . . . . . . . . 1316--1323 Nerea Toledo and Jean Marie Bonnin and Marivi Higuero Performance evaluation of user applications in the ITS scenario: an analytical assessment of the NeMHIP . . 1324--1336 Carlos Gañán and Jose L. Muñoz and Oscar Esparza and Jorge Mata-Díaz and Juan Hernández-Serrano and Juanjo Alins COACH: COllaborative certificate stAtus CHecking mechanism for VANETs . . . . . 1337--1351 Bidi Ying and Dimitrios Makrakis and Hussein T. Mouftah Privacy preserving broadcast message authentication protocol for VANETs . . . 1352--1364 Xiong Li and Jianwei Niu and Muhammad Khurram Khan and Junguo Liao An enhanced smart card based remote user password authentication scheme . . . . . 1365--1371 Hai Van Luu and Xueyan Tang Constructing rings overlay for robust data collection in wireless sensor networks . . . . . . . . . . . . . . . . 1372--1386 Ting Chen and Xiao-song Zhang and Hong-yuan Li and Dong Wang and Yue Wu Propagation modeling of active P2P worms based on ternary matrix . . . . . . . . 1387--1394 Sulma Rashid and Abdul Hanan Abdullah and Qaisar Ayub and M. Soperi Mohd Zahid Dynamic Prediction based Multi Queue (DPMQ) drop policy for probabilistic routing protocols of delay tolerant network . . . . . . . . . . . . . . . . 1395--1402 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Weiming Shen and Weidong Li Collaboration technologies and applications . . . . . . . . . . . . . . 1403--1404 Steven Latré and Jeroen Famaey and John Strassner and Filip De Turck Automated context dissemination for autonomic collaborative networks through semantic subscription filter generation 1405--1417 Yuanhao Xu and Guofu Yin and Yong Nie and Zhengwei He and Xiaolin Dai Research on an active knowledge push service based on collaborative intent capture . . . . . . . . . . . . . . . . 1418--1430 Tao Wu and Xiaobing Pei and Yongzhong Lu and Changqing Chen and Liang Gao A distributed collaborative product design environment based on semantic norm model and role-based access control 1431--1440 Amy J. C. Trappey and Charles V. Trappey and Chun-Yi Wu and Chin Yuan Fan and Yi-Liang Lin Intelligent patent recommendation system for innovative design collaboration . . 1441--1450 Diego Carvalho Soares and Flávia Maria Santoro and Fernanda Araujo Baião Discovering collaborative knowledge-intensive processes through e-mail mining . . . . . . . . . . . . . 1451--1465 Pedro Antunes and David Simões and Luis Carriço and José A. Pino An end-user approach to business process modeling . . . . . . . . . . . . . . . . 1466--1479 Rahat Iqbal and Nazaraf Shah and Anne James and Tomasz Cichowicz Integration, optimization and usability of enterprise applications . . . . . . . 1480--1488 Leijie Fu and Pingyu Jiang and Wei Cao Modeling and performance analysis of product development process network . . 1489--1502 Ta-Ping Lu and Amy J. C. Trappey and Yi-Kuang Chen and Yu-Da Chang Collaborative design and analysis of supply chain network management key processes model . . . . . . . . . . . . 1503--1511 Yuan Cheng and Fazhi He and Xiantao Cai and Dejun Zhang A group Undo/Redo method in $3$D collaborative modeling systems with performance evaluation . . . . . . . . . 1512--1522 Jiancheng Shi and Jianhua Liu and Ruxin Ning and Weiwei Hou A collisions evaluation method in virtual environment for collaborative assembly . . . . . . . . . . . . . . . . 1523--1530 Bin Guo and Daqing Zhang and Zhu Wang and Zhiwen Yu and Xingshe Zhou Opportunistic IoT: Exploring the harmonious interaction between human and the Internet of Things . . . . . . . . . 1531--1539 Yang Yang and Xinyu Li and Liang Gao and Xinyu Shao A new approach for predicting and collaborative evaluating the cutting force in face milling based on gene expression programming . . . . . . . . . 1540--1550 Jesús Gallardo and Ana I. Molina and Crescencio Bravo and Miguel A. Redondo A model-driven and task-oriented method for the development of collaborative systems . . . . . . . . . . . . . . . . 1551--1565 María Blanca Ibáñez and José J. García Rueda and David Maroto and Carlos Delgado Kloos Collaborative learning in multi-user virtual environments . . . . . . . . . . 1566--1576 Weiming Shen and Weidong Li Collaboration computing technologies and applications . . . . . . . . . . . . . . 1577--1578 Dujuan Gu and Xiaohan Liu and Gang Qin and Shuangjian Yan and Ze luo and Baoping Yan VNET6: IPv6 virtual network for the collaboration between applications and networks . . . . . . . . . . . . . . . . 1579--1588 Anbazhagan Rajesh and Rangaswamy Nakkeeran Investigation on uplink collaborative contention-based bandwidth request for WiMAX three hop relay networks . . . . . 1589--1598 Yuanyuan Pan and Jianqing Li Cooperative pseudonym change scheme based on the number of neighbors in VANETs . . . . . . . . . . . . . . . . . 1599--1609 Dami\`a Castell\`a and Francesc Giné and Francesc Solsona and Josep Lluis Lérida Analyzing locality over a P2P computing architecture . . . . . . . . . . . . . . 1610--1619 Josep Rius and Fernando Cores and Francesc Solsona Cooperative scheduling mechanism for large-scale peer-to-peer computing systems . . . . . . . . . . . . . . . . 1620--1631 Sheng-Cheng Yeh and Ming-Yang Su and Hui-Hui Chen and Chun-Yuen Lin An efficient and secure approach for a cloud collaborative editing . . . . . . 1632--1641 Hongchen Wu and Xinjun Wang and Zhaohui Peng and Qingzhong Li Div-clustering: Exploring active users for social collaborative recommendation 1642--1650 Ho Leung Li and Vincent T. Y. Ng Discovering associations between news and contents in social network sites with the D-Miner service framework . . . 1651--1659 Xiaogang Wang and Ming Yang and Junzhou Luo A novel sequential watermark detection model for efficient traceback of secret network attack flows . . . . . . . . . . 1660--1670 Jian Jiang and Wei Li and Junzhou Luo and Jing Tan A network accountability based verification mechanism for detecting inter-domain routing path inconsistency 1671--1683 JunPing Wang and Qiliang Zhu and Yan Ma An agent-based hybrid service delivery for coordinating Internet of Things and 3rd party service providers . . . . . . 1684--1695 Wenfeng Li and Ye Zhong and Xun Wang and Yulian Cao Resource virtualization and service selection in cloud logistics . . . . . . 1696--1704 Mojtaba Seyedzadegan and Mohamed Othman and Borhanuddin Mohd Ali and Shamala Subramaniam Zero-Degree algorithm for Internet GateWay placement in backbone wireless mesh networks . . . . . . . . . . . . . 1705--1723 Wu-Hsiao Hsu and Yuh-Pyng Shieh Virtual network mapping algorithm in the cloud infrastructure . . . . . . . . . . 1724--1734 Juan Felipe Botero and Miguel Molina and Xavier Hesselbach-Serra and José Roberto Amazonas A novel paths algebra-based strategy to flexibly solve the link mapping stage of VNE problems . . . . . . . . . . . . . . 1735--1752 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Hyuk Lim and James Chang Wu Yu and Binod Vaidya Advances in multimedia services over emerging wireless networks . . . . . . . 1 Pradipta De and Nilanjan Banerjee and Swades De Exploiting multiple description coding for intermediate recovery in wireless mesh networks . . . . . . . . . . . . . 2--11 Paulo A. Neves and Joel J. P. C. Rodrigues and Min Chen and Athanasios V. Vasilakos A multi-channel architecture for IPv6-enabled wireless sensor and actuator networks featuring PnP support 12--24 Soocheol Lee and Seungmin Rho and Jong Hyuk Park Multimedia contents adaptation by modality conversion with user preference in wireless network . . . . . . . . . . 25--32 Hayoung Yoon and JongWon Kim and Robert Hsieh Peer-assisted video on-demand streaming system in practical WiFi-based mobile opportunistic networks . . . . . . . . . 33--44 Maria Ganzha and Marcin Paprzycki Agent-oriented computing for distributed systems and networks . . . . . . . . . . 45--46 Dongsoo Kim and Eric Noel and K. Wendy Tang Expanded Borel Cayley Graphs (Ex-BCGs): a novel communication topology for multi-agent systems . . . . . . . . . . 47--61 Shashank Srivastava and G. C. Nandi Self-reliant mobile code: a new direction of agent security . . . . . . 62--75 Antonín Komenda and Peter Novák and Michal Pechoucek Domain-independent multi-agent plan repair . . . . . . . . . . . . . . . . . 76--88 Sepideh Adabi and Ali Movaghar and Amir Masoud Rahmani and Hamid Beigy and Hengameh Dastmalchy-Tabrizi A new fuzzy negotiation protocol for grid resource allocation . . . . . . . . 89--126 Giancarlo Fortino and Wilma Russo and Marino Vaccaro An agent-based approach for the design and analysis of content delivery networks . . . . . . . . . . . . . . . . 127--145 Álvaro Carrera and Carlos A. Iglesias and Javier García-Algarra and Dusan Kolarík A real-life application of multi-agent systems for fault diagnosis in the provision of an Internet business service . . . . . . . . . . . . . . . . 146--154 Wenjia Niu and Gang Li and Endong Tong and Xinghua Yang and Liang Chang and Zhongzhi Shi and Song Ci Interaction relationships of caches in agent-based HD video surveillance: Discovery and utilization . . . . . . . 155--169 Jaime Galán-Jiménez and Alfonso Gazo-Cervero Using bio-inspired algorithms for energy levels assessment in energy efficient wired communication networks . . . . . . 171--185 Jiguo Yu and Qingbo Zhang and Dongxiao Yu and Congcong Chen and Guanghui Wang Domatic partition in homogeneous wireless sensor networks . . . . . . . . 186--193 Demetris Hoplaros and Zahir Tari and Ibrahim Khalil Data summarization for network traffic monitoring . . . . . . . . . . . . . . . 194--205 Chi-Tao Chiang and Hung-Chang Chen and Wen-Hwa Liao and Kuei-Ping Shih A decentralized minislot scheduling protocol (DMSP) in TDMA-based wireless mesh networks . . . . . . . . . . . . . 206--215 Abbas Ali Rezaee and Mohammad Hossein Yaghmaee and Amir Masoud Rahmani and Amir Hossein Mohajerzadeh HOCA: Healthcare Aware Optimized Congestion Avoidance and control protocol for wireless sensor networks 216--228 Chih-Min Chao and Tzu-Ying Hsiao Design of structure-free and energy-balanced data aggregation in wireless sensor networks . . . . . . . . 229--239 Sajjad Zare and Akbar Ghaffarpour Rahbar Congestion control in IPTV over PON using Digital Fountain forward error correction . . . . . . . . . . . . . . . 240--252 Feng Li and Li Wang and Weidang Lu Potential bargaining for resource allocation in cognitive relay transmission . . . . . . . . . . . . . . 253--258 Yuhuai Peng and Qingyang Song and Yao Yu and Fei Wang Fault-tolerant routing mechanism based on network coding in wireless mesh networks . . . . . . . . . . . . . . . . 259--272 Yuemei Xu and Yang Li and Tao Lin and Zihou Wang and Wenjia Niu and Hui Tang and Song Ci A novel cache size optimization scheme based on manifold learning in Content Centric Networking . . . . . . . . . . . 273--281 Jacques M. Bahi and Xiaole Fang and Christophe Guyeux and Qianxue Wang Suitability of chaotic iterations schemes using XORshift for security applications . . . . . . . . . . . . . . 282--292 Conor Cameron and Ibrahim Khalil and Zahir Tari An ID-based approach to the caching and distribution of peer-to-peer, proxy-based video content . . . . . . . 293--314 Wei Zheng and Tao Su and Haijun Zhang and Wei Li and Xiaoli Chu and Xiangming Wen Distributed power optimization for spectrum-sharing femtocell networks: a fictitious game approach . . . . . . . . 315--322 Guilin Li and Longjiang Guo and Xing Gao and Minghong Liao Bloom filter based processing algorithms for the multi-dimensional event query in wireless sensor networks . . . . . . . . 323--333 Jianwei Niu and Wenfang Song and Mohammed Atiquzzaman Bandwidth-adaptive partitioning for distributed execution optimization of mobile applications . . . . . . . . . . 334--347 Binh Viet Phan and Eric Pardede Active XML (AXML) research: Survey on the representation, system architecture, data exchange mechanism and query evaluation . . . . . . . . . . . . . . . 348--364 Harjit Pal Singh and Sarabjeet Singh and J. Singh and S. A. Khan VoIP: State of art for global connectivity --- a critical review . . . 365--379 Saif Al-Sultan and Moath M. Al-Doori and Ali H. Al-Bayatti and Hussien Zedan A comprehensive survey on vehicular Ad Hoc network . . . . . . . . . . . . . . 380--392 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Ilsun You and Marek R. Ogiela and A. Min Tjoa and Dongwan Shin Advanced technologies for homeland defense and security . . . . . . . . . . 1--2 Leszek T. Lilien and Lotfi ben Othmane and Pelin Angin and Andrew DeCarlo and Raed M. Salih and Bharat Bhargava A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks . . . . . . . . . . 3--15 Dongjin Choi and Byeongkyu Ko and Heesun Kim and Pankoo Kim Text analysis for detecting terrorism-related articles on the web 16--21 Aniello Castiglione and Roberto De Prisco and Alfredo De Santis and Ugo Fiore and Francesco Palmieri A botnet-based command and control approach relying on swarm intelligence 22--33 Lidia Ogiela and Marek R. Ogiela Cognitive systems and bio-inspired computing in homeland security . . . . . 34--42 Seung-Hyun Seo and Aditi Gupta and Asmaa Mohamed Sallam and Elisa Bertino and Kangbin Yim Detecting mobile malware threats to homeland security through static analysis . . . . . . . . . . . . . . . . 43--53 Kerem Irgan and Cem Ünsalan and Sebnem Baydere Low-cost prioritization of image blocks in wireless sensor networks for border surveillance . . . . . . . . . . . . . . 54--64 Luigi Catuogno and Hans Löhr and Marcel Winandy and Ahmad-Reza Sadeghi A trusted versioning file system for passive mobile storage devices . . . . . 65--75 Zang Li and Chao-Hsien Chu and Wen Yao A semantic authorization model for pervasive healthcare . . . . . . . . . . 76--87 Hsing-Chung Chen A multi-issued tag key agreement with time constraint for homeland defense sub-department in NFC environment . . . 88--98 Jong-Yeon Park and Dong-Guk Han and Okyeon Yi and JeongNyeo Kim An improved side channel attack using event information of subtraction . . . . 99--105 Subir Halder and Sipra Das Bit Enhancement of wireless sensor network lifetime by deploying heterogeneous nodes . . . . . . . . . . . . . . . . . 106--124 Sheng Gao and Jianfeng Ma and Cong Sun and Xinghua Li Balancing trajectory privacy and data utility using a personalized anonymization model . . . . . . . . . . 125--134 Gaya K. Jayasinghe and J. Shane Culpepper and Peter Bertok Efficient and effective realtime prediction of drive-by download attacks 135--149 Hai Van Luu and Xueyan Tang An efficient algorithm for scheduling sensor data collection through multi-path routing structures . . . . . 150--162 Mohammad Doraghinejad and Hossein Nezamabadi-pour and Ali Mahani Channel assignment in multi-radio wireless mesh networks using an improved gravitational search algorithm . . . . . 163--171 Messaoud Doudou and Djamel Djenouri and Nadjib Badache and Abdelmadjid Bouabdallah Synchronous contention-based MAC protocols for delay-sensitive wireless sensor networks: a review and taxonomy 172--184 Wenjing Guo and Wei Zhang A survey on intelligent routing protocols in wireless sensor networks 185--201 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Hélder Pereira Borges and José Neuman de Souza and Bruno Schulze and Antonio Roberto Mury Automatic services instantiation based on a process specification . . . . . . . 1--16 Ali Mohammed Alsahag and Borhanuddin Mohd Ali and Nor Kamariah Noordin and Hafizal Mohamad Fair uplink bandwidth allocation and latency guarantee for mobile WiMAX using fuzzy adaptive deficit round robin . . . 17--25 Ding-Jie Huang and Wei-Chung Teng A defense against clock skew replication attacks in wireless sensor networks . . 26--37 Endong Tong and Wenjia Niu and Gang Li and Ding Tang and Liang Chang and Zhongzhi Shi and Song Ci Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks . . . . . . . . . . . . 38--51 Feng-Ming Yang and Wei-Mei Chen and Jean-Lien C. Wu A dynamic strategy for packet scheduling and bandwidth allocation based on channel quality in IEEE 802.16e OFDMA system . . . . . . . . . . . . . . . . . 52--60 Zhaolong Ning and Qingyang Song and Yang Huang and Lei Guo A channel estimation based opportunistic scheduling scheme in wireless bidirectional networks . . . . . . . . . 61--69 Haidar Safa and Wassim El-Hajj and Hanan Zoubian A robust topology control solution for the sink placement problem in WSNs . . . 70--82 Yuxin Meng and Lam-For Kwok Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection . . . . . . 83--92 Smitha Shivshankar and Abbas Jamalipour Spatio-temporal multicast grouping for content-based routing in vehicular networks: a distributed approach . . . . 93--103 Huailiang Tan and Lianjun Huang and Zaihong He and Youyou Lu and Xubin He DMVL: an I/O bandwidth dynamic allocation method for virtual networks 104--116 Ali Moussaoui and Fouzi Semchedine and Abdallah Boukerram A link-state QoS routing protocol based on link stability for Mobile Ad hoc Networks . . . . . . . . . . . . . . . . 117--125 Abderrahim Benslimane and Abderrezak Rachedi Rate adaptation scheme for IEEE 802.11-based MANETs . . . . . . . . . . 126--139 V. R. Budyal and S. S. Manvi ANFIS and agent based bandwidth and delay aware anycast routing in mobile ad hoc networks . . . . . . . . . . . . . . 140--151 Wiem Tounsi and Nora Cuppens-Boulahia and Joaquin Garcia-Alfaro and Yannick Chevalier and Frédéric Cuppens KEDGEN2: a key establishment and derivation protocol for EPC Gen2 RFID systems . . . . . . . . . . . . . . . . 152--166 Aukrit Chadagorn and Ibrahim Khalil and Conor Cameron and Zahir Tari PileCast: Multiple bit rate live video streaming over BitTorrent . . . . . . . 167--178 Osama Al-Haj Hassan and Thamer Al-Rousan and Anas Abu Taleb and Adi Maaita An efficient and scalable ranking technique for mashups involving RSS data sources . . . . . . . . . . . . . . . . 179--190 Ousmane Diallo and Joel J. P. C. Rodrigues and Mbaye Sene and Jaime Lloret Simulation framework for real-time database on WSNs . . . . . . . . . . . . 191--201 Tien-Wen Sung and Chu-Sing Yang Voronoi-based coverage improvement approach for wireless directional sensor networks . . . . . . . . . . . . . . . . 202--213 Carlo Mastroianni and Giuseppe Papuzzo A self-organizing P2P framework for collective service discovery . . . . . . 214--222 Younghyun Kim and Haneul Ko and Sangheon Pack and Jong-Hyouk Lee and Seok-Joo Koh and Heeyoung Jung Performance analysis of distributed mapping system in ID/locator separation architectures . . . . . . . . . . . . . 223--232 J. R. Gisbert and C. Palau and M. Uriarte and G. Prieto and J. A. Palazón and M. Esteve and O. López and J. Correas and M. C. Lucas-Estañ and P. Giménez and A. Moyano and L. Collantes and J. Gozálvez and B. Molina and O. Lázaro and A. González Integrated system for control and monitoring industrial wireless networks for labor risk prevention . . . . . . . 233--252 Alper Rifat Ulucinar and Ibrahim Korpeoglu and Ezhan Karasan Effects of physical channel separation on application flows in a multi-radio multi-hop wireless mesh network: an experimental study on BilMesh testbed 253--265 Mahantesh N. Birje and Sunilkumar S. Manvi and Sajal K. Das Reliable resources brokering scheme in wireless grids based on non-cooperative bargaining game . . . . . . . . . . . . 266--279 Shilei Lu and Shunzheng Yu A fuzzy $k$-coverage approach for RFID network planning using plant growth simulation algorithm . . . . . . . . . . 280--291 Jenn Tang Designing an Anti-swindle Mahjong Leisure Prototype System using RFID and ontology theory . . . . . . . . . . . . 292--301 Qaisar Ayub and Sulma Rashid and M. Soperi Mohd Zahid and Abdul Hanan Abdullah Contact quality based forwarding strategy for delay tolerant network . . 302--309 Xuxun Liu and Desi He Ant colony optimization with greedy migration mechanism for node deployment in wireless sensor networks . . . . . . 310--318 Damianos Gavalas and Charalampos Konstantopoulos and Konstantinos Mastakas and Grammati Pantziou Mobile recommender systems in tourism 319--333 M. S. Kakkasageri and S. S. Manvi Information management in vehicular ad hoc networks: a review . . . . . . . . . 334--350 Hero Modares and Amirhossein Moravejosharieh and Jaime Lloret and Rosli Salleh A survey of secure protocols in Mobile IPv6 . . . . . . . . . . . . . . . . . . 351--368 Muhammad Nouman Durrani and Jawwad A. Shamsi Volunteer computing: requirements, challenges, and solutions . . . . . . . 369--380 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Jine Tang and ZhangBing Zhou and Jianwei Niu and Qun Wang An energy efficient hierarchical clustering index tree for facilitating time-correlated region queries in the Internet of Things . . . . . . . . . . . 1--11 Francisco Fraile and Juan Carlos Guerri Simple models of the content duration and the popularity of television content 12--20 Haiyang Hu and Yizhi Ren and Xu Xu and Liguo Huang and Hua Hu Reducing view inconsistency by predicting avatars' motion in multi-server distributed virtual environments . . . . . . . . . . . . . . 21--30 Vijay Varadharajan and Udaya Tupakula Counteracting security attacks in virtual machines in the cloud using property based attestation . . . . . . . 31--45 Leili Farzinvash and Mehdi Dehghan Multi-rate multicast routing in multi-gateway multi-channel multi-radio wireless mesh networks . . . . . . . . . 46--60 Peng-Yeng Yin and Ray-I. Chang and Chih-Chiang Chao and Yen-Ting Chu Niched ant colony optimization with colony guides for QoS multicast routing 61--72 Mohsen Arab and Mohsen Afsharchi Community detection in social networks using hybrid merging of sub-communities 73--84 Mohamed Ahmed Elfaki and Hamidah Ibrahim and Ali Mamat and Mohamed Othman and Haidar Safa Collaborative caching priority for processing requests in MANETs . . . . . 85--96 Jianwei Wang and Chen Jiang and Jianfei Qian Robustness of Internet under targeted attack: a cascading failure perspective 97--104 Sehoon Park and Qichen Chen and Hyuck Han and Heon Y. Yeom Design and evaluation of mobile offloading system for web-centric devices . . . . . . . . . . . . . . . . 105--115 Peng Zhao and Xinyu Yang and Wei Yu and Chiyong Dong and Shusen Yang and Sulabh Bhattarai Toward efficient estimation of available bandwidth for IEEE 802.11-based wireless networks . . . . . . . . . . . . . . . . 116--125 Yang Xia and Chai Kiat Yeo Mobile Internet access over intermittent network connectivity . . . . . . . . . . 126--138 Zhen-Yu Wu and Ju-Chuan Wu and Sung-Chiang Lin and Charlotte Wang An electronic voting mechanism for fighting bribery and coercion . . . . . 139--150 Samar Abdelaziz and Mustafa ElNainay Metric-based taxonomy of routing protocols for cognitive radio ad hoc networks . . . . . . . . . . . . . . . . 151--163 Onur Yilmaz and Orhan Dagdeviren and Kayhan Erciyes Localization-free and energy-efficient hole bypassing techniques for fault-tolerant sensor networks . . . . . 164--178 Darren Quick and Kim-Kwang Raymond Choo Google Drive: Forensic analysis of data remnants . . . . . . . . . . . . . . . . 179--193
Laleh Arshadi and Amir Hossein Jahangir Benford's law behavior of Internet traffic . . . . . . . . . . . . . . . . 194--205
Lingfang Zeng and Yang Wang Optimization on content service with local search in cloud of clouds . . . . 206--215 Ke Li and Sheng Wang and Shizhong Xu and Xiong Wang and Haojun Huang and Jin Ren and Bo Zhai Evaluating the benefit of the core-edge separation on intradomain traffic engineering under uncertain traffic demand . . . . . . . . . . . . . . . . . 216--226 Hyun-Ho Choi and Ki-Ho Lee and Jung-Ryun Lee Energy-delay tradeoff analysis of user state transition mechanism for mobile web services . . . . . . . . . . . . . . 227--233 Xinjie Guan and Baek-Young Choi Push or pull? Toward optimal content delivery using cloud storage . . . . . . 234--243 Francisco Macia-Perez and Iren Lorenzo-Fonseca and Jose Vicente Berna-Martinez A formal framework for modelling complex network management systems . . . . . . . 255--269 Carlos Abreu and Manuel Ricardo and P. M. Mendes Energy-aware routing for biomedical wireless sensor networks . . . . . . . . 270--278 R. I. Ciobanu and D. G. Reina and C. Dobre and S. L. Toral and P. Johnson JDER: a history-based forwarding scheme for delay tolerant networks using Jaccard distance and encountered ration 279--291 Dingde Jiang and Zhengzheng Xu and Peng Zhang and Ting Zhu A transform domain-based anomaly detection approach to network-wide traffic . . . . . . . . . . . . . . . . 292--306 N. Hoque and Monowar H. Bhuyan and R. C. Baishya and D. K. Bhattacharyya and J. K. Kalita Network attacks: Taxonomy, tools and systems . . . . . . . . . . . . . . . . 307--324 Md Whaiduzzaman and Mehdi Sookhak and Abdullah Gani and Rajkumar Buyya A survey on vehicular cloud computing 325--344 Saeid Abolfazli and Zohreh Sanaei and Abdullah Gani and Feng Xia and Laurence T. Yang Rich Mobile Applications: Genesis, taxonomy, and open issues . . . . . . . 345--362 Baraa T. Sharef and Raed A. Alsaqour and Mahamod Ismail Vehicular communication ad hoc routing protocols: a survey . . . . . . . . . . 363--396 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Dhiah Al-Shammary and Ibrahim Khalil and Zahir Tari A distributed aggregation and fast fractal clustering approach for SOAP traffic . . . . . . . . . . . . . . . . 1--14 Tao Qin and Xiaohong Guan and Wei Li and Pinghui Wang and Min Zhu A new connection degree calculation and measurement method for large scale network monitoring . . . . . . . . . . . 15--26 Gurkan Tuna and Bilel Nefzi and Gianpaolo Conte Unmanned aerial vehicle-aided communications system for disaster recovery . . . . . . . . . . . . . . . . 27--36 Lijun Gao and Maode Ma and Yantai Shu and Yuhua Wei An ultralightweight RFID authentication protocol with CRC and permutation . . . 37--46 Tin-Yu Wu and Wei-Tsong Lee and Nadra Guizani and Tzu-Ming Wang Incentive mechanism for P2P file sharing based on social network and game theory 47--55 Ricardo Anacleto and Lino Figueiredo and Ana Almeida and Paulo Novais Mobile application to provide personalized sightseeing tours . . . . . 56--64 J. J. Castro-Schez and M. A. Redondo and F. Jurado and J. Albusac Experience applying language processing techniques to develop educational software that allow active learning methodologies by advising students . . . 65--79 Ahmed Mohammed Abbas and Azuraliza Abu Bakar and Mohd Zakree Ahmad Fast dynamic clustering SOAP messages based compression and aggregation model for enhanced performance of Web services 80--88 Bhaskar Sardar and Debashis Saha and Mahbub Hassan A novel enhancement of TCP for on-board IP networks with wireless cellular connectivity . . . . . . . . . . . . . . 89--100 Wei Liu and Wei Du and Jing Chen and Wei Wang and GuoSun Zeng Adaptive energy-efficient scheduling algorithm for parallel tasks on homogeneous clusters . . . . . . . . . . 101--113 Jinzhu Wang and Jianxin Liao and Tonghong Li and Jing Wang and Jingyu Wang and Qi Qi Probe-based end-to-end overload control for networks of SIP servers . . . . . . 114--125 Giannis Haralabopoulos and Ioannis Anagnostopoulos Real time enhanced random sampling of online social networks . . . . . . . . . 126--134 Saleh Alghamdi and Ron van Schyndel and Ibrahim Khalil Accurate positioning using long range active RFID technology to assist visually impaired people . . . . . . . . 135--147 Yacine Atif and Liren Zhang Network resource management in support of QoS in ubiquitous learning . . . . . 148--156 Xiaoyuan Li and Dexiang Wang and Janise McNair and Jianmin Chen Dynamic spectrum access with packet size adaptation and residual energy balancing for energy-constrained cognitive radio sensor networks . . . . . . . . . . . . 157--166 Muhammad Hamad Alizai and Klaus Wehrle Probabilistic location-free addressing in wireless networks . . . . . . . . . . 167--181 Sergio Pastrana and Agustin Orfila and Juan E. Tapiador and Pedro Peris-Lopez Randomized Anagram revisited . . . . . . 182--196 Tahir Ahmad and Usman Younis Randomness testing of non-cryptographic hash functions for real-time hash table based storage and look-up of URLs . . . 197--205 Tim Verbelen and Pieter Simoens and Filip De Turck and Bart Dhoedt Adaptive deployment and configuration for mobile augmented reality in the cloudlet . . . . . . . . . . . . . . . . 206--216 M. A. Raayatpanah and H. Salehi Fathabadi and B. H. Khalaj and S. Khodayifar and P. M. Pardalos Bounds on end-to-end statistical delay and jitter in multiple multicast coded packet networks . . . . . . . . . . . . 217--227 Bert Vankeirsbilck and Pieter Simoens and Filip De Turck and Piet Demeester and Bart Dhoedt Network latency hiding in thin client systems through server-centric speculative display updating . . . . . . 228--239 Radu-Ioan Ciobanu and Ciprian Dobre and Mihai Dascalu and Stefan Trausan-Matu and Valentin Cristea SENSE: a collaborative selfish node detection and incentive mechanism for opportunistic networks . . . . . . . . . 240--249 Thang Tran and Maike Kuhnert and Christian Wietfeld Cloud voice service as over-the-top solution for seamless voice call continuity in a heterogeneous network environment . . . . . . . . . . . . . . 250--262 Yusen Li and Wentong Cai Update schedules for improving consistency in multi-server distributed virtual environments . . . . . . . . . . 263--273 Fan Li and Jinsheng Sun and Moshe Zukerman and Zhengfei Liu and Qin Xu and Sammy Chan and Guanrong Chen and King-Tim Ko A comparative simulation study of TCP/AQM systems for evaluating the potential of neuron-based AQM schemes 274--299 Govind P. Gupta and Manoj Misra and Kumkum Garg Energy and trust aware mobile agent migration protocol for data aggregation in wireless sensor networks . . . . . . 300--311 Mehrnaz Moudi and Mohamed Othman A GreedyZero algorithm to minimise the conflicts in an Optical Multistage Interconnection Network . . . . . . . . 312--318 Álvaro Rubio-Largo and Miguel A. Vega-Rodríguez and David L. González-Álvarez Performance assessment of multiobjective approaches in optical Traffic Grooming 319--350 Li Yi and Huachun Zhou and Daochao Huang and Hongke Zhang An analytical study of distributed mobility management schemes with a flow duration based model . . . . . . . . . . 351--357 Lingfang Zeng and Bharadwaj Veeravalli and Qingsong Wei Space4time: Optimization latency-sensitive content service in cloud . . . . . . . . . . . . . . . . . 358--368 Satoshi Utsumi and Salahuddin Muhammad Salim Zabir A new high-performance TCP friendly congestion control over wireless networks . . . . . . . . . . . . . . . . 369--378 Qingyang Song and Zhaolong Ning and Yang Huang and Lei Guo and Xiaobing Lu Joint power control and spectrum access in cognitive radio networks . . . . . . 379--388 Nima Jafari Navimipour and Amir Masoud Rahmani and Ahmad Habibizad Navin and Mehdi Hosseinzadeh Resource discovery mechanisms in grid systems: a survey . . . . . . . . . . . 389--410 Ying Li and Radim Bartos A survey of protocols for Intermittently Connected Delay-Tolerant Wireless Sensor Networks . . . . . . . . . . . . . . . . 411--423 Sunilkumar S. Manvi and Gopal Krishna Shyam Resource management for Infrastructure as a Service (IaaS) in cloud computing: a survey . . . . . . . . . . . . . . . . 424--440 Ssu-Hsuan Lu and Kuan-Ching Li and Kuan-Chou Lai and Yeh-Ching Chung Effectiveness of a replica mechanism to improve availability with Arrangement Graph-Based Overlay . . . . . . . . . . 441--450 Abderrazak Abdaoui and Tarek M. El-Fouly TOSSIM and distributed binary consensus algorithm in wireless sensor networks 451--458 R. Q. Shaddad and A. B. Mohammad and S. A. Al-Gailani and A. M. Al-hetar and M. A. Elmagzoub A survey on access technologies for broadband optical and wireless networks 459--472 Ayesha Binte Ashfaq and Sajjad Rizvi and Mobin Javed and Syed Ali Khayam and Muhammad Qasim Ali and Ehab Al-Shaer Information theoretic feature space slicing for statistical anomaly detection . . . . . . . . . . . . . . . 473--487 Ratnadip Adhikari A meticulous study of various medium access control protocols for wireless sensor networks . . . . . . . . . . . . 488--504 Jesús Friginal and Juan-Carlos Ruiz and David de Andrés and Antonio Bustos Ambient noise in wireless mesh networks: Evaluation and proposal of an adaptive algorithm to mitigate link removal . . . 505--516 Shazana Md Zin and Nor Badrul Anuar and Miss Laiha Mat Kiah and Al-Sakib Khan Pathan Routing protocol design for secure WSN: Review and open research issues . . . . 517--530 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Jinyuan Jia and Wei Wang and Xiaojun Hei An efficient caching algorithm for peer-to-peer $3$D streaming in distributed virtual environments . . . . 1--11 Qin Xu and Jinsheng Sun A simple active queue management based on the prediction of the packet arrival rate . . . . . . . . . . . . . . . . . . 12--20 Mehdi Naderi Soorki and Habib Rostami Label switched protocol routing with guaranteed bandwidth and end to end path delay in MPLS networks . . . . . . . . . 21--38 Víctor Mateu and Francesc Sebé and Magda Valls Constructing credential-based E-voting systems from offline E-coin protocols 39--44 Poria Pirozmand and Guowei Wu and Behrouz Jedari and Feng Xia Human mobility in opportunistic networks: Characteristics, models and prediction methods . . . . . . . . . . . 45--58 Abbas Mehdizadeh and Fazirulhisyam Hashim and Mohamed Othman Lightweight decentralized multicast-unicast key management method in wireless IPv6 networks . . . . . . . 59--69 Guangjie Han and Jia Chao and Chenyu Zhang and Lei Shu and Qingwu Li The impacts of mobility models on DV-hop based localization in Mobile Wireless Sensor Networks . . . . . . . . . . . . 70--79 Hadi Shakibian and Nasrollah Moghadam Charkari In-cluster vector evaluated particle swarm optimization for distributed regression in WSNs . . . . . . . . . . . 80--91 Nadine Akkari and Ghadah Aldabbagh and Michel Nahas and John Cioffi Dynamic Clustering Protocol for coordinated tethering over cellular networks . . . . . . . . . . . . . . . . 92--101 Shahaboddin Shamshirband and Nor Badrul Anuar and Miss Laiha Mat Kiah and Vala Ali Rohani and Dalibor Petkovi\'c and Sanjay Misra and Abdul Nasir Khan Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks . . . . . . . . 102--117 Jordán Pascual Espada and Ronald R. Yager and Bin Guo Internet of Things: Smart things network and communication . . . . . . . . . . . 118--119 Zheng Yan and Peng Zhang and Athanasios V. Vasilakos A survey on trust management for Internet of Things . . . . . . . . . . . 120--134 Wei Xie and Lei Xie and Chen Zhang and Qiang Wang and Jian Xu and Quan Zhang and Chaojing Tang RFID seeking: Finding a lost tag rather than only detecting its missing . . . . 135--142 Lianbo Ma and Kunyuan Hu and Yunlong Zhu and Hanning Chen Cooperative artificial bee colony algorithm for multi-objective RFID network planning . . . . . . . . . . . . 143--162 Hicham Lakhlef and Hakim Mabed and Julien Bourgeois Optimization of the logical topology for mobile MEMS networks . . . . . . . . . . 163--177 Guillermo Cueva-Fernandez and Jordán Pascual Espada and Vicente García-Díaz and Cristian González García and Nestor Garcia-Fernandez Vitruvius: an expert system for vehicle sensor tracking and managing application generation . . . . . . . . . . . . . . . 178--188 Jiajun Sun and Huadong Ma Heterogeneous-belief based incentive schemes for crowd sensing in mobile social networks . . . . . . . . . . . . 189--196 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Yasir Saleem and Mubashir Husain Rehmani Primary radio user activity models for cognitive radio networks: a survey . . . 1--16 Dong Ma and Maode Ma Network selection and resource allocation for multicast in HetNets . . 17--26 Gongqi Lin and Sieteng Soh and Kwan-Wu Chin and Mihai Lazarescu Energy Aware Two Disjoint Paths Routing 27--41 Zheng Xu and Yunhuai Liu and Lin Mei and Chuanping Hu and Lan Chen Generating temporal semantic context of concepts using web search engines . . . 42--55 JuiHsi Fu and PoChing Lin and SingLing Lee Detecting spamming activities in a campus network using incremental learning . . . . . . . . . . . . . . . . 56--65 Mohamed A. Alrshah and Mohamed Othman and Borhanuddin Ali and Zurina Mohd Hanapi Comparative study of high-speed Linux TCP variants over high-BDP networks . . 66--75 Xiaoping Wu and GuoYing Wang and Dan Dai and Mengjun Tong Accurate acoustic energy-based localization with beacon position uncertainty in wireless sensor networks 76--83 Abdullah Gani and Golam Mokatder Nayeem and Muhammad Shiraz and Mehdi Sookhak and Md Whaiduzzaman and Suleman Khan A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing . . . . . . . . . 84--102 Eduardo da Silva and Luiz Carlos P. Albini Middleware proposals for mobile ad hoc networks . . . . . . . . . . . . . . . . 103--120 Mehdi Sookhak and Hamid Talebian and Ejaz Ahmed and Abdullah Gani and Muhammad Khurram Khan A review on remote data auditing in single cloud server: Taxonomy and open issues . . . . . . . . . . . . . . . . . 121--141 Hui-Shyong Yeo and Xiao-Shen Phang and Hoon-Jae Lee and Hyotaek Lim Leveraging client-side storage techniques for enhanced use of multiple consumer cloud storage services on resource-constrained mobile devices . . 142--156 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mohammad Reza Jabbarpour and Rafidah Md Noor and Rashid Hafeez Khokhar and Chih-Heng Ke Cross-layer congestion control model for urban vehicular environments . . . . . . 1--16 Jiyan Wu and Bo Cheng and Yanlei Shang and Jun Huang and Junliang Chen A novel scheduling approach to concurrent multipath transmission of high definition video in overlay networks . . . . . . . . . . . . . . . . 17--29 Amr El Mougy and Aymen Kamoun and Mohamed Ibnkahla and Sa\"\id Tazi and Khalil Drira A context and application-aware framework for resource management in dynamic collaborative wireless M2M networks . . . . . . . . . . . . . . . . 30--45 Anindya Iqbal and Manzur Murshed On demand-driven movement strategy for moving beacons in sensor localization 46--62 Guo-Song Tian and Yu-Chu Tian and Colin Fidge Precise relative clock synchronization for distributed control using TSC registers . . . . . . . . . . . . . . . 63--71 Víctor Fernández and Juan Manuel Orduña and Pedro Morillo Server implementations for improving the performance of CAR systems based on mobile phones . . . . . . . . . . . . . 72--82 Khairul Azami Sidek and Vu Mai and Ibrahim Khalil Data mining in mobile ECG based biometric identification . . . . . . . . 83--91 Guoxing Jiang and Jun Chen and Yanqing Shen Delivery ratio- and buffered time-constrained: Multicasting for Delay Tolerant Networks . . . . . . . . . . . 92--105 Ying-Dar Lin and Ekarat Rattagan and Yuan-Cheng Lai and Li-Pin Chang and Yun-Chien Yo and Cheng-Yuan Ho and Shun-Lee Chang Calibrating parameters and formulas for process-level energy consumption profiling in smartphones . . . . . . . . 106--119 Wenjia Niu and Gang Li and Endong Tong and Quan Z. Sheng and Qian Li and Yue Hu and Athanasios V. Vasilakos and Li Guo A block-aware hybrid data dissemination with hotspot elimination in wireless sensor network . . . . . . . . . . . . . 120--133 Hassina Nacer and Djamil Aissani Semantic web services: Standards, applications, challenges and solutions 134--151 Weiwei Fang and Zhulin An and Lei Shu and Qingyu Liu and Yongjun Xu and Yuan An Achieving optimal admission control with dynamic scheduling in energy constrained network systems . . . . . . . . . . . . 152--160 Jiyan Wu and Yanlei Shang and Chau Yuen and Bo Cheng and Junliang Chen TRADER: a reliable transmission scheme to video conferencing applications over the Internet . . . . . . . . . . . . . . 161--171 Changqing Ji and Zhiyang Li and Wenyu Qu and Yujie Xu and Yuanyuan Li Scalable nearest neighbor query processing based on Inverted Grid Index 172--182 Shaahin Madani and Ibrahim Khalil Garbled Routing (GR): a generic framework towards unification of anonymous communication systems . . . . 183--195 Pooia Lalbakhsh and Bahram Zaeri and Yi-Ping Phoebe Chen Using Dead Ants to improve the robustness and adaptability of AntNet routing algorithm . . . . . . . . . . . 196--211 Sudip Misra and P. Venkata Krishna and V. Saritha and Harshit Agarwal and Aditya Ahuja Learning automata-based multi-constrained fault-tolerance approach for effective energy management in smart grid communication network . . 212--219 Israat Tanzeena Haque A sensor based indoor localization through fingerprinting . . . . . . . . . 220--229 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Abbas Bradai and Toufik Ahmed and Raouf Boutaba and Reaz Ahmed Efficient content delivery scheme for layered video streaming in large-scale networks . . . . . . . . . . . . . . . . 1--14 Jenhui Chen and Zhuxiu Yuan and Lei Wang An apropos signal report and adaptive period (ASAP) scheme for fast handover in the fourth-generation wireless networks . . . . . . . . . . . . . . . . 15--26 An Huang and Bing Hu The optimal joint sequence design in the feedback-based two-stage switch . . . . 27--34 Jun Huang and Guoquan Liu and Qiang Duan On modeling and optimization for composite network-Cloud service provisioning . . . . . . . . . . . . . . 35--43 Junaid Qadir and Adeel Baig and Asad Ali and Quratulain Shafi Multicasting in cognitive radio networks: Algorithms, techniques and protocols . . . . . . . . . . . . . . . 44--61 Vandana Kushwaha and Ratneshwer Gupta Congestion control for high-speed wired network: a systematic literature review 62--78 Kok-Lim Alvin Yau and Nordin Ramli and Wahidah Hashim and Hafizal Mohamad Clustering algorithms for Cognitive Radio networks: a survey . . . . . . . . 79--95 Mohammad Iftekhar Husain and Steven Y. Ko and Steve Uurtamo and Atri Rudra and Ramalingam Sridhar Bidirectional data verification for cloud storage . . . . . . . . . . . . . 96--107 Saurabh Kumar Garg and Adel Nadjaran Toosi and Srinivasa K. Gopalaiyengar and Rajkumar Buyya SLA-based virtual machine management for heterogeneous workloads in a cloud datacenter . . . . . . . . . . . . . . . 108--120 Yan Zhu and Di Ma and Changjun Hu and Gail-Joon Ahn and Hongxin Hu Secure and efficient random functions with variable-length output . . . . . . 121--133 Le Sun and Hai Dong and Farookh Khadeer Hussain and Omar Khadeer Hussain and Elizabeth Chang Cloud service selection: State-of-the-art and future research directions . . . . . . . . . . . . . . . 134--150 Gurpreet Singh and Neeraj Kumar and Anil Kumar Verma ANTALG: an Innovative ACO based Routing Algorithm for MANETs . . . . . . . . . . 151--167 Fatima Zohra Benhamida and Yacine Challal and Mouloud Koudil Adaptive failure detection in low power lossy wireless sensor networks . . . . . 168--180 Julio Dondo and Felix Villanueva and David Garcia and David Vallejo and Carlos Glez-Morcillo and Juan Carlos Lopez Distributed FPGA-based architecture to support indoor localisation and orientation services . . . . . . . . . . 181--190 Rawya Rizk and Walaa Saber and Hany Harb Conditional clustered matrix factorization based network coordinate system . . . . . . . . . . . . . . . . . 191--202 Masoume Jabbarifar and Michel Dagenais LIANA: Live incremental time synchronization of traces for distributed systems analysis . . . . . . 203--214 Yosra Ben Saied and Alexis Olivereau and Djamal Zeghlache and Maryline Laurent A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications . . . . . 215--227 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Ivanilton Polato and Reginaldo Ré and Alfredo Goldman and Fabio Kon A comprehensive view of Hadoop research --- a systematic literature review . . . 1--25 Hosein Mohamadi and Shaharuddin Salleh and Mohd Norsyarizad Razali Heuristic methods to maximize network lifetime in directional sensor networks with adjustable sensing ranges . . . . . 26--35 Farzaneh R. Armaghani and Iqbal Gondal and Joarder Kamruzzaman and David G. Green Sensor selection for tracking multiple groups of targets . . . . . . . . . . . 36--47 Congduc Pham Communication performances of IEEE 802.15.4 wireless sensor motes for data-intensive applications: a comparison of WaspMote, Arduino MEGA, TelosB, MicaZ and iMote2 for image surveillance . . . . . . . . . . . . . . 48--59 Haidar Safa and Marcel Karam and Bassam Moussa PHAODV: Power aware heterogeneous routing protocol for MANETs . . . . . . 60--71 Ning Liu and Xiaoping Li and Weiming Shen Multi-granularity resource virtualization and sharing strategies in cloud manufacturing . . . . . . . . . . 72--82 Tarek Khalifa and Atef Abdrabou and Khaled Bashir Shaban and Maazen Alsabaan and Kshirasagar Naik Transport layer performance analysis and optimization for smart metering infrastructure . . . . . . . . . . . . . 83--93 Jing Qin and Hongwei Duan and Huawei Zhao and Jiankun Hu A new Lagrange solution to the privacy-preserving general geometric intersection problem . . . . . . . . . . 94--99 Omessaad Hamdi and Mohamed Aymen Chalouf and Dramane Ouattara and Francine Krief eHealth: Survey on research projects, comparative study of telemonitoring architectures and main issues . . . . . 100--112 Vesal Hakami and Mehdi Dehghan Efficient broadcasting in slow fading wireless ad-hoc networks . . . . . . . . 113--123 Ing-Chau Chang and Eric Jui-Lin Lu and Shiuan-Yin Huang and Yi-Hui Chen An RDF-based P2P overlay network supporting range and wildcard queries 124--138 Kh Mahmudul Alam and Joarder Kamruzzaman and Gour Karmakar and Manzur Murshed Dynamic adjustment of sensing range for event coverage in wireless sensor networks . . . . . . . . . . . . . . . . 139--153 Seytkamal Medetov and Mohamed Bakhouya and Jaafar Gaber and Khalid Zinedine and Maxime Wack and Pascal Lorenz A decentralized approach for information dissemination in Vehicular Ad hoc Networks . . . . . . . . . . . . . . . . 154--165 Muhammad Zubair Farooqi and Salma Malik Tabassum and Mubashir Husain Rehmani and Yasir Saleem A survey on network coding: From traditional wireless networks to emerging cognitive radio networks . . . 166--181 Cüneyt Sevgi and Altan Koçyigit Optimal deployment in randomly deployed heterogeneous WSNs: a connected coverage approach . . . . . . . . . . . . . . . . 182--197 M. Mehdi Afsar and Mohammad-H. Tayarani-N Clustering in sensor networks: a literature survey . . . . . . . . . . . 198--226 Panayiotis G. Andreou and Demetrios Zeinalipour-Yazti and George S. Samaras and Panos K. Chrysanthis A network-aware framework for energy-efficient data acquisition in wireless sensor networks . . . . . . . . 227--240 David H. S. Lima and Andre L. L. Aquino and Heitor S. Ramos and Eliana S. Almeida and Joel J. P. C. Rodrigues OASys: an opportunistic and agile system to detect free on-street parking using intelligent boards embedded in surveillance cameras . . . . . . . . . . 241--249 Abderrahim Benslimane and Jiankun Hu and Xuemin (Sherman) Shen Special issue on ``Quality of service in wireless and mobile networking'' . . . . 250--251 Meng-Shiuan Pan and Ping-Lin Liu Low latency scheduling for convergecast in ZigBee tree-based wireless sensor networks . . . . . . . . . . . . . . . . 252--263 Neeraj Kumar and Sudhanshu Tyagi and Der-Jiunn Deng LA-EEHSC: Learning automata-based energy efficient heterogeneous selective clustering for wireless sensor networks 264--279 Adnan Shahid and Saleem Aslam and Hyung Seok Kim and Kyung-Geun Lee Distributed joint resource and power allocation in self-organized femtocell networks: a potential game approach . . 280--292 Miloud Bagaa and Mohamed Younis and Adlen Ksentini and Nadjib Badache Reliable multi-channel scheduling for timely dissemination of aggregated data in wireless sensor networks . . . . . . 293--304 Peijian Ju and Wei Song and A-Long Jin and Dizhi Zhou Performance analysis and enhancement for a cooperative wireless diversity network with spatially random mobile helpers . . 305--314 Ruichun Tang and Yuanzhen Yue and Xiangqian Ding and Yue Qiu Credibility-based cloud media resource allocation algorithm . . . . . . . . . . 315--321 Li Jun Zhang and Samuel Pierre An enhanced fast handover with seamless mobility support for next-generation wireless networks . . . . . . . . . . . 322--335 K. Ivesic and L. Skorin-Kapov and M. Matijasevic Cross-layer QoE-driven admission control and resource allocation for adaptive multimedia services in LTE . . . . . . . 336--351 Sonia Ben Rejeb and Nidal Nasser and Sami Tabbane A novel resource allocation scheme for LTE network in the presence of mobility 352--361 Nourch\`ene Bradai and Lamia Chaari Fourati and Lotfi Kamoun Investigation and performance analysis of MAC protocols for WBAN networks . . . 362--373 Jacques M. Bahi and Christophe Guyeux and Mourad Hakem and Abdallah Makhoul Epidemiological approach for data survivability in unattended wireless sensor networks . . . . . . . . . . . . 374--383 Zhi Liu and Jingyun Feng and Yusheng Ji and Yongbing Zhang EAF: Energy-aware adaptive free viewpoint video wireless transmission 384--394 Abderrezak Rachedi and Hakim Badis and Abderrahim Benslimane How MIMO cross-layer design enables QoS while detecting non-cooperative nodes in wireless multi-hop networks . . . . . . 395--406 Tao Huang and Baoliu Ye and Song Guo and Sanglu Lu Delay minimization by exploring full-duplex capacity and relay-based cooperative scheduling in WLANs . . . . 407--417 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Ali Moussaoui and Abdallah Boukeream A survey of routing protocols based on link-stability in mobile ad hoc networks 1--10 T. Daniel Wallace and Khalim Amjad Meerja and Abdallah Shami On-demand scheduling for concurrent multipath transfer using the stream control transmission protocol . . . . . 11--22 G. Campobello and O. Giordano and A. Segreto and S. Serrano Comparison of local lossless compression algorithms for Wireless Sensor Networks 23--31 Raed Alsaqour and Maha Abdelhaq and Rashid Saeed and Mueen Uddin and Ola Alsukour and Mohammed Al-Hubaishi and Tariq Alahdal Dynamic packet beaconing for GPSR mobile ad hoc position-based routing protocol using fuzzy logic . . . . . . . . . . . 32--46 Muhammad Shiraz and Mehdi Sookhak and Abdullah Gani and Syed Adeel Ali Shah A Study on the Critical Analysis of Computational Offloading Frameworks for Mobile Cloud Computing . . . . . . . . . 47--60 Anna Maria Vegni and Enrico Natalizio Forwarder smart selection protocol for limitation of broadcast storm problem 61--71 Xiaobo Ma and Junjie Zhang and Zhenhua Li and Jianfeng Li and Jing Tao and Xiaohong Guan and John C. S. Lui and Don Towsley Accurate DNS query characteristics estimation via active probing . . . . . 72--84 Jaime Garcia-Reinoso and Norberto Fernández and Ivan Vidal and Jesús Arias Fisteus Scalable data replication in content-centric networking based on alias names . . . . . . . . . . . . . . 85--98 Rafael Weingärtner and Gabriel Beims Bräscher and Carlos Becker Westphall Cloud resource management: a survey on forecasting and profiling models . . . . 99--106 Hela Mliki and Lamia Chaari and Lotfi Kamoun A comprehensive survey on Carrier Ethernet Congestion Management mechanism 107--130 Angela Sara Cacciapuoti and Marcello Caleffi and Luigi Paura and Md Arafatur Rahman Channel availability for mobile cognitive radio networks . . . . . . . . 131--136 Lutful Karim and N. Nasser and Q. H. Mahmoud and Alagan Anpalagan and T. E. Salti Range-free localization approach for M2M communication system using mobile anchor nodes . . . . . . . . . . . . . . . . . 137--146 Subir Halder and Sipra Das Bit Design of an Archimedes' spiral based node deployment scheme targeting enhancement of network lifetime in wireless sensor networks . . . . . . . . 147--167 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Massimo Vecchio and Roberto López-Valcarce Improving area coverage of wireless sensor networks via controllable mobile nodes: a greedy approach . . . . . . . . 1--13 Ruiying Li and Jingfu Wang and Haitao Liao and Ning Huang A new method for reliability allocation of avionics connected via an airborne network . . . . . . . . . . . . . . . . 14--21 Alejandro Ruiz-Rivera and Kwan-Wu Chin and Sieteng Soh A novel framework to mitigate the negative impacts of green techniques on BGP . . . . . . . . . . . . . . . . . . 22--34 Wei Li and Wei Zhang Coverage hole and boundary nodes detection in wireless sensor networks 35--43 Adnan Akhunzada and Mehdi Sookhak and Nor Badrul Anuar and Abdullah Gani and Ejaz Ahmed and Muhammad Shiraz and Steven Furnell and Amir Hayat and Muhammad Khurram Khan Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions . . . . . . . . . . . 44--57 Muhammad Ashad Kabir and Jun Han and Bonghee Hong Reader level filtering for efficient query processing in RFID middleware . . 58--70 Bin Liao and Jiong Yu and Tao Zhang and Guo Binglei and Sun Hua and Changtian Ying Energy-efficient algorithms for distributed storage system based on block storage structure reconfiguration 71--86 Chien-Fu Cheng and Kuo-Tang Tsai A recursive Byzantine-resilient protocol 87--98 Jieyao Liu and Ejaz Ahmed and Muhammad Shiraz and Abdullah Gani and Rajkumar Buyya and Ahsan Qureshi Application partitioning algorithms in mobile cloud computing: Taxonomy, review and future directions . . . . . . . . . 99--117 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Xianfu Meng and Yanli Wang and Yue Gong Perspective of space and time based replica population organizing strategy in unstructured peer-to-peer networks 1--14 Jia Hao Kong and Li-Minn Ang and Kah Phooi Seng A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments . . . 15--50 Peiyan Yuan and Ping Liu Data fusion prolongs the lifetime of mobile sensing networks . . . . . . . . 51--59 Faiza Nawaz and Varun Jeoti NFRA-C, neighbor friendly reader to reader anti-collision protocol with counters for dense reader environments 60--67 Xiaonan Wang and Deguang Le and Yufeng Yao and Conghua Xie Location-based mobility support for 6LoWPAN wireless sensor networks . . . . 68--77 Ying Zhang and Houkuan Huang and Hui He and Jing Teng and Zhuxiao Wang Efficient distributed semantic based data and service unified discovery with one-dimensional semantic space . . . . . 78--87 Amir Masoud Rahmani and Zeinab Fadaie and Anthony T. Chronopoulos Data placement using Dewey Encoding in a hierarchical data grid . . . . . . . . . 88--98 Hendrik Moens and Filip De Turck Shared resource network-aware impact determination algorithms for service workflow deployment with partial cloud offloading . . . . . . . . . . . . . . . 99--111 Qazi Mamoon Ashraf and Mohamed Hadi Habaebi Autonomic schemes for threat mitigation in Internet of Things . . . . . . . . . 112--127 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Babak Daghighi and Miss Laiha Mat Kiah and Shahaboddin Shamshirband and Muhammad Habib Ur Rehman Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges . . . . . . . 1--14 Yasir Saleem and Mubashir Husain Rehmani and Sherali Zeadally Integration of Cognitive Radio Technology with unmanned aerial vehicles: Issues, opportunities, and future research challenges . . . . . . . 15--31 Laisen Nie and Dingde Jiang and Lei Guo A convex optimization-based traffic matrix estimation approach in IP-over-WDM backbone networks . . . . . 32--38 Lingfang Zeng and Bharadwaj Veeravalli and Albert Y. Zomaya An integrated task computation and data management scheduling strategy for workflow applications in cloud environments . . . . . . . . . . . . . . 39--48 Lorena González-Manzano and Agustin Orfila An efficient confidentiality-preserving Proof of Ownership for deduplication . . 49--59 Jonathan Loo and Mahdi Aiash Special issue on information-centric network architecture, protocols, algorithms and applications . . . . . . 60--63 Jonathan Loo and Mahdi Aiash Challenges and solutions for secure information centric networks: a case study of the NetInf architecture . . . . 64--72 Mahdi Aiash and Jonathan Loo An integrated authentication and authorization approach for the network of information architecture . . . . . . 73--79 Mingwei Xu and Zhongxing Ming and Chunmei Xia and Jia Ji and Dan Li and Dan Wang SIONA: a Service and Information Oriented Network Architecture . . . . . 80--91 Charilaos Stais and George Xylomenos and Alexios Voulimeneas A reliable multicast transport protocol for information-centric networks . . . . 92--100 Dabin Kim and Sung-Won Lee and Young-Bae Ko and Jae-Hoon Kim Cache capacity-aware content centric networking under flash crowds . . . . . 101--113 Paulo Mendes Combining data naming and context awareness for pervasive networks . . . . 114--125 Bander A. Alzahrani and Martin J. Reed and Janne Riihijärvi and Vassilios G. Vassilakis Scalability of information centric networking using mediated topology management . . . . . . . . . . . . . . . 126--133 Xiuquan Qiao and Guoshun Nan and Yue Peng and Lei Guo and Jingwen Chen and Yunlei Sun and Junliang Chen NDNBrowser: an extended web browser for named data networking . . . . . . . . . 134--147 Marica Amadeo and Claudia Campolo and Antonella Molinaro Forwarding strategies in named data wireless ad hoc networks: Design and evaluation . . . . . . . . . . . . . . . 148--158 S. Eum and Y. Shoji and M. Murata and N. Nishinaga Design and implementation of ICN-enabled IEEE 802.11 access points as nano data centers . . . . . . . . . . . . . . . . 159--167 Lingwei Zhang and Yuhui Deng and Weiheng Zhu and Jipeng Zhou and Frank Wang Skewly replicating hot data to construct a power-efficient storage cluster . . . 168--179 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Jack Fernando Bravo-Torres and Martín López-Nores and Yolanda Blanco-Fernández and José Juan Pazos-Arias and Manuel Ramos-Cabrer and Alberto Gil-Solla An improved virtualization layer to support distribution of multimedia contents in pervasive social applications . . . . . . . . . . . . . . 1--17 Víctor Berrocal-Plaza and Miguel A. Vega-Rodríguez and Juan M. Sánchez-Pérez Optimizing the mobility management task in networks of four world capital cities 18--28 M. Sajid Mushtaq and Scott Fowler and Abdelhamid Mellouk and Brice Augustin QoE/QoS-aware LTE downlink scheduler for VoIP with power saving . . . . . . . . . 29--46 Kun Huang and Gaogang Xie and Yanbiao Li and Dafang Zhang Memory-efficient IP lookup using trie merging for scalable virtual routers . . 47--58 Yu Liu and Bin Guo and Chi Zhou and Yu Cheng Network-coded cooperative information recovery in cellular/802.11 mobile Networks . . . . . . . . . . . . . . . . 59--67 Linfeng Liu and Ningshen Zhang and Ye Liu Topology control models and solutions for signal irregularity in mobile underwater wireless sensor networks . . 68--90 Rajesh Anbazhagan and Nakkeeran Rangaswamy Investigations on enhanced power saving mechanism for IEEE 802.16m network with heterogeneous traffic . . . . . . . . . 91--101 Behnam Dezfouli and Marjan Radi and Shukor Abd Razak and Tan Hwee-Pink and Kamalrulnizam Abu Bakar Modeling low-power wireless communications . . . . . . . . . . . . . 102--126 Mohammed Atiquzzaman Editorial . . . . . . . . . . . . . . . 127--129 Cüneyt Sevgi and Altan Koçyigit Corrigendum to ``Optimal deployment in randomly deployed heterogeneous WSNs: a connected coverage approach'' [J. Netw. Comput. Appl. \bf 46, (2014), 182--197] 130 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Athanasios V. Vasilakos and Zhe Li and Gwendal Simon and Wei You Information centric network: Research challenges and opportunities . . . . . . 1--10 Raja Wasim Ahmad and Abdullah Gani and Siti Hafizah Ab. Hamid and Muhammad Shiraz and Abdullah Yousafzai and Feng Xia A survey on virtual machine migration and server consolidation frameworks for cloud data centers . . . . . . . . . . . 11--25 Ying-Dar Lin and Minh-Tuan Thai and Chih-Chiang Wang and Yuan-Cheng Lai Two-tier project and job scheduling for SaaS cloud service providers . . . . . . 26--36 Elizabeth A. Thompson and Charles McIntosh and James Isaacs and Eric Harmison and Ross Sneary Robot communication link using 802.11n or 900 MHz OFDM . . . . . . . . . . . . 37--51 Ejaz Ahmed and Abdullah Gani and Mehdi Sookhak and Siti Hafizah Ab Hamid and Feng Xia Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges . . . . . . . . . . . . 52--68 Guodong Sun and Lin Zhao and Zhibo Chen and Guofu Qiao Effective link interference model in topology control of wireless ad hoc and sensor networks . . . . . . . . . . . . 69--78 Hao Ji and Lei Xie and Chuyu Wang and Yafeng Yin and Sanglu Lu CrowdSensing: a crowd-sourcing based indoor navigation using RFID-based delay tolerant network . . . . . . . . . . . . 79--89 Ming Tao and Shuqiang Huang and Yang Li and Min Yan and Yuyu Zhou SA-PSO based optimizing reader deployment in large-scale RFID Systems 90--100 Ali Ghaffari Congestion control mechanisms in wireless sensor networks: a survey . . . 101--115 Riham S. Y. Elhabyan and Mustapha C. E. Yagoub Two-tier particle swarm optimization protocol for clustering and routing in wireless sensor network . . . . . . . . 116--128 Tien Van Do and Nam H. Do and Ádám Horváth and Jinting Wang Modelling opportunistic spectrum renting in mobile cellular networks . . . . . . 129--138 Wei Jiang and Yue Ma and Xia Zhang and Xupeng Wang and Zili Shao Adaptive security management of real-time storage applications over NAND based storage systems . . . . . . . . . 139--153 Ejaz Ahmed and Abdullah Gani and Muhammad Khurram Khan and Rajkumar Buyya and Samee U. Khan Seamless application execution in mobile cloud computing: Motivation, taxonomy, and open challenges . . . . . . . . . . 154--172 Athar Ali Khan and Mubashir Husain Rehmani and Yasir Saleem Neighbor discovery in traditional wireless networks and cognitive radio networks: Basics, taxonomy, challenges and future research directions . . . . . 173--190 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Amin Ebrahimzadeh and Akbar Ghaffarpour Rahbar and Behrooz Alizadeh QoS aware green routing and wavelength assignment in core WDM networks . . . . 1--13 Engin Arslan and Murat Yuksel and Mehmet Hadi Gunes Training network administrators in a game-like environment . . . . . . . . . 14--23 Sérgio Figueiredo and Seil Jeon and Diogo Gomes and Rui L. Aguiar D3M: Multicast listener mobility support mechanisms over distributed mobility anchoring architectures . . . . . . . . 24--38 Sudeep Tanwar and Neeraj Kumar and Joel J. P. C. Rodrigues A systematic review on heterogeneous routing protocols for wireless sensor network . . . . . . . . . . . . . . . . 39--56 Yong Wang and Yun Xia and Jie Hou and Shi-meng Gao and Xiao Nie and Qi Wang A fast privacy-preserving framework for continuous location-based queries in road networks . . . . . . . . . . . . . 57--73 S. Arunkumar and M. Srivatsa and M. Rajarajan A review paper on preserving privacy in mobile environments . . . . . . . . . . 74--90 Abdelali Boushaba and Adil Benabbou and Rachid Benabbou and Azeddine Zahi and Mohammed Oumsis Multi-point relay selection strategies to reduce topology control traffic for OLSR protocol in MANETs . . . . . . . . 91--102 Jingyuan Wang and Jiangtao Wen and Chao Li and Zhang Xiong and Yuxing Han DC-Vegas: a delay-based TCP congestion control algorithm for datacenter applications . . . . . . . . . . . . . . 103--114 Valentina Caputi and Antonio Garrido Student-oriented planning of e-learning contents for Moodle . . . . . . . . . . 115--127 Chao-Liang Liu and Cheng-Jung Tsai and Ting-Yi Chang and Wang-Jui Tsai and Po-Kai Zhong Implementing multiple biometric features for a recall-based graphical keystroke dynamics authentication system on a smart phone . . . . . . . . . . . . . . 128--139 Zhongbao Zhang and Sen Su and Yikai Lin and Xiang Cheng and Kai Shuang and Peng Xu Adaptive multi-objective artificial immune system based virtual network embedding . . . . . . . . . . . . . . . 140--155 Zhiting Lin and XiuLong Wu Analyzing and modeling mobility for infrastructure-less communication . . . 156--163 Sara Modarres Razavi and Di Yuan and Fredrik Gunnarsson and Johan Moe On dynamic signaling congestion mitigation by overlapping tracking area lists . . . . . . . . . . . . . . . . . 164--172 Xiumin Wang and Chau Yuen and Xiaoming Chen and Naveed Ul Hassan and Yiming Ouyang Cost-aware demand scheduling for delay tolerant applications . . . . . . . . . 173--182 Mario Collotta FLBA: a fuzzy algorithm for load balancing in IEEE 802.11 networks . . . 183--192 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Imad Abdeljaouad and Ahmed Karmouch Monitoring IPTV quality of experience in overlay networks using utility functions 1--10 Yujie Liu and Yong Li and Yue Wang and Jian Yuan Optimal scheduling for multi-flow update in Software-Defined Networks . . . . . . 11--19 Saman Homayounnejad and Alireza Bagheri An efficient distributed max-flow algorithm for Wireless Sensor Networks 20--32 Tarek AlSkaif and Manel Guerrero Zapata and Boris Bellalta Game theory for energy efficiency in Wireless Sensor Networks: Latest trends 33--61 Leovigildo Sánchez-Casado and Gabriel Maciá-Fernández and Pedro García-Teodoro and Nils Aschenbruck Identification of contamination zones for sinkhole detection in MANETs . . . . 62--77 Maleeha Najam and Usman Younis and Raihan ur Rasool Speculative parallel pattern matching using stride-$k$ DFA for deep packet inspection . . . . . . . . . . . . . . . 78--87 Normalia Samian and Zuriati Ahmad Zukarnain and Winston K. G. Seah and Azizol Abdullah and Zurina Mohd Hanapi Cooperation stimulation mechanisms for wireless multihop networks: a survey . . 88--106 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Apostolos Malatras State-of-the-art survey on P2P overlay networks in pervasive computing environments . . . . . . . . . . . . . . 1--23 Aqsa Malik and Junaid Qadir and Basharat Ahmad and Kok-Lim Alvin Yau and Ubaid Ullah QoS in IEEE 802.11-based wireless networks: a contemporary review . . . . 24--46 Yaguang Lin and Xiaoming Wang and Lichen Zhang and Peng Li and Dan Zhang and Sen Liu The impact of node velocity diversity on mobile opportunistic network performance 47--58 Yingjie Wang and Guisheng Yin and Zhipeng Cai and Yuxin Dong and Hongbin Dong A trust-based probabilistic recommendation model for social networks 59--67 Diego F. Ramírez and Sandra Céspedes Routing in Neighborhood Area Networks: a survey in the context of AMI communications . . . . . . . . . . . . . 68--80 S. Liao and J. Sun and Y. Chen and Y. Wang and P. Zhang Distributed power control for wireless networks via the alternating direction method of multipliers . . . . . . . . . 81--88 Alireza Shameli-Sendi and Michel Dagenais ORCEF: Online response cost evaluation framework for intrusion response system 89--107 Zia-ur Rehman and Omar Khadeer Hussain and Farookh Khadeer Hussain User-side cloud service management: State-of-the-art and future directions 108--122 Shazana Md Zin and Nor Badrul Anuar and Miss Laiha Mat Kiah and Ismail Ahmedy Survey of secure multipath routing protocols for WSNs . . . . . . . . . . . 123--153 Kai Wang and Jun Li FREME: a pattern partition based engine for fast and scalable regular expression matching in practice . . . . . . . . . . 154--169 Dingqi Yang and Daqing Zhang and Longbiao Chen and Bingqing Qu NationTelescope: Monitoring and visualizing large-scale collective behavior in LBSNs . . . . . . . . . . . 170--180 Mohamed A. Alrshah and Mohamed Othman and Borhanuddin Ali and Zurina Mohd Hanapi Agile-SD: a Linux-based TCP congestion control algorithm for supporting high-speed and short-distance networks 181--190 Katja Cetinski and Matjaz B. Juric AME-WPC: Advanced model for efficient workload prediction in the cloud . . . . 191--201 Sudip Misra and Samaresh Bera and Tamoghna Ojha and Liang Zhou ENTICE: Agent-based energy trading with incomplete information in the smart grid 202--212 Vlasios Kasapakis and Damianos Gavalas Pervasive gaming: Status, trends and design principles . . . . . . . . . . . 213--236 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Amin Karami ACCPndn: Adaptive Congestion Control Protocol in Named Data Networking by learning capacities using optimized Time-Lagged Feedforward Neural Network 1--18 Zhaolong Ning and Qingyang Song and Lei Guo and Xiangjie Kong A novel adaptive spectrum allocation scheme for multi-channel multi-radio wireless mesh networks . . . . . . . . . 19--27 Minhaj Ahmad Khan A survey of computation offloading strategies for performance improvement of applications running on mobile devices . . . . . . . . . . . . . . . . 28--40 Sergio Ricciardi and Francesco Palmieri and Aniello Castiglione and Davide Careglio Energy efficiency of elastic frequency grids in multilayer IP/MPLS-over-flexgrid networks . . . . . 41--47 Ibrahim Abdullahi and Suki Arif and Suhaidi Hassan Survey on caching approaches in Information Centric Networking . . . . . 48--59 T. Hamrouni and C. Hamdeni and F. Ben Charrada Impact of the distribution quality of file replicas on replication strategies 60--76 M. S. S. Khan and Anup Kumar and Bin Xie and Prasanna K. Sahoo Network tomography application in mobile ad-hoc network using stitching algorithm 77--87 Giannis Haralabopoulos and Ioannis Anagnostopoulos and Sherali Zeadally Lifespan and propagation of information in On-line Social Networks: a case study based on Reddit . . . . . . . . . . . . 88--100 Esa Kerttula A novel federated strong mobile signature service --- the Finnish case 101--114 Maria Carla Calzarossa and Daniele Tessera Modeling and predicting temporal patterns of web content changes . . . . 115--123 Michael Till Beck and Andreas Fischer and Juan Felipe Botero and Claudia Linnhoff-Popien and Hermann de Meer Distributed and scalable embedding of virtual networks . . . . . . . . . . . . 124--136 Mohd Izuan Hafez Ninggal and Jemal H. Abawajy Utility-aware social network graph anonymization . . . . . . . . . . . . . 137--148 Sheng-Shih Wang and Chun-Chih Li and Hsieh-Wei Lin and Kuei-Ping Shih A passive self-configuration MAC protocol for supporting network management in IEEE 802.11-based multi-hop mobile ad hoc networks . . . . 149--157 Chi Chen and Xiaojie Zhu and Peisong Shen and Jing Yu and Hong Zou and Jiankun Hu SOLS: a scheme for outsourced location based service . . . . . . . . . . . . . 158--165 Keyvan RahimiZadeh and Morteza AnaLoui and Peyman Kabiri and Bahman Javadi Performance modeling and analysis of virtualized multi-tier applications under dynamic workloads . . . . . . . . 166--187 Veerabhadra R. Chandakanna and Valli K. Vatsavayi A sliding window based Self-Learning and Adaptive Load Balancer . . . . . . . . . 188--205 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Abbas Bradai and Abderrahim Benslimane and Kamal D. Singh Dynamic anchor points selection for mobility management in Software Defined Networks . . . . . . . . . . . . . . . . 1--11 Erdun Zhao and Liansheng Tan A PCA based optimization approach for IP traffic matrix estimation . . . . . . . 12--20 Younghoon Kim and Ikjun Yeom and Jun Bi and Yusung Kim Scalable and efficient file sharing in information-centric networking . . . . . 21--32 Gürkan Gür Energy-aware cache management at the wireless network edge for information-centric operation . . . . . 33--42 Qin Xu and Fan Li and Jinsheng Sun and Moshe Zukerman A new TCP/AQM system analysis . . . . . 43--60 Shin-Jer Yang and Yi-Ru Chen Design adaptive task allocation scheduler to improve MapReduce performance in heterogeneous clouds . . 61--70 Rup Kumar Deka and Kausthav Pratim Kalita and D. K. Bhattacharya and Jugal K. Kalita Network defense: Approach's, methods and techniques . . . . . . . . . . . . . . . 71--84 Suchetana Chakraborty and Sandip Chakraborty and Sukumar Nandi and Sushanta Karmakar Fault resilience in sensor networks: Distributed node-disjoint multi-path multi-sink forwarding . . . . . . . . . 85--101 Maristella Ribas and C. G. Furtado and José Neuman de Souza and Giovanni Cordeiro Barroso and Antão Moura and Alberto S. Lima and Flávio R. C. Sousa A Petri net-based decision-making framework for assessing cloud services adoption: the use of spot instances for cost reduction . . . . . . . . . . . . . 102--118 Wei Li and Jorge Portilla and Félix Moreno and Guixuan Liang and Teresa Riesgo Multiple feature points representation in target localization of wireless visual sensor networks . . . . . . . . . 119--128 Jiaoyan Chen and Bang Wang and Wenyu Liu Constructing perimeter barrier coverage with bistatic radar sensors . . . . . . 129--141 Amir Hossein Mohajerzadeh and Mohammad Hossein Yaghmaee and Afsane Zahmatkesh Efficient data collecting and target parameter estimation in wireless sensor networks . . . . . . . . . . . . . . . . 142--155 Yuhwa Suh and Kiyoung Kim and Aran Kim and Yongtae Shin A study on impact of wired access networks for green Internet . . . . . . 156--168 Mohammad Khanjary and Masoud Sabaei and Mohammad Reza Meybodi Critical density for coverage and connectivity in two-dimensional fixed-orientation directional sensor networks using continuum percolation . . 169--181 Dingde Jiang and Zhengzheng Xu and Wenqin Wang and Yuanting Wang and Yang Han A collaborative multi-hop routing algorithm for maximum achievable rate 182--191 Haythem Bany Salameh Spread spectrum-based coordination design for spectrum-agile wireless ad hoc networks . . . . . . . . . . . . . . 192--201 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Zhe Guo and Zheng Yan A Weighted Semi-Distributed Routing Algorithm for LEO satellite networks . . 1--11 Francesco Carrabs and Raffaele Cerulli and Ciriaco D'Ambrosio and Andrea Raiconi A hybrid exact approach for maximizing lifetime in sensor networks with complete and partial coverage constraints . . . . . . . . . . . . . . 12--22 Osama M. Hussain Rehman and Hadj Bourdoucen and Mohamed Ould-Khaoua Forward link quality estimation in VANETs for sender-oriented alert messages broadcast . . . . . . . . . . . 23--41 Raja Wasim Ahmad and Abdullah Gani and Siti Hafizah Ab. Hamid and Feng Xia and Muhammad Shiraz A Review on mobile application energy profiling: Taxonomy, state-of-the-art, and open research issues . . . . . . . . 42--59 B. Coll-Perales and J. Gozalvez and M. Sepulcre Empirical models of the communications performance of Multi-hop Cellular Networks using D2D . . . . . . . . . . . 60--72 Bassam J. Mohd and Thaier Hayajneh and Athanasios V. Vasilakos A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues . . . . . . . . . 73--93 Jianwei Niu and Danning Wang and Mohammed Atiquzzaman Copy limited flooding over opportunistic networks . . . . . . . . . . . . . . . . 94--107 Fatima Lamia Haddi and Mahfoud Bencha\"\iba A survey of incentive mechanisms in static and mobile P2P systems . . . . . 108--118 Ihab Ahmed Najm and Mahamod Ismail and Jaime Lloret and Kayhan Zrar Ghafoor and B. B. Zaidan and Abd Al-razak Tareq Rahem Improvement of SCTP congestion control in the LTE-A network . . . . . . . . . . 119--129 Amjad Hajjar and Jawad Khalife and Jesús Díaz-Verdejo Network traffic application identification based on message size analysis . . . . . . . . . . . . . . . . 130--143 Sheharbano Khattak and Zaafar Ahmed and Affan A. Syed and Syed Ali Khayam BotFlex: a community-driven tool for botnet detection . . . . . . . . . . . . 144--154 Guijuan Wang and Jiguo Yu and Dongxiao Yu and Haitao Yu and Li Feng and Pan liu DS--MAC: an energy efficient demand sleep MAC protocol with low latency for wireless sensor networks . . . . . . . . 155--164 Alireza Shameli-Sendi and Makan Pourzandi and Mohamed Fekih-Ahmed and Mohamed Cheriet Taxonomy of Distributed Denial of Service mitigation approaches for cloud computing . . . . . . . . . . . . . . . 165--179 Fang-Yie Leu and Chin-Yu Liu and Jung-Chun Liu and Fuu-Cheng Jiang and Heru Susanto S-PMIPv6: an intra-LMA model for IPv6 mobility . . . . . . . . . . . . . . . . 180--191 Jaime Lloret and Kayhan Zrar Ghafoor and Danda B. Rawat and Youssef Nasser Green network protocols and algorithms 192--193 Ruiqi Ding and Cristina Hava Muntean and Gabriel-Miro Muntean Energy-efficient device-differentiated cooperative adaptive multimedia delivery solution in wireless networks . . . . . 194--207 Zuhal Can and Murat Demirbas Smartphone-based data collection from wireless sensor networks in an urban environment . . . . . . . . . . . . . . 208--216 Miguel Rodríguez-Pérez and Sergio Herrería-Alonso and Manuel Fernández-Veiga and Cándido López-García An ant colonization routing algorithm to minimize network power consumption . . . 217--226 Mahmoud Sami and Nor Kamariah Noordin and Fazirulhysiam Hashim and Shamala Subramaniam and Ayyoub Akbari-Moghanjoughi An Energy-Aware Cross-Layer Cooperative MAC Protocol for Wireless Ad Hoc Networks . . . . . . . . . . . . . . . . 227--240 Chengming Li and Wenjing Liu and Lei Wang and Mingchu Li and Koji Okamura Energy-efficient quality of service aware forwarding scheme for Content-Centric Networking . . . . . . . 241--254 Seyed Iman PourEmami and Bahador Bakhshi On the trade-off between power-efficiency and blocking probability in fault-tolerant WDM networks . . . . . . . . . . . . . . . . 255--266 Anas Daghistani and Abderrahman Ben Khalifa and Ahmad Showail and Basem Shihada Green partial packet recovery in wireless sensor networks . . . . . . . . 267--279 Chih-Heng Ke and Chong-Yi Yang and Jiann-Liang Chen and Kayhan Zrar Ghafoor and Jaime Lloret Frame-based mapping mechanism for energy-efficient MPEG-4 video transmission over IEEE 802.11e networks with better quality of delivery . . . . 280--286 M. Bakhouya and J. Gaber and P. Lorenz Energy evaluation of AID protocol in Mobile Ad Hoc Networks . . . . . . . . . 287--293 Mohammad Reza Jabbarpour and Rafidah Md Noor and Rashid Hafeez Khokhar Green vehicle traffic routing system using ant-based algorithm . . . . . . . 294--308 Muhammad Faheem and Muhammad Zahid Abbas and Gurkan Tuna and Vehbi Cagri Gungor EDHRP: Energy efficient event driven hybrid routing protocol for densely deployed wireless sensor networks . . . 309--326 Gangyong Jia and Guangjie Han and Jinfang Jiang and Joel J. P. C. Rodrigues PARS: a scheduling of periodically active rank to optimize power efficiency for main memory . . . . . . . . . . . . 327--336 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Zhang Bing Zhou and Wendong Xiao and Jucheng Yang and Faming Gong Special issue on green networking, computing, and software systems . . . . 1--3 Jinfang Jiang and Guangjie Han and Hui Guo and Lei Shu and Joel J. P. C. Rodrigues Geographic multipath routing based on geospatial division in duty-cycled underwater wireless sensor networks . . 4--13 Qing Zhao and Congcong Xiong and Ce Yu and Chuanlei Zhang and Xi Zhao A new energy-aware task scheduling method for data-intensive applications in the cloud . . . . . . . . . . . . . . 14--27 Xiao Xue and Shufang Wang and Baoyun Lu Manufacturing service composition method based on networked collaboration mode 28--38 Yanwen Wang and Hainan Chen and Xiaoling Wu and Lei Shu An energy-efficient SDN based sleep scheduling algorithm for WSNs . . . . . 39--45 Keke Gai and Meikang Qiu and Hui Zhao and Lixin Tao and Ziliang Zong Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing . . . . . . . . . . . . . . . 46--54 Chao Tong and Yu Lian and Jianwei Niu and Zhongyu Xie and Yang Zhang A novel green algorithm for sampling complex networks . . . . . . . . . . . . 55--62 Yonghua Xiong and Shaoyun Wan and Jinhua She and Min Wu and Yong He and Keyuan Jiang An energy-optimization-based method of task scheduling for a cloud video surveillance center . . . . . . . . . . 63--73 Ana C. Riekstin and Guilherme C. Januário and Bruno B. Rodrigues and Viviane T. Nascimento and Tereza C. M. B. Carvalho and Catalin Meirosu Orchestration of energy efficiency capabilities in networks . . . . . . . . 74--87 Weidong Fang and Chuanlei Zhang and Zhidong Shi and Qing Zhao and Lianhai Shan BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks . . . . . . . . . . . . . . . . 88--94 Martina Marjanovi\'c and Lea Skorin-Kapov and Kresimir Pripuzi\'c and Aleksandar Antoni\'c and Ivana Podnar Zarko Energy-aware and quality-driven sensor management for green mobile crowd sensing . . . . . . . . . . . . . . . . 95--108 Teng Long and Wenhui Zhang Termination analysis with recursive calling graphs . . . . . . . . . . . . . 109--116 Chen Xiao and Lifeng Wang and Mengjiao Zhu and Wendong Wang A resource-efficient multimedia encryption scheme for embedded video sensing system based on unmanned aircraft . . . . . . . . . . . . . . . . 117--125 Liping Zhang and Shanyu Tang and Shaohui Zhu An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks . . . . . . . . . . . . . 126--133 Piotr Cholda and Piotr Jaglarz Optimization/simulation-based risk mitigation in resilient green communication networks . . . . . . . . . 134--157 Mingfu Li and Jingping Bi and Zhongcheng Li Improving consolidation of virtual machine based on virtual switching overhead estimation . . . . . . . . . . 158--167 Karn Yongsiriwit and Nour Assy and Walid Gaaloul A semantic framework for configurable business process as a service in the cloud . . . . . . . . . . . . . . . . . 168--184 Debdeep Paul and Wen-De Zhong and Sanjay K. Bose Energy efficiency aware load distribution and electricity cost volatility control for cloud service providers . . . . . . . . . . . . . . . 185--197 Zheli Liu and Xiaofeng Chen and Jun Yang and Chunfu Jia and Ilsun You New order preserving encryption model for outsourced databases in cloud environments . . . . . . . . . . . . . . 198--207 Antonio Celesti and Maria Fazio and Massimo Villari and Antonio Puliafito Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems . . . . . . 208--218 Yunchuan Sun and Cheng Lu and Rongfang Bie and Junsheng Zhang Semantic relation computing theory and its application . . . . . . . . . . . . 219--229 Miguel Castro and Antonio J. Jara and Antonio F. Skarmeta Enabling end-to-end CoAP-based communications for the Web of Things . . 230--236 Juan López-de-Armentia and Diego Casado-Mansilla and Diego López-de-Ipiña Making social networks a means to save energy . . . . . . . . . . . . . . . . . 237--246 Ming Yu and Nirwan Ansari Smart grid communications: Modeling and validation . . . . . . . . . . . . . . . 247--249 D. A. Sbordone and L. Martirano and M. C. Falvo and L. Chiavaroli and B. Di Pietra and I. Bertini and A. Genovese Reactive power control for an energy storage system: a real implementation in a Micro-Grid . . . . . . . . . . . . . . 250--263 Ziyuan Cai and Ming Yu and Michael Steurer and Hui Li and Yizhou Dong A network model for the real-time communications of a smart grid prototype 264--273 Dhananjay Bhor and Kavinkadhirselvan Angappan and Krishna M. Sivalingam Network and power-grid co-simulation framework for Smart Grid wide-area monitoring networks . . . . . . . . . . 274--284 Martin Wolkerstorfer and Bernhard Schweighofer and Hannes Wegleiter and Driton Statovci and Herbert Schwaiger and Walter Lackner Measurement and simulation framework for throughput evaluation of narrowband power line communication links in low-voltage grids . . . . . . . . . . . 285--300 Cristina Alcaraz and Javier Lopez and Stephen Wolthusen Policy enforcement system for secure interoperable control in distributed Smart Grid systems . . . . . . . . . . . 301--314 Yuan Zhang and Navid Rahbari-Asr and Mo-Yuen Chow A robust distributed system incremental cost estimation algorithm for smart grid economic dispatch with communications information losses . . . . . . . . . . . 315--324 Ping Yi and Ting Zhu and Qingquan Zhang and Yue Wu and Li Pan Puppet attack: a denial of service attack in advanced metering infrastructure network . . . . . . . . . 325--332 Mungyu Bae and Kangho Kim and Hwangnam Kim Preserving privacy and efficiency in data communication and aggregation for AMI network . . . . . . . . . . . . . . 333--344 Raphael Amoah and Seyit Camtepe and Ernest Foo Formal modelling and analysis of DNP3 secure authentication . . . . . . . . . 345--360 Jemal H. Abawajy and Albert Y. Zomaya and Ivan Stojmenovic Network computing and applications for Big Data analytics . . . . . . . . . . . 361 Wei Xu and Jianshan Sun and Jian Ma and Wei Du A personalized information recommendation system for R&D project opportunity finding in big data contexts 362--369 Amineh Amini and Hadi Saboohi and Tutut Herawan and Teh Ying Wah MuDi-Stream: a multi density clustering algorithm for evolving data stream . . . 370--385 R. S. Villaça and R. Pasquini and L. B. de Paula and M. F. Magalhães HCube: Routing and similarity search in Data Centers . . . . . . . . . . . . . . 386--398 Khaleel Mershad and Hassan Artail and Mazen Saghir and Hazem Hajj and Mariette Awad A mathematical model to analyze the utilization of a cloud datacenter middleware . . . . . . . . . . . . . . . 399--415 Maumita Bhattacharya and Rafiqul Islam and Jemal Abawajy Evolutionary optimization: a big data perspective . . . . . . . . . . . . . . 416--426 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Barbara Carminati and Elena Ferrari and Ngoc Hong Tran Trustworthy and effective person-to-person payments over multi-hop MANETs . . . . . . . . . . . . . . . . . 1--18 Mohiuddin Ahmed and Abdun Naser Mahmood and Jiankun Hu A survey of network anomaly detection techniques . . . . . . . . . . . . . . . 19--31 Martin Garriga and Cristian Mateos and Andres Flores and Alejandra Cechich and Alejandro Zunino RESTful service composition at a glance: a survey . . . . . . . . . . . . . . . . 32--53 Mina Nabi and Maria Toeroe and Ferhat Khendek Availability in the cloud: State of the art . . . . . . . . . . . . . . . . . . 54--67 Hazim Jarrah and Nurul I. Sarkar and Jairo Gutierrez Comparison-based system-level fault diagnosis protocols for mobile ad-hoc networks: a survey . . . . . . . . . . . 68--81 Subir Halder and Amrita Ghosal A survey on mobility-assisted localization techniques in wireless sensor networks . . . . . . . . . . . . 82--94 Victor Prokhorenko and Kim-Kwang Raymond Choo and Helen Ashman Web application protection techniques: a taxonomy . . . . . . . . . . . . . . . . 95--112 Jose Moura and David Hutchison Review and analysis of networking challenges in cloud computing . . . . . 113--129
Pritish Vijayanand Ghate and Hemanta Kumar Pati Collaborative distributed communication in heterogeneous environments: a comprehensive survey . . . . . . . . . . 1--20 Alekha Kumar Mishra and Ashok Kumar Turuk A comparative analysis of node replica detection schemes in wireless sensor networks . . . . . . . . . . . . . . . . 21--32 Xiaonan Wang and Hongbin Chen and Deguang Le A novel IPv6 address configuration for a 6LoWPAN-based WBAN . . . . . . . . . . . 33--45 Petro P. Ernest and Olabisi E. Falowo and H. Anthony Chan Design and performance evaluation of distributed mobility management schemes for network mobility . . . . . . . . . . 46--58 Mojtaba Alizadeh and Saeid Abolfazli and Mazdak Zamani and Sabariah Baharun and Kouichi Sakurai Authentication in mobile cloud computing: a survey . . . . . . . . . . 59--80 Mehdi Nazari Cheraghlou and Ahmad Khadem-Zadeh and Majid Haghparast A survey of fault tolerance architecture in cloud computing . . . . . . . . . . . 81--92 Yu Xiang and Zhaoguang Xuan and Meng Tang and Jun Zhang and Ming Sun $3$D space detection and coverage of wireless sensor network based on spatial correlation . . . . . . . . . . . . . . 93--101 Cuicui Lv and Qiang Wang and Wenjie Yan and Yi Shen Energy-balanced compressive data gathering in Wireless Sensor Networks 102--114 Omar Cheikhrouhou Secure Group Communication in Wireless Sensor Networks: a survey . . . . . . . 115--132 Shruti Lall and B. T. J. Maharaj and P. A. Jansen van Vuuren Null-frequency jamming of a proactive routing protocol in wireless mesh networks . . . . . . . . . . . . . . . . 133--141 Atslands R. Rocha and Flávia C. Delicato and Luci Pirmez and Danielo G. Gomes and José Neuman de Souza A fully-decentralized semantic mechanism for autonomous wireless sensor nodes . . 142--160 Krishan Kumar and Arun Prakash and Rajeev Tripathi Spectrum handoff in cognitive radio networks: a classification and comprehensive survey . . . . . . . . . . 161--188 Shun-Neng Yang and Shu-Wei Ho and Yi-Bing Lin and Chai-Hien Gan A multi-RAT bandwidth aggregation mechanism with software-defined networking . . . . . . . . . . . . . . . 189--198 Adnan Akhunzada and Abdullah Gani and Nor Badrul Anuar and Ahmed Abdelaziz and Muhammad Khurram Khan and Amir Hayat and Samee U. Khan Secure and dependable software defined networks . . . . . . . . . . . . . . . . 199--221 Tao Zhang and Jianxing Wang and Jiawei Huang and Yi Huang and Jianer Chen and Yi Pan Adaptive marking threshold method for delay-sensitive TCP in data center network . . . . . . . . . . . . . . . . 222--234 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Prosanta Gope and Tzonelih Hwang An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks . . . . . . . . . . . 1--8 Soo-Yeon Ji and Bong-Keun Jeong and Seonho Choi and Dong Hyun Jeong A multi-level intrusion detection method for abnormal network behaviors . . . . . 9--17 Usman Shaukat and Ejaz Ahmed and Zahid Anwar and Feng Xia Cloudlet deployment in local wireless networks: Motivation, architectures, applications, and open challenges . . . 18--40 Athul Prasad and Andreas Maeder and Konstantinos Samdanis and Andreas Kunz and Genadi Velev Enabling group communication for public safety in LTE-Advanced networks . . . . 41--52 Zakira Inayat and Abdullah Gani and Nor Badrul Anuar and Muhammad Khurram Khan and Shahid Anwar Intrusion response systems: Foundations, design, and challenges . . . . . . . . . 53--74 Heena Rathore and Venkataramana Badarla and George K. J. Sociopsychological trust model for Wireless Sensor Networks . . . . . . . . 75--87 Feng Tian and Kuo-Ming Chao and Zuren Feng and Keyi Xing and Nazaraf Shah Using a wireless visual sensor network to harmonically navigate multiple low-cost wheelchairs in an indoor environment . . . . . . . . . . . . . . 88--99 Peiyan Yuan and Ping Liu and Shaojie Tang RIM: Relative-importance based data forwarding in people-centric networks 100--111 Hui Xia and Jia Yu and Cheng-liang Tian and Zhen-kuan Pan and Edwin Sha Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks . . . . . . . . . . . . . . . . 112--127 Chengwen Luo and Hande Hong and Long Cheng and Mun Choon Chan and Jianqiang Li and Zhong Ming Accuracy-aware wireless indoor localization: Feasibility and applications . . . . . . . . . . . . . . 128--136 Sultan Alneyadi and Elankayer Sithirasenan and Vallipuram Muthukkumarasamy A survey on data leakage prevention systems . . . . . . . . . . . . . . . . 137--152 Mawloud Omar and Hamida Boufaghes and Lydia Mammeri and Amel Taalba and Abdelkamel Tari Secure and reliable certificate chains recovery protocol for mobile ad hoc networks . . . . . . . . . . . . . . . . 153--162 Peiyan Yuan and Lilin Fan and Ping Liu and Shaojie Tang Recent progress in routing protocols of mobile opportunistic networks: a clear taxonomy, analysis and evaluation . . . 163--170 Seyed Yahya Vaezpour and Rui Zhang and Kui Wu and Jianping Wang and Gholamali C. Shoja A new approach to mitigating security risks of phone clone co-location over mobile clouds . . . . . . . . . . . . . 171--184 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Divya Saxena and Vaskar Raychoudhury Radient: Scalable, memory efficient name lookup algorithm for named data networking . . . . . . . . . . . . . . . 1--13 Daniel-Ioan Curiac Towards wireless sensor, actuator and robot networks: Conceptual framework, challenges and perspectives . . . . . . 14--23 Mengmeng Ge and Kim-Kwang Raymond Choo and Huai Wu and Yong Yu Survey on key revocation mechanisms in wireless sensor networks . . . . . . . . 24--38 Meng Han and Mingyuan Yan and Zhipeng Cai and Yingshu Li An exploration of broader influence maximization in timeliness networks with opportunistic selection . . . . . . . . 39--49 Wen-Hwa Liao and Ssu-Chi Kuai and Chen Liu Efficient scheduling algorithm for multiple mobile subscriber stations with unsolicited grant service in an IEEE 802.16e network . . . . . . . . . . . . 50--55 Hasan Abdulwahid and Bin Dai and Benxiong Huang and Zijing Chen Scheduled-links multicast routing protocol in MANETs . . . . . . . . . . . 56--67 Wazir Zada Khan and Md. Shohrab Hossain and Mohammed Y. Aalsalem and N. M. Saad and Mohammed Atiquzzaman A cost analysis framework for claimer reporter witness based clone detection schemes in WSNs . . . . . . . . . . . . 68--85 Amrita Ghosal and Subir Halder Lifespan prolonging location-wise predetermined deployment strategy for visual sensor networks . . . . . . . . . 86--97 S. Avallone and G. Di Stasi Design and implementation of WiMesh: a tool for the performance evaluation of multi-radio wireless mesh networks . . . 98--109 Hao Zhu and Xiangke Liao and Cees de Laat and Paola Grosso Joint flow routing-scheduling for energy efficient software defined data center networks: a prototype of energy-aware network management platform . . . . . . 110--124 Debao Wei and Libao Deng and Peng Zhang and Liyan Qiao and Xiyuan Peng A page-granularity wear-leveling (PGWL) strategy for NAND flash memory-based sink nodes in wireless sensor networks 125--139 Álvaro López García and Enol Fernández del Castillo Efficient image deployment in cloud environments . . . . . . . . . . . . . . 140--149 Osamah Ibrahiem Abdullaziz and Vik Tor Goh and Huo-Chong Ling and KokSheik Wong AIPISteg: an active IP identification based steganographic method . . . . . . 150--158 Emanuel F. Coutinho and Paulo A. L. Rego and Danielo G. Gomes and José N. de Souza Physics and microeconomics-based metrics for evaluating cloud computing elasticity . . . . . . . . . . . . . . . 159--172 Diego Kreutz and Oleksandr Malichevskyy and Eduardo Feitosa and Hugo Cunha and Rodrigo da Rosa Righi and Douglas D. J. de Macedo A cyber-resilient architecture for critical security services . . . . . . . 173--189 Javier Suarez and Jose Quevedo and Ivan Vidal and Daniel Corujo and Jaime Garcia-Reinoso and Rui L. Aguiar A secure IoT management architecture based on Information-Centric Networking 190--204 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Gilberto Fernandes, Jr. and Luiz F. Carvalho and Joel J. P. C. Rodrigues and Mario Lemes Proença, Jr. Network anomaly detection using IP flows with Principal Component Analysis and Ant Colony Optimization . . . . . . . . 1--11 Syam Kumar Pasupuleti and Subramanian Ramalingam and Rajkumar Buyya An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing . . . 12--22 Jiangtao Zhang and Hejiao Huang and Xuan Wang Resource provision algorithms in cloud computing: a survey . . . . . . . . . . 23--42 Elias Chavarria-Reyes and Etimad Fadel and Suleiman Almasri and M. G. Abbas Malik Reducing the energy consumption at the user equipment through multi-stream cross-carrier-aware discontinuous reception (DRX) in LTE-advanced systems 43--61 Enrico Gregori and Alessandro Improta and Luciano Lenzini and Valerio Luconi and Nilo Redini and Alessio Vecchio Smartphone-based crowdsourcing for estimating the bottleneck capacity in wireless networks . . . . . . . . . . . 62--75 Waqar Asif and Hassaan Khaliq Qureshi and Muttukrishnan Rajarajan and Marios Lestas Combined Banzhaf & Diversity Index (CBDI) for critical node detection . . . . . . 76--88 Lien-Wu Chen Cooperative energy-efficient localization with node lifetime extension in mobile long-thin networks 89--97 Debdeep Paul and Wen-De Zhong and Sanjay K. Bose Energy efficient cloud service pricing: a two-timescale optimization approach 98--112 Michel Barbeau and Gimer Cervera and Joaquin Garcia-Alfaro and Evangelos Kranakis Channel selection using a multiple radio model . . . . . . . . . . . . . . . . . 113--123 Márcio Melo and Susana Sargento and Jorge Carapinha Optimal virtual network migration: a step closer for seamless resource mobility . . . . . . . . . . . . . . . . 124--136 Yongrui Qin and Quan Z. Sheng and Nickolas J. G. Falkner and Schahram Dustdar and Hua Wang and Athanasios V. Vasilakos When things matter: a survey on data-centric Internet of Things . . . . 137--153 Mustapha Reda Senouci and Abdelhamid Mellouk and Nadjib Aitsaadi and Latifa Oukhellou Fusion-based surveillance WSN deployment using Dempster--Shafer theory . . . . . 154--166 Yan Liu and Shun-Zheng Yu Network coding-based multisource content delivery in Content Centric Networking 167--175 Atiq Ur Rahman and Abdulrahman Alharby and Halabi Hasbullah and Khalid Almuzaini Corona based deployment strategies in wireless sensor network: a survey . . . 176--193 Cheng Zhan and Fuyuan Xiao Coding based wireless broadcast scheduling in real time applications . . 194--203 Lingzhi Li and Zhe Yang and Jin Wang and Shukui Zhang and Yanqin Zhu Network coding with crowdsourcing-based trajectory estimation for vehicular networks . . . . . . . . . . . . . . . . 204--215 Fabio Rafael Segundo and Eraldo Silveira e Silva and Jean-Marie Farines A DTN routing strategy based on neural networks for urban bus transportation system . . . . . . . . . . . . . . . . . 216--228 Bahareh Alami Milani and Nima Jafari Navimipour A comprehensive review of the data replication techniques in the cloud environments: Major trends and future directions . . . . . . . . . . . . . . . 229--238 Hashim A. Hashim and B. O. Ayinde and M. A. Abido Optimal placement of relay nodes in wireless sensor network using artificial bee colony algorithm . . . . . . . . . . 239--248 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Haitao Zhao and Jibo Wei and Nurul I. Sarkar and Shengchun Huang E-MAC: an evolutionary solution for collision avoidance in wireless ad hoc networks . . . . . . . . . . . . . . . . 1--11 Mahir Kaya and Altan Koçyigit and P. Erhan Eren An adaptive mobile cloud computing framework using a call graph based model 12--35 Jungwon Lee and Miran Shim and Hyesook Lim Name prefix matching using bloom filter pre-searching for content centric network . . . . . . . . . . . . . . . . 36--47 Rahma Chaabouni and Marc Sánchez-Artigas and Pedro García-López and Lluís P\`amies-Ju\`arez The power of swarming in personal clouds under bandwidth budget . . . . . . . . . 48--71 Jihun Seo and Keuchul Cho and Wooseong Cho and Gisu Park and Kijun Han A discovery scheme based on carrier sensing in self-organizing Bluetooth Low Energy networks . . . . . . . . . . . . 72--83 Wilson M. Tan and Stephen A. Jarvis Heuristic solutions to the target identifiability problem in directional sensor networks . . . . . . . . . . . . 84--102 Deepak Kumar Patel and Devashree Tripathy and C. R. Tripathy Survey of load balancing techniques for Grid . . . . . . . . . . . . . . . . . . 103--119 Ying Qu and Bryan Ng and Winston Seah A survey of routing and channel assignment in multi-channel multi-radio WMNs . . . . . . . . . . . . . . . . . . 120--130 Fida Gillani and Ehab Al-Shaer and Basil AsSadhan Economic metric to improve spam detectors . . . . . . . . . . . . . . . 131--143 Gopal Kirshna Shyam and Sunilkumar S. Manvi Virtual resource prediction in cloud environment: a Bayesian approach . . . . 144--154 Mahmoud Khasawneh and Saed Alrabaee and Anjali Agarwal and Nishith Goel and Marzia Zaman Power trading in cognitive radio networks . . . . . . . . . . . . . . . . 155--166 Chenhao Qu and Rodrigo N. Calheiros and Rajkumar Buyya A reliable and cost-efficient auto-scaling system for web applications using heterogeneous spot instances . . . 167--180 Mohammed Atiquzzaman Editorial: 2015 Best Paper Awards . . . A1--A3 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Gianluigi Folino and Pietro Sabatino Ensemble based collaborative and distributed intrusion detection systems: a survey . . . . . . . . . . . . . . . . 1--16 Neenu Garg and Seema Bawa Comparative analysis of cloud data integrity auditing protocols . . . . . . 17--32 Abayomi Moradeyo Otebolaku and Maria Teresa Andrade User context recognition using smartphone sensors and classification models . . . . . . . . . . . . . . . . . 33--51 Shiyi Li and Qiang Cao and Shenggang Wan and Lu Qian and Changsheng Xie HRSPC: a hybrid redundancy scheme via exploring computational locality to support fast recovery and high reliability in distributed storage systems . . . . . . . . . . . . . . . . 52--63 Mohammad Masdari and Sima ValiKardan and Zahra Shahi and Sonay Imani Azar Towards workflow scheduling in cloud computing: a comprehensive analysis . . 64--82 Pawan Kumar Verma and Rajesh Verma and Arun Prakash and Ashish Agrawal and Kshirasagar Naik and Rajeev Tripathi and Maazen Alsabaan and Tarek Khalifa and Tamer Abdelkader and Abdulhakim Abogharaf Machine-to-Machine (M2M) communications: a survey . . . . . . . . . . . . . . . . 83--105 Mohammad Masdari and Sayyid Shahab Nabavi and Vafa Ahmadi An overview of virtual machine placement schemes in cloud computing . . . . . . . 106--127 Fuu-Cheng Jiang and Ilsun You and Fang-Yi Leu Approaching green sensor field using queue-based optimization technique . . . 128--136 Jurairat Phuttharak and Seng W. Loke Mobile crowdsourcing in peer-to-peer opportunistic networks: Energy usage and response analysis . . . . . . . . . . . 137--150 Yatish K. Joshi and Mohamed Younis Restoring connectivity in a resource constrained WSN . . . . . . . . . . . . 151--165 Justin Grana and David Wolpert and Joshua Neil and Dongping Xie and Tanmoy Bhattacharya and Russell Bent A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks . . . . . . . . . . . . 166--179 Amna Qureshi and David Megías and Helena Rif\`a-Pous PSUM: Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting . . . . . . . . . . . . . 180--197 David Airehrour and Jairo Gutierrez and Sayan Kumar Ray Secure routing for Internet of Things: a survey . . . . . . . . . . . . . . . . . 198--213 Suleman Khan and Abdullah Gani and Ainuddin Wahid Abdul Wahab and Muhammad Shiraz and Iftikhar Ahmad Network forensics: Review, taxonomy, and open challenges . . . . . . . . . . . . 214--235 Suvendu Kumar Mohapatra and Prasan Kumar Sahoo and Shih-Lin Wu Big data analytic architecture for intruder detection in heterogeneous wireless sensor networks . . . . . . . . 236--249 Li Chunlin and Yan Xin and Li LaYuan Flexible service provisioning based on context constraint for enhancing user experience in service oriented mobile cloud . . . . . . . . . . . . . . . . . 250--261 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Rahim Masoudi and Ali Ghaffari Software defined networks: a survey . . 1--25 Suchetana Chakraborty and Sandip Chakraborty and Sukumar Nandi and Sushanta Karmakar Impact of redundant sensor deployment over data gathering performance: a model based approach . . . . . . . . . . . . . 26--42 Xuxun Liu A novel transmission range adjustment strategy for energy hole avoiding in wireless sensor networks . . . . . . . . 43--52 Huda Saleh Abbas and Mark A. Gregory The next generation of passive optical networks: a review . . . . . . . . . . . 53--74 Mathias Pelka and Horst Hellbrück Survey of challenges and towards a unified architecture for location systems . . . . . . . . . . . . . . . . 75--85 Peter Bartalos and Yi Wei and M. Brian Blake and Haluk Damgacioglu and Iman Saleh and Nurcin Celik Modeling energy-aware web services and application . . . . . . . . . . . . . . 86--98 Manuel Díaz and Cristian Martín and Bartolomé Rubio State-of-the-art, challenges, and open issues in the integration of Internet of Things and cloud computing . . . . . . . 99--117 Eisa Zarepour and Abdul Alim Abd Karim and Ajay Sharma and Mahbub Hassan and Aruna Seneviratne Characterizing power saving for device-to-device browser cache cooperation . . . . . . . . . . . . . . 118--127 Sobin CC and Vaskar Raychoudhury and Gustavo Marfia and Ankita Singla A survey of routing and data dissemination in Delay Tolerant Networks 128--146 Opeyemi Osanaiye and Kim-Kwang Raymond Choo and Mqhele Dlodlo Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework . . . . . . . . . . . . . . . 147--165 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Nauman Ahad and Junaid Qadir and Nasir Ahsan Neural networks in wireless networks: Techniques, applications and guidelines 1--27 Maxim Claeys and Daphné Tuncer and Jeroen Famaey and Marinos Charalambides and Steven Latré and George Pavlou and Filip De Turck Hybrid multi-tenant cache management for virtualized ISP networks . . . . . . . . 28--41 Anum Ali and Ghalib A. Shah and Junaid Arshad Energy efficient techniques for M2M communication: a survey . . . . . . . . 42--55 Zhiming Wang and Xiaoping Zeng and Xue Liu and Man Xu and Ya Wen and Li Chen TCP congestion control algorithm for heterogeneous Internet . . . . . . . . . 56--64 Yunhe Cui and Lianshan Yan and Saifei Li and Huanlai Xing and Wei Pan and Jian Zhu and Xiaoyang Zheng SD-Anti-DDoS: Fast and efficient DDoS defense in software-defined networks . . 65--79 Han-Peng Jiang and David Chuck and Wei-Mei Chen Energy-aware data center networks . . . 80--89 Aisha Abdallah and Mohd Aizaini Maarof and Anazida Zainal Fraud detection system: a survey . . . . 90--113 Tran The Son and Hoa Le-Minh and Nauman Aslam MSAR: a metric self-adaptive routing model for Mobile Ad Hoc Networks . . . . 114--125 Wenjuan Li and Weizhi Meng and Lam For Kwok A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures . . . . . . . . . . 126--139 Yang Qin and Weihong Yang and Yibin Ye and Yao Shi Analysis for TCP in data center networks: Outcast and Incast . . . . . . 140--150 Wenbin Hu and Zhenyu Qiu and Huan Wang and Liping Yan A Real-time scheduling algorithm for on-demand wireless XML data broadcasting 151--163 Bijoy Chand Chatterjee and Waya Fadini and Eiji Oki A spectrum allocation scheme based on first-last-exact fit policy for elastic optical networks . . . . . . . . . . . . 164--172 Syed Hamid Hussain Madni and Muhammad Shafie Abd Latiff and Yahaya Coulibaly and Shafi'i Muhammad Abdulhamid Resource scheduling for infrastructure as a service (IaaS) in cloud computing: Challenges and opportunities . . . . . . 173--200 Weizhi Meng and Wang Hao Lee and S. R. Murali and S. P. T. Krishnan JuiceCaster: Towards automatic juice filming attacks on smartphones . . . . . 201--212 P. V. Bindu and P. Santhi Thilagam Mining social networks for anomalies: Methods and challenges . . . . . . . . . 213--229 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Alex F. R. Trajano and Marcial P. Fernandez Two-phase load balancing of In-Memory Key-Value Storages using Network Functions Virtualization (NFV) . . . . . 1--13 Xavier Hesselbach and Jos\`e Roberto Amazonas and Santi Villanueva and Juan Felipe Botero Coordinated node and link mapping VNE using a new paths algebra strategy . . . 14--26 T. Panigrahi and Meenakshi Panda and G. Panda Fault tolerant distributed estimation in wireless sensor networks . . . . . . . . 27--39 Cezar Plesca and Vincent Charvillat and Wei Tsang Ooi Multimedia prefetching with optimal Markovian policies . . . . . . . . . . . 40--53 Sally E. El Khawaga and Ahmed I. Saleh and Hesham A. Ali An Administrative Cluster-based Cooperative Caching (ACCC) strategy for Mobile Ad Hoc Networks . . . . . . . . . 54--76 Ado Adamou Abba Ari and Blaise Omer Yenke and Nabila Labraoui and Irepran Damakoa and Abdelhak Gueroui A power efficient cluster-based routing algorithm for wireless sensor networks: Honeybees swarm intelligence based approach . . . . . . . . . . . . . . . . 77--97 Rafael L. Gomes and Luiz F. Bittencourt and Edmundo R. M. Madeira and Eduardo Cerqueira and Mario Gerla A combined energy-bandwidth approach to allocate resilient virtual software defined networks . . . . . . . . . . . . 98--106 Du Yuanfeng and Yang Dongkai and Yang Huilin and Xiu Chundi Flexible indoor localization and tracking system based on mobile phone 107--116 V. K. Mohan Raj and R. Shriram Power management in virtualized datacenter --- a survey . . . . . . . . 117--133 Francisco Moyano and Carmen Fernandez-Gago and Javier Lopez A model-driven approach for engineering trust and reputation into software services . . . . . . . . . . . . . . . . 134--151 Cuong T. Do and Nguyen H. Tran and Eui-Nam Huh and Choong Seon Hong and Dusit Niyato and Zhu Han Dynamics of service selection and provider pricing game in heterogeneous cloud market . . . . . . . . . . . . . . 152--165 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Marcelo Caggiani Luizelli and Leonardo Richter Bays and Luciana Salete Buriol and Marinho Pilla Barcellos and Luciano Paschoal Gaspary How physical network topologies affect virtual network embedding quality: a characterization study based on ISP and datacenter networks . . . . . . . . . . 1--16 Ali Mohammad Saghiri and Mohammad Reza Meybodi An approach for designing cognitive engines in cognitive peer-to-peer networks . . . . . . . . . . . . . . . . 17--40 Jianwei Niu and Lei Wang and Xiting Liu and Shui Yu FUIR: Fusing user and item information to deal with data sparsity by using side information in recommendation systems 41--50 Tekenate E. Amah and Maznah Kamat and Waldir Moreira and Kamalrulnizam Abu Bakar and Satria Mandala and Marcos A. Batista Towards next-generation routing protocols for pocket switched networks 51--88 Xiaoming Liu and Yadong Zhou and Chengchen Hu and Xiaohong Guan MIRACLE: a multiple independent random walks community parallel detection algorithm for big graphs . . . . . . . . 89--101 Carlos Barba-Jimenez and Raul Ramirez-Velarde and Andrei Tchernykh and Ramón Rodríguez-Dagnino and Juan Nolazco-Flores and Raul Perez-Cazares Cloud based Video-on-Demand service model ensuring quality of service and scalability . . . . . . . . . . . . . . 102--113 Fatih Senel and Mohamed Younis Novel relay node placement algorithms for establishing connected topologies 114--130 Juan Antonio Cordero Multi-path TCP performance evaluation in dual-homed (wired/wireless) devices . . 131--139 Muhammad Anan and Ala Al-Fuqaha and Nidal Nasser and Ting-Yu Mu and Husnain Bustam Empowering networking research and experimentation through Software-Defined Networking . . . . . . . . . . . . . . . 140--155 Fuliang Li and Jiahai Yang and Xingwei Wang and Tian Pan and Changqing An and Jianping Wu Characteristics analysis at prefix granularity: a case study in an IPv6 network . . . . . . . . . . . . . . . . 156--170 Jian Peng and Kim-Kwang Raymond Choo and Helen Ashman Bit-level $n$-gram based forensic authorship analysis on social media: Identifying individuals from linguistic profiles . . . . . . . . . . . . . . . . 171--182 Lin Xue and Suman Kumar and Cheng Cui and Praveenkumar Kondikoppa and Chui-Hui Chiu and Seung-Jong Park Towards fair and low latency next generation high speed networks: AFCD queuing . . . . . . . . . . . . . . . . 183--193 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mahdi Nasrullah Al-Ameen and Matthew Wright iPersea: Towards improving the Sybil-resilience of social DHT . . . . . 1--10 Minhaj Ahmad Khan A survey of security issues for cloud computing . . . . . . . . . . . . . . . 11--29 Hang Shen and Guangwei Bai Routing in wireless multimedia sensor networks: a survey and challenges ahead 30--49 Melike Yigit and V. Cagri Gungor and Etimad Fadel and Laila Nassef and Nadine Akkari and Ian F. Akyildiz Channel-aware routing and priority-aware multi-channel scheduling for WSN-based smart grid applications . . . . . . . . 50--58 L. González-Manzano and José M. de Fuentes and Sergio Pastrana and Pedro Peris-Lopez and Luis Hernández-Encinas PAgIoT --- Privacy-preserving Aggregation protocol for Internet of Things . . . . . . . . . . . . . . . . . 59--71 Nusrat Zerin Zenia and Mohammed Aseeri and Muhammad R. Ahmed and Zamshed I. Chowdhury and M. Shamim Kaiser Energy-efficiency and reliability in MAC and routing protocols for underwater wireless sensor network: a survey . . . 72--85 Alireza Sadeghi Milani and Nima Jafari Navimipour Load balancing mechanisms and techniques in the cloud environments: Systematic literature review and future trends . . 86--98 Pimmy Gandotra and Rakesh Kumar Jha Device-to-Device Communication in Cellular Networks: a Survey . . . . . . 99--117 Rodrigo R. Esch and Fábio Protti and Valmir C. Barbosa Adaptive event sensing in networks of autonomous mobile agents . . . . . . . . 118--129 Mahda Noura and Rosdiadee Nordin A survey on interference management for Device-to-Device (D2D) communication and its challenges in 5G networks . . . . . 130--150 Aisha Siddiqa and Ibrahim Abaker Targio Hashem and Ibrar Yaqoob and Mohsen Marjani and Shahabuddin Shamshirband and Abdullah Gani and Fariza Nasaruddin A survey of big data management: Taxonomy and state-of-the-art . . . . . 151--166 Jingyuan Wang and Jiangtao Wen and Jun Zhang and Zhang Xiong and Yuxing Han TCP-FIT: an improved TCP algorithm for heterogeneous networks . . . . . . . . . 167--180 Manel Seddiki and Mahfoud Bencha\"\iba 2P-Lookup: Popularity and Proximity based P2P Lookup mechanism over MANETs 181--193 João Santos and Joel J. P. C. Rodrigues and Bruno M. C. Silva and João Casal and Kashif Saleem and Victor Denisov An IoT-based mobile gateway for intelligent personal assistants on mobile health environments . . . . . . . 194--204 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mohamed Attia and Hichem Sedjelmaci and Sidi Mohammed Senouci and El-Hassane Aglzim Game model to optimally combine electric vehicles with green and non-green sources into an end-to-end smart grid architecture . . . . . . . . . . . . . . 1--13 Jian Peng and Kim-Kwang Raymond Choo and Helen Ashman User profiling in intrusion detection: a review . . . . . . . . . . . . . . . . . 14--27 Kishor Singh and Sangman Moh Routing protocols in cognitive radio ad hoc networks: a comprehensive review . . 28--37 Rana Azzam and Rabeb Mizouni and Hadi Otrok and Anis Ouali and Shakti Singh GRS: a Group-Based Recruitment System for Mobile Crowd Sensing . . . . . . . . 38--50 M. R. M. Assis and L. F. Bittencourt A survey on cloud federation architectures: Identifying functional and non-functional properties . . . . . 51--71 Sakib Md. Bin Malek and Md. Muntakim Sadik and Ashikur Rahman On balanced $k$-coverage in visual sensor networks . . . . . . . . . . . . 72--86 Shilpa Shashikant Chaudhari and Rajashekhar C. Biradar Traffic and mobility aware resource prediction using cognitive agent in mobile ad hoc networks . . . . . . . . . 87--103 Tie Qiu and Yuan Lv and Feng Xia and Ning Chen and Jiafu Wan and Amr Tolba ERGID: an efficient routing protocol for emergency response Internet of Things 104--112 Hassen A. Mogaibel and Mohamed Othman and Shamala Subramaniam and Nor Asilah Wati Abdul Hamid Review of channel assignment approaches in multi-radio multi-channel wireless mesh network . . . . . . . . . . . . . . 113--139 Jingyu Feng and Guangyue Lu and Honggang Wang and Xuanhong Wang Supporting secure spectrum sensing data transmission against SSDH attack in cognitive radio ad hoc networks . . . . 140--149 C. Hamdeni and T. Hamrouni and F. Ben Charrada Data popularity measurements in distributed systems: Survey and design directions . . . . . . . . . . . . . . . 150--161 Xiaochen Hao and Weijing Liu and Ning Yao and Dehua Geng and Xida Li Distributed topology construction algorithm to improve link quality and energy efficiency for wireless sensor networks . . . . . . . . . . . . . . . . 162--170 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Xian Li and Qiuling Tang and Changyin Sun The impact of node position on outage performance of RF energy powered wireless sensor communication links in overlaid deployment scenario . . . . . . 1--11 Ubaid Ullah Khan and Naqqash Dilshad and Mubashir Husain Rehmani and Tariq Umer Fairness in Cognitive Radio Networks: Models, measurement methods, applications, and future research directions . . . . . . . . . . . . . . . 12--26 Mehrnaz Moudi and Mohamed Othman and Kweh Yeah Lun and Amir Rizaan Abdul Rahiman $x$-Folded TM: an efficient topology for interconnection networks . . . . . . . . 27--34 M. Kaliappan and Susan Augustine and B. Paramasivan Enhancing energy efficiency and load balancing in mobile ad hoc network using dynamic genetic algorithms . . . . . . . 35--43 Song Han and Xinbin Li and Zhixin Liu and Xinping Guan Hierarchical-game-based algorithm for downlink joint subchannel and power allocation in OFDMA femtocell networks 44--56 Aimad Karkouch and Hajar Mousannif and Hassan Al Moatassime and Thomas Noel Data quality in Internet of Things: a state-of-the-art survey . . . . . . . . 57--81 Guidan Yao and Zhigang Jin and Yishan Su An environment-friendly spectrum decision strategy for underwater acoustic networks . . . . . . . . . . . 82--93 K. Ivesic and L. Skorin-Kapov and M. Matijasevic Corrigendum to: ``Cross-layer QoE-driven admission control and resource allocation for adaptive multimedia services in LTE'' [J. Netw. Comput. Appl. \bf 46 (2014) 336--351] . . . . . 94--97 Tien Van Do and Nam H. Do and Ádám Horváth and Jinting Wang Corrigendum to ``Modelling opportunistic spectrum renting in mobile cellular networks'' [J. Netw. Comput. Appl. 52 (2015) 129--138] . . . . . . . . . . . . 98 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Feng Lin and Gang Wang and Junhai Zhou and Shiwen Zhang and Xin Yao High-performance IPv6 address lookup in GPU-accelerated software routers . . . . 1--10 Yanchao Zhao and Wenzhong Li and Sanglu Lu Navigation-driven handoff minimization in wireless networks . . . . . . . . . . 11--20 Lin Tang and Hui Cao and Li Zheng and Ningjian Huang Uncertainty-aware RFID network planning for target detection and target location 21--30 Kirill Kogan and Alejandro López-Ortiz and Sergey I. Nikolenko and Gabriel Scalosub and Michael Segal Large profits or fast gains: a dilemma in maximizing throughput with applications to network processors . . . 31--43 Chen Lyu and Shi-Feng Sun and Yuanyuan Zhang and Amit Pande and Haining Lu and Dawu Gu Privacy-preserving data sharing scheme over cloud for social applications . . . 44--55 Manas Khatua and Sudip Misra Exploiting anomalous slots for multiple channel access in IEEE 802.11 networks 56--65 Yogesh Sharma and Bahman Javadi and Weisheng Si and Daniel Sun Reliability and energy efficiency in cloud computing systems: Survey and taxonomy . . . . . . . . . . . . . . . . 66--85 Daniel Ricardo dos Santos and Roberto Marinho and Gustavo Roecker Schmitt and Carla Merkle Westphall and Carlos Becker Westphall A framework and risk assessment approaches for risk-based access control in the cloud . . . . . . . . . . . . . . 86--97 Salman Iqbal and Miss Laiha Mat Kiah and Babak Dhaghighi and Muzammil Hussain and Suleman Khan and Muhammad Khurram Khan and Kim-Kwang Raymond Choo On cloud security attacks: a taxonomy and intrusion detection and prevention as a service . . . . . . . . . . . . . . 98--120 Miguel Sepulcre and Javier Gozalvez and Baldomero Coll-Perales Multipath QoS-driven routing protocol for industrial wireless networks . . . . 121--132 Michael Emmanuel and Ramesh Rayudu Communication technologies for smart grid applications: a survey . . . . . . 133--148 Chun-Cheng Lin and Teng-Huei Chen and Hui-Hsin Chin Adaptive router node placement with gateway positions and QoS constraints in dynamic wireless mesh networks . . . . . 149--164 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Hafsa Zannat and Taslima Akter and Mashrura Tasnim and Ashikur Rahman The coverage problem in visual sensor networks: a target oriented approach . . 1--15 Dimitrios Zorbas and Luigi Di Puglia Pugliese and Tahiry Razafindralambo and Francesca Guerriero Optimal drone placement and cost-efficient target coverage . . . . . 16--31 Yousri Daldoul and Djamal-Eddine Meddour and Toufik Ahmed and Raouf Boutaba Block Negative Acknowledgement protocol for reliable multicast in IEEE 802.11 32--46 Ranesh Kumar Naha and Mohamed Othman Cost-aware service brokering and performance sentient load balancing algorithms in the cloud . . . . . . . . 47--57 Mohd Faizal Ab Razak and Nor Badrul Anuar and Rosli Salleh and Ahmad Firdaus The rise of ``malware'': Bibliometric analysis of malware study . . . . . . . 58--76 Pawan Kumar Verma and Rajesh Verma and Arun Prakash and Rajeev Tripathi and Kshirasagar Naik A novel hybrid medium access control protocol for inter-M2M communications 77--88 Qiaoyun Zhang and Guilin Chen and Liang Zhao and Chih-Yung Chang Piconet construction and restructuring mechanisms for interference avoiding in Bluetooth PANs . . . . . . . . . . . . . 89--100 Ricardo Marco Alaez and Jose M. Alcaraz Calero and Fatna Belqasmi and May El-Barachi and Mohamad Badra and Omar Alfandi Towards an open source architecture for multi-operator LTE core networks . . . . 101--109 M. D'Arienzo and S. P. Romano GOSPF: an energy efficient implementation of the OSPF routing protocol . . . . . . . . . . . . . . . . 110--127 Ozgur Ates and Selcuk Keskin and Taskin Kocak High throughput graphics processing unit based Fano decoder . . . . . . . . . . . 128--137 Deval Bhamare and Raj Jain and Mohammed Samaka and Aiman Erbad A survey on service function chaining 138--155 Jin B. Hong and Dong Seong Kim Towards scalable security analysis using multi-layered security models . . . . . 156--168 Satoshi Utsumi and Salahuddin Muhammad Salim Zabir and Sumet Prabhavat A new explicit congestion notification scheme for satellite IP networks . . . . 169--180 Charalampos Konstantopoulos and Grammati Pantziou and Ioannis E. Venetis and Damianos Gavalas Efficient event handling in Wireless Sensor and Actor Networks: an on-line computation approach . . . . . . . . . . 181--199 Saurabh Singh and Young-Sik Jeong and Jong Hyuk Park A survey on cloud computing security: Issues, threats, and solutions . . . . . 200--222 Yaser Mansouri and Rajkumar Buyya To move or not to move: Cost optimization in a dual cloud-based storage architecture . . . . . . . . . . 223--235 Sana Habib and Junaid Qadir and Anwaar Ali and Durdana Habib and Ming Li and Arjuna Sathiaseelan The past, present, and future of transport-layer multipath . . . . . . . 236--258 Nor Bakiah Abd Warif and Ainuddin Wahid Abdul Wahab and Mohd Yamani Idna Idris and Roziana Ramli and Rosli Salleh and Shahaboddin Shamshirband and Kim-Kwang Raymond Choo Copy--move forgery detection: Survey, challenges and future directions . . . . 259--278 Waqar Asif and Marios Lestas and Hassaan Khaliq Qureshi and Muttukrishnan Rajarajan Optimization based spectral partitioning for node criticality assessment . . . . 279--292 Paulo Bartolomeu and Muhammad Alam and Joaquim Ferreira and José Fonseca Survey on low power real-time wireless MAC protocols . . . . . . . . . . . . . 293--316 Abid Khan and Farhana Jabeen and Farah Naz and Sabah Suhail and Mansoor Ahmed and Sarfraz Nawaz Buyer seller watermarking protocols issues and challenges --- a survey . . . 317--334 Junaid Shuja and Abdullah Gani and Muhammad Habib ur Rehman and Ejaz Ahmed and Sajjad A. Madani and Muhammad Khurram Khan and Kwangman Ko Towards native code offloading based MCC frameworks for multimedia applications: a survey . . . . . . . . . . . . . . . . 335--354 Minjae Park and Hyun Ahn and Kwanghoon Pio Kim Workflow-supported social networks: Discovery, analyses, and system . . . . 355--373 Xun Shao and Masahiro Jibiki and Yuuichi Teranishi and Nozomu Nishinaga A virtual replica node-based flash crowds alleviation method for sensor overlay networks . . . . . . . . . . . . 374--384 Nusrat Nowsheen and Gour Karmakar and Joarder Kamruzzaman PRADD: a path reliability-aware data delivery protocol for underwater acoustic sensor networks . . . . . . . . 385--397 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Dilara Acarali and Muttukrishnan Rajarajan and Nikos Komninos and Ian Herwono Survey of approaches and features for the identification of HTTP-based botnet traffic . . . . . . . . . . . . . . . . 1--15 Laisen Nie and Dingde Jiang and Lei Guo and Shui Yu Traffic matrix prediction and estimation based on deep learning in large-scale IP backbone networks . . . . . . . . . . . 16--22 Nazmus S. Nafi and Khandakar Ahmed and Mark A. Gregory and Manoj Datta A survey of smart grid architectures, applications, benefits and standardization . . . . . . . . . . . . 23--36 Qi Jiang and Jianfeng Ma and Fushan Wei and Youliang Tian and Jian Shen and Yuanyuan Yang An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks . . . . 37--48 Parisa Goudarzi and Hadi Tabatabaee Malazi and Mahmood Ahmadi Khorramshahr: a scalable peer to peer architecture for port warehouse management system . . . . . . . . . . . 49--59 Chun-Nan Lu and Chun-Ying Huang and Ying-Dar Lin and Yuan-Cheng Lai High performance traffic classification based on message size sequence and distribution . . . . . . . . . . . . . . 60--74 Ehsan Ahvar and Nafiseh Daneshgar-Moghaddam and Antonio M. Ortiz and Gyu Myoung Lee and Noel Crespi On analyzing user location discovery methods in smart homes: a taxonomy and survey . . . . . . . . . . . . . . . . . 75--86 Ren-Hung Hwang and Yu-Ling Hsueh and Jang-Jiin Wu and Fu-Hui Huang SocialHide: a generic distributed framework for location privacy protection . . . . . . . . . . . . . . . 87--100 Divya Saxena and Vaskar Raychoudhury N-FIB: Scalable, memory efficient name-based forwarding . . . . . . . . . 101--109 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Dimitris Tsolkas and Eirini Liotou and Nikos Passas and Lazaros Merakos A survey on parametric QoE estimation for popular services . . . . . . . . . . 1--17 Preeti Mishra and Emmanuel S. Pilli and Vijay Varadharajan and Udaya Tupakula Intrusion detection techniques in cloud environment: a survey . . . . . . . . . 18--47 Gyanappa A. Walikar and Rajashekar C. Biradar A survey on hybrid routing mechanisms in mobile ad hoc networks . . . . . . . . . 48--63 Baogui Huang and Jiguo Yu and Xiuzhen Cheng and Honglong Chen and Hang Liu SINR based shortest link scheduling with oblivious power control in wireless networks . . . . . . . . . . . . . . . . 64--72 Fariba Aznoli and Nima Jafari Navimipour Cloud services recommendation: Reviewing the recent advances and suggesting the future research directions . . . . . . . 73--86 Misbah Liaqat and Victor Chang and Abdullah Gani and Siti Hafizah Ab Hamid and Muhammad Toseef and Umar Shoaib and Rana Liaqat Ali Federated cloud resource management: Review and discussion . . . . . . . . . 87--105 Fahimeh Dabaghi and Zeinab Movahedi and Rami Langar A survey on green routing protocols using sleep-scheduling in wired networks 106--122 Long Cheng and Jianwei Niu and Linghe Kong and Chengwen Luo and Yu Gu and Wenbo He and Sajal K. Das Compressive sensing based data quality improvement for crowd-sensing applications . . . . . . . . . . . . . . 123--134 Wenjuan Li and Weizhi Meng and Lam-For Kwok and Horace H. S. Ip Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model 135--145 Chen Lin and Zhidong Shen and Qian Chen and Frederick T. Sheldon A data integrity verification scheme in mobile cloud computing . . . . . . . . . 146--151 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Tshiamo Sigwele and Atm S. Alam and Prashant Pillai and Yim F. Hu Energy-efficient cloud radio access networks by cloud based workload consolidation for 5G . . . . . . . . . . 1--8 Pimmy Gandotra and Rakesh Kumar Jha and Sanjeev Jain A survey on device-to-device (D2D) communication: Architecture and security issues . . . . . . . . . . . . . . . . . 9--29 Giuseppina Garofalo and Andrea Giordano and Patrizia Piro and Giandomenico Spezzano and Andrea Vinci A distributed real-time approach for mitigating CSO and flooding in urban drainage systems . . . . . . . . . . . . 30--42 Ehsan Arianyan and Hassan Taheri and Vahid Khoshdel Novel fuzzy multi objective DVFS-aware consolidation heuristics for energy and SLA efficient resource management in cloud data centers . . . . . . . . . . . 43--61 Xiumin Wang and Xiaoming Chen and Chau Yuen and Weiwei Wu and Meng Zhang and Cheng Zhan Delay-cost tradeoff for virtual machine migration in cloud data centers . . . . 62--72 Gulshan Kumar and Mritunjay Kumar Rai An energy efficient and optimized load balanced localization method using CDS with one-hop neighbourhood and genetic algorithm in WSNs . . . . . . . . . . . 73--82 Fábio D. Rossi and Miguel G. Xavier and César A. F. De Rose and Rodrigo N. Calheiros and Rajkumar Buyya E-eco: Performance-aware energy-efficient cloud data center orchestration . . . . . . . . . . . . . 83--96 Arani Bhattacharya and Pradipta De A survey of adaptation techniques in computation offloading . . . . . . . . . 97--115 Cuiyu Kong and I.-Hsuan Peng Tradeoff design of radio resource scheduling for power and spectrum utilizations in LTE uplink systems . . . 116--124 Ying-Dar Lin and Yuan-Cheng Lai and Hung-Yi Teng and Chun-Chieh Liao and Yi-Chih Kao Scalable multicasting with multiple shared trees in software defined networking . . . . . . . . . . . . . . . 125--133 Abdulbaghi Ghaderzadeh and Mehdi Kargahi and Midia Reshadi InFreD: Intelligent Free Rider Detection in collaborative distributed systems . . 134--145 Miguel López-Benítez and Timothy D. Drysdale and Simon Hadfield and Mohamed Ismaeel Maricar Prototype for multidisciplinary research in the context of the Internet of Things 146--161 Weizhi Meng and Wenjuan Li and Yang Xiang and Kim-Kwang Raymond Choo A Bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks . . . . 162--169 Md Akbar Hossain and Nurul I. Sarkar and Jairo Gutierrez and William Liu Performance study of block ACK and reverse direction in IEEE 802.11n using a Markov chain model . . . . . . . . . . 170--179 Sara Ayoubi and Chadi Assi and Yiheng Chen and Tarek Khalifa and Khaled Bashir Shaban Restoration methods for cloud multicast virtual networks . . . . . . . . . . . . 180--190 Waqar Ahmed and Osman Hasan and Usman Pervez and Junaid Qadir Reliability modeling and analysis of communication networks . . . . . . . . . 191--215 Amrita Ghosal and Subir Halder and Stefano Chessa Secure key design approaches using entropy harvesting in wireless sensor network: a survey . . . . . . . . . . . 216--230 Mina Mirhosseini and Fatemeh Barani and Hossein Nezamabadi-pour QQIGSA: a quadrivalent quantum-inspired GSA and its application in optimal adaptive design of wireless sensor networks . . . . . . . . . . . . . . . . 231--241 Mukhtiar Ahmed and Mazleena Salleh and M. Ibrahim Channa Routing protocols based on node mobility for Underwater Wireless Sensor Network (UWSN): a survey . . . . . . . . . . . . 242--252 Qing Li and Yong Jiang and Pengfei Duan and Mingwei Xu and Xi Xiao Quokka: Latency-Aware Middlebox Scheduling with dynamic resource allocation . . . . . . . . . . . . . . . 253--266 Thaha Muhammed and Riaz Ahmed Shaikh An analysis of fault detection strategies in wireless sensor networks 267--287 Sheng Wen and Jiaojiao Jiang and Bo Liu and Yang Xiang and Wanlei Zhou Using epidemic betweenness to measure the influence of users in complex networks . . . . . . . . . . . . . . . . 288--299 Chien-Fu Cheng and Lung-Hao Li Data gathering problem with the data importance consideration in Underwater Wireless Sensor Networks . . . . . . . . 300--312 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Muhammad Habib ur Rehman and Chee Sun Liew and Teh Ying Wah and Muhammad Khurram Khan Towards next-generation heterogeneous mobile data stream mining applications: Opportunities, challenges, and future research directions . . . . . . . . . . 1--24 Shahriar kaisar and Joarder Kamruzzaman and Gour Karmakar and Iqbal Gondal Decentralized content sharing among tourists in visiting hotspots . . . . . 25--40 Kayode Sakariyah Adewole and Nor Badrul Anuar and Amirrudin Kamsin and Kasturi Dewi Varathan and Syed Abdul Razak Malicious accounts: Dark of the social networks . . . . . . . . . . . . . . . . 41--67 Annie Ibrahim Rana and Brendan Jennings Semantic aware processing of user defined inference rules to manage home networks . . . . . . . . . . . . . . . . 68--87 Ashish Singh and Kakali Chatterjee Cloud security issues and challenges: a survey . . . . . . . . . . . . . . . . . 88--115 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Ting Lu and Guohua Liu and Wei Li and Shan Chang and Wenjing Guo Distributed sampling rate allocation for data quality maximization in rechargeable sensor networks . . . . . . 1--9 Prasan Kumar Sahoo and Jang-Ping Sheu Design and analysis of collision free MAC for wireless sensor networks with or without data retransmission . . . . . . 10--21 L. Manunza and S. Marseglia and S. P. Romano Kerberos: a real-time fraud detection system for IMS-enabled VoIP networks . . 22--34 Chunhong Liu and Chuanchang Liu and Yanlei Shang and Shiping Chen and Bo Cheng and Junliang Chen An adaptive prediction approach based on workload pattern discrimination in the cloud . . . . . . . . . . . . . . . . . 35--44 Fan Deng and Li-Yong Zhang Elimination of policy conflict to improve the PDP evaluation performance 45--57 N. Busom and R. Petrlic and F. Sebé and C. Sorge and M. Valls A privacy-preserving reputation system with user rewards . . . . . . . . . . . 58--66 Habib Mostafaei and Antonio Montieri and Valerio Persico and Antonio Pescapé A sleep scheduling approach based on learning automata for WSN partial coverage . . . . . . . . . . . . . . . . 67--78 Mohammad Masdari Markov chain-based evaluation of the certificate status validations in hybrid MANETs . . . . . . . . . . . . . . . . . 79--89 Jihong Wang and Wenxiao Shi Joint multicast routing and channel assignment for multi-radio multi-channel wireless mesh networks with hybrid traffic . . . . . . . . . . . . . . . . 90--108 Maryam Barshan and Hendrik Moens and Bruno Volckaert and Filip De Turck Design and evaluation of a dual dynamic adaptive reservation approach in media production networks . . . . . . . . . . 109--122 Maicon Melo Alves and Luci Pirmez and Silvana Rossetto and Flavia C. Delicato and Claudio M. de Farias and Paulo F. Pires and Igor L. dos Santos and Albert Y. Zomaya Damage prediction for wind turbines using wireless sensor and actuator networks . . . . . . . . . . . . . . . . 123--140 Chengwen Luo and Long Cheng and Hande Hong and Kartik Sankaran and Mun Choon Chan and Jianqiang Li and Zhong Ming From mapping to indoor semantic queries: Enabling zero-effort indoor environmental sensing . . . . . . . . . 141--151 Ahmed AlEroud and Izzat Alsmadi Identifying cyber-attacks on software defined networks: an inference-based intrusion detection approach . . . . . . 152--164 Chao-Tung Yang and Jung-Chun Liu and Shuo-Tsung Chen and Kuan-Lung Huang Virtual machine management system based on the power saving algorithm in cloud 165--180 Saritha Arunkumar and Berker Soyluoglu and Murat Sensoy and Mudhakar Srivatsa and Muttukrishnan Rajarajan Location attestation and access control for mobile devices using GeoXACML . . . 181--188 Mehdi Boulaiche and Louiza Bouallouche-Medjkoune HSecGR: Highly Secure Geographic Routing 189--199 Murat Karakus and Arjan Durresi Quality of Service (QoS) in Software Defined Networking (SDN): a survey . . . 200--218 Mohammad Goudarzi and Mehran Zamani and Abolfazl Toroghi Haghighat A fast hybrid multi-site computation offloading for mobile cloud computing 219--231 Alessandro Morelli and Mauro Tortonesi and Cesare Stefanelli and Niranjan Suri Information-Centric Networking in next-generation communications scenarios 232--250 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Marco Cogoni and Giovanni Busonera and Paolo Anedda and Gianluigi Zanetti Transition to congestion in communication/computation networks for near-optimal and sub-optimal resource management via Monte Carlo simulations 1--11 Swati Sharma and Alefiya Hussain and Huzur Saran Towards repeatability & verifiability in networking experiments: a stochastic framework . . . . . . . . . . . . . . . 12--23 Asrin Vakili and Nima Jafari Navimipour Comprehensive and systematic review of the service composition mechanisms in the cloud environments . . . . . . . . . 24--36 Yu Xin and Zhi-Qiang Xie and Jing Yang A load balance oriented cost efficient scheduling method for parallel tasks . . 37--46 Shantanu Pal Evaluating the impact of network loads and message size on mobile opportunistic networks in challenged environments . . 47--58 Giancarlo Fortino and Giuseppe Di Fatta and Sergio F. Ochoa and Carlos E. Palau Engineering future interoperable and open IoT systems . . . . . . . . . . . . 59--61 Georgios Exarchakos and Ilker Oztelcan and Dimitris Sarakiotis and Antonio Liotta plexi: Adaptive re-scheduling web-service of time synchronized low-power wireless networks . . . . . . 62--73 G. Aloi and G. Caliciuri and G. Fortino and R. Gravina and P. Pace and W. Russo and C. Savaglio Enabling IoT interoperability through opportunistic smartphone-based mobile gateways . . . . . . . . . . . . . . . . 74--84 Pal Varga and Fredrik Blomstedt and Luis Lino Ferreira and Jens Eliasson and Mats Johansson and Jerker Delsing and Iker Martínez de Soria Making system of systems interoperable --- The core components of the arrowhead framework . . . . . . . . . . . . . . . 85--95 Michael P. Andersen and Gabe Fierro and David E. Culler Enabling synergy in IoT: Platform to service and beyond . . . . . . . . . . . 96--110 Maria Ganzha and Marcin Paprzycki and Wieslaw Pawlowski and Pawel Szmeja and Katarzyna Wasielewska Semantic interoperability in the Internet of Things: an overview from the INTER-IoT perspective . . . . . . . . . 111--124 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
R. Asorey-Cacheda and A.-J. Garcia-Sanchez and F. Garcia-Sanchez and J. Garcia-Haro A survey on non-linear optimization problems in wireless sensor networks . . 1--20 Gianluca Franchino and Giorgio Buttazzo A power-aware MAC layer protocol for real-time communication in wireless embedded systems . . . . . . . . . . . . 21--34 Liang Zhu and Changqiao Xu and Jianfeng Guan and Hongke Zhang SEM--PPA: a semantical pattern and preference-aware service mining method for personalized point of interest recommendation . . . . . . . . . . . . . 35--46 Juan J. Pérez-Solano and Santiago Felici-Castell Improving time synchronization in Wireless Sensor Networks using Bayesian Inference . . . . . . . . . . . . . . . 47--55 Wenting Shen and Jia Yu and Hui Xia and Hanlin Zhang and Xiuqing Lu and Rong Hao Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium . . . . 56--64 Alaa Awad and Amr Mohamed and Carla-Fabiana Chiasserini and Tarek Elfouly Distributed in-network processing and resource optimization over mobile-health systems . . . . . . . . . . . . . . . . 65--76 Hyunbum Kim and Heekuck Oh and Paolo Bellavista and Jalel Ben-Othman Constructing event-driven partial barriers with resilience in wireless mobile sensor networks . . . . . . . . . 77--92 Maryam Amiri and Leyli Mohammad-Khanli Survey on prediction models of applications for resources provisioning in cloud . . . . . . . . . . . . . . . . 93--113 Furui Zhan and Nianmin Yao and Zhenguo Gao and Guozhen Tan A novel key generation method for wireless sensor networks based on system of equations . . . . . . . . . . . . . . 114--127 Hang Shen and Guangwei Bai and Mei Yang and Zhonghui Wang Protecting trajectory privacy: a user-centric analysis . . . . . . . . . 128--139 Sanjib K. Deka and Nityananda Sarma Opportunity prediction at MAC-layer sensing for ad-hoc cognitive radio networks . . . . . . . . . . . . . . . . 140--151 Hamid Reza Arkian and Abolfazl Diyanat and Atefe Pourkhalili MIST: Fog-based data analytics scheme with cost-efficient resource provisioning for IoT crowdsensing applications . . . . . . . . . . . . . . 152--165 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Amir Rahimzadeh Ilkhechi and Ibrahim Korpeoglu and Ugur Güdükbay and Özgür Ulusoy PETAL: a fully distributed location service for wireless ad hoc networks . . 1--11 Mengmeng Ge and Jin B. Hong and Walter Guttmann and Dong Seong Kim A framework for automating security analysis of the Internet of Things . . . 12--27 Mariluz Congosto and Pablo Basanta-Val and Luis Sanchez-Fernandez T-Hoarder: a framework to process Twitter data streams . . . . . . . . . . 28--39 Palvinder Singh Mann and Satvir Singh Energy efficient clustering protocol based on improved metaheuristic in wireless sensor networks . . . . . . . . 40--52 Chang Ruan and Jianxin Wang and Wanchun Jiang and Jiawei Huang and Geyong Min and Yi Pan FSQCN: Fast and simple quantized congestion notification in data center Ethernet . . . . . . . . . . . . . . . . 53--62 Yue Qiu and Maode Ma and Xilei Wang A proxy signature-based handover authentication scheme for LTE wireless networks . . . . . . . . . . . . . . . . 63--71 Nadine Abbas and Hazem Hajj and Zaher Dawy and Karim Jahed and Sanaa Sharafeddine An optimized approach to video traffic splitting in heterogeneous wireless networks with energy and QoE considerations . . . . . . . . . . . . . 72--88 Jun Huang and Liqian Xu and Qiang Duan and Cong-cong Xing and Jiangtao Luo and Shui Yu Modeling and performance analysis for multimedia data flows scheduling in software defined networks . . . . . . . 89--100 Jonghoon Park and Cheoleun Moon and Ikjun Yeom and Yusung Kim Cardinality estimation using collective interference for large-scale RFID systems . . . . . . . . . . . . . . . . 101--110 Samira Chouikhi and In\`es El Korbi and Yacine Ghamri-Doudane and Leila Azouz Saidane Centralized connectivity restoration in multichannel wireless sensor networks 111--123 Anum Ali and Ghalib A. Shah and Muhammad Omer Farooq and Usman Ghani Technologies and challenges in developing machine-to-machine applications: a survey . . . . . . . . . 124--139 Ada Gogu and Dritan Nace and Enrico Natalizio and Yacine Challal Using dynamic programming to solve the Wireless Sensor Network Configuration Problem . . . . . . . . . . . . . . . . 140--154 Adel Nadjaran Toosi and Chenhao Qu and Marcos Dias de Assunção and Rajkumar Buyya Renewable-aware geographical load balancing of web applications for sustainable data centers . . . . . . . . 155--168 Zina Chkirbene and Sebti Foufou and Ridha Hamila and Zahir Tari and Albert Y. Zomaya LaCoDa: Layered connected topology for massive data centers . . . . . . . . . . 169--180 Abderrazak Abdaoui and Tarek M. El Fouly and Mohamed H. Ahmed Impact of time synchronization error on the mode-shape identification and damage detection/localization in WSNs for structural health monitoring . . . . . . 181--189 Israel Leyva-Mayorga and Vicent Pla and Jorge Martinez-Bauset and Mario E. Rivero-Angeles A hybrid method for the QoS analysis and parameter optimization in time-critical random access wireless sensor networks 190--203 Yunchuan Sun and Xinpei Yu and Rongfang Bie and Houbing Song Discovering time-dependent shortest path on traffic graph for drivers towards green driving . . . . . . . . . . . . . 204--212 Yu Liu and Changjie Zhang and Bo Li and Jianwei Niu DeMS: a hybrid scheme of task scheduling and load balancing in computing clusters 213--220 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Neenu Garg and Seema Bawa RITS--MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing 1--13 Ingrid Nunes and Frederico Schardong and Alberto Schaeffer-Filho BDI2DoS: an application using collaborating BDI agents to combat DDoS attacks . . . . . . . . . . . . . . . . 14--24 Bruno Bogaz Zarpelão and Rodrigo Sanches Miani and Cláudio Toshio Kawakani and Sean Carlisto de Alvarenga A survey of intrusion detection in Internet of Things . . . . . . . . . . . 25--37 Muhammad Baqer Mollah and Md. Abul Kalam Azad and Athanasios Vasilakos Security and privacy challenges in mobile cloud computing: Survey and way ahead . . . . . . . . . . . . . . . . . 38--54 Gürkan Solmaz and Damla Turgut Tracking pedestrians and emergent events in disaster areas . . . . . . . . . . . 55--67 Mahfuzur Rahman and Peter Graham Compatibility-based static VM placement minimizing interference . . . . . . . . 68--81 Babak Pourpeighambar and Mehdi Dehghan and Masoud Sabaei Multi-agent learning based routing for delay minimization in Cognitive Radio Networks . . . . . . . . . . . . . . . . 82--92 Imad Jawhar and Nader Mohamed and Jameela Al-Jaroodi and Dharma P. Agrawal and Sheng Zhang Communication and networking of UAV-based systems: Classification and associated architectures . . . . . . . . 93--108 Mohammed I. Alghamdi and Xunfei Jiang and Ji Zhang and Jifu Zhang and Minghua Jiang and Xiao Qin Towards two-phase scheduling of real-time applications in distributed systems . . . . . . . . . . . . . . . . 109--117 Binglei Guo and Jiong Yu and Bin Liao and Dexian Yang and Liang Lu A green framework for DBMS based on energy-aware query optimization and energy-efficient query processing . . . 118--130 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Chun-Wei Tsai and Priyanka Rawat and Ming-Chao Chiang Intelligent systems for heterogeneous networks . . . . . . . . . . . . . . . . 1--3 Heejun Roh and Cheoulhoon Jung and Kyunghwi Kim and Sangheon Pack and Wonjun Lee Joint flow and virtual machine placement in hybrid cloud data centers . . . . . . 4--13 Bart Spinnewyn and Ruben Mennes and Juan Felipe Botero and Steven Latré Resilient application placement for geo-distributed cloud networks . . . . . 14--31 S. Kirthica and Rajeswari Sridhar CIT: a Cloud Inter-operation Toolkit to enhance elasticity and tolerate shut down of external clouds . . . . . . . . 32--46 Aiqin Hou and Chase Q. Wu and Dingyi Fang and Yongqiang Wang and Meng Wang Bandwidth scheduling for big data transfer using multiple fixed node-disjoint paths . . . . . . . . . . 47--55 Jianfeng Guan and Zhiwei Yan and Su Yao and Changqiao Xu and Hongke Zhang GBC-based caching function group selection algorithm for SINET . . . . . 56--63 Guangjie Han and Chenyu Zhang and Jinfang Jiang and Xuan Yang and Mohsen Guizani Mobile anchor nodes path planning algorithms using network-density-based clustering in wireless sensor networks 64--75 Junfeng Wang and Yiming Miao and Ping Zhou and M. Shamim Hossain and Sk Md Mizanur Rahman A software defined network routing in wireless multihop network . . . . . . . 76--83 Samir S. Soliman and Bongyong Song Fifth generation (5G) cellular and the network for tomorrow: cognitive and cooperative approach for energy savings 84--93 Vishal Sharma and Kathiravan Srinivasan and Han-Chieh Chao and Kai-Lung Hua and Wen-Huang Cheng Intelligent deployment of UAVs in 5G heterogeneous communication environment for improved coverage . . . . . . . . . 94--105 Chih-Cheng Tseng and Hwang--Cheng Wang and Kuo-Chang Ting and Chih-Chieh Wang and Fang-Chang Kuo Fast game-based handoff mechanism with load balancing for LTE/LTE-A heterogeneous networks . . . . . . . . . 106--115 Chen Chen and Tie Qiu and Jinna Hu and Zhiyuan Ren and Yang Zhou and Arun Kumar Sangaiah A congestion avoidance game for information exchange on intersections in heterogeneous vehicular networks . . . . 116--126 Haneul Ko and Sangheon Pack and Jong-Hyouk Lee and Alexandru Petrescu DLM: Delayed Location Management in network mobility (NEMO)-based public transportation systems . . . . . . . . . 127--133 Hyun-Ho Choi and Jung-Ryun Lee A flocking-inspired algorithm for fair resource allocation in vehicle-mounted mobile relays . . . . . . . . . . . . . 134--142 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Zheng Yan and Jun Liu and Laurence T. Yang Special issue on pervasive social networking . . . . . . . . . . . . . . . 1--2 Chang Liu and Liehuang Zhu and Jinjun Chen Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud . . . . . . 3--14 Feng Lu and Weikang Zhang and Liwen Shao and Xunfei Jiang and Peng Xu and Hai Jin Scalable influence maximization under independent cascade model . . . . . . . 15--23 Darren Quick and Kim-Kwang Raymond Choo Pervasive social networking forensics: Intelligence and evidence from mobile device extracts . . . . . . . . . . . . 24--33 Gang Sun and Yuxia Xie and Dan Liao and Hongfang Yu and Victor Chang User-defined privacy location-sharing system in mobile online social networks 34--45 Zheng Yan and Wangyang Shi CloudFile: a cloud data access control system based on mobile social trust . . 46--58 Wenyin Yang and Guojun Wang and Md Zakirul Alam Bhuiyan and Kim-Kwang Raymond Choo Hypergraph partitioning for social networks based on information entropy modularity . . . . . . . . . . . . . . . 59--71 Yue Zhang and Bin Song and Peng Zhang Social behavior study under pervasive social networking based on decentralized deep reinforcement learning . . . . . . 72--81 Zufan Zhang and Lisha Wang and Dan Liu and Yu Zhang Peer discovery for D2D communications based on social attribute and service attribute . . . . . . . . . . . . . . . 82--91 Yadong Zhou and Beibei Zhang and Xiaoxiao Sun and Qinghua Zheng and Ting Liu Analyzing and modeling dynamics of information diffusion in microblogging social network . . . . . . . . . . . . . 92--102 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mohammad Masdari and Safiyyeh Ahmadzadeh A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems . . . . . . 1--19 Bing Xiong and Kun Yang and Jinyuan Zhao and Keqin Li Robust dynamic network traffic partitioning against malicious attacks 20--31 Franciscus X. A. Wibowo and Mark A. Gregory and Khandakar Ahmed and Karina M. Gomez Multi-domain Software Defined Networking: Research status and challenges . . . . . . . . . . . . . . . 32--45 Ping Song and Yi Liu and Chi Liu and Depei Qian ParaFlow: Fine-grained parallel SDN controller for large-scale networks . . 46--59 Sisi Xiong and Yanjun Yao and Michael Berry and Hairong Qi and Qing Cao Frequent traffic flow identification through probabilistic Bloom filter and its GPU-based acceleration . . . . . . . 60--72 Rodolfo S. Antunes and Matheus B. Lehmann and Rodrigo B. Mansilha and Luciano P. Gaspary and Marinho P. Barcellos NDNrel: a mechanism based on relations among objects to improve the performance of NDN . . . . . . . . . . . . . . . . . 73--86 B. Ducourthial and S. Mottelet and A. Busson Improving fairness between close Wi-Fi access points . . . . . . . . . . . . . 87--99 Chunlin Li and Jing Zhang and Youlong Luo Real-time scheduling based on optimized topology and communication traffic in distributed real-time computation platform of storm . . . . . . . . . . . 100--115 Muhammad Faran Majeed and Matthew N. Dailey and Riaz Khan and Apinun Tunpan Pre-caching: a proactive scheme for caching video traffic in named data mesh networks . . . . . . . . . . . . . . . . 116--130 Reza Farrahi Moghaddam and Vahid Asghari and Fereydoun Farrahi Moghaddam and Yves Lemieux and Mohamed Cheriet A Monte-Carlo approach to lifespan failure performance analysis of the network fabric in modular data centers 131--146 Saeed Kargar and Leyli Mohammad-Khanli Fractal: an advanced multidimensional range query lookup protocol on nested rings for distributed systems . . . . . 147--168 Animesh Roy and Soumit Bose and Tamaghna Acharya and Sipra DasBit Social-based energy-aware multicasting in delay tolerant networks . . . . . . . 169--184 W. Haider and J. Hu and J. Slay and B. P. Turnbull and Y. Xie Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling . . . . . . . . . . 185--192 David Nuñez and Isaac Agudo and Javier Lopez Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation . . . . . . . . 193--209 Peng Liu and Biao Xu and Guojun Dai and Zhen Jiang and Jie Wu MDP: Minimum delay hot-spot parking . . 210--222 I. B. Arun and T. G. Venkatesh Design and performance analysis of a MAC protocol for wireless LANs supporting multipacket reception . . . . . . . . . 223--236 Mohammed Atiquzzaman Editorial: New Editors 2017 . . . . . . A1--A5 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
De-gan Zhang and Si Liu and Ting Zhang and Zhao Liang Novel unequal clustering routing protocol considering energy balancing based on network partition & distance for mobile education . . . . . . . . . . . . 1--9 Fadele Ayotunde Alaba and Mazliza Othman and Ibrahim Abaker Targio Hashem and Faiz Alotaibi Internet of Things security: a survey 10--28 Melchizedek Alipio and Nestor Michael Tiglao and Antonio Grilo and Fawaz Bokhari and Umair Chaudhry and Shavez Qureshi Cache-based transport protocols in wireless sensor networks: a survey and future directions . . . . . . . . . . . 29--49 Einollah Jafarnejad Ghomi and Amir Masoud Rahmani and Nooruldeen Nasih Qader Load-balancing algorithms in cloud computing: a survey . . . . . . . . . . 50--71 Ahmed I. Saleh and Khaled M. Abo-Al-Ez and Ahmed A. Abdullah A Multi-Aware Query Driven (MAQD) routing protocol for mobile wireless sensor networks based on neuro-fuzzy inference . . . . . . . . . . . . . . . 72--98 Sumair Khan and Babar Nazir and Iftikhar Ahmed Khan and Shahaboddin Shamshirband and Anthony T. Chronopoulos Load balancing in grid computing: Taxonomy, trends and opportunities . . . 99--111 Eunsam Kim and Jonathan C. L. Liu An integrated prefetching/caching scheme in multimedia servers . . . . . . . . . 112--123 Ruiying Li and Meinan Li and Haitao Liao and Ning Huang An efficient method for evaluating the end-to-end transmission time reliability of a switched Ethernet . . . . . . . . . 124--133 Carlos Abreu and Francisco Miranda and P. M. Mendes Smart context-aware QoS-based admission control for biomedical wireless sensor networks . . . . . . . . . . . . . . . . 134--145 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Victor Chang and Verena Kantere and Muthu Ramanchadran Emerging services for Internet of Things 1--2 Gang Sun and Victor Chang and Muthu Ramachandran and Zhili Sun and Gangmin Li and Hongfang Yu and Dan Liao Efficient location privacy algorithm for Internet of Things (IoT) services and applications . . . . . . . . . . . . . . 3--13 Faisal Fayyaz Qureshi and Rahat Iqbal and Muhammad Nabeel Asghar Energy efficient wireless communication technique based on Cognitive Radio for Internet of Things . . . . . . . . . . . 14--25 Yang Yang and Xianghan Zheng and Chunming Tang Lightweight distributed secure data management system for health Internet of Things . . . . . . . . . . . . . . . . . 26--37 Muneer Bani Yassein and Shadi Aljawarneh and Esra'a Masa'deh A new elastic trickle timer algorithm for Internet of Things . . . . . . . . . 38--47 Chen Chen and Honghui Zhao and Tie Qiu and Mingcheng Hu and Hui Han and Zhiyuan Ren An efficient power saving polling scheme in the Internet of Energy . . . . . . . 48--61 Pradeep Kumar and Rajkumar Saini and Partha Pratim Roy and Debi Prosad Dogra A bio-signal based framework to secure mobile devices . . . . . . . . . . . . . 62--71 Fan Wu and Lili Xu and Saru Kumari and Xiong Li and Jian Shen and Kim-Kwang Raymond Choo and Mohammad Wazid and Ashok Kumar Das An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment . . . . . . . . . . . . . . . 72--85 Cong Zhang and Chin-Feng Lai and Ying-Hsun Lai and Zhen-Wei Wu and Han-Chieh Chao An inferential real-time falling posture reconstruction for Internet of Healthcare Things . . . . . . . . . . . 86--95 Thar Baker and Muhammad Asim and Hissam Tawfik and Bandar Aldawsari and Rajkumar Buyya An energy-aware service composition algorithm for multiple cloud-based IoT applications . . . . . . . . . . . . . . 96--108 Md Fasiul Alam and Serafeim Katsikas and Olga Beltramello and Stathes Hadjiefthymiades Augmented and virtual reality based monitoring and safety system: a prototype IoT platform . . . . . . . . . 109--119 Xuan Thang Nguyen and Huu Tam Tran and Harun Baraki and Kurt Geihs Optimization of non-functional properties in Internet of Things applications . . . . . . . . . . . . . . 120--129 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Cristian Cleder Machado and Juliano Araujo Wickboldt and Lisandro Zambenedetti Granville and Alberto Schaeffer-Filho ARKHAM: an Advanced Refinement toolkit for Handling Service Level Agreements in Software-Defined Networking . . . . . . 1--16 Ahmad H. Dehwah and Shahrazed Elmetennani and Christian Claudel UD-WCMA: an energy estimation and forecast scheme for solar powered wireless sensor networks . . . . . . . . 17--25 Thiago P. B. Vieira and Danilo F. Tenório and João Paulo C. L. da Costa and Edison P. de Freitas and Giovanni Del Galdo and Rafael T. de Sousa Júnior Model order selection and eigen similarity based framework for detection and identification of network attacks 26--41 Javad Zarrin and Rui L. Aguiar and João Paulo Barraca HARD: Hybrid Adaptive Resource Discovery for Jungle Computing . . . . . . . . . . 42--73 Ju Hyoung Mun and Hyesook Lim Cache sharing using bloom filters in named data networking . . . . . . . . . 74--82 Tin-Yu Wu and Nadra Guizani and Jhih-Siang Huang Live migration improvements by related dirty memory prediction in cloud computing . . . . . . . . . . . . . . . 83--89 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Erwin Adi and Zubair Baig and Philip Hingston Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services . . . . . . . . . . . . . . . . 1--13 Trung V. Phan and Nguyen Khac Bao and Minho Park Distributed-SOM: a novel performance bottleneck handler for large-sized software-defined networks under flooding attacks . . . . . . . . . . . . . . . . 14--25 Shigen Shen and Haiping Ma and En Fan and Keli Hu and Shui Yu and Jianhua Liu and Qiying Cao A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion . . . . . . . . . . . . . . . 26--35 Mohammad Masdari and Safiyyeh Ahmadzadeh and Moazam Bidaki Key management in wireless Body Area Network: Challenges and issues . . . . . 36--51 Vireshwar Kumar and Jung-Min (Jerry) Park and Kaigui Bian Transmitter authentication using hierarchical modulation in dynamic spectrum sharing . . . . . . . . . . . . 52--60 Souad Ghazouani and Yahya Slimani A survey on cloud service description 61--74 Jing Zhang and Li Xu and Shuming Zhou and Geyong Min and Yang Xiang and Jia Hu Crossed Cube Ring: a $k$-connected virtual backbone for wireless sensor networks . . . . . . . . . . . . . . . . 75--88 Malik Muhammad Qirtas and Yasir Faheem and Mubashir Husain Rehmani Throwboxes in delay tolerant networks: a survey of placement strategies, buffering capacity, and mobility models 89--103 Angelos Michalas and Aggeliki Sgora and Dimitrios D. Vergados An integrated MIH-FPMIPv6 mobility management approach for evolved-packet system architectures . . . . . . . . . . 104--119 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Sabu M. Thampi and Jaime Lloret Mauri and Robin Doss Special issue on Underwater Acoustic Sensor Networks: Emerging trends and current perspectives . . . . . . . . . . 1--2 Sarang C. Dhongdi and Pritish Nahar and Rishabh Sethunathan and Lucy J. Gudino and K. R. Anupama Cross-layer protocol stack development for three-dimensional underwater Acoustic Sensor Network . . . . . . . . 3--19 Priyatosh Mandal Performance comparison of TDMA variants for underwater acoustic sensor networks 20--30 Nadeem Javaid and Sheraz Hussain and Ashfaq Ahmad and Muhammad Imran and Abid Khan and Mohsen Guizani Region based cooperative routing in underwater wireless sensor networks . . 31--41 Shalli Rani and Syed Hassan Ahmed and Jyoteesh Malhotra and Rajneesh Talwar Energy efficient chain based routing protocol for underwater wireless sensor networks . . . . . . . . . . . . . . . . 42--50 Guangjie Han and Li Liu and Na Bao and Jinfang Jiang and Wenbo Zhang and Joel J. P. C. Rodrigues AREP: an asymmetric link-based reverse routing protocol for underwater acoustic sensor networks . . . . . . . . . . . . 51--58 Jingjing Wang and Wei Shi and Lingwei Xu and Liya Zhou and Qiuna Niu and Ju liu Design of optical-acoustic hybrid underwater wireless sensor network . . . 59--67 Weifeng Sun and Chi Zhou and Tie Qiu and Yuqing Liu An efficient communication scheme for solving merge conflicts in maritime transportation . . . . . . . . . . . . . 68--76 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mustapha Boushaba and Abdelhakim Hafid and Michel Gendreau Node stability-based routing in Wireless Mesh Networks . . . . . . . . . . . . . 1--12 Albert Sunny and Sumankumar Panchal and Nikhil Vidhani and Subhashini Krishnasamy and S. V. R. Anand and Malati Hegde and Joy Kuri and Anurag Kumar A generic controller for managing TCP transfers in IEEE 802.11 infrastructure WLANs . . . . . . . . . . . . . . . . . 13--26 Chi-Sheng Huang and Meng-Feng Tsai and Po-Hsuan Huang and Li-Ding Su and Kuei-Sheng Lee Distributed asteroid discovery system for large astronomical data . . . . . . 27--37 Farid Lalem and Ahc\`ene Bounceur and Madani Bezoui and Massinissa Saoudi and Reinhardt Euler and Tahar Kechadi and Marc Sevaux LPCN: Least polar-angle connected node algorithm to find a polygon hull in a connected Euclidean graph . . . . . . . 38--50 M. Ahmad and M. Azam and M. Naeem and M. Iqbal and A. Anpalagan and M. Haneef Resource management in D2D communication: an optimization perspective . . . . . . . . . . . . . . 51--75 Chaofan Ma and Wei Liang and Meng Zheng Delay constrained relay node placement in two-tiered wireless sensor networks: a set-covering-based algorithm . . . . . 76--90 Jeyasekar A. and Kasmir Raja S. V. and Annie Uthra R. Congestion avoidance algorithm using ARIMA(2,1,1) model-based RTT estimation and RSS in heterogeneous wired-wireless networks . . . . . . . . . . . . . . . . 91--109 Chengming Luo and Wei Li and Xinnan Fan and Hai Yang and Jianjun Ni and Xuewu Zhang and Gaifang Xin and Pengfei Shi Positioning technology of mobile vehicle using self-repairing heterogeneous sensor networks . . . . . . . . . . . . 110--122 Chao Bu and Xingwei Wang and Hui Cheng and Min Huang and Keqin Li and Sajal K. Das Enabling Adaptive Routing Service Customization via the integration of SDN and NFV . . . . . . . . . . . . . . . . 123--136 Sugi Lee and Younghoon Kim and Ikjun Yeom and Yusung Kim Active request management in stateful forwarding networks . . . . . . . . . . 137--149 Mohammad Sharif and Abolghasem Sadeghi-Niaraki Ubiquitous sensor network simulation and emulation environments: a survey . . . . 150--181 Pieter-Jan Maenhaut and Hendrik Moens and Bruno Volckaert and Veerle Ongenae and Filip De Turck A dynamic Tenant-Defined Storage system for efficient resource management in cloud applications . . . . . . . . . . . 182--196 Bo Yi and Xingwei Wang and Min Huang Design and evaluation of schemes for provisioning service function chain with function scalability . . . . . . . . . . 197--214 Yao-Chung Fan and Huan Chen and Fang-Yie Leu and Ilsun You Enabling in-network aggregation by diffusion units for urban scale M2M networks . . . . . . . . . . . . . . . . 215--227 Akiya Kamimura and Kohji Tomita A self-organizing network coordination framework enabling collision-free and congestion-less wireless sensor networks 228--244 Muhammad Asif Khan and Wael Cherif and Fethi Filali and Ridha Hamila Wi-Fi Direct Research --- Current Status and Future Perspectives . . . . . . . . 245--258 Shahid Anwar and Zakira Inayat and Mohamad Fadli Zolkipli and Jasni Mohamad Zain and Abdullah Gani and Nor Badrul Anuar and Muhammad Khurram Khan and Victor Chang Cross-VM cache-based side channel attacks and proposed prevention mechanisms: a survey . . . . . . . . . . 259--279 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Reza Ghebleh and Ali Ghaffari Retracted: A Comprehensive survey on 5G: the prospect of future communications 1--32 Bin Dai and Guan Xu and Bengxiong Huang and Peng Qin and Yang Xu Enabling network innovation in data center networks with software defined networking: a survey . . . . . . . . . . 33--49 Faheem Zafar and Abid Khan and Saba Suhail and Idrees Ahmed and Khizar Hameed and Hayat Mohammad Khan and Farhana Jabeen and Adeel Anjum Trustworthy data: a survey, taxonomy and future trends of secure provenance schemes . . . . . . . . . . . . . . . . 50--68 Arijit Nath and Nityananda Sarma A distributed solution for cooperative spectrum sensing scheduling in multi-band cognitive radio networks . . 69--77 Stefano Petrangeli and Tingyao Wu and Tim Wauters and Rafael Huysegems and Tom Bostoen and Filip De Turck A machine learning-based framework for preventing video freezes in HTTP adaptive streaming . . . . . . . . . . . 78--92 Warley Junior and Adriano França and Kelvin Dias and José N. de Souza Supporting mobility-aware computational offloading in mobile cloud environment 93--108 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Waqas Rehan and Stefan Fischer and Maaz Rehan and Mubashir Husain Rehmani A comprehensive survey on multichannel routing in wireless sensor networks . . 1--25 Mohammad Sadegh Aslanpour and Mostafa Ghobaei-Arani and Adel Nadjaran Toosi Auto-scaling web applications in clouds: a cost-aware approach . . . . . . . . . 26--41 Antonio Marotta and Enrica Zola and Fabio D'Andreagiovanni and Andreas Kassler A fast robust optimization-based heuristic for the deployment of green virtual network functions . . . . . . . 42--53 Garima Chopra and Rakesh Kumar Jha and Sanjeev Jain A survey on ultra-dense network and emerging technologies: Security challenges and possible solutions . . . 54--78 Leonard Heilig and Rajkumar Buyya and Stefan Voß Location-aware brokering for consumers in multi-cloud computing environments 79--93 Daniel Yokoyama and Bruno Schulze and Henrique Kloh and Matheus Bandini and Vinod Rebello Affinity aware scheduling model of cluster nodes in private clouds . . . . 94--104 Tingwei Zhu and Dan Feng and Fang Wang and Yu Hua and Qingyu Shi and Yanwen Xie and Yong Wan A congestion-aware and robust multicast protocol in SDN-based data center networks . . . . . . . . . . . . . . . . 105--117 Mohammed Atiquzzaman Editorial: 2016 Best Paper Awards . . . A1--A4 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Chih-Min Chao and Yun-Ting Ling and Cheng-Hong Jiang Number of channels adjustment for cognitive radio networks . . . . . . . . 1--13 M. De Benedetti and F. D'Urso and G. Fortino and F. Messina and G. Pappalardo and C. Santoro A fault-tolerant self-organizing flocking approach for UAV aerial survey 14--30 Amir Khorsandi Koohanestani and Amin Ghalami Osgouei and Hossein Saidi and Ali Fanian An analytical model for delay bound of OpenFlow based SDN using network calculus . . . . . . . . . . . . . . . . 31--38 Pimmy Gandotra and Rakesh Kumar Jha A survey on green communication and security challenges in 5G wireless communication networks . . . . . . . . . 39--61 Abolfazl Diyanat and Ahmad Khonsari and Hosein Shafiei Preservation of temporal privacy in body sensor networks . . . . . . . . . . . . 62--71 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Abdusy Syarif and Abdelhafid Abouaissa and Pascal Lorenz Operator calculus approach for route optimizing and enhancing wireless sensor network . . . . . . . . . . . . . . . . 1--10 Jorge Maestre Vidal and Ana Lucila Sandoval Orozco and Luis Javier García Villalba Alert correlation framework for malware detection by anomaly-based packet payload analysis . . . . . . . . . . . . 11--22 Behrouz Pourghebleh and Nima Jafari Navimipour Data aggregation mechanisms in the Internet of things: a systematic review of the literature and recommendations for future research . . . . . . . . . . 23--34 Rekha Nachiappan and Bahman Javadi and Rodrigo N. Calheiros and Kenan M. Matawie Cloud storage reliability for Big Data applications: a state of the art survey 35--47 Mussab Alaa and A. A. Zaidan and B. B. Zaidan and Mohammed Talal and M. L. M. Kiah A review of smart home applications based on Internet of Things . . . . . . 48--65 Suleman Khan and Muhammad Shiraz and Laleh Boroumand and Abdullah Gani and Muhammad Khurram Khan Towards port-knocking authentication methods for mobile cloud computing . . . 66--78 Vishal Sharma and Fei Song and Ilsun You and Mohammed Atiquzzaman Energy efficient device discovery for reliable communication in 5G-based IoT and BSNs using unmanned aerial vehicles 79--95 Diego V. Queiroz and Marcelo S. Alencar and Ruan D. Gomes and Iguatemi E. Fonseca and Cesar Benavente-Peces Survey and systematic mapping of industrial Wireless Sensor Networks . . 96--125 Satish Kumar and Arnab Sarkar and Arijit Sur A resource allocation framework for adaptive video streaming over LTE . . . 126--139 Stephen S. Oyewobi and Gerhard P. Hancke A survey of cognitive radio handoff schemes, challenges and issues for industrial wireless sensor networks (CR-IWSN) . . . . . . . . . . . . . . . 140--156 Shaufikah Shukri and Latifah Munirah Kamarudin Device free localization technology for human detection and counting with RF sensor networks: a review . . . . . . . 157--174 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Chaoyue Niu and Minping Zhou and Zhenzhe Zheng and Fan Wu and Guihai Chen ERA: Towards privacy preservation and verifiability for online ad exchanges 1--10 Hassan Jamil Syed and Abdullah Gani and Raja Wasim Ahmad and Muhammad Khurram Khan and Abdelmuttlib Ibrahim Abdalla Ahmed Cloud monitoring: a review, taxonomy, and open research issues . . . . . . . . 11--26 Pengfei Hu and Sahraoui Dhelim and Huansheng Ning and Tie Qiu Survey on fog computing: architecture, key technologies, applications and open issues . . . . . . . . . . . . . . . . . 27--42 Avnish Thakur and Major Singh Goraya A taxonomic survey on load balancing in cloud . . . . . . . . . . . . . . . . . 43--57 Hussein Khayou and Bakr Sarakbi A validation model for non-lexical routing protocols . . . . . . . . . . . 58--64 Md Hasanul Ferdaus and Manzur Murshed and Rodrigo N. Calheiros and Rajkumar Buyya An algorithm for network and data-aware placement of multi-tier applications in cloud data centers . . . . . . . . . . . 65--83 Zakaria Gheid and Yacine Challal and Xun Yi and Abdelouahid Derhab Efficient and privacy-aware multi-party classification protocol for human activity recognition . . . . . . . . . . 84--96 Tarun Kulshrestha and Divya Saxena and Rajdeep Niyogi and Vaskar Raychoudhury and Manoj Misra SmartITS: Smartphone-based identification and tracking using seamless indoor-outdoor localization . . 97--113 Surajit Basak and Tamaghna Acharya Cross layer optimization for outage minimizing routing in cognitive radio ad hoc networks with primary users' outage protection . . . . . . . . . . . . . . . 114--124 Peiyan Yuan and Mingyang Song and Xiaoyan Zhao Effective and efficient collection of control messages for opportunistic routing algorithms . . . . . . . . . . . 125--130 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
YiPeng Wang and Xiaochun Yun and Yongzheng Zhang and Liwei Chen and Guangjun Wu A nonparametric approach to the automated protocol fingerprint inference 1--9 Gulshan Kumar and Mritunjay Kumar Rai and Rahul Saha Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in Wireless Sensor Networks 10--16 Luis Miguel Torres and Eduardo Magaña and Daniel Morató and Santiago Garcia-Jimenez and Mikel Izal TBDClust: Time-based density clustering to enable free browsing of sites in pay-per-use mobile Internet providers 17--27 Ying Qu and Bryan Ng and Michael Homer A goodput distribution model for planning IEEE 802.11 WBNs in built environments . . . . . . . . . . . . . . 28--46 Seokseong Jeon and Jae-Pil Jeong and Young-Joo Suh and Chansu Yu and Dongsoo Han Selective AP probing for indoor positioning in a large and AP-dense environment . . . . . . . . . . . . . . 47--57 Adrián Sánchez-Carmona and Carlos Borrego and Sergi Robles and Gerard Garcia-Vandellós Two birds, one stone: Using mobility behavioral profiles both as destinations and as a routing tool . . . . . . . . . 58--72 Fatima Tul Zuhra and Kamalrulnizam Abu Bakar and Adnan Ahmed and Mohsin Ali Tunio Routing protocols in wireless body sensor networks: a comprehensive survey 73--97 Sarogini Grace Pease and Paul P. Conway and Andrew A. West Hybrid ToF and RSSI real-time semantic tracking with an adaptive industrial Internet of Things architecture . . . . 98--109 Yu Xin and Ya-Di Wang and Zhi-Qiang Xie and Jing Yang A cooperative scheduling method based on the device load feedback for multiple tasks scheduling . . . . . . . . . . . . 110--119 M. C. Lucas-Estañ and J. Gozalvez Distributed radio resource allocation for device-to-device communications underlaying cellular networks . . . . . 120--130 Indu I. and Rubesh Anand P. M. and Vidhyacharan Bhaskar Encrypted token based authentication with adapted SAML technology for cloud web services . . . . . . . . . . . . . . 131--145 Giulio Aliberti and Roberto Di Pietro and Stefano Guarino Epidemic data survivability in Unattended Wireless Sensor Networks: New models and results . . . . . . . . . . . 146--165 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Mohammed Atiquzzaman 100 Volumes of JNCA . . . . . . . . . . iii--iv Cong Wang and Maode Ma and Zenghua Zhao Design of a novel dynamic trust model for spectrum management in WRANs of TV white space . . . . . . . . . . . . . . 1--10 A. B. M. Alim Al Islam and Tusher Chakraborty and Taslim Arefin Khan and Mahabub Zoraf and Chowdhury Sayeed Hyder Towards defending eavesdropping on NFC 11--23 Tassos Dimitriou and Ioannis Krontiris Privacy-respecting auctions and rewarding mechanisms in mobile crowd-sensing applications . . . . . . . 24--34 Sandhya and Yash Sinha and K. Haribabu A survey: Hybrid SDN . . . . . . . . . . 35--55 Iria Estévez-Ayres and Jesús Arias Fisteus and Carlos Delgado-Kloos Lostrego: a distributed stream-based infrastructure for the real-time gathering and analysis of heterogeneous educational data . . . . . . . . . . . . 56--68 Mohammed Hashem and Shrief I. Barakat and Mahmoud A. AttaAlla Enhanced tree routing protocols for multi-hop and multi-channel cognitive radio network (EMM--TRP) . . . . . . . . 69--79 Sidra Aslam and Saif ul Islam and Abid Khan and Mansoor Ahmed and Adnan Akhundzada and Muhammad Khurram Khan Information collection centric techniques for cloud resource management: Taxonomy, analysis and challenges . . . . . . . . . . . . . . . 80--94 Anonymous Editorial board . . . . . . . . . . . . ifc--ifc
Anonymous Thank You Reviewers . . . . . . . . . . iii--ix Nanda Kumar Thanigaivelan and Ethiopia Nigussie and Antti Hakkala and Seppo Virtanen and Jouni Isoaho CoDRA: Context-based dynamically reconfigurable access control system for Android . . . . . . . . . . . . . . . . 1--17 Faheem Ullah and Matthew Edwards and Rajiv Ramdhany and Ruzanna Chitchyan and M. Ali Babar and Awais Rashid Data exfiltration: a review of external attack vectors and countermeasures . . . 18--54 Mohamed Amine Ferrag and Leandros Maglaras and Antonios Argyriou and Dimitrios Kosmanos and Helge Janicke Security for 4G and 5G cellular networks: a survey of existing authentication and privacy-preserving schemes . . . . . . . . . . . . . . . . 55--82 Yao Shen and Wei Yang and Liusheng Huang Concealed in web surfing: Behavior-based covert channels in HTTP . . . . . . . . 83--95 Philip Parsch and Alejandro Masrur On reliable communication in transmit-only networks for home automation . . . . . . . . . . . . . . . 96--110 Lei Wang and Jianwei Niu and Houbing Song and Mohammed Atiquzzaman SentiRelated: a cross-domain sentiment classification algorithm for short texts through sentiment related index . . . . 111--119 Anonymous Editorial Board . . . . . . . . . . . . ifc--ifc
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Jin Cao and Maode Ma and Hui Li and Yulong Fu and Xuefeng Liu EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks . . . . . . . . . . . 1--16 Kumar Ravi and Yogesh Khandelwal and Boora Shiva Krishna and Vadlamani Ravi Analytics in/for cloud --- an interdependence: a review . . . . . . . 17--37 Vishal Sharma and Ilsun You and Fang-Yie Leu and Mohammed Atiquzzaman Secure and efficient protocol for fast handover in 5G mobile Xhaul networks . . 38--57 Naina Emmanuel and Abid Khan and Masoom Alam and Tanveer Khan and Muhammad Khurram Khan Structures and data preserving homomorphic signatures . . . . . . . . . 58--70 Usama Mir and Zeeshan Ahmed Bhatti Time triggered handoff schemes in cognitive radio networks: a survey . . . 71--85
Anonymous Editorial Board . . . . . . . . . . . . i--i Marcos Dias de Assunção and Alexandre da Silva Veith and Rajkumar Buyya Distributed data stream processing and edge computing: a survey on resource elasticity and future directions . . . . 1--17 Furui Zhan and Nianmin Yao and Zhenguo Gao and Haitao Yu Efficient key generation leveraging wireless channel reciprocity for MANETs 18--28 Haneet Kour and Rakesh Kumar Jha and Sanjeev Jain A comprehensive survey on spectrum sharing: Architecture, energy efficiency and security issues . . . . . . . . . . 29--57 Sadip Midya and Asmita Roy and Koushik Majumder and Santanu Phadikar Multi-objective optimization technique for resource allocation and task scheduling in vehicular cloud architecture: a hybrid adaptive nature inspired approach . . . . . . . . . . . 58--84 Veerabhadra Rao Chandakanna REHDFS: a random read/write enhanced HDFS . . . . . . . . . . . . . . . . . . 85--100 Yuan Zhang and Lin Cui and Wei Wang and Yuxiang Zhang A survey on software defined networking with multiple controllers . . . . . . . 101--118 Laizhong Cui and Huaixiong Hu and Shui Yu and Qiao Yan and Zhong Ming and Zhenkun Wen and Nan Lu DDSE: a novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks . . . . . . . . . . . . 119--130 Giuseppe Aceto and Domenico Ciuonzo and Antonio Montieri and Antonio Pescapé Multi-classification approaches for classifying mobile app traffic . . . . . 131--145 Yan Huang and Zhipeng Cai and Anu G. Bourgeois Search locations safely and accurately: a location privacy protection algorithm with accurate service . . . . . . . . . 146--156 Sameh Zakhary and Abderrahim Benslimane On location-privacy in opportunistic mobile networks, a survey . . . . . . . 157--170 Jungang Lou and Yunliang Jiang and Qing Shen and Ruiqin Wang Failure prediction by relevance vector regression with improved quantum-inspired gravitational search 171--177 Lu Zhou and Quanlong Wang and Xin Sun and Piotr Kulicki and Arcangelo Castiglione Quantum technique for access control in cloud computing II: Encryption and key distribution . . . . . . . . . . . . . . 178--184 Changsong Yang and Xiaofeng Chen and Yang Xiang Blockchain-based publicly verifiable data deletion scheme for cloud storage 185--193 Xiong Li and Jianwei Niu and Saru Kumari and Fan Wu and Arun Kumar Sangaiah and Kim-Kwang Raymond Choo A three-factor anonymous authentication scheme for wireless sensor networks in Internet of Things environments . . . . 194--204 Guangjie Han and Wenhui Que and Gangyong Jia and Wenbo Zhang Resource-utilization-aware energy efficient server consolidation algorithm for green computing in IIOT . . . . . . 205--214 Qinying Lin and Houbing Song and Xiaolin Gui and Xiaoping Wang and Saiyu Su A shortest path routing algorithm for unmanned aerial systems based on grid position . . . . . . . . . . . . . . . . 215--224 Bin Cao and Jianwei Zhao and Zhihan Lv and Xin Liu and Xinyuan Kang and Shan Yang Deployment optimization for $3$D industrial wireless sensor networks based on particle swarm optimizers with distributed parallelism . . . . . . . . 225--238 Weishan Zhang and Gaowa Wulan and Jia Zhai and Liang Xu and Dehai Zhao and Xin Liu and Su Yang and Jiehan Zhou An intelligent power distribution service architecture using cloud computing and deep learning techniques 239--248 Muzzamil Noor and Haider Abbas and Waleed Bin Shahid Countering cyber threats for industrial applications: an automated approach for malware evasion detection and analysis 249--261 Keke Gai and Meikang Qiu and Xiaotong Sun A survey on FinTech . . . . . . . . . . 262--273 Deze Zeng and Shiyan Zhang and Lin Gu and Shui Yu and Zhangjie Fu Quality-of-sensing aware budget constrained contaminant detection sensor deployment in water distribution system 274--279
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Amrita Bose Paul and Santosh Biswas and Sukumar Nandi and Sandip Chakraborty MATEM: A unified framework based on trust and MCDM for assuring security, reliability and QoS in DTN routing . . . 1--20 Mahdi Zareei and A. K. M. Muzahidul Islam and Cesar Vargas-Rosales and Nafees Mansoor and Shidrokh Goudarzi and Mubashir Husain Rehmani Mobility-aware medium access control protocols for wireless sensor networks: A survey . . . . . . . . . . . . . . . . 21--37 Shuo Yu and Jiaying Liu and Zhuo Yang and Zhen Chen and Huizhen Jiang and Amr Tolba and Feng Xia PAVE: Personalized Academic Venue recommendation Exploiting co-publication networks . . . . . . . . . . . . . . . . 38--47 Jai Sukh Paul Singh and Mritunjay Kumar Rai CROP: Cognitive radio ROuting Protocol for link quality channel diverse cognitive networks . . . . . . . . . . . 48--60 Zainab AlSaeed and Imtiaz Ahmad and Iftekhar Hussain Multicasting in software defined networks: A comprehensive survey . . . . 61--77 Wenjie Ruan and Quan Z. Sheng and Lina Yao and Xue Li and Nickolas J. G. Falkner and Lei Yang Device-free human localization and tracking with UHF passive RFID tags: A data-driven approach . . . . . . . . . . 78--96 Anmin Fu and Yuhan Li and Shui Yu and Yan Yu and Gongxuan Zhang DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems . . . . . . . . . . . . . . . . 97--106 Alejandro Cánovas and Miran Taha and Jaime Lloret and Jesús Tomás Smart resource allocation for improving QoE in IP Multimedia Subsystems . . . . 107--116 Zeinab Rezaeifar and Jian Wang and Heekuck Oh A trust-based method for mitigating cache poisoning in Name Data Networking 117--132 Ruhul Amin and S. K. Hafizul Islam and Neeraj Kumar and Kim-Kwang Raymond Choo An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks 133--144
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Mahmoud Bahnasy and Halima Elbiaze and Bochra Boughzala Zero-queue Ethernet congestion control protocol based on available bandwidth estimation . . . . . . . . . . . . . . . 1--20 Maryam Amiri and Leyli Mohammad-Khanli and Raffaela Mirandola A sequential pattern mining model for application workload prediction in cloud environment . . . . . . . . . . . . . . 21--62 Ivan Vidal and Jaime Garcia-Reinoso and Ignacio Soto and Francisco Valera and Diego Lopez SCoT: A secure content-oriented transport . . . . . . . . . . . . . . . 63--78 Naresh Kumar Reddy Beechu and Vasantha Moodabettu Harishchandra and Nithin Kumar Yernad Balachandra An energy-efficient fault-aware core mapping in mesh-based network on chip systems . . . . . . . . . . . . . . . . 79--87 Jorge Blasco and Thomas M. Chen and Igor Muttik and Markus Roggenbach Detection of app collusion potential using logic programming . . . . . . . . 88--104 Gao Liu and Zheng Yan and Witold Pedrycz Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: A survey . . . . . . . . . . . 105--122 André Naz and Beno\^\it Piranda and Julien Bourgeois and Seth Copen Goldstein A time synchronization protocol for large-scale distributed embedded systems with low-precision clocks and neighbor-to-neighbor communications . . 123--142
Anonymous Editorial Board . . . . . . . . . . . . ii--ii G. Nardini and G. Stea and A. Virdis and A. Frangioni and L. Galli and D. Sabella and G. M. Dell'Aera Practical feasibility, scalability and effectiveness of coordinated scheduling algorithms in cellular networks towards 5G . . . . . . . . . . . . . . . . . . . 1--16 Sancheng Peng and Yongmei Zhou and Lihong Cao and Shui Yu and Jianwei Niu and Weijia Jia Influence analysis in social networks: A survey . . . . . . . . . . . . . . . . . 17--32 Shahid Md. Asif Iqbal and Asaduzzaman Adaptive forwarding strategies to reduce redundant Interests and Data in named data networks . . . . . . . . . . . . . 33--47 Lalatendu Muduli and Devi Prasad Mishra and Prasanta K. Jana Application of wireless sensor network for environmental monitoring in underground coal mines: A systematic review . . . . . . . . . . . . . . . . . 48--67 Koushik A. M. and Elizabeth Bentley and Fei Hu and Sunil Kumar A hardware testbed for learning-based spectrum handoff in cognitive radio networks . . . . . . . . . . . . . . . . 68--77 Flora Amato and Nicola Mazzocca and Francesco Moscato Model driven design and evaluation of security level in orchestrated cloud services . . . . . . . . . . . . . . . . 78--89 Li Yang and Ziyi Han and Zhengan Huang and Jianfeng Ma A remotely keyed file encryption scheme under mobile cloud computing . . . . . . 90--99 Tong Li and Zhengan Huang and Ping Li and Zheli Liu and Chunfu Jia Outsourced privacy-preserving classification service over encrypted data . . . . . . . . . . . . . . . . . . 100--110 Xiaohui Jin and Baojiang Cui and Dong Li and Zishuai Cheng and Congxian Yin An improved payload-based anomaly detector for web applications . . . . . 111--116 Jian Shen and Ziyuan Gui and Sai Ji and Jun Shen and Haowen Tan and Yi Tang Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks . . . . 117--123
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Nourhene Ellouze and Slim Rekhis and Noureddine Boudriga and Mohamed Allouche Powerless Security for Cardiac Implantable Medical Devices: Use of Wireless Identification and Sensing Platform . . . . . . . . . . . . . . . . 1--21 Jaume Segura-Garcia and Santiago Felici-Castell and Miguel Garcia-Pineda Performance evaluation of different techniques to estimate subjective quality in live video streaming applications over LTE-Advance mobile networks . . . . . . . . . . . . . . . . 22--37 Shima Pakdaman Tirani and Avid Avokh On the performance of sink placement in WSNs considering energy-balanced compressive sensing-based data aggregation . . . . . . . . . . . . . . 38--55 José V. V. Sobral and Joel J. P. C. Rodrigues and Ricardo A. L. Rabelo and José C. Lima Filho and Natanael Sousa and Harilton S. Araujo and Raimir Holanda Filho A framework for enhancing the performance of Internet of Things applications based on RFID and WSNs . . 56--68 Yu-an Tan and Yuan Xue and Chen Liang and Jun Zheng and Quanxin Zhang and Jiamin Zheng and Yuanzhang Li A root privilege management scheme with revocable authorization for Android devices . . . . . . . . . . . . . . . . 69--82 Guangquan Xu and Jia Liu and Yanrong Lu and Xianjiao Zeng and Yao Zhang and Xiaoming Li A novel efficient MAKA protocol with desynchronization for anonymous roaming service in Global Mobility Networks . . 83--92 Mukesh Kumar Giluka and Thomas Valerrian Pasca and Tathagat Priyadarshi and Bheemarjuna Reddy Tamma Enhanced class based dynamic priority scheduling to support uplink IoT traffic in LTE-A networks . . . . . . . . . . . 93--112 Jian Xu and Laiwen Wei and Yu Zhang and Andi Wang and Fucai Zhou and Chong-zhi Gao Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures . . . . . . . . . . . . . . . 113--124 Giuseppe Aceto and Valerio Persico and Antonio Pescapé The role of Information and Communication Technologies in healthcare: taxonomies, perspectives, and challenges . . . . . . . . . . . . . 125--154
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Ahsan Saleem and Abid Khan and Furqan Shahid and M. Masoom Alam and Muhammad Khurram Khan Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits . . . . . . . . . . . . 1--19 Pingping Dong and Wenjun Yang and Wensheng Tang and Jiawei Huang and Haodong Wang and Yi Pan and Jianxin Wang Reducing transport latency for short flows with multipath TCP . . . . . . . . 20--36 Praveen Kumar P and Syam Kumar P and Alphonse P. J. A. Attribute based encryption in cloud computing: A survey, gap analysis, and future directions . . . . . . . . . . . 37--52 Wassila Lalouani and Mohamed Younis and Nadjib Badache Interconnecting isolated network segments through intermittent links . . 53--63 Jiuxin Cao and Shuai Xu and Xuelin Zhu and Renjun Lv and Bo Liu Effective fine-grained location prediction based on user check-in pattern in LBSNs . . . . . . . . . . . . 64--75 José Francisco Colom and David Gil and Higinio Mora and Bruno Volckaert and Antonio Manuel Jimeno Scheduling framework for distributed intrusion detection systems over heterogeneous network architectures . . 76--86 Muhammad Aqib Javed and Muhammad Shahzad Younis and Siddique Latif and Junaid Qadir and Adeel Baig Community detection in networks: A multidisciplinary review . . . . . . . . 87--111 Zechao Liu and Zoe L. Jiang and Xuan Wang and S. M. Yiu Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating . . . . . 112--123 Christian Esposito Interoperable, dynamic and privacy-preserving access control for cloud data storage when integrating heterogeneous organizations . . . . . . 124--136
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Minh-Tuan Thai and Ying-Dar Lin and Po-Ching Lin and Yuan-Cheng Lai Towards load-balanced service chaining by Hash-based Traffic Steering on Softswitches . . . . . . . . . . . . . . 1--10 Souvik Basu and Ayanesh Biswas and Siuli Roy and Sipra DasBit Wise-PRoPHET: A Watchdog supervised PRoPHET for reliable dissemination of post disaster situational information over smartphone based DTN . . . . . . . 11--23 Muhammad Ehatisham-ul-Haq and Muhammad Awais Azam and Usman Naeem and Yasar Amin and Jonathan Loo Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing 24--35 Yuan Rao and Cheng Deng and Gang Zhao and Yan Qiao and Lei-yang Fu and Xing Shao and Ru-chuan Wang Self-adaptive implicit contention window adjustment mechanism for QoS optimization in wireless sensor networks 36--52 Mauro A. A. da Cruz and Joel J. P. C. Rodrigues and Arun Kumar Sangaiah and Jalal Al-Muhtadi and Valery Korotaev Performance evaluation of IoT middleware 53--65 Ester López and Leandro Navarro Coordinated detection of forwarding faults in Wireless Community Networks 66--77 Xuangou Wu and Panlong Yang and Shaojie Tang and Xiao Zheng and Xiaolin Wang Privacy-aware data publishing against sparse estimation attack . . . . . . . . 78--88 G. Deepa and P. Santhi Thilagam and Amit Praseed and Alwyn R. Pais DetLogic: A black-box approach for detecting logic vulnerabilities in web applications . . . . . . . . . . . . . . 89--109
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Mostafa Noshy and Abdelhameed Ibrahim and Hesham Arafat Ali Optimization of live virtual machine migration in cloud computing: A survey and future directions . . . . . . . . . 1--10 Umber Sheikh and Abid Khan and Bilal Ahmed and Abdul Waheed and Abdul Hameed Provenance Inference Techniques: Taxonomy, comparative analysis and design challenges . . . . . . . . . . . 11--26 Arsany Guirguis and Mohammed Karmoose and Karim Habak and Mustafa El-Nainay and Moustafa Youssef Cooperation-based multi-hop routing protocol for cognitive radio networks 27--42 Qiang Yang and Wei Li and Jose Neuman de Souza and Albert Y. Zomaya Resilient virtual communication networks using multi-commodity flow based local optimal mapping . . . . . . . . . . . . 43--51 Vahideh Hayyolalam and Ali Asghar Pourhaji Kazem A systematic literature review on QoS-aware service composition and selection in cloud environment . . . . . 52--74 Choon Beng Tan and Mohd Hanafi Ahmad Hijazi and Yuto Lim and Abdullah Gani A survey on Proof of Retrievability for cloud data integrity and availability: Cloud storage state-of-the-art, issues, solutions and future trends . . . . . . 75--86 Fahri Wisnu Murti and Rahmat Faddli Siregar and Soo Young Shin SU-MIMO based uplink non-orthogonal multiple access for 5G . . . . . . . . . 87--96 Jin Li and Aniello Castiglione and Changyu Dong Special issue on security in cloud computing . . . . . . . . . . . . . . . 97--98 Agnieszka Jakóbik and Francesco Palmieri and Joanna Kolodziej Stackelberg games for modeling defense scenarios against cloud security threats 99--107 Dan Liao and Hui Li and Gang Sun and Ming Zhang and Victor Chang Location and trajectory privacy preservation in 5G-Enabled vehicle social network services . . . . . . . . 108--118
Anonymous Editorial Board . . . . . . . . . . . . ii--ii Suman Bhattacharjee and Siuli Roy and Sipra DasBit DPDRM: A decentralized post-disaster resource management scheme using energy efficient smart phone based DTN . . . .