Table of contents for issues of Computer Networks (Amsterdam, Netherlands: 1999)

Last update: Wed May 17 09:55:33 MDT 2023                Valid HTML 3.2!

Volume 53, Number 11, July 28, 2009
Volume 54, Number 1, January 15, 2010
Volume 54, Number 2, February 15, 2010
Volume 54, Number 3, February 26, 2010
Volume 54, Number 4, March 19, 2010
Volume 54, Number 5, April 8, 2010
Volume 54, Number 6, April 29, 2010
Volume 54, Number 7, May 17, 2010
Volume 54, Number 8, June 1, 2010
Volume 54, Number 9, June 17, 2010
Volume 54, Number 10, July 1, 2010
Volume 54, Number 11, August 2, 2010
Volume 54, Number 12, August 26, 2010
Volume 54, Number 13, September 15, 2010
Volume 54, Number 14, October 6, 2010
Volume 54, Number 15, October 28, 2010
Volume 54, Number 16, November 15, 2010
Volume 54, Number 17, December 3, 2010
Volume 54, Number 18, December 20, 2010
Volume 55, Number 1, January 7, 2011
Volume 55, Number 2, February 1, 2011
Volume 55, Number 3, February 21, 2011
Volume 55, Number 4, March 10, 2011
Volume 55, Number 5, April 1, 2011
Volume 55, Number 6, April 25, 2011
Volume 55, Number 7, May 16, 2011
Volume 55, Number 8, June 1, 2011
Volume 55, Number 9, June 23, 2011
Volume 55, Number 10, July 14, 2011
Volume 55, Number 11, August 4, 2011
Volume 55, Number 12, August 25, 2011
Volume 55, Number 13, September 15, 2011
Volume 55, Number 14, October 6, 2011
Volume 55, Number 15, October 27, 2011
Volume 55, Number 16, November 10, 2011
Volume 55, Number 17, December 1, 2011
Volume 56, Number 1, January 12, 2012
Volume 56, Number 2, February 2, 2012
Volume 56, Number 3, February 23, 2012
Volume 56, Number 4, March 16, 2012
Volume 56, Number 5, March 30, 2012
Volume 56, Number 6, April 19, 2012
Volume 56, Number 7, May 3, 2012
Volume 56, Number 8, May 24, 2012
Volume 56, Number 9, June 14, 2012
Volume 56, Number 10, July 5, 2012
Volume 56, Number 11, July 31, 2012
Volume 56, Number 12, August 16, 2012
Volume 56, Number 13, September 5, 2012
Volume 56, Number 14, September 28, 2012
Volume 56, Number 15, October 15, 2012
Volume 56, Number 16, November 14, 2012
Volume 56, Number 17, November 30, 2012
Volume 56, Number 18, December 17, 2012
Volume 57, Number 1, January 16, 2013
Volume 57, Number 2, February 4, 2013
Volume 57, Number 3, February 26, 2013
Volume 57, Number 4, March 13, 2013
Volume 57, Number 5, April 7, 2013
Volume 57, Number 6, April 22, 2013
Volume 57, Number 7, May 8, 2013
Volume 57, Number 8, June 4, 2013
Volume 57, Number 9, June 19, 2013
Volume 57, Number 10, July 5, 2013
Volume 57, Number 11, August 5, 2013
Volume 57, Number 12, August 20, 2013
Volume 57, Number 13, September 9, 2013
Volume 57, Number 14, October 4, 2013
Volume 57, Number 15, October 29, 2013
Volume 57, Number 16, November 13, 2013
Volume 57, Number 17, December 9, 2013
Volume 57, Number 18, December 24, 2013
Volume 58, Number ??, January 15, 2014
Volume 59, Number ??, February 11, 2014
Volume 60, Number ??, February 26, 2014
Volume 61, Number ??, March 14, 2014
Volume 62, Number ??, April 7, 2014
Volume 63, Number ??, April 22, 2014
Volume 64, Number ??, May 8, 2014
Volume 65, Number ??, June 2, 2014
Volume 66, Number ??, June 19, 2014
Volume 67, Number ??, July 4, 2014
Volume 68, Number ??, August 5, 2014
Volume 69, Number ??, August 20, 2014
Volume 70, Number ??, September 9, 2014
Volume 71, Number ??, October 4, 2014
Volume 72, Number ??, October 29, 2014
Volume 73, Number ??, November 14, 2014
Volume 74 (part A), Number ??, December 9, 2014
Volume 74 (part B), Number ??, December 9, 2014
Volume 75 (part A), Number ??, December 24, 2014
Volume 75 (part B), Number ??, December 24, 2014
Volume 76, Number ??, January 15, 2015
Volume 77, Number ??, February 11, 2015
Volume 78, Number ??, February 26, 2015
Volume 79, Number ??, March 14, 2015
Volume 80, Number ??, April 7, 2015
Volume 81, Number ??, April 22, 2015
Volume 82, Number ??, May 8, 2015
Volume 83, Number ??, June 4, 2015
Volume 84, Number ??, June 19, 2015
Volume 85, Number ??, July 5, 2015
Volume 86, Number ??, July 5, 2015
Volume 87, Number ??, July 20, 2015
Volume 88, Number ??, September 9, 2015
Volume 89, Number ??, 2015
Volume 90, Number ??, October 29, 2015
Volume 91, Number ??, November 14, 2015
Volume 92 (part 1), Number ??, December 9, 2015
Volume 92 (part 2), Number ??, December 9, 2015
Volume 93 (part 1), Number ??, December 24, 2015
Volume 93 (part 2), Number ??, December 24, 2015
Volume 93 (part 1), Number ??, December 24, 2015
Volume 93 (part 2), Number ??, December 24, 2015
Volume 93 (part 3), Number ??, December 24, 2015
Volume 94, Number ??, January 15, 2016
Volume 95, Number ??, February 11, 2016
Volume 96, Number ??, February 26, 2016
Volume 97, Number ??, March 14, 2016
Volume 98, Number ??, April 7, 2016
Volume 99, Number ??, April 22, 2016
Volume 100, Number ??, May 8, 2016
Volume 101, Number ??, June 4, 2016
Volume 102, Number ??, June 19, 2016
Volume 103, Number ??, July 5, 2016
Volume 104, Number ??, July 20, 2016
Volume 105, Number ??, August 4, 2016
Volume 106, Number ??, September 4, 2016
Volume 107 (part 1), Number ??, October 9, 2016
Volume 107 (part 2), Number ??, October 9, 2016
Volume 108, Number ??, October 24, 2016
Volume 109 (part 1), Number ??, November 9, 2016
Volume 109 (part 2), Number ??, November 9, 2016
Volume 110, Number ??, December 9, 2016
Volume 111, Number ??, December 24, 2016
Volume 112, Number ??, January 15, 2017
Volume 113, Number ??, February 11, 2017
Volume 114, Number ??, February 26, 2017
Volume 115, Number ??, March 14, 2017
Volume 116, Number ??, April 7, 2017
Volume 117, Number ??, April 22, 2017
Volume 118, Number ??, May 8, 2017
Volume 119, Number ??, June 4, 2017
Volume 120, Number ??, June 19, 2017
Volume 121, Number ??, July 5, 2017
Volume 122, Number ??, July 20, 2017
Volume 123, Number ??, August 4, 2017
Volume 124, Number ??, September 4, 2017
Volume 125, Number ??, October 9, 2017
Volume 126, Number ??, October 24, 2017
Volume 127, Number ??, November 9, 2017
Volume 128, Number ??, December 9, 2017
Volume 129 (part 1), Number ??, December 24, 2017
Volume 129 (part 2), Number ??, December 24, 2017
Volume 130, Number ??, January 15, 2018
Volume 131, Number ??, February 11, 2018
Volume 132, Number ??, February 26, 2018
Volume 133, Number ??, March 14, 2018
Volume 134, Number ??, April 7, 2018
Volume 135, Number ??, April 22, 2018
Volume 136, Number ??, May 8, 2018
Volume 137, Number ??, June 4, 2018
Volume 138, Number ??, June 19, 2018
Volume 139, Number ??, July 5, 2018
Volume 140, Number ??, July 20, 2018
Volume 141, Number ??, August 4, 2018
Volume 142, Number ??, September 4, 2018
Volume 143, Number ??, October 9, 2018
Volume 144, Number ??, October 24, 2018
Volume 145, Number ??, November 9, 2018
Volume 146, Number ??, December 9, 2018
Volume 147, Number ??, December 24, 2018
Volume 148, Number ??, January 15, 2019
Volume 149, Number ??, February 11, 2019
Volume 150, Number ??, February 26, 2019
Volume 151, Number ??, March 14, 2019
Volume 152, Number ??, April 7, 2019
Volume 153, Number ??, April 22, 2019
Volume 154, Number ??, May 8, 2019
Volume 155, Number ??, May 22, 2019
Volume 156, Number ??, June 19, 2019
Volume 157, Number ??, July 5, 2019
Volume 158, Number ??, July 20, 2019
Volume 159, Number ??, August 4, 2019
Volume 160, Number ??, September 4, 2019
Volume 161, Number ??, October 9, 2019
Volume 162, Number ??, 2019
Volume 163, Number ??, 2019
Volume 164, Number ??, December 9, 2019
Volume 165, Number ??, December 24, 2019


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 53, Number 11, July 28, 2009

             Guido Urdaneta and   
           Guillaume Pierre and   
              Maarten van Steen   Wikipedia workload analysis for
                                  decentralized hosting  . . . . . . . . . 1830--1845


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 54, Number 1, January 15, 2010

            Ian F. Akyildiz and   
                    Harry Rudin   Editorial  . . . . . . . . . . . . . . . 1--2
               Sunmyeng Kim and   
             Young-Jong Cho and   
                    Yong K. Kim   Admission control scheme based on
                                  priority access for wireless LANs  . . . 3--12
                  Chunxi Li and   
                  Changjia Chen   Measurement-based study on the relation
                                  between users' watching behavior and
                                  network sharing in P2P VoD systems . . . 13--27
                Yixin Jiang and   
                 Haojin Zhu and   
                Minghui Shi and   
      Xuemin (Sherman) Shen and   
                     Chuang Lin   An efficient dynamic-identity based
                                  signature scheme for secure network
                                  coding . . . . . . . . . . . . . . . . . 28--40
Guillermo Ibáñez and   
Alberto García-Martínez and   
             Juan A. Carral and   
   Pedro A. González and   
             Arturo Azcorra and   
            José M. Arco   HURP/HURBA: Zero-configuration
                                  hierarchical Up/Down routing and
                                  bridging architecture for Ethernet
                                  backbones and campus networks  . . . . . 41--56
                 Minh Huynh and   
               Stuart Goose and   
              Prasant Mohapatra   Resilience technologies in Ethernet  . . 57--78
       Jose L. Muñoz and   
              Oscar Esparza and   
      Mónica Aguilar and   
           Victor Carrascal and   
             Jordi Forné   RDSR-V. Reliable Dynamic Source Routing
                                  for video-streaming over mobile ad hoc
                                  networks . . . . . . . . . . . . . . . . 79--96
                Tim Stevens and   
                Tim Wauters and   
             Chris Develder and   
             Filip De Turck and   
                Bart Dhoedt and   
                 Piet Demeester   Analysis of an anycast based overlay
                                  system for scalable service discovery
                                  and execution  . . . . . . . . . . . . . 97--111
                Suman Kumar and   
            Seung-Jong Park and   
           S. Sitharama Iyengar   A loss-event driven scalable fluid
                                  simulation method for high-speed
                                  networks . . . . . . . . . . . . . . . . 112--132
               Johan Eklund and   
        Karl-Johan Grinnemo and   
             Stephan Baucke and   
                 Anna Brunstrom   Tuning SCTP failover for carrier grade
                                  telephony signaling  . . . . . . . . . . 133--149
                 Yiu-Wing Leung   Sparse telephone gateway for Internet
                                  telephony  . . . . . . . . . . . . . . . 150--164
                   Deke Guo and   
                    Yuan He and   
                   Panlong Yang   Receiver-oriented design of Bloom
                                  filters for data-centric routing . . . . 165--174
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 54, Number 2, February 15, 2010

              Raouf Boutaba and   
         Seán Murphy and   
                  Albert Banchs   Special issue on ``Wireless Multi-Hop
                                  Networking for Infrastructure Access''   175--177
           Jonathan Wellons and   
                  Liang Dai and   
                   Yuan Xue and   
                        Yui Cui   Augmenting predictive with oblivious
                                  routing for wireless mesh networks under
                                  traffic uncertainty  . . . . . . . . . . 178--195
                 Jian Zhang and   
         Yuanzhu Peter Chen and   
                    Ivan Marsic   MAC-layer proactive mixing for network
                                  coding in multi-hop wireless networks    196--207
            Charles B. Ward and   
              Nathan M. Wiegand   Complexity results on labeled shortest
                                  path problems from wireless routing
                                  metrics  . . . . . . . . . . . . . . . . 208--217
           Vincent Toubiana and   
               Houda Labiod and   
            Laurent Reynaud and   
                  Yvon Gourhant   A global security architecture for
                                  operated hybrid WLAN mesh networks . . . 218--230
             Valerio Targon and   
           Brunilde Sans\`o and   
                 Antonio Capone   The joint Gateway Placement and Spatial
                                  Reuse Problem in Wireless Mesh Networks  231--240
           Mahesh K. Marina and   
               Samir R. Das and   
       Anand Prabhu Subramanian   A topology control approach for
                                  utilizing multiple channels in
                                  multi-radio wireless mesh networks . . . 241--256
                 Nico Bayer and   
                 Bangnan Xu and   
          Veselin Rakocevic and   
              Joachim Habermann   Application-aware scheduling for VoIP in
                                  Wireless Mesh Networks . . . . . . . . . 257--277
               Ayman Radwan and   
        Hossam S. Hassanein and   
            Abd-Elhamid M. Taha   Identifying the capacity gains of
                                  multihop cellular networks . . . . . . . 278--290
        Carlos J. Bernardos and   
             Maria Calderon and   
               Ignacio Soto and   
         Ana Beatriz Solana and   
                 Kilian Weniger   Building an IP-based community wireless
                                  mesh network: Assessment of PACMAN as an
                                  IP address autoconfiguration protocol    291--303
               Jiazhen Zhou and   
               Kenneth Mitchell   A scalable delay based analytical
                                  framework for CSMA/CA wireless mesh
                                  networks . . . . . . . . . . . . . . . . 304--318
          Katerina Papadaki and   
             Vasilis Friderikos   Gateway selection and routing in
                                  wireless mesh networks . . . . . . . . . 319--329
                Cheolgi Kim and   
               Young-Bae Ko and   
                Nitin H. Vaidya   Link-state routing without broadcast
                                  storming for multichannel mesh networks  330--340
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 54, Number 3, February 26, 2010

                Abdul Hasib and   
            Abraham O. Fapojuwo   Cross-layer radio resource management in
                                  integrated WWAN and WLAN networks  . . . 341--356
        Andrés Ortiz and   
               Julio Ortega and   
     Antonio F. Díaz and   
                 Alberto Prieto   Network interfaces for programmable NICs
                                  and multicore platforms  . . . . . . . . 357--376
                Shucheng Yu and   
                    Kui Ren and   
                    Wenjing Lou   Attribute-based on-demand multicast
                                  group setup with membership anonymity    377--386
  Akbar Ghaffar Pour Rahbar and   
                    Oliver Yang   Agile bandwidth management techniques in
                                  slotted all-optical packet switched
                                  networks . . . . . . . . . . . . . . . . 387--403
              Erik F. Golen and   
              Sumita Mishra and   
                 Nirmala Shenoy   An underwater sensor allocation scheme
                                  for a range dependent environment  . . . 404--415
             Rui Gustavo Crespo   Predicting feature interactions by using
                                  inconsistency models . . . . . . . . . . 416--427
                 Ertan Onur and   
                  Cem Ersoy and   
         Hakan Deliç and   
                    Lale Akarun   Surveillance with wireless sensor
                                  networks in obstruction: Breach paths as
                                  watershed contours . . . . . . . . . . . 428--441
               Xiaowei Yang and   
                  Yanbin Lu and   
                        Lei Zan   Improving XCP to achieve max--min fair
                                  bandwidth allocation . . . . . . . . . . 442--461
               Satish Chand and   
                        Hari Om   Efficient staircase scheme with seamless
                                  channel transition mechanism . . . . . . 462--474
                   Yixin Wu and   
                Suman Kumar and   
                Seung-Jong Park   Measurement and performance issues of
                                  transport protocols over 10 Gbps
                                  high-speed optical networks  . . . . . . 475--488
           Chamil Kulatunga and   
                Gorry Fairhurst   Enforcing layered multicast congestion
                                  control using ECN-nonce  . . . . . . . . 489--505
                 Xiang Feng and   
              Francis C. M. Lau   A new economic generalized particle
                                  model for flow control . . . . . . . . . 506--524
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 54, Number 4, March 19, 2010

         Violet R. Syrotiuk and   
                 Brahim Bensaou   Computer networks (Elsevier) special
                                  issue on advances in wireless and mobile
                                  networks . . . . . . . . . . . . . . . . 525--526
                 Uichin Lee and   
                    Mario Gerla   A survey of urban vehicular sensing
                                  platforms  . . . . . . . . . . . . . . . 527--544
          Peyman TalebiFard and   
              Terrence Wong and   
             Victor C. M. Leung   Access and service convergence over the
                                  mobile Internet --- a survey . . . . . . 545--557
              Zhenxia Zhang and   
           Richard W. Pazzi and   
             Azzedine Boukerche   A mobility management scheme for
                                  wireless mesh networks based on a hybrid
                                  routing protocol . . . . . . . . . . . . 558--572
                Zhenzhen Ye and   
          Alhussein A. Abouzeid   A unified model for joint
                                  throughput-overhead analysis of random
                                  access mobile ad hoc networks  . . . . . 573--588
            Chiara Boldrini and   
                Marco Conti and   
              Andrea Passarella   Design and performance evaluation of
                                  ContentPlace, a social-aware data
                                  dissemination system for opportunistic
                                  networks . . . . . . . . . . . . . . . . 589--604
           Jelena Mi\vsi\'c and   
          Vojislav B. Mi\vsi\'c   Making the best of limited resources:
                                  Optimized differential sensing in
                                  cognitive PANs . . . . . . . . . . . . . 605--617
               Zhengqing Hu and   
                Chen-Khong Tham   CCMAC: Coordinated cooperative MAC for
                                  wireless LANs  . . . . . . . . . . . . . 618--630
           Volodymyr Pryyma and   
               Damla Turgut and   
      Ladislau Bölöni   Active time scheduling for rechargeable
                                  sensor networks  . . . . . . . . . . . . 631--640
              Jeongkeun Lee and   
                   Jiho Ryu and   
                Sung-Ju Lee and   
             Ted Taekyoung Kwon   Improved modeling of IEEE 802.11a PHY
                                  through fine-grained measurements  . . . 641--657
                  Tal Rusak and   
                   Philip Levis   Physically-based models of low-power
                                  wireless links using signal power
                                  simulation . . . . . . . . . . . . . . . 658--673
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 54, Number 5, April 8, 2010

Stephanos Androutsellis-Theotokis and   
         Diomidis Spinellis and   
             Panos Louridas and   
              Kostas Stroggylos   A market-based approach to managing the
                                  risk of peer-to-peer transactions  . . . 675--688
               Zhonghong Ou and   
              Erkki Harjula and   
              Otso Kassinen and   
                Mika Ylianttila   Performance evaluation of a
                                  Kademlia-based communication-oriented
                                  P2P system under churn . . . . . . . . . 689--705
                 D. M. Shan and   
                 K. C. Chua and   
                       G. Mohan   On burst rescheduling in OBS networks
                                  with partial wavelength conversion
                                  capability . . . . . . . . . . . . . . . 706--715
                     Bin Wu and   
              Kwan L. Yeung and   
                     Pin-Han Ho   ILP formulations for non-simple
                                  $p$-cycle and $p$-trail design in WDM
                                  mesh networks  . . . . . . . . . . . . . 716--725
         Celal Çeken and   
              Serhan Yarkan and   
            Hüseyin Arslan   Interference aware vertical handoff
                                  decision algorithm for quality of
                                  service support in wireless
                                  heterogeneous networks . . . . . . . . . 726--740
    Ioannis Anagnostopoulos and   
   Christos Anagnostopoulos and   
          Dimitrios D. Vergados   Estimating evolution of freshness in
                                  Internet cache directories under the
                                  capture--recapture methodology . . . . . 741--765
            Gagan Raj Gupta and   
                 Ness B. Shroff   Practical scheduling schemes with
                                  throughput guarantees for multi-hop
                                  wireless networks  . . . . . . . . . . . 766--780
         Luis Rodero-Merino and   
Antonio Fernández Anta and   
          Luis López and   
                  Vicent Cholvi   Performance of random walks in one-hop
                                  replication networks . . . . . . . . . . 781--796
                 Doraid Dalalah   Real-time optimization flow control  . . 797--810
                   Ming Lei and   
            Susan V. Vrbsky and   
                      Yang Xiao   Scheduling on-demand data broadcast in
                                  mixed-type request environments  . . . . 811--825
    Javad Akbari Torkestani and   
          Mohammad Reza Meybodi   An intelligent backbone formation
                                  algorithm for wireless ad hoc networks
                                  based on distributed learning automata   826--843
              Seungjoon Lee and   
        Bobby Bhattacharjee and   
             Suman Banerjee and   
                         Bo Han   A general framework for efficient
                                  geographic routing in wireless networks  844--861
N. M. Mosharaf Kabir Chowdhury and   
                  Raouf Boutaba   A survey of network virtualization . . . 862--876
             Guido Urdaneta and   
           Guillaume Pierre and   
              Maarten van Steen   Corrigendum to ``Wikipedia workload
                                  analysis for decentralized hosting''
                                  [Computer Networks 53 (11) (2009)
                                  1830--1845]  . . . . . . . . . . . . . . 877--878
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 54, Number 6, April 29, 2010

               Eitan Altman and   
              Tamer Ba\csar and   
                  Emma Hart and   
           Daniele Miorandi and   
          Aris L. Moustakas and   
                Stavros Toumpis   Special issue on ``New Network
                                  Paradigms''  . . . . . . . . . . . . . . 879--880
             Falko Dressler and   
                  Ozgur B. Akan   A survey on bio-inspired networking  . . 881--900
             Michael Meisel and   
           Vasileios Pappas and   
                    Lixia Zhang   A taxonomy of biologically inspired
                                  research in computer networking  . . . . 901--916
          Koichiro Kitagawa and   
               Toshiyuki Tanaka   Optimization of sequences in CDMA
                                  systems: a statistical--mechanics
                                  approach . . . . . . . . . . . . . . . . 917--924
                 Yuedong Xu and   
             John C. S. Lui and   
                  Dah-Ming Chiu   On oligopoly spectrum allocation game in
                                  cognitive radio networks with capacity
                                  constraints  . . . . . . . . . . . . . . 925--943
           Daniele Miorandi and   
             Lidia Yamamoto and   
        Francesco De Pellegrini   A survey of evolutionary and embryogenic
                                  approaches to autonomic networking . . . 944--959
     Andreas Konstantinidis and   
                   Kun Yang and   
               Qingfu Zhang and   
    Demetrios Zeinalipour-Yazti   A multi-objective evolutionary algorithm
                                  for the deployment and power assignment
                                  problem in wireless sensor networks  . . 960--976
          Cesar D. Guerrero and   
             Miguel A. Labrador   Traceband: a fast, low overhead and
                                  accurate tool for available bandwidth
                                  estimation and monitoring  . . . . . . . 977--990
          Alessandro Nordio and   
  Carla-Fabiana Chiasserini and   
            Armando Muscariello   Signal reconstruction in sensor networks
                                  with flat and clustered topologies . . . 991--1004
               Alonso Silva and   
               Eitan Altman and   
            Pierre Bernhard and   
         Mérouane Debbah   Continuum equilibria and global
                                  optimization for routing in dense static
                                  ad hoc networks  . . . . . . . . . . . . 1005--1018
           Poul E. Heegaard and   
                Otto J. Wittner   Overhead reduction in a distributed path
                                  management system  . . . . . . . . . . . 1019--1041
               Huijuan Wang and   
               Piet Van Mieghem   Sampling networks by the union of $m$
                                  shortest path trees  . . . . . . . . . . 1042--1053
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 54, Number 7, May 17, 2010

             Ram Keralapura and   
              Antonio Nucci and   
                 Chen-Nee Chuah   A novel self-learning architecture for
                                  P2P traffic classification in high speed
                                  networks . . . . . . . . . . . . . . . . 1055--1068
                 Lijun Wang and   
                    Lin Cai and   
                 Xinzhi Liu and   
          Xuemin (Sherman) Shen   Bounds estimation and practical
                                  stability of AIMD/RED systems with time
                                  delays . . . . . . . . . . . . . . . . . 1069--1082
               Eng Hwee Ong and   
                  Jamil Y. Khan   Cooperative radio resource management
                                  framework for future IP-based multiple
                                  radio access technologies environment    1083--1107
               Iksoon Hwang and   
                    Ana Cavalli   Testing a probabilistic FSM using
                                  interval estimation  . . . . . . . . . . 1108--1125
  John Felix Charles Joseph and   
               Amitabha Das and   
                Bu-Sung Lee and   
                Boon-Chong Seet   CARRADS: Cross layer based adaptive
                                  real-time routing attack detection
                                  system for MANETS  . . . . . . . . . . . 1126--1141
          Simon Schütz and   
         Henrik Abrahamsson and   
              Bengt Ahlgren and   
                 Marcus Brunner   Design and implementation of the Node
                                  Identity Internetworking Architecture    1142--1154
                Jinchang Lu and   
                       Maode Ma   A cross-layer elastic CAC and holistic
                                  opportunistic scheduling for QoS support
                                  in WiMAX . . . . . . . . . . . . . . . . 1155--1168
                Guanhua Yan and   
          Stephan Eidenbenz and   
         Sunil Thulasidasan and   
               Pallab Datta and   
            Venkatesh Ramaswamy   Criticality analysis of Internet
                                  infrastructure . . . . . . . . . . . . . 1169--1182
        Rajashekhar Biradar and   
           Sunilkumar Manvi and   
                   Mylara Reddy   Link stability based multicast routing
                                  scheme in MANET  . . . . . . . . . . . . 1183--1196
              Andrej Vilhar and   
                Roman Novak and   
                  Gorazd Kandus   The impact of network topology on the
                                  performance of MAP selection algorithms  1197--1209
        Beno\^\it Garbinato and   
              Adrian Holzer and   
         François Vessaz   Context-aware broadcasting approaches in
                                  mobile ad hoc networks . . . . . . . . . 1210--1228
                      Ke Xu and   
                 Ming Zhang and   
             Jiangchuan Liu and   
                Zhijing Qin and   
                   Mingjiang Ye   Proxy caching for peer-to-peer live
                                  streaming  . . . . . . . . . . . . . . . 1229--1241
             Valerio Targon and   
           Brunilde Sans\`o and   
                 Antonio Capone   Erratum to ``The joint Gateway Placement
                                  and Spatial Reuse Problem in Wireless
                                  Mesh Networks'' [Computer Networks 54
                                  (2010) 231--240] . . . . . . . . . . . . 1242--1242
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 54, Number 8, June 1, 2010

          Bernhard Plattner and   
            David Hutchison and   
           James P. G. Sterbenz   Resilient and survivable networks  . . . 1243--1244
       James P. G. Sterbenz and   
            David Hutchison and   
 Egemen K. Çetinkaya and   
               Abdul Jabbar and   
           Justin P. Rohrer and   
       Marcus Schöller and   
                     Paul Smith   Resilience and survivability in
                                  communication networks: Strategies,
                                  principles, and survey of disciplines    1245--1265
          Daniel L. Guidoni and   
          Raquel A. F. Mini and   
         Antonio A. F. Loureiro   On the design of resilient heterogeneous
                                  wireless sensor networks based on small
                                  world concepts . . . . . . . . . . . . . 1266--1281
                 Zhichun Li and   
                    Yan Gao and   
                       Yan Chen   HiFIND: a high-speed flow-level
                                  intrusion detection approach with DoS
                                  resiliency . . . . . . . . . . . . . . . 1282--1299
              Michael Menth and   
          Matthias Hartmann and   
        Rüdiger Martin and   
          Tarik \vCi\vci\'c and   
                 Amund Kvalbein   Loop-free alternates and not-via
                                  addresses: a proper combination for IP
                                  fast reroute?  . . . . . . . . . . . . . 1300--1315
                Kunwoo Park and   
              Sangheon Pack and   
         Ted ``Taekyoung'' Kwon   An adaptive peer-to-peer live streaming
                                  system with incentives for resilience    1316--1327
P. M. Santiago del Río and   
     J. A. Hernández and   
                  J. Aracil and   
J. E. López de Vergara and   
               J. Dom\.za\l and   
           R. Wójcik and   
                 P. Cho\lda and   
                   K. Wajda and   
J. P. Fernández Palacios and   
Ó. González de Dios and   
                       R. Duque   A reliability analysis of Double-Ring
                                  topologies with Dual Attachment using
                                  $p$-cycles for optical metro networks    1328--1341
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 54, Number 9, June 17, 2010

            Alexandre Viejo and   
          Jordi Castell\`a-Roca   Using social networks to distort users'
                                  profiles generated by Web search engines 1343--1357
                Zvi Rosberg and   
              John Matthews and   
                 Moshe Zukerman   A network rate management protocol with
                                  TCP congestion control and fairness for
                                  all  . . . . . . . . . . . . . . . . . . 1358--1374
                Xingang Shi and   
              Dah-Ming Chiu and   
                 John C. S. Lui   An online framework for catching top
                                  spreaders and scanners . . . . . . . . . 1375--1388
    Pablo J. Argibay-Losada and   
Andrés Suárez-González and   
Cándido López-García and   
  Manuel Fernández-Veiga   A new design for end-to-end proportional
                                  loss differentiation in IP networks  . . 1389--1403
             Josep Domenech and   
                Jose A. Gil and   
           Julio Sahuquillo and   
                       Ana Pont   Using current Web page structure to
                                  improve prefetching performance  . . . . 1404--1417
              Kyung-Hoe Kim and   
            Kwang-Min Jeong and   
              Chul-Hee Kang and   
                Seung-Joon Seok   A transmission control SCTP for
                                  real-time multimedia streaming . . . . . 1418--1425
               Ming-Fei Guo and   
               Xinbing Wang and   
                     Min-You Wu   On the capacity of multi-packet
                                  reception enabled multi-channel
                                  multi-interface wireless networks  . . . 1426--1439
            Joydeep Chandra and   
         Santosh Kumar Shaw and   
                  Niloy Ganguly   HPC5: an efficient topology generation
                                  mechanism for Gnutella networks  . . . . 1440--1459
                     Yao Yu and   
                    Lei Guo and   
               Xingwei Wang and   
                   Cuixiang Liu   Routing security scheme based on
                                  reputation evaluation in hierarchical ad
                                  hoc networks . . . . . . . . . . . . . . 1460--1469
               Sabbir Ahmed and   
           Gour C. Karmakar and   
            Joarder Kamruzzaman   An environment-aware mobility model for
                                  wireless ad hoc network  . . . . . . . . 1470--1489
                    S. Laki and   
           P. Mátray and   
             P. Hága and   
                  I. Csabai and   
                      G. Vattay   A model based approach for improving
                                  router geolocation . . . . . . . . . . . 1490--1501
          Pedro Peris-Lopez and   
  Julio C. Hernandez-Castro and   
        Juan M. E. Tapiador and   
                  Tieyan Li and   
                     Yingjiu Li   Vulnerability analysis of RFID protocols
                                  for tag ownership transfer . . . . . . . 1502--1508
               Eitan Altman and   
       Tania Jiménez and   
                  Daniel Kofman   Discriminatory processor sharing queues
                                  with stationary ergodic service times
                                  and the performance of TCP in overload   1509--1519
                Tsu-Yang Wu and   
                  Yuh-Min Tseng   An efficient user authentication and key
                                  exchange protocol for mobile
                                  client--server environment . . . . . . . 1520--1530
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 54, Number 10, July 1, 2010

       António Pinto and   
                 Manuel Ricardo   Secure multicast in IPTV services  . . . 1531--1542
              Yueping Zhang and   
                 Yong Xiong and   
                  Steve Liu and   
                Dmitri Loguinov   Queuing dynamics and single-link
                                  stability of delay-based window
                                  congestion control . . . . . . . . . . . 1543--1553
                Sameer Qazi and   
                      Tim Moors   On the impact of routing matrix
                                  inconsistencies on statistical path
                                  monitoring in overlay networks . . . . . 1554--1572
           Bazil Taha Ahmed and   
      Jose Luis Masa Campos and   
             Jorge A. Ruiz-Cruz   Impact of Ultra Wide Band emission on
                                  WiMAX systems at $ 2.5 $ and $ 3.5 $ GHz 1573--1583
             Anatolij Zubow and   
           Daniel Camps Mur and   
         Xavier Perez Costa and   
                   Paolo Favaro   Greedy scheduling algorithm (GSA) ---
                                  Design and evaluation of an efficient
                                  and flexible WiMAX OFDMA scheduling
                                  solution . . . . . . . . . . . . . . . . 1584--1606
  Jesper H. Sòrensen and   
           Rasmus Krigslund and   
             Petar Popovski and   
       Toshiaki Koike Akino and   
                  Torben Larsen   Scalable DeNoise-and-Forward in
                                  bidirectional relay networks . . . . . . 1607--1614
     Konstantinos Oikonomou and   
           Dimitrios Kogias and   
            Ioannis Stavrakakis   Probabilistic flooding for efficient
                                  information dissemination in random
                                  graph topologies . . . . . . . . . . . . 1615--1629
            Lanny Sitanayah and   
              Amitava Datta and   
          Rachel Cardell-Oliver   Heuristic algorithm for finding boundary
                                  cycles in location-free low density
                                  wireless sensor networks . . . . . . . . 1630--1645
              Salekul Islam and   
              J. William Atwood   Sender access and data distribution
                                  control for inter-domain multicast
                                  groups . . . . . . . . . . . . . . . . . 1646--1671
           P. S. Kritzinger and   
               Henry Msiska and   
        Tino Mundangepfupfu and   
              Paolo Pileggi and   
               Andrew Symington   Comparing the results from various
                                  performance models of IEEE 802.11g DCF   1672--1682
                  G. Booker and   
               A. Sprintson and   
                 E. Zechman and   
                   C. Singh and   
                     S. Guikema   Efficient traffic loss evaluation for
                                  transport backbone networks  . . . . . . 1683--1691
               Lyes Khoukhi and   
              Soumaya Cherkaoui   Intelligent QoS management for
                                  multimedia services support in wireless
                                  mobile ad hoc networks . . . . . . . . . 1692--1706
                 Kai-Wei Ke and   
             Chen-Nien Tsai and   
                     Ho-Ting Wu   Performance analysis for hierarchical
                                  resource allocation in multiplexed
                                  mobile packet data networks  . . . . . . 1707--1725
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 54, Number 11, August 2, 2010

              Hyang-Won Lee and   
              Jeong-woo Cho and   
                     Song Chong   Distributed max--min flow control for
                                  multi-rate overlay multicast . . . . . . 1727--1738
                Duc A. Tran and   
                     Cuong Pham   Enabling content-based publish/subscribe
                                  services in cooperative P2P networks . . 1739--1749
                   P. Casas and   
                   S. Vaton and   
                L. Fillatre and   
                   I. Nikiforov   Optimal volume anomaly detection and
                                  isolation in large-scale IP networks
                                  using coarse-grained measurements  . . . 1750--1766
                 Xiang Feng and   
              Francis C. M. Lau   Parallel physics-inspired waterflow
                                  particle mechanics algorithm for load
                                  rebalancing  . . . . . . . . . . . . . . 1767--1777
        Fragkiskos Papadopoulos   On scaling the IEEE 802.11 to facilitate
                                  scalable wireless networks . . . . . . . 1778--1791
               Wissam Fawaz and   
                Iyad Ouaiss and   
                   Ken Chen and   
                   Harry Perros   Deadline-based connection setup in
                                  wavelength-routed WDM networks . . . . . 1792--1804
           Evren Güney and   
                Necati Aras and   
  \.I. Kuban Altìnel and   
                      Cem Ersoy   Efficient integer programming
                                  formulations for optimum sink location
                                  and routing in heterogeneous wireless
                                  sensor networks  . . . . . . . . . . . . 1805--1822
                 Kaikai Chi and   
             Xiaohong Jiang and   
               Susumu Horiguchi   Network coding-based reliable multicast
                                  in wireless networks . . . . . . . . . . 1823--1836
              Ruishan Zhang and   
               Xinyuan Wang and   
               Xiaohui Yang and   
                   Xuxian Jiang   On the billing vulnerabilities of
                                  SIP-based VoIP systems . . . . . . . . . 1837--1847
               Xiaohuan Yan and   
   Y. Ahmet \cSekercio\uglu and   
               Sathya Narayanan   A survey of vertical handover decision
                                  algorithms in Fourth Generation
                                  heterogeneous wireless networks  . . . . 1848--1863
    Bheemarjuna Reddy Tamma and   
              Anirudh Badam and   
         C. Siva Ram Murthy and   
                  Ramesh R. Rao   $K$-Tree: a multiple tree video
                                  multicast protocol for ad hoc wireless
                                  networks . . . . . . . . . . . . . . . . 1864--1884
               Jianning Mai and   
           Ashwin Sridharan and   
                   Hui Zang and   
                 Chen-Nee Chuah   Fast Filtered Sampling . . . . . . . . . 1885--1898
                Xiaofeng Lu and   
                    Pan Hui and   
                Don Towsley and   
                  Juahua Pu and   
                    Zhang Xiong   Anti-localization anonymous routing for
                                  Delay Tolerant Network . . . . . . . . . 1899--1910
                    Yu-Chen Kuo   Quorum-based power-saving multicast
                                  protocols in the asynchronous ad hoc
                                  network  . . . . . . . . . . . . . . . . 1911--1922
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 54, Number 12, August 26, 2010

Pedro García-López and   
      Michael W. Sobolewski and   
    Marc Sánchez-Artigas   Guest editorial for the special issue
                                  collaborative P2P systems  . . . . . . . 1923--1925
           Pierre St. Juste and   
             David Wolinsky and   
            P. Oscar Boykin and   
       Michael J. Covington and   
           Renato J. Figueiredo   SocialVPN: Enabling wide-area
                                  collaboration with integrated social and
                                  overlay networks . . . . . . . . . . . . 1926--1938
        Gérald Oster and   
Rubén Mondéjar and   
               Pascal Molli and   
                Sergiu Dumitriu   Building a collaborative peer-to-peer
                                  wiki system on a structured overlay  . . 1939--1952
           Santosh Kulkarni and   
              Scott Douglas and   
                David Churchill   Badumna: a decentralised network engine
                                  for virtual environments . . . . . . . . 1953--1967
     Marc S\`anchez-Artigas and   
  Jordi Pujol-Ahulló and   
        Lluis Pamies-Juarez and   
Pedro García-López   p2pWeb: an open, decentralized
                                  infrastructure of Web servers for
                                  sharing ephemeral Web content  . . . . . 1968--1985
           Krzysztof Rzadca and   
      Jackson Tan Teck Yong and   
                Anwitaman Datta   Multi-objective optimization of
                                  multicast overlays for collaborative
                                  applications . . . . . . . . . . . . . . 1986--2006
                      Di Wu and   
                 Chao Liang and   
                   Yong Liu and   
                  Keith W. Ross   Redesigning multi-channel P2P live video
                                  systems with View-Upload Decoupling  . . 2007--2018
        Odysseas Papapetrou and   
              Wolf Siberski and   
                 Wolfgang Nejdl   PCIR: Combining DHTs and peer clusters
                                  for efficient full-text P2P indexing . . 2019--2040
              Nicklas S. Beijar   Zone indexing: Optimizing the balance
                                  between searching and indexing in a
                                  loosely structured overlay . . . . . . . 2041--2055
             Juan M. Tirado and   
             Daniel Higuero and   
              Florin Isaila and   
     Jesús Carretero and   
              Adriana Iamnitchi   Affinity P2P: a self-organizing
                                  content-based locality-aware
                                  collaborative peer-to-peer network . . . 2056--2070
        Rubén Cuevas and   
        Ángel Cuevas and   
   Albert Cabellos-Aparicio and   
        Loránd Jakab and   
                Carmen Guerrero   A collaborative P2P scheme for NAT
                                  Traversal Server discovery based on
                                  topological information  . . . . . . . . 2071--2085
            Gian Paolo Jesi and   
          Alberto Montresor and   
              Maarten van Steen   Secure peer sampling . . . . . . . . . . 2086--2098
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 54, Number 13, September 15, 2010

              Michael Menth and   
                Frank Lehrieder   PCN-based measured rate termination  . . 2099--2116
                Luci Pirmez and   
     Jaime C. Carvalho, Jr. and   
  Flávia C. Delicato and   
        Fábio Protti and   
        Luiz F. R. C. Carmo and   
             Paulo F. Pires and   
                  Marcos Pirmez   SUTIL --- Network selection based on
                                  utility function and integer linear
                                  programming  . . . . . . . . . . . . . . 2117--2136
                Xiaomao Mao and   
               Huifang Chen and   
               Peiliang Qiu and   
                 Zhaoyang Zhang   Energy-efficient scheduling for multiple
                                  access in wireless sensor networks: a
                                  job scheduling method  . . . . . . . . . 2137--2146
                      Yu Ge and   
            Chen-Khong Tham and   
             Peng-Yong Kong and   
                   Yew-Hock Ang   Dynamic end-to-end capacity in IEEE
                                  802.16 wireless mesh networks  . . . . . 2147--2165
                    N. Akar and   
               C. Raffaelli and   
                    M. Savi and   
                     E. Karasan   Shared-per-wavelength asynchronous
                                  optical packet switching: a comparative
                                  analysis . . . . . . . . . . . . . . . . 2166--2181
                  Chuan Yue and   
                Mengjun Xie and   
                   Haining Wang   An automatic HTTP cookie management
                                  system . . . . . . . . . . . . . . . . . 2182--2198
                    C. Cano and   
                B. Bellalta and   
            A. Sfairopoulou and   
              J. Barceló   Tuning the EDCA parameters in WLANs with
                                  heterogeneous traffic: a flow-level
                                  analysis . . . . . . . . . . . . . . . . 2199--2214
             Eliana Stavrou and   
            Andreas Pitsillides   A survey on secure multipath routing
                                  protocols in WSNs  . . . . . . . . . . . 2215--2238
         Josephina Antoniou and   
         Vicky Papadopoulou and   
            Vasos Vassiliou and   
            Andreas Pitsillides   Cooperative user--network interactions
                                  in next generation communication
                                  networks . . . . . . . . . . . . . . . . 2239--2255
             Zahra Ahmadian and   
             Somayeh Salimi and   
                   Ahmad Salahi   Security enhancements against UMTS--GSM
                                  interworking attacks . . . . . . . . . . 2256--2270
       Preetha Thulasiraman and   
          Xuemin (Sherman) Shen   Interference aware resource allocation
                                  for hybrid hierarchical wireless
                                  networks . . . . . . . . . . . . . . . . 2271--2280
      Patrick Maillé and   
                   Bruno Tuffin   Price war in heterogeneous wireless
                                  networks . . . . . . . . . . . . . . . . 2281--2292
       Rully Adrian Santosa and   
                Bu-Sung Lee and   
                  Chai Kiat Yeo   Efficient DSR route request flooding
                                  with directional antennas  . . . . . . . 2293--2309
          Jaideep D. Padhye and   
               Kush Kothari and   
        Madhu Venkateshaiah and   
                 Matthew Wright   Evading stepping-stone detection under
                                  the cloak of streaming media with SNEAK  2310--2325
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 54, Number 14, October 6, 2010

             Gustavo Marfia and   
         Claudio E. Palazzi and   
               Giovanni Pau and   
                Mario Gerla and   
                 Marco Roccetti   TCP Libra: Derivation, analysis, and
                                  comparison with other RTT-fair TCPs  . . 2327--2344
               Mohit Saxena and   
            Ramana Rao Kompella   CLAMP: Efficient class-based sampling
                                  for flexible flow monitoring . . . . . . 2345--2356
                    Oleg Berzin   Hierarchical Mobility Label Based
                                  Network: System model and performance
                                  analysis . . . . . . . . . . . . . . . . 2357--2382
                 Robin Doss and   
                    Gang Li and   
                  Vicky Mak and   
                  Menik Tissera   Information discovery in
                                  mission-critical wireless sensor
                                  networks . . . . . . . . . . . . . . . . 2383--2399
    Gilvan M. Durães and   
        André Soares and   
    José R. Amazonas and   
                 William Giozza   The choice of the best among the
                                  shortest routes in transparent optical
                                  networks . . . . . . . . . . . . . . . . 2400--2409
              M. Esnaashari and   
                  M. R. Meybodi   A learning automata based scheduling
                                  solution to the dynamic point coverage
                                  problem in wireless sensor networks  . . 2410--2438
                 Junyi Zhou and   
                       Jing Shi   Error analysis of non-collaborative
                                  wireless localization in circular-shaped
                                  regions  . . . . . . . . . . . . . . . . 2439--2452
              Stefano Secci and   
         Jean-Louis Rougier and   
              Achille Pattavina   AS-level source routing for
                                  multi-provider connection-oriented
                                  services . . . . . . . . . . . . . . . . 2453--2467
                 Hyewon Lee and   
          Ilenia Tinnirello and   
               Jeonggyun Yu and   
                  Sunghyun Choi   A performance analysis of block ACK
                                  scheme for IEEE 802.11e networks . . . . 2468--2481
                  Lei Zhang and   
                     Bo Qin and   
                Qianhong Wu and   
                    Futai Zhang   Efficient many-to-one authentication
                                  with certificateless aggregate
                                  signatures . . . . . . . . . . . . . . . 2482--2491
            Cristel Pelsser and   
                Steve Uhlig and   
            Tomonori Takeda and   
              Bruno Quoitin and   
                 Kohei Shiomoto   Providing scalable NH-diverse iBGP route
                                  re-distribution to achieve sub-second
                                  switch-over time . . . . . . . . . . . . 2492--2505
    Wolfgang Mühlbauer and   
                Steve Uhlig and   
              Anja Feldmann and   
               Olaf Maennel and   
              Bruno Quoitin and   
                     Bingjie Fu   Impact of routing parameters on route
                                  diversity and path inflation . . . . . . 2506--2518
            Xavier Gelabert and   
              Oriol Sallent and   
  Jordi Pérez-Romero and   
            Ramon Agustí   Spectrum sharing in cognitive radio
                                  networks with imperfect sensing: a
                                  discrete-time Markov model . . . . . . . 2519--2536
                Beibei Wang and   
                  Yongle Wu and   
                  K. J. Ray Liu   Game theory for cognitive radio
                                  networks: an overview  . . . . . . . . . 2537--2561
              Yueping Zhang and   
                Dmitri Loguinov   ABS: Adaptive buffer sizing for
                                  heterogeneous networks . . . . . . . . . 2562--2574
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 54, Number 15, October 28, 2010

             Yigal Bejerano and   
              Seung-Jae Han and   
                     Mark Smith   A novel frequency planning algorithm for
                                  mitigating unfairness in wireless LANs   2575--2590
Marcos A. Simplício, Jr. and   
     Paulo S. L. M. Barreto and   
            Cintia B. Margi and   
       Tereza C. M. B. Carvalho   A survey on key management mechanisms
                                  for distributed Wireless Sensor Networks 2591--2612
                   Hui Yang and   
           Stephen D. Patek and   
                     Zhenyu Yan   Strategies for adaptive smoothing and
                                  rebuffering via dynamic network calculus 2613--2625
                P. L. Conti and   
             L. De Giovanni and   
                       M. Naldi   Blind maximum likelihood estimation of
                                  traffic matrices under long-range
                                  dependent traffic  . . . . . . . . . . . 2626--2639
           Navid Ghazisaidi and   
                   Martin Maier   Techno-economic analysis of EPON and
                                  WiMAX for future Fiber-Wireless (FiWi)
                                  networks . . . . . . . . . . . . . . . . 2640--2650
             R. Marin-Lopez and   
              F. Pereniguez and   
                  F. Bernal and   
                    A. F. Gomez   Secure three-party key distribution
                                  protocol for fast network access in
                                  EAP-based wireless networks  . . . . . . 2651--2673
                 Fu-Yi Hung and   
                    Ivan Marsic   Performance analysis of the IEEE 802.11
                                  DCF in the presence of the hidden
                                  stations . . . . . . . . . . . . . . . . 2674--2687
              Hande Alemdar and   
                      Cem Ersoy   Wireless sensor networks for healthcare:
                                  a survey . . . . . . . . . . . . . . . . 2688--2710
Gabriel Maciá-Fernández and   
Rafael A. Rodríguez-Gómez and   
Jesús E. Díaz-Verdejo   Defense techniques for low-rate DoS
                                  attacks against application servers  . . 2711--2727
                   Qishi Wu and   
        Nageswara S. V. Rao and   
                  Xukang Lu and   
                  Ki-Hyeon Kwon   Stabilizing transport dynamics of
                                  control channels over wide-area networks 2728--2743
               Xiaodong Lin and   
                Rongxing Lu and   
                 Davis Kwan and   
          Xuemin (Sherman) Shen   REACT: an RFID-based privacy-preserving
                                  children tracking scheme for large
                                  amusement parks  . . . . . . . . . . . . 2744--2755
                    Xin Sun and   
               Ruben Torres and   
                     Sanjay Rao   Preventing DDoS attacks on Internet
                                  servers exploiting P2P systems . . . . . 2756--2774
                   Hua Wang and   
               Xiangxu Meng and   
                   Shuai Li and   
                        Hong Xu   A tree-based particle swarm optimization
                                  for multicast routing  . . . . . . . . . 2775--2786
               Luigi Atzori and   
               Antonio Iera and   
               Giacomo Morabito   The Internet of Things: a survey . . . . 2787--2805
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 54, Number 16, November 15, 2010

              Metin Feridun and   
             Joseph Hellerstein   Editorial  . . . . . . . . . . . . . . . 2807--2808
                    Qi Liao and   
              Andrew Blaich and   
            Dirk VanBruggen and   
                 Aaron Striegel   Managing networks through context: Graph
                                  visualization and exploration  . . . . . 2809--2824
               Kevin Feeney and   
                Rob Brennan and   
                John Keeney and   
             Hendrik Thomas and   
                 Dave Lewis and   
                Aidan Boran and   
              Declan O'Sullivan   Enabling decentralised management
                                  through federation . . . . . . . . . . . 2825--2839
                    Bin Guo and   
               Daqing Zhang and   
                   Michita Imai   Enabling user-oriented management for
                                  ubiquitous computing: The meta-design
                                  approach . . . . . . . . . . . . . . . . 2840--2855
               Andreas Berl and   
              Nicholas Race and   
          Johnathan Ishmael and   
                Hermann de Meer   Network virtualization in
                                  energy-efficient office environments . . 2856--2868
           Tridib Mukherjee and   
              Ayan Banerjee and   
     Georgios Varsamopoulos and   
            Sandeep K. S. Gupta   Model-driven coordinated management of
                                  data centers . . . . . . . . . . . . . . 2869--2886
            Jacques M. Bahi and   
                 Michel Salomon   A decentralized energy-based diffusion
                                  algorithm to increase the lifetime of
                                  MANETs . . . . . . . . . . . . . . . . . 2887--2898
Félix Gómez Mármol and   
                 Joao Girao and   
Gregorio Martínez Pérez   TRIMS, a privacy-aware trust and
                                  reputation model for identity management
                                  systems  . . . . . . . . . . . . . . . . 2899--2912
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 54, Number 17, December 3, 2010

   Hél\`ene Le Cadre and   
               Mustapha Bouhtou   An interconnection game between mobile
                                  network operators: Hidden information
                                  forecasting using expert advice fusion   2913--2942
                 Zhi Ang Eu and   
              Hwee-Pink Tan and   
             Winston K. G. Seah   Opportunistic routing in wireless sensor
                                  networks powered by ambient energy
                                  harvesting . . . . . . . . . . . . . . . 2943--2966
               Jongdeog Lee and   
       Krasimira Kapitanova and   
                    Sang H. Son   The price of security in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 2967--2978
           Daniel F. Macedo and   
        Aldri L. dos Santos and   
         Luiz H. A. Correia and   
    José M. Nogueira and   
                    Guy Pujolle   Transmission power and data rate aware
                                  routing on wireless networks . . . . . . 2979--2990
                  Luis Cobo and   
         Alejandro Quintero and   
                  Samuel Pierre   Ant-based routing for wireless
                                  multimedia sensor networks using
                                  multiple QoS metrics . . . . . . . . . . 2991--3010
              Seongkwan Kim and   
               Lochan Verma and   
              Sunghyun Choi and   
                      Daji Qiao   Collision-Aware Rate Adaptation in
                                  multi-rate WLANs: Design and
                                  implementation . . . . . . . . . . . . . 3011--3030
           George Alyfantis and   
   Stathes Hadjiefthymiades and   
                Lazaros Merakos   Distributed QoS-sensitive band selection
                                  strategies for dynamic spectrum access
                                  in unlicensed CDMA networks  . . . . . . 3031--3048
             Ming-Fong Tsai and   
              Tzu-Chi Huang and   
              Ce-Kuen Shieh and   
                   Kuo-Chih Chu   Dynamical combination of byte level and
                                  Sub-Packet level FEC in HARQ mechanism
                                  to reduce error recovery overhead on
                                  video streaming over wireless networks   3049--3067
               Taiming Feng and   
                  Long Long and   
             Ahmed E. Kamal and   
                        Lu Ruan   Two-link failure protection in WDM mesh
                                  networks with $p$-cycles . . . . . . . . 3068--3080
        Rosario G. Garroppo and   
           Stefano Giordano and   
                   Luca Tavanti   A survey on multi-constrained optimal
                                  path computation: Exact and approximate
                                  algorithms . . . . . . . . . . . . . . . 3081--3107
                 Ying Zhang and   
                 Damien Fay and   
             Liam Kilmartin and   
                Andrew W. Moore   A Garch-based adaptive playout delay
                                  algorithm for VoIP . . . . . . . . . . . 3108--3122
            Pablo Belzarena and   
                  Laura Aspirot   End-to-end quality of service seen by
                                  applications: a statistical learning
                                  approach . . . . . . . . . . . . . . . . 3123--3143
René Serral-Graci\`a and   
           Marcelo Yannuzzi and   
                 Yann Labit and   
         Philippe Owezarski and   
               Xavi Masip-Bruin   An efficient and lightweight method for
                                  Service Level Agreement assessment . . . 3144--3158
                Cunqing Hua and   
                     Rong Zheng   On link-level starvation in dense 802.11
                                  wireless community networks  . . . . . . 3159--3172
                  Shaohe Lv and   
              Xiaodong Wang and   
                  Xingming Zhou   On the rate adaptation for IEEE 802.11
                                  wireless networks  . . . . . . . . . . . 3173--3186
                   Yuan Rao and   
                  Ru-chuan Wang   Agent-based load balancing routing for
                                  LEO satellite networks . . . . . . . . . 3187--3195
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 54, Number 18, December 20, 2010

         Gregor v. Bochmann and   
                Dave Rayner and   
                  Colin H. West   Some notes on the history of protocol
                                  engineering  . . . . . . . . . . . . . . 3197--3209
                  Chao Chen and   
               Zesheng Chen and   
                       Yubin Li   Characterizing and defending against
                                  divide-conquer-scanning worms  . . . . . 3210--3222
                   Eiji Oki and   
                    Ayako Iwaki   Fine two-phase routing over shortest
                                  paths with traffic matrix  . . . . . . . 3223--3231
              Craig A. Shue and   
                   Minaxi Gupta   An Internet without the Internet
                                  protocol . . . . . . . . . . . . . . . . 3232--3245
       Dimitrios P. Pezaros and   
  Konstantinos Georgopoulos and   
                David Hutchison   High-speed, in-band performance
                                  measurement instrumentation for next
                                  generation IP networks . . . . . . . . . 3246--3263
    Abdeltouab Belbekkouche and   
           Abdelhakim Hafid and   
            Mariam Tagmouti and   
                Michel Gendreau   Topology-aware wavelength partitioning
                                  for DWDM OBS networks: a novel approach
                                  for absolute QoS provisioning  . . . . . 3264--3279
               Houda Labiod and   
                    Hai Lin and   
                 Riccardo Nonni   Analytical study of intradomain handover
                                  in multiple-mobile-routers-based
                                  multihomed NEMO networks . . . . . . . . 3280--3294
               Jongwook Lee and   
              Saewoong Bahk and   
                  Jin-Ghoo Choi   Energy efficient transmission scheduling
                                  for infrastructure sensor nodes in
                                  location systems . . . . . . . . . . . . 3295--3308
                    Tian Bu and   
                    Jin Cao and   
                 Aiyou Chen and   
              Patrick P. C. Lee   Sequential hashing: a flexible approach
                                  for unveiling significant patterns in
                                  high speed networks  . . . . . . . . . . 3309--3326
               Hongbo Jiang and   
                   Zihui Ge and   
                Shudong Jin and   
                       Jia Wang   Network prefix-level traffic profiling:
                                  Characterizing, modeling, and evaluation 3327--3340
          Mustafizur Rahman and   
               Rajiv Ranjan and   
                 Rajkumar Buyya   Reputation-based dependable scheduling
                                  of workflow applications in Peer-to-Peer
                                  Grids  . . . . . . . . . . . . . . . . . 3341--3359
        Stylianos Dimitriou and   
           Vassilis Tsaoussidis   Promoting effective service
                                  differentiation with Size-oriented Queue
                                  Management . . . . . . . . . . . . . . . 3360--3372
              Benoit Donnet and   
               Bruno Baynat and   
                 Timur Friedman   Improving retouched Bloom filter for
                                  trading off selected false positives
                                  against false negatives  . . . . . . . . 3373--3387
        Loránd Jakab and   
   Albert Cabellos-Aparicio and   
          Thomas Silverston and   
           Marc Solé and   
               Florin Coras and   
          Jordi Domingo-Pascual   CoreCast: How core/edge separation can
                                  help improving inter-domain live
                                  streaming  . . . . . . . . . . . . . . . 3388--3401
                 Sara Alouf and   
            Giovanni Neglia and   
            Iacopo Carreras and   
           Daniele Miorandi and   
           Álvaro Fialho   Fitting genetic algorithms to
                                  distributed on-line evolution of network
                                  protocols  . . . . . . . . . . . . . . . 3402--3420
       Dimitris E. Charilas and   
     Athanasios D. Panagopoulos   A survey on game theory applications in
                                  wireless networks  . . . . . . . . . . . 3421--3430
                   Shao Tao and   
               A. L. Ananda and   
                 Mun Choon Chan   Greedy face routing with face
                                  identification support in wireless
                                  networks . . . . . . . . . . . . . . . . 3431--3448
        Mehmet Yunus Donmez and   
                Rabun Kosar and   
                      Cem Ersoy   An analytical approach to the deployment
                                  quality of surveillance wireless sensor
                                  networks considering the effect of
                                  jammers and coverage holes . . . . . . . 3449--3466


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 55, Number 1, January 7, 2011

            Ian F. Akyildiz and   
                    Harry Rudin   Editorial  . . . . . . . . . . . . . . . 1--2
          Daniel M. Batista and   
        Nelson L. S. da Fonseca   Robust scheduler for grid networks under
                                  uncertainties of both application
                                  demands and resource availability  . . . 3--19
                    Ying Li and   
  Antonis Papachristodoulou and   
                Mung Chiang and   
           A. Robert Calderbank   Congestion control and its stability in
                                  networks with delay sensitive traffic    20--32
               T. Heikkinen and   
                    A. Hottinen   Distributed subchannel assignment in a
                                  two-hop network  . . . . . . . . . . . . 33--44
           Ihsan Ayyub Qazi and   
                    Taieb Znati   On the design of load factor based
                                  congestion control protocols for
                                  next-generation networks . . . . . . . . 45--60
               Mine Altunay and   
               Sven Leyffer and   
       Jeffrey T. Linderoth and   
                       Zhen Xie   Optimal response to attacks on the open
                                  science grid . . . . . . . . . . . . . . 61--73
            Juan J. Alcaraz and   
  Esteban Egea-López and   
        Javier Vales-Alonso and   
        Joan García-Haro   Dynamic system model for optimal
                                  configuration of mobile RFID systems . . 74--83
            Nadjib Aitsaadi and   
               Nadjib Achir and   
           Khaled Boussetta and   
                    Guy Pujolle   Artificial potential field approach in
                                  WSN deployment: Cost, QoM, connectivity,
                                  and lifetime constraints . . . . . . . . 84--105
             Jocelyne Elias and   
            Fabio Martignon and   
     Konstantin Avrachenkov and   
                Giovanni Neglia   A game theoretic analysis of network
                                  design with socially-aware users . . . . 106--118
       Josep Domingo-Ferrer and   
Úrsula González-Nicolás   Decapitation of networks with and
                                  without weights and direction: The
                                  economics of iterated attack and defense 119--130
                 Zehua Zhou and   
             Xiaojing Xiang and   
                   Xin Wang and   
                   Jianping Pan   A holistic sensor network design for
                                  energy conservation and efficient data
                                  dissemination  . . . . . . . . . . . . . 131--146
              Younghyun Kim and   
              Sangheon Pack and   
              Chung Gu Kang and   
                   Soonjun Park   An enhanced information server for
                                  seamless vertical handover in IEEE
                                  802.21 MIH networks  . . . . . . . . . . 147--158
    Abdeltouab Belbekkouche and   
              Jihene Rezgui and   
               Abdelhakim Hafid   Wireless mesh and optical burst
                                  switching convergence for a novel
                                  metropolitan area network architecture   159--172
            Xavier Gelabert and   
              Oriol Sallent and   
  Jordi Pérez-Romero and   
            Ramon Agustí   Performance evaluation of radio access
                                  selection strategies in constrained
                                  multi-access/multi-service wireless
                                  networks . . . . . . . . . . . . . . . . 173--192
          Darli A. A. Mello and   
              Helio Waldman and   
     Gustavo S. Quitério   Interval availability estimation for
                                  protected connections in optical
                                  networks . . . . . . . . . . . . . . . . 193--204
                   Tao Zhou and   
                        Jing Xu   Provable secure authentication protocol
                                  with anonymity for roaming service in
                                  global mobility networks . . . . . . . . 205--213
            Ashraf Al Daoud and   
             Murat Alanyali and   
              David Starobinski   Reservation policies for revenue
                                  maximization from secondary spectrum
                                  access in cellular networks  . . . . . . 214--224
               Donggook Kim and   
                 Jaesub Kim and   
                    Kyu Ho Park   An event-aware MAC scheduling for energy
                                  efficient aggregation in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 225--240
               Kyungmin Cho and   
               Younghyun Ju and   
                 Sungjae Jo and   
               Yunseok Rhee and   
                   Junehwa Song   SATI: a scalable and traffic-efficient
                                  data delivery infrastructure for
                                  real-time sensing applications . . . . . 241--263
                     S. Guo and   
             M. Derakhshani and   
               M. H. Falaki and   
                  U. Ismail and   
                     R. Luk and   
               E. A. Oliver and   
               S. Ur Rahman and   
                    A. Seth and   
              M. A. Zaharia and   
                      S. Keshav   Design and implementation of the
                                  KioskNet system  . . . . . . . . . . . . 264--281
   George C. Hadjichristofi and   
            Luiz A. DaSilva and   
           Scott F. Midkiff and   
                 Unghee Lee and   
              Waltemar De Sousa   Routing, security, resource management,
                                  and monitoring in ad hoc networks:
                                  Implementation and integration . . . . . 282--299
               Sabina Serbu and   
              Pascal Felber and   
                    Peter Kropf   HyPeer: Structured overlay with
                                  flexible-choice routing  . . . . . . . . 300--313
                    Ren-Song Ko   A distributed routing algorithm for
                                  sensor networks derived from macroscopic
                                  models . . . . . . . . . . . . . . . . . 314--329
             Kiam Cheng How and   
                   Maode Ma and   
                       Yang Qin   Routing and QoS provisioning in
                                  cognitive radio networks . . . . . . . . 330--342
                   Can Zhao and   
                    Xiaojun Lin   On the queue-overflow probabilities of a
                                  class of distributed scheduling
                                  algorithms . . . . . . . . . . . . . . . 343--355
       Christos P. Antonopoulos   On BS/BS coordination towards
                                  interference minimization in WiMAX
                                  networks . . . . . . . . . . . . . . . . 356--369
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 55, Number 2, February 1, 2011

               Eitan Altman and   
               Sajal K. Das and   
            Luciano Lenzini and   
                    Adam Wolisz   Preface  . . . . . . . . . . . . . . . . 371--373
              Sabrina Gaito and   
               Elena Pagani and   
               Gian Paolo Rossi   Strangers help friends to communicate in
                                  opportunistic networks . . . . . . . . . 374--385
        Marco Ajmone Marsan and   
                    Michela Meo   Energy efficient wireless Internet
                                  access with cooperative cellular
                                  networks . . . . . . . . . . . . . . . . 386--398
             Ioannis Psaras and   
               Lefteris Mamatas   On Demand Connectivity Sharing: Queuing
                                  management and load balancing for
                                  User-Provided Networks . . . . . . . . . 399--414
             Chakchai So-In and   
                   Raj Jain and   
             Subharthi Paul and   
                     Jianli Pan   Virtualization architecture using the
                                  ID/Locator split concept for Future
                                  Wireless Networks (FWNs) . . . . . . . . 415--430
             Mariana Dirani and   
                     Zwi Altman   Self-organizing networks in next
                                  generation radio access networks:
                                  Application to fractional power control  431--438
      Gergely Biczók and   
  László Toka and   
András Gulyás and   
              Tuan A. Trinh and   
           Attila Vidács   Incentivizing the global wireless
                                  village  . . . . . . . . . . . . . . . . 439--456
                Mario Gerla and   
              Leonard Kleinrock   Vehicular networks and the future of the
                                  mobile Internet  . . . . . . . . . . . . 457--469
                 Sulan Wong and   
               Eitan Altman and   
               Julio Rojas-Mora   Internet access: Where law, economy,
                                  culture and technology meet  . . . . . . 470--479
                 Lijun Chen and   
              Steven H. Low and   
                  John C. Doyle   Cross-layer design in multihop wireless
                                  networks . . . . . . . . . . . . . . . . 480--496
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 55, Number 3, February 21, 2011

                   Fei Yang and   
      Isabelle Augé-Blum   Delivery ratio-maximized wakeup
                                  scheduling for ultra-low duty-cycled
                                  WSNs under real-time constraints . . . . 497--513
              Josip Lorincz and   
             Antonio Capone and   
              Dinko Begu\vsi\'c   Optimized network management for energy
                                  savings of wireless access networks  . . 514--540
           Stevens Le Blond and   
              Arnaud Legout and   
                  Walid Dabbous   Pushing BitTorrent locality to the limit 541--557
              Luca De Cicco and   
            Saverio Mascolo and   
             Vittorio Palmisano   Skype Video congestion control: an
                                  experimental investigation . . . . . . . 558--571
            Ivan D. Barrera and   
            Gonzalo R. Arce and   
                Stephan Bohacek   Statistical approach for congestion
                                  control in gateway routers . . . . . . . 572--582
      Juan J. Gálvez and   
              Pedro M. Ruiz and   
         Antonio F. G. Skarmeta   Multipath routing with spatial
                                  separation in wireless multi-hop
                                  networks without location information    583--599
                 Ivan Vidal and   
       Jaime Garcia-Reinoso and   
               Ignacio Soto and   
               Francisco Valera   Evaluating extensions to IMS session
                                  setup for multicast-based many-to-many
                                  services . . . . . . . . . . . . . . . . 600--621
      Katarzyna Kosek-Szott and   
            Marek Natkaniec and   
                Andrzej R. Pach   A simple but accurate throughput model
                                  for IEEE 802.11 EDCA in saturation and
                                  non-saturation conditions  . . . . . . . 622--635
             Pei-chun Cheng and   
             Beichuan Zhang and   
              Daniel Massey and   
                    Lixia Zhang   Identifying BGP routing table transfers  636--649
               Soonmok Kwon and   
                Jae Hoon Ko and   
               Jeongkyu Kim and   
                     Cheeha Kim   Dynamic timeout for data aggregation in
                                  wireless sensor networks . . . . . . . . 650--664
            P. Pavon-Marino and   
         B. Garcia-Manrubia and   
              R. Aparicio-Pardo   Multi-hour network planning based on
                                  domination between sets of traffic
                                  matrices . . . . . . . . . . . . . . . . 665--675
               Xingwei Wang and   
                Weigang Hou and   
                    Lei Guo and   
               Jiannong Cao and   
                   Dingde Jiang   Energy saving and cost reduction in
                                  multi-granularity green optical networks 676--688
Christophoros Christophorou and   
        Andreas Pitsillides and   
                 Tomas Lundborg   Enhanced radio resource management
                                  algorithms for efficient MBMS service
                                  provision in UTRAN . . . . . . . . . . . 689--710
                     Lei Li and   
              Baoxian Zhang and   
               Xiaojun Shen and   
                  Jun Zheng and   
                      Zheng Yao   A study on the weak barrier coverage
                                  problem in wireless sensor networks  . . 711--721
             Jenq-Shiou Leu and   
             Cheng-Wei Tsai and   
                 Wei-Hsiang Lin   Resource searching in an unstructured
                                  P2P network based on Cloning Random
                                  Walker assisted by Dominating Set  . . . 722--733
                    Yan Cai and   
          Patrick P. C. Lee and   
                 Weibo Gong and   
                    Don Towsley   Analysis of traffic correlation attacks
                                  on router queues . . . . . . . . . . . . 734--747
                     Bin Wu and   
              Kwan L. Yeung and   
                    Bing Hu and   
                     Pin-Han Ho   $ M^2$-CYCLE: an optical layer algorithm
                                  for fast link failure detection in
                                  all-optical mesh networks  . . . . . . . 748--758
   Natalia Castro Fernandes and   
Otto Carlos Muniz Bandeira Duarte   A lightweight group-key management
                                  protocol for secure ad-hoc-network
                                  routing  . . . . . . . . . . . . . . . . 759--778
              Maria Gregori and   
            Ignacio Llatser and   
   Albert Cabellos-Aparicio and   
          Eduard Alarcón   Physical channel characterization for
                                  medium-range nanonetworks using
                                  flagellated bacteria . . . . . . . . . . 779--791
           Nikolaos Chrysos and   
              Manolis Katevenis   Distributed WFQ scheduling converging to
                                  weighted max--min fairness . . . . . . . 792--806
               Xingwei Wang and   
                Weigang Hou and   
                    Lei Guo and   
               Jiannong Cao and   
                   Dingde Jiang   A new multi-granularity grooming
                                  algorithm based on traffic partition in
                                  IP over WDM networks . . . . . . . . . . 807--821
              Fabrice Theoleyre   A route-aware MAC for wireless multihop
                                  networks with a convergecast traffic
                                  pattern  . . . . . . . . . . . . . . . . 822--837
                     DK Lee and   
                  Keon Jang and   
              Changhyun Lee and   
        Gianluca Iannaccone and   
                       Sue Moon   Scalable and systematic Internet-wide
                                  path and delay estimation from existing
                                  measurements . . . . . . . . . . . . . . 838--855
                    B. Peng and   
                     A. H. Kemp   Energy-efficient geographic routing in
                                  the presence of localization errors  . . 856--872
              Ravish Khosla and   
                Sonia Fahmy and   
              Y. Charlie Hu and   
               Jennifer Neville   Prediction models for long-term Internet
                                  prefix availability  . . . . . . . . . . 873--889
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 55, Number 4, March 10, 2011

                Lars Eggert and   
                    Tilman Wolf   Special Issue on Architectures and
                                  Protocols for the Future Internet  . . . 891--892
        Xavier Sanchez-Loro and   
    José Luis Ferrer and   
               Carles Gomez and   
           Jordi Casademont and   
                Josep Paradells   Can Future Internet be based on
                                  constrained networks design principles?  893--909
               Denis Martin and   
           Lars Völker and   
             Martina Zitterbart   A flexible framework for Future Internet
                                  design, assessment, and operation  . . . 910--918
                  Joe Touch and   
               Ilia Baldine and   
                Rudra Dutta and   
            Gregory G. Finn and   
                 Bryan Ford and   
               Scott Jordan and   
                 Dan Massey and   
              Abraham Matta and   
      Christos Papadopoulos and   
               Peter Reiher and   
                 George Rouskas   A Dynamic Recursive Unified Internet
                                  Design (DRUID) . . . . . . . . . . . . . 919--935
      Konstantinos Katsaros and   
           George Xylomenos and   
              George C. Polyzos   MultiCache: an overlay architecture for
                                  information-centric networking . . . . . 936--947
              Luigi Iannone and   
              Damien Saucez and   
            Olivier Bonaventure   Implementing the Locator/ID Separation
                                  Protocol: Design and experience  . . . . 948--958
                Hongbin Luo and   
               Hongke Zhang and   
                 Moshe Zukerman   Decoupling the design of
                                  identifier-to-locator mapping services
                                  from identifiers . . . . . . . . . . . . 959--974
            Jarno Rajahalme and   
     Mikko Särelä and   
                Kari Visala and   
          Janne Riihijärvi   On name-based inter-domain routing . . . 975--986
               M. Sifalakis and   
                   A. Louca and   
                G. Bouabene and   
                     M. Fry and   
                  A. Mauthe and   
                   D. Hutchison   Functional composition in future
                                  networks . . . . . . . . . . . . . . . . 987--998
            Brent Mochizuki and   
                Firat Kiyak and   
                Eric Keller and   
                 Matthew Caesar   Better by a HAIR: hardware-amenable
                                  Internet routing . . . . . . . . . . . . 999--1010
                Ines Houidi and   
               Wajdi Louati and   
            Walid Ben Ameur and   
               Djamal Zeghlache   Virtual network provisioning across
                                  multiple substrate networks  . . . . . . 1011--1023
               Jianxin Liao and   
                Jingyu Wang and   
                Tonghong Li and   
                    Xiaomin Zhu   Introducing multipath selection for
                                  concurrent multipath transfer in the
                                  future Internet  . . . . . . . . . . . . 1024--1035
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 55, Number 5, April 1, 2011

                 Ehud Doron and   
                   Avishai Wool   WDA: a Web farm Distributed Denial of
                                  Service attack attenuator  . . . . . . . 1037--1051
           Bikash Kumar Dey and   
               D. Manjunath and   
            Supriyo Chakraborty   Estimating network link characteristics
                                  using packet-pair dispersion: a
                                  discrete-time queueing theoretic
                                  analysis . . . . . . . . . . . . . . . . 1052--1068
              Choonha Hwang and   
            Elmurod Talipov and   
                     Hojung Cha   Distributed geographic service discovery
                                  for mobile sensor networks . . . . . . . 1069--1082
Valentín Carela-Español and   
            Pere Barlet-Ros and   
   Albert Cabellos-Aparicio and   
       Josep Solé-Pareta   Analysis of the impact of sampling on
                                  NetFlow traffic classification . . . . . 1083--1099
        Lluis Pamies-Juarez and   
Pedro García-López and   
Marc Sánchez-Artigas and   
                   Blas Herrera   Towards the design of optimal data
                                  redundancy schemes for heterogeneous
                                  cloud storage infrastructures  . . . . . 1100--1113
       Vassilis E. Zafeiris and   
              E. A. Giakoumakis   Optimized traffic flow assignment in
                                  multi-homed, multi-radio mobile hosts    1114--1131
         P. Mérindol and   
         P. François and   
             O. Bonaventure and   
                S. Cateloin and   
                  J.-J. Pansiot   An efficient algorithm to enable path
                                  diversity in link state routing networks 1132--1149
                    Pu Wang and   
                    Zhi Sun and   
            Mehmet C. Vuran and   
        Mznah A. Al-Rodhaan and   
     Abdullah M. Al-Dhelaan and   
                Ian F. Akyildiz   On network connectivity of wireless
                                  sensor networks for sandstorm monitoring 1150--1157
              Maurizio Dusi and   
         Francesco Gringoli and   
                Luca Salgarelli   Quantifying the accuracy of the ground
                                  truth associated with Internet traffic
                                  traces . . . . . . . . . . . . . . . . . 1158--1167
            Igor Bilogrevic and   
  Mohammad Hossein Manshaei and   
                 Maxim Raya and   
             Jean-Pierre Hubaux   OREN: Optimal revocations in ephemeral
                                  networks . . . . . . . . . . . . . . . . 1168--1180
                    N. Akar and   
              M. A. Toksöz   MPLS automatic bandwidth allocation via
                                  adaptive hysteresis  . . . . . . . . . . 1181--1196
       Tobias Hoßfeld and   
            Frank Lehrieder and   
                 David Hock and   
             Simon Oechsner and   
           Zoran Despotovic and   
          Wolfgang Kellerer and   
              Maximilian Michel   Characterization of BitTorrent swarms
                                  and their distribution in the Internet   1197--1215

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 55, Number 6, April 25, 2011

            Robert J. Walls and   
               Kush Kothari and   
                 Matthew Wright   Liquid: a detection-resistant covert
                                  timing channel based on IPD shaping  . . 1217--1228
         Srikanth Hariharan and   
             Ness B. Shroff and   
                 Saurabh Bagchi   Secure neighbor discovery through
                                  overhearing in static multihop wireless
                                  networks . . . . . . . . . . . . . . . . 1229--1241
             Guoqiang Zhang and   
              Guoqing Zhang and   
                     Suqi Cheng   LANC: Locality-aware network coding for
                                  better P2P traffic localization  . . . . 1242--1256
          Alexander Shpiner and   
                 Isaac Keslassy   Modeling the interactions of congestion
                                  control and switch scheduling  . . . . . 1257--1275
     Mohammad Sadegh Talebi and   
             Ahmad Khonsari and   
             Amin Mohtasham and   
                     Ali Abbasi   Cost-aware monitoring of network-wide
                                  aggregates in wireless sensor networks   1276--1290
                Jinchang Lu and   
                       Maode Ma   Cognitive radio-based framework and
                                  self-optimizing temporal-spectrum block
                                  scheduling for QoS provisioning in WiMAX 1291--1309
              Alex Bikfalvi and   
Jaime García-Reinoso and   
          Iván Vidal and   
           Francisco Valera and   
                 Arturo Azcorra   P2P vs. IP multicast: Comparing
                                  approaches to IPTV streaming based on TV
                                  channel popularity . . . . . . . . . . . 1310--1325
           Riyad Alshammari and   
          A. Nur Zincir-Heywood   Can encrypted traffic be identified
                                  without port numbers, IP addresses and
                                  payload inspection?  . . . . . . . . . . 1326--1350
              Takanori Kudo and   
                 Tetsuya Takine   Design of a sliding window scheme for
                                  detecting high packet-rate flows via
                                  random packet sampling . . . . . . . . . 1351--1363
Christian Esteve Rothenberg and   
Carlos Alberto Braz Macapuna and   
Maurício Ferreira Magalhães and   
 Fábio Luciano Verdi and   
            Alexander Wiesmaier   In-packet Bloom filters: Design and
                                  networking applications  . . . . . . . . 1364--1378
                 Chi-ho Lam and   
            Wing Cheong Lau and   
                    Onching Yue   Enhancing distributed traffic monitoring
                                  via traffic digest splitting . . . . . . 1379--1393
             Paola Bermolen and   
               Marco Mellia and   
                Michela Meo and   
                Dario Rossi and   
                 Silvio Valenti   Abacus: Accurate behavioral
                                  classification of P2P-TV traffic . . . . 1394--1411
           Dimitrios Zorbas and   
            Christos Douligeris   Connected coverage in WSNs based on
                                  critical targets . . . . . . . . . . . . 1412--1425
                   Dogu Arifler   Capacity analysis of a diffusion-based
                                  short-range molecular nano-communication
                                  channel  . . . . . . . . . . . . . . . . 1426--1434
                   J. Ramos and   
P. M. Santiago del Río and   
                  J. Aracil and   
  J. E. López de Vergara   On the effect of concurrent applications
                                  in bandwidth measurement speedometers    1435--1453
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 55, Number 7, May 16, 2011

                    P. Rost and   
                 R. Boutaba and   
                 K. Doppler and   
                     A. Gumaste   Recent Advances in Network Convergence   1455--1458
             R. Stankiewicz and   
                   A. Jajszczyk   A survey of QoE assurance in converged
                                  networks . . . . . . . . . . . . . . . . 1459--1473
                 Ivan Vidal and   
        Antonio de la Oliva and   
       Jaime Garcia-Reinoso and   
                   Ignacio Soto   TRIM: an architecture for transparent
                                  IMS-based mobility . . . . . . . . . . . 1474--1486
          Nemanja Vucevi\'c and   
  Jordi Pérez-Romero and   
              Oriol Sallent and   
            Ramon Agustí   Reinforcement learning for joint radio
                                  resource management in LTE--UMTS
                                  scenarios  . . . . . . . . . . . . . . . 1487--1497
                Pedro Neves and   
         João Soares and   
            Susana Sargento and   
                 Hugo Pires and   
               Francisco Fontes   Context-aware media independent
                                  information server for optimized
                                  seamless handover procedures . . . . . . 1498--1519
            Joon-Myung Kang and   
             John Strassner and   
               Sin-seok Seo and   
              James Won-Ki Hong   Autonomic personalized handover
                                  decisions for mobile services in
                                  heterogeneous wireless networks  . . . . 1520--1532
               Natasa Vulic and   
 Sonia M. Heemstra de Groot and   
      Ignas G. M. M. Niemegeers   Vertical handovers among different
                                  wireless technologies in a UMTS radio
                                  access-based integrated architecture . . 1533--1548
           Abbas Jamalipour and   
             Farshad Javadi and   
           Kumudu S. Munasinghe   Resource competition in a converged
                                  heterogeneous networking ecosystem . . . 1549--1559
        Zoltán Faigl and   
 László Bokor and   
         Pedro Miguel Neves and   
              Khadija Daoud and   
              Philippe Herbelin   Evaluation of two integrated signalling
                                  schemes for the Ultra Flat Architecture
                                  using SIP, IEEE 802.21, and HIP/PMIP
                                  protocols  . . . . . . . . . . . . . . . 1560--1575
      Djamal-Eddine Meddour and   
              Tinku Rasheed and   
                  Yvon Gourhant   On the role of infrastructure sharing
                                  for mobile network operators in emerging
                                  markets  . . . . . . . . . . . . . . . . 1576--1591
               B. Ishibashi and   
             N. Bouabdallah and   
                     R. Boutaba   QoS capacity of virtual wireless
                                  networks . . . . . . . . . . . . . . . . 1592--1613
               Damien Leroy and   
              Gregory Detal and   
             Julien Cathalo and   
               Mark Manulis and   
     François Koeune and   
            Olivier Bonaventure   SWISH: Secure WiFi sharing . . . . . . . 1614--1630
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 55, Number 8, June 1, 2011

               D. Benyamina and   
                   A. Hafid and   
                M. Gendreau and   
                 J. C. Maureira   On the design of reliable wireless mesh
                                  network infrastructure with QoS
                                  constraints  . . . . . . . . . . . . . . 1631--1647
                  Ning Weng and   
                 Luke Vespa and   
                Benfano Soewito   Deep packet pre-filtering and finite
                                  state encoding for adaptive intrusion
                                  detection system . . . . . . . . . . . . 1648--1661
            M. Govindarajan and   
           R. M. Chandrasekaran   Intrusion detection using neural based
                                  hybrid classification methods  . . . . . 1662--1671
                 M. Caretti and   
              C. Cicconetti and   
            D. Franceschini and   
                 L. Lenzini and   
              D. Migliorini and   
                E. Mingozzi and   
                   R. Rossi and   
                     D. Sabella   Efficient downlink scheduling with power
                                  boosting in mobile IEEE 802.16 networks  1672--1683
           Michael Rossberg and   
               Guenter Schaefer   A survey on automatic configuration of
                                  virtual private networks . . . . . . . . 1684--1699
                Hee-Tae Roh and   
                   Jang-Won Lee   User-level satisfaction aware end-to-end
                                  rate control in communication networks   1700--1710
                  Jui Teng Wang   Rate adaptation with joint receive
                                  diversity and power control for
                                  cognitive radio networks . . . . . . . . 1711--1718
               Jen-Jee Chen and   
                   Ling Lee and   
                  Yu-Chee Tseng   Integrating SIP and IEEE 802.11e to
                                  support handoff and multi-grade QoS for
                                  VoIP-over-WLAN applications  . . . . . . 1719--1734
               Suat Ozdemir and   
                      Yang Xiao   Integrity protecting hierarchical
                                  concealed data aggregation for wireless
                                  sensor networks  . . . . . . . . . . . . 1735--1746
                    Lei You and   
              Lianghui Ding and   
                    Ping Wu and   
                 Zhiwen Pan and   
                 Honglin Hu and   
                   Mei Song and   
                     Junde Song   Cross-layer optimization of wireless
                                  multihop networks with one-hop two-way
                                  network coding . . . . . . . . . . . . . 1747--1769
           Nelson I. Dopico and   
Álvaro Gutiérrez and   
                  Santiago Zazo   Performance analysis of a delay tolerant
                                  application for herd localization  . . . 1770--1783
                 Anis Jdidi and   
                  Tijani Chahed   Flow-level performance of proportional
                                  fairness with hierarchical modulation in
                                  OFDMA-based networks . . . . . . . . . . 1784--1793
                  M. Dakkak and   
                   A. Nakib and   
                  B. Daachi and   
                  P. Siarry and   
                     J. Lemoine   Indoor localization method based on RTT
                                  and AOA using coordinates clustering . . 1794--1803
           Rafael P. Laufer and   
           Pedro B. Velloso and   
       Otto Carlos M. B. Duarte   A Generalized Bloom Filter to Secure
                                  Distributed Network Applications . . . . 1804--1819
                   A. Detti and   
         N. Blefari-Melazzi and   
                   I. Habib and   
                      A. Ordine   Per-station throughput fairness in a
                                  WLAN hot-spot with TCP traffic . . . . . 1820--1833
           Daniel F. Macedo and   
        Aldri L. dos Santos and   
    José M. Nogueira and   
                    Guy Pujolle   Fuzzy-based load self-configuration in
                                  mobile P2P services  . . . . . . . . . . 1834--1848
                 Ali Fanian and   
           Mehdi Berenjkoub and   
              Hossein Saidi and   
              T. Aaron Gulliver   A high performance and intrinsically
                                  secure key establishment protocol for
                                  wireless sensor networks . . . . . . . . 1849--1863
                 Zhihua Wen and   
             Michael Rabinovich   Dynamic landmark triangles: a simple and
                                  efficient mechanism for inter-host
                                  latency estimation . . . . . . . . . . . 1864--1879
     Konstantin Avrachenkov and   
            Alexander Dudin and   
         Valentina Klimenok and   
              Philippe Nain and   
                  Olga Semenova   Optimal threshold control by the robots
                                  of Web search engines with obsolescence
                                  of documents . . . . . . . . . . . . . . 1880--1893
     Mamoun F. Al-Mistarihi and   
        Mohammad Al-Shurman and   
                 Ahmad Qudaimat   Tree based dynamic address
                                  autoconfiguration in mobile ad hoc
                                  networks . . . . . . . . . . . . . . . . 1894--1908
           Marios Iliofotou and   
              Hyun-chul Kim and   
         Michalis Faloutsos and   
       Michael Mitzenmacher and   
            Prashanth Pappu and   
                George Varghese   Graption: a graph-based P2P traffic
                                  classification framework for the
                                  Internet backbone  . . . . . . . . . . . 1909--1920
                 Michael Scharf   Comparison of end-to-end and
                                  network-supported fast startup
                                  congestion control schemes . . . . . . . 1921--1940
                Guanhua Yan and   
                  Duc T. Ha and   
              Stephan Eidenbenz   AntBot: Anti-pollution peer-to-peer
                                  botnets  . . . . . . . . . . . . . . . . 1941--1956
         Ramesh Viswanathan and   
         Krishan K. Sabnani and   
             Robert J. Holt and   
              Arun N. Netravali   Expected convergence properties of BGP   1957--1981
           M. Aykut Yigitel and   
         Ozlem Durmaz Incel and   
                      Cem Ersoy   QoS-aware MAC protocols for wireless
                                  sensor networks: a survey  . . . . . . . 1982--2004
            Tony K. C. Chan and   
             Yiu-Wing Leung and   
                     Gaoxi Xiao   Upgrading unicast nodes to
                                  multicast-capable nodes in all-optical
                                  networks . . . . . . . . . . . . . . . . 2005--2021
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 55, Number 9, June 23, 2011

               HyunYong Lee and   
              Akihiro Nakao and   
                    JongWon Kim   BiCo: Network operator-friendly P2P
                                  traffic control through bilateral
                                  cooperation with peers . . . . . . . . . 2023--2034
        Eugenio Alessandria and   
              Massimo Gallo and   
            Emilio Leonardi and   
               Marco Mellia and   
                    Michela Meo   Impact of adverse network conditions on
                                  P2P-TV systems: Experimental evidence    2035--2050
Sergio Herrería-Alonso and   
Miguel Rodríguez-Pérez and   
Manuel Fernández-Veiga and   
Cándido López-García   Opportunistic power saving algorithms
                                  for Ethernet devices . . . . . . . . . . 2051--2064
            Frederic Thouin and   
                Mark Coates and   
                 Michael Rabbat   Large scale probabilistic available
                                  bandwidth estimation . . . . . . . . . . 2065--2078
               Hammad Iqbal and   
                    Taieb Znati   On the design of network control and
                                  management plane . . . . . . . . . . . . 2079--2091
                 Sangtae Ha and   
                    Injong Rhee   Taming the elephants: New TCP slow start 2092--2110
José Luis García-Dorado and   
José Alberto Hernández and   
              Javier Aracil and   
Jorge E. López de Vergara and   
             Sergio Lopez-Buedo   Characterization of the busy-hour
                                  traffic of IP networks based on their
                                  intrinsic features . . . . . . . . . . . 2111--2125
                  Chong Tan and   
                  Junni Zou and   
                   Min Wang and   
                  Ruifeng Zhang   Network lifetime optimization for
                                  wireless video sensor networks with
                                  network coding/ARQ hybrid adaptive
                                  error-control scheme . . . . . . . . . . 2126--2137
          Abu (Sayeem) Reaz and   
      Vishwanath Ramamurthi and   
          Massimo Tornatore and   
               Suman Sarkar and   
               Dipak Ghosal and   
            Biswanath Mukherjee   Cost-efficient design for higher
                                  capacity hybrid wireless-optical
                                  broadband access network (WOBAN) . . . . 2138--2149
                 Fangmin Li and   
                 Yilin Fang and   
                     Fei Hu and   
                     Xinhua Liu   Load-aware multicast routing metrics in
                                  multi-radio multi-channel wireless mesh
                                  networks . . . . . . . . . . . . . . . . 2150--2167
              Sung-Guk Yoon and   
               Changhee Joo and   
                  Saewoong Bahk   Energy-efficient opportunistic
                                  scheduling schemes in wireless networks  2168--2175
           Andy An-Kai Jeng and   
              Rong-Hong Jan and   
                  Chi-Yu Li and   
                     Chien Chen   Release-time-based multi-channel MAC
                                  protocol for wireless mesh networks  . . 2176--2195
              Yueping Zhang and   
                  Ao-Jan Su and   
                   Guofei Jiang   Understanding data center network
                                  architectures in virtualized
                                  environments: a view from multi-tier
                                  applications . . . . . . . . . . . . . . 2196--2208
               Wei-Chieh Ke and   
              Bing-Hong Liu and   
                  Ming-Jer Tsai   The critical-square-grid coverage
                                  problem in wireless sensor networks is
                                  NP-Complete  . . . . . . . . . . . . . . 2209--2220
  Seyed Hossein Ahmadinejad and   
               Saeed Jalili and   
                    Mahdi Abadi   A hybrid model for correlating alerts of
                                  known and unknown attack scenarios and
                                  updating attack graphs . . . . . . . . . 2221--2240
      Vishwanath Ramamurthi and   
          Abu (Sayeem) Reaz and   
               Dipak Ghosal and   
               Sudhir Dixit and   
            Biswanath Mukherjee   Channel, capacity, and flow assignment
                                  in wireless mesh networks  . . . . . . . 2241--2258
                   Lin Chen and   
                  Jean Leneutre   Fight jamming with jamming --- a game
                                  theoretic analysis of jamming attack in
                                  wireless networks and defense strategy   2259--2270
          Alexander A. Kist and   
              Abdelnour Aldraho   Dynamic topologies for sustainable and
                                  energy efficient traffic routing . . . . 2271--2288
            Pablo Belzarena and   
          Fernando Paganini and   
         Andrés Ferragut   Optimizing revenue for bandwidth
                                  auctions over networks with time
                                  reservations . . . . . . . . . . . . . . 2289--2302
              Rafael Estepa and   
             Antonio Estepa and   
               Thiago Cupertino   A productivity-oriented methodology for
                                  local area network design in industrial
                                  environments . . . . . . . . . . . . . . 2303--2314
         Beatrice Paillassa and   
             Cholatip Yawut and   
                    Riadh Dhaou   Network awareness and dynamic routing:
                                  The ad hoc network case  . . . . . . . . 2315--2328
                  M. Yuksel and   
         K. K. Ramakrishnan and   
           R. D. Doverspike and   
                R. K. Sinha and   
                      G. Li and   
            K. N. Oikonomou and   
                        D. Wang   Cross-layer failure restoration of IP
                                  multicast with applications to IPTV  . . 2329--2351
                Mathias Boc and   
          Anne Fladenmuller and   
     Marcelo Dias de Amorim and   
            Laura Galluccio and   
                 Sergio Palazzo   Price: Hybrid geographic and co-based
                                  forwarding in delay-tolerant networks    2352--2360
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 55, Number 10, July 14, 2011

                 Glenn Carl and   
                 George Kesidis   Modeling a policy-capable path-vector
                                  routing protocol using Jacobi iteration
                                  over a path algebra  . . . . . . . . . . 2361--2379
          Rémi Diana and   
                Emmanuel Lochin   ECN verbose mode: a statistical method
                                  for network path congestion estimation   2380--2391
                  Z. Dwekat and   
                  G. N. Rouskas   A practical fair queuing scheduler:
                                  Simplification through quantization  . . 2392--2406
                   I-Ta Lee and   
           Guann-Long Chiou and   
                  Shun-Ren Yang   A cooperative multicast routing protocol
                                  for mobile ad hoc networks . . . . . . . 2407--2424
                 Kaikai Chi and   
             Xiaohong Jiang and   
                  Baoliu Ye and   
                      Yanjun Li   Flow-oriented network coding
                                  architecture for multihop wireless
                                  networks . . . . . . . . . . . . . . . . 2425--2442
                    Ming Li and   
                   Kai Zeng and   
                    Wenjing Lou   Opportunistic broadcast of event-driven
                                  warning messages in Vehicular Ad Hoc
                                  Networks with lossy links  . . . . . . . 2443--2464
                Haidar Safa and   
               Farah Abu Shahla   A Policy-Based Trust-Aware Adaptive
                                  Monitoring Scheme to enhance WiMax QoS   2465--2480
                Jiming Chen and   
              Chengqun Wang and   
                Youxian Sun and   
          Xuemin (Sherman) Shen   Semi-supervised Laplacian regularized
                                  least squares algorithm for localization
                                  in wireless sensor networks  . . . . . . 2481--2491
               Wenping Deng and   
    Merkouris Karaliopoulos and   
    Wolfgang Mühlbauer and   
                Peidong Zhu and   
                 Xicheng Lu and   
              Bernhard Plattner   $k$-Fault tolerance of the Internet AS
                                  graph  . . . . . . . . . . . . . . . . . 2492--2503
         Alessandro Amoroso and   
             Gustavo Marfia and   
                 Marco Roccetti   Going realistic and optimal: a
                                  distributed multi-hop broadcast
                                  algorithm for vehicular safety . . . . . 2504--2519
               Sunggeun Jin and   
               Munhwan Choi and   
                   Lei Wang and   
                  Sunghyun Choi   Fast scanning schemes for IEEE 802.11
                                  WLANs in virtual AP environments . . . . 2520--2533
               Rongfei Zeng and   
                Yixin Jiang and   
                 Chuang Lin and   
                 Yanfei Fan and   
          Xuemin (Sherman) Shen   A scalable and robust key
                                  pre-distribution scheme with network
                                  coding for sensor data storage . . . . . 2534--2544
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 55, Number 11, August 4, 2011

                 Geyong Min and   
                     Jia Hu and   
               Mike E. Woodward   Modeling and analysis of TXOP
                                  differentiation in infrastructure-based
                                  WLANs  . . . . . . . . . . . . . . . . . 2545--2557
             Tony O'Donovan and   
                 Utz Roedig and   
            Jonathan Benson and   
              Cormac J. Sreenan   Self-adaptive framelet-based
                                  communication for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 2558--2575
                   Feng Shu and   
                   Taka Sakurai   A new analytical model for the IEEE
                                  802.15.4 CSMA--CA protocol . . . . . . . 2576--2591
             Shie-Yuan Wang and   
               Chih-Che Lin and   
              Wei-Jyun Hong and   
                  Kuang-Che Liu   On the performances of forwarding
                                  multihop unicast traffic in WBSS-based
                                  802.11(p)/1609 networks  . . . . . . . . 2592--2607
                   Fei Xing and   
                     Wenye Wang   Toward robust multi-hop data forwarding
                                  in large scale wireless networks . . . . 2608--2621
                        Jing Wu   A survey of WDM network reconfiguration:
                                  Strategies and triggering methods  . . . 2622--2645
                R. Murawski and   
                       E. Ekici   Utilizing dynamic spectrum leasing for
                                  cognitive radios in 802.11-based
                                  wireless networks  . . . . . . . . . . . 2646--2657
     Andrés Ferragut and   
              Fernando Paganini   Resource allocation over multirate
                                  wireless networks: a Network Utility
                                  Maximization perspective . . . . . . . . 2658--2674
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 55, Number 12, August 25, 2011

                 Weiyi Zhao and   
                      Jiang Xie   OPNET-based modeling and simulation
                                  study on handoffs in Internet-based
                                  infrastructure wireless mesh networks    2675--2688
              Salekul Islam and   
   Jean-Charles Grégoire   Multi-domain authentication for IMS
                                  services . . . . . . . . . . . . . . . . 2689--2704
            Marc St-Hilaire and   
                   Shangyun Liu   Comparison of different meta-heuristics
                                  to solve the global planning problem of
                                  UMTS networks  . . . . . . . . . . . . . 2705--2716
                   Jian Qiu and   
                   Yong Liu and   
             Gurusamy Mohan and   
                Kee Chaing Chua   Fast spanning tree reconnection
                                  mechanism for resilient Metro Ethernet
                                  networks . . . . . . . . . . . . . . . . 2717--2729
               Jeff Seibert and   
                    Xin Sun and   
       Cristina Nita-Rotaru and   
                     Sanjay Rao   A design for securing data delivery in
                                  mesh-based peer-to-peer streaming  . . . 2730--2745
               Hyung Rai Oh and   
           Dapeng Oliver Wu and   
                  Hwangjun Song   An effective mesh-pull-based P2P video
                                  streaming system using Fountain codes
                                  with variable symbol sizes . . . . . . . 2746--2759
                Xiaochao Zi and   
                 Lihong Yao and   
              Xinghao Jiang and   
                     Li Pan and   
                     Jianhua Li   Evaluating the transmission rate of
                                  covert timing channels in a network  . . 2760--2771
           Juliana de Santi and   
        Nelson L. S. da Fonseca   Design of optimal Active Queue
                                  Management controllers for HSTCP in
                                  large bandwidth-delay product networks   2772--2790
        Matías Toril and   
               Volker Wille and   
     S. Luna-Ramírez and   
                    K. Jarvinen   Network performance model for location
                                  area re-planning in GERAN  . . . . . . . 2791--2802
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 55, Number 13, September 15, 2011

         Wagner Moro Aioffi and   
      Cristiano Arbex Valle and   
          Geraldo R. Mateus and   
      Alexandre Salles da Cunha   Balancing message delivery latency and
                                  network lifetime through an integrated
                                  model for clustering and routing in
                                  Wireless Sensor Networks . . . . . . . . 2803--2820
                  Ying Chen and   
             Arunita Jaekel and   
                     Ataul Bari   A new model for allocating resources to
                                  scheduled lightpath demands  . . . . . . 2821--2837
           Daniel Camps-Mur and   
  Xavier Pérez-Costa and   
       Sebasti\`a Sallent-Ribes   Designing energy efficient access points
                                  with Wi-Fi Direct  . . . . . . . . . . . 2838--2855
         Prasan Kumar Sahoo and   
                 Jang-Ping Sheu   Limited mobility coverage and
                                  connectivity maintenance protocols for
                                  wireless sensor networks . . . . . . . . 2856--2872
         Giovanni Ciccarese and   
             Mario De Blasi and   
            Pierluigi Marra and   
             Cosimo Palazzo and   
                  Luigi Patrono   An algorithm for controlling packet size
                                  in IEEE 802.16e networks . . . . . . . . 2873--2885
       Amir Darehshoorzadeh and   
Llorenç Cerd\`a-Alabern and   
                     Vicent Pla   Modeling and comparison of candidate
                                  selection algorithms in opportunistic
                                  routing  . . . . . . . . . . . . . . . . 2886--2898
           Martin Jacobsson and   
                  Cheng Guo and   
               Ignas Niemegeers   An experimental investigation of
                                  optimized flooding protocols using a
                                  wireless sensor network testbed  . . . . 2899--2913
                 B. Nechaev and   
                  D. Korzun and   
                      A. Gurtov   CR-Chord: Improving lookup availability
                                  in the presence of malicious DHT nodes   2914--2928
                  Shaohe Lv and   
              Weihua Zhuang and   
              Xiaodong Wang and   
                  Xingming Zhou   Link scheduling in wireless networks
                                  with successive interference
                                  cancellation . . . . . . . . . . . . . . 2929--2941
    Ömer Korçak and   
              Fatih Alagöz   Efficient integration of HAPs and mobile
                                  satellites via free-space optical links  2942--2953
   Juliano Araujo Wickboldt and   
Luís Armando Bianchin and   
     Roben Castagna Lunardi and   
Lisandro Zambenedetti Granville and   
   Luciano Paschoal Gaspary and   
              Claudio Bartolini   A framework for risk assessment based on
                                  analysis of historical information of
                                  workflow execution in IT systems . . . . 2954--2975
                     Fei Ge and   
                 Sammy Chan and   
       Lachlan L. H. Andrew and   
                     Fan Li and   
              Liansheng Tan and   
                 Moshe Zukerman   Performance effects of two-way FAST TCP  2976--2984
Mónica Aguilar Igartua and   
  Luis J. de la Cruz Llopis and   
Víctor Carrascal Frías and   
     Emilio Sanvicente Gargallo   A game-theoretic multipath routing for
                                  video-streaming services over Mobile Ad
                                  Hoc Networks . . . . . . . . . . . . . . 2985--3000
           Anirban Banerjee and   
         Md Sazzadur Rahman and   
             Michalis Faloutsos   SUT: Quantifying and mitigating URL
                                  typosquatting  . . . . . . . . . . . . . 3001--3014
                R. Gotzhein and   
                        T. Kuhn   Black Burst Synchronization (BBS) --- a
                                  protocol for deterministic tick and time
                                  synchronization in wireless networks . . 3015--3031
         Azzedine Boukerche and   
            Begumhan Turgut and   
                Nevin Aydin and   
          Mohammad Z. Ahmad and   
  Ladislau Bölöni and   
                   Damla Turgut   Routing protocols in ad hoc networks: a
                                  survey . . . . . . . . . . . . . . . . . 3032--3080
             Ozlem Durmaz Incel   A survey on multi-channel communication
                                  in wireless sensor networks  . . . . . . 3081--3099
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 55, Number 14, October 6, 2011

            R. G. Herrtwich and   
                     I. Radusch   Editorial for the Special Issue:
                                  Deploying vehicle-2-x communication  . . 3101--3102
           Christian Weiß   V2X communication in Europe --- From
                                  research projects towards
                                  standardization and field testing of
                                  vehicle communication technology . . . . 3103--3119
           James A. Misener and   
               Subir Biswas and   
                    Greg Larson   Development of V-to-X systems in North
                                  America: The promise, the pitfalls and
                                  the prognosis  . . . . . . . . . . . . . 3120--3133
                Masao Fukushima   The latest trend of V2X driver
                                  assistance systems in Japan  . . . . . . 3134--3141
            J. Vales-Alonso and   
        F. Vicente-Carrasco and   
                  J. J. Alcaraz   Optimal configuration of roadside
                                  beacons in V2I communications  . . . . . 3142--3153
       Sebastian Röglinger   A methodology for testing intersection
                                  related Vehicle-2-X applications . . . . 3154--3168
            Benno Schweiger and   
      Christian Raubitschek and   
         Bernard Bäker and   
              Johann Schlichter   Elisa\TM --- Car to infrastructure
                                  communication in the field . . . . . . . 3169--3178
             Razvan Stanica and   
            Emmanuel Chaput and   
        André-Luc Beylot   Simulation of vehicular ad-hoc networks:
                                  Challenges, review of tools and
                                  recommendations  . . . . . . . . . . . . 3179--3188
     Björn Schünemann   V2X simulation runtime infrastructure
                                  VSimRTI: an assessment tool to design
                                  smart traffic management systems . . . . 3189--3198
           Carmela Troncoso and   
   Enrique Costa-Montenegro and   
               Claudia Diaz and   
               Stefan Schiffner   On the difficulty of achieving anonymity
                                  for Vehicle-2-X communication  . . . . . 3199--3210
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 55, Number 15, October 27, 2011

     Rolando Trujillo-Rasua and   
                 Agusti Solanas   Efficient probabilistic communication
                                  protocol for the private identification
                                  of RFID tags by means of collaborative
                                  readers  . . . . . . . . . . . . . . . . 3211--3223
                 Zheng Ruan and   
           Edith C.-H. Ngai and   
                 Jiangchuan Liu   Wireless sensor deployment for
                                  collaborative sensing with mobile phones 3224--3245
                  Lei Zhang and   
                Qianhong Wu and   
                     Bo Qin and   
       Josep Domingo-Ferrer and   
Úrsula González-Nicolás   Asymmetric group key agreement protocol
                                  for open networks and its application to
                                  broadcast encryption . . . . . . . . . . 3246--3255
           Javad Vazifehdan and   
       R. Venkatesha Prasad and   
                 Ertan Onur and   
               Ignas Niemegeers   Energy-aware routing algorithms for
                                  wireless ad hoc networks with
                                  heterogeneous power supplies . . . . . . 3256--3274
               Kuochen Wang and   
            Chun-Ying Huang and   
              Shang-Jyh Lin and   
                   Ying-Dar Lin   A fuzzy pattern-based filtering
                                  algorithm for botnet detection . . . . . 3275--3286
                  Yuyan Xue and   
           Byrav Ramamurthy and   
                Mehmet C. Vuran   SDRCS: a service-differentiated
                                  real-time communication scheme for event
                                  sensing in wireless sensor networks  . . 3287--3302
            Flavio Esposito and   
              Ibrahim Matta and   
             Debajyoti Bera and   
               Pietro Michiardi   On the impact of seed scheduling in
                                  peer-to-peer networks  . . . . . . . . . 3303--3317
                     Dan Li and   
                Jianping Wu and   
                   Yong Cui and   
             Jiangchuan Liu and   
                          Ke Xu   Impact of user selfishness in
                                  construction action on the streaming
                                  quality of overlay multicast . . . . . . 3318--3331
               M. Alkubeily and   
                H. Bettahar and   
                 A. Bouabdallah   A new Application-Level Multicast
                                  technique for stable, robust and
                                  efficient overlay tree construction  . . 3332--3350
                    C. Cano and   
                B. Bellalta and   
            A. Sfairopoulou and   
                      M. Oliver   Low energy operation in WSNs: a survey
                                  of preamble sampling MAC protocols . . . 3351--3363
                Ziqian Dong and   
     Santhanakrishnan Anand and   
       Rajarathnam Chandramouli   Estimation of missing RTTs in computer
                                  networks: Matrix completion vs
                                  compressed sensing . . . . . . . . . . . 3364--3375
                   Liu Yang and   
              Rezwana Karim and   
            Vinod Ganapathy and   
                    Randy Smith   Fast, memory-efficient regular
                                  expression matching with NFA-OBDDs . . . 3376--3393
         Xavier León and   
             Tuan Anh Trinh and   
                Leandro Navarro   Modeling resource usage in
                                  planetary-scale shared infrastructures:
                                  PlanetLab's case study . . . . . . . . . 3394--3407
            Elmurod Talipov and   
                     Hojung Cha   Communication capacity-based message
                                  exchange mechanism for delay-tolerant
                                  networks . . . . . . . . . . . . . . . . 3408--3422
 Sasitharan Balasubramaniam and   
             Dmitri Botvich and   
            Raymond Carroll and   
            Julien Mineraud and   
             Tadashi Nakano and   
               Tatsuya Suda and   
               William Donnelly   Biologically inspired future service
                                  environment  . . . . . . . . . . . . . . 3423--3440
                  Sevil Sen and   
                  John A. Clark   Evolutionary computation techniques for
                                  intrusion detection in mobile ad hoc
                                  networks . . . . . . . . . . . . . . . . 3441--3457
                 Damien Fay and   
              Hamed Haddadi and   
                Steve Uhlig and   
             Liam Kilmartin and   
            Andrew W. Moore and   
Jérôme Kunegis and   
               Marios Iliofotou   Discriminating graphs through spectral
                                  projections  . . . . . . . . . . . . . . 3458--3468
            Hyoungshick Kim and   
                  Jaehoon Jeong   RAD: Recipient-anonymous data delivery
                                  based on public routing proxies  . . . . 3469--3484
        Bernhard Tellenbach and   
            Martin Burkhart and   
         Dominik Schatzmann and   
            David Gugelmann and   
                Didier Sornette   Accurate network anomaly classification
                                  with generalized entropy metrics . . . . 3485--3502
        Dessislava Nikolova and   
                  Chris Blondia   Bonded deficit round robin scheduling
                                  for multi-channel networks . . . . . . . 3503--3516
        Gianluca Ciccarelli and   
                Renato Lo Cigno   Collusion in peer-to-peer systems  . . . 3517--3532
               Dingde Jiang and   
              Zhengzheng Xu and   
               Zhenhua Chen and   
                   Yang Han and   
                     Hongwei Xu   Joint time-frequency sparse estimation
                                  of large-scale network traffic . . . . . 3533--3547
                 Cheng Wang and   
             Changjun Jiang and   
              Xiang-Yang Li and   
                     Yunhao Liu   On multicast throughput scaling of
                                  hybrid wireless networks with general
                                  node density . . . . . . . . . . . . . . 3548--3561
               Hidayet Aksu and   
                Demet Aksoy and   
              Ibrahim Korpeoglu   A study of localization metrics:
                                  Evaluation of position errors in
                                  wireless sensor networks . . . . . . . . 3562--3577
         Daniele Migliorini and   
              Enzo Mingozzi and   
                  Carlo Vallati   Performance evaluation of H.264/SVC
                                  video streaming over mobile WiMAX  . . . 3578--3591
               Che-Jung Hsu and   
               Huey-Ing Liu and   
             Winston K. G. Seah   Opportunistic routing --- a review and
                                  the challenges ahead . . . . . . . . . . 3592--3603
                 Wenye Wang and   
                      Yi Xu and   
                   Mohit Khanna   A survey on the communication
                                  architectures in smart grid  . . . . . . 3604--3629
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 55, Number 16, November 10, 2011

                     Tuna Tugcu   Guest Editorial  . . . . . . . . . . . . 3631--3633
               O. Font-Bach and   
              N. Bartzoudis and   
          A. Pascual-Iserte and   
          D. López Bueno   A real-time MIMO-OFDM mobile WiMAX
                                  receiver: Architecture, design and FPGA
                                  implementation . . . . . . . . . . . . . 3634--3647
                 HanGyu Cho and   
               Taeyoung Kim and   
               Yu-Tao Hsieh and   
                   Jong-Kae Fwu   Physical layer structure of next
                                  generation mobile WiMAX technology . . . 3648--3658
               Rafael Kunst and   
      Cristiano Bonato Both and   
Lisandro Zambenedetti Granville and   
                 Juergen Rochol   On the impact of hybrid errors on mobile
                                  WiMAX networks . . . . . . . . . . . . . 3659--3671
     Balakrishnan Kaarthick and   
               N. Nagarajan and   
               E. Raguvaran and   
                   G. Saimethun   Subchannel allocation and mapping
                                  algorithms for improving the QoS of VoIP
                                  traffic in IEEE 802.16e networks . . . . 3672--3679
              C. Cicconetti and   
                 L. Lenzini and   
                    A. Lodi and   
                S. Martello and   
                E. Mingozzi and   
                      M. Monaci   A fast and efficient algorithm to
                                  exploit multi-user diversity in IEEE
                                  802.16 BandAMC . . . . . . . . . . . . . 3680--3693
                G. Vejarano and   
                    D. Wang and   
                      J. McNair   Stability region adaptation using
                                  transmission power control for transport
                                  capacity optimization in IEEE 802.16
                                  wireless mesh networks . . . . . . . . . 3694--3704
             Jia-Ming Liang and   
             You-Chiun Wang and   
               Jen-Jee Chen and   
             Jui-Hsiang Liu and   
                  Yu-Chee Tseng   Energy-efficient uplink resource
                                  allocation for IEEE 802.16j
                                  transparent-relay networks . . . . . . . 3705--3720
               Jen-Jee Chen and   
                Shih-Lin Wu and   
             Shiou-Wen Wang and   
                  Yu-Chee Tseng   Per-flow sleep scheduling for power
                                  management in IEEE 802.16 wireless
                                  networks . . . . . . . . . . . . . . . . 3721--3733
                 Shunfu Jin and   
                       Wuyi Yue   Performance analysis for power saving
                                  class type III of IEEE 802.16 in WiMAX   3734--3743
           Ronny Yongho Kim and   
         Ritesh Kumar Kalle and   
                  Debabrata Das   Joint paging area and location update
                                  optimization for IEEE 802.16m idle mode  3744--3758
              Zdenek Becvar and   
                 Pavel Mach and   
                    Boris Simak   Improvement of handover prediction in
                                  mobile WiMAX by using two thresholds . . 3759--3773
               Sunggeun Jin and   
                    Xi Chen and   
                  Daji Qiao and   
                  Sunghyun Choi   Adaptive sleep mode management in IEEE
                                  802.16m wireless metropolitan area
                                  networks . . . . . . . . . . . . . . . . 3774--3783
T. M. Fernández-Caramés and   
M. González-López and   
                     L. Castedo   Mobile WiMAX for vehicular applications:
                                  Performance evaluation and comparison
                                  against IEEE 802.11p/a . . . . . . . . . 3784--3795
           Ming-Chin Chuang and   
                  Jeng-Farn Lee   A lightweight mutual authentication
                                  mechanism for network mobility in IEEE
                                  802.16e wireless networks  . . . . . . . 3796--3809
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 55, Number 17, December 1, 2011

                Yufeng Wang and   
              Akihiro Nakao and   
    Athanasios V. Vasilakos and   
                     Jianhua Ma   On the effectiveness of service
                                  differentiation based resource-provision
                                  incentive mechanisms in dynamic and
                                  autonomous P2P networks  . . . . . . . . 3811--3831
             Jocelyne Elias and   
            Fabio Martignon and   
             Antonio Capone and   
                   Eitan Altman   Non-cooperative spectrum access in
                                  cognitive radio networks: a game
                                  theoretical model  . . . . . . . . . . . 3832--3846
                Sok-Ian Sou and   
                Chuan-Sheng Lin   SPR proxy mechanism for 3GPP Policy and
                                  Charging Control System  . . . . . . . . 3847--3862
   Sebasti\`a Galmés and   
                Ramon Puigjaner   Randomized Data-Gathering protocol for
                                  time-driven sensor networks  . . . . . . 3863--3885
              Chien-Chi Kao and   
              Shun-Ren Yang and   
                  Tung-Lin Tsai   Performance enhancement of repacking and
                                  borrowing mechanisms for IEEE 802.16j
                                  multihop resource scheduling . . . . . . 3886--3903
               Aldar C.-F. Chan   Efficient defence against misbehaving
                                  TCP receiver DoS attacks . . . . . . . . 3904--3914
               Seongjin Lee and   
               Jongwoo Song and   
                 Soohan Ahn and   
                     Youjip Won   Session-based classification of Internet
                                  applications in 3G wireless networks . . 3915--3931
                  InKwan Yu and   
                 Richard Newman   TCP slow start with fair share of
                                  bandwidth  . . . . . . . . . . . . . . . 3932--3946
           Christopher Page and   
              Emad Guirguis and   
                  Mina Guirguis   Performance evaluation of path splicing
                                  on the GÉANT and the Sprint networks  . . 3947--3958
       Jorge Londoño and   
             Azer Bestavros and   
             Nikolaos Laoutaris   Trade & Cap: a customer-managed,
                                  market-based system for trading
                                  bandwidth allowances at a shared link    3959--3974
       Georgios Theodoridis and   
          Fotini-Niovi Pavlidou   A combined resource management and
                                  admission control scheme for optimizing
                                  uplink performance of M-WiMAX systems    3975--3986
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 56, Number 1, January 12, 2012

            Ian F. Akyildiz and   
                    Harry Rudin   Editorial  . . . . . . . . . . . . . . . 1--2
             Hyenyoung Yoon and   
              Junseok Hwang and   
             Martin B. H. Weiss   An analytic research on
                                  secondary-spectrum trading mechanisms
                                  based on technical and market changes    3--19
              Hyunsang Choi and   
                      Heejo Lee   Identifying botnets by capturing group
                                  activities in DNS traffic  . . . . . . . 20--33
        P. D. Hossein Zadeh and   
                C. Schlegel and   
                M. H. MacGregor   Distributed optimal dynamic base station
                                  positioning in wireless sensor networks  34--49
Alptekin Küpçü and   
               Anna Lysyanskaya   Usable optimistic fair exchange  . . . . 50--63
                    Yun Mao and   
              Boon Thau Loo and   
               Zachary Ives and   
              Jonathan M. Smith   MOSAIC: Declarative platform for dynamic
                                  overlay composition  . . . . . . . . . . 64--84
                Ziqian Dong and   
         Rohan D. W. Perera and   
   Rajarathnam Chandramouli and   
             K. P. Subbalakshmi   Network measurement based modeling and
                                  optimization for IP geolocation  . . . . 85--98
               Salah A. Aly and   
             Ahmed E. Kamal and   
            Osameh M. Al-Kofahi   Network protection codes: Providing
                                  self-healing in autonomic networks using
                                  network coding . . . . . . . . . . . . . 99--111
   M. C. Lucas-Estañ and   
                J. Gozalvez and   
             J. Sanchez-Soriano   Integer linear programming optimization
                                  of joint RRM policies for heterogeneous
                                  wireless systems . . . . . . . . . . . . 112--126
                   Amr Rizk and   
                  Markus Fidler   Non-asymptotic end-to-end performance
                                  bounds for networks with long range
                                  dependent fBm cross traffic  . . . . . . 127--141
Sérgio Crisóstomo and   
              Udo Schilcher and   
      Christian Bettstetter and   
             João Barros   Probabilistic flooding in stochastic
                                  networks: Analysis of global information
                                  outreach . . . . . . . . . . . . . . . . 142--156
       Sara Modarres Razavi and   
                    Di Yuan and   
         Fredrik Gunnarsson and   
                      Johan Moe   Performance and cost trade-off in
                                  Tracking Area reconfiguration: a
                                  Pareto-optimization approach . . . . . . 157--168
                   Thomas Gamer   Collaborative anomaly-based detection of
                                  large-scale Internet attacks . . . . . . 169--185
           Nicola Cordeschi and   
            Valentina Polli and   
                Enzo Baccarelli   Traffic Engineering for wireless
                                  connectionless access networks
                                  supporting QoS-demanding media
                                  applications . . . . . . . . . . . . . . 186--197
             Yuh-Jzer Joung and   
          Terry Hui-Ye Chiu and   
                   Shy-Min Chen   Cooperating with free riders in
                                  unstructured P2P networks  . . . . . . . 198--212
             Yuh-Jzer Joung and   
          Shih-Hsiang Huang and   
                   Shi-Hang Lin   Making data-centric storage adaptive and
                                  cost-optimal . . . . . . . . . . . . . . 213--230
               Hyuntae Park and   
              Hyejeong Hong and   
                    Sungho Kang   An efficient IP address lookup algorithm
                                  based on a small balanced tree using
                                  entry reduction  . . . . . . . . . . . . 231--243
           Maysam Mirahmadi and   
                 Abdallah Shami   Traffic-prediction-assisted dynamic
                                  bandwidth assignment for hybrid optical
                                  wireless networks  . . . . . . . . . . . 244--259
                Chun-Nan Lu and   
            Chun-Ying Huang and   
               Ying-Dar Lin and   
                 Yuan-Cheng Lai   Session level flow classification by
                                  packet size distribution and session
                                  grouping . . . . . . . . . . . . . . . . 260--272
                M. Moessner and   
                    Gul N. Khan   Secure authentication scheme for passive
                                  C1G2 RFID tags . . . . . . . . . . . . . 273--286
            Enzo Baccarelli and   
           Nicola Cordeschi and   
              Tatiana Patriarca   QoS Stochastic Traffic Engineering for
                                  the wireless support of real-time
                                  streaming applications . . . . . . . . . 287--302
                   M. Toril and   
  P. Guerrero-García and   
     S. Luna-Ramírez and   
                       V. Wille   An efficient integer programming
                                  formulation for the assignment of base
                                  stations to controllers in cellular
                                  networks . . . . . . . . . . . . . . . . 303--314
                    Ji-Hoon Yun   Cross-layer analysis of the random
                                  access mechanism in Universal
                                  Terrestrial Radio Access . . . . . . . . 315--328
                  Dagang Li and   
           Emmanuel Van Lil and   
         Antoine Van de Capelle   Improving Slow-start based probing
                                  mechanisms for flow adaptation after
                                  handovers  . . . . . . . . . . . . . . . 329--344
         Mustafa O. Kilavuz and   
                   Murat Yuksel   Path approximation for multi-hop
                                  wireless routing under application-based
                                  accuracy constraints . . . . . . . . . . 345--364
                Yiping Chen and   
            Erwan Le Merrer and   
                     Zhe Li and   
                 Yaning Liu and   
                  Gwendal Simon   OAZE: a network-friendly distributed
                                  zapping system for peer-to-peer IPTV . . 365--377
          Agapios Avramidis and   
   Panayiotis Kotzanikolaou and   
        Christos Douligeris and   
                 Mike Burmester   Chord-PKI: a distributed trust
                                  infrastructure based on P2P networks . . 378--398
                  Huali Bai and   
                      Ming Chen   CCIPCA-OPCSC: an online method for
                                  detecting shared congestion paths  . . . 399--411
               Juanjo Alins and   
            Jorge Mata-Diaz and   
       Jose L. Muñoz and   
Elizabeth Rendón-Morales and   
                  Oscar Esparza   XPLIT: a cross-layer architecture for
                                  TCP services over DVB-S2/ETSI QoS BSM    412--434
               Guosong Tian and   
                    Yu-Chu Tian   Modelling and performance evaluation of
                                  the IEEE 802.11 DCF for real-time
                                  control  . . . . . . . . . . . . . . . . 435--447
                Mengjun Xie and   
                  Zhenyu Wu and   
                   Haining Wang   Secure instant messaging in
                                  enterprise-like networks . . . . . . . . 448--461
               C. Callegari and   
                S. Giordano and   
                  M. Pagano and   
                        T. Pepe   Behavior analysis of TCP Linux variants  462--476
                  Weili Han and   
                      Chang Lei   A survey on policy languages in network
                                  and security management  . . . . . . . . 477--489
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 56, Number 2, February 2, 2012

            Shafiullah Khan and   
          Nabil Ali Alrajeh and   
                  Kok-Keong Loo   Secure route selection in wireless mesh
                                  networks . . . . . . . . . . . . . . . . 491--503
       Evangelos Papapetrou and   
          Panos Vassiliadis and   
              Efthymia Rova and   
               Apostolos Zarras   Cross-layer routing for peer database
                                  querying over mobile ad hoc networks . . 504--520
               Dario Bruneo and   
        Salvatore Distefano and   
            Francesco Longo and   
          Antonio Puliafito and   
                   Marco Scarpa   Evaluating wireless sensor node
                                  longevity through Markovian techniques   521--532
         Zeki Yetgìn and   
     Turgay Çelìk   Efficient progressive downloading over
                                  multimedia broadcast multicast service   533--547
            Hung-Cheng Shih and   
                   Kuochen Wang   An adaptive hybrid dynamic power
                                  management algorithm for mobile devices  548--565
         Helena Rif\`a-Pous and   
               Carles Garrigues   Authenticating hard decision sensing
                                  reports in cognitive radio networks  . . 566--576
           Gustavo Carneiro and   
              Pedro Fortuna and   
                 Jaime Dias and   
                 Manuel Ricardo   Transparent and scalable terminal
                                  mobility for vehicular networks  . . . . 577--597
Gabriel Maciá-Fernández and   
                  Yong Wang and   
Rafael A. Rodri'guez-Gómez and   
          Aleksandar Kuzmanovic   Extracting user Web browsing patterns
                                  from non-content network traces: The
                                  online advertising case study  . . . . . 598--614
                 Sinan Isik and   
        Mehmet Yunus Donmez and   
                      Cem Ersoy   Multi-sink load balanced forwarding with
                                  a multi-criteria fuzzy sink selection
                                  for video sensor networks  . . . . . . . 615--627
          Fernando Silveira and   
       Edmundo de Souza e Silva   Predicting packet loss statistics with
                                  hidden Markov models for FEC control . . 628--641
      Ricardo Lopes Pereira and   
        Teresa Vazão and   
              Rodrigo Rodrigues   Adaptive Search Radius --- Using hop
                                  count to reduce P2P traffic  . . . . . . 642--660
             Shie-Yuan Wang and   
               Chih-Che Lin and   
                   Yu-Chi Chang   A rule-based inter-session network
                                  coding scheme over IEEE 802.16(d) mesh
                                  CDS-mode networks  . . . . . . . . . . . 661--685
                Felipe Mata and   
José Luis García-Dorado and   
                  Javier Aracil   Detection of traffic changes in
                                  large-scale backbone networks: The case
                                  of the Spanish academic network  . . . . 686--702
   Miguel Elias M. Campista and   
Luís Henrique M. K. Costa and   
       Otto Carlos M. B. Duarte   A routing protocol suitable for backhaul
                                  access in wireless mesh networks . . . . 703--718
                Yong Oh Lee and   
          A. L. Narasimha Reddy   Constructing disjoint paths for failure
                                  recovery and multipath routing . . . . . 719--730
                 Xinyu Yang and   
               Xiaojing Fan and   
                     Wei Yu and   
                  Xinwen Fu and   
                    Shusen Yang   HLLS: a History information based Light
                                  Location Service for MANETs  . . . . . . 731--744
                   Jie Feng and   
                      Lisong Xu   Stochastic TCP friendliness: Expanding
                                  the design space of TCP-friendly traffic
                                  control protocols  . . . . . . . . . . . 745--761
          Suhaib A. Obeidat and   
          Abraham N. Aldaco and   
             Violet R. Syrotiuk   Cross-layer opportunistic adaptation for
                                  voice over ad hoc networks . . . . . . . 762--779
               Casey Deccio and   
               Jeff Sedayao and   
               Krishna Kant and   
              Prasant Mohapatra   Quantifying DNS namespace influence  . . 780--794
             Emir Halepovic and   
           Carey Williamson and   
                  Majid Ghaderi   Enhancing redundant network traffic
                                  elimination  . . . . . . . . . . . . . . 795--809
                  D. Marcus and   
                     Y. Shavitt   RAGE --- a rapid graphlet enumerator for
                                  large networks . . . . . . . . . . . . . 810--819
              Bo-Chao Cheng and   
               Guo-Tan Liao and   
              Ryh-Yuh Tseng and   
                   Ping-Hai Hsu   Network lifetime bounds for hierarchical
                                  wireless sensor networks in the presence
                                  of energy constraints  . . . . . . . . . 820--831
              Burak Bayoglu and   
             Ibrahim Sogukpinar   Graph based signature classes for
                                  detecting polymorphic worms via content
                                  analysis . . . . . . . . . . . . . . . . 832--844
                 Mingwei Xu and   
                  Yuan Yang and   
                          Qi Li   Selecting shorter alternate paths for
                                  tunnel-based IP Fast ReRoute in linear
                                  time . . . . . . . . . . . . . . . . . . 845--857
              Benoit Donnet and   
                Bamba Gueye and   
             Mohamed Ali Kaafar   Path similarity evaluation using Bloom
                                  filters  . . . . . . . . . . . . . . . . 858--869
              Artur Ziviani and   
          Thiago B. Cardozo and   
   Antônio Tadeu A. Gomes   Rapid prototyping of active measurement
                                  tools  . . . . . . . . . . . . . . . . . 870--883
            Kamran Jamshaid and   
            Paul A. S. Ward and   
                 Martin Karsten   Mechanisms for centralized flow rate
                                  control in 802.11-based wireless mesh
                                  networks . . . . . . . . . . . . . . . . 884--901
          Sajjad Zarifzadeh and   
             Nasser Yazdani and   
                   Amir Nayyeri   Energy-efficient topology control in
                                  wireless ad hoc networks with selfish
                                  nodes  . . . . . . . . . . . . . . . . . 902--914
                    C. Cano and   
                B. Bellalta and   
                      M. Oliver   Wake up after transmissions and reduced
                                  channel contention to alleviate the
                                  hidden terminal problem in preamble
                                  sampling WSNs  . . . . . . . . . . . . . 915--926
           Jean-Marc Robert and   
                 Hadi Otrok and   
        Ahmad Nahar Quttoum and   
                 Rihab Boukhris   A distributed resource management model
                                  for Virtual Private Networks:
                                  Tit-for-Tat strategies . . . . . . . . . 927--939
             Eiman Alotaibi and   
            Biswanath Mukherjee   A survey on routing algorithms for
                                  wireless Ad-Hoc and mesh networks  . . . 940--965
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 56, Number 3, February 23, 2012

José Ignacio Alvarez-Hamelin and   
         Éric Fleury and   
      Alessandro Vespignani and   
                  Artur Ziviani   Complex dynamic networks: Tools and
                                  methods  . . . . . . . . . . . . . . . . 967--969
             N. Koenigstein and   
                     Y. Shavitt   Talent scouting in P2P networks  . . . . 970--982
            Hyoungshick Kim and   
                  John Tang and   
              Ross Anderson and   
                Cecilia Mascolo   Centrality prediction in dynamic human
                                  contact networks . . . . . . . . . . . . 983--996
Ana Cristina Kochem Vendramin and   
          Anelise Munaretto and   
  Myriam Regattieri Delgado and   
           Aline Carneiro Viana   GrAnt: Inferring best forwarders from
                                  complex networks' dynamics through a
                                  greedy Ant Colony Optimization . . . . . 997--1015
           David S. Shelley and   
              Mehmet Hadi Gunes   GerbilSphere: Inner sphere network
                                  visualization  . . . . . . . . . . . . . 1016--1028
               Dima Feldman and   
              Yuval Shavitt and   
                  Noa Zilberman   A structural approach for PoP
                                  geo-location . . . . . . . . . . . . . . 1029--1040
                Bivas Mitra and   
           Lionel Tabourier and   
                   Camille Roth   Intrinsically dynamic network
                                  communities  . . . . . . . . . . . . . . 1041--1053
            Matteo Varvello and   
             Moritz Steiner and   
                   Koen Laevens   Understanding BitTorrent: a reality
                                  check from the ISP's perspective . . . . 1054--1065
               Meeyoung Cha and   
 Fabrício Benevenuto and   
              Yong-Yeol Ahn and   
             Krishna P. Gummadi   Delayed information cascades in Flickr:
                                  Measurement, analysis, and modeling  . . 1066--1076
                Xiaoming Fu and   
                  Yang Chen and   
                  Guy Leduc and   
                  Laurent Mathy   Editorial for Computer Networks special
                                  issue on ``Measurement-based
                                  optimization of P2P networking and
                                  applications'' . . . . . . . . . . . . . 1077--1079
               Ghulam Memon and   
                Reza Rejaie and   
                   Yang Guo and   
               Daniel Stutzbach   Montra: a large-scale DHT traffic
                                  monitor  . . . . . . . . . . . . . . . . 1080--1091
           Noam Koenigstein and   
              Yuval Shavitt and   
              Ela Weinsberg and   
                  Udi Weinsberg   Measuring the validity of peer-to-peer
                                  data for information retrieval
                                  applications . . . . . . . . . . . . . . 1092--1102
                    Zhen Ma and   
                      Ke Xu and   
             Jiangchuan Liu and   
                   Haiyang Wang   Measurement, modeling and enhancement of
                                  BitTorrent-based VoD system  . . . . . . 1103--1117
          Konstantin Pussep and   
            Frank Lehrieder and   
            Christian Gross and   
             Simon Oechsner and   
            Markus Guenther and   
                Sebastian Meyer   Cooperative traffic management for video
                                  streaming overlays . . . . . . . . . . . 1118--1130
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 56, Number 4, March 16, 2012

                M. Marchese and   
                    M. Mongelli   Simple protocol enhancements of Rapid
                                  Spanning Tree Protocol over ring
                                  topologies . . . . . . . . . . . . . . . 1131--1151
           Federico Larroca and   
             Jean-Louis Rougier   Minimum delay load-balancing via
                                  nonparametric regression and no-regret
                                  algorithms . . . . . . . . . . . . . . . 1152--1166
                   Haw-Yun Shin   Exploiting skewed access and
                                  energy-efficient algorithm to improve
                                  the performance of wireless data
                                  broadcasting . . . . . . . . . . . . . . 1167--1182
          Luis Pérez and   
               Luis Velasco and   
      Juan Rodríguez and   
         Pedro Capelastegui and   
Guillem Hernández-Sola and   
             Lorena Calavia and   
     Antonio Marqués and   
             Borja Iribarne and   
                Amador Pozo and   
             Antoine De Poorter   Network convergence and QoS for future
                                  multimedia services in the VISION
                                  project  . . . . . . . . . . . . . . . . 1183--1199
               Kwan-Wu Chin and   
                Sieteng Soh and   
                      Chen Meng   Novel scheduling algorithms for
                                  concurrent transmit/receive wireless
                                  mesh networks  . . . . . . . . . . . . . 1200--1214
            Marcello Cinque and   
         Catello Di Martino and   
             Christian Esposito   On data dissemination for large-scale
                                  complex critical infrastructures . . . . 1215--1235
              Jeongkyun Yun and   
              Sung-Guk Yoon and   
              Jin-Ghoo Choi and   
                  Saewoong Bahk   Contention based scheduling for
                                  femtocell access points in a densely
                                  deployed network environment . . . . . . 1236--1248
         Koteswara Rao Vemu and   
          Shalabh Bhatnagar and   
                 N. Hemachandra   Optimal multi-layered congestion based
                                  pricing schemes for enhanced QoS . . . . 1249--1262
              Dmitri Moltchanov   A study of TCP performance in wireless
                                  environment using fixed-point
                                  approximation  . . . . . . . . . . . . . 1263--1285
      Praveen K. Muthuswamy and   
               Aparna Gupta and   
               Murat Yuksel and   
                    Koushik Kar   Path-vector contracting: Profit
                                  maximization and risk management . . . . 1286--1302
         Miguel S. Familiar and   
José F. Martínez and   
       Iván Corredor and   
     Carlos García-Rubio   Building service-oriented Smart
                                  Infrastructures over Wireless Ad Hoc
                                  Sensor Networks: a middleware
                                  perspective  . . . . . . . . . . . . . . 1303--1328
             Byung-Gook Kim and   
                   Jang-Won Lee   Stochastic utility-based flow control
                                  algorithm for services with time-varying
                                  rate requirements  . . . . . . . . . . . 1329--1342
             Aaron E. Cohen and   
              Jian-Hung Lin and   
                Keshab K. Parhi   Variable data rate (VDR) network
                                  congestion control (NCC) applied to
                                  voice/audio communication  . . . . . . . 1343--1356
        Faqir Zarrar Yousaf and   
             Christian Wietfeld   Solving pinball routing, race condition
                                  and loop formation issues in nested
                                  mobile networks  . . . . . . . . . . . . 1357--1375
               Yossi Kanizo and   
                  David Hay and   
                 Isaac Keslassy   Hash tables with finite buckets are less
                                  resistant to deletions . . . . . . . . . 1376--1389
          Olabisi E. Falowo and   
                H. Anthony Chan   Dynamic RAT selection for multiple calls
                                  in heterogeneous wireless networks using
                                  group decision-making technique  . . . . 1390--1401
               Chih-Che Lin and   
             Shie-Yuan Wang and   
                   Teng-Wei Hsu   On the performances of IEEE 802.16(d)
                                  mesh CDS-mode networks using
                                  Single-Switched-Beam Antennas  . . . . . 1402--1423
                D. J. Leith and   
                P. Clifford and   
                 V. Badarla and   
                      D. Malone   WLAN channel selection without
                                  communication  . . . . . . . . . . . . . 1424--1441
                  Ting Wang and   
                  Chor Ping Low   The general Message Ferry Route
                                  (MFR$^*$) problem and the
                                  An-Improved-Route (AIR) scheme . . . . . 1442--1457
              Kyong-Tak Cho and   
                  Saewoong Bahk   Optimal Hop Extended MAC protocol for
                                  wireless sensor networks . . . . . . . . 1458--1469
                 Yunzhao Li and   
            Don Gruenbacher and   
               Caterina Scoglio   Evaluating stranger policies in P2P
                                  file-sharing systems with reciprocity
                                  mechanisms . . . . . . . . . . . . . . . 1470--1485
                  Wei Zhang and   
                     Jun Bi and   
                Jianping Wu and   
                   Baobao Zhang   Catching popular prefixes at AS border
                                  routers with a prediction based method   1486--1502
             M. Reza Rahimi and   
                 Abdul Bais and   
                   Nima Sarshar   On fair and optimal multi-source
                                  IP-multicast . . . . . . . . . . . . . . 1503--1524
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 56, Number 5, March 30, 2012

           Ching-Lung Chang and   
                 Sih-Ping Huang   The interleaved video frame distribution
                                  for P2P-based VoD system with VCR
                                  functionality  . . . . . . . . . . . . . 1525--1537
                 J. Fitzpatrick   Voice call capacity analysis of long
                                  range WiFi as a femto backhaul solution  1538--1553
            Claudia Campolo and   
            Claudio Casetti and   
  Carla-Fabiana Chiasserini and   
             Antonella Molinaro   A multirate MAC protocol for reliable
                                  multicast in multihop wireless networks  1554--1567
              Mehdi Bezahaf and   
              Luigi Iannone and   
     Marcelo Dias de Amorim and   
                    Serge Fdida   An experimental evaluation of
                                  cross-layer routing in a wireless mesh
                                  backbone . . . . . . . . . . . . . . . . 1568--1583
         Fabio R. J. Vieira and   
  José F. de Rezende and   
          Valmir C. Barbosa and   
                    Serge Fdida   Scheduling links for heavy traffic on
                                  interfering routes in wireless mesh
                                  networks . . . . . . . . . . . . . . . . 1584--1598
                  Bang Wang and   
              Hock Beng Lim and   
                          Di Ma   A coverage-aware clustering protocol for
                                  wireless sensor networks . . . . . . . . 1599--1611
   Jouni Mäenpää   Performance evaluation of Recursive
                                  Distributed Rendezvous based service
                                  discovery for Peer-to-Peer Session
                                  Initiation Protocol  . . . . . . . . . . 1612--1626
          Atslands R. Rocha and   
                Luci Pirmez and   
  Flávia C. Delicato and   
         Érico Lemos and   
                Igor Santos and   
           Danielo G. Gomes and   
    José Neuman de Souza   WSNs clustering based on semantic
                                  neighborhood relationships . . . . . . . 1627--1645
            Young June Pyun and   
              Younghee Park and   
          Douglas S. Reeves and   
               Xinyuan Wang and   
                      Peng Ning   Interval-based flow watermarking for
                                  tracing interactive traffic  . . . . . . 1646--1665
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 56, Number 6, April 19, 2012

               Frederic Raspall   Efficient packet sampling for accurate
                                  traffic measurements . . . . . . . . . . 1667--1684
           Javad Vazifehdan and   
       R. Venkatesha Prasad and   
               Ignas Niemegeers   On the lifetime of node-to-node
                                  communication in wireless ad hoc
                                  networks . . . . . . . . . . . . . . . . 1685--1709
                Sihyung Lee and   
                   Hyong S. Kim   End-user perspectives of Internet
                                  connectivity problems  . . . . . . . . . 1710--1722
                Alex X. Liu and   
            Jason M. Kovacs and   
               Mohamed G. Gouda   A secure cookie scheme . . . . . . . . . 1723--1730
                      Yi Hu and   
            Laxmi N. Bhuyan and   
                       Min Feng   P2P consistency support for large-scale
                                  interactive applications . . . . . . . . 1731--1744
             Joo-Young Baek and   
                  Young-Joo Suh   An adaptive ARQ-HARQ interworking scheme
                                  in WiMAX systems . . . . . . . . . . . . 1745--1762
                      Yu Lu and   
               Mehul Motani and   
                Wai-Choong Wong   When Ambient Intelligence meets the
                                  Internet: User Module framework and its
                                  applications . . . . . . . . . . . . . . 1763--1781
             Zhipeng Ouyang and   
                  Lisong Xu and   
           Byrav Ramamurthy and   
                  Negede Yossef   Partial forwarding vs. partial
                                  participation for dynamic window
                                  resizing in P2P streaming  . . . . . . . 1782--1796
                Xiang Cheng and   
                     Sen Su and   
             Zhongbao Zhang and   
                 Kai Shuang and   
              Fangchun Yang and   
                    Yan Luo and   
                       Jie Wang   Virtual network embedding through
                                  topology awareness and optimization  . . 1797--1813
               ChengGuo Yin and   
              ShuangQing Li and   
                          Qi Li   Network traffic classification via HMM
                                  under the guidance of syntactic
                                  structure  . . . . . . . . . . . . . . . 1814--1825
              Jihene Rezgui and   
           Abdelhakim Hafid and   
              Racha Ben Ali and   
                Michel Gendreau   Optimization model for handoff-aware
                                  channel assignment problem for
                                  multi-radio wireless mesh networks . . . 1826--1846
       Péter Soproni and   
                  Tibor Cinkler   Preplanned restoration of multicast
                                  demands in optical networks  . . . . . . 1847--1861
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 56, Number 7, May 3, 2012

        Mohammad Abdul Awal and   
             Lila Boukhatem and   
                       Lin Chen   An integrated cross-layer framework of
                                  adaptive FEedback REsource allocation
                                  and Prediction for OFDMA systems . . . . 1863--1875
               Ilknur Aydin and   
          Janardhan Iyengar and   
             Phillip Conrad and   
           Chien-Chung Shen and   
                      Paul Amer   Evaluating TCP-friendliness in light of
                                  Concurrent Multipath Transfer  . . . . . 1876--1892
               Jose Saldana and   
Julián Fernández-Navajas and   
       José Ruiz-Mas and   
            Jenifer Murillo and   
    Eduardo Viruete Navarro and   
           José I. Aznar   Evaluating the influence of multiplexing
                                  schemes and buffer implementation on
                                  perceived VoIP conversation quality  . . 1893--1919
    Jochen Furthmüller and   
            Oliver P. Waldhorst   Energy-aware resource sharing with
                                  mobile devices . . . . . . . . . . . . . 1920--1934
                Habib M. Ammari   On the problem of $k$-coverage in
                                  mission-oriented mobile wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1935--1950
                 Anfeng Liu and   
                     Ju Ren and   
                      Xu Li and   
               Zhigang Chen and   
          Xuemin (Sherman) Shen   Design principles and improvement of
                                  cost function based energy aware routing
                                  algorithms for wireless sensor networks  1951--1967
    Bheemarjuna Reddy Tamma and   
                B. S. Manoj and   
                  Ramesh R. Rao   Traffic sensing and characterization in
                                  multi-channel wireless networks for
                                  cognitive networking . . . . . . . . . . 1968--1982
             Fabricio Murai and   
     Antonio A. de A. Rocha and   
       Daniel R. Figueiredo and   
    Edmundo A. de Souza e Silva   Heterogeneous download times in a
                                  homogeneous BitTorrent swarm . . . . . . 1983--2000
                Duc A. Tran and   
               Khanh Nguyen and   
                     Cuong Pham   S-CLONE: Socially-aware data replication
                                  for social networks  . . . . . . . . . . 2001--2013
                Mihaela Ion and   
          Giovanni Russello and   
                   Bruno Crispo   Design and implementation of a
                                  confidentiality and access control
                                  solution for publish/subscribe systems   2014--2037
           Pietro Michiardi and   
              Damiano Carra and   
         Francesco Albanese and   
                 Azer Bestavros   Peer-assisted content distribution on a
                                  budget . . . . . . . . . . . . . . . . . 2038--2048
                   Zhe Wang and   
                     Kai Hu and   
                      Ke Xu and   
                 Baolin Yin and   
                   Xiaowen Dong   Structural analysis of network traffic
                                  matrix via relaxed principal component
                                  pursuit  . . . . . . . . . . . . . . . . 2049--2067
             Kiam Cheng How and   
                   Maode Ma and   
                       Yang Qin   An altruistic differentiated service
                                  protocol in dynamic cognitive radio
                                  networks against selfish behaviors . . . 2068--2079
              Mursalin Akon and   
    Mohammad Towhidul Islam and   
      Xuemin (Sherman) Shen and   
                     Ajit Singh   A bandwidth and effective hit optimal
                                  cache scheme for wireless data access
                                  networks with client injected updates    2080--2095
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 56, Number 8, May 24, 2012

           Vincent Reinhard and   
              Johanne Cohen and   
             Joanna Tomasik and   
            Dominique Barth and   
           Marc-Antoine Weisser   Optimal configuration of an optical
                                  network providing predefined multicast
                                  transmissions  . . . . . . . . . . . . . 2097--2106
          Hani Ragab Hassen and   
             Hatem Bettahar and   
   Abdalmadjid Bouadbdallah and   
                 Yacine Challal   An efficient key management scheme for
                                  content access control for linear
                                  hierarchies  . . . . . . . . . . . . . . 2107--2118
                    Jin Cao and   
                     Hui Li and   
                   Maode Ma and   
                Yueyu Zhang and   
                   Chengzhe Lai   A simple and robust handover
                                  authentication between HeNB and eNB in
                                  LTE networks . . . . . . . . . . . . . . 2119--2131
                  Yong Liao and   
               Jiangtao Yin and   
                   Dong Yin and   
                      Lixin Gao   DPillar: Dual-port server
                                  interconnection network for large scale
                                  data centers . . . . . . . . . . . . . . 2132--2147
             Yuh-Jzer Joung and   
              Wing-Tat Wong and   
            Hsiao-Mei Huang and   
                   Yi-Fang Chou   Building a network-aware and
                                  load-balanced peer-to-peer system for
                                  range queries  . . . . . . . . . . . . . 2148--2167
               Kwan-Wu Chin and   
                      Shinan Li   Novel association control strategies for
                                  multicasting in relay-enabled WLANs  . . 2168--2178
     Antti Mäkelä and   
       Sebastian Siikavirta and   
                   Jukka Manner   Comparison of load-balancing approaches
                                  for multipath connectivity . . . . . . . 2179--2195
               B. E. Bilgin and   
                   V. C. Gungor   Performance evaluations of ZigBee in
                                  different smart grid environments  . . . 2196--2205
                Sihyung Lee and   
            Kyriaki Levanti and   
                   Hyong S. Kim   Impact analysis of BGP sessions for
                                  prioritization of maintenance operations 2206--2220
 GholamHossein Ekbatanifard and   
               Reza Monsefi and   
    Mohammad H. Yaghmaee M. and   
         Seyed Amin Hosseini S.   Queen-MAC: a quorum-based
                                  energy-efficient medium access control
                                  protocol for wireless sensor networks    2221--2236
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 56, Number 9, June 14, 2012

 Péter Mátray and   
   Péter Hága and   
         Sándor Laki and   
        Gábor Vattay and   
           István Csabai   On the spatial properties of Internet
                                  routes . . . . . . . . . . . . . . . . . 2237--2248
               Carlo Fragni and   
Luís Henrique Maciel Kosmalski Costa   ECO-ALOC: Energy-efficient resource
                                  allocation for cluster-based software
                                  routers  . . . . . . . . . . . . . . . . 2249--2261
            Fernando Lezama and   
Gerardo Castañón and   
            Ana Maria Sarmiento   Differential evolution optimization
                                  applied to the wavelength converters
                                  placement problem in all optical
                                  networks . . . . . . . . . . . . . . . . 2262--2275
             Tuan-Minh Pham and   
                    Serge Fdida   DTN support for news dissemination in an
                                  urban area . . . . . . . . . . . . . . . 2276--2291
                Changhui Hu and   
              Tat Wing Chim and   
                  S. M. Yiu and   
            Lucas C. K. Hui and   
                Victor O. K. Li   Efficient HMAC-based secure
                                  communication for VANETs . . . . . . . . 2292--2303
                  Zheng Liu and   
                   Maode Ma and   
                     Jufeng Dai   Utility-based scheduling in wireless
                                  multi-hop networks over
                                  non-deterministic fading channels  . . . 2304--2315
             Yuh-Jzer Joung and   
              Wing-Tat Wong and   
            Hsiao-Mei Huang and   
                   Yi-Fang Chou   Erratum to ``Building a network-aware
                                  and load-balanced peer-to-peer system
                                  for range queries'', COMNET, \bf 56(8)
                                  2012, 2148--2167 . . . . . . . . . . . . 2316--2316
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 56, Number 10, July 5, 2012

             Antonio Capone and   
                 Dan Kilper and   
                   Zhisheng Niu   Editorial for Computer Networks special
                                  issue on ``Green communication
                                  networks'' . . . . . . . . . . . . . . . 2317--2319
             Raffaele Bolla and   
            Roberto Bruschi and   
         Alessandro Carrega and   
              Franco Davoli and   
                Diego Suino and   
    Constantinos Vassilakis and   
       Anastasios Zafeiropoulos   Cutting the energy bills of Internet
                                  Service Providers and telecoms through
                                  power management: an impact analysis . . 2320--2342
              Young-Min Kim and   
               Eun-Jung Lee and   
              Hea-Sook Park and   
              Jun-Kyun Choi and   
                 Hong-Shik Park   Ant colony based self-adaptive energy
                                  saving routing for energy efficient
                                  Internet . . . . . . . . . . . . . . . . 2343--2354
            Francesca Cuomo and   
          Antonio Cianfrani and   
            Marco Polverini and   
               Daniele Mangione   Network pruning for energy saving in the
                                  Internet . . . . . . . . . . . . . . . . 2355--2367
           Stefano Avallone and   
                 Giorgio Ventre   Energy efficient online routing of flows
                                  with additive constraints  . . . . . . . 2368--2382
                Weigang Hou and   
                    Lei Guo and   
                 Xuetao Wei and   
                   Xiaoxue Gong   Multi-granularity and robust grooming in
                                  power- and port-cost-efficient IP over
                                  WDM networks . . . . . . . . . . . . . . 2383--2399
Jorge López Vizcaíno and   
                   Yabin Ye and   
         Idelfonso Tafur Monroy   Energy efficiency analysis for
                                  flexible-grid OFDM-based optical
                                  networks . . . . . . . . . . . . . . . . 2400--2419
           Sergio Ricciardi and   
         Francesco Palmieri and   
                  Ugo Fiore and   
            Davide Careglio and   
 Germán Santos-Boada and   
       Josep Solé-Pareta   An energy-aware dynamic RWA framework
                                  for next-generation wavelength-routed
                                  networks . . . . . . . . . . . . . . . . 2420--2442
          Giuseppe Rizzelli and   
             Annalisa Morea and   
          Massimo Tornatore and   
                  Olivier Rival   Energy efficient Traffic-Aware design of
                                  on-off Multi-Layer translucent optical
                                  networks . . . . . . . . . . . . . . . . 2443--2455
Sergio Herrería-Alonso and   
Miguel Rodri'guez-Pérez and   
Manuel Fernández-Veiga and   
Cándido López-García   Optimal configuration of
                                  Energy-Efficient Ethernet  . . . . . . . 2456--2467
       Martin Wolkerstorfer and   
            Driton Statovci and   
           Tomas Nordström   Energy-saving by low-power modes in
                                  ADSL2  . . . . . . . . . . . . . . . . . 2468--2480
           Vincenzo Mancuso and   
                     Sara Alouf   Analysis of power saving with continuous
                                  connectivity . . . . . . . . . . . . . . 2481--2493
              Koen De Turck and   
             Stijn De Vuyst and   
               Dieter Fiems and   
        Sabine Wittevrongel and   
                 Herwig Bruneel   Performance analysis of sleep mode
                                  mechanisms in the presence of
                                  bidirectional traffic  . . . . . . . . . 2494--2505
               Karina Gomez and   
                Dejene Boru and   
             Roberto Riggio and   
              Tinku Rasheed and   
           Daniele Miorandi and   
              Fabrizio Granelli   Measurement-based modelling of power
                                  consumption at wireless access network
                                  gateways . . . . . . . . . . . . . . . . 2506--2521
   Ana Paula Couto da Silva and   
                Michela Meo and   
            Marco Ajmone Marsan   Energy-performance trade-off in dense
                                  WLANs: a queuing study . . . . . . . . . 2522--2537
            Kim Khoa Nguyen and   
            Mohamed Cheriet and   
              Mathieu Lemay and   
               Victor Reijs and   
            Andrew Mackarel and   
                  Alin Pastrama   Environmental-aware virtual data center
                                  network  . . . . . . . . . . . . . . . . 2538--2550
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 56, Number 11, July 31, 2012

             Aniket Pingley and   
                     Wei Yu and   
                  Nan Zhang and   
                  Xinwen Fu and   
                       Wei Zhao   A context-aware scheme for
                                  privacy-preserving location-based
                                  services . . . . . . . . . . . . . . . . 2551--2568
Weverton Luis da Costa Cordeiro and   
Flávio Roberto Santos and   
         Gustavo Huff Mauch and   
     Marinho Pilla Barcelos and   
       Luciano Paschoal Gaspary   Identity management based on adaptive
                                  puzzles to protect P2P systems from
                                  Sybil attacks  . . . . . . . . . . . . . 2569--2589
              Cheng-Han Lin and   
                Yu-Chi Wang and   
              Ce-Kuen Shieh and   
               Wen-Shyang Hwang   An unequal error protection mechanism
                                  for video streaming over IEEE 802.11e
                                  WLANs  . . . . . . . . . . . . . . . . . 2590--2599
       Sara Moftah Elrabiei and   
           Mohamed Hadi Habaebi   Reliable cooperative multicasting for
                                  MBS WiMAX traffic  . . . . . . . . . . . 2600--2613
             Ching-Wen Chen and   
             Chuan-Chi Weng and   
                   Po-Yueh Chen   An interference avoidance MAC protocol
                                  design in mobile ad hoc networks . . . . 2614--2634
                 Sheng-Wei Wang   Probability based dynamic-alternate
                                  routing and the corresponding converter
                                  placement algorithm in all-optical WDM
                                  networks . . . . . . . . . . . . . . . . 2635--2648
              Behnam Bahrak and   
             Amol Deshpande and   
          Jung-Min `Jerry' Park   Spectrum access policy reasoning for
                                  policy-based cognitive radios  . . . . . 2649--2663
                   Wei Dong and   
                  Chun Chen and   
                    Xue Liu and   
               Guodong Teng and   
                  Jiajun Bu and   
                     Yunhao Liu   Bulk data dissemination in wireless
                                  sensor networks: Modeling and analysis   2664--2676
           Nobuyoshi Tomita and   
                Shahrokh Valaee   Data uploading time estimation for CUBIC
                                  TCP in long distance networks  . . . . . 2677--2689
                Meiqin Tang and   
             Chengnian Long and   
               Xinping Guan and   
                   Xinjiang Wei   Nonconvex dynamic spectrum allocation
                                  for cognitive radio networks via
                                  particle swarm optimization and
                                  simulated annealing  . . . . . . . . . . 2690--2699
  Dino Martin Lopez Pacheco and   
             Tuan Tran Thai and   
            Emmanuel Lochin and   
                  Fabrice Arnal   An IP-ERN architecture to enable hybrid
                                  E2E/ERN protocol and application to
                                  satellite networking . . . . . . . . . . 2700--2713
Helena Fernández-López and   
      José A. Afonso and   
              J. H. Correia and   
                 Ricardo Simoes   Towards the design of efficient
                                  nonbeacon-enabled ZigBee networks  . . . 2714--2725
      Péter Schaffer and   
       Károly Farkas and   
Ádám Horváth and   
       Tamás Holczer and   
         Levente Buttyán   Secure and reliable clustering in
                                  wireless sensor networks: a critical
                                  survey . . . . . . . . . . . . . . . . . 2726--2741
               Nico Saputro and   
               Kemal Akkaya and   
                Suleyman Uludag   A survey of routing protocols for smart
                                  grid communications  . . . . . . . . . . 2742--2771
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 56, Number 12, August 16, 2012

               Pinghui Wang and   
              Xiaohong Guan and   
                Don Towsley and   
                       Jing Tao   Virtual indexing based methods for
                                  estimating node connection degrees . . . 2773--2787
              Sookyoung Lee and   
                 Mohamed Younis   Optimized relay node placement for
                                  connecting disjoint wireless sensor
                                  networks . . . . . . . . . . . . . . . . 2788--2804
            Eduardo Feitosa and   
              Eduardo Souto and   
                Djamel H. Sadok   An orchestration approach for unwanted
                                  Internet traffic identification  . . . . 2805--2831
             Saeed Rashwand and   
                 Jelena Misi\'c   Effects of access phases lengths on
                                  performance of IEEE 802.15.6 CSMA/CA . . 2832--2846
               Jianxin Liao and   
                Jinzhu Wang and   
                Tonghong Li and   
                  Jing Wang and   
                Jingyu Wang and   
                    Xiaomin Zhu   A distributed end-to-end overload
                                  control mechanism for networks of SIP
                                  servers  . . . . . . . . . . . . . . . . 2847--2868
             Alberto Castro and   
               Luis Velasco and   
                  Marc Ruiz and   
        Miroslaw Klinkowski and   
Juan Pedro Fernández-Palacios and   
                Davide Careglio   Dynamic routing and spectrum
                                  (re)allocation in future flexgrid
                                  optical networks . . . . . . . . . . . . 2869--2883
           F. Javier Ortega and   
     José A. Troyano and   
      Fermín L. Cruz and   
          Carlos G. Vallejo and   
       Fernando Enríquez   Propagation of trust and distrust for
                                  the detection of trolls in a social
                                  network  . . . . . . . . . . . . . . . . 2884--2895
           Daniel Camps-Mur and   
           Manil Dev Gomony and   
  Xavier Pérez-Costa and   
       Sebasti\`a Sallent-Ribes   Leveraging 802.11n frame aggregation to
                                  enhance QoS and power consumption in
                                  Wi-Fi networks . . . . . . . . . . . . . 2896--2911
             Mario Montagud and   
               Fernando Boronat   Enhanced adaptive RTCP-based
                                  Inter-Destination Multimedia
                                  Synchronization approach for distributed
                                  applications . . . . . . . . . . . . . . 2912--2933
               Jae-Yong Yoo and   
              Cigdem Sengul and   
                 Ruben Merz and   
                    JongWon Kim   Backpressure scheduling in IEEE 802.11
                                  wireless mesh networks: Gap between
                                  theory and practice  . . . . . . . . . . 2934--2948
              Adrian Holzer and   
            Patrick Eugster and   
            Beno\^\it Garbinato   ALPS --- Adaptive Location-based
                                  Publish/Subscribe  . . . . . . . . . . . 2949--2962
               S. Chieochan and   
                     E. Hossain   Network coding for unicast in a WiFi
                                  hotspot: Promises, challenges, and
                                  testbed implementation . . . . . . . . . 2963--2980
                    Ze Wang and   
                   Maode Ma and   
                      Jigang Wu   Securing wireless mesh networks in a
                                  unified security framework with
                                  corruption-resilience  . . . . . . . . . 2981--2993
                Tsu-Yang Wu and   
              Yuh-Min Tseng and   
                  Tung-Tso Tsai   A revocable ID-based authenticated group
                                  key exchange protocol with resistant to
                                  malicious participants . . . . . . . . . 2994--3006
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 56, Number 13, September 5, 2012

         Pablo Pavon-Marino and   
       Mohammed Atiquzzaman and   
               Joan Garcia-Haro   Special issue on ``Challenges in
                                  high-performance switching and routing
                                  in the Future Internet'' . . . . . . . . 3007--3009
                Hyesook Lim and   
                Soohyun Lee and   
      Earl E. Swartzlander, Jr.   A new hierarchical packet classification
                                  algorithm  . . . . . . . . . . . . . . . 3010--3022
          Anat Bremler-Barr and   
                  David Hay and   
                  Danny Hendler   Layered interval codes for TCAM-based
                                  classification . . . . . . . . . . . . . 3023--3039
     Aleksandra Smiljani\'c and   
                     Zoran Cica   A comparative review of scalable lookup
                                  algorithms for IPv6  . . . . . . . . . . 3040--3054
             Nizar Ben Neji and   
                  Adel Bouhoula   A prefix-based approach for managing
                                  hybrid specifications in complex packet
                                  filtering  . . . . . . . . . . . . . . . 3055--3064
              Mustafa Sanli and   
     Ece Güran Schmidt and   
        Hasan Cengiz Güran   Hardware design and implementation of
                                  packet fair queuing algorithms for the
                                  quality of service support in the
                                  high-speed Internet  . . . . . . . . . . 3065--3075
                Andrea Francini   Periodic early detection for improved
                                  TCP performance and energy efficiency    3076--3086
            Dinil Mon Divakaran   A spike-detecting AQM to deal with
                                  elephants  . . . . . . . . . . . . . . . 3087--3098
D. Fernández Hermida and   
          M. Rodelgo Lacruz and   
                  A. Bianco and   
                    D. Cuda and   
      G. Gavilanes Castillo and   
      C. López Bravo and   
F. J. González Castaño   AWG-based optical switches performance
                                  using crosstalk limiting schedulers  . . 3099--3109
                Davide Cuda and   
             Paolo Giaccone and   
               Massimo Montalto   Design and control of next generation
                                  distribution frames  . . . . . . . . . . 3110--3122
             Ricard Vilalta and   
          Raul Muñoz and   
             Ramon Casellas and   
           Ricardo Martinez and   
          Javier Vílchez   GMPLS-enabled MPLS-TP/PWE3 node with
                                  integrated 10 Gbps tunable DWDM
                                  transponders: design and experimental
                                  evaluation . . . . . . . . . . . . . . . 3123--3135
Miklós Molnár and   
              Alia Bellabas and   
                   Samer Lahoud   The cost optimal solution of the
                                  multi-constrained multicast routing
                                  problem  . . . . . . . . . . . . . . . . 3136--3149
              Diego Lucerna and   
          Massimo Tornatore and   
        Biswanath Mukherjee and   
              Achille Pattavina   Trading availability among
                                  shared-protected dynamic connections in
                                  WDM networks . . . . . . . . . . . . . . 3150--3162
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 56, Number 14, September 28, 2012

               Olfa Gaddour and   
              Anis Koubâa   RPL in a nutshell: a survey  . . . . . . 3163--3178
                 Xian Zhang and   
              Xiuzhong Chen and   
                 Chris Phillips   Achieving effective resilience for
                                  QoS-aware application mapping  . . . . . 3179--3191
                Sihyung Lee and   
                  Tina Wong and   
                   Hyong S. Kim   Improving manageability through
                                  reorganization of routing-policy
                                  configurations . . . . . . . . . . . . . 3192--3205
                  H. Ahmadi and   
                     Y. H. Chew   Evolutionary algorithms for orthogonal
                                  frequency division multiplexing-based
                                  dynamic spectrum access systems  . . . . 3206--3218
        Aruna Prem Bianzino and   
          Luca Chiaraviglio and   
               Marco Mellia and   
             Jean-Louis Rougier   GRiDA: GReen Distributed Algorithm for
                                  energy-efficient IP backbone networks    3219--3232
                Amit Mondal and   
             Ionut Trestian and   
                   Zhen Qin and   
          Aleksandar Kuzmanovic   P2P as a CDN: a new service model for
                                  file sharing . . . . . . . . . . . . . . 3233--3246
                  Zhiguo Hu and   
                 Dalu Zhang and   
                   Anqi Zhu and   
                Zhiwei Chen and   
                    Hualei Zhou   SLDRT: a measurement technique for
                                  available bandwidth on multi-hop path
                                  with bursty cross traffic  . . . . . . . 3247--3260
               Caishi Huang and   
               Chin-Tau Lea and   
            Albert Kai-Sun Wong   A joint solution for the hidden and
                                  exposed terminal problems in CSMA/CA
                                  wireless networks  . . . . . . . . . . . 3261--3273
      Gustavo B. Figueiredo and   
     Eduardo Candido Xavier and   
        Nelson L. S. da Fonseca   Optimal algorithms for the batch
                                  scheduling problem in OBS networks . . . 3274--3286
                  Xiang Fei and   
                    Evan Magill   REED: Flexible rule based programming of
                                  wireless sensor networks at runtime  . . 3287--3299
                Issa Khalil and   
                Mamoun Awad and   
             Abdallah Khreishah   CTAC: Control traffic tunneling attacks'
                                  countermeasures in mobile wireless
                                  networks . . . . . . . . . . . . . . . . 3300--3317
              Wha Sook Jeon and   
                Dong Geun Jeong   Adaptive sensing scheduling for
                                  cognitive radio systems  . . . . . . . . 3318--3332
          Alexander Shpiner and   
             Isaac Keslassy and   
                Gabi Bracha and   
                 Eyal Dagan and   
                   Ofer Iny and   
                      Eyal Soha   A switch-based approach to throughput
                                  collapse and starvation in data centers  3333--3346
   Ram G. Lakshmi Narayanan and   
                  Oliver C. Ibe   A joint network for disaster recovery
                                  and search and rescue operations . . . . 3347--3373
           Olga León and   
Juan Hernández-Serrano and   
                 Miguel Soriano   Cooperative detection of primary user
                                  emulation attacks in CRNs  . . . . . . . 3374--3384
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 56, Number 15, October 15, 2012

               Po-Kai Tseng and   
                   Wei-Ho Chung   Joint coverage and link utilization for
                                  fast IP local protection . . . . . . . . 3385--3400
                 Robin Doss and   
                Wanlei Zhou and   
       Saravanan Sundaresan and   
                    Shui Yu and   
                  Longxiang Gao   A minimum disclosure approach to
                                  authentication and privacy in RFID
                                  systems  . . . . . . . . . . . . . . . . 3401--3416
            Changwang Zhang and   
                Zhiping Cai and   
               Weifeng Chen and   
                  Xiapu Luo and   
                   Jianping Yin   Flow level detection and filtering of
                                  low-rate DDoS  . . . . . . . . . . . . . 3417--3431
                   Yang Guo and   
                 Chao Liang and   
                       Yong Liu   Hierarchically Clustered P2P Video
                                  Streaming: Design, implementation, and
                                  evaluation . . . . . . . . . . . . . . . 3432--3445
                    Yu Chen and   
                    Xuming Fang   Energy-efficient dynamic resource
                                  allocation with opportunistic network
                                  coding in OFDMA relay networks . . . . . 3446--3455
             Yishay Mansour and   
           Boaz Patt-Shamir and   
                    Dror Rawitz   Overflow management with multipart
                                  packets  . . . . . . . . . . . . . . . . 3456--3467
               Jiwoong Bang and   
                     Daewon Kim   Efficient RTSP-based multiple buffering
                                  and packet transmission methods for
                                  delivering OMA PoC Box service . . . . . 3468--3478
    Matheus Brenner Lehmann and   
Flávio Roberto Santos and   
   Luciano Paschoal Gaspary and   
        Marinho Pilla Barcellos   Denial-of-service attacks and
                                  countermeasures on BitTorrent  . . . . . 3479--3498
           A. E. Krzesinski and   
                G. Latouche and   
                   P. G. Taylor   How do we encourage an egoist to act
                                  socially in an ad hoc mobile network?    3499--3510
             Anatolij Zubow and   
          Johannes Marotzke and   
           Daniel Camps-Mur and   
             Xavier Perez Costa   sGSA: a SDMA-OFDMA greedy scheduling
                                  algorithm for WiMAX networks . . . . . . 3511--3530
              Alessio Botta and   
           Alberto Dainotti and   
         Antonio Pescapé   A tool for the generation of realistic
                                  network workload for emerging networking
                                  scenarios  . . . . . . . . . . . . . . . 3531--3547
            Xiangyang Zhang and   
               Hossam Hassanein   A survey of peer-to-peer live video
                                  streaming schemes --- an algorithmic
                                  perspective  . . . . . . . . . . . . . . 3548--3579
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 56, Number 16, November 14, 2012

                   Guang Wu and   
                   Shu Wang and   
                  Bang Wang and   
                   Yan Dong and   
                        Shu Yan   A novel range-free localization based on
                                  regulated neighborhood distance for
                                  wireless ad hoc and sensor networks  . . 3581--3593
               Luigi Atzori and   
               Antonio Iera and   
           Giacomo Morabito and   
                  Michele Nitti   The Social Internet of Things (SIoT) ---
                                  When social networks meet the Internet
                                  of Things: Concept, architecture and
                                  network characterization . . . . . . . . 3594--3608
              Yi-Ling Hsieh and   
                   Kuochen Wang   Dynamic overlay multicast for live
                                  multimedia streaming in urban VANETs . . 3609--3628
                David Palma and   
              Helder Araujo and   
                 Marilia Curado   Link quality estimation in wireless
                                  multi-hop networks using Kernel based
                                  methods  . . . . . . . . . . . . . . . . 3629--3638
              Chien-Chi Kao and   
              Shun-Ren Yang and   
                 Hsin-Chen Chen   A sleep-mode interleaving algorithm for
                                  layered-video multicast services in IEEE
                                  802.16e networks . . . . . . . . . . . . 3639--3654
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 56, Number 17, November 30, 2012

      Alberto Coen-Porisini and   
                 Sabrina Sicari   Improving data quality using a cross
                                  layer protocol in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 3655--3665
             Antonio Capone and   
              Daniele Corti and   
               Luca Gianoli and   
          Brunilde Sansó   An optimization framework for the energy
                                  management of carrier Ethernet networks
                                  with Multiple Spanning Trees . . . . . . 3666--3681
                   Sungwook Kim   Multi-leader multi-follower Stackelberg
                                  model for cognitive radio spectrum
                                  sharing scheme . . . . . . . . . . . . . 3682--3692
              Wen-Hsing Kuo and   
                  Ting-Yang Lin   Multi-hop multicast path construction in
                                  modern wireless relay networks . . . . . 3693--3704
                   A. Detti and   
               M. Pomposini and   
         N. Blefari-Melazzi and   
                     S. Salsano   Supporting the Web with an information
                                  centric network that routes by name  . . 3705--3722
                  M. Yuksel and   
         K. K. Ramakrishnan and   
            S. Kalyanaraman and   
                J. D. Houle and   
                    R. Sadhvani   Required extra capacity: a comparative
                                  estimation of overprovisioning needed
                                  for a classless IP backbone  . . . . . . 3723--3743
                Xianfu Meng and   
                 Yanli Wang and   
                     Yalin Ding   An optimized strategy for update path
                                  selection in unstructured P2P networks   3744--3755
             Esther Palomar and   
           Almudena Alcaide and   
           Arturo Ribagorda and   
                      Yan Zhang   The Peer's Dilemma: a general framework
                                  to examine cooperation in pure
                                  peer-to-peer systems . . . . . . . . . . 3756--3766
                    Li Feng and   
                    Jianqing Li   Integer-multiple-spacing-based
                                  scheduling for multimedia applications
                                  in IEEE 802.11e HCCA wireless networks   3767--3782
                  Jiong Jin and   
      Marimuthu Palaniswami and   
         Bhaskar Krishnamachari   Rate control for heterogeneous wireless
                                  sensor networks: Characterization,
                                  algorithms and performance . . . . . . . 3783--3794
              James Bernsen and   
                  D. Manivannan   RIVER: a reliable inter-vehicular
                                  routing protocol for vehicular ad hoc
                                  networks . . . . . . . . . . . . . . . . 3795--3807
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 56, Number 18, December 17, 2012

              Dirk Husemann and   
                    Harry Rudin   The WEB we live in . . . . . . . . . . . 3809--3810
              Colin Allison and   
                Alan Miller and   
                Iain Oliver and   
            Rosa Michaelson and   
            Thanassis Tiropanis   The Web in education . . . . . . . . . . 3811--3824
                Sergey Brin and   
                  Lawrence Page   Reprint of: The anatomy of a large-scale
                                  hypertextual Web search engine . . . . . 3825--3833
                  Jan Camenisch   Information privacy?!  . . . . . . . . . 3834--3848
                Junghoo Cho and   
       Hector Garcia-Molina and   
                  Lawrence Page   Reprint of: Efficient crawling through
                                  URL ordering . . . . . . . . . . . . . . 3849--3858
                 Wendy Hall and   
            Thanassis Tiropanis   Web evolution and Web Science  . . . . . 3859--3865
            Julia Heidemann and   
              Mathias Klier and   
                 Florian Probst   Online social networks: a survey of a
                                  global phenomenon  . . . . . . . . . . . 3866--3878
                     Ian Hughes   Virtual worlds, augmented reality,
                                  blended reality  . . . . . . . . . . . . 3879--3885
                 Andrew Odlyzko   Web history and economics  . . . . . . . 3886--3890
                    Ravi Sandhu   Speculations on the science of Web user
                                  security . . . . . . . . . . . . . . . . 3891--3895
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 57, Number 1, January 16, 2013

            Ian F. Akyildiz and   
                    Harry Rudin   COMNET editorial for 2012  . . . . . . . 1--2
     Christos Papathanasiou and   
            Nikos Dimitriou and   
             Leandros Tassiulas   Dynamic radio resource and interference
                                  management for MIMO-OFDMA mobile
                                  broadband wireless access systems  . . . 3--16
                  Long Long and   
                 Ahmed E. Kamal   Protecting multicast services in optical
                                  Internet backbones . . . . . . . . . . . 17--28
              Ahmad Sardouk and   
             Majdi Mansouri and   
     Leila Merghem-Boulahia and   
            Dominique Gaiti and   
               Rana Rahim-Amoud   Crisis management using MAS-based
                                  wireless sensor networks . . . . . . . . 29--45
              Dong Mei Shan and   
            Kee Chaing Chua and   
             Gurusamy Mohan and   
                       Jian Qiu   Partial spatial protection for
                                  provisioning differentiated reliability
                                  in FSTR-based Metro Ethernet networks    46--60
             Seung Yeob Nam and   
             Seong Joon Kim and   
                Sihyung Lee and   
                   Hyong S. Kim   Estimation of the available bandwidth
                                  ratio of a remote link or path segments  61--77
               Kishore Angrishi   An end-to-end stochastic network
                                  calculus with effective bandwidth and
                                  effective capacity . . . . . . . . . . . 78--84
             Beakcheol Jang and   
                Jun Bum Lim and   
             Mihail L. Sichitiu   An asynchronous scheduled MAC protocol
                                  for wireless sensor networks . . . . . . 85--98
               Dognhyeok An and   
                 Honguk Woo and   
               Hyunsoo Yoon and   
                     Ikjun Yeom   Enhanced cooperative communication MAC
                                  for mobile wireless networks . . . . . . 99--116
                 Mingwei Xu and   
                 Meijia Hou and   
                   Dan Wang and   
                    Jiahai Yang   An efficient critical protection scheme
                                  for intra-domain routing using link
                                  characteristics  . . . . . . . . . . . . 117--133
   A. Mirsayar Barkoosaraei and   
               A. Hamid Aghvami   Dynamic partitioning of IP-based
                                  wireless access networks . . . . . . . . 134--146
              Addisu Eshete and   
                   Yuming Jiang   Generalizing the CHOKe flow protection   147--161
          Anwesha Mukherjee and   
     Srimoyee Bhattacherjee and   
                Sucheta Pal and   
                    Debashis De   Femtocell based green power consumption
                                  methods for mobile network . . . . . . . 162--178
                Weiwei Fang and   
             Xiangmin Liang and   
                Shengxin Li and   
          Luca Chiaraviglio and   
                   Naixue Xiong   VMPlanner: Optimizing virtual machine
                                  placement and traffic flow routing to
                                  reduce network power costs in cloud data
                                  centers  . . . . . . . . . . . . . . . . 179--196
                   Hui Chen and   
                  Yang Xiao and   
                Susan V. Vrbsky   An update-based step-wise optimal cache
                                  replacement for wireless data access . . 197--212
             Enrico Gregori and   
            Luciano Lenzini and   
                  Chiara Orsini   $k$-Dense communities in the Internet
                                  AS-level topology graph  . . . . . . . . 213--227
         Abderrahmen Mtibaa and   
               Khaled A. Harras   Fairness-related challenges in mobile
                                  opportunistic networking . . . . . . . . 228--242
                  Guang Yao and   
                     Jun Bi and   
                    Peiyao Xiao   VASE: Filtering IP spoofing traffic with
                                  agility  . . . . . . . . . . . . . . . . 243--257
              Pablo Serrano and   
                Paul Patras and   
            Andrea Mannocci and   
           Vincenzo Mancuso and   
                  Albert Banchs   Control theoretic optimization of 802.11
                                  WLANs: Implementation and experimental
                                  evaluation . . . . . . . . . . . . . . . 258--272
         Fabio R. J. Vieira and   
  José F. de Rezende and   
          Valmir C. Barbosa and   
                    Serge Fdida   Local heuristic for the refinement of
                                  multi-path routing in wireless mesh
                                  networks . . . . . . . . . . . . . . . . 273--285
            C. Mbarushimana and   
                A. Shahrabi and   
                       T. Buggy   A cross-layer TCP enhancement in
                                  QoS-aware mobile ad hoc networks . . . . 286--301
               Julia Amador and   
              Jesus R. Artalejo   Modeling computer virus with the BSDE
                                  approach . . . . . . . . . . . . . . . . 302--316
            Toktam Mahmoodi and   
         Vasilis Friderikos and   
                  Hamid Aghvami   Using traffic asymmetry to enhance TCP
                                  performance  . . . . . . . . . . . . . . 317--329
                    D. Unal and   
                 M. U. Caglayan   A formal role-based access control model
                                  for security policies in multi-domain
                                  mobile networks  . . . . . . . . . . . . 330--350
                    Lin Cui and   
                     Weijia Jia   Cyclic stable matching for three-sided
                                  networking services  . . . . . . . . . . 351--363
                   Berk Canberk   An adaptive and QoS-based spectrum
                                  awareness framework for CR networks  . . 364--373
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 57, Number 2, February 4, 2013

             Ronaldo Salles and   
                  Guofei Gu and   
                 Morton Swimmer   Editorial for Computer Networks special
                                  issue on ``Botnet Activity: Analysis,
                                  Detection and Shutdown'' . . . . . . . . 375--377
  Sérgio S. C. Silva and   
        Rodrigo M. P. Silva and   
         Raquel C. G. Pinto and   
              Ronaldo M. Salles   Botnets: a survey  . . . . . . . . . . . 378--403
         Masood Khosroshahy and   
      Mustafa K. Mehmet Ali and   
                     Dongyu Qiu   The SIC botnet lifecycle model: a step
                                  beyond traditional epidemiological
                                  models . . . . . . . . . . . . . . . . . 404--421
             Marco Riccardi and   
          Roberto Di Pietro and   
            Marta Palanques and   
            Jorge Aguil\`a Vila   Titans' revenge: Detecting Zeus via its
                                  own flaws  . . . . . . . . . . . . . . . 422--435
             Aditya K. Sood and   
          Richard J. Enbody and   
                   Rohit Bansal   Dissecting SpyEye --- Understanding the
                                  design of third generation botnets . . . 436--450
             Juan Caballero and   
                      Dawn Song   Automatic protocol reverse-engineering:
                                  Message format extraction and field
                                  semantics inference  . . . . . . . . . . 451--474
      Christian J. Dietrich and   
           Christian Rossow and   
               Norbert Pohlmann   CoCoSpot: Clustering and recognizing
                                  botnet command and control channels
                                  using traffic analysis . . . . . . . . . 475--486
           Roberto Perdisci and   
                Davide Ariu and   
               Giorgio Giacinto   Scalable fine-grained behavioral
                                  clustering of HTTP-based malware . . . . 487--500
               Hui-Tang Lin and   
               Ying-You Lin and   
                 Jui-Wei Chiang   Genetic-based real-time fast-flux
                                  service networks detection . . . . . . . 501--513
                Chun-Ying Huang   Effective bot host detection based on
                                  network failure models . . . . . . . . . 514--525
      Pedro H. B. Las-Casas and   
            Dorgival Guedes and   
         Jussara M. Almeida and   
              Artur Ziviani and   
       Humberto T. Marques-Neto   SpaDeS: Detecting spammers at the source
                                  network  . . . . . . . . . . . . . . . . 526--539
                    Guanhua Yan   Peri-Watchdog: Hunting for hidden
                                  botnets in the periphery of online
                                  social networks  . . . . . . . . . . . . 540--555
              Yazan Boshmaf and   
            Ildar Muslukhov and   
        Konstantin Beznosov and   
                  Matei Ripeanu   Design and analysis of a social botnet   556--578
                 Jingyu Hua and   
                Kouichi Sakurai   Botnet command and control based on
                                  Short Message Service and human mobility 579--597
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 57, Number 3, February 26, 2013

        Antonio de la Oliva and   
Tito R. Vargas Hernández and   
         Juan Carlos Guerri and   
José Alberto Hernández and   
                Pedro Reviriego   Performance analysis of Energy Efficient
                                  Ethernet on video streaming servers  . . 599--608
                   Evan Tan and   
                 Chun Tung Chou   Joint optimization of continuity and
                                  quality for streaming video  . . . . . . 609--621
                  Chong Han and   
        Josep Miquel Jornet and   
               Etimad Fadel and   
                Ian F. Akyildiz   A cross-layer communication module for
                                  the Internet of Things . . . . . . . . . 622--633
                     Zi Chu and   
         Steven Gianvecchio and   
                Aaron Koehl and   
               Haining Wang and   
                 Sushil Jajodia   Blog or block: Detecting blog bots
                                  through behavioral biometrics  . . . . . 634--646
               Kush Kothari and   
                 Matthew Wright   Mimic: an active covert channel that
                                  evades regularity-based detection  . . . 647--657
               Noriaki Kamiyama   Designing data center network by
                                  analytic hierarchy process . . . . . . . 658--667
                    Yu Wang and   
          Hari Krishna Garg and   
                   Mehul Motani   Downlink scheduling for user equipment
                                  served by multiple mobile terminals in
                                  cellular systems . . . . . . . . . . . . 668--681
             Tudor Dumitras and   
               Priya Narasimhan   A study of unpredictability in
                                  fault-tolerant middleware  . . . . . . . 682--698
              Vincent Lucas and   
       Jean-Jacques Pansiot and   
             Dominique Grad and   
                 Beno\^\it Hilt   Robust and fair Multicast Congestion
                                  Control (M2C)  . . . . . . . . . . . . . 699--724
             Joo-Young Baek and   
             Jeong-Yoon Lee and   
                  Young-Joo Suh   An elastic compensation model for
                                  frame-based scheduling algorithms in
                                  wireless networks  . . . . . . . . . . . 725--740
           Noriaki Kamiyama and   
               Tatsuya Mori and   
               Ryoichi Kawahara   Autonomic load balancing of flow
                                  monitors . . . . . . . . . . . . . . . . 741--761
        Faqir Zarrar Yousaf and   
             Christian Wietfeld   Optimizing throughput performance of
                                  FMIPv6 over legacy 802.11 networks using
                                  iterative scanning . . . . . . . . . . . 762--781
               Yi-Mao Hsiao and   
               Yuan-Sun Chu and   
              Jeng-Farn Lee and   
                Jinn-Shyan Wang   A high-throughput and high-capacity IPv6
                                  routing lookup system  . . . . . . . . . 782--794
       Emiliano Casalicchio and   
                 Luca Silvestri   Mechanisms for SLA provisioning in
                                  cloud-based service providers  . . . . . 795--810
             Aruna Jamdagni and   
                Zhiyuan Tan and   
               Xiangjian He and   
           Priyadarsi Nanda and   
                   Ren Ping Liu   RePIDS: a multi tier Real-time
                                  Payload-based Intrusion Detection System 811--824
             Reduan H. Khan and   
                  Jamil Y. Khan   A comprehensive review of the
                                  application characteristics and traffic
                                  requirements of a smart grid
                                  communications network . . . . . . . . . 825--845
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 57, Number 4, March 13, 2013

             Ren-Huang Liou and   
                    Yi-Bing Lin   Mobility management with the
                                  central-based location area policy . . . 847--857
              Wei-Tong Wang and   
                   Kuo-Feng Ssu   Obstacle detection and estimation in
                                  wireless sensor networks . . . . . . . . 858--868
                  Zhen Ling and   
                Junzhou Luo and   
                     Wei Yu and   
                  Xinwen Fu and   
                 Weijia Jia and   
                       Wei Zhao   Protocol-level attacks against Tor . . . 869--886
              Jiunn-Jye Lee and   
            Hann-Huei Chiou and   
             Chia-Chang Hsu and   
                 Chin-Laung Lei   An adaptive sector-based routing model
                                  over structured peer-to-peer networks    887--896
                 Juhoon Kim and   
              Luigi Iannone and   
                  Anja Feldmann   Caching Locator/ID mappings: an
                                  experimental scalability analysis and
                                  its implications . . . . . . . . . . . . 897--909
                 Kaikai Chi and   
             Xiaohong Jiang and   
                 Yi-hua Zhu and   
                  Jing Wang and   
                      Yanjun Li   Block-level packet recovery with network
                                  coding for wireless reliable multicast   910--923
             Mohamed Diallo and   
            Vasilis Sourlas and   
              Paris Flegkas and   
                Serge Fdida and   
             Leandros Tassiulas   A content-based publish/subscribe
                                  framework for large-scale content
                                  delivery . . . . . . . . . . . . . . . . 924--943
              Xiuzhong Chen and   
           Marc De Leenheer and   
                   Rui Wang and   
    Chaitanya S. K. Vadrevu and   
                    Lei Shi and   
                  Jie Zhang and   
            Biswanath Mukherjee   High-performance routing for hose-based
                                  VPNs in multi-domain backbone networks   944--953
            Jose M. Camacho and   
Alberto García-Martínez and   
            Marcelo Bagnulo and   
               Francisco Valera   BGP-XM: BGP eXtended Multipath for
                                  transit Autonomous Systems . . . . . . . 954--975
              Stefano Secci and   
                 Kunpen Liu and   
                  Bijan Jabbari   Efficient inter-domain traffic
                                  engineering with transit-edge
                                  hierarchical routing . . . . . . . . . . 976--989
                Yuting Miao and   
                 Qiang Yang and   
                Chunming Wu and   
                 Ming Jiang and   
                   Jinzhou Chen   Multicast virtual network mapping for
                                  supporting multiple description
                                  coding-based video applications  . . . . 990--1002
           Rachid El-Azouzi and   
    Francesco De Pellegrini and   
           Habib B. A. Sidi and   
                   Vijay Kamble   Evolutionary forwarding games in delay
                                  tolerant networks: Equilibria, mechanism
                                  design and stochastic approximation  . . 1003--1018
         Alex Borges Vieira and   
    Rafael Barra de Almeida and   
 Jussara Marques de Almeida and   
Sérgio Vale Aguiar Campos   SimplyRep: a simple and effective
                                  reputation system to fight pollution in
                                  P2P live streaming . . . . . . . . . . . 1019--1036
               Xiaoyuan Luo and   
                 Yanlin Yan and   
                 Shaobao Li and   
                   Xinping Guan   Topology control based on optimally
                                  rigid graph in wireless sensor networks  1037--1047
                Sungoh Kwon and   
                Neung-Hyung Lee   Cell ID extension in femtocell
                                  environments . . . . . . . . . . . . . . 1048--1062
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 57, Number 5, April 7, 2013

                  Feng Shan and   
                Weifa Liang and   
                    Jun Luo and   
                   Xiaojun Shen   Network lifetime maximization for
                                  time-sensitive data gathering in
                                  wireless sensor networks . . . . . . . . 1063--1077
                Christian Bauer   A Secure Correspondent Router Protocol
                                  for NEMO Route Optimization  . . . . . . 1078--1100
        Mehmet Yunus Donmez and   
                 Sinan Isik and   
                      Cem Ersoy   Combined analysis of contention window
                                  size and duty cycle for throughput and
                                  energy optimization in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1101--1112
          M. A. Raayatpanah and   
        H. Salehi Fathabadi and   
               B. H. Khalaj and   
                  S. Khodayifar   Minimum cost multiple multicast network
                                  coding with quantized rates  . . . . . . 1113--1123
              Efe Karasabun and   
          Ibrahim Korpeoglu and   
                 Cevdet Aykanat   Active node determination for correlated
                                  data gathering in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1124--1138
                Donggyu Yun and   
                Jungseul Ok and   
              Bongjhin Shin and   
                Soobum Park and   
                        Yung Yi   Embedding of virtual network requests
                                  over static wireless multihop networks   1139--1152
                    Ji-Hoon Yun   Performance analysis of IEEE 802.11
                                  WLANs with rate adaptation in
                                  time-varying fading channels . . . . . . 1153--1166
            Pavlos Antoniou and   
        Andreas Pitsillides and   
              Tim Blackwell and   
        Andries Engelbrecht and   
                 Loizos Michael   Congestion control in wireless sensor
                                  networks based on bird flocking behavior 1167--1191
               Necati Kilic and   
                V. Cagri Gungor   Analysis of low power wireless links in
                                  smart grid environments  . . . . . . . . 1192--1203
              Gregory Detal and   
           Christoph Paasch and   
       Simon van der Linden and   
     Pascal Mérindol and   
              Gildas Avoine and   
            Olivier Bonaventure   Revisiting flow-based load balancing:
                                  Stateless path selection in data center
                                  networks . . . . . . . . . . . . . . . . 1204--1216
            Slavisa Aleksic and   
             Margot Deruyck and   
           Willem Vereecken and   
                Wout Joseph and   
             Mario Pickavet and   
                    Luc Martens   Energy efficiency of femtocell
                                  deployment in combined wireless/optical
                                  access networks  . . . . . . . . . . . . 1217--1233
              P. A. Baziana and   
             I. E. Pountourakis   An access protocol for efficiency
                                  optimization in WDM networks: a
                                  propagation delay and collisions
                                  avoidance analysis . . . . . . . . . . . 1234--1252
             Lucia D'Acunto and   
              Nitin Chiluka and   
  Tamás Vinkó and   
                      Henk Sips   BitTorrent-like P2P approaches for VoD:
                                  a comparative study  . . . . . . . . . . 1253--1276
         Daniele Casagrande and   
       Pier Luca Montessoro and   
               Franco Blanchini   Fair and optimal dynamic admission
                                  control of elastic flows . . . . . . . . 1277--1288
                Saeed Salah and   
Gabriel Maciá-Fernández and   
Jesús E. Díaz-Verdejo   A model-based survey of alert
                                  correlation techniques . . . . . . . . . 1289--1317
         Christian Esposito and   
          Domenico Cotroneo and   
                  Stefano Russo   On reliability in publish/subscribe
                                  services . . . . . . . . . . . . . . . . 1318--1343
                 Wenye Wang and   
                        Zhuo Lu   Cyber security in the Smart Grid: Survey
                                  and challenges . . . . . . . . . . . . . 1344--1371
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 57, Number 6, April 22, 2013

      Márton Csernai and   
András Gulyás and   
    Attila Körösi and   
      Balázs Sonkoly and   
          Gergely Biczók   Incrementally upgradable data center
                                  architecture using hyperbolic
                                  tessellations  . . . . . . . . . . . . . 1373--1393
   Christos Anagnostopoulos and   
       Stathes Hadjiefthymiades   Multivariate context collection in
                                  mobile sensor networks . . . . . . . . . 1394--1407
                 Kai-Wei Ke and   
                 Chia-Hui Huang   Performance evaluation of multisource
                                  Application Layer Multicast (ALM):
                                  Theoretical and simulative aspects . . . 1408--1424
               Urs Hunkeler and   
          Clemens Lombriser and   
           Hong Linh Truong and   
                     Beat Weiss   A case for centrally controlled wireless
                                  sensor networks  . . . . . . . . . . . . 1425--1442
Conrado Borraz-Sánchez and   
                  Diego Klabjan   Optimal placement of reconfigurable
                                  optical add/drop multiplexers with
                                  packing, blocking, and signal loss . . . 1443--1458
                 Adel Ali Ahmed   An enhanced real-time routing protocol
                                  with load distribution for mobile
                                  wireless sensor networks . . . . . . . . 1459--1473
                 Linjun Fan and   
              Yunxiang Ling and   
                   Tao Wang and   
                Xiaomin Zhu and   
                  Xiaoyong Tang   Novel clock synchronization algorithm of
                                  parametric difference for parallel and
                                  distributed simulations  . . . . . . . . 1474--1487
      Youghourta Benfattoum and   
              Steven Martin and   
               Khaldoun Al Agha   QoS for real-time reliable multicasting
                                  in wireless multi-hop networks using a
                                  Generation-Based Network Coding  . . . . 1488--1502
                  E. Amaldi and   
                  A. Capone and   
                  L. G. Gianoli   Energy-aware IP traffic engineering with
                                  shortest path routing  . . . . . . . . . 1503--1517
         Rajarshi Mahapatra and   
        Antonio De Domenico and   
                Rohit Gupta and   
      Emilio Calvanese Strinati   Green framework for future heterogeneous
                                  wireless networks  . . . . . . . . . . . 1518--1528
              Xiaoping Wang and   
                 Yunhao Liu and   
                 Zheng Yang and   
                     Kai Lu and   
                        Jun Luo   OFA: an optimistic approach to conquer
                                  flip ambiguity in network localization   1529--1544
              S. Chiappetta and   
             C. Mazzariello and   
                  R. Presta and   
                   S. P. Romano   An anomaly-based approach to the
                                  analysis of the social behavior of VoIP
                                  users  . . . . . . . . . . . . . . . . . 1545--1559
           Ryoichi Kawahara and   
             Tetsuya Takine and   
               Tatsuya Mori and   
           Noriaki Kamiyama and   
              Keisuke Ishibashi   Mean-variance relationship of the number
                                  of flows in traffic aggregation and its
                                  application to traffic management  . . . 1560--1576
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 57, Number 7, May 8, 2013

           S. H. Shah Newaz and   
        Ángel Cuevas and   
             Gyu Myoung Lee and   
           Noël Crespi and   
                  Jun Kyun Choi   Adaptive Delay-Aware Energy Efficient
                                  TDM-PON  . . . . . . . . . . . . . . . . 1577--1596
         Christian Facchini and   
             Oliver Holland and   
          Fabrizio Granelli and   
    Nelson L. S. da Fonseca and   
                  Hamid Aghvami   Dynamic green self-configuration of 3G
                                  base stations using fuzzy cognitive maps 1597--1610
                  Weibo Chu and   
              Xiaohong Guan and   
               Zhongmin Cai and   
                      Lixin Gao   Real-time volume control for interactive
                                  network traffic replay . . . . . . . . . 1611--1629
                Tobias Jung and   
             Sylvain Martin and   
             Mohamed Nassar and   
               Damien Ernst and   
                      Guy Leduc   Outbound SPIT filter with optimal
                                  performance guarantees . . . . . . . . . 1630--1643
               Jongwook Lee and   
              Jin-Ghoo Choi and   
                  Saewoong Bahk   Opportunistic downlink data delivery for
                                  mobile collaborative communities . . . . 1644--1655
               T. D. Lagkas and   
           P. Sarigiannidis and   
                       M. Louta   On analyzing the intra-frame power
                                  saving potentials of the IEEE 802.16e
                                  downlink vertical mapping  . . . . . . . 1656--1673
                  Weijie Wu and   
             John C. S. Lui and   
               Richard T. B. Ma   On incentivizing upload capacity in
                                  P2P-VoD systems: Design, analysis and
                                  evaluation . . . . . . . . . . . . . . . 1674--1688
              Wei Kuang Lai and   
                Chang-Lung Tang   QoS-aware downlink packet scheduling for
                                  LTE networks . . . . . . . . . . . . . . 1689--1698
          Cristina Rottondi and   
          Giacomo Verticale and   
                 Antonio Capone   Privacy-preserving smart metering with
                                  multiple data consumers  . . . . . . . . 1699--1713
        Javad Akbari Torkestani   An energy-efficient topology
                                  construction algorithm for wireless
                                  sensor networks  . . . . . . . . . . . . 1714--1725
               Ahmad Vakili and   
   Jean-Charles Grégoire   QoE management for video conferencing
                                  applications . . . . . . . . . . . . . . 1726--1738
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 57, Number 8, June 4, 2013

         Stamatios Arkoulis and   
        Evangelos Anifantis and   
         Vasileios Karyotis and   
       Symeon Papavassiliou and   
                Nikolaos Mitrou   On the optimal, fair and channel-aware
                                  cognitive radio network reconfiguration  1739--1757
László Gyarmati and   
András Gulyás and   
      Balázs Sonkoly and   
              Tuan A. Trinh and   
          Gergely Biczók   Free-scaling your data center  . . . . . 1758--1773
                 Gongqi Lin and   
                Sieteng Soh and   
               Kwan-Wu Chin and   
                Mihai Lazarescu   Efficient heuristics for energy-aware
                                  routing in networks with bundled links   1774--1788
              Giacomo Bacci and   
                    Marco Luise   QoS-aware game-theoretic rate & power
                                  control for CDMA wireless communication
                                  networks . . . . . . . . . . . . . . . . 1789--1804
               Shengbo Yang and   
              Chai Kiat Yeo and   
                    Bu Sung Lee   MaxCD: Efficient multi-flow scheduling
                                  and cooperative downloading for improved
                                  highway drive-thru Internet systems  . . 1805--1820
          Michele Rondinone and   
                Javier Gozalvez   Contention-based forwarding with
                                  multi-hop connectivity awareness in
                                  vehicular ad-hoc networks  . . . . . . . 1821--1837
        Giovanna Carofiglio and   
           Luca Muscariello and   
                Dario Rossi and   
              Claudio Testa and   
                 Silvio Valenti   Rethinking the Low Extra Delay
                                  Background Transport (LEDBAT) Protocol   1838--1852
      Zoltán Czirkos and   
     Gábor Hosszú   Solution for the broadcasting in the
                                  Kademlia peer-to-peer overlay  . . . . . 1853--1862
            Stefano Iellamo and   
                   Lin Chen and   
             Marceau Coupechoux   Proportional and double imitation rules
                                  for spectrum access in cognitive radio
                                  networks . . . . . . . . . . . . . . . . 1863--1879
         Alexandre A. Pires and   
      José F. de Rezende   Independent links: a new approach to
                                  increase spatial reuse in wireless
                                  networks . . . . . . . . . . . . . . . . 1880--1893
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 57, Number 9, June 19, 2013

                    Xi Fang and   
                 Dejun Yang and   
                   Guoliang Xue   Pathbook: Cross-layer optimization for
                                  full-duplex wireless networks  . . . . . 1895--1912
                Habib M. Ammari   On the energy-delay trade-off in
                                  geographic forwarding in always-on
                                  wireless sensor networks: a
                                  multi-objective optimization problem . . 1913--1935
               Michal Ficek and   
           Tomás Pop and   
             Lukás Kencl   Active tracking in mobile networks: an
                                  in-depth view  . . . . . . . . . . . . . 1936--1954
                L. Militano and   
                    A. Iera and   
                   F. Scarcello   A fair cooperative content-sharing
                                  service  . . . . . . . . . . . . . . . . 1955--1973
      Péter Babarczi and   
      Gergely Biczók and   
       Harald Òverby and   
      János Tapolcai and   
           Péter Soproni   Realization strategies of dedicated path
                                  protection: a bandwidth cost perspective 1974--1990
             Waleed Alsalih and   
                 Kashif Ali and   
               Hossam Hassanein   A power control technique for
                                  anti-collision schemes in RFID systems   1991--2003
                   A. Coiro and   
                M. Listanti and   
                 A. Valenti and   
                      F. Matera   Energy-aware traffic engineering: a
                                  routing-based distributed solution for
                                  connection-oriented IP networks  . . . . 2004--2020
         Juan Felipe Botero and   
              Xavier Hesselbach   Greener networking in a network
                                  virtualization environment . . . . . . . 2021--2039
                 Adil Fahad and   
                 Zahir Tari and   
             Ibrahim Khalil and   
              Ibrahim Habib and   
              Hussein Alnuweiri   Toward an efficient and scalable feature
                                  selection approach for Internet traffic
                                  classification . . . . . . . . . . . . . 2040--2057
              S. Gramatikov and   
             F. Jaureguizar and   
                 J. Cabrera and   
               N. García   Stochastic modelling of peer-assisted
                                  VoD streaming in managed networks  . . . 2058--2074
            Evariste Logota and   
              Carlos Campos and   
            Susana Sargento and   
                   Augusto Neto   Advanced multicast class-based bandwidth
                                  over-provisioning  . . . . . . . . . . . 2075--2092
             Giuseppe Aceto and   
              Alessio Botta and   
           Walter de Donato and   
              Antonio Pescap\`e   Cloud monitoring: a survey . . . . . . . 2093--2115
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 57, Number 10, July 5, 2013

          Stephan Eidenbenz and   
             Madhav Marathe and   
                   Arunabha Sen   Editorial for Computer Networks special
                                  issue on ``Towards a Science of Cyber
                                  Security'' . . . . . . . . . . . . . . . 2119--2120
           Chris J. Kuhlman and   
           V. S. Anil Kumar and   
                     S. S. Ravi   Controlling opinion propagation in
                                  online networks  . . . . . . . . . . . . 2121--2132
              Nam P. Nguyen and   
                Guanhua Yan and   
                     My T. Thai   Analysis of misinformation containment
                                  in online social networks  . . . . . . . 2133--2146
                    Yi Wang and   
           Marios Iliofotou and   
         Michalis Faloutsos and   
                         Bin Wu   Analyzing Communication Interaction
                                  Networks (CINs) in enterprises and
                                  inferring hierarchies  . . . . . . . . . 2147--2158
         Jaafar Almasizadeh and   
      Mohammad Abdollahi Azgomi   A stochastic model of attack process for
                                  the evaluation of security metrics . . . 2159--2180
             Bugra Caskurlu and   
              Ashish Gehani and   
       Cemal Cagatay Bilgin and   
                   K. Subramani   Analytical models for risk-based
                                  intrusion response . . . . . . . . . . . 2181--2192
              Udi Ben-Porat and   
          Anat Bremler-Barr and   
                    Hanoch Levy   On the exploitation of CDF based
                                  wireless scheduling  . . . . . . . . . . 2193--2205
                  Klaus Julisch   Understanding and overcoming cyber
                                  security anti-patterns . . . . . . . . . 2206--2211
                      Anonymous   Special Issue on ``Security and identity
                                  architecture for the future Internet''   2215--2217
            Tapio Levä and   
                 Miika Komu and   
           Ari Keränen and   
              Sakari Luukkainen   Adoption barriers of network layer
                                  protocols: the case of host identity
                                  protocol . . . . . . . . . . . . . . . . 2218--2232
Elena Torroglosa-García and   
Antonio D. Pérez-Morales and   
       Pedro Martinez-Julia and   
                 Diego R. Lopez   Integration of the OAuth and Web Service
                                  family security standards  . . . . . . . 2233--2249
                 Yang Xiang and   
                Xingang Shi and   
                Jianping Wu and   
              Zhiliang Wang and   
                        Xia Yin   Sign what you really care about ---
                                  Secure BGP AS-paths efficiently  . . . . 2250--2265
              Rodrigo Roman and   
              Jianying Zhou and   
                   Javier Lopez   On the features and challenges of
                                  security and privacy in distributed
                                  Internet of Things . . . . . . . . . . . 2266--2279
       Pedro Martinez-Julia and   
            Antonio F. Skarmeta   Beyond the separation of identifier and
                                  locator: Building an identity-based
                                  overlay network architecture for the
                                  Future Internet  . . . . . . . . . . . . 2280--2300
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 57, Number 11, August 5, 2013

            Paola Cappanera and   
            Luciano Lenzini and   
            Alessandro Lori and   
              Giovanni Stea and   
               Gigliola Vaglini   Optimal joint routing and link
                                  scheduling for real-time traffic in TDMA
                                  Wireless Mesh Networks . . . . . . . . . 2301--2312
                 Soham Sengupta   An approach to provide a network layer
                                  security model with QR code generated
                                  with shuffled GPS parameters as embedded
                                  keys traveling over Internet using
                                  existing IPv4 mechanism  . . . . . . . . 2313--2330
            Fabien Tarissan and   
              Bruno Quoitin and   
     Pascal Mérindol and   
              Benoit Donnet and   
       Jean-Jacques Pansiot and   
                Matthieu Latapy   Towards a bipartite graph modeling of
                                  the Internet topology  . . . . . . . . . 2331--2347
              Xiao-Yang Liu and   
               Kai-Liang Wu and   
                 Yanmin Zhu and   
                Linghe Kong and   
                     Min-You Wu   Mobility increases the surface coverage
                                  of distributed sensor networks . . . . . 2348--2363
            Md. Nooruzzaman and   
             Osanori Koyama and   
               Yutaka Katsuyama   Congestion removing performance of
                                  stackable ROADM in WDM networks under
                                  dynamic traffic  . . . . . . . . . . . . 2364--2373
      Mirjana D. Stojanovic and   
Aleksandra M. Kostic-Ljubisavljevic and   
   Vesna M. Radonjic-Djogatovic   SLA-controlled interconnection charging
                                  in next generation networks  . . . . . . 2374--2394

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 57, Number 12, August 20, 2013

          Kenneth J. Turner and   
                 Evan H. Magill   Special Issue on feature interaction in
                                  communications and software systems  . . 2395--2398
                  Sven Apel and   
        Alexander von Rhein and   
           Thomas Thüm and   
         Christian Kästner   Feature-interaction detection based on
                                  feature-based specifications . . . . . . 2399--2409
                 M. Kolberg and   
               J. F. Buford and   
                   K. Dhara and   
                      X. Wu and   
                V. Krishnaswamy   Feature interaction in a federated
                                  communications-enabled collaboration
                                  platform . . . . . . . . . . . . . . . . 2410--2428
         Claire Maternaghan and   
              Kenneth J. Turner   Policy conflicts in home automation  . . 2429--2441
          Masahide Nakamura and   
            Kousuke Ikegami and   
             Shinsuke Matsumoto   Considering impacts and requirements for
                                  better understanding of environment
                                  interactions in home network services    2442--2453
             Thein Than Tun and   
                Robin Laney and   
                   Yijun Yu and   
                Bashar Nuseibeh   Specifying software features for
                                  composition: a tool-supported approach   2454--2464
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 57, Number 13, September 9, 2013

                 Yusung Kim and   
                     Ikjun Yeom   Performance analysis of in-network
                                  caching for content-centric networking   2465--2482
            Chao-Tsun Chang and   
            Chih-Yung Chang and   
               Tzu-Lin Wang and   
                    Yun-Jung Lu   Throughput enhancement by exploiting
                                  spatial reuse opportunities with smart
                                  antenna systems in wireless ad hoc
                                  networks . . . . . . . . . . . . . . . . 2483--2498
Jérémy Serror and   
                   Hui Zang and   
                  Jean C. Bolot   Measurement and modeling of paging
                                  channel overloads on a cellular network  2499--2513
               Hui-Tang Lin and   
               Ying-You Lin and   
                  Chung-Jui Sun   Efficient and adaptive resource
                                  scheduling in IEEE 802.16j transparent
                                  relay networks . . . . . . . . . . . . . 2514--2535
              Klaus Wehmuth and   
                  Artur Ziviani   DACCER: Distributed Assessment of the
                                  Closeness CEntrality Ranking in complex
                                  networks . . . . . . . . . . . . . . . . 2536--2548
       Jaehoon (Paul) Jeong and   
                    Tian He and   
                 David H. C. Du   TMA: Trajectory-based Multi-Anycast
                                  forwarding for efficient multicast data
                                  delivery in vehicular networks . . . . . 2549--2563
             Silvia Boiardi and   
             Antonio Capone and   
          Brunilde Sansó   Radio planning of energy-aware cellular
                                  networks . . . . . . . . . . . . . . . . 2564--2577
               Hasan Tuncer and   
           Andres Kwasinski and   
                 Nirmala Shenoy   Performance analysis of Virtual Mobility
                                  Domain scheme vs. IPv6 mobility
                                  protocols  . . . . . . . . . . . . . . . 2578--2596
                 Tolga Acar and   
              Mira Belenkiy and   
Alptekin Küpçü   Single password authentication . . . . . 2597--2614
               Jeng-Wei Lee and   
              I-Hsun Chuang and   
              Win-Bin Huang and   
                  Yau-Hwang Kuo   An opportunistic resource allocation
                                  approach for mixed QoS and non-QoS
                                  connections in OFDMA wireless networks   2615--2627
              Seungwon Shin and   
                 Zhaoyan Xu and   
                      Guofei Gu   EFFORT: a new host-network cooperated
                                  framework for efficient and effective
                                  bot malware detection  . . . . . . . . . 2628--2642
              Ben-Jye Chang and   
            Ying-Hsin Liang and   
                   Yu-Hsien Lee   Dynamic-cost-reward connection admission
                                  control for maximizing system reward in
                                  $4$G wireless multihop relaying networks 2643--2655
   Natalia Castro Fernandes and   
Marcelo Duffles Donato Moreira and   
Otto Carlos Muniz Bandeira Duarte   Safeguarding ad hoc networks with a
                                  self-organized membership control system 2656--2674
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 57, Number 14, October 4, 2013

                B. Bellalta and   
                  A. Faridi and   
                 D. Staehle and   
                 J. Barcelo and   
                   A. Vinel and   
                      M. Oliver   Performance analysis of CSMA/CA
                                  protocols with multi-packet transmission 2675--2688
              Pengfei Zhang and   
                 Gaoxi Xiao and   
                  Hwee-Pink Tan   Clustering algorithms for maximizing the
                                  lifetime of wireless sensor networks
                                  with energy-harvesting sensors . . . . . 2689--2704
                  Hung-Yu Chien   Combining Rabin cryptosystem and error
                                  correction codes to facilitate anonymous
                                  authentication with un-traceability for
                                  low-end devices  . . . . . . . . . . . . 2705--2717
        José Camacho and   
              Pablo Padilla and   
Pedro García-Teodoro and   
Jesús Díaz-Verdejo   A generalizable dynamic flow pairing
                                  method for traffic classification  . . . 2718--2732
                Hai-Heng Ng and   
               Wee-Seng Soh and   
                   Mehul Motani   An underwater acoustic MAC protocol
                                  using reverse opportunistic packet
                                  appending  . . . . . . . . . . . . . . . 2733--2751
                  F. Bouali and   
                 O. Sallent and   
     J. Pérez-Romero and   
               R. Agustí   A cognitive management framework for
                                  spectrum selection . . . . . . . . . . . 2752--2765
      Ibrahima Diarrassouba and   
                Ali Lourimi and   
          Ali Ridha Mahjoub and   
                  Habib Youssef   Hose workload based exact algorithm for
                                  the optimal design of virtual private
                                  networks . . . . . . . . . . . . . . . . 2766--2774
          Florian Tschorsch and   
         Björn Scheuermann   An algorithm for privacy-preserving
                                  distributed user statistics  . . . . . . 2775--2787
                    Ze Wang and   
               Yunlong Wang and   
                   Maode Ma and   
                      Jigang Wu   Efficient localization for mobile sensor
                                  networks based on constraint rules
                                  optimized Monte Carlo method . . . . . . 2788--2801
           Giuseppe Rossini and   
                Dario Rossi and   
         Christophe Betoule and   
               Remi Clavier and   
                Gilles Thouenon   FIB Aplasia through probabilistic
                                  routing and autoforwarding . . . . . . . 2802--2816
             Dariusz Gasior and   
                   Maciej Drwal   Pareto-optimal Nash equilibrium in
                                  capacity allocation game for
                                  self-managed networks  . . . . . . . . . 2817--2832
         Delfina Malandrino and   
               Vittorio Scarano   Privacy leakage on the Web: Diffusion
                                  and countermeasures  . . . . . . . . . . 2833--2855
               Kai-Lung Hua and   
               Ge-Ming Chiu and   
              Hsing-Kuo Pao and   
                   Yi-Chi Cheng   An efficient scheduling algorithm for
                                  scalable video streaming over P2P
                                  networks . . . . . . . . . . . . . . . . 2856--2868
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 57, Number 15, October 29, 2013

               Sunheui Ryoo and   
               Changhee Joo and   
                  Saewoong Bahk   Location-based spectrum allocation and
                                  partitioning scheme for cross-tier
                                  interference mitigation in
                                  macro-femtocell networks . . . . . . . . 2869--2879
                 Mingwei Xu and   
               Yunfei Shang and   
                     Dan Li and   
                       Xin Wang   Greening data center networks with
                                  throughput-guaranteed power-aware
                                  routing  . . . . . . . . . . . . . . . . 2880--2899
                 Xiang Meng and   
              Pui-Sze Tsang and   
                  King-Shan Lui   Analysis of distribution time of
                                  multiple files in a P2P network  . . . . 2900--2915
              Yuh-Rong Chen and   
      Sridhar Radhakrishnan and   
            Sudarshan Dhall and   
               Suleyman Karabuk   On multi-stream multi-source multicast
                                  routing  . . . . . . . . . . . . . . . . 2916--2930
          Luca Chiaraviglio and   
          Antonio Cianfrani and   
           Esther Le Rouzic and   
                Marco Polverini   Sleep modes effectiveness in backbone
                                  networks with limited configurations . . 2931--2948
              Duc Minh Pham and   
             Syed Mahfuzul Aziz   Object extraction scheme and protocol
                                  for energy efficient image communication
                                  over wireless sensor networks  . . . . . 2949--2960
        Khalim Amjad Meerja and   
                 Pin-Han Ho and   
                     Bin Wu and   
                   Hsiang-Fu Yu   Media access protocol for a coexisting
                                  cognitive femtocell network  . . . . . . 2961--2975
               Xudong Xiang and   
              Jianxiong Wan and   
                 Chuang Lin and   
                       Xin Chen   A dynamic programming approximation for
                                  downlink channel allocation in cognitive
                                  femtocell networks . . . . . . . . . . . 2976--2991
          Pramila Mouttappa and   
              Stephane Maag and   
                    Ana Cavalli   Using passive testing based on symbolic
                                  execution and slicing techniques:
                                  Application to the validation of
                                  communication protocols  . . . . . . . . 2992--3008
                    Chao Hu and   
                  Ming Chen and   
                  Changyou Xing   Towards efficient video chunk
                                  dissemination in peer-to-peer live
                                  streaming  . . . . . . . . . . . . . . . 3009--3024
              Stefania Tosi and   
              Sara Casolari and   
              Michele Colajanni   Data clustering based on correlation
                                  analysis applied to highly variable
                                  domains  . . . . . . . . . . . . . . . . 3025--3038
                  Chao Zhou and   
             Xinggong Zhang and   
                   Zongming Guo   Optimal adaptive channel scheduling for
                                  scalable video broadcasting over MIMO
                                  wireless networks  . . . . . . . . . . . 3039--3050
          Luca Chiaraviglio and   
               Delia Ciullo and   
               Marco Mellia and   
                    Michela Meo   Modeling sleep mode gains in
                                  energy-aware networks  . . . . . . . . . 3051--3066
                Karim Habak and   
           Moustafa Youssef and   
               Khaled A. Harras   An optimal deployable bandwidth
                                  aggregation system . . . . . . . . . . . 3067--3080
           Noriaki Kamiyama and   
           Ryoichi Kawahara and   
              Haruhisa Hasegawa   Optimum profit allocation in coalitional
                                  VoD service  . . . . . . . . . . . . . . 3081--3097
             Sabrina Sicari and   
      Alberto Coen-Porisini and   
                 Roberto Riggio   DARE: evaluating Data Accuracy using
                                  node REputation  . . . . . . . . . . . . 3098--3111
                      Anonymous   Editorial Board  . . . . . . . . . . . . ??

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 57, Number 16, November 13, 2013

               Andrea Detti and   
               Diego Perino and   
                Mario Gerla and   
                   Yanghee Choi   Editorial: Special issue on Information
                                  Centric Networking . . . . . . . . . . . 3113--3115
              G. Carofiglio and   
                G. Morabito and   
             L. Muscariello and   
                   I. Solis and   
                    M. Varvello   From content delivery today to
                                  information centric networking . . . . . 3116--3127
             Guoqiang Zhang and   
                    Yang Li and   
                        Tao Lin   Caching in information centric
                                  networking: a survey . . . . . . . . . . 3128--3141
               HyunYong Lee and   
                  Akihiro Nakao   User-assisted in-network caching in
                                  information-centric networking . . . . . 3142--3153
                     S. Eum and   
                K. Nakauchi and   
                  M. Murata and   
                   Y. Shoji and   
                   N. Nishinaga   Potential based routing as a secondary
                                  best-effort routing for Information
                                  Centric Networking (ICN) . . . . . . . . 3154--3164
                    Yi Wang and   
                Huichen Dai and   
                 Ting Zhang and   
                   Wei Meng and   
                 Jindou Fan and   
                        Bin Liu   GPU-accelerated name lookup with
                                  component encoding . . . . . . . . . . . 3165--3177
                Mauro Conti and   
                Paolo Gasti and   
                    Marco Teoli   A lightweight mechanism for detection of
                                  cache pollution attacks in Named Data
                                  Networking . . . . . . . . . . . . . . . 3178--3191
     Matthias Wählisch and   
          Thomas C. Schmidt and   
              Markus Vahlenkamp   Backscatter from the data plane ---
                                  Threats to stability and security in
                                  information-centric network
                                  infrastructure . . . . . . . . . . . . . 3192--3206
                 S. Salsano and   
         N. Blefari-Melazzi and   
                   A. Detti and   
                G. Morabito and   
                      L. Veltri   Information centric networking over SDN
                                  and OpenFlow: Architectural aspects and
                                  experiments on the OFELIA testbed  . . . 3207--3221
              Marica Amadeo and   
            Claudia Campolo and   
             Antonella Molinaro   Enhancing content-centric networking for
                                  vehicular environments . . . . . . . . . 3222--3234
     H. M. N. Dilum Bandara and   
            Anura P. Jayasumana   Distributed, multi-user,
                                  multi-application, and multi-sensor data
                                  fusion over named data networks  . . . . 3235--3248
                 Ben Tagger and   
               Dirk Trossen and   
     Alexandros Kostopoulos and   
              Stuart Porter and   
                 George Parisis   Realising an application environment for
                                  information-centric networking . . . . . 3249--3266

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 57, Number 17, December 9, 2013

      Luiz Filipe M. Vieira and   
                Mario Gerla and   
                   Archan Misra   Fundamental limits on end-to-end
                                  throughput of network coding in
                                  multi-rate and multicast wireless
                                  networks . . . . . . . . . . . . . . . . 3267--3275
        Marco Ajmone Marsan and   
          Luca Chiaraviglio and   
               Delia Ciullo and   
                    Michela Meo   On the effectiveness of single and
                                  multiple base station sleep modes in
                                  cellular networks  . . . . . . . . . . . 3276--3290
               Xiaohui Chen and   
                    Jing Xu and   
                   Wei Yuan and   
                    Wei Liu and   
                  Wenqing Cheng   Channel assignment in heterogeneous
                                  multi-radio multi-channel wireless
                                  networks: a game theoretic approach  . . 3291--3299
              Elena Baralis and   
              Andrea Bianco and   
          Tania Cerquitelli and   
          Luca Chiaraviglio and   
                   Marco Mellia   NetCluster: a clustering-based framework
                                  to analyze Internet passive measurements
                                  data . . . . . . . . . . . . . . . . . . 3300--3315
         Ricardo C. Carrano and   
               Diego Passos and   
Luiz C. S. Magalhães and   
 Célio V. N. Albuquerque   Nested block designs: Flexible and
                                  efficient schedule-based asynchronous
                                  duty cycling . . . . . . . . . . . . . . 3316--3326
              Honghuing Liu and   
          Patrick P. C. Lee and   
                 John C. S. Lui   On the credit evolution of credit-based
                                  incentive protocols in wireless mesh
                                  networks . . . . . . . . . . . . . . . . 3327--3343
               Genki Matsui and   
           Takuji Tachibana and   
          Yukinori Nakamura and   
                 Kenji Sugimoto   Distributed power adjustment based on
                                  control theory for cognitive radio
                                  networks . . . . . . . . . . . . . . . . 3344--3356
 João Marco C. Silva and   
             Paulo Carvalho and   
              Solange Rito Lima   A multiadaptive sampling technique for
                                  cost-effective network measurements  . . 3357--3369
        Zoltán Faigl and   
 László Bokor and   
              Jani Pellikka and   
                  Andrei Gurtov   Suitability analysis of existing and new
                                  authentication methods for future 3GPP
                                  Evolved Packet Core  . . . . . . . . . . 3370--3388
            Eleonora Borgia and   
          Giuseppe Anastasi and   
                    Marco Conti   Energy efficient and reliable data
                                  delivery in urban sensing applications:
                                  a performance analysis . . . . . . . . . 3389--3409
              B. Hagelstein and   
               M. Abolhasan and   
                D. Franklin and   
                      F. Safaei   Improving fairness in IEEE 802.11
                                  networks using MAC layer opportunistic
                                  retransmission . . . . . . . . . . . . . 3410--3427
                   Lei Chen and   
                        Di Yuan   Mathematical modeling for optimal design
                                  of in-building distributed antenna
                                  systems  . . . . . . . . . . . . . . . . 3428--3445
                A. Coluccia and   
               A. D'Alconzo and   
                    F. Ricciato   Distribution-based anomaly detection via
                                  generalized likelihood ratio test: a
                                  general Maximum Entropy approach . . . . 3446--3462
             K. Avrachenkov and   
                  U. Ayesta and   
                  J. Doncel and   
                       P. Jacko   Congestion control of TCP flows in
                                  Internet routers by means of index
                                  policy . . . . . . . . . . . . . . . . . 3463--3478
           Nicola Cordeschi and   
          Mohammad Shojafar and   
                Enzo Baccarelli   Energy-saving self-configuring networked
                                  data centers . . . . . . . . . . . . . . 3479--3491
               Chengzhe Lai and   
                     Hui Li and   
                Rongxing Lu and   
          Xuemin (Sherman) Shen   SE-AKA: a secure and efficient group
                                  authentication and key agreement
                                  protocol for LTE networks  . . . . . . . 3492--3510
              Ce-Kuen Shieh and   
                 Chia-Yu Yu and   
              Cheng-Han Lin and   
                J. Morris Chang   Efficiency-driven selection of bandwidth
                                  request mechanism in broadband wireless
                                  access networks  . . . . . . . . . . . . 3511--3521
                  Peng Zhou and   
                  Xiapu Luo and   
                   Ang Chen and   
              Rocky K. C. Chang   SGor: Trust graph based onion routing    3522--3544
     Glaucio H. S. Carvalho and   
             Isaac Woungang and   
           Alagan Anpalagan and   
     Rodolfo W. L. Coutinho and   
     João C. W. A. Costa   A semi-Markov decision process-based
                                  joint call admission control for
                                  inter-RAT cell re-selection in next
                                  generation wireless networks . . . . . . 3545--3562
                   Jihun Ha and   
                   Jiung Yu and   
                Byungjo Kim and   
                     Hyogon Kim   On UDP continuity over vertical
                                  handovers  . . . . . . . . . . . . . . . 3563--3580
                    Le Wang and   
                   Jukka Manner   Energy-efficient mobile web in a bundle  3581--3600
               Nuutti Varis and   
               Jukka Manner and   
     Mikko Särelä and   
                   Timo Kiravuo   DBridges: Flexible floodless frame
                                  forwarding . . . . . . . . . . . . . . . 3601--3616
             Byung-Gook Kim and   
             Jeong-Ahn Kwon and   
                   Jang-Won Lee   Subchannel allocation for the
                                  OFDMA-based femtocell system . . . . . . 3617--3629
                 Yuxin Meng and   
                 Wenjuan Li and   
                   Lam-For Kwok   Towards adaptive character
                                  frequency-based exclusive signature
                                  matching scheme and its applications in
                                  distributed intrusion detection  . . . . 3630--3640
                 M. Manzano and   
                   E. Calle and   
          V. Torres-Padrosa and   
                 J. Segovia and   
                       D. Harle   Endurance: a new robustness measure for
                                  complex networks under multiple failure
                                  scenarios  . . . . . . . . . . . . . . . 3641--3653
                 Emre Atsan and   
        Öznur Özkasap   SCALAR: Scalable data lookup and
                                  replication protocol for mobile ad hoc
                                  networks . . . . . . . . . . . . . . . . 3654--3672
Martín Zubeldía and   
     Andrés Ferragut and   
              Fernando Paganini   Overcoming performance pitfalls in
                                  rate-diverse high speed WLANs  . . . . . 3673--3685
                Matjaz Fras and   
               Joze Mohorko and   
                    Zarko Cucej   Limitations of a Mapping Algorithm with
                                  Fragmentation Mimics (MAFM) when
                                  modeling statistical data sources based
                                  on measured packet network traffic . . . 3686--3700
                 Cuiqin Hou and   
                  Yibin Hou and   
                 Zhangqin Huang   A framework based on barycentric
                                  coordinates for localization in wireless
                                  sensor networks  . . . . . . . . . . . . 3701--3712
              Liliana Bolea and   
  Jordi Pérez-Romero and   
     Ramón Agustí   ML aided context feature extraction for
                                  cognitive radio  . . . . . . . . . . . . 3713--3727
               A. Iacovazzi and   
               A. D'Alconzo and   
                F. Ricciato and   
                    M. Burkhart   Elementary secure-multiparty computation
                                  for massive-scale collaborative network
                                  monitoring: a quantitative assessment    3728--3742
        Giovanna Carofiglio and   
              Massimo Gallo and   
               Luca Muscariello   On the performance of bandwidth and
                                  storage sharing in information-centric
                                  networks . . . . . . . . . . . . . . . . 3743--3758

Computer Networks (Amsterdam, Netherlands: 1999)
Volume 57, Number 18, December 24, 2013

Angelos-Christos G. Anadiotis and   
  Charalampos Z. Patrikakis and   
            Iakovos S. Venieris   On the performance improvement of gossip
                                  protocols for content-based
                                  publish-subscribe through caching  . . . 3759--3772
                   Peng Lin and   
         Alan Kai-Hau Yeung and   
           Angus Kin-Yeung Wong   Multi-portal association based
                                  dispatching and a virtual-queue method
                                  in wireless mesh networks  . . . . . . . 3773--3789
                  Nadine Akkari   An IMS-based integration architecture
                                  for WiMax/LTE handover . . . . . . . . . 3790--3798
                 Yifeng Cai and   
   Konstantinos Pelechrinis and   
                   Xin Wang and   
     Prashant Krishnamurthy and   
                       Yijun Mo   Joint reactive jammer detection and
                                  localization in an enterprise WiFi
                                  network  . . . . . . . . . . . . . . . . 3799--3811
              Fatemeh Ghods and   
              Hamed Yousefi and   
Ali Mohammad Afshin Hemmatyar and   
                   Ali Movaghar   MC-MLAS: Multi-channel Minimum Latency
                                  Aggregation Scheduling in Wireless
                                  Sensor Networks  . . . . . . . . . . . . 3812--3825
             Elias Bou-Harb and   
             Mourad Debbabi and   
                     Chadi Assi   A systematic approach for detecting and
                                  clustering distributed cyber scanning    3826--3839
                Baozhi Chen and   
                  Dario Pompili   Minimizing position uncertainty for
                                  under-ice autonomous underwater vehicles 3840--3854
                 Zohar Naor and   
                   Sajal K. Das   A scalable framework for mobile
                                  real-time group communication services   3855--3865
             Seung Yeob Nam and   
         Sirojiddin Djuraev and   
                     Minho Park   Collaborative approach to mitigating ARP
                                  poisoning-based Man-in-the-Middle
                                  attacks  . . . . . . . . . . . . . . . . 3866--3884
                    Wen Sun and   
                      Yu Ge and   
                Wai-Choong Wong   A lightweight distributed scheme for
                                  mitigating inter-user interference in
                                  body sensor networks . . . . . . . . . . 3885--3896
       Ignasi Paredes-Oliva and   
            Pere Barlet-Ros and   
       Xenofontas Dimitropoulos   FaRNet: Fast recognition of
                                  high-dimensional patterns from big
                                  network traffic data . . . . . . . . . . 3897--3913
          Zakwan Al-Arnaout and   
                   Qiang Fu and   
                   Marcus Frean   A divide-and-conquer approach for
                                  content replication in WMNs  . . . . . . 3914--3928
                 Weigang Wu and   
               Jiannong Cao and   
                   Hejun Wu and   
                    Jingjing Li   Robust and dynamic data aggregation in
                                  wireless sensor networks: a cross-layer
                                  approach . . . . . . . . . . . . . . . . 3929--3940
               Seung-Ho Lee and   
              Han-You Jeong and   
                  Seung-Woo Seo   Optimal pricing and capacity
                                  partitioning for tiered access service
                                  in virtual networks  . . . . . . . . . . 3941--3956
                 Wanzhi Qiu and   
            Efstratios Skafidas   Distributed routing for signal detection
                                  in wireless sensor networks  . . . . . . 3957--3966
         Mohammad Rajiullah and   
               Reine Lundin and   
             Anna Brunstrom and   
                Stefan Lindskog   Performance analysis and improvement of
                                  PR-SCTP for small messages . . . . . . . 3967--3986
                 Zhenhua Wu and   
                      Yu Hen Hu   How many wireless resources are needed
                                  to resolve the hidden terminal problem?  3987--3996
     Giovanni Accongiagioco and   
           Matteo Andreozzi and   
         Daniele Migliorini and   
                  Giovanni Stea   Throughput-optimal resource allocation
                                  in LTE-Advanced with distributed
                                  antennas . . . . . . . . . . . . . . . . 3997--4009
          M. Sarper Gokturk and   
               Ozgur Gurbuz and   
                     Elza Erkip   A cross-layer multi-hop cooperative
                                  network architecture for wireless ad hoc
                                  networks . . . . . . . . . . . . . . . . 4010--4029
              Tahir Mehmood and   
                Lavy Libman and   
      Hooman Reisi Dehkordi and   
                  Sanjay K. Jha   Optimal opportunistic routing and
                                  network coding for bidirectional
                                  wireless flows . . . . . . . . . . . . . 4030--4046
       Shahabeddin Geravand and   
                 Mahmood Ahmadi   Bloom filter applications in network
                                  security: a state-of-the-art survey  . . 4047--4064


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 58, Number ??, January 15, 2014

            Ian F. Akyildiz and   
                    Harry Rudin   Editorial  . . . . . . . . . . . . . . . 1--1
                Sangman Cho and   
     Srinivasan Ramasubramanian   Localizing link failures in all-optical
                                  networks using monitoring tours  . . . . 2--12
                   R. Block and   
              G. T. Peeters and   
                   B. Van Houdt   A branching process approach to compute
                                  the delay and energy efficiency of tree
                                  algorithms with free access  . . . . . . 13--28
                Haomin Yang and   
               Yaoxue Zhang and   
                Yuezhi Zhou and   
                Xiaoming Fu and   
                    Hao Liu and   
        Athanasios V. Vasilakos   Provably secure three-party
                                  authenticated key agreement protocol
                                  using smart cards  . . . . . . . . . . . 29--38
            Kyoung-Hak Jung and   
               Hyo-Ryun Lee and   
               Wan-Seon Lim and   
                  Young-Joo Suh   An adaptive collision resolution scheme
                                  for energy efficient communication in
                                  IEEE 802.15.4 networks . . . . . . . . . 39--57
      Mohammad Faisal Uddin and   
                 Chadi Assi and   
                    Ali Ghrayeb   Joint optimal AF relay assignment and
                                  power allocation in wireless cooperative
                                  networks . . . . . . . . . . . . . . . . 58--69
    Manuel Gil Pérez and   
           Juan E. Tapiador and   
              John A. Clark and   
Gregorio Martínez Pérez and   
Antonio F. Skarmeta Gómez   Trustworthy placements: Improving
                                  quality and resilience in collaborative
                                  attack detection . . . . . . . . . . . . 70--86
               Wenjie Zhang and   
                  Chai Kiat Yeo   Sequential sensing based spectrum
                                  handoff in cognitive radio networks with
                                  multiple users . . . . . . . . . . . . . 87--98
            Kuzman Katkalov and   
               Nina Moebius and   
               Kurt Stenzel and   
               Marian Borek and   
                  Wolfgang Reif   Modeling test cases for security
                                  protocols with SecureMDD . . . . . . . . 99--111
                  Lihua Dou and   
               Yunchuan Wei and   
                         Jun Ni   Multi-user wireless channel probing for
                                  shared key generation with a fuzzy
                                  controller . . . . . . . . . . . . . . . 112--126
                 Xiaofei Wu and   
                   Xin Wang and   
                      Ke Yu and   
                    Frank Y. Li   A measurement-based study on the
                                  correlations of inter-domain Internet
                                  application flows  . . . . . . . . . . . 127--140
                Wei-Min Yao and   
                    Sonia Fahmy   Flow-based partitioning of network
                                  testbed experiments  . . . . . . . . . . 141--157
              Jin Cheol Kim and   
                   Younghee Lee   An end-to-end measurement and monitoring
                                  technique for the bottleneck link
                                  capacity and its available bandwidth . . 158--179
               Laura Carrea and   
           Alexei Vernitski and   
                    Martin Reed   Optimized hash for network path encoding
                                  with minimized false positives . . . . . 180--191
               Hars Vardhan and   
            Seong-Ryong Ryu and   
           Bhaskar Banerjee and   
                   Ravi Prakash   60 GHz wireless links in data center
                                  networks . . . . . . . . . . . . . . . . 192--205
                Micah Sherr and   
                Harjot Gill and   
          Taher Aquil Saeed and   
                 Andrew Mao and   
         William R. Marczak and   
     Saravana Soundararajan and   
               Wenchao Zhou and   
              Boon Thau Loo and   
                     Matt Blaze   The design and implementation of the $
                                  A^3 $ application-aware anonymity
                                  platform . . . . . . . . . . . . . . . . 206--227
              Hung-Quoc Lai and   
                   Yan Chen and   
                  K. J. Ray Liu   Energy efficient cooperative
                                  communications using coalition formation
                                  games  . . . . . . . . . . . . . . . . . 228--238
                  A. Shawky and   
                   R. Olsen and   
                J. Pedersen and   
                    H. Schwefel   Network aware dynamic context
                                  subscription management  . . . . . . . . 239--253
             Mohamed Younis and   
           Izzet F. Senturk and   
               Kemal Akkaya and   
              Sookyoung Lee and   
                    Fatih Senel   Topology management techniques for
                                  tolerating node failures in wireless
                                  sensor networks: a survey  . . . . . . . 254--283


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 59, Number ??, February 11, 2014

        Lluis Pamies-Juarez and   
       Marc Sanchez-Artigas and   
Pedro García-López and   
Rubén Mondéjar and   
                Rahma Chaabouni   On the interplay between data redundancy
                                  and retrieval times in P2P storage
                                  systems  . . . . . . . . . . . . . . . . 1--16
         Ali Dabirmoghaddam and   
              Majid Ghaderi and   
               Carey Williamson   On the optimal randomized clustering in
                                  distributed sensor networks  . . . . . . 17--32
           Naser M. Asghari and   
                 M. Mandjes and   
                    Anwar Walid   Energy-efficient scheduling in
                                  multi-core servers . . . . . . . . . . . 33--43
            Vasilis Sourlas and   
              Paris Flegkas and   
             Leandros Tassiulas   A novel cache aware routing scheme for
                                  Information-Centric Networks . . . . . . 44--61
             Xiaoning Zhang and   
                Haoran Wang and   
                     Zian Zhang   Survivable green IP over WDM networks
                                  against double-link failures . . . . . . 62--76
        Rubén Cuevas and   
             Michal Kryczka and   
    Roberto González and   
               Angel Cuevas and   
                 Arturo Azcorra   TorrentGuard: Stopping scam and malware
                                  distribution in the BitTorrent ecosystem 77--90
                Sinan Toklu and   
                 O. Ayhan Erdem   BSC-MAC: Energy efficiency in wireless
                                  sensor networks with base station
                                  control  . . . . . . . . . . . . . . . . 91--100
                  Tu Ouyang and   
                 Soumya Ray and   
                Mark Allman and   
             Michael Rabinovich   A large-scale empirical analysis of
                                  email spam detection through network
                                  characteristics in a stand-alone
                                  enterprise . . . . . . . . . . . . . . . 101--121
            Mathias Fischer and   
                Sascha Grau and   
               Giang Nguyen and   
               Guenter Schaefer   Resilient and underlay-aware P2P
                                  live-streaming . . . . . . . . . . . . . 122--136
           Alia Asheralieva and   
                 Kaushik Mahata   A two-step resource allocation procedure
                                  for LTE-based cognitive radio network    137--152
               Florin Coras and   
      Jordi Domingo-Pascual and   
                Fabio Maino and   
             Dino Farinacci and   
       Albert Cabellos-Aparicio   Lcast: Software-defined inter-domain
                                  multicast  . . . . . . . . . . . . . . . 153--170
              Elias Yaacoub and   
                Adnan Abu-Dayya   Automatic meter reading in the smart
                                  grid using contention based random
                                  access over the free cellular spectrum   171--183
             Jaeseong Jeong and   
               Kyunghan Lee and   
                    Yung Yi and   
                Injong Rhee and   
                     Song Chong   ExMin: a routing metric for novel
                                  opportunity gain in Delay Tolerant
                                  Networks . . . . . . . . . . . . . . . . 184--196
               Yangyang Liu and   
                   Le Chang and   
                   Jianping Pan   On the performance and fairness of
                                  BitTorrent-like data swarming systems
                                  with NAT devices . . . . . . . . . . . . 197--212
    Seyedeh Leili Mirtaheri and   
                 Mohsen Sharifi   An efficient resource discovery
                                  framework for pure unstructured
                                  peer-to-peer systems . . . . . . . . . . 213--226
                 Mingwei Xu and   
                   Shu Yang and   
                   Dan Wang and   
                    Jianping Wu   Efficient Two Dimensional-IP routing: an
                                  incremental deployment design  . . . . . 227--243
       Giorgos Papastergiou and   
          Ioannis Alexiadis and   
             Scott Burleigh and   
           Vassilis Tsaoussidis   Delay Tolerant Payload Conditioning
                                  protocol . . . . . . . . . . . . . . . . 244--263


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 60, Number ??, February 26, 2014

            Josselin Vallet and   
                   Olivier Brun   Online OSPF weights optimization in IP
                                  networks . . . . . . . . . . . . . . . . 1--12
                 W. Ramirez and   
             X. Masip-Bruin and   
                M. Yannuzzi and   
           R. Serral-Gracia and   
                A. Martinez and   
                 M. S. Siddiqui   A survey and taxonomy of ID/Locator
                                  Split Architectures  . . . . . . . . . . 13--33
               Adele L. Jia and   
               Xiaowei Chen and   
                Xiaowen Chu and   
          Johan A. Pouwelse and   
               Dick H. J. Epema   User behaviors in private BitTorrent
                                  communities  . . . . . . . . . . . . . . 34--45
             Tiago Condeixa and   
                Susana Sargento   Studying the integration of distributed
                                  and dynamic schemes in the mobility
                                  management . . . . . . . . . . . . . . . 46--59
        Zoltán Faigl and   
              Jani Pellikka and   
 László Bokor and   
                  Andrei Gurtov   Performance evaluation of current and
                                  emerging authentication schemes for
                                  future 3GPP network architectures  . . . 60--74
                   Fei Chen and   
                  Haitao Li and   
                 Jiangchuan Liu   Popularity decays in peer-to-peer VoD
                                  systems: Impact, model, and design
                                  implications . . . . . . . . . . . . . . 75--87
             Boris Bellalta and   
              Azadeh Faridi and   
              Jaume Barcelo and   
                Vanesa Daza and   
                  Miquel Oliver   Performance analysis of a Multiuser
                                  Multi-Packet Transmission system for
                                  WLANs in non-saturation conditions . . . 88--100
                 Kaikai Chi and   
                 Yi-hua Zhu and   
             Xiaohong Jiang and   
                 Xianzhong Tian   Practical throughput analysis for
                                  two-hop wireless network coding  . . . . 101--114
              Claudio Testa and   
                    Dario Rossi   Delay-based congestion control: Flow vs.
                                  BitTorrent swarm perspectives  . . . . . 115--128
 Iván S. Razo-Zapata and   
Gerardo Castañón and   
              Carlos Mex-Perera   Self-healing in transparent optical
                                  packet switching mesh networks: a
                                  reinforcement learning perspective . . . 129--146
                   A. Gotta and   
                  M. Luglio and   
                      C. Roseti   A TCP/IP satellite infrastructure for
                                  sensing operations in emergency contexts 147--159
                Samil Temel and   
  Vehbi Çagri Gungor and   
            Taskin Koçak   Routing protocol design guidelines for
                                  smart grid environments  . . . . . . . . 160--170
              Pascal Anelli and   
          Rémi Diana and   
                Emmanuel Lochin   FavorQueue: a parameterless active queue
                                  management to improve TCP traffic
                                  performance  . . . . . . . . . . . . . . 171--186
                Felipe Mata and   
          Piotr Zuraniewski and   
             Michel Mandjes and   
                   Marco Mellia   Anomaly detection in diurnal data  . . . 187--200
                 J. Coimbra and   
             G. Schütz and   
                     N. Correia   Energy efficient routing algorithm for
                                  fiber-wireless access networks: a
                                  network formation game approach  . . . . 201--216
                    Hao Cui and   
                    Xiao Su and   
                   Weijia Shang   On optimal media/video distribution in
                                  closed P2P-based IPTV networks . . . . . 217--232


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 61, Number ??, March 14, 2014

       James P. G. Sterbenz and   
            David Hutchison and   
           Paul Müller and   
                   Chip Elliott   Special issue on Future Internet
                                  Testbeds --- Part I: Guest Editorial . . 1--4
                Mark Berman and   
           Jeffrey S. Chase and   
         Lawrence Landweber and   
              Akihiro Nakao and   
                    Max Ott and   
      Dipankar Raychaudhuri and   
               Robert Ricci and   
                    Ivan Seskar   GENI: a federated testbed for innovative
                                  network experiments  . . . . . . . . . . 5--23
            Nicholas Bastin and   
                Andy Bavier and   
             Jessica Blaine and   
                   Jim Chen and   
           Narayan Krishnan and   
              Joe Mambretti and   
                Rick McGeer and   
                  Rob Ricci and   
                    Nicki Watts   The InstaGENI initiative: an
                                  architecture for distributed systems and
                                  advanced programmable networks . . . . . 24--38
               Dongkyun Kim and   
                 Joobum Kim and   
               Gicheol Wang and   
             Jin-Hyung Park and   
                  Seung-Hae Kim   K-GENI testbed deployment and federated
                                  meta operations experiment over GENI and
                                  KREONET  . . . . . . . . . . . . . . . . 39--50
                 Deep Medhi and   
           Byrav Ramamurthy and   
           Caterina Scoglio and   
           Justin P. Rohrer and   
 Egemen K. Çetinkaya and   
         Ramkumar Cherukuri and   
                   Xuan Liu and   
       Pragatheeswaran Angu and   
                Andy Bavier and   
            Cort Buffington and   
           James P. G. Sterbenz   The GpENI testbed: Network
                                  infrastructure, implementation
                                  experience, and experimentation  . . . . 51--74
          Ernst Gunnar Gran and   
           Thomas Dreibholz and   
                 Amund Kvalbein   $N$ or NetCore --- a multi-homed
                                  research testbed . . . . . . . . . . . . 75--87
             Amund Kvalbein and   
          Dziugas Baltrunas and   
           Kristian Evensen and   
                  Jie Xiang and   
           Ahmed Elmokashfi and   
         Simone Ferlin-Oliveira   The Nornet Edge platform for mobile
                                  broadband measurements . . . . . . . . . 88--101
           Dennis Schwerdel and   
              Bernd Reuther and   
              Thomas Zinner and   
           Paul Müller and   
                 Phouc Tran-Gia   Future Internet research and
                                  experimentation: the G-Lab approach  . . 102--117
              Joe Mambretti and   
                   Jim Chen and   
                        Fei Yeh   Creating environments for innovation:
                                  Designing and implementing advanced
                                  experimental network research testbeds
                                  based on the Global Lambda Integrated
                                  Facility and the StarLight Exchange  . . 118--131
      M. Suñé and   
                L. Bergesio and   
                 H. Woesner and   
                   T. Rothe and   
             A. Köpsel and   
                   D. Colle and   
                   B. Puype and   
              D. Simeonidou and   
                R. Nejabati and   
             M. Channegowda and   
                    M. Kind and   
                   T. Dietz and   
              A. Autenrieth and   
                V. Kotronis and   
               E. Salvadori and   
                 S. Salsano and   
             M. Körner and   
                      S. Sharma   Design and implementation of the OFELIA
                                  FP7 facility: the European OpenFlow
                                  testbed  . . . . . . . . . . . . . . . . 132--150
        Masayoshi Kobayashi and   
          Srini Seetharaman and   
              Guru Parulkar and   
          Guido Appenzeller and   
              Joseph Little and   
        Johan van Reijendam and   
             Paul Weissmann and   
                   Nick McKeown   Maturing of OpenFlow and
                                  Software-defined Networking through
                                  deployments  . . . . . . . . . . . . . . 151--175
              M. Campanella and   
                      F. Farina   The FEDERICA infrastructure and
                                  experience . . . . . . . . . . . . . . . 176--183
                Jordi Jofre and   
              Celia Velayos and   
                Giada Landi and   
            Michal Giertych and   
           Alastair C. Hume and   
             Gareth Francis and   
               Albert Vico Oton   Federation of the BonFIRE multi-cloud
                                  infrastructure with networking
                                  facilities . . . . . . . . . . . . . . . 184--196
             Bartosz Belter and   
    Juan Rodriguez Martinez and   
  José Ignacio Aznar and   
         Jordi Ferrer Riera and   
          Luis M. Contreras and   
Monika Antoniak-Lewandowska and   
            Matteo Biancani and   
                Jens Buysse and   
             Chris Develder and   
             Yuri Demchenko and   
           Pasquale Donadio and   
         Dimitra Simeonidou and   
              Reza Nejabati and   
               Shuping Peng and   
          Lukasz Drzewiecki and   
            Eduard Escalona and   
   Joan Antoni Garcia Espin and   
          Steluta Gheorghiu and   
            Mattijs Ghijsen and   
            Jakub Gutkowski and   
                Giada Landi and   
                         others   The GEYSERS optical testbed: a platform
                                  for the integration, validation and
                                  demonstration of cloud-based
                                  infrastructure services  . . . . . . . . 197--216
               Luis Sanchez and   
          Luis Muñoz and   
       Jose Antonio Galache and   
               Pablo Sotres and   
            Juan R. Santana and   
         Veronica Gutierrez and   
             Rajiv Ramdhany and   
                Alex Gluhak and   
                Srdjan Krco and   
      Evangelos Theodoridis and   
               Dennis Pfisterer   SmartSantander: IoT experimentation over
                                  a smart city testbed . . . . . . . . . . 217--238


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 62, Number ??, April 7, 2014

                Xianfu Meng and   
                Changyuan Zhang   An ant colony model based replica
                                  consistency maintenance strategy in
                                  unstructured P2P networks  . . . . . . . 1--11
                Yoh-han Lee and   
                   Daeyoung Kim   Slow hopping based cooperative sensing
                                  MAC protocol for cognitive radio
                                  networks . . . . . . . . . . . . . . . . 12--28
             Ahmed Amokrane and   
                Rami Langar and   
              Raouf Boutaba and   
                    Guy Pujolle   Energy efficient management framework
                                  for multihop TDMA-based wireless
                                  networks . . . . . . . . . . . . . . . . 29--42
                Mete Yilmaz and   
                  Nirwan Ansari   Achieving destination differentiation in
                                  ingress aggregated fairness for
                                  resilient packet rings by weighted
                                  destination based fair dropping  . . . . 43--54
    Carlos Guimarães and   
              Daniel Corujo and   
        Antonio de la Oliva and   
             Yoshihiro Ohba and   
                  Rui L. Aguiar   Multicast group membership management in
                                  media independent handover services  . . 55--68
              Ilhem Fajjari and   
            Nadjib Aitsaadi and   
        Michal Pióro and   
                    Guy Pujolle   A new virtual network static embedding
                                  strategy within the Cloud's private
                                  backbone network . . . . . . . . . . . . 69--88
        P. J. Piñero and   
        J. A. Cortés and   
                 J. Malgosa and   
        F. J. Cañete and   
              P. Manzanares and   
                 L. Díez   Analysis and improvement of multicast
                                  communications in HomePlug AV-based
                                  in-home networks . . . . . . . . . . . . 89--100
            Behnam Dezfouli and   
                Marjan Radi and   
           Shukor Abd Razak and   
           Kamin Whitehouse and   
    Kamalrulnizam Abu Bakar and   
                  Tan Hwee-Pink   Improving broadcast reliability for
                                  neighbor discovery, link estimation and
                                  collection tree construction in wireless
                                  sensor networks  . . . . . . . . . . . . 101--121
                  K. Giotis and   
            C. Argyropoulos and   
           G. Androulidakis and   
               D. Kalogeras and   
                    V. Maglaris   Combining OpenFlow and sFlow for an
                                  effective and scalable anomaly detection
                                  and mitigation mechanism on SDN
                                  environments . . . . . . . . . . . . . . 122--136
                     Hao Di and   
               Vishal Anand and   
                Hongfang Yu and   
                   Lemin Li and   
                   Gang Sun and   
                       Dan Liao   Design of reliable virtual
                                  infrastructure with resource sharing . . 137--151
              Andrea Bianco and   
                Davide Cuda and   
           Jorge M. Finochietto   Multi-MetaRing fairness control in a WDM
                                  folded-bus architecture  . . . . . . . . 152--161
          Saman Hameed Amin and   
         H. S. Al-Raweshidy and   
             Rafed Sabbar Abbas   Smart data packet ad hoc routing
                                  protocol . . . . . . . . . . . . . . . . 162--181
                   Jie Tian and   
               Guiling Wang and   
                    Tan Yan and   
                 Wensheng Zhang   Detect smart intruders in sensor
                                  networks by creating network dynamics    182--196
             Enrico Gregori and   
         Alessandro Improta and   
            Luciano Lenzini and   
              Lorenzo Rossi and   
                      Luca Sani   Improving the reliability of inter-AS
                                  economic inferences through a hygiene
                                  phase on BGP data  . . . . . . . . . . . 197--207
             Chien-Fu Cheng and   
               Ting-Ying Wu and   
                Hsien-Chun Liao   A density-barrier construction algorithm
                                  with minimum total movement in mobile
                                  WSNs . . . . . . . . . . . . . . . . . . 208--220
              Dominic Meier and   
       Yvonne Anne Pignolet and   
              Stefan Schmid and   
              Roger Wattenhofer   On the Windfall and price of friendship:
                                  Inoculation strategies on social
                                  networks . . . . . . . . . . . . . . . . 221--236


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 63, Number ??, April 22, 2014

       James P. G. Sterbenz and   
            David Hutchison and   
           Paul Müller and   
                   Chip Elliott   Special issue on Future Internet
                                  Testbeds --- Part II: Guest Editorial    1--4
                 Ali Sydney and   
              David S. Ochs and   
           Caterina Scoglio and   
            Don Gruenbacher and   
                    Ruth Miller   Using GENI for experimental evaluation
                                  of Software Defined Networking in smart
                                  grids  . . . . . . . . . . . . . . . . . 5--16
            James Griffioen and   
               Zongming Fei and   
          Hussamuddin Nasir and   
                 Xiongqi Wu and   
                Jeremy Reed and   
              Charles Carpenter   Measuring experiments in GENI  . . . . . 17--32
           Yoshihiro Nozaki and   
               Parth Bakshi and   
               Hasan Tuncer and   
                 Nirmala Shenoy   Evaluation of tiered routing protocol in
                                  floating cloud tiered Internet
                                  architecture . . . . . . . . . . . . . . 33--47
          Stratos Keranidis and   
          Dimitris Giatsios and   
           Thanasis Korakis and   
      Iordanis Koutsopoulos and   
         Leandros Tassiulas and   
      Thierry Rakotoarivelo and   
                    Max Ott and   
            Thierry Parmentelat   Experimentation on end-to-end
                                  performance aware algorithms in the
                                  federated environment of the
                                  heterogeneous PlanetLab and NITOS
                                  testbeds . . . . . . . . . . . . . . . . 48--67
             Olivier Mehani and   
          Guillaume Jourjon and   
      Thierry Rakotoarivelo and   
                        Max Ott   An instrumentation framework for the
                                  critical task of measurement collection
                                  in the future Internet . . . . . . . . . 68--83
              Milorad Tosic and   
                    Ivan Seskar   Resource specification and intelligent
                                  user interaction for federated testbeds
                                  using Semantic Web technologies  . . . . 84--100
                 Jon Matias and   
            Alaitz Mendiola and   
               Nerea Toledo and   
              Borja Tornero and   
                  Eduardo Jacob   The EHU--OEF: an OpenFlow-based Layer-2
                                  experimental facility  . . . . . . . . . 101--127
                 Shingo Ata and   
              Dijiang Huang and   
                   Xuan Liu and   
                 Akira Wada and   
                Tianyi Xing and   
           Parikshit Juluri and   
             Chun-Jen Chung and   
              Yasuhiro Sato and   
                     Deep Medhi   SeRViTR: a framework, implementation,
                                  and a testbed for a trustworthy future
                                  Internet . . . . . . . . . . . . . . . . 128--146
                M. Yannuzzi and   
             M. S. Siddiqui and   
     A. Sällström and   
               B. Pickering and   
         R. Serral-Graci\`a and   
         A. Martínez and   
                    W. Chen and   
                  S. Taylor and   
                F. Benbadis and   
                  J. Leguay and   
                E. Borrelli and   
               I. Ormaetxea and   
               K. Campowsky and   
              G. Giammatteo and   
        G. Aristomenopoulos and   
           S. Papavassiliou and   
               T. Kuczynski and   
               S. Zielinski and   
             J. M. Seigneur and   
      C. Ballester Lafuente and   
               J. Johansson and   
             X. Masip-Bruin and   
                   M. Caria and   
       J. R. Ribeiro Junior and   
               E. Salageanu and   
                   J. Latanicki   TEFIS: a single access point for
                                  conducting multifaceted experiments on
                                  heterogeneous test facilities  . . . . . 147--172
      Thierry Rakotoarivelo and   
          Guillaume Jourjon and   
                        Max Ott   Designing and orchestrating reproducible
                                  experiments on federated networking
                                  testbeds . . . . . . . . . . . . . . . . 173--187
               Sang Woo Han and   
                 Namgon Kim and   
                    JongWon Kim   An experimental service composition tool
                                  for media-centric networked applications 188--204
         Jordan Augé and   
        Thierry Parmentelat and   
              Nicolas Turro and   
           Sandrine Avakian and   
              Lo\"\ic Baron and   
       Mohamed Amine Larabi and   
      Mohammed Yasin Rahman and   
             Timur Friedman and   
                    Serge Fdida   Tools to foster a global federation of
                                  testbeds . . . . . . . . . . . . . . . . 205--220
             Igor M. Moraes and   
         Diogo M. F. Mattos and   
    Lyno Henrique G. Ferraz and   
   Miguel Elias M. Campista and   
      Marcelo G. Rubinstein and   
Luís Henrique M. K. Costa and   
       Marcelo D. de Amorim and   
           Pedro B. Velloso and   
   Otto Carlos M. B. Duarte and   
                    Guy Pujolle   FITS: a flexible virtual network testbed
                                  architecture . . . . . . . . . . . . . . 221--237
             Young-Hwan Kim and   
           Alina Quereilhac and   
       Mohamed Amine Larabi and   
             Julien Tribino and   
        Thierry Parmentelat and   
           Thierry Turletti and   
                  Walid Dabbous   Enabling iterative development and
                                  reproducible evaluation of network
                                  protocols  . . . . . . . . . . . . . . . 238--250
        Zbigniew Duli\'nski and   
            Kamil Palkowski and   
                   Piotr Cholda   A university testbed for large-scale
                                  interconnection experiments on
                                  distributed applications . . . . . . . . 251--264


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 64, Number ??, May 8, 2014

                    Ming Li and   
          Andrey Lukyanenko and   
               Sasu Tarkoma and   
                   Yong Cui and   
Antti Ylä-Jääski   Tolerating path heterogeneity in
                                  multipath TCP with bounded receive
                                  buffers  . . . . . . . . . . . . . . . . 1--14
                   Xin Cong and   
                 Kai Shuang and   
                     Sen Su and   
              FangChun Yang and   
                    LingLing Zi   LBAS: an effective pricing mechanism
                                  towards video migration in
                                  cloud-assisted VoD system  . . . . . . . 15--25
          Giovanni Di Stasi and   
             Jonas Karlsson and   
           Stefano Avallone and   
           Roberto Canonico and   
            Andreas Kassler and   
                 Anna Brunstrom   Combining multi-path forwarding and
                                  packet aggregation for improved network
                                  performance in wireless mesh networks    26--37
               Sun-Hyun Kim and   
              Yeonsik Jeong and   
                  Seung-Jae Han   Use of contact duration for message
                                  forwarding in intermittently connected
                                  mobile networks  . . . . . . . . . . . . 38--54
Oscar Mauricio Caicedo Rendon and   
Carlos Raniery Paula dos Santos and   
        Arthur Selle Jacobs and   
Lisandro Zambenedetti Granville   Monitoring Virtual Nodes using mashups   55--70
           Rodrigo S. Couto and   
   Miguel Elias M. Campista and   
Luís Henrique M. K. Costa   Network resource control for Xen-based
                                  virtualized software routers . . . . . . 71--88
                 S. A. Abid and   
             Mazliza Othman and   
                     Nadir Shah   $3$D P2P overlay over MANETs . . . . . . 89--111
                 Daeho Kang and   
               Sangkyu Park and   
               Changhee Joo and   
                  Saewoong Bahk   Address-free contention in wireless
                                  access networks with common control
                                  channel for throughput improvement . . . 112--124
               Angelo Coiro and   
          Luca Chiaraviglio and   
          Antonio Cianfrani and   
             Marco Listanti and   
                Marco Polverini   Reducing power consumption in backbone
                                  IP networks through table lookup bypass  125--142
Cristian González García and   
B. Cristina Pelayo G-Bustelo and   
Jordán Pascual Espada and   
      Guillermo Cueva-Fernandez   Midgar: Generation of heterogeneous
                                  objects interconnecting applications. A
                                  Domain Specific Language proposal for
                                  Internet of Things scenarios . . . . . . 143--158
             Jasone Astorga and   
              Eduardo Jacob and   
               Nerea Toledo and   
                 Juanjo Unzilla   Enhancing secure access to sensor data
                                  with user privacy support  . . . . . . . 159--179
                  C. K. Tan and   
                T. C. Chuah and   
                      S. W. Tan   Subcarrier and power allocation for
                                  OFDMA-based multicast cellular networks
                                  using a coalitional game . . . . . . . . 180--194
            Masud Moshtaghi and   
         Christopher Leckie and   
       Shanika Karunasekera and   
         Sutharshan Rajasegarar   An adaptive elliptical anomaly detection
                                  model for wireless sensor networks . . . 195--207
          Christoph Neumann and   
               Olivier Heen and   
           Stéphane Onno   DNStamp: Short-lived trusted
                                  timestamping . . . . . . . . . . . . . . 208--224
          Maram Bani Younes and   
         Azzedine Boukerche and   
         Graciela Rom'an-Alonso   An intelligent path recommendation
                                  protocol (ICOD) for VANETs . . . . . . . 225--242
        Abdulhalim Dandoush and   
                 Sara Alouf and   
                  Philippe Nain   Lifetime and availability of data stored
                                  on a P2P system: Evaluation of
                                  redundancy and recovery schemes  . . . . 243--260
                 Yufei Wang and   
                 Rong Zheng and   
                     Qixin Wang   Self-tuned distributed monitoring of
                                  multi-channel wireless networks using
                                  Gibbs sampler  . . . . . . . . . . . . . 261--272
            Yosra Ben Saied and   
           Alexis Olivereau and   
           Djamal Zeghlache and   
               Maryline Laurent   Lightweight collaborative key
                                  establishment scheme for the Internet of
                                  Things . . . . . . . . . . . . . . . . . 273--295
               Sahar Hoteit and   
              Stefano Secci and   
       Stanislav Sobolevsky and   
                Carlo Ratti and   
                    Guy Pujolle   Estimating human trajectories and
                                  hotspots through mobile phone data . . . 296--307
                   Min Wang and   
               Junfeng Wang and   
                   Sunyoung Han   Adaptive congestion control framework
                                  and a simple implementation on high
                                  bandwidth-delay product networks . . . . 308--321
           Rachid Guerraoui and   
      Kévin Huguenin and   
       Anne-Marie Kermarrec and   
               Maxime Monod and   
           Swagatika Prusty and   
                    Aline Roumy   Tracking freeriders in gossip-based
                                  content dissemination systems  . . . . . 322--338
               Hui-Tang Lin and   
               Chia-Lin Lai and   
                  Chin-Lien Liu   Design and analysis of a frame-oriented
                                  dynamic bandwidth allocation scheme for
                                  triple-play services over EPONs  . . . . 339--352
                S. Gitzenis and   
              G. S. Paschos and   
                   L. Tassiulas   Enhancing wireless networks with
                                  caching: Asymptotic laws, sustainability
                                  & trade-offs  . . . . . . . . . . . . . . 353--368
                Yongquan Fu and   
                 Yijie Wang and   
                       Wei Peng   CommonFinder: a decentralized and
                                  privacy-preserving common-friend
                                  measurement method for the distributed
                                  online social networks . . . . . . . . . 369--389


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 65, Number ??, June 2, 2014

               Melike Yigit and   
         Ozlem Durmaz Incel and   
             Vehbi Cagri Gungor   On the interdependency between
                                  multi-channel scheduling and tree-based
                                  routing for WSNs in smart grid
                                  environments . . . . . . . . . . . . . . 1--20
                Bruno Sousa and   
         Kostas Pentikousis and   
                 Marilia Curado   MeTHODICAL: Towards the next generation
                                  of multihomed applications . . . . . . . 21--40
               Keontaek Lee and   
                Hak-Jin Kim and   
                 Sunju Park and   
                   Seungjae Han   Satisfying the target network lifetime
                                  in wireless sensor networks  . . . . . . 41--55
 Isaí Michel Lombera and   
            Louise E. Moser and   
   P. Michael Melliar-Smith and   
               Yung-Ting Chuang   Peer-to-peer publication, search and
                                  retrieval using the Android mobile
                                  platform . . . . . . . . . . . . . . . . 56--72
              Bing-Hong Liu and   
                  Jyun-Yu Jhang   Efficient distributed data scheduling
                                  algorithm for data aggregation in
                                  wireless sensor networks . . . . . . . . 73--83
                Sihyung Lee and   
            Kyriaki Levanti and   
                   Hyong S. Kim   Network monitoring: Present and future   84--98
                Issa Khalil and   
         Abdallah Khreishah and   
                 Muhammad Azeem   Consolidated Identity Management System
                                  for secure mobile cloud computing  . . . 99--110
             Raffaele Bolla and   
            Roberto Bruschi and   
                     Paolo Lago   Energy adaptation in multi-core software
                                  routers  . . . . . . . . . . . . . . . . 111--128
              Farshad Shams and   
              Giacomo Bacci and   
                    Marco Luise   A survey on resource allocation
                                  techniques in OFDM(A) networks . . . . . 129--150
            Edoardo Bonetto and   
        Alessandro Finamore and   
               Marco Mellia and   
               Riccardo Fiandra   Energy efficiency in access and
                                  aggregation networks: From current
                                  traffic to potential savings . . . . . . 151--166
              Trong-Viet Ho and   
               Yves Deville and   
            Olivier Bonaventure   Multi-objective traffic engineering for
                                  data center networks . . . . . . . . . . 167--182
            Soumyadev Maity and   
                  R. C. Hansdah   Self-organized public key management in
                                  MANETs with enhanced security and
                                  without certificate-chains . . . . . . . 183--211
    Nicaise Choungmo Fofack and   
              Philippe Nain and   
            Giovanni Neglia and   
                    Don Towsley   Performance evaluation of hierarchical
                                  TTL-based cache networks . . . . . . . . 212--231
         Caroline Battaglia and   
 Véronique Bruy\`ere and   
             Olivier Gauwin and   
            Cristel Pelsser and   
                  Bruno Quoitin   Reasoning on BGP routing filters using
                                  tree automata  . . . . . . . . . . . . . 232--254
                    Y. Gong and   
                   D. Rossi and   
                   C. Testa and   
                 S. Valenti and   
                M. D. Täht   Fighting the bufferbloat: On the
                                  coexistence of AQM and low priority
                                  congestion control . . . . . . . . . . . 255--267


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 66, Number ??, June 19, 2014

             John Silvester and   
                 Parviz Kermani   Professor Leonard Kleinrock --- Tribute
                                  Volume . . . . . . . . . . . . . . . . . 1--3
             Parviz Kermani and   
              Leonard Kleinrock   Reprint of ``Virtual cut-through: a new
                                  computer communication switching
                                  technique''  . . . . . . . . . . . . . . 4--17
               Luigi Fratta and   
                Mario Gerla and   
              Leonard Kleinrock   Flow Deviation: 40 years of incremental
                                  flows for packets, waves, cars and
                                  tunnels  . . . . . . . . . . . . . . . . 18--31
            G. Tychogiorgos and   
                    K. K. Leung   Optimization-based resource allocation
                                  in communication networks  . . . . . . . 32--45
                 Yechiam Yemini   A balance of power principle for
                                  decentralized resource sharing . . . . . 46--51
                    Y. Afek and   
            A. Bremler-Barr and   
                      L. Schiff   Recursive design of hardware priority
                                  queues . . . . . . . . . . . . . . . . . 52--67
              Udi Ben-Porat and   
          Anat Bremler-Barr and   
                    Hanoch Levy   Computer and network performance:
                                  Graduating from the ``Age of Innocence'' 68--81
        Marco Ajmone Marsan and   
                    Michela Meo   Queueing systems to study the energy
                                  consumption of a campus WLAN . . . . . . 82--93
              Aaron Yi Ding and   
              Jon Crowcroft and   
               Sasu Tarkoma and   
                   Hannu Flinck   Software defined networking for security
                                  enhancement in wireless mobile networks  94--101
                 Hideaki Takagi   From computer science to service
                                  science: Queues with human customers and
                                  servers  . . . . . . . . . . . . . . . . 102--111
                     Jim Kurose   Information-centric networking: the
                                  evolution from circuits to packets to
                                  content  . . . . . . . . . . . . . . . . 112--120


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 67, Number ??, July 4, 2014

              Paolo Ferrari and   
           Emiliano Sisinni and   
        Alessandra Flammini and   
              Alessandro Depari   Adding accurate timestamping capability
                                  to wireless networks for smart grids . . 1--13
                 Ali Hammad and   
              Reza Nejabati and   
             Dimitra Simeonidou   Novel methods for virtual network
                                  composition  . . . . . . . . . . . . . . 14--25
       Cristina Romero-Tris and   
      Jordi Castell\`a-Roca and   
                Alexandre Viejo   Distributed system for private Web
                                  search with untrusted partners . . . . . 26--42
        Alexandre Mouradian and   
  Isabelle Augé-Blum and   
                 Fabrice Valois   RTXP: a localized real-time MAC-routing
                                  protocol for wireless sensor networks    43--59
                  H. Ahmadi and   
                 Y. H. Chew and   
                 N. Reyhani and   
                 C. C. Chai and   
                  L. A. DaSilva   Learning solutions for auction-based
                                  dynamic spectrum access in multicarrier
                                  systems  . . . . . . . . . . . . . . . . 60--73
                Murat Kuzlu and   
    Manisa Pipattanasomporn and   
                  Saifur Rahman   Communication network requirements for
                                  major smart grid applications in HAN,
                                  NAN and WAN  . . . . . . . . . . . . . . 74--88
              Biplob R. Ray and   
              Jemal Abawajy and   
              Morshed Chowdhury   Scalable RFID security framework and
                                  protocol supporting Internet of Things   89--103
               Tifenn Rault and   
    Abdelmadjid Bouabdallah and   
                 Yacine Challal   Energy efficiency in wireless sensor
                                  networks: a top-down survey  . . . . . . 104--122
              Wei-Cheng Chu and   
                   Kuo-Feng Ssu   Sink discovery in location-free and
                                  mobile-sink wireless sensor networks . . 123--140
                Shihong Zou and   
                  Xitao Wen and   
                   Kai Chen and   
                 Shan Huang and   
                   Yan Chen and   
              Yongqiang Liu and   
                   Yong Xia and   
                   Chengchen Hu   VirtualKnotter: Online virtual machine
                                  shuffling for congestion resolving in
                                  virtualized datacenter . . . . . . . . . 141--153
               Lien-Wu Chen and   
              Yu-Chee Tseng and   
                    Kun-Ze Syue   Surveillance on-the-road: Vehicular
                                  tracking and reporting by V2V
                                  communications . . . . . . . . . . . . . 154--163
                I-Hsien Liu and   
             Chuan-Gang Liu and   
              Chien-Tung Lu and   
                Yi-Tsen Kuo and   
                  Jung-Shian Li   A multi-hop resource scheduling
                                  algorithm for IEEE 802.16j relay
                                  networks . . . . . . . . . . . . . . . . 164--179
     David Rebollo-Monedero and   
         Javier Parra-Arnau and   
         Jordi Forné and   
                   Claudia Diaz   Optimizing the design parameters of
                                  threshold pool mixes for anonymity and
                                  delay  . . . . . . . . . . . . . . . . . 180--200
      Iordanis Koutsopoulos and   
         Leandros Tassiulas and   
              Lazaros Gkatzikis   Client-server games and their equilibria
                                  in peer-to-peer networks . . . . . . . . 201--218
               L. Rajya Lakshmi   Handover rate based dynamic guard
                                  bandwidth allocation method for call
                                  admission control in IEEE 802.16j Mobile
                                  Multihop Relay networks  . . . . . . . . 219--234
               Glenn Benson and   
              Shiu-Kai Chin and   
               Sean Croston and   
         Karthick Jayaraman and   
                    Susan Older   Banking on interoperability: Secure,
                                  interoperable credential management  . . 235--251
           R. de O. Schmidt and   
                   R. Sadre and   
                A. Sperotto and   
            H. van den Berg and   
                        A. Pras   A hybrid procedure for efficient link
                                  dimensioning . . . . . . . . . . . . . . 252--269


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 68, Number ??, August 5, 2014

              Raouf Boutaba and   
                Noura Limam and   
              Stefano Secci and   
                    Tarik Taleb   Cloud networking and communications  . . 1--4
          Abu (Sayeem) Reaz and   
      Vishwanath Ramamurthi and   
          Massimo Tornatore and   
            Biswanath Mukherjee   Cloud-Integrated WOBAN: an
                                  offloading-enabled architecture for
                                  service-oriented access networks . . . . 5--19
              Jaehyun Hwang and   
                   Joon Yoo and   
                   Nakjung Choi   Deadline and Incast Aware TCP for cloud
                                  data center networks . . . . . . . . . . 20--34
               Ahmed Amamou and   
             Kamel Haddadou and   
                    Guy Pujolle   A TRILL-based multi-tenant data center
                                  network  . . . . . . . . . . . . . . . . 35--53
   Juliano Araujo Wickboldt and   
     Rafael Pereira Esteves and   
Márcio Barbosa de Carvalho and   
Lisandro Zambenedetti Granville   Resource management in IaaS cloud
                                  platforms made flexible through
                                  programmability  . . . . . . . . . . . . 54--70
                   Wenda Ni and   
           Changcheng Huang and   
                        Jing Wu   Provisioning high-availability
                                  datacenter networks for full bandwidth
                                  communication  . . . . . . . . . . . . . 71--94
                  Zehua Guo and   
                      Mu Su and   
                    Yang Xu and   
                Zhemin Duan and   
                   Luo Wang and   
                Shufeng Hui and   
               H. Jonathan Chao   Improving the performance of load
                                  balancing in software-defined networks
                                  through load variance-based
                                  synchronization  . . . . . . . . . . . . 95--109
              Prasad Calyam and   
      Sudharsan Rajagopalan and   
         Sripriya Seetharam and   
    Arunprasath Selvadhurai and   
               Khaled Salah and   
                  Rajiv Ramnath   VDC-Analyst: Design and verification of
                                  virtual desktop cloud resource
                                  allocations  . . . . . . . . . . . . . . 110--122
                 Yiwen Wang and   
                     Sen Su and   
                Alex X. Liu and   
                 Zhongbao Zhang   Multiple bulk data transfers scheduling
                                  among datacenters  . . . . . . . . . . . 123--137
               Simon S. Woo and   
                Jelena Mirkovic   Optimal application allocation on
                                  multiple public clouds . . . . . . . . . 138--148
                Pedro Casas and   
                 Raimund Schatz   Quality of Experience in Cloud services:
                                  Survey and measurements  . . . . . . . . 149--165
             Subharthi Paul and   
                   Raj Jain and   
            Mohammed Samaka and   
                     Jianli Pan   Application delivery in multi-cloud
                                  environments using software defined
                                  networking . . . . . . . . . . . . . . . 166--186
           Rudolf Strijkers and   
             Marc X. Makkes and   
               Cees de Laat and   
                  Robert Meijer   Internet factories: Creating
                                  application-specific networks on-demand  187--198
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 69, Number ??, August 20, 2014

                    Xin Jin and   
                  Yu-Kwong Kwok   Network aware peer-to-peer media
                                  streaming: Capacity or proximity?  . . . 1--18
                  Tomaz Buh and   
               Roman Trobec and   
                  Andrej Ciglic   Adaptive network-traffic balancing on
                                  multi-core software networking devices   19--34
          Jan Dvorák and   
   Jirí Novák and   
                  Petr Kocourek   Energy efficient network protocol
                                  architecture for narrowband power line
                                  communication networks . . . . . . . . . 35--50
             Wojciech Bober and   
              Chris J. Bleakley   BailighPulse: a low duty cycle data
                                  gathering protocol for mostly-off
                                  Wireless Sensor Networks . . . . . . . . 51--65
               Soohong Park and   
       Jaehoon (Paul) Jeong and   
               Choong Seon Hong   QoS-guaranteed Mobile IPTV service in
                                  heterogeneous access networks  . . . . . 66--81
               Nadia Battat and   
                Hamida Seba and   
            Hamamache Kheddouci   Monitoring in mobile ad hoc networks: a
                                  survey . . . . . . . . . . . . . . . . . 82--100
                S. Traverso and   
                  C. Kiraly and   
                E. Leonardi and   
                      M. Mellia   A performance comparison of hose rate
                                  controller approaches for P2P-TV
                                  applications . . . . . . . . . . . . . . 101--120
               Zhongjin Liu and   
                    Yong Li and   
                     Bo Cui and   
                      Li Su and   
                 Depeng Jin and   
                  Lieguang Zeng   GrainFlow: Enable testing for future
                                  Internet architectures by per-bit
                                  customization  . . . . . . . . . . . . . 121--132
                  Ji-Su Kim and   
               Jae-Hyun Kim and   
                   Sunghyun Cho   Enhanced handoff scheme based on
                                  efficient uplink quality estimation in
                                  LTE-Advanced system  . . . . . . . . . . 133--146
                   Hui Wang and   
              George N. Rouskas   Hierarchical traffic grooming: a
                                  tutorial . . . . . . . . . . . . . . . . 147--156
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 70, Number ??, September 9, 2014

                  Yuan Yang and   
                 Mingwei Xu and   
                          Qi Li   Towards fast rerouting-based energy
                                  efficient routing  . . . . . . . . . . . 1--15
                 Gaofeng Wu and   
                 Gurusamy Mohan   Power-efficient integrated routing of
                                  sublambda connection requests with
                                  traffic splitting in IP over WDM
                                  networks . . . . . . . . . . . . . . . . 16--29
             Atef Abdelkefi and   
               Yuming Jiang and   
         Bjarne Emil Helvik and   
      Gergely Biczók and   
                 Alexandru Calu   Assessing the service quality of an
                                  Internet path through end-to-end
                                  measurement  . . . . . . . . . . . . . . 30--44
                Liang Liang and   
                      Yu Ge and   
                  Gang Feng and   
                     Wei Ni and   
             Aung Aung Phyo Wai   A low overhead tree-based
                                  energy-efficient routing scheme for
                                  multi-hop wireless body area networks    45--58
    Argyrios G. Tasiopoulos and   
           Christos Tsiaras and   
                Stavros Toumpis   Optimal and achievable cost/delay
                                  tradeoffs in delay-tolerant networks . . 59--74
          Bernardetta Addis and   
             Danilo Ardagna and   
             Antonio Capone and   
               Giuliana Carello   Energy-aware joint management of
                                  networks and Cloud infrastructures . . . 75--95
              Wei-Cheng Chu and   
                   Kuo-Feng Ssu   Location-free boundary detection in
                                  mobile wireless sensor networks with a
                                  distributed approach . . . . . . . . . . 96--112
Constantinos Marios Angelopoulos and   
        Sotiris Nikoletseas and   
            Theofanis P. Raptis   Wireless energy transfer in sensor
                                  networks with adaptive, limited
                                  knowledge protocols  . . . . . . . . . . 113--141
                Taeseop Lee and   
               Sangkyu Park and   
              Hyung-Sin Kim and   
                  Saewoong Bahk   Sounding resource management for QoS
                                  support in massive MIMO systems  . . . . 142--153
                  Chunxi Li and   
              Changjia Chen and   
                   Yong Liu and   
                  Baoxian Zhang   Threshold bipolar scheduling for P2P
                                  live streaming . . . . . . . . . . . . . 154--169
            Esmat Mirzamany and   
          Aboubaker Lasebae and   
              Orhan Gemikonakli   An efficient traffic engineering based
                                  on multi-topology routing for future
                                  Internet . . . . . . . . . . . . . . . . 170--178
                Celimuge Wu and   
                 Yusheng Ji and   
                    Juan Xu and   
           Satoshi Ohzahata and   
                 Toshihiko Kato   Coded packets over lossy links: a
                                  redundancy-based mechanism for reliable
                                  and fast data collection in sensor
                                  networks . . . . . . . . . . . . . . . . 179--191
                 Kyeong Soo Kim   The effect of ISP traffic shaping on
                                  user-perceived performance in broadband
                                  shared access networks . . . . . . . . . 192--209
             Peter Terlecky and   
               Brian Phelan and   
              Amotz Bar-Noy and   
             Theodore Brown and   
                    Dror Rawitz   Should I stay or should I go? Maximizing
                                  lifetime with relays . . . . . . . . . . 210--224
               Quang Duy La and   
             Yong Huat Chew and   
                 Boon-Hee Soong   Oligopolistic spectrum allocation game
                                  via market competition under spectrum
                                  broker . . . . . . . . . . . . . . . . . 225--239
             Mario Montagud and   
           Fernando Boronat and   
              Hans Stokking and   
                    Pablo Cesar   Design, development and assessment of
                                  control schemes for IDMS in a
                                  standardized RTCP-based solution . . . . 240--259
            Sharon Goldberg and   
           Michael Schapira and   
                Pete Hummon and   
               Jennifer Rexford   How secure are secure interdomain
                                  routing protocols? . . . . . . . . . . . 260--287
              Hyung-Sin Kim and   
              Jae-Seok Bang and   
                  Yong-Hwan Lee   Distributed network configuration in
                                  large-scale low power wireless networks  288--301
Rafael A. Rodríguez-Gómez and   
Gabriel Maciá-Fernández and   
Pedro García-Teodoro and   
             Moritz Steiner and   
              Davide Balzarotti   Resource monitoring for the detection of
                                  parasite P2P botnets . . . . . . . . . . 302--311
               Melike Yigit and   
            V. Cagri Gungor and   
                  Selcuk Baktir   Cloud computing for Smart Grid
                                  applications . . . . . . . . . . . . . . 312--329
     Pantelis A. Frangoudis and   
              George C. Polyzos   On the performance of secure
                                  user-centric VoIP communication  . . . . 330--344
   Sérgio Figueiredo and   
    Carlos Guimarães and   
              Daniel Corujo and   
                  Rui L. Aguiar   MI3M: a framework for media independent
                                  multicast mobility management  . . . . . 345--365
               Melike Yigit and   
            V. Cagri Gungor and   
                Gurkan Tuna and   
            Maria Rangoussi and   
                   Etimad Fadel   Power line communication technologies
                                  for smart grid applications: a review of
                                  advances and challenges  . . . . . . . . 366--383
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 71, Number ??, October 4, 2014

            Ian F. Akyildiz and   
                Ahyoung Lee and   
                    Pu Wang and   
                    Min Luo and   
                        Wu Chou   A roadmap for traffic engineering in
                                  SDN--OpenFlow networks . . . . . . . . . 1--30
             Moad Y. Mowafi and   
              Fahed H. Awad and   
                Walid A. Aljoby   A novel approach for extracting spatial
                                  correlation of visual information in
                                  heterogeneous wireless multimedia sensor
                                  networks . . . . . . . . . . . . . . . . 31--47
       Abhijit Bhattacharya and   
                   Anurag Kumar   A shortest path tree based algorithm for
                                  relay placement in a wireless sensor
                                  network and its performance analysis . . 48--62
               Wenjing Wang and   
          Mainak Chatterjee and   
                Kevin Kwiat and   
                        Qing Li   A game theoretic approach to detect and
                                  co-exist with malicious nodes in
                                  wireless networks  . . . . . . . . . . . 63--83
             Tiago Condeixa and   
                Susana Sargento   Context-aware adaptive IP mobility
                                  anchoring  . . . . . . . . . . . . . . . 84--99
            P. Muñoz and   
                 D. Laselva and   
                   R. Barco and   
                    P. Mogensen   Dynamic traffic steering based on fuzzy
                                  Q-Learning approach in a multi-RAT
                                  multi-layer wireless network . . . . . . 100--116
           Alia Asheralieva and   
                 Kaushik Mahata   Joint power and bandwidth allocation in
                                  IEEE802.22 based cognitive LTE network   117--129
             Honggang Zhang and   
                Benyuan Liu and   
                    Bin Nie and   
                 Zhiyong Xu and   
                Xiayin Weng and   
                        Chao Yu   Leveraging online social friendship to
                                  improve data swarming performance  . . . 130--143
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 72, Number ??, October 29, 2014

              Marica Amadeo and   
            Claudia Campolo and   
         Antonella Molinaro and   
               Giuseppe Ruggeri   Content-centric wireless networking: a
                                  survey . . . . . . . . . . . . . . . . . 1--13
        Ankunda R. Kiremire and   
          Matthias R. Brust and   
                   Vir V. Phoha   Using network motifs to investigate the
                                  influence of network topology on
                                  PPM-based IP traceback schemes . . . . . 14--32
            Dong Geun Jeong and   
               Jeong Ae Han and   
                  Wha Sook Jeon   Hop capacity balancing in OFDMA relay
                                  networks . . . . . . . . . . . . . . . . 33--44
                   Bo Zhang and   
              Zhenhua Huang and   
                     Yang Xiang   A novel multiple-level trust management
                                  framework for wireless sensor networks   45--61
                   Xin Kang and   
                    Yongdong Wu   A trust-based pollution attack
                                  prevention scheme in peer-to-peer
                                  streaming networks . . . . . . . . . . . 62--73
               Manar Jammal and   
           Taranpreet Singh and   
             Abdallah Shami and   
                Rasool Asal and   
                      Yiming Li   Software defined networking: State of
                                  the art and research challenges  . . . . 74--98
               Michele Savi and   
       Harald Òverby and   
               Norvald Stol and   
                Carla Raffaelli   Cost evolution model to design optical
                                  switching fabrics with wavelength
                                  converters . . . . . . . . . . . . . . . 99--112
          Tien-Thinh Nguyen and   
               Christian Bonnet   Considerations of IP multicast for load
                                  balancing in Proxy Mobile IPv6 networks  113--126


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 73, Number ??, November 14, 2014

                 Xiaopei Lu and   
                 Dezun Dong and   
               Xiangke Liao and   
                Shanshan Li and   
                   Xiaodong Liu   PathZip: a lightweight scheme for
                                  tracing packet path in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1--14
                   Sungwook Kim   Learning based bandwidth management
                                  algorithms by using bargaining and
                                  fictitious play approaches . . . . . . . 15--21
              Giovanni Stea and   
                 Antonio Virdis   A comprehensive simulation analysis of
                                  LTE Discontinuous Reception (DRX)  . . . 22--40
                  Ding Wang and   
                      Ping Wang   On the anonymity of two-factor
                                  authentication schemes for wireless
                                  sensor networks: Attacks, principle and
                                  solutions  . . . . . . . . . . . . . . . 41--57
            Chen-Khong Tham and   
                        Tie Luo   Fairness and social welfare in service
                                  allocation schemes for participatory
                                  sensing  . . . . . . . . . . . . . . . . 58--71
               Sunggeun Jin and   
                      Daji Qiao   Numerical analysis of the power saving
                                  with a bursty traffic model in
                                  LTE-Advanced networks  . . . . . . . . . 72--83
        Dinil Mon Divakaran and   
             Mohan Gurusamy and   
          Mathumitha Sellamuthu   Bandwidth allocation with differential
                                  pricing for flexible demands in data
                                  center networks  . . . . . . . . . . . . 84--97
          Giuseppe Colistra and   
           Virginia Pilloni and   
                   Luigi Atzori   The problem of task allocation in the
                                  Internet of Things and the
                                  consensus-based approach . . . . . . . . 98--111
              Yaodong Zhang and   
                   Yue Wang and   
                    Dan Pei and   
                      Jian Yuan   Multi-AS cooperative incoming traffic
                                  engineering in a transit-edge separate
                                  Internet . . . . . . . . . . . . . . . . 112--127
         Furqan Hameed Khan and   
                Young-June Choi   Distributed games for coordinated
                                  coalition formation in femtocell
                                  networks . . . . . . . . . . . . . . . . 128--141
            Meng-Shiuan Pan and   
               Ping-Lin Liu and   
                    Yen-Pei Lin   Event data collection in ZigBee
                                  tree-based wireless sensor networks  . . 142--153
        Salvatore Cavalieri and   
           Ferdinando Chiacchio   Limiting the loss of information in
                                  KNXnet/IP on congestion conditions . . . 154--172
      Abderrahmane Baadache and   
                   Ali Belmehdi   Struggling against simple and
                                  cooperative black hole attacks in
                                  multi-hop wireless ad hoc networks . . . 173--184
                      Li Xu and   
                    Yuan He and   
              Xiaofeng Chen and   
                    Xinyi Huang   Ticket-based handoff authentication for
                                  wireless mesh networks . . . . . . . . . 185--194
                   Tong Liu and   
                     Yanmin Zhu   Social welfare maximization in
                                  participatory smartphone sensing . . . . 195--209
          Tiphaine Phe-Neau and   
     Marcelo Dias de Amorim and   
                    Vania Conan   Uncovering vicinity properties in
                                  disruption-tolerant networks . . . . . . 210--223
           A. K. Marnerides and   
         A. Schaeffer-Filho and   
                      A. Mauthe   Traffic anomaly diagnosis in Internet
                                  backbone networks: a survey  . . . . . . 224--243
                Chunqi Tian and   
               Baijian Yang and   
               Jidong Zhong and   
                   Xiaojian Liu   Trust-based incentive mechanism to
                                  motivate cooperation in hybrid P2P
                                  networks . . . . . . . . . . . . . . . . 244--255
        Rosario G. Garroppo and   
        Gianfranco Nencioni and   
               Luca Tavanti and   
                Bernard Gendron   The greening potential of content
                                  delivery in residential community
                                  networks . . . . . . . . . . . . . . . . 256--267
                Yi-Huai Hsu and   
               Kuochen Wang and   
                  Yu-Chee Tseng   Efficient cooperative access class
                                  barring with load balancing and traffic
                                  adaptive radio resource management for
                                  M2M communications over LTE-A  . . . . . 268--281
                A. Coluccia and   
                F. Ricciato and   
          P. Romirer-Maierhofer   Robust estimation of mean failure
                                  probability in access networks . . . . . 282--301
               Youngsoo Lee and   
                  Chong-Ho Choi   Transmission Order Deducing MAC
                                  (TOD-MAC) protocol for CSMA/CA wireless
                                  networks . . . . . . . . . . . . . . . . 302--318
               Min-Hong Han and   
             Byung-Gook Kim and   
                   Jang-Won Lee   Opportunistic resource scheduling for
                                  D2D communication in OFDMA networks  . . 319--334
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 74 (part A), Number ??, December 9, 2014

              Greg Kuperman and   
              Eytan Modiano and   
            Aradhana Narula-Tam   Network protection with multiple
                                  availability guarantees  . . . . . . . . 1--12
                Jianming Lv and   
              Tieying Zhang and   
                 Zhenhua Li and   
                    Xueqi Cheng   PACOM: Parasitic anonymous communication
                                  in the BitTorrent network  . . . . . . . 13--33
                    Lei Shi and   
              Jianghong Han and   
                   Dong Han and   
                    Xu Ding and   
                   Zhenchun Wei   The dynamic routing algorithm for
                                  renewable wireless sensor networks with
                                  wireless power transfer  . . . . . . . . 34--52
                 Dongni Ren and   
              Wang Kit Wong and   
                S.-H. Gary Chan   Overlay live video streaming with
                                  heterogeneous bitrate requirements . . . 53--63
                  Alaa Awad and   
                Amr Mohamed and   
           Amr A. El-Sherif and   
                   Omar A. Nasr   Interference-aware energy-efficient
                                  cross-layer design for healthcare
                                  monitoring applications  . . . . . . . . 64--77
                 Ayaz Ahmad and   
           Naveed Ul Hassan and   
                     Nadir Shah   Robust channel quality indicator
                                  reporting for multi-carrier and
                                  multi-user systems . . . . . . . . . . . 78--88
              Junaid Ansari and   
             Elena Meshkova and   
               Wasif Masood and   
               Arham Muslim and   
      Janne Riihijärvi and   
        Petri Mähönen   CONFab: Ontology and component based
                                  optimization of WSN protocol stacks with
                                  deployment feedback  . . . . . . . . . . 89--108
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 74 (part B), Number ??, December 9, 2014

                   Yulei Wu and   
                     Fei Hu and   
                   Xinheng Wang   Special issue on mobile computing for
                                  content/service-oriented networking
                                  architecture . . . . . . . . . . . . . . 1--3
              Ricardo Matos and   
             Carlos Marques and   
                Susana Sargento   Context-aware control of user-centric
                                  virtual networks: Centralized vs
                                  distributed approaches . . . . . . . . . 4--21
Chathura M. Sarathchandra Magurawalage and   
                   Kun Yang and   
                   Liang Hu and   
                 Jianming Zhang   Energy-efficient and network-aware
                                  offloading algorithm for mobile cloud
                                  computing  . . . . . . . . . . . . . . . 22--33
    Péter Vingelmann and   
                Janus Heide and   
Morten Videbæk Pedersen and   
                   Qi Zhang and   
             Frank H. P. Fitzek   All-to-all data dissemination with
                                  network coding in dynamic MANETs . . . . 34--47
                Gaocai Wang and   
                  Ying Peng and   
                  Peng Feng and   
                       Nao Wang   An energy consumption minimization
                                  routing scheme based on rate adaptation
                                  with QoS guarantee for the mobile
                                  environment  . . . . . . . . . . . . . . 48--57
             Mianxiong Dong and   
                  Kaoru Ota and   
           Laurence T. Yang and   
                 Shan Chang and   
                 Hongzi Zhu and   
                    Zhenyu Zhou   Mobile agent-based energy-aware and
                                  user-centric data collection in wireless
                                  sensor networks  . . . . . . . . . . . . 58--70
                  Guiyi Wei and   
                 Yang Xiang and   
                     Min Ji and   
                       Ping Zhu   An analytical model for optimal spectrum
                                  leasing under constraints of quality of
                                  service in CRNs  . . . . . . . . . . . . 71--80
                   Quan Liu and   
                Hongwei Niu and   
                  Wenjun Xu and   
                  Duzhong Zhang   A service-oriented spectrum allocation
                                  algorithm using enhanced PSO for
                                  cognitive wireless networks  . . . . . . 81--91
             Mian Ahmad Jan and   
           Priyadarsi Nanda and   
               Xiangjian He and   
                   Ren Ping Liu   PASCCC: Priority-based
                                  application-specific congestion control
                                  clustering protocol  . . . . . . . . . . 92--102
              Sancheng Peng and   
                     Min Wu and   
                Guojun Wang and   
                        Shui Yu   Containing smartphone worm propagation
                                  with an influence maximization algorithm 103--113
              Bhanu Kaushik and   
             Honggang Zhang and   
                 Xinyu Yang and   
                  Xinwen Fu and   
                Benyuan Liu and   
                       Jie Wang   Providing service assurance in mobile
                                  opportunistic networks . . . . . . . . . 114--140
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 75 (part A), Number ??, December 24, 2014

     Ertugrul N. Ciftcioglu and   
     Antonios Michaloliakos and   
                Aylin Yener and   
       Konstantinos Psounis and   
         Thomas F. La Porta and   
                Ramesh Govindan   Operational information content sum
                                  capacity: From theory to practice  . . . 1--17
              Nelson Capela and   
                Susana Sargento   Multihoming and network coding: a new
                                  approach to optimize the network
                                  performance  . . . . . . . . . . . . . . 18--36
            Dmitriy Kuptsov and   
              Boris Nechaev and   
          Andrey Lukyanenko and   
                  Andrei Gurtov   How penalty leads to improvement: a
                                  measurement study of wireless backoff in
                                  IEEE 802.11 networks . . . . . . . . . . 37--57
                Hanjin Park and   
                    Yung Yi and   
                    Yongdae Kim   Revisiting security of proportional fair
                                  scheduler in wireless cellular networks  58--74
                Sok-Ian Sou and   
                   Dung-Ru Tsai   Bulk credit reservation in event-based
                                  Machine Type Communications for 3GPP
                                  online charging  . . . . . . . . . . . . 75--85
                 Dongni Ren and   
            S.-H. Gary Chan and   
                Guangyu Shi and   
                   Hongbo Zhang   Distributed joint optimization for
                                  large-scale video-on-demand  . . . . . . 86--98
               Hassan Noura and   
              Steven Martin and   
           Khaldoun Al Agha and   
                 Khaled Chahine   ERSS--RLNC: Efficient and robust secure
                                  scheme for random linear network coding  99--112
            Mehmet Fatih Tuysuz   An energy-efficient QoS-based network
                                  selection scheme over heterogeneous
                                  WLAN--3G networks  . . . . . . . . . . . 113--133
             Xiang-Jun Shen and   
                     Lu Liu and   
              Zheng-Jun Zha and   
                Pei-Ying Gu and   
            Zhong-Qiu Jiang and   
               Ji-Ming Chen and   
             John Panneerselvam   Achieving dynamic load balancing through
                                  mobile agents in small world P2P
                                  networks . . . . . . . . . . . . . . . . 134--148
               Li-Ping Tung and   
               Ying-Dar Lin and   
               Yu-Hsien Kuo and   
             Yuan-Cheng Lai and   
          Krishna M. Sivalingam   Reducing power consumption in LTE data
                                  scheduling with the constraints of
                                  channel condition and QoS  . . . . . . . 149--159
                   Wen-Kang Jia   A unified MIPv6 and PMIPv6 route
                                  optimization scheme for heterogeneous
                                  mobility management domains  . . . . . . 160--176
          Dina S. M. Hassan and   
         Hossam M. A. Fahmy and   
           Ayman M. Bahaa-ElDin   RCA: Efficient connected dominated
                                  clustering algorithm for mobile ad hoc
                                  networks . . . . . . . . . . . . . . . . 177--191
              Yinghui Zhang and   
              Xiaofeng Chen and   
                     Jin Li and   
                         Hui Li   Generic construction for secure and
                                  efficient handoff authentication schemes
                                  in EAP-based wireless networks . . . . . 192--211
                   Hui Wang and   
           H. Eduardo Roman and   
                Liyong Yuan and   
             Yongfeng Huang and   
                    Rongli Wang   Connectivity, coverage and power
                                  consumption in large-scale wireless
                                  sensor networks  . . . . . . . . . . . . 212--225
        Charalambos Sergiou and   
            Vasos Vassiliou and   
           Aristodemos Paphitis   Congestion control in Wireless Sensor
                                  Networks through dynamic alternative
                                  path selection . . . . . . . . . . . . . 226--238
                   B. Addis and   
                  A. Capone and   
                 G. Carello and   
              L. G. Gianoli and   
                     B. Sans\`o   On the energy cost of robustness and
                                  resiliency in IP networks  . . . . . . . 239--259
             Cosimo Anglano and   
             Marco Guazzone and   
                  Matteo Sereno   Maximizing profit in green cellular
                                  networks through collaborative games . . 260--275
               Xiuquan Qiao and   
                Guoshun Nan and   
                    Wei Tan and   
                    Lei Guo and   
              Junliang Chen and   
                   Wei Quan and   
                       Yukai Tu   CCNxTomcat: an extended web server for
                                  Content-Centric Networking . . . . . . . 276--296
        Aruna Prem Bianzino and   
             Mikael Asplund and   
        Ekhiotz Jon Vergara and   
            Simin Nadjm-Tehrani   Cooperative proxies: Optimally trading
                                  energy and quality of service in mobile
                                  devices  . . . . . . . . . . . . . . . . 297--312
                    Xin Jin and   
              Yu-Kwong Kwok and   
                      Jian Deng   Variegated competing peer-to-peer
                                  systems with selfish peers . . . . . . . 313--330
               Miloud Bagaa and   
             Mohamed Younis and   
         Abdelouahid Derhab and   
                 Nadjib Badache   Intertwined path formation and MAC
                                  scheduling for fast delivery of
                                  aggregated data in WSN . . . . . . . . . 331--350
                  Feng Shan and   
                Junzhou Luo and   
                   Xiaojun Shen   Optimal energy efficient packet
                                  scheduling with arbitrary individual
                                  deadline guarantee . . . . . . . . . . . 351--366
             Zhongxing Ming and   
                 Mingwei Xu and   
                       Dan Wang   InCan: In-network cache assisted eNodeB
                                  caching mechanism in 4G LTE networks . . 367--380
   Leandro Aparecido Villas and   
         Azzedine Boukerche and   
             Guilherme Maia and   
       Richard Werner Pazzi and   
         Antonio A. F. Loureiro   DRIVE: an efficient and robust data
                                  dissemination protocol for highway and
                                  urban vehicular ad hoc networks  . . . . 381--394
      Jesús Friginal and   
     David de Andrés and   
           Juan-Carlos Ruiz and   
         Miquel Martínez   A survey of evaluation platforms for ad
                                  hoc routing protocols: a resilience
                                  perspective  . . . . . . . . . . . . . . 395--413
            Deanna Hlavacek and   
                J. Morris Chang   A layered approach to cognitive radio
                                  network security: a survey . . . . . . . 414--436
                Thomas Paul and   
          Antonino Famulari and   
                Thorsten Strufe   A survey on decentralized Online Social
                                  Networks . . . . . . . . . . . . . . . . 437--452
               Akram Hakiri and   
          Aniruddha Gokhale and   
             Pascal Berthou and   
         Douglas C. Schmidt and   
                Thierry Gayraud   Software-Defined Networking: Challenges
                                  and research opportunities for Future
                                  Internet . . . . . . . . . . . . . . . . 453--471
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 75 (part B), Number ??, December 24, 2014

                Julia Klier and   
              Mathias Klier and   
                 Rolf T. Wigand   The connectedness, pervasiveness and
                                  ubiquity of online social networks . . . 473--476
              Tobias Mutter and   
                Dennis Kundisch   Don't take away my status! --- Evidence
                                  from the restructuring of a virtual
                                  reward system  . . . . . . . . . . . . . 477--490
                Gongjun Yan and   
                      Wu He and   
             Jiancheng Shen and   
                   Chuanyi Tang   A bilingual approach for conducting
                                  Chinese and English social media
                                  sentiment analysis . . . . . . . . . . . 491--503
                Duc A. Tran and   
                     Ting Zhang   S-PUT: an EA-based framework for
                                  socially aware data partitioning . . . . 504--518
            Johannes Putzke and   
              Kai Fischbach and   
             Detlef Schoder and   
                 Peter A. Gloor   Cross-cultural gender differences in the
                                  adoption and usage of social media
                                  platforms --- an exploratory study of
                                  Last.FM  . . . . . . . . . . . . . . . . 519--530
      Constantinos Patsakis and   
      Athanasios Zigomitros and   
     Achilleas Papageorgiou and   
Edgar Galván-López   Distributing privacy policies over
                                  multimedia content across multiple
                                  online social networks . . . . . . . . . 531--543
               Junzhou Zhao and   
             John C. S. Lui and   
                Don Towsley and   
                  Xiaohong Guan   Whom to follow: Efficient followee
                                  selection for cascading outbreak
                                  detection on online social networks  . . 544--559
         Sebastian Behrendt and   
          Alexander Richter and   
                 Matthias Trier   Mixed methods analysis of enterprise
                                  social networks  . . . . . . . . . . . . 560--577
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 76, Number ??, January 15, 2015

                      Anonymous   Thank you reviewers  . . . . . . . . . . i--xxxi
                      Anonymous   Editorial  . . . . . . . . . . . . . . . iii--iv
         Luiz H. A. Correia and   
            Thanh-Dien Tran and   
     Vasco N. S. S. Pereira and   
    João C. Giacomin and   
       Jorge M. Sá Silva   DynMAC: a resistant MAC protocol to
                                  coexistence in wireless sensor networks  1--16
  Gy\Hozö Gódor and   
  Zoltán Jakó and   
   Ádám Knapp and   
             Sándor Imre   A survey of handover management in
                                  LTE-based multi-tier femtocell networks:
                                  Requirements, challenges and solutions   17--41
  R. Acedo-Hernández and   
                   M. Toril and   
     S. Luna-Ramírez and   
           I. de la Bandera and   
                       N. Faour   Analysis of the impact of PCI planning
                                  on downlink throughput performance in
                                  LTE  . . . . . . . . . . . . . . . . . . 42--54
           Xenofon Fafoutis and   
           Alessio Di Mauro and   
        Madava D. Vithanage and   
                 Nicola Dragoni   Receiver-initiated medium access control
                                  protocols for wireless sensor networks   55--74
              Tomasz Bujlow and   
Valentín Carela-Español and   
                Pere Barlet-Ros   Independent comparison of popular DPI
                                  tools for traffic classification . . . . 75--89
           Dionysis Xenakis and   
               Nikos Passas and   
            Lazaros Merakos and   
            Christos Verikoukis   Advanced mobility management for reduced
                                  interference and energy consumption in
                                  the two-tier LTE-Advanced network  . . . 90--111
            P. Muñoz and   
                   R. Barco and   
               I. de la Bandera   Load balancing and handover joint
                                  optimization in LTE networks using Fuzzy
                                  Logic and Reinforcement Learning . . . . 112--125
            Michele Mangili and   
            Fabio Martignon and   
             Stefano Paraboschi   A cache-aware mechanism to enforce
                                  confidentiality, trackability and access
                                  policy evolution in Content-Centric
                                  Networks . . . . . . . . . . . . . . . . 126--145
                  S. Sicari and   
                A. Rizzardi and   
               L. A. Grieco and   
               A. Coen-Porisini   Security, privacy and trust in Internet
                                  of Things: the road ahead  . . . . . . . 146--164
              Tengfei Chang and   
            Thomas Watteyne and   
                Kris Pister and   
                       Qin Wang   Adaptive synchronization in multi-hop
                                  TSCH networks  . . . . . . . . . . . . . 165--176
               Yuansheng Wu and   
                   Bing Guo and   
                   Yan Shen and   
                  Jihe Wang and   
                    Xiaobin Liu   A Cross-Layer Optimization and Design
                                  approach under QoS constraints for green
                                  IP over WDM networks . . . . . . . . . . 177--190
                    Xu Wang and   
                Hailong Sun and   
                  Ting Deng and   
                   Jinpeng Huai   On the tradeoff of availability and
                                  consistency for quorum systems in data
                                  center networks  . . . . . . . . . . . . 191--206
        Mustafa Ilhan Akbas and   
          Matthias R. Brust and   
               Damla Turgut and   
           Carlos H. C. Ribeiro   A preferential attachment model for
                                  primate social networks  . . . . . . . . 207--226
       Tugrul Çavdar and   
           Erkan Güler and   
              Zhaleh Sadreddini   Instant overbooking framework for
                                  cognitive radio networks . . . . . . . . 227--241
              Yuichi Ohsita and   
           Takashi Miyamura and   
          Shin'ichi Arakawa and   
            Shohei Kamamura and   
          Daisaku Shimazaki and   
             Kohei Shiomoto and   
          Atsushi Hiramatsu and   
                Masayuki Murata   Aggregation of traffic information for
                                  hierarchical routing reconfiguration . . 242--258
            Martino Fornasa and   
             Michele Stecca and   
            Massimo Maresca and   
            Pierpaolo Baglietto   Bounded latency spanning tree
                                  reconfiguration  . . . . . . . . . . . . 259--274
                Bilal Gonen and   
              Gurhan Gunduz and   
                   Murat Yuksel   Automated network management and
                                  configuration using Probabilistic
                                  Trans-Algorithmic Search . . . . . . . . 275--293
                   Chao Gao and   
               Guorong Zhao and   
                 Jianhua Lu and   
                     Shuang Pan   A grid-based cooperative QoS routing
                                  protocol with fading memory optimization
                                  for navigation carrier ad hoc networks   294--316
             Müge Erel and   
               Zemre Arslan and   
  Yusuf Özçevik and   
                   Berk Canberk   Grade of Service (GoS) based adaptive
                                  flow management for Software Defined
                                  Heterogeneous Networks (SDHetN)  . . . . 317--330
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 77, Number ??, February 11, 2015

          Alfonso Iacovazzi and   
                Andrea Baiocchi   Protecting traffic privacy for massive
                                  aggregated traffic . . . . . . . . . . . 1--17
               Jerzy Domzal and   
        Zbigniew Duli\'nski and   
            Miroslaw Kantor and   
                Jacek Rzasa and   
          Rafal Stankiewicz and   
            Krzysztof Wajda and   
           Robert Wójcik   A survey on methods to provide multipath
                                  transmission in wired packet networks    18--41
             Michele Albano and   
                 Stefano Chessa   Replication vs erasure coding in data
                                  centric storage for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 42--55
                   Dexiang Wang   Tradeoff study among traffic egression
                                  schemes and member allocation
                                  optimization for link aggregation groups
                                  in integrated switching systems  . . . . 56--72
     Giovanni Accongiagioco and   
             Enrico Gregori and   
                Luciano Lenzini   S-BITE: a Structure-Based Internet
                                  Topology gEnerator . . . . . . . . . . . 73--89
               Scott Fowler and   
     Ahmed Omar Shahidullah and   
             Mohammed Osman and   
          Johan M. Karlsson and   
                        Di Yuan   Analytical evaluation of extended DRX
                                  with additional active cycles for light
                                  traffic  . . . . . . . . . . . . . . . . 90--102
  Hassan Habibi Gharakheili and   
            Arun Vishwanath and   
                Vijay Sivaraman   Comparing edge and host traffic pacing
                                  in small buffer networks . . . . . . . . 103--116
         Sebastian Neumayer and   
                 Alon Efrat and   
                  Eytan Modiano   Geographic max-flow and min-cut under a
                                  circular disk failure model  . . . . . . 117--127
          Farzad Tashtarian and   
   M. H. Yaghmaee Moghaddam and   
            Khosrow Sohraby and   
                  Sohrab Effati   ODT: Optimal deadline-based trajectory
                                  for mobile sinks in WSN: a decision tree
                                  and dynamic programming approach . . . . 128--143
              Phuong Luu Vo and   
         Duc Ngoc Minh Dang and   
                Sungwon Lee and   
           Choong Seon Hong and   
                  Quan Le-Trung   A coalitional game approach for
                                  fractional cooperative caching in
                                  content-oriented networks  . . . . . . . 144--152
        Aristotelis Kretsis and   
        Panagiotis Kokkinos and   
  Kostas Christodoulopoulos and   
        Theodora Varvarigou and   
   Emmanouel (Manos) Varvarigos   Mantis: Cloud-based optical network
                                  planning and operation tool  . . . . . . 153--168
          Shashank Shanbhag and   
         Arun Reddy Kandoor and   
                  Cong Wang and   
             Ramgopal Mettu and   
                    Tilman Wolf   VHub: Single-stage virtual network
                                  mapping through hub location . . . . . . 169--180
               Myungjin Lee and   
            Mohammad Hajjat and   
        Ramana Rao Kompella and   
                  Sanjay G. Rao   A flow measurement architecture to
                                  preserve application structure . . . . . 181--195
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 78, Number ??, February 26, 2015

                      Anonymous   Editorial Board  . . . . . . . . . . . . ibc--ibc
             Richard Combes and   
      Salah Eddine Elayoubi and   
                 Arshad Ali and   
                Louai Saker and   
                  Tijani Chahed   Optimal online control for sleep mode in
                                  green base stations  . . . . . . . . . . ibc--ibc
                  Chao Fang and   
              F. Richard Yu and   
                  Tao Huang and   
                  Jiang Liu and   
                     Yunjie Liu   An energy-efficient distributed
                                  in-network caching scheme for green
                                  content-centric networks . . . . . . . . ibc--ibc
              Fatemeh Ganji and   
             Lukasz Budzisz and   
            Fikru G. Debele and   
                 Nanfang Li and   
                Michela Meo and   
                Marco Ricca and   
                   Yi Zhang and   
                    Adam Wolisz   Greening campus WLANs: Energy-relevant
                                  usage and mobility patterns  . . . . . . ibc--ibc
         Ward Van Heddeghem and   
           Filip Idzikowski and   
         Francesco Musumeci and   
          Achille Pattavina and   
                Bart Lannoo and   
               Didier Colle and   
                 Mario Pickavet   A power consumption sensitivity analysis
                                  of circuit-switched versus
                                  packet-switched backbone networks  . . . ibc--ibc
                Xiaoli Huan and   
                  Bang Wang and   
                   Yijun Mo and   
               Laurence T. Yang   Rechargeable router placement based on
                                  efficiency and fairness in green
                                  wireless mesh networks . . . . . . . . . ibc--ibc
                 S. Lambert and   
                  B. Lannoo and   
                   A. Dixit and   
                   D. Colle and   
                M. Pickavet and   
                J. Montalvo and   
             J. A. Torrijos and   
                      P. Vetter   Energy efficiency analysis of high speed
                                  triple-play services in next-generation
                                  PON deployments  . . . . . . . . . . . . ibc--ibc
              Nam Pham Ngoc and   
           Thanh Nguyen Huu and   
             Trong Vu Quang and   
              Vu Tran Hoang and   
           Huong Truong Thu and   
             Phuoc Tran-Gia and   
             Christian Schwartz   A new power profiling method and power
                                  scaling mechanism for energy-aware
                                  NetFPGA gigabit router . . . . . . . . . ibc--ibc
                    J. Peng and   
                    P. Hong and   
                         K. Xue   Optimal power management under delay
                                  constraint in cellular networks with
                                  hybrid energy sources  . . . . . . . . . ibc--ibc
            Marco Polverini and   
          Antonio Cianfrani and   
               Angelo Coiro and   
             Marco Listanti and   
                Roberto Bruschi   Freezing forwarding functionality to
                                  make the network greener . . . . . . . . ibc--ibc
          Balaji Rengarajan and   
             Gianluca Rizzo and   
            Marco Ajmone Marsan   Energy-optimal base station density in
                                  cellular access networks with sleep
                                  modes  . . . . . . . . . . . . . . . . . ibc--ibc
              Pablo Serrano and   
  Xavier Costa-Pérez and   
                 Jinsong Wu and   
                Ken Christensen   Special Issue: Green Communications  . . ibc--ibc
                  Kyuho Son and   
                 Eunsung Oh and   
         Bhaskar Krishnamachari   Energy-efficient design of heterogeneous
                                  cellular networks from deployment to
                                  operation  . . . . . . . . . . . . . . . ibc--ibc
         Luis Suárez and   
              Loutfi Nuaymi and   
              Jean-Marie Bonnin   Energy-efficient BS switching-off and
                                  cell topology management for macro/femto
                                  environments . . . . . . . . . . . . . . ibc--ibc
               Jiayuan Wang and   
                   Xin Chen and   
             Chris Phillips and   
                       Ying Yan   Energy efficiency with QoS control in
                                  dynamic optical networks with SDN
                                  enabled integrated control plane . . . . ibc--ibc
           M. Aykut Yigitel and   
         Ozlem Durmaz Incel and   
                      Cem Ersoy   QoS vs. energy: a traffic-aware topology
                                  management scheme for green
                                  heterogeneous networks . . . . . . . . . ibc--ibc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 79, Number ??, March 14, 2015

     Pantelis A. Frangoudis and   
              George C. Polyzos   Reputation-based crowdsourced Wi-Fi
                                  topology discovery . . . . . . . . . . . 1--16
                   Wei Wang and   
                Linlin Yang and   
               Yanjiao Chen and   
                     Qian Zhang   A privacy-aware framework for targeted
                                  advertising  . . . . . . . . . . . . . . 17--29
            Noor Al-Nakhala and   
                 Ryan Riley and   
                  Tarek Elfouly   Distributed algorithms in wireless
                                  sensor networks: an approach for
                                  applying binary consensus in a real
                                  testbed  . . . . . . . . . . . . . . . . 30--38
          Md. Tauhiduzzaman and   
                       Mea Wang   Fighting pollution attacks in P2P
                                  streaming  . . . . . . . . . . . . . . . 39--52
                  Seil Jeon and   
                 Namhi Kang and   
              Daniel Corujo and   
                  Rui L. Aguiar   Comprehensive performance evaluation of
                                  distributed and dynamic mobility routing
                                  strategy . . . . . . . . . . . . . . . . 53--67
Revathi Bangalore Somanatha and   
              J. William Atwood   Router authentication, key management,
                                  and adjacency management for securing
                                  inter-router control messages  . . . . . 68--90
             Young-Hwan Kim and   
              Roberto Konow and   
              Diego Dujovne and   
           Thierry Turletti and   
              Walid Dabbous and   
                Gonzalo Navarro   PcapWT: an efficient packet extraction
                                  tool for large volume network traces . . 91--102
              A. Mostefaoui and   
               A. Boukerche and   
              M. A. Merzoug and   
                     M. Melkemi   A scalable approach for serial data
                                  fusion in Wireless Sensor Networks . . . 103--119
                Elisa Rojas and   
    Guillermo Ibañez and   
 Jose Manuel Gimenez-Guzman and   
             Juan A. Carral and   
    Alberto Garcia-Martinez and   
      Isaias Martinez-Yelmo and   
               Jose Manuel Arco   All-Path bridging: Path exploration
                                  protocols for data center and campus
                                  networks . . . . . . . . . . . . . . . . 120--132
                Sangyup Han and   
              Myungchul Kim and   
                    Ben Lee and   
                   Sungwon Kang   Fast Directional Handoff and lightweight
                                  retransmission protocol for enhancing
                                  multimedia quality in indoor WLANs . . . 133--147
    Róza Go\'scie\'n and   
        Krzysztof Walkowiak and   
            Miroslaw Klinkowski   Tabu search algorithm for routing,
                                  modulation and spectrum allocation in
                                  elastic optical network with anycast and
                                  unicast traffic  . . . . . . . . . . . . 148--165
     Muhammad Adeel Mahmood and   
         Winston K. G. Seah and   
                      Ian Welch   Reliability in wireless sensor networks:
                                  a survey and challenges ahead  . . . . . 166--187
   Fabrício A. Silva and   
         Azzedine Boukerche and   
       Thais R. M. B. Silva and   
            Linnyer B. Ruiz and   
         Antonio A. F. Loureiro   A novel macroscopic mobility model for
                                  vehicular networks . . . . . . . . . . . 188--202
               Pablo Romero and   
             Franco Robledo and   
Pablo Rodríguez-Bocca and   
              Claudia Rostagnol   Lyapunov stability and performance of
                                  user-assisted Video-on-Demand services   203--215
         Behnaz Bostanipour and   
            Beno\^\it Garbinato   Effective and efficient neighbor
                                  detection for proximity-based mobile
                                  applications . . . . . . . . . . . . . . 216--235
             Yousri Daldoul and   
      Djamal-Eddine Meddour and   
               Toufik Ahmed and   
                  Raouf Boutaba   Impact of device unavailability on the
                                  reliability of multicast transport in
                                  IEEE 802.11 networks . . . . . . . . . . 236--246
Álvaro Pachón and   
      Andrés Navarro and   
 Ubaldo García-Palomares   A flexible mid-term frequency domain
                                  scheduler for resource allocation in
                                  HetNets based on the SINR requested by
                                  users  . . . . . . . . . . . . . . . . . 247--262
            Michael Donohoe and   
           Brendan Jennings and   
     Sasitharan Balasubramaniam   Context-awareness and the smart grid:
                                  Requirements and challenges  . . . . . . 263--282
                  Ting Wang and   
                 Zhiyang Su and   
                     Yu Xia and   
             Jogesh Muppala and   
                   Mounir Hamdi   Designing efficient high performance
                                  server-centric data center network
                                  architecture . . . . . . . . . . . . . . 283--296
             You-Chiun Wang and   
                Chien-An Chuang   Efficient eNB deployment strategy for
                                  heterogeneous cells in 4G LTE systems    297--312
                 Julio Soto and   
               Michele Nogueira   A framework for resilient and secure
                                  spectrum sensing on cognitive radio
                                  networks . . . . . . . . . . . . . . . . 313--322
                Fatma Ekici and   
        Didem Gözüpek   Joint overlay routing and relay
                                  assignment for green networks  . . . . . 323--344
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 80, Number ??, April 7, 2015

             M. S. Siddiqui and   
                 D. Montero and   
         R. Serral-Graci\`a and   
             X. Masip-Bruin and   
                    M. Yannuzzi   A survey on the recent efforts of the
                                  Internet Standardization Body for
                                  securing inter-domain routing  . . . . . 1--26
          Gabriel Martorell and   
           Guillem Femenias and   
              Felip Riera-Palou   Non-saturated IEEE 802.11 networks. A
                                  hierarchical $3$D Markov model . . . . . 27--50
                Amin Karami and   
          Manel Guerrero-Zapata   An ANFIS-based cache replacement method
                                  for mitigating cache pollution attacks
                                  in Named Data Networking . . . . . . . . 51--65
            Sergio Pastrana and   
           Juan E. Tapiador and   
             Agustin Orfila and   
              Pedro Peris-Lopez   DEFIDNET: a framework for optimal
                                  allocation of cyberdefenses in Intrusion
                                  Detection Networks . . . . . . . . . . . 66--88
             Adelina Madhja and   
        Sotiris Nikoletseas and   
            Theofanis P. Raptis   Distributed wireless power transfer in
                                  sensor networks with multiple Mobile
                                  Chargers . . . . . . . . . . . . . . . . 89--108
              Yangming Zhao and   
                Yifan Huang and   
                   Kai Chen and   
                  Minlan Yu and   
                 Sheng Wang and   
                   DongSheng Li   Joint VM placement and topology
                                  optimization for traffic scalability in
                                  dynamic datacenter networks  . . . . . . 109--123
                 Anita Sobe and   
        Wilfried Elmenreich and   
           Tibor Szkaliczki and   
   Laszlo Böszörmenyi   SEAHORSE: Generalizing an artificial
                                  hormone system algorithm to a middleware
                                  for search and delivery of information
                                  units  . . . . . . . . . . . . . . . . . 124--142
                 Amin Azari and   
           Jalil S. Harsini and   
                Farshad Lahouti   Performance analysis of ad-hoc routing
                                  in heterogeneous clustered multi-hop
                                  wireless networks  . . . . . . . . . . . 143--154
                Leng-Gan Yi and   
                      Yi-Min Lu   Utility-driven relay for hybrid access
                                  femtocells based on cognitive radio
                                  spectrum auction . . . . . . . . . . . . 155--166
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 81, Number ??, April 22, 2015

                    Xin Jin and   
                  Yu-Kwong Kwok   Coercion builds cooperation in dynamic
                                  and heterogeneous P2P live streaming
                                  networks . . . . . . . . . . . . . . . . 1--18
        José Marinho and   
               Edmundo Monteiro   CORHYS: Hybrid signaling for
                                  opportunistic distributed cognitive
                                  radio  . . . . . . . . . . . . . . . . . 19--42
          Cristiano Rezende and   
         Azzedine Boukerche and   
           Mohammed Almulla and   
         Antonio A. F. Loureiro   The selective use of redundancy for
                                  video streaming over Vehicular Ad Hoc
                                  Networks . . . . . . . . . . . . . . . . 43--62
          Ilaria Malanchini and   
               Steven Weber and   
                  Matteo Cesana   Stochastic characterization of the
                                  spectrum sharing game in ad-hoc networks 63--78
              Hamid Farhady and   
               HyunYong Lee and   
                  Akihiro Nakao   Software-Defined Networking: a survey    79--95
               Niels Bouten and   
      Ricardo de O. Schmidt and   
              Jeroen Famaey and   
        Steven Latré and   
                  Aiko Pras and   
                 Filip De Turck   QoE-driven in-network optimization for
                                  Adaptive Video Streaming based on packet
                                  sampling measurements  . . . . . . . . . 96--115
              Soochang Park and   
             Seung-Woo Hong and   
                 Euisin Lee and   
                Sang-Ha Kim and   
                    Noel Crespi   Large-scale mobile phenomena monitoring
                                  with energy-efficiency in wireless
                                  sensor networks  . . . . . . . . . . . . 116--135
           Ghadah Aldabbagh and   
        Sheikh Tahir Bakhsh and   
              Nadine Akkari and   
               Sabeen Tahir and   
              Haleh Tabrizi and   
                    John Cioffi   QoS-Aware Tethering in a Heterogeneous
                                  Wireless Network using LTE and TV White
                                  Spaces . . . . . . . . . . . . . . . . . 136--146
                 Andra Lutu and   
            Marcelo Bagnulo and   
            Cristel Pelsser and   
                Kenjiro Cho and   
                Rade Stanojevic   An analysis of the economic impact of
                                  strategic deaggregation  . . . . . . . . 147--163
                 Zhen Huang and   
               Jinbang Chen and   
                 Yisong Lin and   
                Pengfei You and   
                    Yuxing Peng   Minimizing data redundancy for high
                                  reliable cloud storage systems . . . . . 164--177
               Hakan Kardes and   
          Mehmet Hadi Gunes and   
                    Kamil Sarac   Graph Based Induction of unresponsive
                                  routers in Internet topologies . . . . . 178--200
               A. Socievole and   
                  E. Yoneki and   
                F. De Rango and   
                   J. Crowcroft   ML--SOR: Message routing using
                                  multi-layer social networks in
                                  opportunistic communications . . . . . . 201--219
   Christos Anagnostopoulos and   
   Stathes Hadjiefthymiades and   
             Kostas Kolomvatsos   Time-optimized user grouping in Location
                                  Based Services . . . . . . . . . . . . . 220--244
                    Li Yang and   
                Jianfeng Ma and   
                Wenjing Lou and   
                       Qi Jiang   A delegation based cross trusted domain
                                  direct anonymous attestation scheme  . . 245--257
           Siddhartha Sarma and   
                       Joy Kuri   Optimal power allocation for protective
                                  jamming in wireless networks: a flow
                                  based model  . . . . . . . . . . . . . . 258--271
               Andrea Detti and   
                Bruno Ricci and   
         Nicola Blefari-Melazzi   Mobile peer-to-peer video streaming over
                                  information-centric networks . . . . . . 272--288
                    Wei Yin and   
                 Peizhao Hu and   
               Jadwiga Indulska   Rate control in the mac80211 framework:
                                  Overview, evaluation and improvements    289--307
                  Bing Wang and   
                  Yao Zheng and   
                Wenjing Lou and   
                  Y. Thomas Hou   DDoS attack protection in the era of
                                  cloud computing and Software-Defined
                                  Networking . . . . . . . . . . . . . . . 308--319
       Tobias Hoßfeld and   
            Michael Seufert and   
           Christian Sieber and   
              Thomas Zinner and   
                 Phuoc Tran-Gia   Identifying QoE optimal adaptation of
                                  HTTP adaptive streaming based on
                                  subjective studies . . . . . . . . . . . 320--332
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 82, Number ??, May 8, 2015

           Wouter Tavernier and   
            Deborah Frincke and   
           Achim Autenrieth and   
                   Didier Colle   Editorial  . . . . . . . . . . . . . . . 1--3
        Abdulaziz Alashaikh and   
               Teresa Gomes and   
                   David Tipper   The \em Spine concept for improving
                                  network availability . . . . . . . . . . 4--19
         Aditya Sundarrajan and   
     Srinivasan Ramasubramanian   Fast reroute from single link and single
                                  node failures for IP multicast . . . . . 20--33
            M. Todd Gardner and   
                Rebecca May and   
                 Cory Beard and   
                     Deep Medhi   A Geographic Multi-Topology Routing
                                  approach and its benefits during
                                  large-scale geographically correlated
                                  failures . . . . . . . . . . . . . . . . 34--49
                Yufei Cheng and   
            M. Todd Gardner and   
                  Junyan Li and   
                Rebecca May and   
                 Deep Medhi and   
           James P. G. Sterbenz   Analysing GeoPath diversity and
                                  improving routing performance in optical
                                  networks . . . . . . . . . . . . . . . . 50--67
      Péter Babarczi and   
              Alija Pasi\'c and   
      János Tapolcai and   
Felicián Németh and   
          Bence Ladóczki   Instantaneous recovery of unicast
                                  connections in transport networks:
                                  Routing versus coding  . . . . . . . . . 68--80
             Yong-Hyuk Moon and   
                 Chan-Hyun Youn   Multihybrid job scheduling for
                                  fault-tolerant distributed computing in
                                  policy-constrained resource networks . . 81--95
              Sergio Fortes and   
               Raquel Barco and   
Alejandro Aguilar-García and   
             Pablo Muñoz   Contextualized indicators for online
                                  failure diagnosis in cellular networks   96--113
      Jesús Friginal and   
     David de Andrés and   
           Juan-Carlos Ruiz and   
         Miquel Martínez   REFRAHN: a Resilience Evaluation
                                  Framework for Ad Hoc Routing Protocols   114--134
             M. S. Siddiqui and   
                 D. Montero and   
         R. Serral-Graci\`a and   
                    M. Yannuzzi   Self-reliant detection of route leaks in
                                  inter-domain routing . . . . . . . . . . 135--155
               Sahel Sahhaf and   
           Wouter Tavernier and   
               Didier Colle and   
             Mario Pickavet and   
                 Piet Demeester   Experimental validation of resilient
                                  tree-based greedy geometric routing  . . 156--171
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 83, Number ??, June 4, 2015

               Munyoung Lee and   
              Junghwan Song and   
                 Kideok Cho and   
              Sangheon Pack and   
       Ted `Taekyoung' Kwon and   
          Jussi Kangasharju and   
                   Yanghee Choi   Content discovery for
                                  information-centric networking . . . . . 1--14
              Carlo Vallati and   
                  Enzo Mingozzi   Efficient design of wireless mesh
                                  networks with robust dynamic frequency
                                  selection capability . . . . . . . . . . 15--29
                    Min Luo and   
                Yulong Zeng and   
                 Jianfei Li and   
                        Wu Chou   An adaptive multi-path computation
                                  framework for centrally controlled
                                  networks . . . . . . . . . . . . . . . . 30--44
             Anna Dudnikova and   
              Daniela Panno and   
           Antonio Mastrosimone   Measurement-based coverage function for
                                  green femtocell networks . . . . . . . . 45--58
                 Zichuan Xu and   
                    Weifa Liang   Operational cost minimization of
                                  distributed data centers through the
                                  provision of fair request rate
                                  allocations while meeting different user
                                  SLAs . . . . . . . . . . . . . . . . . . 59--75
                Samil Temel and   
                 Ilker Bekmezci   LODMAC: Location Oriented Directional
                                  MAC protocol for FANETs  . . . . . . . . 76--84
                Yaoqing Liu and   
               Vince Lehman and   
                       Lan Wang   Efficient FIB caching using minimal
                                  non-overlapping prefixes . . . . . . . . 85--99
             Xiaoying Zheng and   
               Chunglae Cho and   
                         Ye Xia   Content distribution by multiple
                                  multicast trees and intersession
                                  cooperation: Optimal algorithms and
                                  approximations . . . . . . . . . . . . . 100--117
                    C. Cano and   
                      D. Malone   On efficiency and validity of previous
                                  Homeplug MAC performance analysis  . . . 118--135
          Matteo Dell'Amico and   
           Pietro Michiardi and   
                Laszlo Toka and   
               Pasquale Cataldi   Adaptive redundancy management for
                                  durable P2P backup . . . . . . . . . . . 136--148
Adrián Sánchez-Carmona and   
               Sergi Robles and   
                 Carlos Borrego   Endeavouring to be in the good books.
                                  Awarding DTN network use for
                                  acknowledging the reception of bundles   149--166
               Farha N. Ali and   
               Yvon Feaster and   
               Jiannan Zhai and   
             Jason O. Hallstrom   The smart surface network: a bus-based
                                  approach to dense sensing  . . . . . . . 167--183
                Sheng Zhang and   
                     Jie Wu and   
              Zhuzhong Qian and   
                      Sanglu Lu   MobiCache: Cellular traffic offloading
                                  leveraging cooperative caching in mobile
                                  social networks  . . . . . . . . . . . . 184--198
                   Dexiang Wang   Bandwidth-efficiency-oriented topology
                                  optimization for integrated switching
                                  systems based on circulant graphs  . . . 199--216
           L. Rajya Lakshmi and   
           Vinay J. Ribeiro and   
                     B. N. Jain   PRIME: a partial path establishment
                                  based handover management technique for
                                  QoS support in WiMAX based wireless mesh
                                  networks . . . . . . . . . . . . . . . . 217--234
              Andrea Bianco and   
                Davide Cuda and   
           Jorge M. Finochietto   Short-term fairness in slotted WDM rings 235--248
Martín Zubeldía and   
     Andrés Ferragut and   
              Fernando Paganini   Neighbor selection for proportional
                                  fairness in P2P networks . . . . . . . . 249--264
     Konstantin Avrachenkov and   
             Jocelyne Elias and   
            Fabio Martignon and   
            Giovanni Neglia and   
                 Leon Petrosyan   Cooperative network design: a Nash
                                  bargaining solution approach . . . . . . 265--279
            Francesco Longo and   
        Salvatore Distefano and   
               Dario Bruneo and   
                   Marco Scarpa   Dependability modeling of Software
                                  Defined Networking . . . . . . . . . . . 280--296
                Xingkong Ma and   
                 Yijie Wang and   
              Xiaoqiang Pei and   
                   Fangliang Xu   Scalable and elastic total order in
                                  content-based publish/subscribe systems  297--314
                   Lei Ding and   
            Tommaso Melodia and   
         Stella N. Batalama and   
                John D. Matyjas   Distributed resource allocation in
                                  cognitive and cooperative ad hoc
                                  networks through joint routing, relay
                                  selection and spectrum allocation  . . . 315--331
                  Lara Deek and   
     Eduard Garcia-Villegas and   
          Elizabeth Belding and   
                Sung-Ju Lee and   
                 Kevin Almeroth   A practical framework for 802.11 MIMO
                                  rate adaptation  . . . . . . . . . . . . 332--348
               Yuanzhu Chen and   
                     Xu Liu and   
                 Jiafen Liu and   
              Walter Taylor and   
                 Jason H. Moore   Delay-tolerant networks and network
                                  coding: Comparative studies on simulated
                                  and real-device experiments  . . . . . . 349--362
               Adnan Nadeem and   
     Muhammad Azhar Hussain and   
           Obaidullah Owais and   
                Abdul Salam and   
               Sarwat Iqbal and   
                   Kamran Ahsan   Application specific study, analysis and
                                  classification of body area wireless
                                  sensor network applications  . . . . . . 363--380
             Giuseppe Aceto and   
         Antonio Pescapé   Internet Censorship detection: a survey  381--421
       Vahid Nazari Talooki and   
           Riccardo Bassoli and   
           Daniel E. Lucani and   
         Jonathan Rodriguez and   
         Frank H. P. Fitzek and   
               Hugo Marques and   
                Rahim Tafazolli   Security concerns and countermeasures in
                                  network coding based communication
                                  systems: a survey  . . . . . . . . . . . 422--445
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 84, Number ??, June 19, 2015

               Dingde Jiang and   
              Yuanting Wang and   
               Chunping Yao and   
                       Yang Han   An effective dynamic spectrum access
                                  algorithm for multi-hop cognitive
                                  wireless networks  . . . . . . . . . . . 1--16
           Md. Rakib Hassan and   
              Gour Karmakar and   
        Joarder Kamruzzaman and   
                Bala Srinivasan   A comprehensive spectrum trading scheme
                                  based on market competition, reputation
                                  and buyer specific requirements  . . . . 17--31
               Sumanta Saha and   
          Andrey Lukyanenko and   
Antti Ylä-Jääski   Efficient cache availability management
                                  in Information-Centric Networks  . . . . 32--45
          Roberto Di Pietro and   
               Gabriele Oligeri   ESC: an efficient, scalable, and
                                  crypto-less solution to secure wireless
                                  networks . . . . . . . . . . . . . . . . 46--63
                   Chen Ran and   
               Shaowei Wang and   
                 Chonggang Wang   Cellular networks planning: a workload
                                  balancing perspective  . . . . . . . . . 64--75
               Sahar Hoteit and   
              Stefano Secci and   
                Guy Pujolle and   
                Adam Wolisz and   
           Cezary Ziemlicki and   
               Zbigniew Smoreda   Mobile data traffic offloading over
                                  Passpoint hotspots . . . . . . . . . . . 76--93
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 85, Number ??, July 5, 2015

            Ian F. Akyildiz and   
                    Pu Wang and   
                  Shih-Chun Lin   SoftAir: a software defined networking
                                  architecture for 5G wireless systems . . 1--18
             Changhoon Yoon and   
               Taejune Park and   
               Seungsoo Lee and   
                 Heedo Kang and   
              Seungwon Shin and   
                  Zonghua Zhang   Enabling security functions with SDN: a
                                  feasibility study  . . . . . . . . . . . 19--35
             Tatsuya Otoshi and   
              Yuichi Ohsita and   
            Masayuki Murata and   
          Yousuke Takahashi and   
          Keisuke Ishibashi and   
                 Kohei Shiomoto   Traffic prediction for dynamic traffic
                                  engineering  . . . . . . . . . . . . . . 36--50
                     Jun He and   
                       Wei Song   Smart routing: Fine-grained stall
                                  management of video streams in mobile
                                  core networks  . . . . . . . . . . . . . 51--62
            Mohammed L. Ali and   
                 Pin-Han Ho and   
          János Tapolcai   SRLG fault localization using nested
                                  $m$-trails . . . . . . . . . . . . . . . 63--79
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 86, Number ??, July 5, 2015

João Eugenio Marynowski and   
        Altair Olivo Santin and   
        Andrey Ricardo Pimentel   Method for testing the fault tolerance
                                  of MapReduce frameworks  . . . . . . . . 1--13
          Mehmet Hadi Gunes and   
               Murat Yuksel and   
                Hayreddin Ceker   A blind processing framework to
                                  facilitate openness in smart grid
                                  communications . . . . . . . . . . . . . 14--26
                  Xinyun Wu and   
                     Tao Ye and   
                     Qi Guo and   
                Zhipeng Lü   GRASP for traffic grooming and routing
                                  with simple path constraints in WDM mesh
                                  networks . . . . . . . . . . . . . . . . 27--39
     Eduard Garcia-Villegas and   
   Muhammad Shahwaiz Afaqui and   
           Elena Lopez-Aguilera   A novel cheater and jammer detection
                                  scheme for IEEE 802.11-based wireless
                                  LANs . . . . . . . . . . . . . . . . . . 40--56
               Yingbiao Yao and   
                   Nanlan Jiang   Distributed wireless sensor network
                                  localization based on weighted search    57--75
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 87, Number ??, July 20, 2015

               Jianxin Liao and   
                 Ziteng Cui and   
                Jingyu Wang and   
                Tonghong Li and   
                      Qi Qi and   
                      Jing Wang   A coalitional game approach on improving
                                  interactions in multiple overlay
                                  environments . . . . . . . . . . . . . . 1--15
             Walter Cerroni and   
            Molka Gharbaoui and   
            Barbara Martini and   
                 Aldo Campi and   
             Piero Castoldi and   
               Franco Callegati   Cross-layer resource orchestration for
                                  cloud service delivery: a seamless SDN
                                  approach . . . . . . . . . . . . . . . . 16--32
                     Shu Fu and   
                     Bin Wu and   
             Xiaohong Jiang and   
          Achille Pattavina and   
                   Hong Wen and   
                    Hongfang Yu   Switch cost and packet delay tradeoff in
                                  data center networks with switch
                                  reconfiguration overhead . . . . . . . . 33--43
Leovigildo Sánchez-Casado and   
Gabriel Maciá-Fernández and   
Pedro García-Teodoro and   
Roberto Magán-Carrión   A model of data forwarding in MANETs for
                                  lightweight detection of malicious
                                  packet dropping  . . . . . . . . . . . . 44--58
             Carlos Borrego and   
               Sergi Robles and   
           Angela Fabregues and   
Adrián Sánchez-Carmona   A mobile code bundle extension for
                                  application-defined routing in delay and
                                  disruption tolerant networking . . . . . 59--77
                    Lin Yao and   
                  Jing Deng and   
                   Jie Wang and   
                      Guowei Wu   A-CACHE: an anchor-based public key
                                  caching scheme in large wireless
                                  networks . . . . . . . . . . . . . . . . 78--88
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 88, Number ??, September 9, 2015

               Ertong Zhang and   
                      Lisong Xu   Capacity and token rate estimation for
                                  networks with token bucket shapers . . . 1--11
      Mustapha Reda Senouci and   
         Abdelhamid Mellouk and   
           Latifa Oukhellou and   
                   Amar Aissani   WSNs deployment framework based on the
                                  theory of belief functions . . . . . . . 12--26
             Quoc-Tuan Vien and   
                 Wanqing Tu and   
             Huan X. Nguyen and   
                Ramona Trestian   Cross-layer topology design for network
                                  coding based wireless multicasting . . . 27--39
                Kaveh Vaezi and   
                      Nail Akar   Analytical performance modeling of
                                  elastic optical links with aligned
                                  spectrum allocation  . . . . . . . . . . 40--50
           Michele Girolami and   
             Stefano Chessa and   
                 Antonio Caruso   On service discovery in mobile social
                                  networks: Survey and perspectives  . . . 51--71
                 Xinyu Yang and   
                 Xuebin Ren and   
                Shusen Yang and   
                   Julie McCann   A novel temporal perturbation based
                                  privacy-preserving scheme for real-time
                                  monitoring systems . . . . . . . . . . . 72--88
                Victor Lira and   
            Eduardo Tavares and   
                   Paulo Maciel   An automated approach to dependability
                                  evaluation of virtual networks . . . . . 89--102
               Vladimir Fux and   
      Patrick Maillé and   
                  Matteo Cesana   Road-side units operators in
                                  competition: a game-theoretical approach 103--120
                Weigang Hou and   
                    Lei Guo and   
                  Yejun Liu and   
                 Cunqian Yu and   
                       Yue Zong   Resource management and control in
                                  converged optical data center networks:
                                  Survey and enabling technologies . . . . 121--135
                   Wei Wang and   
                   Lei Chen and   
                     Qian Zhang   Outsourcing high-dimensional healthcare
                                  data to cloud with personalized privacy
                                  preservation . . . . . . . . . . . . . . 136--148
           Dimitris Tsolkas and   
               Nikos Passas and   
                Lazaros Merakos   Enabling device discovery transmissions
                                  in LTE networks with fractional
                                  frequency reuse  . . . . . . . . . . . . 149--160
Uthpala Subodhani Premarathne and   
             Ibrahim Khalil and   
           Mohammed Atiquzzaman   Location-dependent disclosure risk based
                                  decision support framework for
                                  persistent authentication in pervasive
                                  computing applications . . . . . . . . . 161--177
         Haitham Y. Adarbah and   
              Shakeel Ahmad and   
                 Alistair Duffy   Impact of noise and interference on
                                  probabilistic broadcast schemes in
                                  mobile ad-hoc networks . . . . . . . . . 178--186
     Georgios Papadimitriou and   
            Nikolaos Pappas and   
       Apostolos Traganitis and   
             Vangelis Angelakis   Network-level performance evaluation of
                                  a two-relay cooperative random access
                                  wireless system  . . . . . . . . . . . . 187--201
            Nicol\`o Facchi and   
         Francesco Gringoli and   
             Fabio Ricciato and   
                    Andrea Toma   Emitter localisation from reception
                                  timestamps in asynchronous networks  . . 202--217
                Ahmed Makki and   
             Abubakr Siddig and   
               Mohamed Saad and   
                 Chris Bleakley   Survey of WiFi positioning using
                                  time-based techniques  . . . . . . . . . 218--233
                Imran Ahmed and   
              M. Majid Butt and   
        Constantinos Psomas and   
                Amr Mohamed and   
           Ioannis Krikidis and   
                 Mohsen Guizani   Survey on energy harvesting wireless
                                  communications: Challenges and
                                  opportunities for radio resource
                                  allocation . . . . . . . . . . . . . . . 234--248
            Aissan Dalvandi and   
             Mohan Gurusamy and   
                Kee Chaing Chua   Power-efficient resource-guaranteed VM
                                  placement and routing for time-aware
                                  data center applications . . . . . . . . 249--268
              Nuno Coutinho and   
              Ricardo Matos and   
             Carlos Marques and   
          André Reis and   
            Susana Sargento and   
           Jacob Chakareski and   
                Andreas Kassler   Dynamic dual-reinforcement-learning
                                  routing strategies for quality of
                                  experience-aware wireless mesh
                                  networking . . . . . . . . . . . . . . . 269--285


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 89, Number ??, 2015

                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc
                  Ji-Su Kim and   
                 Jin-Ki Kim and   
                   Jae-Hyun Kim   Advanced handover scheme considering
                                  downlink and uplink service traffic in
                                  asymmetric channel . . . . . . . . . . . 1--13
                 Jernej Kos and   
                Mahdi Aiash and   
               Jonathan Loo and   
             Denis Trçek   U-Sphere: Strengthening scalable
                                  flat-name routing for decentralized
                                  networks . . . . . . . . . . . . . . . . 14--31
            Francesco Rossi and   
                Giovanni Schmid   Identity-based secure group
                                  communications using pairings  . . . . . 32--43
                      Bo Fu and   
                      Yang Xiao   A multi-resolution accountable logging
                                  and its applications . . . . . . . . . . 44--58
        Rodrigo R. Oliveira and   
           Daniel S. Marcon and   
           Leonardo R. Bays and   
            Miguel C. Neves and   
         Luciano P. Gaspary and   
                 Deep Medhi and   
           Marinho P. Barcellos   Opportunistic Resilience Embedding
                                  (ORE): Toward cost-efficient resilient
                                  virtual networks . . . . . . . . . . . . 59--77
        Roberto Rojas-Cessa and   
     Taweesak Kijkanjanarat and   
              Wara Wangchai and   
              Krutika Patil and   
     Narathip Thirapittayatakul   Helix: IP lookup scheme based on
                                  helicoidal properties of binary trees    78--89
Toke Hòiland-Jòrgensen and   
                 Per Hurtig and   
                 Anna Brunstrom   The Good, the Bad and the WiFi: Modern
                                  AQMs in a residential setting  . . . . . 90--106
           Nicola Accettura and   
            Giovanni Neglia and   
           Luigi Alfredo Grieco   The Capture--Recapture approach for
                                  population estimation in computer
                                  networks . . . . . . . . . . . . . . . . 107--122


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 90, Number ??, October 29, 2015

       Tobias Hoßfeld and   
             Phuoc Tran-Gia and   
                   Maja Vukovic   Special issue on crowdsourcing . . . . . 1--4
             Gianluca Demartini   Hybrid human-machine information
                                  systems: Challenges and opportunities    5--13
              Ognjen Scekic and   
           Hong-Linh Truong and   
               Schahram Dustdar   PRINGL --- a domain-specific language
                                  for incentive management in
                                  crowdsourcing  . . . . . . . . . . . . . 14--33
            Jorge Goncalves and   
                 Simo Hosio and   
           Jakob Rogstadius and   
        Evangelos Karapanos and   
              Vassilis Kostakos   Motivating participation and improving
                                  quality of contribution in ubiquitous
                                  crowdsourcing  . . . . . . . . . . . . . 34--48
                Hayam Mousa and   
          Sonia Ben Mokhtar and   
                 Omar Hasan and   
               Osama Younes and   
              Mohiy Hadhoud and   
                  Lionel Brunie   Trust management and reputation systems
                                  in mobile participatory sensing
                                  applications: a survey . . . . . . . . . 49--73
               Tomoyo Sasao and   
           Shin'ichi Konomi and   
          Masatoshi Arikawa and   
                Hideyuki Fujita   Context Weaver: Awareness and feedback
                                  in networked mobile crowdsourcing tools  74--84
             Matthias Hirth and   
       Tobias Hoßfeld and   
               Marco Mellia and   
         Christian Schwartz and   
                Frank Lehrieder   Crowdsourced network measurements:
                                  Benefits and best practices  . . . . . . 85--98
                Thomas Volk and   
           Christian Keimel and   
          Michael Moosmeier and   
                  Klaus Diepold   Crowdsourcing vs. laboratory experiments
                                  --- QoE evaluation of binaural playback
                                  in a teleconference scenario . . . . . . 99--109
        Maria Christoforaki and   
        Panagiotis G. Ipeirotis   A system for scalable and reliable
                                  technical-skill testing in online labor
                                  markets  . . . . . . . . . . . . . . . . 110--120
           Mahmood Hosseini and   
                 Jack Moore and   
             Malik Almaliki and   
         Alimohammad Shahri and   
                Keith Phalp and   
                      Raian Ali   Wisdom of the Crowd within enterprises:
                                  Practices and challenges . . . . . . . . 121--132
           Jasper Oosterman and   
                   Jie Yang and   
          Alessandro Bozzon and   
                 Lora Aroyo and   
               Geert-Jan Houben   On the impact of knowledge extraction
                                  and aggregation on crowdsourced
                                  annotation of visual artworks  . . . . . 133--149
                 Roger Baig and   
                 Ramon Roca and   
              Felix Freitag and   
                Leandro Navarro   \tt guifi.net, a crowdsourced network
                                  infrastructure held in common  . . . . . 150--165
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 91, Number ??, November 14, 2015

                 Kangho Kim and   
                Hwantae Kim and   
              Jongtack Jung and   
                   Hwangnam Kim   AFAR: a robust and delay-constrained
                                  communication framework for smart grid
                                  applications . . . . . . . . . . . . . . 1--25
             Somia Sahraoui and   
                Azeddine Bilami   Efficient HIP-based approach to ensure
                                  lightweight end-to-end security in the
                                  Internet of Things . . . . . . . . . . . 26--45
              Antti Juvonen and   
               Tuomo Sipola and   
 Timo Hämäläinen   Online anomaly detection using
                                  dimensionality reduction techniques for
                                  HTTP log analysis  . . . . . . . . . . . 46--56
           Elissar Khloussy and   
            Xavier Gelabert and   
                   Yuming Jiang   Investigation on MDP-based radio access
                                  technology selection in heterogeneous
                                  wireless networks  . . . . . . . . . . . 57--67
              Angelo Trotta and   
            Marco Di Felice and   
               Luca Bedogni and   
             Luciano Bononi and   
                 Fabio Panzieri   Connectivity recovery in post-disaster
                                  scenarios through Cognitive Radio swarms 68--89
                     Bo Fan and   
                Supeng Leng and   
                   Kun Yang and   
                      Yan Zhang   Optimal storage allocation on throwboxes
                                  in Mobile Social Networks  . . . . . . . 90--100
               Yanjiao Chen and   
                Qihong Chen and   
                  Fan Zhang and   
                 Qian Zhang and   
                 Kaishun Wu and   
              Ruochen Huang and   
                     Liang Zhou   Understanding viewer engagement of video
                                  service in Wi-Fi network . . . . . . . . 101--116
               Biling Zhang and   
                   Yan Chen and   
               Chih-Yu Wang and   
                  K. J. Ray Liu   A Chinese restaurant game for learning
                                  and decision making in cognitive radio
                                  networks . . . . . . . . . . . . . . . . 117--134
                Jiechen Yin and   
                 Yuming Mao and   
                Supeng Leng and   
               Yuming Jiang and   
             Muhammad Asad Khan   Access granularity control of
                                  multichannel random access in
                                  next-generation wireless LANs  . . . . . 135--150
                 Shuhao Liu and   
                Zhiping Cai and   
                    Hong Xu and   
                        Ming Xu   Towards security-aware virtual network
                                  embedding  . . . . . . . . . . . . . . . 151--163
                  Qianru Wu and   
                   Qixu Liu and   
               Yuqing Zhang and   
                   Guanxing Wen   TrackerDetector: a system to detect
                                  third-party trackers through machine
                                  learning . . . . . . . . . . . . . . . . 164--173
               Florin Coras and   
      Jordi Domingo-Pascual and   
       Albert Cabellos-Aparicio   On the scalability of LISP mappings
                                  caches . . . . . . . . . . . . . . . . . 174--183
               Yasir Saleem and   
          Kok-Lim Alvin Yau and   
            Hafizal Mohamad and   
               Nordin Ramli and   
        Mubashir Husain Rehmani   SMART: a SpectruM-Aware ClusteR-based
                                  rouTing scheme for distributed cognitive
                                  radio networks . . . . . . . . . . . . . 196--224
         Sandip Chakraborty and   
                  Sukumar Nandi   Data rate, path length and network
                                  contention trade-off in IEEE 802.11s
                                  mesh networks: a dynamic data rate
                                  selection approach . . . . . . . . . . . 225--243
             Xiaoying Zheng and   
                         Ye Xia   Optimizing network objectives in
                                  collaborative content distribution . . . 244--261
                    Kai Liu and   
             Xiaoying Chang and   
                   Feng Liu and   
                   Xin Wang and   
        Athanasios V. Vasilakos   A cooperative MAC protocol with rapid
                                  relay selection for wireless ad hoc
                                  networks . . . . . . . . . . . . . . . . 262--282
        Dinil Mon Divakaran and   
                      Le Su and   
            Yung Siang Liau and   
           Vrizlynn L. L. Thing   SLIC: Self-Learning Intelligent
                                  Classifier for network traffic . . . . . 283--297
                  Qun Huang and   
              Patrick P. C. Lee   A hybrid local and distributed sketching
                                  design for accurate and scalable heavy
                                  key detection in network data streams    298--315
                 N. Chrysos and   
                  F. Neeser and   
                   M. Gusat and   
              C. Minkenberg and   
                  W. Denzel and   
                   C. Basso and   
                M. Rudquist and   
                    K. Valk and   
                  B. Vanderpool   Large switches or blocking multi-stage
                                  networks? An evaluation of routing
                                  strategies for datacenter fabrics  . . . 316--328
             Jenq-Shiou Leu and   
               Min-Chieh Yu and   
                 Hung-Jie Tzeng   Improving indoor positioning precision
                                  by using received signal strength
                                  fingerprint and footprint based on
                                  weighted ambient Wi-Fi signals . . . . . 329--340
              Wassef Louati and   
            Walid Ben-Ameur and   
               Djamal Zeghlache   A bottleneck-free tree-based name
                                  resolution system for
                                  Information-Centric Networking . . . . . 341--355
                    Xia Yin and   
                     Dan Wu and   
              Zhiliang Wang and   
                Xingang Shi and   
                    Jianping Wu   DIMR: Disjoint Interdomain Multipath
                                  Routing  . . . . . . . . . . . . . . . . 356--375
                Donghai Zhu and   
                 Xinyu Yang and   
                         Wei Yu   SPAIS: a novel Self-checking Pollution
                                  Attackers Identification Scheme in
                                  network coding-based wireless mesh
                                  networks . . . . . . . . . . . . . . . . 376--389
              Gongbing Hong and   
               James Martin and   
               James M. Westall   On fairness and application performance
                                  of active queue management in broadband
                                  cable networks . . . . . . . . . . . . . 390--406
             Chien-Fu Cheng and   
             Chih-Wei Huang and   
                    Lung-Hao Li   Mobile sensor relocation problem:
                                  Finding the optimal (nearest) redundant
                                  sensor with low message overhead . . . . 407--424
        Vitaly Milyeykovski and   
              Michael Segal and   
                  Vladimir Katz   Using central nodes for efficient data
                                  collection in wireless sensor networks   425--437
          Maurizio Giacobbe and   
            Antonio Celesti and   
                Maria Fazio and   
            Massimo Villari and   
              Antonio Puliafito   Towards energy management in Cloud
                                  federation: a survey in the perspective
                                  of future sustainable and cost-saving
                                  strategies . . . . . . . . . . . . . . . 438--452
           Shahin Vakilinia and   
         Mustafa Mehmet Ali and   
                     Dongyu Qiu   Modeling of the resource allocation in
                                  cloud computing centers  . . . . . . . . 453--470
             Quoc-Viet Pham and   
              Hoang-Linh To and   
                  Won-Joo Hwang   A multi-timescale cross-layer approach
                                  for wireless ad hoc networks . . . . . . 471--482
                  Chen Tian and   
               Jingdong Sun and   
                  Weimin Wu and   
                        Yan Luo   Optimal bandwidth allocation for hybrid
                                  Video-on-Demand streaming with a
                                  distributed max flow algorithm . . . . . 483--494
                   Feng Xia and   
               Qiuyuan Yang and   
                     Jie Li and   
               Jiannong Cao and   
                     Li Liu and   
         Ahmedin Mohammed Ahmed   Data dissemination using interest-tree
                                  in socially aware networking . . . . . . 495--507
   Amir Rahimzadeh Ilkhechi and   
          Ibrahim Korpeoglu and   
         Özgür Ulusoy   Network-aware virtual machine placement
                                  in cloud data centers with multiple
                                  traffic-intensive components . . . . . . 508--527
                   Bin Wang and   
                Zhengwei Qi and   
                   Ruhui Ma and   
               Haibing Guan and   
        Athanasios V. Vasilakos   A survey on data center networking for
                                  cloud computing  . . . . . . . . . . . . 528--547
               Bong-Hwan Oh and   
                    Jaiyong Lee   Constraint-based proactive scheduling
                                  for MPTCP in wireless networks . . . . . 548--563
         Sotirios K. Goudos and   
                David Plets and   
                   Ning Liu and   
                Luc Martens and   
                    Wout Joseph   A multi-objective approach to indoor
                                  wireless heterogeneous networks planning
                                  based on biogeography-based optimization 564--576
                   Xu Zhang and   
                  Ning Wang and   
    Vassilios G. Vassilakis and   
             Michael P. Howarth   A distributed in-network caching scheme
                                  for P2P-like content chunk delivery  . . 577--592
                   Guo Chen and   
               Youjian Zhao and   
                        Dan Pei   Alleviating flow interference in data
                                  center networks through fine-grained
                                  switch queue management  . . . . . . . . 593--613
               Jun Kawahara and   
          Koji M. Kobayashi and   
                 Tomotaka Maeda   Tight analysis of priority queuing for
                                  egress traffic . . . . . . . . . . . . . 614--624
                Sok-Ian Sou and   
                Hung-Yang Hsieh   Modeling application-based charging
                                  management with traffic detection
                                  function in 3GPP . . . . . . . . . . . . 625--637
            Michele Mangili and   
            Fabio Martignon and   
                 Antonio Capone   Optimal design of Information Centric
                                  Networks . . . . . . . . . . . . . . . . 638--653
               Satish Kumar and   
               Arnab Sarkar and   
            Santhosh Sriram and   
                     Arijit Sur   A three level LTE downlink scheduling
                                  framework for RT VBR traffic . . . . . . 654--674
              T. Panayiotou and   
                 G. Ellinas and   
              N. Antoniades and   
                A. Hadjiantonis   Impairment-aware multicast session
                                  provisioning in metro optical networks   675--688
             Mahmood Ahmadi and   
      Sara Mehdizadeh Khalifani   A new look at hybrid Aloha: an
                                  analytical approach  . . . . . . . . . . 689--699
                Waya Fadini and   
     Bijoy Chand Chatterjee and   
                       Eiji Oki   A subcarrier-slot partition scheme with
                                  first-last fit spectrum allocation for
                                  elastic optical networks . . . . . . . . 700--711
                  L. F. Xie and   
          Peter H. J. Chong and   
              Ivan W. H. Ho and   
                     Y. L. Guan   A survey of inter-flow network coding in
                                  wireless mesh networks with unicast
                                  traffic  . . . . . . . . . . . . . . . . 738--751
            Antonello Rizzi and   
          Alfonso Iacovazzi and   
            Andrea Baiocchi and   
               Silvia Colabrese   A low complexity real-time Internet
                                  traffic flows neuro-fuzzy classifier . . 752--771
               Jee Hun Song and   
                Hee-Tae Roh and   
                   Jang-Won Lee   Opportunistic scheduling and incentive
                                  mechanism for OFDMA networks with D2D
                                  relaying . . . . . . . . . . . . . . . . 772--787
          J. Camilo Cardona and   
     Pierre François and   
             Bruno Decraene and   
               John Scudder and   
               Adam Simpson and   
                    Keyur Patel   Bringing high availability to BGP: a
                                  survey . . . . . . . . . . . . . . . . . 788--803
               Jun Kawahara and   
              Koji M. Kobayashi   Optimal buffer management for $2$-frame
                                  throughput maximization  . . . . . . . . 804--820
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 92 (part 1), Number ??, December 9, 2015

      Ioannis D. Moscholios and   
      Michael D. Logothetis and   
           John S. Vardakas and   
         Anthony C. Boucouvalas   Congestion probabilities of elastic and
                                  adaptive calls in Erlang--Engset
                                  multirate loss models under the
                                  threshold and bandwidth reservation
                                  policies . . . . . . . . . . . . . . . . 1--23
               Changwon Nam and   
                  Saewoong Bahk   $ \Delta $ SNR--MAC: a priority-based
                                  multi-round contention scheme for
                                  MU--MIMO WLANs . . . . . . . . . . . . . 24--40
       Péter Megyesi and   
   Géza Szabó and   
    Sándor Molnár   User behavior based traffic emulator: a
                                  framework for generating test data for
                                  DPI tools  . . . . . . . . . . . . . . . 41--54
               Xiao-Hui Lin and   
                     Yu Tan and   
              Yu-Kwong Kwok and   
                   Hui Wang and   
                Mingjun Dai and   
                   Bin Chen and   
                   Gong Chao Su   Balancing time and energy efficiencies
                                  with identification reliability
                                  constraint for portable reader in mobile
                                  RFID systems . . . . . . . . . . . . . . 55--71
                 Shouxi Luo and   
                Hongfang Yu and   
                       Lemin Li   Practical flow table aggregation in SDN  72--88
             Silvia Fichera and   
            Laura Galluccio and   
   Salvatore C. Grancagnolo and   
           Giacomo Morabito and   
                 Sergio Palazzo   OPERETTA: an OPEnflow-based REmedy to
                                  mitigate TCP SYNFLOOD Attacks against
                                  web servers  . . . . . . . . . . . . . . 89--100
                 Zhiyang Su and   
                  Ting Wang and   
                     Yu Xia and   
                   Mounir Hamdi   CeMon: a cost-effective flow monitoring
                                  system in software defined networks  . . 101--115
                Hyunbum Kim and   
                  Jorge A. Cobb   Optimization algorithms for transmission
                                  range and actor movement in wireless
                                  sensor and actor networks  . . . . . . . 116--133
            Yung-Tsung Weng and   
             Chi-Huang Shih and   
                 Chun-I Kuo and   
                  Ce-Kuen Shieh   Real-time video streaming using
                                  prediction-based forward error
                                  correction . . . . . . . . . . . . . . . 134--147
                Farah Moety and   
               Samer Lahoud and   
             Bernard Cousin and   
                   Kinda Khawam   Optimization models for the joint
                                  power-delay minimization problem in
                                  green wireless access networks . . . . . 148--167
                Karim Habak and   
           Khaled A. Harras and   
               Moustafa Youssef   Bandwidth aggregation techniques in
                                  heterogeneous multi-homed devices: a
                                  survey . . . . . . . . . . . . . . . . . 168--188
   Anderson Santos da Silva and   
                 Paul Smith and   
             Andreas Mauthe and   
        Alberto Schaeffer-Filho   Resilience support in software-defined
                                  networking: a survey . . . . . . . . . . 189--207
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 92 (part 2), Number ??, December 9, 2015

        Alberto Leon-Garcia and   
        Peter Ashwood-Smith and   
                 Yashar Ganjali   Software Defined Networks  . . . . . . . 209--210
          Luis M. Contreras and   
                Paul Doolan and   
Håkon Lònsethagen and   
          Diego R. López   Operational, organizational and business
                                  challenges for network operators in the
                                  context of SDN and NFV . . . . . . . . . 211--217
          Syed Naveed Rizvi and   
              Daniel Raumer and   
           Florian Wohlfart and   
                    Georg Carle   Towards carrier grade SDNs . . . . . . . 218--226
         Vasileios Kotronis and   
       Adrian Gämperli and   
       Xenofontas Dimitropoulos   Routing centralization across domains
                                  via SDN: a model and emulation framework
                                  for BGP evolution  . . . . . . . . . . . 227--239
               Ryo Nakamura and   
                Kouji Okada and   
                Yuji Sekiya and   
                  Hiroshi Esaki   A common data plane for multiple overlay
                                  networks . . . . . . . . . . . . . . . . 240--250
           Huu Thanh Nguyen and   
                  Anh Vu Vu and   
             Duc Lam Nguyen and   
           Van Huynh Nguyen and   
              Manh Nam Tran and   
              Quynh Thu Ngo and   
           Thu-Huong Truong and   
            Tai Hung Nguyen and   
                Thomas Magedanz   A generalized resource allocation
                                  framework in support of multi-layer
                                  virtual network embedding based on SDN   251--269
      Peter Peresíni and   
           Maciej Ku\'zniar and   
               Marco Canini and   
            Daniele Venzano and   
             Dejan Kosti\'c and   
               Jennifer Rexford   Systematically testing OpenFlow
                                  controller applications  . . . . . . . . 270--286
                    Qing Li and   
                   Kun Zhao and   
                 Yong Jiang and   
                 Mingwei Xu and   
                    Shu-Tao Xia   SARD: a Smart Approach of Rule Division
                                  for fast flow-level consistent update in
                                  SDN  . . . . . . . . . . . . . . . . . . 287--299
                  Zehua Guo and   
                    Yang Xu and   
                Marco Cello and   
               Junjie Zhang and   
               Zicheng Wang and   
               Mingjian Liu and   
               H. Jonathan Chao   JumpFlow: Reducing flow table usage in
                                  software-defined networks  . . . . . . . 300--315
                Won-Suk Kim and   
             Sang-Hwa Chung and   
                   Jae-Won Moon   Improved content management for
                                  information-centric networking in
                                  SDN-based wireless mesh network  . . . . 316--329
               Saumya Hegde and   
    Shashidhar G. Koolagudi and   
            Swapan Bhattacharya   Scalable and fair forwarding of elephant
                                  and mice traffic in software defined
                                  networks . . . . . . . . . . . . . . . . 330--340
            Harold Owens II and   
                  Arjan Durresi   Video over Software-Defined Networking
                                  (VSDN) . . . . . . . . . . . . . . . . . 341--356
             Tuba Uzakgider and   
            Cihat Cetinkaya and   
                     Muge Sayit   Learning-based approach for layered
                                  adaptive video streaming over SDN  . . . 357--368
Ángel Leonardo Valdivieso Caraguay and   
Jesús Antonio Puente Fernández and   
Luis Javier García Villalba   Framework for optimized multimedia
                                  routing over software defined networks   369--379
              Ivano Cerrato and   
            Alex Palesandro and   
               Fulvio Risso and   
    Marc Suñé and   
         Vinicio Vercellone and   
                  Hagen Woesner   Toward dynamic virtualized network
                                  services in telecom operator networks    380--395
              Guozhen Cheng and   
             Hongchang Chen and   
                Hongchao Hu and   
               Zhiming Wang and   
                     Julong Lan   Enabling network function combination
                                  via service chain instantiation  . . . . 396--407
                  Peng Wang and   
                 Julong Lan and   
              Xiaohui Zhang and   
                 Yuxiang Hu and   
                   Shuqiao Chen   Dynamic function composition for network
                                  service chain: Model and optimization    408--418
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 93 (part 1), Number ??, December 24, 2015

            Enzo Baccarelli and   
            Danilo Amendola and   
               Nicola Cordeschi   Minimum-energy bandwidth management for
                                  QoS live migration of virtual machines   1--22
Francisco A. Gonzalez-Horta and   
        Pedro Mejia-Alvarez and   
       Eldamira Buenfil-Alpuche   Multipurpose mobility services for the
                                  Future Internet  . . . . . . . . . . . . 23--40
             Shaahin Madani and   
                 Ibrahim Khalil   Multi-Binomial mixes: a proposal for
                                  secure and efficient anonymous
                                  communication  . . . . . . . . . . . . . 41--53
            Maurizio Casoni and   
       Carlo Augusto Grazia and   
              Martin Klapez and   
             Natale Patriciello   QRM: a queue rate management for
                                  fairness and TCP flooding protection in
                                  mission-critical networks  . . . . . . . 54--65
            Ian F. Akyildiz and   
              Shih-Chun Lin and   
                        Pu Wang   Wireless software-defined networks
                                  (W-SDNs) and network function
                                  virtualization (NFV) for 5G cellular
                                  systems: an overview and qualitative
                                  evaluation . . . . . . . . . . . . . . . 66--79
               Shoushou Ren and   
                    Tao Lin and   
                     Wei An and   
             Guoqiang Zhang and   
                   Dalei Wu and   
       Laxmi Narayan Bhuyan and   
                        Zhen Xu   Design and analysis of collaborative EPC
                                  and RAN caching for LTE mobile networks  80--95
                 Marco Savi and   
            Roberto Fratini and   
          Giacomo Verticale and   
              Massimo Tornatore   Performance evaluation of video server
                                  replication in metro/access networks . . 96--110
              Hei-Chia Wang and   
               Wei-Pin Chiu and   
                   Suei-Chih Wu   QoS-driven selection of web service
                                  considering group preference . . . . . . 111--124
          A. Aguilar-Garcia and   
                  S. Fortes and   
Mariano Molina-García and   
 Jaime Calle-Sánchez and   
      José I. Alonso and   
              Aaron Garrido and   
Alfonso Fernández-Durán and   
                       R. Barco   Location-aware self-organizing methods
                                  in femtocell networks  . . . . . . . . . 125--140
             Hicham Lakhlef and   
               Julien Bourgeois   Fast and robust self-organization for
                                  micro-electro-mechanical robotic systems 141--152
              Samah Mansour and   
           Intissar Harrabi and   
               Martin Maier and   
        Géza Joós   Co-simulation study of performance
                                  trade-offs between centralised,
                                  distributed, and hybrid adaptive PEV
                                  charging algorithms  . . . . . . . . . . 153--165
         Jaehoon Paul Jeong and   
                Jinyong Kim and   
              Taehwan Hwang and   
                  Fulong Xu and   
                   Shuo Guo and   
                Yu Jason Gu and   
                   Qing Cao and   
                   Ming Liu and   
                        Tian He   TPD: Travel Prediction-based Data
                                  Forwarding for light-traffic vehicular
                                  networks . . . . . . . . . . . . . . . . 166--182
                Konglin Zhu and   
                Wenzhong Li and   
                Xiaoming Fu and   
                      Lin Zhang   Data routing strategies in opportunistic
                                  mobile social networks: Taxonomy and
                                  open challenges  . . . . . . . . . . . . 183--198
                  Tian Wang and   
                 Yiqiao Cai and   
                 Weijia Jia and   
                  Sheng Wen and   
                Guojun Wang and   
                   Hui Tian and   
              Yonghong Chen and   
                   Bineng Zhong   Maximizing real-time streaming services
                                  based on a multi-servers networking
                                  framework  . . . . . . . . . . . . . . . 199--212
                   Wei Wang and   
                Linlin Yang and   
                     Qian Zhang   Privacy preservation in location-based
                                  advertising: a contract-based approach   213--224
               Xingwei Wang and   
                  Dapeng Qu and   
                  Min Huang and   
                   Keqin Li and   
               Sajal K. Das and   
              Jinhong Zhang and   
                      Ruiyun Yu   Multiple many-to-many multicast routing
                                  scheme in green multi-granularity
                                  transport networks . . . . . . . . . . . 225--242


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 93 (part 2), Number ??, December 24, 2015

                 Bart Braem and   
              Felix Freitag and   
        Roger Baig Viñas   Community networks . . . . . . . . . . . 243--244
       Javier Simo-Reigadas and   
            Esteban Municio and   
            Eduardo Morgado and   
              Eva M. Castro and   
            Andres Martinez and   
          Luis F. Solorzano and   
           Ignacio Prieto-Egido   Sharing low-cost wireless
                                  infrastructures with telecommunications
                                  operators to bring $3$G services to
                                  rural communities  . . . . . . . . . . . 245--259
                Davide Vega and   
                 Roger Baig and   
Llorenç Cerd\`a-Alabern and   
              Esunly Medina and   
               Roc Meseguer and   
                Leandro Navarro   A technological overview of the
                                  guifi.net community network  . . . . . . 260--278
                 Jernej Kos and   
        Mitar Milutinovi\'c and   
                   Luka Cehovin   \tt nodewatcher: a substrate for growing
                                  your own community network . . . . . . . 279--296
      Roger Pueyo Centelles and   
              Victor Oncins and   
                   Axel Neumann   Enhancing reflection and
                                  self-determination in a real-life
                                  community mesh network . . . . . . . . . 297--307
               Axel Neumann and   
         Ester López and   
                Leandro Navarro   Evaluation of mesh routing protocols for
                                  wireless community networks  . . . . . . 308--323
             Christoph Barz and   
            Christoph Fuchs and   
         Jonathan Kirchhoff and   
           Julia Niewiejska and   
                  Henning Rogge   OLSRv2 for Community Networks: Using
                                  Directional Airtime Metric with external
                                  radios . . . . . . . . . . . . . . . . . 324--341
                Pere Millan and   
              Carlos Molina and   
              Esunly Medina and   
                Davide Vega and   
               Roc Meseguer and   
                 Bart Braem and   
                  Chris Blondia   Time series analysis to predict link
                                  quality of wireless community networks   342--358
              Ahmed Abujoda and   
             David Dietrich and   
   Panagiotis Papadimitriou and   
            Arjuna Sathiaseelan   Software-defined wireless mesh networks
                                  for Internet access sharing  . . . . . . 359--372
              Mennan Selimi and   
               Amin M. Khan and   
   Emmanouil Dimogerontakis and   
              Felix Freitag and   
          Roger Pueyo Centelles   Cloud services in the Guifi.net
                                  community network  . . . . . . . . . . . 373--388
               Luca Baldesi and   
           Leonardo Maccari and   
                Renato Lo Cigno   Improving P2P streaming in Wireless
                                  Community Networks . . . . . . . . . . . 389--403


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 93 (part 1), Number ??, December 24, 2015

                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 93 (part 2), Number ??, December 24, 2015

                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 93 (part 3), Number ??, December 24, 2015

              Raouf Boutaba and   
             Nelson Fonseca and   
         Dzmitry Kliazovich and   
                    Noura Limam   Cloud networking and communications II   405--407
            Valerio Persico and   
           Pietro Marchetta and   
              Alessio Botta and   
              Antonio Pescap\`e   Measuring network throughput in the
                                  cloud: the case of Amazon EC2  . . . . . 408--422
           Rodrigo S. Couto and   
              Stefano Secci and   
   Miguel Elias M. Campista and   
Luís Henrique M. K. Costa   Server placement with shared backups for
                                  disaster-resilient clouds  . . . . . . . 423--434
             Eleni Kavvadia and   
          Spyros Sagiadinos and   
     Konstantinos Oikonomou and   
   Giorgos Tsioutsiouliklis and   
                 Sonia A\"\issa   Elastic virtual machine placement in
                                  cloud computing network environments . . 435--447
             Zhongbao Zhang and   
                     Sen Su and   
               Junchi Zhang and   
                 Kai Shuang and   
                        Peng Xu   Energy aware virtual network embedding
                                  with dynamic demands: Online and offline 448--459
        Ebrahim Ghazisaeedi and   
               Changcheng Huang   Energy-aware node and link
                                  reconfiguration for virtualized network
                                  environments . . . . . . . . . . . . . . 460--479
               Yosr Jarraya and   
            Arash Eghtesadi and   
                Sahba Sadri and   
             Mourad Debbabi and   
                Makan Pourzandi   Verification of firewall reconfiguration
                                  for virtual machines migrations in the
                                  cloud  . . . . . . . . . . . . . . . . . 480--491
               Sahel Sahhaf and   
           Wouter Tavernier and   
              Matthias Rost and   
              Stefan Schmid and   
               Didier Colle and   
             Mario Pickavet and   
                 Piet Demeester   Network service chaining with optimized
                                  network function embedding supporting
                                  service decompositions . . . . . . . . . 492--505
           Paolo Bellavista and   
           Franco Callegati and   
             Walter Cerroni and   
             Chiara Contoli and   
            Antonio Corradi and   
              Luca Foschini and   
       Alessandro Pernafini and   
            Giuliano Santandrea   Virtual network function embedding in
                                  real cloud environments  . . . . . . . . 506--517
                 Wenjie Lin and   
              Puneet Sharma and   
        Sarbajit Chatterjee and   
              Deepti Sharma and   
                  David Lee and   
                  Subu Iyer and   
                     Ajay Gupta   Scaling persistent connections for cloud
                                  services . . . . . . . . . . . . . . . . 518--530
    Marcelo Antonio Marotta and   
  Leonardo Roveda Faganello and   
Matias Artur Klafke Schimuneck and   
Lisandro Zambenedetti Granville and   
             Juergen Rochol and   
          Cristiano Bonato Both   Managing mobile cloud computing
                                  considering objective and subjective
                                  perspectives . . . . . . . . . . . . . . 531--542
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 94, Number ??, January 15, 2016

                      Anonymous   Thank you reviewers  . . . . . . . . . . I--IX
            Ian F. Akyildiz and   
                    Harry Rudin   Comnet Editorial for 2015  . . . . . . . iii--iv
         Pedro H. P. Castro and   
   Vívian L. Barreto and   
      Sand Luz Corrêa and   
Lisandro Zambenedetti Granville and   
          Kleber Vieira Cardoso   A joint CPU--RAM energy efficient and
                                  SLA-compliant approach for cloud data
                                  centers  . . . . . . . . . . . . . . . . 1--13
         Sebastian Neumayer and   
                  Eytan Modiano   Network reliability under geographically
                                  correlated line and disk failure models  14--28
             Margot Deruyck and   
             Emmeric Tanghe and   
                David Plets and   
                Luc Martens and   
                    Wout Joseph   Optimizing LTE wireless access networks
                                  towards power consumption and
                                  electromagnetic exposure of human beings 29--40
          M. Isabel Sanchez and   
        Antonio de la Oliva and   
            Carlos J. Bernardos   Experimental analysis of connectivity
                                  management in mobile operating systems   41--61
                Huichen Dai and   
                        Bin Liu   CONSERT: Constructing optimal name-based
                                  routing tables . . . . . . . . . . . . . 62--79
            Michele Mangili and   
            Fabio Martignon and   
                 Antonio Capone   Performance analysis of Content-Centric
                                  and Content-Delivery networks with
                                  evolving object popularity . . . . . . . 80--98
        Rosario G. Garroppo and   
        Gianfranco Nencioni and   
          Gregorio Procissi and   
                   Luca Tavanti   The impact of the access point power
                                  model on the energy-efficient management
                                  of infrastructured wireless LANs . . . . 99--111
            Alaitz Mendiola and   
             Victor Fuentes and   
                 Jon Matias and   
             Jasone Astorga and   
               Nerea Toledo and   
              Eduardo Jacob and   
                  Maider Huarte   An architecture for dynamic QoS
                                  management at Layer 2 for DOCSIS access
                                  networks using OpenFlow  . . . . . . . . 112--128
          Tien-Thinh Nguyen and   
               Christian Bonnet   DMMS: a flexible architecture for
                                  multicast listener support in a
                                  distributed mobility management
                                  environment  . . . . . . . . . . . . . . 129--144
           Fikadu B. Degefa and   
               Donghoon Lee and   
                   Jiye Kim and   
              Younsung Choi and   
                     Dongho Won   Performance and security enhanced
                                  authentication and key agreement
                                  protocol for SAE/LTE network . . . . . . 145--163
            Sudeepta Mishra and   
             C. Siva Ram Murthy   An efficient location aware distributed
                                  physical resource block assignment for
                                  dense closed access femtocell networks   164--175
                   Song Han and   
                  Xinbin Li and   
                 Zhixin Liu and   
                   Xinping Guan   Distributed hierarchical game-based
                                  algorithm for downlink power allocation
                                  in OFDMA femtocell networks  . . . . . . 176--188
          Panayiotis Kolios and   
          Katerina Papadaki and   
             Vasilis Friderikos   Energy efficient mobile video streaming
                                  using mobility . . . . . . . . . . . . . 189--204
                Riccardo Pecori   S-Kademlia: a trust and reputation
                                  method to mitigate a Sybil attack in
                                  Kademlia . . . . . . . . . . . . . . . . 205--218
             Guoqiang Zhang and   
                        Ziqu Xu   Combing CCN with network coding: an
                                  architectural perspective  . . . . . . . 219--230
              Jianbing Ding and   
              Zhenjie Zhang and   
           Richard T. B. Ma and   
                       Yin Yang   Auction-based cloud service
                                  differentiation with service level
                                  objectives . . . . . . . . . . . . . . . 231--249
                 Qiaoni Han and   
                    Bo Yang and   
               Cailian Chen and   
                   Xinping Guan   Energy-aware and QoS-aware load
                                  balancing for HetNets powered by
                                  renewable energy . . . . . . . . . . . . 250--262
            Federico Patota and   
          Luca Chiaraviglio and   
            Francesco Bella and   
             Vincenzo Deriu and   
           Silvia Fortunato and   
                Francesca Cuomo   DAFNES: a distributed algorithm for
                                  network energy saving based on
                                  stress-centrality  . . . . . . . . . . . 263--284
Oscar Mauricio Caicedo Rendon and   
      Felipe Estrada-Solano and   
  Vinicius Guimarães and   
Liane Margarida Rockenbach Tarouco and   
Lisandro Zambenedetti Granville   Rich dynamic mashments: an approach for
                                  network management based on mashups and
                                  situation management . . . . . . . . . . 285--306
                 Melih Onus and   
         Andréa W. Richa   Parameterized maximum and average degree
                                  approximation in topic-based
                                  publish-subscribe overlay network design 307--317
                  Yang Wang and   
                    Qian Hu and   
                    Xiaojun Cao   A branch-and-price framework for optimal
                                  virtual network embedding  . . . . . . . 318--326
             Elias Bou-Harb and   
             Mourad Debbabi and   
                     Chadi Assi   A novel cyber security capability:
                                  Inferring Internet-scale infections by
                                  correlating malware and probing
                                  activities . . . . . . . . . . . . . . . 327--343
             You-Chiun Wang and   
                 Song-Yun Hsieh   Service-differentiated downlink flow
                                  scheduling to support QoS in long term
                                  evolution  . . . . . . . . . . . . . . . 344--359
                  Jie Zhang and   
               Dafang Zhang and   
                  Kun Huang and   
                      Zheng Qin   Minimizing datacenter flow completion
                                  times with server-based flow scheduling  360--374
               Tzu-Chin Liu and   
               Kuochen Wang and   
                 Chia-Yu Ku and   
                    Yi-Huai Hsu   QoS-aware resource management for
                                  multimedia traffic report systems over
                                  LTE-A  . . . . . . . . . . . . . . . . . 375--389
           Stefano Ferretti and   
             Vittorio Ghini and   
                 Fabio Panzieri   A survey on handover management in
                                  mobility architectures . . . . . . . . . 390--413
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 95, Number ??, February 11, 2016

                   Jia Peng and   
                 Yanmin Zhu and   
                    Wei Shu and   
                     Min-You Wu   When data contributors meet multiple
                                  crowdsourcers: Bilateral competition in
                                  mobile crowdsourcing . . . . . . . . . . 1--14
           Amira Meharouech and   
             Jocelyne Elias and   
                  Ahmed Mehaoua   A two-stage game theoretical approach
                                  for interference mitigation in
                                  Body-to-Body Networks  . . . . . . . . . 15--34
          Matthias Hartmann and   
                 David Hock and   
                  Michael Menth   Routing optimization for IP networks
                                  with loop-free alternates  . . . . . . . 35--50
       Robson D. A. Timoteo and   
          Lizandro N. Silva and   
            Daniel C. Cunha and   
        George D. C. Cavalcanti   An approach using support vector
                                  regression for mobile location in
                                  cellular networks  . . . . . . . . . . . 51--61
        Roberto M. Oliveira and   
      Michelle S. P. Facina and   
          Moises V. Ribeiro and   
                 Alex B. Vieira   Performance evaluation of in-home
                                  broadband PLC systems using a
                                  cooperative MAC protocol . . . . . . . . 62--76
            Stefano Tennina and   
               Olfa Gaddour and   
          Anis Koubâa and   
              Fernando Royo and   
         Mário Alves and   
                   Mohamed Abid   Z-Monitor: a protocol analyzer for IEEE
                                  802.15.4-based low-power wireless
                                  networks . . . . . . . . . . . . . . . . 77--96
Weverton Luis da Costa Cordeiro and   
Flávio Roberto Santos and   
     Marinho Pilla Barcelos and   
   Luciano Paschoal Gaspary and   
           Hanna Kavalionak and   
          Alessio Guerrieri and   
              Alberto Montresor   Making puzzles green and useful for
                                  adaptive identity management in
                                  large-scale distributed systems  . . . . 97--114
             Pouya Ostovari and   
                         Jie Wu   Robust wireless transmission of scalable
                                  coded videos using two-dimensional
                                  network coding . . . . . . . . . . . . . 115--126
          I. Michel Lombera and   
                L. E. Moser and   
        P. M. Melliar-Smith and   
                   Y. T. Chuang   Corrigendum to ``Peer-to-Peer
                                  Publication, Search and Retrieval Using
                                  the Android Mobile Platform'' [Computer
                                  Networks \bf 65(2014) 56--72]  . . . . . 127
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 96, Number ??, February 26, 2016

   Eirini Eleni Tsiropoulou and   
         Aggelos Kapoukakis and   
           Symeon Papavassiliou   Uplink resource allocation in SC-FDMA
                                  wireless networks: a survey and taxonomy 1--28
        Mohammad Al Mojamed and   
                  Mario Kolberg   Structured Peer-to-Peer overlay
                                  deployment on MANET: a survey  . . . . . 29--47
             Junichi Nagano and   
             Norihiko Shinomiya   Efficient switch clustering for
                                  distributed controllers of OpenFlow
                                  network with bi-connectivity . . . . . . 48--57
               Kyu-Hwan Lee and   
               Jae-Hyun Kim and   
                   Sunghyun Cho   Power saving mechanism with network
                                  coding in the bottleneck zone of
                                  multimedia sensor networks . . . . . . . 58--68
              Shih-Chun Lin and   
                    Pu Wang and   
                        Min Luo   Jointly optimized QoS-aware
                                  virtualization and routing in software
                                  defined networks . . . . . . . . . . . . 69--78
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 97, Number ??, March 14, 2016

               Frederic Raspall   Building Nemo, a system to monitor IP
                                  routing and traffic paths in real time   1--30
             Zubair A. Baig and   
              Sadiq M. Sait and   
                 Farid Binbeshr   Controlled access to cloud resources for
                                  mitigating Economic Denial of
                                  Sustainability (EDoS) attacks  . . . . . 31--47
              Jonghoon Kwon and   
                 Jehyun Lee and   
                  Heejo Lee and   
                  Adrian Perrig   PsyBoG: a scalable botnet detection
                                  method for large-scale DNS traffic . . . 48--73
                G. Brandner and   
               U. Schilcher and   
                 C. Bettstetter   Firefly synchronization with phase rate
                                  equalization and its experimental
                                  analysis in wireless systems . . . . . . 74--87
                   Yang Sui and   
                Xiumin Wang and   
                   Jin Wang and   
               Lusheng Wang and   
                    Saihang Hou   Deadline-aware cooperative data exchange
                                  with network coding  . . . . . . . . . . 88--97
             Adelina Madhja and   
        Sotiris Nikoletseas and   
            Theofanis P. Raptis   Hierarchical, collaborative wireless
                                  energy transfer in sensor networks with
                                  multiple Mobile Chargers . . . . . . . . 98--112
             Louai Al-Awami and   
            Hossam S. Hassanein   Distributed Data Storage Systems for
                                  Data Survivability in Wireless Sensor
                                  Networks using Decentralized Erasure
                                  Cod's  . . . . . . . . . . . . . . . . . 113--127
             Onkar Bhardwaj and   
         Elliot Anshelevich and   
                    Koushik Kar   Coalitionally stable pricing schemes for
                                  inter-domain forwarding  . . . . . . . . 128--146
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 98, Number ??, April 7, 2016

                     Yi Gai and   
                    Hua Liu and   
         Bhaskar Krishnamachari   A packet dropping mechanism for
                                  efficient operation of M/M/1 queues with
                                  selfish users  . . . . . . . . . . . . . 1--13
              Eun Kyung Lee and   
 Hariharasudhan Viswanathan and   
                  Dario Pompili   RescueNet: Reinforcement-learning-based
                                  communication framework for emergency
                                  networking . . . . . . . . . . . . . . . 14--28
                Changyan Yi and   
                  Zhen Zhao and   
                    Jun Cai and   
    Ricardo Lobato de Faria and   
           Gong (Michael) Zhang   Priority-aware pricing-based capacity
                                  sharing scheme for beyond-wireless body
                                  area networks  . . . . . . . . . . . . . 29--43
                 Luyao Wang and   
               Kwan-Wu Chin and   
                    Sieteng Soh   Joint routing and scheduling in
                                  multi-Tx/Rx wireless mesh networks with
                                  random demands . . . . . . . . . . . . . 44--56
          M. Sarper Gokturk and   
               Ozgur Gurbuz and   
                    Murat Erman   A practical cross layer cooperative MAC
                                  framework for WSNs . . . . . . . . . . . 57--71
        Mustafa Ilhan Akbas and   
         Gürkan Solmaz and   
                   Damla Turgut   Molecular geometry inspired positioning
                                  for aerial networks  . . . . . . . . . . 72--88
              Jeroen Avonts and   
                  Chris Blondia   A framework to compare topology
                                  algorithms in multi-channel multi-radio
                                  wireless mesh networks . . . . . . . . . 89--108
      Muhammad Faisal Amjad and   
          Mainak Chatterjee and   
                   Cliff C. Zou   Coexistence in heterogeneous spectrum
                                  through distributed correlated
                                  equilibrium in cognitive radio networks  109--122
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 99, Number ??, April 22, 2016

            Alexandre Jaron and   
          Andrej Mihailovic and   
                  A. H. Aghvami   QoS-aware multi-plane routing method for
                                  OSPF-based IP access networks  . . . . . 1--14
                    Xu Ding and   
               Xinjiang Sun and   
                Cheng Huang and   
                     Xiaobei Wu   Cluster-level based link redundancy with
                                  network coding in duty cycled relay
                                  wireless sensor networks . . . . . . . . 15--36
               Gil Einziger and   
               Roy Friedman and   
                    Yoav Kantor   Shades: Expediting Kademlia's lookup
                                  process  . . . . . . . . . . . . . . . . 37--50
                   Xun Xiao and   
                  Rui Zhang and   
              Jianping Wang and   
              Chunming Qiao and   
                       Kejie Lu   An optimal pricing scheme to improve
                                  transmission opportunities for a mobile
                                  virtual network operator . . . . . . . . 51--65
               Chengzhe Lai and   
                Rongxing Lu and   
                 Dong Zheng and   
                     Hui Li and   
          Xuemin (Sherman) Shen   GLARM: Group-based lightweight
                                  authentication scheme for
                                  resource-constrained machine to machine
                                  communications . . . . . . . . . . . . . 66--81
             Xiangmao Chang and   
                   Jin Wang and   
              Jianping Wang and   
                   Kejie Lu and   
                      Yi Zhuang   On the optimal design of secure network
                                  coding against wiretapping attack  . . . 82--98
          Haithem Al-Mefleh and   
               Osameh Al-Kofahi   Taking advantage of jamming in wireless
                                  networks: a survey . . . . . . . . . . . 99--124
         Fabio R. J. Vieira and   
  José F. de Rezende and   
              Valmir C. Barbosa   Scheduling wireless links by vertex
                                  multicoloring in the physical
                                  interference model . . . . . . . . . . . 125--133
                   M. Iqbal and   
                   M. Naeem and   
               A. Anpalagan and   
                N. N. Qadri and   
                       M. Imran   Multi-objective optimization in sensor
                                  networks: Optimization classification,
                                  applications and solution approaches . . 134--161
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 100, Number ??, May 8, 2016

                Meiqin Tang and   
                      Yalin Xin   Energy efficient power allocation in
                                  cognitive radio network using
                                  coevolution chaotic particle swarm
                                  optimization . . . . . . . . . . . . . . 1--11
              Ahmad Jakalan and   
                  Jian Gong and   
                      Qi Su and   
                 Xiaoyan Hu and   
      Abdeldime M. S. Abdelgder   Social relationship discovery of IP
                                  addresses in the managed IP networks by
                                  observing traffic at network boundary    12--27
             Andreas Berger and   
       Alessandro D'Alconzo and   
      Wilfried N. Gansterer and   
         Antonio Pescapé   Mining agile DNS traffic using graph
                                  analysis for cybercrime detection  . . . 28--44
               Hongbin Chen and   
                Qiong Zhang and   
                      Feng Zhao   Energy-efficient joint BS and RS sleep
                                  scheduling in relay-assisted cellular
                                  networks . . . . . . . . . . . . . . . . 45--54
                   Sungwook Kim   Asymptotic Shapley value based resource
                                  allocation scheme for IoT services . . . 55--63
           Dionysis Xenakis and   
               Nikos Passas and   
            Lazaros Merakos and   
            Christos Verikoukis   Handover decision for small cells:
                                  Algorithms, lessons learned and
                                  simulation study . . . . . . . . . . . . 64--74
        Syed Arefinul Haque and   
              Salekul Islam and   
          Md. Jahidul Islam and   
   Jean-Charles Grégoire   An architecture for client
                                  virtualization: a case study . . . . . . 75--89
    Miguel Eguizábal and   
 Ángela Hernández   Joint dynamic resource allocation and
                                  load balancing-cell selection in LTE-A
                                  HetNet scenarios based on Type 1 inband
                                  relay deployments  . . . . . . . . . . . 90--109
          Ilaria Malanchini and   
            Stefan Valentin and   
                    Osman Aydin   Wireless resource sharing for multiple
                                  operators: Generalization, fairness, and
                                  the value of prediction  . . . . . . . . 110--123
              Gurhan Gunduz and   
                   Murat Yuksel   Popularity-based scalable peer-to-peer
                                  topology growth  . . . . . . . . . . . . 124--140
                Oran Sharon and   
                   Yaron Alpert   Coupled IEEE 802.11ac and TCP
                                  performance evaluation in various
                                  aggregation schemes and Access
                                  Categories . . . . . . . . . . . . . . . 141--156
           Bruna L. R. Melo and   
            Daniel C. Cunha and   
               Cecilio Pimentel   Optimal power distribution in non-binary
                                  LDPC code-based cooperative wireless
                                  networks . . . . . . . . . . . . . . . . 157--165
               Gin-Xian Kok and   
              Chee-Onn Chow and   
                  Yi-Han Xu and   
                  Hiroshi Ishii   Sensor-free route stability metric for
                                  mobile ad hoc networks . . . . . . . . . 166--178
            Rafael L. Gomes and   
        Luiz F. Bittencourt and   
      Edmundo R. M. Madeira and   
          Eduardo Cerqueira and   
                    Mario Gerla   Bandwidth-aware allocation of resilient
                                  Virtual Software Defined Networks  . . . 179--194
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 101, Number ??, June 4, 2016

              Daqiang Zhang and   
                  Jiafu Wan and   
   Ching-Hsien (Robert) Hsu and   
                    Ammar Rayes   Industrial technologies and applications
                                  for the Internet of Things . . . . . . . 1--4
                    Min Xia and   
                    Teng Li and   
               Yunfei Zhang and   
           Clarence W. de Silva   Closed-loop design evolution of
                                  engineering system using condition
                                  monitoring through Internet of Things
                                  and cloud computing  . . . . . . . . . . 5--18
               Guangjie Han and   
                 Aihua Qian and   
              Jinfang Jiang and   
                   Ning Sun and   
                         Li Liu   A grid-based joint routing and charging
                                  algorithm for industrial wireless
                                  rechargeable sensor networks . . . . . . 19--28
                   Bo Zhang and   
             Chi Harold Liu and   
                  Jianyu Lu and   
                 Zheng Song and   
                   Ziyu Ren and   
                    Jian Ma and   
                   Wendong Wang   Privacy-preserving QoI-aware participant
                                  coordination for mobile crowdsourcing    29--41
                 Ruhul Amin and   
           Sk Hafizul Islam and   
               G. P. Biswas and   
      Muhammad Khurram Khan and   
                    Lu Leng and   
                   Neeraj Kumar   Design of an anonymity-preserving
                                  three-factor authenticated key exchange
                                  protocol for wireless sensor networks    42--62
          M. Mazhar Rathore and   
                Awais Ahmad and   
                 Anand Paul and   
                   Seungmin Rho   Urban planning and building smart cities
                                  based on the Internet of Things using
                                  Big Data analytics . . . . . . . . . . . 63--80
                  Xiong Luo and   
                     Ji Liu and   
               Dandan Zhang and   
                  Xiaohui Chang   A large-scale web QoS prediction scheme
                                  for the Industrial Internet of Things
                                  based on a kernel machine learning
                                  algorithm  . . . . . . . . . . . . . . . 81--89
                  Wei Huang and   
                  Liangmin Wang   ECDS: Efficient collaborative
                                  downloading scheme for popular content
                                  distribution in urban vehicular networks 90--103
                  Qiang Liu and   
                   Yujun Ma and   
           Musaed Alhussein and   
                  Yin Zhang and   
                     Limei Peng   Green data center with IoT sensing and
                                  cloud-assisted smart temperature control
                                  system . . . . . . . . . . . . . . . . . 104--112
                    Kai Lin and   
               Wenjian Wang and   
                 Yuanguo Bi and   
                Meikang Qiu and   
         Mohammad Mehedi Hassan   Human localization based on inertial
                                  sensors and fingerprints in the
                                  Industrial Internet of Things  . . . . . 113--126
                    Tie Qiu and   
               Diansong Luo and   
                   Feng Xia and   
            Nakema Deonauth and   
                Weisheng Si and   
                      Amr Tolba   A greedy model with small world for
                                  improving the robustness of
                                  heterogeneous Internet of Things . . . . 127--143
                Linghe Kong and   
                 Qiao Xiang and   
                    Xue Liu and   
              Xiao-Yang Liu and   
               Xiaofeng Gao and   
                Guihai Chen and   
                     Min-You Wu   ICP: Instantaneous clustering protocol
                                  for wireless sensor networks . . . . . . 144--157
               Shiyong Wang and   
                  Jiafu Wan and   
              Daqiang Zhang and   
                      Di Li and   
                  Chunhua Zhang   Towards smart factory for industry 4.0:
                                  a self-organized multi-agent system with
                                  big data based feedback and coordination 158--168
             Loizos Kanaris and   
              Akis Kokkinis and   
          Giancarlo Fortino and   
             Antonio Liotta and   
                Stavros Stavrou   Sample Size Determination Algorithm for
                                  fingerprint-based indoor localization
                                  systems  . . . . . . . . . . . . . . . . 169--177
                  Chun-Wei Tsai   An effective WSN deployment algorithm
                                  via search economics . . . . . . . . . . 178--191
          M. Shamim Hossain and   
                Ghulam Muhammad   Cloud-assisted Industrial Internet of
                                  Things (IIoT) --- Enabled framework for
                                  health monitoring  . . . . . . . . . . . 192--202
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 102, Number ??, June 19, 2016

           Hiroaki Yamanaka and   
                 Eiji Kawai and   
                 Shinji Shimojo   A technique for full flow virtualization
                                  of multi-tenant OpenFlow networks  . . . 1--19
                    Ke Wang and   
            Teck Yoong Chai and   
                Wai-Choong Wong   Routing, power control and rate
                                  adaptation: a Q-learning-based
                                  cross-layer design . . . . . . . . . . . 20--37
      Qahhar Muhammad Qadir and   
          Alexander A. Kist and   
                 Zhongwei Zhang   A quality of experience-aware
                                  cross-layer architecture for optimizing
                                  video streaming services . . . . . . . . 38--49
                  Mehdi Nikkhah   Maintaining the progress of IPv6
                                  adoption . . . . . . . . . . . . . . . . 50--69
            V. Udaya Sankar and   
                   Vinod Sharma   QoS provisioning for multiple Femtocells
                                  via game theory  . . . . . . . . . . . . 70--82
               Lukas Malina and   
                  Jan Hajny and   
              Radek Fujdiak and   
                     Jiri Hosek   On perspective of security and
                                  privacy-preserving solutions in the
                                  Internet of Things . . . . . . . . . . . 83--95
                Ahmed Jedda and   
             Mazen G. Khair and   
             Hussein T. Mouftah   Decentralized RFID coverage algorithms
                                  using writeable tags . . . . . . . . . . 96--108
                    Bing Li and   
              J. William Atwood   Secure receiver access control for IP
                                  multicast at the network level: Design
                                  and validation . . . . . . . . . . . . . 109--128
                   Tao Zhao and   
                     Tao Li and   
                   Biao Han and   
                Zhigang Sun and   
                  Jinfeng Huang   Design and implementation of Software
                                  Defined Hardware Counters for SDN  . . . 129--144
                 Zhixin Liu and   
                 Peng Zhang and   
               Xinping Guan and   
                   Hongjiu Yang   Robust power control for femtocell
                                  networks under outage-based QoS
                                  constraints  . . . . . . . . . . . . . . 145--156
               Yingjie Wang and   
                Zhipeng Cai and   
               Guisheng Yin and   
                   Yang Gao and   
             Xiangrong Tong and   
                    Guanying Wu   An incentive mechanism with privacy
                                  protection in mobile crowdsourcing
                                  systems  . . . . . . . . . . . . . . . . 157--171
                 Bing Xiong and   
                   Kun Yang and   
               Jinyuan Zhao and   
                     Wei Li and   
                       Keqin Li   Performance evaluation of OpenFlow-based
                                  software-defined networks based on
                                  queueing model . . . . . . . . . . . . . 172--185
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 103, Number ??, July 5, 2016

                L. Militano and   
                   M. Nitti and   
                  L. Atzori and   
                        A. Iera   Enhancing the navigability in a social
                                  network of smart objects: a
                                  Shapley-value based approach . . . . . . 1--14
   Hél\`ene Le Cadre and   
     Jean-Sébastien Bedo   Dealing with uncertainty in the smart
                                  grid: a learning game approach . . . . . 15--32
                     Wei Li and   
                       Yuwei Wu   Tree-based coverage hole detection and
                                  healing method in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 33--43
             Ming-Chieh Lee and   
                 Jang-Ping Sheu   An efficient routing algorithm based on
                                  segment routing in software-defined
                                  networking . . . . . . . . . . . . . . . 44--55
                 Lisheng Ma and   
             Xiaohong Jiang and   
                     Bin Wu and   
          Achille Pattavina and   
                Norio Shiratori   Probabilistic region failure-aware data
                                  center network and content placement . . 56--66
            Vasilis Sourlas and   
             Ioannis Psaras and   
              Lorenzo Saino and   
                  George Pavlou   Efficient Hash-routing and Domain
                                  Clustering Techniques for
                                  Information-Centric Networks . . . . . . 67--83
            Olfa Ben Rhaiem and   
       Lamia Chaari Fourati and   
                    Wessam Ajib   Network coding-based approach for
                                  efficient video streaming over MANET . . 84--100
                 Sang-Seon Byun   TCP over scarce transmission opportunity
                                  in cognitive radio networks  . . . . . . 101--114
                Shiguo Wang and   
              Rukhsana Ruby and   
         Victor C. M. Leung and   
                   Zhiqiang Yao   Energy-efficient power allocation for
                                  multi-user single-AF-relay underlay
                                  cognitive radio networks . . . . . . . . 115--128
               Sahar Hoteit and   
          Mahmoud El Chamie and   
              Damien Saucez and   
                  Stefano Secci   On fair network cache allocation to
                                  content providers  . . . . . . . . . . . 129--142
                  Oguzhan Erdem   Pipelined hierarchical architecture for
                                  high performance packet classification   143--164
Víctor M. López Millán and   
              Vicent Cholvi and   
Antonio Fernández Anta and   
              Luis López   Resource location based on precomputed
                                  partial random walks in dynamic networks 165--180
     Costas K. Constantinou and   
               Georgios Ellinas   Heuristic algorithms for efficient
                                  allocation of multicast-capable nodes in
                                  sparse-splitting optical networks  . . . 181--195
               A. Socievole and   
                F. De Rango and   
                 C. Scoglio and   
                 P. Van Mieghem   Assessing network robustness under SIS
                                  epidemics: the relationship between
                                  epidemic threshold and viral conductance 196--206
               Keyur Parmar and   
              Devesh C. Jinwala   Concealed data aggregation in wireless
                                  sensor networks: a comprehensive survey  207--227
                  Xiapu Luo and   
              Haocheng Zhou and   
                      Le Yu and   
                    Lei Xue and   
                         Yi Xie   Characterizing mobile $^*$-box
                                  applications . . . . . . . . . . . . . . 228--239
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 104, Number ??, July 20, 2016

    Vanniyarajan Chellappan and   
      Krishna M. Sivalingam and   
             Kamala Krithivasan   A Centrality Entropy Maximization
                                  Problem in Shortest Path Routing
                                  Networks . . . . . . . . . . . . . . . . 1--15
                Yanming Sun and   
                   Min Chen and   
               Abel Bacchus and   
                   Xiaodong Lin   Towards collusion-attack-resilient group
                                  key management using one-way function
                                  tree . . . . . . . . . . . . . . . . . . 16--26
             Ognjen Joldzic and   
               Zoran Djuric and   
                  Pavle Vuletic   A transparent and scalable anomaly-based
                                  DoS detection method . . . . . . . . . . 27--42
              Mehmet Karaca and   
              Ozgur Ercetin and   
                   Tansu Alpcan   Entropy-based active learning for
                                  wireless scheduling with incomplete
                                  channel feedback . . . . . . . . . . . . 43--54
                  Yang Wang and   
                Phanvu Chau and   
                      Fuyu Chen   Towards a secured network virtualization 55--65
           Adel Mounir Said and   
               Michel Marot and   
     Ashraf William Ibrahim and   
                   Hossam Afifi   Modeling interactive real-time
                                  applications in VANETs with performance
                                  evaluation . . . . . . . . . . . . . . . 66--78
            Ashutosh Bhatia and   
                  R. C. Hansdah   TRM-MAC: a TDMA-based reliable multicast
                                  MAC protocol for WSNs with flexibility
                                  to trade-off between latency and
                                  reliability  . . . . . . . . . . . . . . 79--93
               Gaofei Huang and   
                     Wanqing Tu   Optimal resource allocation in
                                  wireless-powered OFDM relay networks . . 94--107
           Nusrat Mehajabin and   
         Md. Abdur Razzaque and   
     Mohammad Mehedi Hassan and   
             Ahmad Almogren and   
                    Atif Alamri   Energy-sustainable relay node deployment
                                  in wireless sensor networks  . . . . . . 108--121
            Alysson Bessani and   
              Nuno F. Neves and   
     Paulo Veríssimo and   
              Wagner Dantas and   
          Alexandre Fonseca and   
                  Rui Silva and   
                  Pedro Luz and   
                 Miguel Correia   JITeR: Just-in-time application-layer
                                  routing  . . . . . . . . . . . . . . . . 122--136
              Shipra Kumari and   
                        Hari Om   Authentication protocol for wireless
                                  sensor networks applications like safety
                                  monitoring in coal mines . . . . . . . . 137--154
                      D. Yi and   
                        H. Yang   HEER --- a delay-aware and
                                  energy-efficient routing protocol for
                                  wireless sensor networks . . . . . . . . 155--173
                Mingkui Wei and   
                     Wenye Wang   Data-centric threats and their impacts
                                  to real-time communications in smart
                                  grid . . . . . . . . . . . . . . . . . . 174--188
                 Deyu Zhang and   
               Zhigang Chen and   
                 Haibo Zhou and   
                  Long Chen and   
          Xuemin (Sherman) Shen   Energy-balanced cooperative transmission
                                  based on relay selection and power
                                  control in energy harvesting wireless
                                  sensor network . . . . . . . . . . . . . 189--197
        Faqir Zarrar Yousaf and   
         Christian Wietfeld and   
           Sahibzada Ali Mahmud   Optimizing tunnel management in
                                  predictive handover protocols  . . . . . 198--212
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 105, Number ??, August 4, 2016

           Kiran Yedugundla and   
              Simone Ferlin and   
           Thomas Dreibholz and   
        Özgü Alay and   
               Nicolas Kuhn and   
                 Per Hurtig and   
                 Anna Brunstrom   Is multi-path transport suitable for
                                  latency sensitive traffic? . . . . . . . 1--21
              Sung-Guk Yoon and   
                Jeong-O Seo and   
                  Saewoong Bahk   Regrouping algorithm to alleviate the
                                  hidden node problem in 802.11ah networks 22--32
                 Thanh Dinh and   
               Younghan Kim and   
                     Tao Gu and   
        Athanasios V. Vasilakos   L-MAC: a wake-up time self-learning MAC
                                  protocol for wireless sensor networks    33--46
                Tianjie Cao and   
               Xiuqing Chen and   
                 Robin Doss and   
              Jingxuan Zhai and   
              Lucas J. Wise and   
                     Qiang Zhao   RFID ownership transfer protocol based
                                  on cloud . . . . . . . . . . . . . . . . 47--59
      Mohamed-Lamine Messai and   
                    Hamida Seba   A survey of key management schemes in
                                  multi-phase wireless sensor networks . . 60--74
              Andrea Bianco and   
             Paolo Giaccone and   
                    Marco Ricca   Scheduling traffic for maximum switch
                                  lifetime in optical data center fabrics  75--88
             Chi-Huang Shih and   
                 Chun-I Kuo and   
                   Yeh-Kai Chou   Frame-based forward error correction
                                  using content-dependent coding for video
                                  streaming applications . . . . . . . . . 89--98
             Ngoc-Tu Nguyen and   
              Bing-Hong Liu and   
             Van-Trung Pham and   
                   Yi-Sheng Luo   On maximizing the lifetime for data
                                  aggregation in wireless sensor networks
                                  using virtual data aggregation trees . . 99--110
                Ling Fu Xie and   
        Peter Han Joo Chong and   
           Ivan Wang-Hei Ho and   
               Henry C. B. Chan   Virtual overhearing: an effective way to
                                  increase network coding opportunities in
                                  wireless ad-hoc networks . . . . . . . . 111--123
             Lucas R. Costa and   
         Guilherme N. Ramos and   
       André C. Drummond   Leveraging adaptive modulation with
                                  multi-hop routing in elastic optical
                                  networks . . . . . . . . . . . . . . . . 124--137
           Peyman Pahlevani and   
            Hana Khamfroush and   
           Daniel E. Lucani and   
         Morten V. Pedersen and   
             Frank H. P. Fitzek   Network coding for hop-by-hop
                                  communication enhancement in multi-hop
                                  networks . . . . . . . . . . . . . . . . 138--149
     Antonios Michaloliakos and   
               Ryan Rogalin and   
             Yonglong Zhang and   
       Konstantinos Psounis and   
                 Giuseppe Caire   Performance modeling of next-generation
                                  WiFi networks  . . . . . . . . . . . . . 150--165
                 Wenzhi Cui and   
                      Ye Yu and   
                      Chen Qian   DiFS: Distributed Flow Scheduling for
                                  adaptive switching in FatTree data
                                  center networks  . . . . . . . . . . . . 166--179
                  Yao Zhang and   
               Xiaoyou Wang and   
              Adrian Perrig and   
                  Zhiming Zheng   Tumbler: Adaptable link access in the
                                  bots-infested Internet . . . . . . . . . 180--193
                  Jing Chen and   
                     Kun He and   
                  Quan Yuan and   
                 Ruiying Du and   
                  Lina Wang and   
                         Jie Wu   Distributed Greedy Coding-aware
                                  Deterministic Routing for multi-flow in
                                  wireless networks  . . . . . . . . . . . 194--206
     Pantelis A. Frangoudis and   
          George C. Polyzos and   
                 Gerardo Rubino   Relay-based multipoint content delivery
                                  for wireless users in an
                                  information-centric network  . . . . . . 207--223
                    Qiao Hu and   
      Lavinia Mihaela Dinca and   
                 Anjia Yang and   
                 Gerhard Hancke   Practical limitation of co-operative
                                  RFID jamming methods in environments
                                  without accurate signal synchronization  224--236
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 106, Number ??, September 4, 2016

          A. Aguilar-Garcia and   
                   R. Barco and   
                      S. Fortes   Coordinated location-based
                                  self-optimization for indoor femtocell
                                  networks . . . . . . . . . . . . . . . . 1--16
            Ian F. Akyildiz and   
                  Shuai Nie and   
              Shih-Chun Lin and   
           Manoj Chandrasekaran   5G roadmap: 10 key enabling technologies 17--48
           Filippo Rebecchi and   
     Marcelo Dias de Amorim and   
                    Vania Conan   Circumventing plateaux in cellular data
                                  offloading using adaptive content
                                  reinjection  . . . . . . . . . . . . . . 49--63
          Olga Goussevskaia and   
          Luiz F. M. Vieira and   
            Marcos A. M. Vieira   Wireless scheduling with multiple data
                                  rates: From physical interference to
                                  disk graphs  . . . . . . . . . . . . . . 64--76
             Yuanyuan Zhang and   
                 Mingwei Xu and   
                  Ning Wang and   
                     Jun Li and   
               Penghan Chen and   
                      Fei Liang   Compressing IP Forwarding Tables with
                                  Small Bounded Update Time  . . . . . . . 77--90
           Dionysis Xenakis and   
               Nikos Passas and   
            Lazaros Merakos and   
            Christos Verikoukis   ANDSF-Assisted vertical handover
                                  decisions in the IEEE
                                  802.11/LTE-Advanced network  . . . . . . 91--108
                 Xiaoyan Lu and   
              Eyuphan Bulut and   
             Boleslaw Szymanski   Towards limited scale-free topology with
                                  dynamic peer participation . . . . . . . 109--121
                  Jun Zheng and   
                  Peng Yang and   
               Jingjing Luo and   
                Qiuming Liu and   
                          Li Yu   Per-user throughput analysis for
                                  secondary users in multi-hop cognitive
                                  radio networks . . . . . . . . . . . . . 122--133
                 Ali Sehati and   
                  Majid Ghaderi   Network assisted latency reduction for
                                  mobile web browsing  . . . . . . . . . . 134--150
                     Hao Xu and   
                 Huafei Sun and   
            Yongqiang Cheng and   
                        Hao Liu   Wireless sensor networks localization
                                  based on graph embedding with polynomial
                                  mapping  . . . . . . . . . . . . . . . . 151--160
                   L. Boero and   
                   M. Cello and   
               C. Garibotto and   
                M. Marchese and   
                    M. Mongelli   BeaQoS: Load balancing and deadline
                                  management of queues in an OpenFlow SDN
                                  switch . . . . . . . . . . . . . . . . . 161--170
           Minh Tuan Nguyen and   
            Keith A. Teague and   
              Nazanin Rahnavard   CCS: Energy-efficient data collection in
                                  clustered wireless sensor networks
                                  utilizing block-wise compressive sensing 171--185
            Michele Mangili and   
             Jocelyne Elias and   
            Fabio Martignon and   
                 Antonio Capone   Optimal planning of virtual content
                                  delivery networks under uncertain
                                  traffic demands  . . . . . . . . . . . . 186--195
                  Ting Wang and   
                   Mounir Hamdi   Presto: Towards efficient online virtual
                                  network embedding in virtualized cloud
                                  data centers . . . . . . . . . . . . . . 196--208
                Fung Po Tso and   
                Simon Jouet and   
           Dimitrios P. Pezaros   Network and server resource management
                                  strategies for data centre
                                  infrastructures: a survey  . . . . . . . 209--225
           Kyung-Wook Hwang and   
       Vijay Gopalakrishnan and   
               Rittwik Jana and   
              Seungjoon Lee and   
               Vishal Misra and   
         K. K. Ramakrishnan and   
                 Dan Rubenstein   Joint-family: Adaptive bitrate
                                  video-on-demand streaming over
                                  peer-to-peer networks with realistic
                                  abandonment patterns . . . . . . . . . . 226--244
           Dimitris Tsolkas and   
               Nikos Passas and   
                Lazaros Merakos   Device discovery in LTE networks: a
                                  radio access perspective . . . . . . . . 245--259
              Shih-Chun Lin and   
                    Pu Wang and   
                        Min Luo   Control traffic balancing in software
                                  defined networks . . . . . . . . . . . . 260--271
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 107 (part 1), Number ??, October 9, 2016

       Alessandro D'Alconzo and   
            Pere Barlet-Ros and   
             Kensuke Fukuda and   
                 David Choffnes   Machine learning, data mining and Big
                                  Data frameworks for network monitoring
                                  and troubleshooting  . . . . . . . . . . 1--4
                 Arian Baer and   
                Pedro Casas and   
       Alessandro D'Alconzo and   
       Pierdomenico Fiadino and   
               Lukasz Golab and   
               Marco Mellia and   
                 Erich Schikuta   DBStream: a holistic approach to
                                  large-scale network traffic monitoring
                                  and analysis . . . . . . . . . . . . . . 5--19
              Enrico Bocchi and   
        Ali Safari Khatouni and   
           Stefano Traverso and   
        Alessandro Finamore and   
          Maurizio Munaf\`o and   
               Marco Mellia and   
                    Dario Rossi   Statistical network monitoring:
                                  Methodology and application to
                                  carrier-grade NAT  . . . . . . . . . . . 20--35
    François Espinet and   
            Diana Joumblatt and   
                    Dario Rossi   Framework, models and controlled
                                  experiments for network troubleshooting  36--54
               Martin Grill and   
      Tomás Pevný   Learning combination of anomaly
                                  detectors for security domain  . . . . . 55--63
      Félix Iglesias and   
                    Tanja Zseby   Time-activity footprints in IP traffic   64--75
                 Andra Lutu and   
          Yuba Raj Siwakoti and   
        Özgü Alay and   
          Dziugas Baltrunas and   
               Ahmed Elmokashfi   The good, the bad and the implications
                                  of profiling mobile broadband coverage   76--93
              Zahaib Akhtar and   
            Alefiya Hussain and   
         Ethan Katz-Bassett and   
                Ramesh Govindan   DBit: Assessing statistically
                                  significant differences in CDN
                                  performance  . . . . . . . . . . . . . . 94--103
             Ondrej Tomanek and   
              Pavol Mulinka and   
                    Lukas Kencl   Multidimensional cloud latency
                                  monitoring and evaluation  . . . . . . . 104--120
        Stuart E. Middleton and   
              Stefano Modafferi   Scalable classification of QoS for
                                  real-time interactive applications from
                                  IP traffic measurements  . . . . . . . . 121--132
               Qishan Zhang and   
                 Qirong Qiu and   
               Wenzhong Guo and   
                    Kun Guo and   
                   Naixue Xiong   A social community detection algorithm
                                  based on parallel grey label propagation 133--143
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 107 (part 2), Number ??, October 9, 2016

             Marilia Curado and   
               Ivan Ganchev and   
            Andreas Kassler and   
            Yevgeni Koucheryavy   Guest editorial: Special issue on mobile
                                  wireless networks  . . . . . . . . . . . 145--147
                 Xiuxiu Wen and   
            Guangsheng Feng and   
              Huiqiang Wang and   
                  Hongwu Lv and   
                      Junyu Lin   An adaptive disorder-avoidance
                                  cooperative downloading method . . . . . 148--162
                 Jose Moura and   
            Christopher Edwards   Efficient access of mobile flows to
                                  heterogeneous networks under flash
                                  crowds . . . . . . . . . . . . . . . . . 163--177
     Ólafur Helgason and   
    Sylvia T. Kouyoumdjieva and   
          Ljubica Pajevi\'c and   
              Emre A. Yavuz and   
                Gunnar Karlsson   A middleware for opportunistic content
                                  distribution . . . . . . . . . . . . . . 178--193
        Carlos Anastasiades and   
              Tobias Schmid and   
            Jürg Weber and   
                  Torsten Braun   Information-centric content retrieval
                                  for delay-tolerant networks  . . . . . . 194--207
        Carlos Anastasiades and   
            Jürg Weber and   
                  Torsten Braun   Dynamic Unicast: Information-centric
                                  multi-hop routing for mobile ad-hoc
                                  networks . . . . . . . . . . . . . . . . 208--219
            G. E. M. Zhioua and   
                   J. Zhang and   
                  H. Labiod and   
                 N. Tabbane and   
                     S. Tabbane   A joint active time and flow selection
                                  model for cellular content retrieval
                                  through ITS  . . . . . . . . . . . . . . 220--232
                  Peng Zhou and   
                Yanheng Liu and   
                  Jian Wang and   
                Weiwen Deng and   
                     Heekuck Oh   Performance analysis of prioritized
                                  broadcast service in WAVE/IEEE 802.11p   233--245
              Ahmed D. Kora and   
      Brice A. Elono Ongbwa and   
         Jean-Pierre Cances and   
                 Vahid Meghdadi   Accurate radio coverage assessment
                                  methods investigation for 3G/4G networks 246--257
            Alexander Dudin and   
               Chesoong Kim and   
               Sergey Dudin and   
                    Olga Dudina   Analysis and optimization of Guard
                                  Channel Policy with buffering in
                                  cellular mobile networks . . . . . . . . 258--269
     Felipe S. Dantas Silva and   
Augusto Venâncio Neto and   
             Douglas Maciel and   
  José Castillo-Lema and   
        Flávio Silva and   
                Pedro Frosi and   
              Eduardo Cerqueira   An innovative software-defined WiNeMO
                                  architecture for advanced QoS-guaranteed
                                  mobile service transport . . . . . . . . 270--291
                    E. Zola and   
                  A. J. Kassler   Minimizing the impact of the handover
                                  for mobile users in WLAN: a study on
                                  performance optimization . . . . . . . . 292--303
  Mohamed Abdelkrim Senouci and   
           M. Sajid Mushtaq and   
               Said Hoceini and   
             Abdelhamid Mellouk   TOPSIS-based dynamic approach for mobile
                                  network interface selection  . . . . . . 304--314
                Bart Jooris and   
                Jan Bauwens and   
           Peter Ruckebusch and   
             Peter De Valck and   
       Christophe Van Praet and   
             Ingrid Moerman and   
                 Eli De Poorter   TAISC: a cross-platform MAC protocol
                                  compiler and execution engine  . . . . . 315--326
           Aleksandr Ometov and   
            Antonino Orsino and   
          Leonardo Militano and   
           Giuseppe Araniti and   
          Dmitri Moltchanov and   
                 Sergey Andreev   A novel security-centric framework for
                                  D2D connectivity based on spatial and
                                  social proximity . . . . . . . . . . . . 327--338
            Afonso Oliveira and   
            Teresa Vazão   Low-power and lossy networks under
                                  mobility: a survey . . . . . . . . . . . 339--352
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 108, Number ??, October 24, 2016

           Alia Asheralieva and   
             Yoshikazu Miyanaga   Effective resource block allocation
                                  procedure for quality of service
                                  provisioning in a single-operator
                                  heterogeneous LTE-A network  . . . . . . 1--14
          Nasrin Taherkhani and   
                  Samuel Pierre   Prioritizing and scheduling messages for
                                  congestion control in vehicular ad hoc
                                  networks . . . . . . . . . . . . . . . . 15--28
                Xianfu Meng and   
                     Shuang Ren   An outlier mining-based malicious node
                                  detection model for hybrid P2P networks  29--39
            Molka Gharbaoui and   
            Barbara Martini and   
             Carol. J. Fung and   
         Francesco Paolucci and   
          Alessio Giorgetti and   
                 Piero Castoldi   An incentive-compatible and trust-aware
                                  multi-provider path computation element
                                  (PCE)  . . . . . . . . . . . . . . . . . 40--54
             Carlos Pereira and   
                 Ana Aguiar and   
               Daniel E. Lucani   When are network coding based dynamic
                                  multi-homing techniques beneficial?  . . 55--65
           S. Sciancalepore and   
                    G. Piro and   
                   E. Vogli and   
                  G. Boggia and   
               L. A. Grieco and   
                      G. Cavone   LICITUS: a lightweight and standard
                                  compatible framework for securing
                                  layer-2 communications in the IoT  . . . 66--77
         Mohamed Abu Sharkh and   
                  Ali Kanso and   
             Abdallah Shami and   
        Peter Öhlén   Building a cloud on Earth: a study of
                                  cloud computing data center simulators   78--96
            Soodeh Hosseini and   
      Mohammad Abdollahi Azgomi   A model for malware propagation in
                                  scale-free networks based on rumor
                                  spreading process  . . . . . . . . . . . 97--107
                Xianda Chen and   
              Kyung Tae Kim and   
                  Hee Yong Youn   Integration of Markov random field with
                                  Markov chain for efficient event
                                  detection using wireless sensor network  108--119
                    Feng Li and   
                    Jun Luo and   
                Shiqing Xin and   
                        Ying He   Autonomous deployment of wireless sensor
                                  networks for optimal coverage with
                                  directional sensing model  . . . . . . . 120--132
             Sabrina Sicari and   
        Alessandra Rizzardi and   
           Daniele Miorandi and   
           Cinzia Cappiello and   
          Alberto Coen-Porisini   Security policy enforcement for
                                  networked smart objects  . . . . . . . . 133--147
            Chen-Khong Tham and   
                        Wen Sun   A spatio-temporal incentive scheme with
                                  consumer demand awareness for
                                  participatory sensing  . . . . . . . . . 148--159
               Armir Bujari and   
               Andrea Marin and   
         Claudio E. Palazzi and   
                   Sabina Rossi   Analysis of ECN/RED and SAP-LAW with
                                  simultaneous TCP and UDP traffic . . . . 160--170
          Mariusz Glabowski and   
              Adam Kaliszan and   
                 Maciej Stasiak   Modelling overflow systems with
                                  distributed secondary resources  . . . . 171--183
            Tram Truong-Huu and   
             Mohan Gurusamy and   
               Vishal Girisagar   Dynamic embedding of workflow requests
                                  for bandwidth efficiency in data centers 184--198
          Kübra Kalkan and   
              Fatih Alagöz   A distributed filtering mechanism
                                  against DDoS attacks: ScoreForCore . . . 199--209
           Tassos Dimitriou and   
        Ebrahim A. Alrashed and   
       Mehmet Hakan Karaata and   
                     Ali Hamdan   Imposter detection for replication
                                  attacks in mobile sensor networks  . . . 210--222
              Moumita Patra and   
             C. Siva Ram Murthy   Piggybacking assisted many-to-many
                                  communication with efficient vehicle
                                  selection for improved performance in
                                  vehicular ad hoc networks  . . . . . . . 223--232
       Robert Wójcik and   
               Jerzy Domzal and   
        Zbigniew Duli\'nski and   
              Grzegorz Rzym and   
       Andrzej Kamisi\'nski and   
            Piotr Gawlowicz and   
           Piotr Jurkiewicz and   
                Jacek Rzasa and   
          Rafal Stankiewicz and   
                Krzysztof Wajda   A survey on methods to provide
                                  interdomain multipath transmissions  . . 233--259
         Rihab Chaâri and   
              Fatma Ellouze and   
          Anis Koubâa and   
              Basit Qureshi and   
               Nuno Pereira and   
              Habib Youssef and   
                  Eduardo Tovar   Cyber-physical systems clouds: a survey  260--278
               M. Gharbaoui and   
                 B. Martini and   
                   D. Adami and   
                S. Giordano and   
                    P. Castoldi   Cloud and network orchestration in SDN
                                  data centers: Design principles and
                                  performance evaluation . . . . . . . . . 279--295
            Wayan Damayanti and   
               Sanghyun Kim and   
                    Ji-Hoon Yun   Collision chain mitigation and hidden
                                  device-aware grouping in large-scale
                                  IEEE 802.11ah networks . . . . . . . . . 296--306
   Cristian Hernandez Benet and   
            Andreas Kassler and   
                    Enrica Zola   Predicting expected TCP throughput using
                                  genetic algorithm  . . . . . . . . . . . 307--322
                  Emrah Cem and   
                    Kamil Sarac   Estimation of structural properties of
                                  online social networks at the extreme    323--344
               Siguang Chen and   
              Chuanxin Zhao and   
                    Meng Wu and   
                 Zhixin Sun and   
               Haijun Zhang and   
             Victor C. M. Leung   Compressive network coding for wireless
                                  sensor networks: Spatio-temporal coding
                                  and optimization design  . . . . . . . . 345--356
                 Jan Plachy and   
              Zdenek Becvar and   
                     Pavel Mach   Path selection enabling user mobility
                                  and efficient distribution of data for
                                  computation at the edge of mobile
                                  network  . . . . . . . . . . . . . . . . 357--370
             Afraa Khalifah and   
              Nadine Akkari and   
           Ghadah Aldabbagh and   
                Nikos Dimitriou   Hybrid femto/macro rate-based offloading
                                  for high user density networks . . . . . 371--380
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 109 (part 1), Number ??, November 9, 2016

             Gerhard Hancke and   
      Aikaterini Mitrokotsa and   
      Reihaneh Safavi-Naini and   
                Damien Sauveron   Special issue on recent advances in
                                  physical-layer security  . . . . . . . . 1--3
          Nguyen Xuan Quyen and   
             Trung Q. Duong and   
              Nguyen-Son Vo and   
               Qingqing Xie and   
                        Lei Shu   Chaotic direct-sequence spread-spectrum
                                  with variable symbol period: a technique
                                  for enhancing physical layer security    4--12
       Pedro H. J. Nardelli and   
               Hirley Alves and   
       Carlos H. M. de Lima and   
                Matti Latva-aho   Throughput maximization in multi-hop
                                  wireless networks under a secrecy
                                  constraint . . . . . . . . . . . . . . . 13--20
            Giulio Aliberti and   
          Roberto Di Pietro and   
                Stefano Guarino   Reliable and perfectly secret
                                  communication over the generalized
                                  Ozarow--Wyner's wire-tap channel . . . . 21--30
       Nils Ole Tippenhauer and   
     Kasper Bonne Rasmussen and   
                  Srdjan Capkun   Physical-layer integrity for wireless
                                  messages . . . . . . . . . . . . . . . . 31--38
    Nikolaos E. Petroulakis and   
         George Spanoudakis and   
         Ioannis G. Askoxylakis   Patterns for the design of secure and
                                  dependable software defined networks . . 39--49
               Suman Bhunia and   
             Vahid Behzadan and   
      Paulo Alexandre Regis and   
                Shamik Sengupta   Adaptive beam nulling in multihop ad hoc
                                  networks against a jammer in motion  . . 50--66
                  Il-Gu Lee and   
                  Myungchul Kim   Persistent jamming in wireless local
                                  area networks: Attack and defense  . . . 67--83
           Christopher Huth and   
      René Guillaume and   
              Thomas Strohm and   
                Paul Duplys and   
            Irin Ann Samuel and   
               Tim Güneysu   Information reconciliation schemes in
                                  physical-layer security: a survey  . . . 84--104
        Christian T. Zenger and   
             Mario Pietersz and   
                 Jan Zimmer and   
         Jan-Felix Posielek and   
              Thorben Lenze and   
                  Christof Paar   Authenticated key establishment for
                                  low-resource devices exploiting
                                  correlated random channels . . . . . . . 105--123
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 109 (part 2), Number ??, November 9, 2016

                Michela Meo and   
            Sabine Wittevrongel   Traffic and performance in the big data
                                  era  . . . . . . . . . . . . . . . . . . 125--126
            Mirco Marchetti and   
             Fabio Pierazzi and   
          Michele Colajanni and   
               Alessandro Guido   Analysis of high volumes of network
                                  traffic for Advanced Persistent Threat
                                  detection  . . . . . . . . . . . . . . . 127--141
              Enrico Bocchi and   
             Luigi Grimaudo and   
               Marco Mellia and   
              Elena Baralis and   
            Sabyasachi Saha and   
         Stanislav Miskovic and   
       Gaspar Modelo-Howard and   
                    Sung-Ju Lee   MAGMA network behavior classifier for
                                  malware traffic  . . . . . . . . . . . . 142--156
              Gaurav Somani and   
           Manoj Singh Gaur and   
             Dheeraj Sanghi and   
                    Mauro Conti   DDoS attacks in cloud computing:
                                  Collateral damage to non-targets . . . . 157--171
                  Taejin Ha and   
               Sunghwan Kim and   
                  Namwon An and   
    Jargalsaikhan Narantuya and   
              Chiwook Jeong and   
                JongWon Kim and   
                       Hyuk Lim   Suspicious traffic sampling for
                                  intrusion detection in software-defined
                                  networks . . . . . . . . . . . . . . . . 172--182
Glauber D. Gonçalves and   
               Idilio Drago and   
             Alex B. Vieira and   
   Ana Paula Couto da Silva and   
         Jussara M. Almeida and   
                   Marco Mellia   Workload models and performance
                                  evaluation of cloud storage services . . 183--199
              Hadrien Hours and   
             Ernst Biersack and   
            Patrick Loiseau and   
        Alessandro Finamore and   
                   Marco Mellia   A study of the impact of DNS resolvers
                                  on CDN performance using a causal
                                  approach . . . . . . . . . . . . . . . . 200--210
             Florian Wamser and   
                Pedro Casas and   
            Michael Seufert and   
         Christian Moldovan and   
             Phuoc Tran-Gia and   
                Tobias Hossfeld   Modeling the YouTube stack: From packets
                                  to quality of experience . . . . . . . . 211--224
                  T. Bonald and   
                       C. Comte   The multi-source model for dimensioning
                                  data networks  . . . . . . . . . . . . . 225--233
   Jan Willem Kleinrouweler and   
             Sergio Cabrero and   
            Rob van der Mei and   
                    Pablo Cesar   A model for evaluating sharing policies
                                  for network-assisted HTTP adaptive
                                  streaming  . . . . . . . . . . . . . . . 234--245
            Florian Metzger and   
              Eirini Liotou and   
         Christian Moldovan and   
           Tobias Hoßfeld   TCP video streaming and mobile networks:
                                  Not a love story, but better with
                                  context  . . . . . . . . . . . . . . . . 246--256
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 110, Number ??, December 9, 2016

                   Jin Wang and   
                   Jing Ren and   
                   Kejie Lu and   
              Jianping Wang and   
               Shucheng Liu and   
                Cedric Westphal   A minimum cost cache management
                                  framework for information-centric
                                  networks with network coding . . . . . . 1--17
         Si Quoc Viet Trang and   
                Emmanuel Lochin   FLOWER, an innovative Fuzzy
                                  Lower-than-Best-Effort transport
                                  protocol . . . . . . . . . . . . . . . . 18--30
                  Meng Chen and   
                 Mingwei Xu and   
                    Qing Li and   
                      Yuan Yang   Measurement of large-scale BGP events:
                                  Definition, detection, and analysis  . . 31--45
                   Yuqi Fan and   
                Hongli Ding and   
               Lusheng Wang and   
                  Xiaojing Yuan   Green latency-aware data placement in
                                  data centers . . . . . . . . . . . . . . 46--57
                    Yu Wang and   
               Mehul Motani and   
          Hari Krishna Garg and   
                   Xin Kang and   
                      Qian Chen   Throughput maximization for cooperative
                                  60 GHz wireless personal area networks   58--68
                     Yi Guo and   
                Haixin Duan and   
                 Jikun Chen and   
                        Fu Miao   MAF-SAM: an effective method to perceive
                                  data plane threats of inter domain
                                  routing system . . . . . . . . . . . . . 69--78
                   Sungwook Kim   Cognitive hierarchy thinking based
                                  behavioral game model for IoT power
                                  control algorithm  . . . . . . . . . . . 79--90
               Jianbiao Mao and   
                   Biao Han and   
                Zhigang Sun and   
                 Xicheng Lu and   
                    Ziwen Zhang   Efficient mismatched packet buffer
                                  management with packet order-preserving
                                  for OpenFlow networks  . . . . . . . . . 91--103
        Giovanna Carofiglio and   
              Massimo Gallo and   
               Luca Muscariello   Optimal multipath congestion control and
                                  request forwarding in
                                  information-centric networks: Protocol
                                  design and experimentation . . . . . . . 104--117
          Allan M. de Souza and   
             R. S. Yokoyama and   
         Azzedine Boukerche and   
             Guilherme Maia and   
          Eduardo Cerqueira and   
     Antonio A. F. Loureiro and   
       Leandro Aparecido Villas   ICARUS: Improvement of traffic Condition
                                  through an Alerting and Re-routing
                                  System . . . . . . . . . . . . . . . . . 118--132
        Giovanna Carofiglio and   
      Léonce Mekinda and   
               Luca Muscariello   Joint forwarding and caching with
                                  latency awareness in information-centric
                                  networking . . . . . . . . . . . . . . . 133--153
            Heitor S. Ramos and   
         Azzedine Boukerche and   
      Alyson L. C. Oliveira and   
         Alejandro C. Frery and   
     Eduardo M. R. Oliveira and   
         Antonio A. F. Loureiro   On the deployment of large-scale
                                  wireless sensor networks considering the
                                  energy hole problem  . . . . . . . . . . 154--167
               Arslan Ahmad and   
          Alessandro Floris and   
                   Luigi Atzori   QoE-centric service delivery: a
                                  collaborative approach among OTTs and
                                  ISPs . . . . . . . . . . . . . . . . . . 168--179
             V. V. Mandhare and   
                V. R. Thool and   
               R. R. Manthalkar   QoS Routing enhancement using
                                  metaheuristic approach in mobile ad-hoc
                                  network  . . . . . . . . . . . . . . . . 180--191
            Husnu S. Narman and   
       Mohammed Atiquzzaman and   
     Mehdi Rahmani-andebili and   
                   Haiying Shen   Joint and selective periodic component
                                  carrier assignment for LTE-A . . . . . . 192--205
         Esmaeil Nik Maleki and   
               Ghasem Mirjalily   Fault-tolerant interference-aware
                                  topology control in multi-radio
                                  multi-channel wireless mesh networks . . 206--222
           Luca Valcarenghi and   
       Koteswararao Kondepu and   
                 Piero Castoldi   Delay fairness in reconfigurable and
                                  energy efficient TWDM PON  . . . . . . . 223--231
                Sudip Misra and   
              Samaresh Bera and   
              Tamoghna Ojha and   
         Hussein T. Mouftah and   
               Alagan Anpalagan   ENTRUST: Energy trading under
                                  uncertainty in smart grid systems  . . . 232--242
                     Xin Li and   
                 Haotian Wu and   
            Don Gruenbacher and   
           Caterina Scoglio and   
                  Tricha Anjali   Efficient routing for middlebox policy
                                  enforcement in software-defined
                                  networking . . . . . . . . . . . . . . . 243--252
                  Jinho Lee and   
       Jaehoon (Paul) Jeong and   
                 David H. C. Du   Two-way traffic link delay modeling in
                                  vehicular networks . . . . . . . . . . . 253--265
                  Yuemei Xu and   
                    Song Ci and   
                    Yang Li and   
                    Tao Lin and   
                        Gang Li   Design and evaluation of coordinated
                                  in-network caching model for content
                                  centric networking . . . . . . . . . . . 266--283
    Tashnim J. S. Chowdhury and   
                Colin Elkin and   
         Vijay Devabhaktuni and   
             Danda B. Rawat and   
                   Jared Oluoch   Advances on localization techniques for
                                  wireless sensor networks: a survey . . . 284--305
          Xenofon Vasilakos and   
          Vasilios A. Siris and   
              George C. Polyzos   Addressing niche demand based on joint
                                  mobility prediction and content
                                  popularity caching . . . . . . . . . . . 306--323
                    Kun Xie and   
               Jiannong Cao and   
                   Xin Wang and   
                     Jigang Wen   Pre-scheduled handoff for service-aware
                                  and seamless Internet access . . . . . . 324--337
           Nguyen Xuan Tien and   
                  Semog Kim and   
                Jong Myung Rhee   A novel ring-based dual paths approach
                                  for reducing redundant traffic in HSR
                                  networks . . . . . . . . . . . . . . . . 338--350
                     Run Ye and   
         Azzedine Boukerche and   
                Houjun Wang and   
               Xiaojia Zhou and   
                        Bin Yan   RECODAN: an efficient redundancy
                                  coding-based data transmission scheme
                                  for wireless sensor networks . . . . . . 351--363
                    Yang Xu and   
                   Yong Liu and   
                Rahul Singh and   
                        Shu Tao   SDN state inconsistency verification in
                                  openstack  . . . . . . . . . . . . . . . 364--376
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 111, Number ??, December 24, 2016

               A. Socievole and   
                 A. Ziviani and   
                F. De Rango and   
            A. V. Vasilakos and   
                      E. Yoneki   Cyber-physical systems for Mobile
                                  Opportunistic Networking in Proximity
                                  (MNP)  . . . . . . . . . . . . . . . . . 1--5
             Kassio Machado and   
         Azzedine Boukerche and   
    Pedro O. S. Vaz de Melo and   
          Eduardo Cerqueira and   
         Antonio A. F. Loureiro   Pervasive forwarding mechanism for
                                  mobile social networks . . . . . . . . . 6--16
               Jingwei Miao and   
                 Omar Hasan and   
          Sonia Ben Mokhtar and   
              Lionel Brunie and   
                    Ammar Hasan   4PR: Privacy preserving routing in
                                  mobile delay tolerant networks . . . . . 17--28
              Victor Ramiro and   
            Emmanuel Lochin and   
           Patrick Sénac   Characterization and applications of
                                  temporal random walks on opportunistic
                                  networks . . . . . . . . . . . . . . . . 29--44
Enrique Hernández-Orallo and   
      Marina Murillo-Arcila and   
         Carlos T. Calafate and   
           Juan Carlos Cano and   
        J. Alberto Conejero and   
                 Pietro Manzoni   Analytical evaluation of the performance
                                  of contact-based messaging applications  45--54
       Carlos Oberdan Rolim and   
         Anubis G. Rossetto and   
    Valderi R. Q. Leithardt and   
        Guilherme A. Borges and   
 Cláudio F. R. Geyer and   
   Tatiana F. M. dos Santos and   
               Adriano M. Souza   Situation awareness and computational
                                  intelligence in opportunistic networks
                                  to support the data transmission of
                                  urban sensing applications . . . . . . . 55--70
                  Xiao Chen and   
              Charles Shang and   
               Britney Wong and   
                Wenzhong Li and   
                        Suho Oh   Efficient Multicast Algorithms in
                                  Opportunistic Mobile Social Networks
                                  using Community and Social Features  . . 71--81
              Adrian Holzer and   
                 Sven Reber and   
               Jonny Quarta and   
               Jorge Mazuze and   
                   Denis Gillet   Padoc: Enabling social networking in
                                  proximity  . . . . . . . . . . . . . . . 82--92
                Okan Turkes and   
              Hans Scholten and   
             Paul J. M. Havinga   Cocoon: a lightweight opportunistic
                                  networking middleware for
                                  community-oriented smart mobile
                                  applications . . . . . . . . . . . . . . 93--108
     Marc-Olivier Killijian and   
             Roberto Pasqua and   
               Matthieu Roy and   
       Gilles Trédan and   
               Christophe Zanon   Souk: Spatial Observation of Human
                                  Kinetics . . . . . . . . . . . . . . . . 109--119
     Cristian-Octavian Ojog and   
        Radu-Corneliu Marin and   
          Radu-Ioan Ciobanu and   
                  Ciprian Dobre   Multi-criteria optimization of wireless
                                  connectivity over sparse networks  . . . 120--128
  Thiago Rodrigues Oliveira and   
         Cristiano M. Silva and   
           Daniel F. Macedo and   
 José Marcos S. Nogueira   SNVC: Social Networks for Vehicular
                                  Certification  . . . . . . . . . . . . . 129--140
                L. Militano and   
                  A. Orsino and   
                 G. Araniti and   
                   M. Nitti and   
                  L. Atzori and   
                        A. Iera   Trust-based and social-aware coalition
                                  formation game for multihop data
                                  uploading in 5G systems  . . . . . . . . 141--151
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 112, Number ??, January 15, 2017

                      Anonymous   Editorial for Computer Networks Journal
                                  2016 . . . . . . . . . . . . . . . . . . iii--iii
               Giulia Mauri and   
              Giacomo Verticale   Up-to-date key retrieval for information
                                  centric networking . . . . . . . . . . . 1--11
                   Yi Zhang and   
                Michela Meo and   
          Raffaella Gerboni and   
            Marco Ajmone Marsan   Minimum cost solar power systems for LTE
                                  macro base stations  . . . . . . . . . . 12--23
               Jianxin Liao and   
                Haifeng Sun and   
                Jingyu Wang and   
                      Qi Qi and   
                     Kai Li and   
                    Tonghong Li   Density cluster based approach for
                                  controller placement problem in
                                  large-scale software defined networkings 24--35
    Lyno Henrique G. Ferraz and   
              Rafael Laufer and   
         Diogo M. F. Mattos and   
   Otto Carlos M. B. Duarte and   
                    Guy Pujolle   A high-performance Two-Phase Multipath
                                  scheme for data-center networks  . . . . 36--51
                Nagao Ogino and   
           Takeshi Kitahara and   
          Shin'ichi Arakawa and   
                Masayuki Murata   Virtual network embedding with multiple
                                  priority classes sharing substrate
                                  resources  . . . . . . . . . . . . . . . 52--66
            Valerio Persico and   
              Alessio Botta and   
           Pietro Marchetta and   
           Antonio Montieri and   
         Antonio Pescapé   On the performance of the wide-area
                                  networks interconnecting public-cloud
                                  datacenters around the globe . . . . . . 67--83
                 Meng Zheng and   
                     Chi Xu and   
                  Wei Liang and   
                  Haibin Yu and   
                       Lin Chen   Time-efficient cooperative spectrum
                                  sensing via analog computation over
                                  multiple-access channel  . . . . . . . . 84--94
            Meng-Shiuan Pan and   
                   Shu-Wei Yang   A lightweight and distributed geographic
                                  multicast routing protocol for IoT
                                  applications . . . . . . . . . . . . . . 95--107
      Mustafa Ismael Salman and   
 Muntadher Qasim Abdulhasan and   
               Chee Kyun Ng and   
       Nor Kamariah Noordin and   
       Borhanuddin Mohd Ali and   
                   Aduwati Sali   A partial feedback reporting scheme for
                                  LTE mobile video transmission with QoS
                                  provisioning . . . . . . . . . . . . . . 108--121
           Ahmed Abdelsalam and   
             Michele Luglio and   
              Cesare Roseti and   
           Francesco Zampognaro   TCP Wave: a new reliable transport
                                  approach for future Internet . . . . . . 122--143
         Emmanuel Ndashimye and   
               Sayan K. Ray and   
            Nurul I. Sarkar and   
      Jairo A. Gutiérrez   Vehicle-to-infrastructure communication
                                  over multi-tier heterogeneous networks:
                                  a survey . . . . . . . . . . . . . . . . 144--166
                  Jinfa Yao and   
                 Baoqun Yin and   
                Xiaobin Tan and   
                 Xiaofeng Jiang   A POMDP framework for forwarding
                                  mechanism in named data networking . . . 167--175
Eduardo Mucelli Rezende Oliveira and   
       Aline Carneiro Viana and   
               K. P. Naveen and   
                Carlos Sarraute   Mobile data traffic modeling: Revealing
                                  temporal facets  . . . . . . . . . . . . 176--193
                    Cong Xu and   
                Jiahai Yang and   
                  Kevin Yin and   
                         Hui Yu   Optimal construction of virtual networks
                                  for Cloud-based MapReduce workflows  . . 194--207
               Pablo Adasme and   
             Rafael Andrade and   
                   Abdel Lisser   Minimum cost dominating tree sensor
                                  networks under probabilistic constraints 208--222
                  Cheng Ren and   
                 Sheng Wang and   
                   Jing Ren and   
              Weizhong Qian and   
             Xiaoning Zhang and   
                       Jie Duan   Energy-efficient virtual topology design
                                  in IP over WDM mesh networks . . . . . . 223--236
              Aafaf Ouaddah and   
            Hajar Mousannif and   
          Anas Abou Elkalam and   
           Abdellah Ait Ouahman   Access control in the Internet of
                                  Things: Big challenges and new
                                  opportunities  . . . . . . . . . . . . . 237--262
                 Qiufen Xia and   
                Weifa Liang and   
                     Zichuan Xu   The operational cost minimization in
                                  distributed clouds via community-aware
                                  user data placements of social networks  263--278
              Murat Karakus and   
                  Arjan Durresi   A survey: Control plane scalability
                                  issues and approaches in
                                  Software-Defined Networking (SDN)  . . . 279--293
         Behnaz Bostanipour and   
            Beno\^\it Garbinato   A neighbor detection algorithm based on
                                  multiple virtual mobile nodes for mobile
                                  ad hoc networks  . . . . . . . . . . . . 294--313
                 Zhibo Wang and   
              Honglong Chen and   
                   Qing Cao and   
                 Hairong Qi and   
                   Zhi Wang and   
                      Qian Wang   Achieving location error tolerant
                                  barrier coverage for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 314--328
              Ben-Jye Chang and   
                Gunag-Jie Jhang   Minimizing contention collision
                                  probability and guaranteeing packet
                                  delay for cloud big data transmissions
                                  in 4G LTE-A packet random access . . . . 329--344
        Ebrahim Ghazisaeedi and   
               Changcheng Huang   GreenMap: Green mapping of
                                  MapReduce-based virtual networks onto a
                                  data center network and managing incast
                                  queueing delay . . . . . . . . . . . . . 345--359
                Shaowei Liu and   
                 Weimin Lei and   
                  Wei Zhang and   
                  Yunchong Guan   CMT--SR: a selective retransmission
                                  based concurrent multipath transmission
                                  mechanism for conversational video . . . 360--371
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 113, Number ??, February 11, 2017

                Liudong Zuo and   
            Michelle M. Zhu and   
                Chase Q. Wu and   
                 Jason Zurawski   Fault-tolerant bandwidth reservation
                                  strategies for data transfers in
                                  high-performance networks  . . . . . . . 1--16
        Mehmet Fatih Tuysuz and   
              Murat Uçan   Energy-aware network/interface selection
                                  and handover application for
                                  Android-based mobile devices . . . . . . 17--28
         Alejandro Erickson and   
            Iain A. Stewart and   
           Javier Navaridas and   
               Abbas E. Kiasari   The stellar transformation: From
                                  interconnection networks to datacenter
                                  networks . . . . . . . . . . . . . . . . 29--45
              Wilfried Yoro and   
              Tijani Chahed and   
          Mamdouh El-Tabach and   
         Taoufik En-Najjary and   
                  Azeddine Gati   Service-oriented sharing of energy in
                                  wireless access networks using Shapley
                                  value  . . . . . . . . . . . . . . . . . 46--57
     Konstantinos Deltouzos and   
                 Spyros Denazis   Tackling energy and battery issues in
                                  mobile P2P VoD systems . . . . . . . . . 58--71
                    Yan Yan and   
              Baoxian Zhang and   
                       Cheng Li   Opportunistic network coding based
                                  cooperative retransmissions in D2D
                                  communications . . . . . . . . . . . . . 72--83
                   M. Itani and   
            S. Sharafeddine and   
                    I. Elkabani   Dynamic single node failure recovery in
                                  distributed storage systems  . . . . . . 84--93
         Christoforos Panos and   
    Christoforos Ntantogian and   
         Stefanos Malliaros and   
               Christos Xenakis   Analyzing, quantifying, and detecting
                                  the blackhole attack in
                                  infrastructure-less networks . . . . . . 94--110
             Jenq-Shiou Leu and   
               Min-Chieh Yu and   
               Chun-Yao Liu and   
Alrezza Pradanta Bagus Budiarsa and   
                  Vincent Utomo   Energy efficient streaming for
                                  smartphone by video adaptation and
                                  backlight control  . . . . . . . . . . . 111--123
      Sokratis Barmpounakis and   
       Alexandros Kaloxylos and   
          Panagiotis Spapis and   
              Nancy Alonistioti   Context-aware, user-driven,
                                  network-controlled RAT selection for 5G
                                  networks . . . . . . . . . . . . . . . . 124--147
             Bitan Banerjee and   
            Anand Seetharam and   
          Amitava Mukherjee and   
            Mrinal Kanti Naskar   Characteristic time routing in
                                  information centric networks . . . . . . 148--158
 João Taveira Araujo and   
                 Raul Landa and   
           Richard G. Clegg and   
              George Pavlou and   
                 Kensuke Fukuda   On rate limitation mechanisms for TCP
                                  throughput: a longitudinal analysis  . . 159--175
                Jeffrey Lai and   
                   Qiang Fu and   
                      Tim Moors   Using SDN and NFV to enhance request
                                  rerouting in ISP-CDN collaborations  . . 176--187
        Mehmet Fatih Tuysuz and   
      Zekiye Kubra Ankarali and   
        Didem Gözüpek   A survey on energy efficiency in
                                  software defined networks  . . . . . . . 188--204
               Joshua Stein and   
               Han Hee Song and   
                Mario Baldi and   
                         Jun Li   On the most representative summaries of
                                  network user activities  . . . . . . . . 205--217
                Uzzam Javed and   
                Azeem Iqbal and   
                 Saad Saleh and   
            Syed Ali Haider and   
              Muhammad U. Ilyas   A stochastic model for transit latency
                                  in OpenFlow SDNs . . . . . . . . . . . . 218--229
                Junling Shi and   
               Xingwei Wang and   
                  Min Huang and   
                   Keqin Li and   
                   Sajal K. Das   Social-based routing scheme for
                                  fixed-line VANET . . . . . . . . . . . . 230--243
Abdur Rahim Mohammad Forkan and   
             Ibrahim Khalil and   
           Mohammed Atiquzzaman   ViSiBiD: a learning model for early
                                  discovery and real-time prediction of
                                  severe clinical events using vital signs
                                  as big data  . . . . . . . . . . . . . . 244--257
                Carlos Vega and   
              Paula Roquero and   
                  Javier Aracil   Multi-Gbps HTTP traffic analysis in
                                  commodity hardware based on local
                                  knowledge of TCP streams . . . . . . . . 258--268
            Mohammed Gharib and   
             Zahra Moradlou and   
      Mohammed Ali Doostari and   
                   Ali Movaghar   Fully distributed ECC-based key
                                  management for mobile ad hoc networks    269--283
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 114, Number ??, February 26, 2017

                 Xuetao Wei and   
         Nicholas C. Valler and   
       Harsha V. Madhyastha and   
             Iulian Neamtiu and   
             Michalis Faloutsos   Characterizing the behavior of handheld
                                  devices and its implications . . . . . . 1--12
            Le\"\ila Gazzah and   
                Le\"\ila Najjar   Trade-off between node selection and
                                  space diversity for accurate
                                  uncooperative localization . . . . . . . 13--22
             Eduardo Moreno and   
         Alejandra Beghelli and   
                 Filippo Cugini   Traffic engineering in segment routing
                                  networks . . . . . . . . . . . . . . . . 23--31
        Madhusanka Liyanage and   
                 An Braeken and   
          Anca Delia Jurcut and   
            Mika Ylianttila and   
                  Andrei Gurtov   Secure communication channel
                                  architecture for Software Defined Mobile
                                  Networks . . . . . . . . . . . . . . . . 32--50
            Reem E. Mohemed and   
             Ahmed I. Saleh and   
          Maher Abdelrazzak and   
                 Ahmed S. Samra   Energy-efficient routing protocols for
                                  solving energy hole problem in wireless
                                  sensor networks  . . . . . . . . . . . . 51--66
                   Xin Kang and   
                      Jing Yang   Viewing experience optimization for
                                  peer-to-peer streaming networks with
                                  credit-based incentive mechanisms  . . . 67--79
                Linfeng Liu and   
                  Ping Wang and   
                       Ran Wang   Propagation control of data forwarding
                                  in opportunistic underwater sensor
                                  networks . . . . . . . . . . . . . . . . 80--94
            Selma Khebbache and   
             Makhlouf Hadji and   
               Djamal Zeghlache   Virtualized network functions chaining
                                  and routing algorithms . . . . . . . . . 95--110
                Julia Klier and   
              Mathias Klier and   
          Alexander Richter and   
                 Rolf T. Wigand   Special issue on social media networks
                                  in business  . . . . . . . . . . . . . . 111--113
                    Libo Li and   
             Frank Goethals and   
               Bart Baesens and   
                 Monique Snoeck   Predicting software revision outcomes on
                                  GitHub using structural holes theory . . 114--124
            Benjamin Wehner and   
           Christian Ritter and   
                  Susanne Leist   Enterprise social networks: a literature
                                  review and research agenda . . . . . . . 125--142
              Stoney Brooks and   
             Christopher Califf   Social media-induced technostress: Its
                                  impact on the job performance of it
                                  professionals and the moderating role of
                                  job characteristics  . . . . . . . . . . 143--153
              Haishuai Wang and   
                     Jia Wu and   
                 Shirui Pan and   
                 Peng Zhang and   
                      Ling Chen   Towards large-scale social networks with
                                  online diffusion provenance detection    154--166
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 115, Number ??, March 14, 2017

             Abhishek Sinha and   
          Pradeepkumar Mani and   
                    Jie Liu and   
              Ashley Flavel and   
                     Dave Maltz   Distributed load management algorithms
                                  in anycast-based CDNs  . . . . . . . . . 1--15
              Ben-Jye Chang and   
                Syuan-Hong Liou   Adaptive cooperative communication for
                                  maximizing reliability and reward in
                                  ultra-dense small cells LTE-A toward 5G
                                  cellular networking  . . . . . . . . . . 16--28
            Salvatore D'Oro and   
            Laura Galluccio and   
    Panayotis Mertikopoulos and   
           Giacomo Morabito and   
                 Sergio Palazzo   Auction-based resource allocation in
                                  OpenFlow multi-tenant networks . . . . . 29--41
                   Rui Wang and   
               Suixiang Gao and   
                Wenguo Yang and   
                  Zhipeng Jiang   Energy aware routing with link disjoint
                                  backup paths . . . . . . . . . . . . . . 42--53
               Sangkyu Park and   
              Hyunjoong Lee and   
           Chan-Byoung Chae and   
                  Saewoong Bahk   Massive MIMO operation in partially
                                  centralized cloud radio access networks  54--64
              Udo Schilcher and   
      Günther Brandner and   
          Christian Bettstetter   Quantifying inhomogeneity of spatial
                                  point patterns . . . . . . . . . . . . . 65--81
              Tsung-Yu Tsai and   
              Yi-Hsueh Tsai and   
               Zsehong Tsai and   
              Shiann-Tsong Sheu   A Novel Description approach based on
                                  sorted rectangles for scheduling
                                  information bearing in OFDMA systems . . 82--99
                  Jing Wang and   
                  Jian Tang and   
               Guoliang Xue and   
                     Dejun Yang   Towards energy-efficient task scheduling
                                  on smartphones in mobile crowd sensing
                                  systems  . . . . . . . . . . . . . . . . 100--109
                 Wai-Xi Liu and   
              Shun-Zheng Yu and   
                  Guang Tan and   
                        Jun Cai   Information-centric networking with
                                  built-in network coding to achieve
                                  multisource transmission at
                                  network-layer  . . . . . . . . . . . . . 110--128
                 Julio Soto and   
               Michele Nogueira   Corrigendum to ``A framework for
                                  resilient and secure spectrum sensing on
                                  cognitive radio networks'' [Computer
                                  Networks volume \bf 79 (2015) 313--322]  129--129
                 Julio Soto and   
               Michele Nogueira   A framework for resilient and secure
                                  spectrum sensing on cognitive radio
                                  networks . . . . . . . . . . . . . . . . 130--138
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 116, Number ??, April 7, 2017

           Matthieu Coudron and   
                  Stefano Secci   An implementation of multipath TCP in
                                  \tt ns3  . . . . . . . . . . . . . . . . 1--11
      Douglas C. MacFarland and   
              Craig A. Shue and   
              Andrew J. Kalafut   The best bang for the byte:
                                  Characterizing the potential of DNS
                                  amplification attacks  . . . . . . . . . 12--21
          Gloria Ciavarrini and   
             Valerio Luconi and   
                Alessio Vecchio   Smartphone-based geolocation of Internet
                                  hosts  . . . . . . . . . . . . . . . . . 22--32
          Roberto Di Pietro and   
               Gabriele Oligeri   Enabling broadcast communications in
                                  presence of jamming via probabilistic
                                  pairing  . . . . . . . . . . . . . . . . 33--46
       Purnima Murali Mohan and   
            Tram Truong-Huu and   
                 Mohan Gurusamy   Fault tolerance in TCAM-limited software
                                  defined networks . . . . . . . . . . . . 47--62
                   Geng Sun and   
                Yanheng Liu and   
                  Ming Yang and   
                 Aimin Wang and   
               Shuang Liang and   
                     Ying Zhang   Coverage optimization of VLC in smart
                                  homes based on improved cuckoo search
                                  algorithm  . . . . . . . . . . . . . . . 63--78
              Nasreen Anjum and   
           Dmytro Karamshuk and   
      Mohammad Shikh-Bahaei and   
                Nishanth Sastry   Survey on peer-assisted content delivery
                                  networks . . . . . . . . . . . . . . . . 79--95
                Sunny Behal and   
                  Krishan Kumar   Detection of DDoS attacks and flash
                                  events using novel information theory
                                  metrics  . . . . . . . . . . . . . . . . 96--110
           Mohamed Koub\`aa and   
               Maroua Bakri and   
         Ammar Bouall\`egue and   
               Maurice Gagnaire   QoT-aware elastic bandwidth allocation
                                  and spare capacity assignment in
                                  flexible island-based optical transport
                                  networks under shared risk link group
                                  constraints  . . . . . . . . . . . . . . 111--140
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 117, Number ??, April 22, 2017

              Reza Malekian and   
                     Kui Wu and   
             Gianluca Reali and   
                    Ning Ye and   
                   Kevin Curran   Cyber-physical systems and context-aware
                                  sensing and computing  . . . . . . . . . 1--4
                 Shu-Yu Kuo and   
              Yao-Hsin Chou and   
                  Chi-Yuan Chen   Quantum-inspired algorithm for
                                  cyber-physical visual surveillance
                                  deployment systems . . . . . . . . . . . 5--18
                 Wenlin Han and   
                      Yang Xiao   A novel detector to detect colluded
                                  non-technical loss frauds in smart grid  19--31
                   Xu Zhang and   
                     Mi Wen and   
                   Kejie Lu and   
                  Jingsheng Lei   A privacy-aware data dissemination
                                  scheme for smart grid with abnormal data
                                  traceability . . . . . . . . . . . . . . 32--41
               Guoming Tang and   
                  Zhen Ling and   
                Fengyong Li and   
                Daquan Tang and   
                   Jiuyang Tang   Occupancy-aided energy disaggregation    42--51
     David Rodriguez-Lozano and   
       Juan A. Gomez-Pulido and   
    Jose M. Lanza-Gutierrez and   
     Arturo Duran-Dominguez and   
        Ramon A. Fernandez-Diaz   Context-aware prediction of access
                                  points demand in Wi-Fi networks  . . . . 52--61
      Abdelrahman Abuarqoub and   
         Mohammad Hammoudeh and   
           Bamidele Adebisi and   
              Sohail Jabbar and   
          Ahc\`ene Bounceur and   
               Hashem Al-Bashar   Dynamic clustering and management of
                                  mobile wireless sensor networks  . . . . 62--75
                 Fuliang Li and   
                      Zhihan Lv   Reliable vehicle type recognition based
                                  on information fusion in multiple sensor
                                  networks . . . . . . . . . . . . . . . . 76--84
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 118, Number ??, May 8, 2017

        Alexandre Fontinele and   
              Iallen Santos and   
   Juarez Nolêto Neto and   
      Divanilson R. Campelo and   
            André Soares   An Efficient IA-RMLSA Algorithm for
                                  Transparent Elastic Optical Networks . . 1--14
           Ajay Kumar Yadav and   
          Santosh Kumar Das and   
                Sachin Tripathi   EFMMRP: Design of efficient fuzzy based
                                  multi-constraint multicast routing
                                  protocol for wireless ad-hoc network . . 15--23
               Aveek K. Das and   
            Parth H. Pathak and   
             Chen-Nee Chuah and   
              Prasant Mohapatra   Privacy-aware contextual localization
                                  using network traffic analysis . . . . . 24--36
        Dinil Mon Divakaran and   
                 Li Ling Ko and   
                      Le Su and   
           Vrizlynn L. L. Thing   REX: Resilient and efficient data
                                  structure for tracking network flows . . 37--53
                Penghao Sun and   
                 Julong Lan and   
                  Peng Wang and   
                        Teng Ma   RFC: Range feature code for TCAM-based
                                  packet classification  . . . . . . . . . 54--61
               Yao-Jen Tang and   
              Jian-Jhih Kuo and   
                  Ming-Jer Tsai   Zero-knowledge GPS-free data replication
                                  and retrieval scheme in mobile ad hoc
                                  networks using double-ruling and
                                  landmark-labeling techniques . . . . . . 62--77
                  Song Yang and   
             Philipp Wieder and   
            Ramin Yahyapour and   
                    Xiaoming Fu   Energy-Aware Provisioning in Optical
                                  Cloud Networks . . . . . . . . . . . . . 78--95
               Hugo Marques and   
         Hélio Silva and   
            Evariste Logota and   
         Jonathan Rodriguez and   
              Seiamak Vahid and   
                Rahim Tafazolli   Multiview real-time media distribution
                                  for next generation networks . . . . . . 96--124
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 119, Number ??, June 4, 2017

                Hongtao Shi and   
                Hongping Li and   
                  Dan Zhang and   
               Chaqiu Cheng and   
                         Wei Wu   Efficient and robust feature extraction
                                  and selection for traffic classification 1--16
        Guilherme Domingues and   
   Edmundo de Souza e Silva and   
     Rosa M. M. Leão and   
  Daniel S. Menasché and   
                    Don Towsley   Enabling opportunistic search and
                                  placement in cache networks  . . . . . . 17--34
        Julius Rückert and   
           Julian Wulfheide and   
             Tamara Knierim and   
                 David Hausheer   On clubs, screaming peers, and
                                  duplicates: a comprehensive study of
                                  BitTorrent Live  . . . . . . . . . . . . 35--55
           Sebastian Zander and   
       Lachlan L. H. Andrew and   
             Grenville Armitage   Collaborative and privacy-preserving
                                  estimation of IP address space
                                  utilisation  . . . . . . . . . . . . . . 56--70
         Siba Narayan Swain and   
               Rahul Thakur and   
             C. Siva Ram Murthy   Design and stochastic geometric analysis
                                  of an efficient Q-Learning based
                                  physical resource block allocation
                                  scheme to maximize the spectral
                                  efficiency of Device-to-Device overlaid
                                  cellular networks  . . . . . . . . . . . 71--85
   Georgios Z. Papadopoulos and   
            Antoine Gallais and   
        Guillaume Schreiner and   
                  Emery Jou and   
                    Thomas Noel   Thorough IoT testbed characterization:
                                  From proof-of-concept to repeatable
                                  experimentations . . . . . . . . . . . . 86--101
               Yu-ning Dong and   
               Jia-jie Zhao and   
                      Jiong Jin   Novel feature selection and
                                  classification of Internet video traffic
                                  based on a hierarchical scheme . . . . . 102--111
  R. Acedo-Hernández and   
                   M. Toril and   
     S. Luna-Ramírez and   
                C. Úbeda   A PCI planning algorithm for jointly
                                  reducing reference signal collisions in
                                  LTE uplink and downlink  . . . . . . . . 112--123
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 120, Number ??, June 19, 2017

                      Yi Wu and   
                    Ge Nong and   
                   Mounir Hamdi   Scalable pipelined IP lookup with prefix
                                  tries  . . . . . . . . . . . . . . . . . 1--11
          Hatem Ibn-Khedher and   
          Emad Abd-Elrahman and   
             Ahmed E. Kamal and   
                   Hossam Afifi   OPAC: an optimal placement algorithm for
                                  virtual CDN  . . . . . . . . . . . . . . 12--27
       Gianpiero Costantino and   
                Rajib Maiti and   
           Fabio Martinelli and   
                    Paolo Santi   Private mobility-cast for opportunistic
                                  networks . . . . . . . . . . . . . . . . 28--42
                  Tong Guan and   
                    Le Fang and   
                   Wen Dong and   
    Dimitrios Koutsonikolas and   
           Geoffrey Challen and   
                  Chunming Qiao   Robust, cost-effective and scalable
                                  localization in large indoor areas . . . 43--55
               Xiaofeng Qiu and   
                  Kai Zhang and   
                   Qiuzheng Ren   Global Flow Table: a convincing
                                  mechanism for security operations in SDN 56--70
      Mohammad Mahdi Tajiki and   
              Behzad Akbari and   
                   Nader Mokari   Optimal Qos-aware network
                                  reconfiguration in software defined
                                  cloud data centers . . . . . . . . . . . 71--86
     Pedro Moreira da Silva and   
                 Jaime Dias and   
                 Manuel Ricardo   Mistrustful P2P: Deterministic
                                  privacy-preserving P2P file sharing
                                  model to hide user content interests in
                                  untrusted peer-to-peer networks  . . . . 87--104
                   Zhang Bo and   
                 Zhang Huan and   
                   Li Meizi and   
                   Zhao Qin and   
                   Huang Jifeng   Trust Traversal: a trust link detection
                                  scheme in social network . . . . . . . . 105--125
             Carlo Galiotto and   
             Nuno K. Pratas and   
                Linda Doyle and   
               Nicola Marchetti   Effect of LOS/NLOS propagation on 5G
                                  ultra-dense networks . . . . . . . . . . 126--140
            Chiraz Houaidia and   
               Hanen Idoudi and   
     Adrien Van Den Bossche and   
        Leila Azouz Saidane and   
                    Thierry Val   Inter-flow and intra-flow interference
                                  mitigation routing in wireless mesh
                                  networks . . . . . . . . . . . . . . . . 141--156
              Tongqing Zhou and   
                Zhiping Cai and   
                     Kui Wu and   
                Yueyue Chen and   
                        Ming Xu   FIDC: a framework for improving data
                                  credibility in mobile crowdsensing . . . 157--169
                Wenzhong Li and   
                  Xiao Chen and   
                      Sanglu Lu   Content synchronization using
                                  device-to-device communication in smart
                                  cities . . . . . . . . . . . . . . . . . 170--185
              Yuxiang Zhang and   
                    Lin Cui and   
                     Yuan Zhang   A stable matching based elephant flow
                                  scheduling algorithm in data center
                                  networks . . . . . . . . . . . . . . . . 186--197
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 121, Number ??, July 5, 2017

        Liljana Gavrilovska and   
              Pero Latkoski and   
       Vladimir Atanasovski and   
              Ramjee Prasad and   
            Albena Mihovska and   
             Octavian Fratu and   
               Pavlos Lazaridis   Radio Spectrum: Evaluation approaches,
                                  coexistence issues and monitoring  . . . 1--12
                  Tao Zhang and   
                       Jing Liu   An efficient and fast kinematics-based
                                  algorithm for RFID network planning  . . 13--24
        Hossein Hadian Jazi and   
              Hugo Gonzalez and   
         Natalia Stakhanova and   
                Ali A. Ghorbani   Detecting HTTP-based application layer
                                  DoS attacks on web servers in the
                                  presence of sampling . . . . . . . . . . 25--36
             Ricardo Macedo and   
          Leonardo Melniski and   
               Aldri Santos and   
      Yacine Ghamri-Doudane and   
               Michele Nogueira   SPARTA: a survival performance
                                  degradation framework for identity
                                  federations  . . . . . . . . . . . . . . 37--52
            Mohammad Rmayti and   
               Rida Khatoun and   
            Youcef Begriche and   
               Lyes Khoukhi and   
                Dominique Gaiti   A stochastic approach for packet
                                  dropping attacks detection in mobile Ad
                                  hoc networks . . . . . . . . . . . . . . 53--64
                  Ming Chen and   
                    Ke Ding and   
                    Jie Hao and   
                    Chao Hu and   
                Gaogang Xie and   
              Changyou Xing and   
                      Bing Chen   LCMSC: a lightweight collaborative
                                  mechanism for SDN controllers  . . . . . 65--75
            Jung-Woong Sung and   
                  Seung-Jae Han   Data bundling for energy efficient
                                  communication of wearable devices  . . . 76--88
          Cihangir Besiktas and   
    Didem Gözüpek and   
                 Aydin Ulas and   
                   Erhan Lokman   Secure virtual network embedding with
                                  flexible bandwidth-based revenue
                                  maximization . . . . . . . . . . . . . . 89--99
          Yustus Eko Oktian and   
                SangGon Lee and   
                HoonJae Lee and   
                     JunHuy Lam   Distributed SDN controller system: a
                                  survey on design choice  . . . . . . . . 100--111
                  Nir Gazit and   
       Francesco Malandrino and   
                      David Hay   Mobile operators and content providers
                                  in next-generation SDN/NFV core
                                  networks: Between cooperation and
                                  competition  . . . . . . . . . . . . . . 112--123
             Luca Cominardi and   
                Fabio Giust and   
        Carlos J. Bernardos and   
            Antonio De La Oliva   Distributed mobility management
                                  solutions for next mobile network
                                  architectures  . . . . . . . . . . . . . 124--136
          Lazaros Gkatzikis and   
            Vasilis Sourlas and   
            Carlo Fischione and   
          Iordanis Koutsopoulos   Low complexity content replication
                                  through clustering in Content-Delivery
                                  Networks . . . . . . . . . . . . . . . . 137--151
      Muhammad Mohsin Mehdi and   
                 Imran Raza and   
              Syed Asad Hussain   A game theory based trust model for
                                  Vehicular Ad hoc Networks (VANETs) . . . 152--172
                Juraj Gazda and   
       Gabriel Bugár and   
             Marcel Volosin and   
        Peter Drotár and   
       Denis Horváth and   
          Vladimír Gazda   Dynamic spectrum leasing and retail
                                  pricing using an experimental economy    173--184
              Myriana Rifai and   
               Nicolas Huin and   
       Christelle Caillouet and   
           Frederic Giroire and   
           Joanna Moulierac and   
         Dino Lopez Pacheco and   
         Guillaume Urvoy-Keller   Minnie: an SDN world with few compressed
                                  forwarding rules . . . . . . . . . . . . 185--207
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 122, Number ??, July 20, 2017

                  Bing Leng and   
             Liusheng Huang and   
              Chunming Qiao and   
                  Hongli Xu and   
                  Xinglong Wang   FTRS: a mechanism for reducing flow
                                  table entries in software defined
                                  networks . . . . . . . . . . . . . . . . 1--15
              Jonathan Lutz and   
        Charles J. Colbourn and   
             Violet R. Syrotiuk   Variable-weight topology-transparent
                                  scheduling . . . . . . . . . . . . . . . 16--28
               Jorge Werner and   
     Carla Merkle Westphall and   
        Carlos Becker Westphall   Cloud identity management: a survey on
                                  privacy strategies . . . . . . . . . . . 29--42
                  Hongli Xu and   
              Xiang-Yang Li and   
             Liusheng Huang and   
                    Yang Du and   
                     Zichun Liu   Partial flow statistics collection for
                                  load-balanced routing in software
                                  defined networks . . . . . . . . . . . . 43--55
                Dongyue Xue and   
                Eylem Ekici and   
              Rania Ibrahim and   
               Moustafa Youssef   A novel queue-length-based CSMA
                                  algorithm with improved delay
                                  characteristics  . . . . . . . . . . . . 56--69
       Saravanan Sundaresan and   
                 Robin Doss and   
           Selwyn Piramuthu and   
                    Wanlei Zhou   A secure search protocol for low cost
                                  passive RFID tags  . . . . . . . . . . . 70--82
         Thibaut Stimpfling and   
    Normand Bélanger and   
             Omar Cherkaoui and   
André Béliveau and   
    Ludovic Béliveau and   
                   Yvon Savaria   Extensions to decision-tree based packet
                                  classification algorithms to address new
                                  classification paradigms . . . . . . . . 83--95
            Michal Morawski and   
            Przemyslaw Ignaciuk   Network nodes play a game --- a routing
                                  alternative in multihop ad-hoc
                                  environments . . . . . . . . . . . . . . 96--104
                    Yi Wang and   
                         Ye Xia   Improving the queue size and delay
                                  performance with the I-CSMA link
                                  scheduling algorithm . . . . . . . . . . 105--119
                Rahul Hiran and   
            Niklas Carlsson and   
                Nahid Shahmehri   Collaborative framework for protection
                                  against attacks targeting BGP and edge
                                  networks . . . . . . . . . . . . . . . . 120--137
                 Li Chunlin and   
                    Yan Xin and   
                 Zhang Yang and   
                    Luo Youlong   Multiple context based service
                                  scheduling for balancing cost and
                                  benefits of mobile users and cloud
                                  datacenter supplier in mobile cloud  . . 138--152
  Antônio J. Pinheiro and   
            Ethel B. Gondim and   
          Divanilson R. Campelo   An efficient architecture for dynamic
                                  middlebox policy enforcement in SDN
                                  networks . . . . . . . . . . . . . . . . 153--162
             Mahmood Salehi and   
             Azzedine Boukerche   A novel packet salvaging model to
                                  improve the security of opportunistic
                                  routing protocols  . . . . . . . . . . . 163--178
                 Zhixin Liu and   
                   Shiyi Li and   
                     Kai Ma and   
               Xinping Guan and   
                      Xinbin Li   Robust power allocation based on
                                  hierarchical game with consideration of
                                  different user requirements in two-tier
                                  femtocell networks . . . . . . . . . . . 179--190
              Min Sang Yoon and   
             Ahmed E. Kamal and   
                  Zhengyuan Zhu   Adaptive data center activation with
                                  user request prediction  . . . . . . . . 191--204
                    Leng-Gan Yi   Rate-sensitive CoMP beamforming plus
                                  sensible snooze for energy-QoE tradeoff
                                  in cognitive small cell networks . . . . 205--216
                 Jinli Meng and   
               Fengyuan Ren and   
                     Chuang Lin   Modeling and understanding burst
                                  transmission for energy efficient
                                  Ethernet . . . . . . . . . . . . . . . . 217--230
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 123, Number ??, August 4, 2017

                 Asmita Roy and   
                Sadip Midya and   
           Koushik Majumder and   
           Santanu Phadikar and   
                Anurag Dasgupta   Optimized secondary user selection for
                                  quality of service enhancement of
                                  two-tier multi-user Cognitive Radio
                                  Network: a game theoretic approach . . . 1--18
               Faizan Qamar and   
      Kaharudin Bin Dimyati and   
            Mhd Nour Hindia and   
Kamarul Ariffin Bin Noordin and   
             Ahmed M. Al-Samman   A comprehensive review on coordinated
                                  multi-point operation for LTE-A  . . . . 19--37
                    Peng Wu and   
                         Li Pan   Scalable influence blocking maximization
                                  in social networks under competitive
                                  independent cascade models . . . . . . . 38--50
             Carlos Borrego and   
Adrián Sánchez-Carmona and   
                 Zhiyuan Li and   
                   Sergi Robles   Explore and wait: a composite
                                  routing-delivery scheme for relative
                                  profile-casting in opportunistic
                                  networks . . . . . . . . . . . . . . . . 51--63
               Sandip Karar and   
             Abhirup Das Barman   Opportunistic spectrum access for
                                  cooperative unlicensed femtocells in
                                  two-tier heterogeneous networks
                                  utilizing HARQ feedback  . . . . . . . . 64--76
                    Yang Xu and   
                    Jia Liu and   
                Yulong Shen and   
             Xiaohong Jiang and   
                Norio Shiratori   Physical layer security-aware routing
                                  and performance tradeoffs in ad hoc
                                  networks . . . . . . . . . . . . . . . . 77--87
                 Jianhui Lv and   
               Xingwei Wang and   
                  Min Huang and   
                Junling Shi and   
                   Keqin Li and   
                         Jie Li   RISC: ICN routing mechanism
                                  incorporating SDN and community division 88--103
      Rodolfo I. Meneguette and   
             Azzedine Boukerche   SERVitES: an efficient search and
                                  allocation resource protocol based on
                                  V2V communication for vehicular cloud    104--118
         Lorenzo Donatiello and   
                 Gustavo Marfia   Models and performance evaluation of
                                  event goodput in sensor platforms  . . . 119--136
     Jasaswi Prasad Mohanty and   
        Chittaranjan Mandal and   
                    Chris Reade   Distributed construction of minimum
                                  Connected Dominating Set in wireless
                                  sensor network using two-hop information 137--152
Sergio Barrachina-Muñoz and   
             Boris Bellalta and   
                 Toni Adame and   
                     Albert Bel   Multi-hop communication in the uplink
                                  for LPWANs . . . . . . . . . . . . . . . 153--168
         Roberto Bonafiglia and   
               Amedeo Sapio and   
                Mario Baldi and   
               Fulvio Risso and   
                  Paolo C. Pomi   Enforcement of dynamic HTTP policies on
                                  resource-constrained residential
                                  gateways . . . . . . . . . . . . . . . . 169--183
            Sain Saginbekov and   
                  Arshad Jhumka   Many-to-many data aggregation scheduling
                                  in wireless sensor networks with two
                                  sinks  . . . . . . . . . . . . . . . . . 184--199
                  Yang Wang and   
                  Shuang Wu and   
                Zhiyin Chen and   
               Xiaofeng Gao and   
                    Guihai Chen   Coverage problem with uncertain
                                  properties in wireless sensor networks:
                                  a survey . . . . . . . . . . . . . . . . 200--232
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 124, Number ??, September 4, 2017

        Sotiris Nikoletseas and   
        Theofanis P. Raptis and   
       Christoforos Raptopoulos   Radiation-constrained algorithms for
                                  Wireless Energy Transfer in Ad hoc
                                  Networks . . . . . . . . . . . . . . . . 1--10
                S. Gheisari and   
                  M. R. Meybodi   A new reasoning and learning model for
                                  Cognitive Wireless Sensor Networks based
                                  on Bayesian networks and learning
                                  automata cooperation . . . . . . . . . . 11--26
             Philippe Ezran and   
               Yoram Haddad and   
         Mérouane Debbah   Availability optimization in a
                                  ring-based network topology  . . . . . . 27--32
        Qamas Gul Khan Safi and   
                 Senlin Luo and   
                   Chao Wei and   
                  Limin Pan and   
                   Qianrou Chen   PIaaS: Cloud-oriented secure and
                                  privacy-conscious parking information as
                                  a service using VANETs . . . . . . . . . 33--45
                     Lei Xu and   
                      Ke Xu and   
                 Yong Jiang and   
               Fengyuan Ren and   
                   Haiyang Wang   Throughput optimization of TCP incast
                                  congestion control in large-scale
                                  datacenter networks  . . . . . . . . . . 46--60
               Zi-Yang Yang and   
                    Yaw-Wen Kuo   Efficient resource allocation algorithm
                                  for overlay D2D communication  . . . . . 61--71
               Milan Erdelj and   
         Michal Król and   
               Enrico Natalizio   Wireless Sensor Networks and Multi-UAV
                                  systems for natural disaster management  72--86
        Mohsen Riahi Manesh and   
        Sririam Subramaniam and   
               Hector Reyes and   
                 Naima Kaabouch   Real-time spectrum occupancy monitoring
                                  using a probabilistic model  . . . . . . 87--96
                Xuming Fang and   
                    Lei Nan and   
              Zonghua Jiang and   
                     Lijun Chen   Noise-aware fingerprint localization
                                  algorithm for wireless sensor network
                                  based on adaptive fingerprint Kalman
                                  filter . . . . . . . . . . . . . . . . . 97--107
         Azzedine Boukerche and   
                    Xiaoli Zhou   MAC transmission protocols for
                                  delay-tolerant sensor networks . . . . . 108--125
          Nikolaos Baroutis and   
                 Mohamed Younis   Load-conscious maximization of
                                  base-station location privacy in
                                  wireless sensor networks . . . . . . . . 126--139
                Gaogang Xie and   
                 Jingxiu Su and   
                   Xin Wang and   
                  Taihua He and   
            Guangxing Zhang and   
                Steve Uhlig and   
                Kave Salamatian   Index-Trie: Efficient archival and
                                  retrieval of network traffic . . . . . . 140--156
            Rasmus L. Olsen and   
    Jacob Theilgaard Madsen and   
         Jakob G. Rasmussen and   
            Hans-Peter Schwefel   On the use of information quality in
                                  stochastic networked control systems . . 157--169
                   Xuya Jia and   
                    Qing Li and   
                 Yong Jiang and   
                  Zehua Guo and   
                        Jie Sun   A low overhead flow-holding algorithm in
                                  software-defined networks  . . . . . . . 170--180
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 125, Number ??, October 9, 2017

       Tobias Hoßfeld and   
            S.-H. Gary Chan and   
              Brian L. Mark and   
              Andreas Timm-Giel   Softwarization and caching in NGN  . . . 1--3
              Thomas Zinner and   
            Stefan Geissler and   
            Stanislav Lange and   
             Steffen Gebert and   
            Michael Seufert and   
                 Phuoc Tran-Gia   A discrete-time model for optimizing the
                                  processing time of virtualized network
                                  functions  . . . . . . . . . . . . . . . 4--14
                  Zehua Guo and   
                 Ruoyan Liu and   
                    Yang Xu and   
            Andrey Gushchin and   
                Anwar Walid and   
               H. Jonathan Chao   STAR: Preventing flow-table overflow in
                                  software-defined networks  . . . . . . . 15--25
             Sai Qian Zhang and   
                   Qi Zhang and   
              Ali Tizghadam and   
             Byungchul Park and   
            Hadi Bannazadeh and   
              Raouf Boutaba and   
            Alberto Leon-Garcia   TCAM space-efficient routing in a
                                  software defined network . . . . . . . . 26--40
                    Qing Li and   
                   Lei Wang and   
                 Yong Jiang and   
                 Mingwei Xu and   
                    Jianping Wu   A fast and incremental update scheme for
                                  SDN based on a relation graph  . . . . . 41--52
                  Qiang Gao and   
                Weiqin Tong and   
              Samina Kausar and   
                  Lei Huang and   
                  Chao Shen and   
                   Shenan Zheng   Congestion-aware multicast plug-in for
                                  an SDN network operating system  . . . . 53--63
            Antonio Marotta and   
     Fabio D'Andreagiovanni and   
            Andreas Kassler and   
                    Enrica Zola   On the energy cost of robustness for
                                  green virtual network function placement
                                  in 5G virtualized infrastructures  . . . 64--75
              Tran Manh Nam and   
           Nguyen Huu Thanh and   
           Hoang Trung Hieu and   
           Nguyen Tien Manh and   
           Nguyen Van Huynh and   
               Hoang Duong Tuan   Joint network embedding and server
                                  consolidation for energy-efficient
                                  dynamic data center virtualization . . . 76--89
Mirza Mohd Shahriar Maswood and   
             Chris Develder and   
            Edmundo Madeira and   
                     Deep Medhi   Energy-Efficient dynamic virtual network
                                  traffic engineering for north-south
                                  traffic in multi-location data center
                                  networks . . . . . . . . . . . . . . . . 90--102
      Muhammad Faran Majeed and   
          Syed Hassan Ahmed and   
             Siraj Muhammad and   
               Houbing Song and   
                 Danda B. Rawat   Multimedia streaming in
                                  information-centric networking: a survey
                                  and future perspectives  . . . . . . . . 103--121
              Thomas Bonald and   
      Léonce Mekinda and   
               Luca Muscariello   Fair throughput allocation in
                                  Information-Centric Networks . . . . . . 122--131
        Rodrigo B. Mansilha and   
       Marinho P. Barcellos and   
            Emilio Leonardi and   
                    Dario Rossi   Exploiting parallelism in hierarchical
                                  content stores for high-speed ICN
                                  routers  . . . . . . . . . . . . . . . . 132--145
                M. Tortelli and   
                   D. Rossi and   
                    E. Leonardi   A hybrid methodology for the performance
                                  evaluation of Internet-scale cache
                                  networks . . . . . . . . . . . . . . . . 146--159
             Sladana Josilo and   
         Valentino Pacifici and   
         György Dán   Distributed algorithms for content
                                  placement in hierarchical cache networks 160--171
         Gerhard Hasslinger and   
      Konstantinos Ntougias and   
           Frank Hasslinger and   
                Oliver Hohlfeld   Performance evaluation for new web
                                  caching strategies combining LRU with
                                  score based object selection . . . . . . 172--186
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 126, Number ??, October 24, 2017

     Rodolfo W. L. Coutinho and   
         Azzedine Boukerche and   
          Luiz F. M. Vieira and   
         Antonio A. F. Loureiro   Performance modeling and analysis of
                                  void-handling methodologies in
                                  underwater wireless sensor networks  . . 1--14
                  HR Shamna and   
               Jacob Lillykutty   An energy and throughput efficient
                                  distributed cooperative MAC protocol for
                                  multihop wireless networks . . . . . . . 15--30
                   Tao Wang and   
              Baoxian Zhang and   
                  Zheng Yao and   
             Hussein T. Mouftah   Network coding based adaptive CSMA for
                                  network utility maximization . . . . . . 31--43
          Abolfazl Hajisami and   
                  Dario Pompili   Dynamic joint processing: Achieving high
                                  spectral efficiency in uplink 5G
                                  cellular networks  . . . . . . . . . . . 44--56
                Merve Ekmen and   
      Aysegül Altin-Kayhan   Reliable and energy efficient wireless
                                  sensor network design via conditional
                                  multi-copying for multiple central nodes 57--68
                    Xing Ye and   
              Guozhen Cheng and   
                    Xingguo Luo   Maximizing SDN control resource
                                  utilization via switch migration . . . . 69--80
       Salvatore d'Ambrosio and   
      Salvatore de Pasquale and   
            Gerardo Iannone and   
         Delfina Malandrino and   
              Alberto Negro and   
            Giovanni Patimo and   
           Vittorio Scarano and   
          Raffaele Spinelli and   
               Rocco Zaccagnino   Privacy as a proxy for Green Web
                                  browsing: Methodology and
                                  experimentation  . . . . . . . . . . . . 81--99
          Charu C. Aggarwal and   
              Amotz Bar-Noy and   
                  Simon Shamoun   On sensor selection in linked
                                  information networks . . . . . . . . . . 100--113
          Michele Luvisotto and   
          Federico Tramarin and   
                Stefano Vitturi   A learning algorithm for rate selection
                                  in real-time wireless LANs . . . . . . . 114--124
             Thomas Clausen and   
                   Jiazi Yi and   
                 Ulrich Herberg   Lightweight On-demand Ad hoc
                                  Distance-vector Routing --- Next
                                  Generation (LOADng): Protocol,
                                  extension, and applicability . . . . . . 125--140
               Zhenchun Wei and   
                  Yan Zhang and   
                Xiangwei Xu and   
                    Lei Shi and   
                       Lin Feng   A task scheduling algorithm based on
                                  Q-learning and shared value function for
                                  WSNs . . . . . . . . . . . . . . . . . . 141--149
              Hyung-Sin Kim and   
                  Hosoo Cho and   
               Hongchan Kim and   
                  Saewoong Bahk   DT-RPL: Diverse bidirectional traffic
                                  delivery through RPL routing protocol in
                                  low power and lossy networks . . . . . . 150--161
             Enrico Gregori and   
              Barbara Guidi and   
         Alessandro Improta and   
                      Luca Sani   ICE: a memory-efficient BGP route
                                  collecting engine  . . . . . . . . . . . 162--173
            Claudio Casetti and   
  Carla-Fabiana Chiasserini and   
       Francesco Malandrino and   
              Carlo Borgiattino   Area formation and content assignment
                                  for LTE broadcasting . . . . . . . . . . 174--186
                 Yingya Guo and   
              Zhiliang Wang and   
                    Xia Yin and   
                Xingang Shi and   
                    Jianping Wu   Traffic engineering in hybrid SDN
                                  networks with multiple traffic matrices  187--199
                 Jianhui Lv and   
               Xingwei Wang and   
                  Kexin Ren and   
                  Min Huang and   
                       Keqin Li   ACO-inspired Information-Centric
                                  Networking routing mechanism . . . . . . 200--217
                Dohyung Kim and   
                  Younghoon Kim   Enhancing NDN feasibility via dedicated
                                  routing and caching  . . . . . . . . . . 218--228
               Xingwei Wang and   
              Jinhong Zhang and   
                  Min Huang and   
                Shengxiang Yang   A green intelligent routing algorithm
                                  supporting flexible QoS for many-to-many
                                  multicast  . . . . . . . . . . . . . . . 229--245
                Guangwei Xu and   
                  Yanke Bai and   
                   Qiao Pan and   
                Qiubo Huang and   
                    Yanbin Yang   Data verification tasks scheduling based
                                  on dynamic resource allocation in mobile
                                  big data storage . . . . . . . . . . . . 246--255
                   Lin Yang and   
              Mingxuan Yuan and   
               Yanjiao Chen and   
                   Wei Wang and   
                 Qian Zhang and   
                       Jia Zeng   Personalized user engagement modeling
                                  for mobile videos  . . . . . . . . . . . 256--267
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 127, Number ??, November 9, 2017

              Manel Chenait and   
              Bahia Zebbane and   
            Chafika Benzaid and   
                 Nadjib Badache   Energy-efficient coverage protocol based
                                  on stable and predictive scheduling in
                                  wireless sensor networks . . . . . . . . 1--12
        Shreyasee Mukherjee and   
             Shravan Sriram and   
                     Tam Vu and   
          Dipankar Raychaudhuri   EIR: Edge-aware inter-domain routing
                                  protocol for the future mobile Internet  13--30
                Yaw-Wen Kuo and   
                 Jane-Hwa Huang   A CSMA-based MAC protocol for WLANs with
                                  automatic synchronization capability to
                                  provide hard quality of service
                                  guarantees . . . . . . . . . . . . . . . 31--42
                   Deke Guo and   
             Xiaoqiang Teng and   
                  Zhiyao Hu and   
                 Junjie Xie and   
                   Bangbang Ren   Source selection problem in multi-source
                                  multi-destination multicasting . . . . . 43--55
              Chia-Cheng Hu and   
              Chin-Feng Lai and   
                Ji-Gong Hou and   
                 Yueh-Min Huang   Timely scheduling algorithm for P2P
                                  streaming over MANETs  . . . . . . . . . 56--67
 Santiago Egea Gómez and   
Belén Carro Martínez and   
Antonio J. Sánchez-Esguevillas and   
  Luis Hernández Callejo   Ensemble network traffic classification:
                                  Algorithm comparison and novel ensemble
                                  scheme proposal  . . . . . . . . . . . . 68--80
              Fadoua Hassen and   
                   Lotfi Mhamdi   A scalable packet-switch architecture
                                  based on OQ NoCs for data center
                                  networks . . . . . . . . . . . . . . . . 81--93
              Ivan O. Nunes and   
              Clayson Celes and   
    Pedro O. S. Vaz de Melo and   
         Antonio A. F. Loureiro   GROUPS-NET: Group meetings aware routing
                                  in multi-hop D2D networks  . . . . . . . 94--108
           Daniel S. Marcon and   
 Fabrício M. Mazzola and   
           Marinho P. Barcellos   Achieving minimum bandwidth guarantees
                                  and work-conservation in large-scale,
                                  SDN-based datacenter networks  . . . . . 109--125
            Wahida Mansouri and   
               Faouzi Zarai and   
                  Kais Mnif and   
                   Lotfi Kamoun   Cross layer architecture with integrated
                                  MIH in heterogeneous wireless networks   126--137
                Yongbin Yim and   
              Hyunchong Cho and   
                Sang-Ha Kim and   
                 Euisin Lee and   
                    Mario Gerla   Vehicle location service scheme based on
                                  road map in Vehicular Sensor Networks    138--150
    Farshad Keyvan Ghazvini and   
         Mustafa Mehmet-Ali and   
                Mahmoud Doughan   Scalable hybrid MAC protocol for M2M
                                  communications . . . . . . . . . . . . . 151--160
             Yongqiang Wang and   
        Krishna Mosalakanti and   
 Felipe Núñez and   
       Socrates Deligeorges and   
           Francis J. Doyle III   A kernel module for pulse-coupled time
                                  synchronization of sensor networks . . . 161--172
             Hamed Hellaoui and   
             Mouloud Koudil and   
        Abdelmadjid Bouabdallah   Energy-efficient mechanisms in security
                                  of the Internet of Things: a survey  . . 173--189
               Kyu-Hwan Lee and   
             Dong-Hyuk Jang and   
               Sung-Jae Lee and   
                  Jae-Ryong Cha   Target BER selection scheme in LMS
                                  networks using AL-FEC systems  . . . . . 190--199
          Eduardo K. Viegas and   
           Altair O. Santin and   
               Luiz S. Oliveira   Toward a reliable anomaly-based
                                  intrusion detection in real-world
                                  environments . . . . . . . . . . . . . . 200--216
             Pradipta Ghosh and   
                     He Ren and   
              Reza Banirazi and   
     Bhaskar Krishnamachari and   
              Edmond Jonckheere   Empirical evaluation of the
                                  heat-diffusion collection protocol for
                                  wireless sensor networks . . . . . . . . 217--232
              Frank Wetzels and   
          Hans van den Berg and   
               Joost Bosman and   
                Rob van der Mei   Flow termination signaling in the
                                  centralized pre-congestion notification
                                  architecture . . . . . . . . . . . . . . 233--242
Krisztián Németh and   
       Attila K\Horösi and   
Gábor Rétvári   Optimal resource pooling over legacy
                                  equal-split load balancing schemes . . . 243--265
Manassés Ferreira Neto and   
          Olga Goussevskaia and   
Vinícius Fernandes dos Santos   Connectivity with backbone structures in
                                  obstructed wireless networks . . . . . . 266--281
            Samira Chouikhi and   
            In\`es El Korbi and   
      Yacine Ghamri-Doudane and   
            Leila Azouz Saidane   Distributed connectivity restoration in
                                  multichannel wireless sensor networks    282--295
Thomas Valerrian Pasca Santhappan and   
              Sumanta Patro and   
    Bheemarjuna Reddy Tamma and   
             Antony Franklin A.   Network Coordination Function for uplink
                                  traffic steering in tightly coupled LTE
                                  Wi-Fi networks . . . . . . . . . . . . . 296--316
        Agnese V. Ventrella and   
              Giuseppe Piro and   
              L. Alfredo Grieco   Publish--subscribe in mobile information
                                  centric networks: Modeling and
                                  performance evaluation . . . . . . . . . 317--339
        Salman Goli-Bidgoli and   
             Naser Movahhedinia   Determining vehicles' radio transmission
                                  range for increasing cognitive radio
                                  VANET (CR-VANET) reliability using a
                                  trust management system  . . . . . . . . 340--351
                  Han Zhang and   
                Xingang Shi and   
                 Yingya Guo and   
              Zhiliang Wang and   
                        Xia Yin   More load, more differentiation --- Let
                                  more flows finish before deadline in
                                  data center networks . . . . . . . . . . 352--367
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 128, Number ??, December 9, 2017

             Ahmed E. Kamal and   
             Muhammad Imran and   
             Hsiao-Hwa Chen and   
        Athanasios V. Vasilakos   Survivability strategies for emerging
                                  wireless networks  . . . . . . . . . . . 1--4
    Muhammad Zeeshan Asghar and   
             Paavo Nieminen and   
Seppo Hämäläinen and   
          Tapani Ristaniemi and   
         Muhammad Ali Imran and   
 Timo Hämäläinen   Towards proactive context-aware
                                  self-healing for $5$G networks . . . . . 5--13
            Sonia Ben Rejeb and   
               Nidal Nasser and   
              Samer Mansour and   
                Massa Boujlbane   Centralized SON function for operator
                                  optimal strategies in heterogeneous
                                  networks . . . . . . . . . . . . . . . . 14--27
                   Lang Xie and   
           Poul E. Heegaard and   
                   Yuming Jiang   Survivability analysis of a two-tier
                                  infrastructure-based wireless network    28--40
             Louai Al-Awami and   
            Hossam S. Hassanein   Robust decentralized data storage and
                                  retrieval for wireless networks  . . . . 41--50
                Bhaskar Das and   
                  Jalal Almhana   A new cooperative communication
                                  algorithm for improving connectivity in
                                  the event of network failure in VANETs   51--62
           Wassila Lalouani and   
             Mohamed Younis and   
                 Nadjib Badache   Optimized repair of a partitioned
                                  network topology . . . . . . . . . . . . 63--77
                 Enver Ever and   
         Fadi M. Al-Turjman and   
            Hadi Zahmatkesh and   
                   Mustafa Riza   Modelling green HetNets in dynamic ultra
                                  large-scale applications: a case-study
                                  for femtocells in smart-cities . . . . . 78--93
        Seif eddine Hammami and   
                   Hossam Afifi   Fault-tolerant dynamic planning for
                                  wireless mesh networks based on real
                                  load profiles  . . . . . . . . . . . . . 94--107
         Sanaa Sharafeddine and   
                Karim Jahed and   
                Omar Farhat and   
                     Zaher Dawy   Failure recovery in wireless content
                                  distribution networks with
                                  device-to-device cooperation . . . . . . 108--122
              Olga Galinina and   
             Sergey Andreev and   
            Mikhail Komarov and   
              Svetlana Maltseva   Leveraging heterogeneous device
                                  connectivity in a converged 5G-IoT
                                  ecosystem  . . . . . . . . . . . . . . . 123--132
                      Di Li and   
                 Xiaomin Li and   
                      Jiafu Wan   A cloud-assisted handover optimization
                                  strategy for mobile nodes in industrial
                                  wireless networks  . . . . . . . . . . . 133--141
                   A. Tahir and   
                 S. A. Abid and   
                     Nadir Shah   Logical clusters in a DHT-paradigm for
                                  scalable routing in MANETs . . . . . . . 142--153
                  Debiao He and   
           Sherali Zeadally and   
                  Libing Wu and   
                    Huaqun Wang   Analysis of handover authentication
                                  protocols for mobile wireless networks
                                  using identity-based public key
                                  cryptography . . . . . . . . . . . . . . 154--163
                Caidan Zhao and   
               Minmin Huang and   
              Lianfen Huang and   
               Xiaojiang Du and   
                 Mohsen Guizani   A robust authentication scheme based on
                                  physical-layer phase noise fingerprint
                                  for emerging wireless networks . . . . . 164--171
     Prasenjit Bhavathankar and   
           Subhadeep Sarkar and   
                    Sudip Misra   Optimal decision rule-based ex-ante
                                  frequency hopping for jamming avoidance
                                  in wireless sensor networks  . . . . . . 172--185
          Hossein Soleimani and   
               Thomas Begin and   
             Azzedine Boukerche   Safety message generation rate
                                  adaptation in LTE-based vehicular
                                  networks . . . . . . . . . . . . . . . . 186--196
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 129 (part 1), Number ??, December 24, 2017

         Sanaa Sharafeddine and   
                Karim Jahed and   
                   Marwan Fawaz   Optimized device centric aggregation
                                  mechanisms for mobile devices with
                                  multiple wireless interfaces . . . . . . 1--16
               Yi-Ting Peng and   
                Sok-Ian Sou and   
             Meng-Hsun Tsai and   
                Chuan-Sheng Lin   Multipath mobile data offloading of
                                  deadline assurance with policy and
                                  charging control in cellular/WiFi
                                  networks . . . . . . . . . . . . . . . . 17--27
             Erfaneh Vahedi and   
                Majid Bayat and   
     Mohammad Reza Pakravan and   
             Mohammad Reza Aref   A secure ECC-based privacy preserving
                                  data aggregation scheme for smart grids  28--36
                 Jian Zhang and   
                  Yang Yang and   
               Yanjiao Chen and   
                  Jing Chen and   
                     Qian Zhang   A general framework to design secure
                                  cloud storage protocol using homomorphic
                                  encryption scheme  . . . . . . . . . . . 37--50
               Haojun Huang and   
               Junbao Zhang and   
                   Xu Zhang and   
                 Benshun Yi and   
                  Qilin Fan and   
                        Feng Li   EMGR: Energy-efficient multicast
                                  geographic routing in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 51--63
                YiPeng Wang and   
               Xiaochun Yun and   
            Yongzheng Zhang and   
                 Liwei Chen and   
                  Tianning Zang   Rethinking robust and accurate
                                  application protocol identification  . . 64--78
                Soojeon Lee and   
                Dongman Lee and   
               Myungjin Lee and   
              Hyungsoo Jung and   
                 Byoung-Sun Lee   Randomizing TCP payload size for TCP
                                  fairness in data center networks . . . . 79--92
             Mehdi Malboubi and   
                Yanlei Gong and   
                 Zijun Yang and   
                 Xiong Wang and   
             Chen-Nee Chuah and   
                  Puneet Sharma   Software defined network inference with
                                  evolutionary optimal observation
                                  matrices . . . . . . . . . . . . . . . . 93--104
       Amin Ghalami Osgouei and   
Amir Khorsandi Koohanestani and   
              Hossein Saidi and   
                     Ali Fanian   Online assignment of non-SDN virtual
                                  network nodes to a physical SDN  . . . . 105--116
            Bruno P. Santos and   
          Luiz F. M. Vieira and   
            Marcos A. M. Vieira   CGR: Centrality-based green routing for
                                  Low-power and Lossy Networks . . . . . . 117--128
             Sara El Alaoui and   
               Byrav Ramamurthy   EAODR: a novel routing algorithm based
                                  on the Modified Temporal Graph network
                                  model for DTN-based Interplanetary
                                  Networks . . . . . . . . . . . . . . . . 129--141
                K. Katsalis and   
                  B. Rofoee and   
                   G. Landi and   
                J. F. Riera and   
                 K. Kousias and   
          M. Anastasopoulos and   
                  L. Kiraly and   
               A. Tzanakaki and   
                     T. Korakis   Implementation experience in
                                  multi-domain SDN: Challenges,
                                  consolidation and future directions  . . 142--158
                Orhan Ermis and   
             Serif Bahtiyar and   
                Emin Anarim and   
        M. Ufuk Çaglayan   A key agreement protocol with partial
                                  backward confidentiality . . . . . . . . 159--177
                   Lei Ding and   
                    Jun Liu and   
                    Tao Qin and   
                      Haifei Li   Internet traffic classification based on
                                  expanding vector of flow . . . . . . . . 178--192
                Jianwei Niu and   
                Shihao Wang and   
                    Wei Niu and   
           Mohammed Atiquzzaman   User-aware partitioning algorithm for
                                  mobile cloud computing based on maximum
                                  graph cuts . . . . . . . . . . . . . . . 193--206
               Gabriel Scalosub   Towards optimal buffer management for
                                  streams with packet dependencies . . . . 207--214
                    Ying Qu and   
                   Bryan Ng and   
                  Michael Homer   Optimising channel assignment to prevent
                                  flow starvation and improve fairness for
                                  planning single radio WMNs in built
                                  environments . . . . . . . . . . . . . . 215--231
              Phi Le Nguyen and   
                 Yusheng Ji and   
                    Zhi Liu and   
                     Huy Vu and   
               Khanh-Van Nguyen   Distributed hole-bypassing protocol in
                                  WSNs with constant stretch and load
                                  balancing  . . . . . . . . . . . . . . . 232--250
                      Ji Qi and   
                     Fei Hu and   
                     Xin Li and   
              Koushik A. M. and   
                    Sunil Kumar   3-ent (resili-ent, intellig-ent, and
                                  effici-ent) medium access control for
                                  full-duplex, jamming-aware, directional
                                  airborne networks  . . . . . . . . . . . 251--260
  João Marcelo Ceron and   
 Cíntia Borges Margi and   
Lisandro Zambenedetti Granville   MARS: From traffic containment to
                                  network reconfiguration in
                                  malware-analysis systems . . . . . . . . 261--272
               Rahul Thakur and   
           Vijeth J. Kotagi and   
             C. Siva Ram Murthy   Resource allocation and cell selection
                                  framework for LTE-Unlicensed femtocell
                                  networks . . . . . . . . . . . . . . . . 273--283
              Hyunjoong Lee and   
               Sangkyu Park and   
                  Saewoong Bahk   An opportunistic scheduling algorithm
                                  using aged CSI in massive MIMO systems   284--296
                     Jia Wu and   
               Zhigang Chen and   
                      Ming Zhao   Effective information transmission based
                                  on socialization nodes in opportunistic
                                  networks . . . . . . . . . . . . . . . . 297--305
                    Yue Qiu and   
                   Maode Ma and   
                      Shuo Chen   An anonymous authentication scheme for
                                  multi-domain machine-to-machine
                                  communication in cyber-physical systems  306--318
                  Aya Ayadi and   
            Oussama Ghorbel and   
       Abdulfattah M. Obeid and   
                   Mohamed Abid   Outlier detection approaches for
                                  wireless sensor networks: a survey . . . 319--333
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 129 (part 2), Number ??, December 24, 2017

                    Harry Rudin   Change at the Helm: Welcome, Farewell,
                                  Advice, Thanks: Special Issues . . . . . iii--iii
      J. J. P. C. Rodrigues and   
                S. Zeadally and   
                   N. Kumar and   
                         G. Han   Special Issue on 5G Wireless Networks
                                  for IoT and Body Sensors . . . . . . . . 335--339
               Jaime Lloret and   
               Lorena Parra and   
                 Miran Taha and   
             Jesus Tomás   An architecture and protocol for smart
                                  continuous eHealth monitoring using 5G   340--351
        Radu-Corneliu Marin and   
          Radu-Ioan Ciobanu and   
              Ciprian Dobre and   
Constandinos X. Mavromoustakis and   
              George Mastorakis   A context-aware collaborative model for
                                  smartphone energy efficiency over 5G
                                  wireless networks  . . . . . . . . . . . 352--362
                  Ilsun You and   
                 Jong-Hyouk Lee   SPFP: Ticket-based secure handover for
                                  fast proxy mobile IPv6 in 5G networks    363--372
           Carolina Fortuna and   
                Adnan Bekan and   
             Tomaz Javornik and   
               Gregor Cerar and   
                Mihael Mohorcic   Software interfaces for control,
                                  optimization and update of 5G machine
                                  type communication networks  . . . . . . 373--383
                  Shuai Han and   
                  Cheng Guo and   
               Weixiao Meng and   
                       Cheng Li   A flexible resource scheduling scheme
                                  for an adaptive SCMA system  . . . . . . 384--391
                   Yujie Li and   
                 Zhibin Gao and   
              Lianfen Huang and   
               Xiaojiang Du and   
                 Mohsen Guizani   Resource management for future mobile
                                  networks: Architecture and technologies  392--398
                   Yang Liu and   
               Changqiao Xu and   
                Yufeng Zhan and   
                 Zhixin Liu and   
              Jianfeng Guan and   
                   Hongke Zhang   Incentive mechanism for computation
                                  offloading using edge computing: a
                                  Stackelberg game approach  . . . . . . . 399--409
                 Lijun Yang and   
                  Chao Ding and   
                    Meng Wu and   
                       Kun Wang   Robust detection of false data injection
                                  attacks for data aggregation in an
                                  Internet of Things-based environmental
                                  surveillance . . . . . . . . . . . . . . 410--428
                   Xiong Li and   
       Maged Hamada Ibrahim and   
                Saru Kumari and   
        Arun Kumar Sangaiah and   
              Vidushi Gupta and   
         Kim-Kwang Raymond Choo   Anonymous mutual authentication and key
                                  agreement scheme for wearable sensors in
                                  wireless body area networks  . . . . . . 429--443
               Ibrar Yaqoob and   
                 Ejaz Ahmed and   
   Muhammad Habib ur Rehman and   
Abdelmuttlib Ibrahim Abdalla Ahmed and   
     Mohammed Ali Al-garadi and   
             Muhammad Imran and   
                 Mohsen Guizani   The rise of ransomware and emerging
                                  security challenges in the Internet of
                                  Things . . . . . . . . . . . . . . . . . 444--458
                 Ejaz Ahmed and   
               Ibrar Yaqoob and   
Ibrahim Abaker Targio Hashem and   
                 Imran Khan and   
Abdelmuttlib Ibrahim Abdalla Ahmed and   
             Muhammad Imran and   
        Athanasios V. Vasilakos   The role of big data analytics in
                                  Internet of Things . . . . . . . . . . . 459--471
              Chi-Yuan Chen and   
                Hsin-Min Wu and   
                   Lei Wang and   
                     Chia-Mu Yu   Practical integrity preservation for
                                  data streaming in cloud-assisted
                                  healthcare sensor systems  . . . . . . . 472--480
                    Tie Qiu and   
                   Xize Liu and   
                    Min Han and   
                 Mingchu Li and   
                 Yushuang Zhang   SRTS: a Self-Recoverable Time
                                  Synchronization for sensor networks of
                                  healthcare IoT . . . . . . . . . . . . . 481--492
                Zhenyu Zhou and   
                Junhao Feng and   
                Yunjian Jia and   
              Shahid Mumtaz and   
   Kazi Mohammed Saidul Huq and   
         Jonathan Rodriguez and   
                       Di Zhang   Energy-efficient game-theoretical random
                                  access for M2M communications in
                                  overlapped cellular networks . . . . . . 493--501
                  Long Zhao and   
                  Kan Zheng and   
          Periklis Chatzimisios   Hybrid information and energy transfer
                                  in ultra-dense HetNets . . . . . . . . . 502--509
        Jacopo De Benedetto and   
           Paolo Bellavista and   
                  Luca Foschini   Proximity discovery and data
                                  dissemination for mobile crowd sensing
                                  using LTE direct . . . . . . . . . . . . 510--521
                  Bang Wang and   
                 Qiang Yang and   
           Laurence T. Yang and   
                  Chunsheng Zhu   On minimizing energy consumption cost in
                                  green heterogeneous wireless networks    522--535
             Chun-Cheng Lin and   
          Ching-Tsorng Tsai and   
             Der-Jiunn Deng and   
                I-Hsin Tsai and   
                  Shun-Yu Jhong   Minimizing electromagnetic pollution and
                                  power consumption in green heterogeneous
                                  small cell network deployment  . . . . . 536--547
            Ahmed Harbouche and   
           Noureddine Djedi and   
            Mohammed Erradi and   
           Jalel Ben-Othman and   
             Abdellatif Kobbane   Model driven flexible design of a
                                  wireless body sensor network for health
                                  monitoring . . . . . . . . . . . . . . . 548--571
             Satya J. Borah and   
    Sanjay Kumar Dhurandher and   
             Isaac Woungang and   
                   Vinesh Kumar   A game theoretic context-based routing
                                  protocol for opportunistic networks in
                                  an IoT scenario  . . . . . . . . . . . . 572--584
                      Anonymous   Editorial Board  . . . . . . . . . . . . ifc--ifc


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 130, Number ??, January 15, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
            Ian F. Akyildiz and   
                Harry Rudin and   
               Burkhard Stiller   Editorial for COMNET 2017  . . . . . . . iii--iii
       Ashanie Gunathillake and   
           Andrey V. Savkin and   
            Anura P. Jayasumana   Topology mapping algorithm for $2$D and
                                  $3$D Wireless Sensor Networks based on
                                  maximum likelihood estimation  . . . . . 1--15
                A. Hafsaoui and   
                A. Dandoush and   
            G. Urvoy-Keller and   
               M. Siekkinen and   
                    D. Collange   A fine-grained response time analysis
                                  technique in heterogeneous environments  16--33
  Islam Tharwat Abdel-Halim and   
     Hossam Mahmoud Ahmed Fahmy   Prediction-based protocols for vehicular
                                  Ad Hoc Networks: Survey and taxonomy . . 34--50
                    Ran Shu and   
               Fengyuan Ren and   
                 Jiao Zhang and   
                 Tong Zhang and   
                     Chuang Lin   Analysing and improving convergence of
                                  quantized congestion notification in
                                  Data Center Ethernet . . . . . . . . . . 51--64
            Antonio Marotta and   
           Stefano Avallone and   
                Andreas Kassler   A Joint Power Efficient Server and
                                  Network Consolidation approach for
                                  virtualized data centers . . . . . . . . 65--80
Surabhi Abhimithra Karthikeya and   
          Revathy Narayanan and   
             Siva Ram Murthy C.   Power-aware gateway connectivity in
                                  battery-powered dynamic IoT networks . . 81--93
               Kashif Bilal and   
               Osman Khalid and   
                Aiman Erbad and   
                  Samee U. Khan   Potentials, trends, and prospects in
                                  edge technologies: Fog, cloudlet, mobile
                                  edge, and micro data centers . . . . . . 94--120
                Animesh Roy and   
           Tamaghna Acharya and   
                   Sipra DasBit   Quality of service in delay tolerant
                                  networks: a survey . . . . . . . . . . . 121--133
            Anand Seetharam and   
                    Arti Ramesh   On the goodput of flows in heterogeneous
                                  mobile networks  . . . . . . . . . . . . 134--144
            Hoda Ayatollahi and   
          Mohammad Khansari and   
                Hamid R. Rabiee   A push-pull network coding protocol for
                                  live peer-to-peer streaming  . . . . . . 145--155
                  A. Meloni and   
             P. A. Pegoraro and   
                  L. Atzori and   
                 A. Benigni and   
                       S. Sulis   Cloud-based IoT solution for state
                                  estimation in smart grids: Exploiting
                                  virtualization and edge-intelligence
                                  technologies . . . . . . . . . . . . . . 156--165


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 131, Number ??, February 11, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                  Weibo Chu and   
            Mostafa Dehghan and   
             John C. S. Lui and   
                Don Towsley and   
                   Zhi-Li Zhang   Joint cache resource allocation and
                                  request routing for in-network caching
                                  services . . . . . . . . . . . . . . . . 1--14
                   Reza Ghebleh   A comparative classification of
                                  information dissemination approaches in
                                  vehicular ad hoc networks from
                                  distinctive viewpoints: a survey . . . . 15--37
               Xingwei Wang and   
                 Jianhui Lv and   
                  Min Huang and   
                   Keqin Li and   
                     Jie Li and   
                      Kexin Ren   Energy-efficient ICN routing mechanism
                                  with QoS support . . . . . . . . . . . . 38--51
                 Daeho Kang and   
              Hyung-Sin Kim and   
               Changhee Joo and   
                  Saewoong Bahk   ORGMA: Reliable opportunistic routing
                                  with gradient forwarding for MANETs  . . 52--64
                   Xuya Jia and   
                 Yong Jiang and   
                  Zehua Guo and   
              Gengbiao Shen and   
                       Lei Wang   Intelligent path control for
                                  energy-saving in hybrid SDN networks . . 65--76
           Giovanni Nardini and   
              Giovanni Stea and   
                 Antonio Virdis   A scalable data-plane architecture for
                                  one-to-one device-to-device
                                  communications in LTE-Advanced . . . . . 77--95
                 Zhibo Wang and   
                    Ran Tan and   
                  Jiahui Hu and   
                  Jing Zhao and   
                  Qian Wang and   
                   Feng Xia and   
                  Xiaoguang Niu   Heterogeneous incentive mechanism for
                                  time-sensitive and location-dependent
                                  crowdsensing networks with random
                                  arrivals . . . . . . . . . . . . . . . . 96--109
               Xiaonan Wang and   
             Zhengxiong Dou and   
                  Dong Wang and   
                         Qi Sun   Mobility management for 6LoWPAN WSN  . . 110--128
   Fátima Castro-Jul and   
Rebeca P. Díaz-Redondo and   
     Ana Fernández-Vilas   Collaboratively assessing urban alerts
                                  in ad hoc participatory sensing  . . . . 129--143
         Durbadal Chattaraj and   
             Monalisa Sarma and   
                Ashok Kumar Das   A new two-server authentication and key
                                  agreement protocol for accessing secure
                                  cloud services . . . . . . . . . . . . . 144--164


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 132, Number ??, February 26, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                    Hui Cai and   
                 Yanmin Zhu and   
                    Zhenni Feng   A truthful incentive mechanism for
                                  mobile crowd sensing with
                                  location-sensitive weighted tasks  . . . 1--14
                 Junxiao He and   
                Oliver Yang and   
                    Yifeng Zhou   Using flow cost to globally allocate and
                                  optimize limited bandwidth in multipath
                                  routing  . . . . . . . . . . . . . . . . 15--25
              Meitian Huang and   
                Weifa Liang and   
                 Zichuan Xu and   
                Wenzheng Xu and   
                   Song Guo and   
                     Yinlong Xu   Online unicasting and multicasting in
                                  software-defined networks  . . . . . . . 26--39
                Yufeng Zhan and   
               Yuanqing Xia and   
                   Jinhui Zhang   Incentive mechanism in platform-centric
                                  mobile crowdsensing: a one-to-many
                                  bargaining approach  . . . . . . . . . . 40--52
         Abdullah Yasin Nur and   
             Mehmet Engin Tozal   Cross-AS (X-AS) Internet topology
                                  mapping  . . . . . . . . . . . . . . . . 53--67
     Miguel L. Bote-Lorenzo and   
Eduardo Gómez-Sánchez and   
   Carlos Mediavilla-Pastor and   
   Juan I. Asensio-Pérez   Online machine learning algorithms to
                                  predict link quality in community
                                  wireless mesh networks . . . . . . . . . 68--80
                Hongtao Shi and   
                Hongping Li and   
                  Dan Zhang and   
               Chaqiu Cheng and   
                   Xuanxuan Cao   An efficient feature generation approach
                                  based on deep learning and feature
                                  selection techniques for traffic
                                  classification . . . . . . . . . . . . . 81--98
            Hideo Kobayashi and   
              Eiichi Kameda and   
         Yoshiaki Terashima and   
             Norihiko Shinomiya   Towards sustainable heterogeneous
                                  wireless networks: a decision strategy
                                  for AP selection with dynamic graphs . . 99--107
                    Fu Xiao and   
               Qianwen Miao and   
                Xiaohui Xie and   
                 Lijuan Sun and   
                   Ruchuan Wang   SHMO: a seniors health monitoring system
                                  based on energy-free sensing . . . . . . 108--117
                     Yue Li and   
                  Luigi Iannone   Assessing Locator/Identifier Separation
                                  Protocol interworking performance
                                  through RIPE Atlas . . . . . . . . . . . 118--128
                 Mumtaz Karatas   Optimal deployment of heterogeneous
                                  sensor networks for a hybrid point and
                                  barrier coverage application . . . . . . 129--144
           Quang-Tuan Thieu and   
                 Hung-Yun Hsieh   Outage protection for cellular-mode
                                  users in device-to-device communications
                                  through stochastic optimization  . . . . 145--160
            Mourad Benmalek and   
             Yacine Challal and   
         Abdelouahid Derhab and   
        Abdelmadjid Bouabdallah   VerSAMI: Versatile and Scalable key
                                  management for Smart Grid AMI systems    161--179
           Mohammed S. Hadi and   
             Ahmed Q. Lawey and   
    Taisir E. H. El-Gorashi and   
        Jaafar M. H. Elmirghani   Big data analytics for wireless and
                                  wired network design: a survey . . . . . 180--199


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 133, Number ??, March 14, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
             Abhishek Gupta and   
            M. Farhan Habib and   
               Uttam Mandal and   
            Pulak Chowdhury and   
          Massimo Tornatore and   
            Biswanath Mukherjee   On service-chaining strategies using
                                  Virtual Network Functions in operator
                                  networks . . . . . . . . . . . . . . . . 1--16
         J. Carmona-Murillo and   
              V. Friderikos and   
J. L. González-Sánchez   A hybrid DMM solution and trade-off
                                  analysis for future wireless networks    17--32
                     Wei Li and   
             Changxin Huang and   
                  Chao Xiao and   
                   Songchen Han   A heading adjustment method in wireless
                                  directional sensor networks  . . . . . . 33--41
            Abbas Arghavani and   
            Mahdi Arghavani and   
             Mahmood Ahmadi and   
                     Paul Crane   Attacker-Manager Game Tree (AMGT): A new
                                  framework for visualizing and analysing
                                  the interactions between attacker and
                                  network security manager . . . . . . . . 42--58
                 Yiran Shen and   
               Chengwen Luo and   
                    Dan Yin and   
                Hongkai Wen and   
                Rus Daniela and   
                         Wen Hu   Privacy-preserving sparse representation
                                  classification in cloud-enabled mobile
                                  applications . . . . . . . . . . . . . . 59--72
               Piotr Borylo and   
               Jerzy Domzal and   
           Robert Wójcik   Survivable automatic hidden bypasses in
                                  Software-Defined Networks  . . . . . . . 73--89
               Ibrahim Ayad and   
                Youngbin Im and   
                Eric Keller and   
                     Sangtae Ha   A Practical Evaluation of Rate
                                  Adaptation Algorithms in HTTP-based
                                  Adaptive Streaming . . . . . . . . . . . 90--103
                     Jun Xu and   
             Chengcheng Guo and   
                      Hao Zhang   Joint channel allocation and power
                                  control based on PSO for cellular
                                  networks with D2D communications . . . . 104--119
                Chaonong Xu and   
                  Kaichi Ma and   
                     Yongjun Xu   Complexity of minimum uplink scheduling
                                  in backbone-assisted successive
                                  interference cancellation-based wireless
                                  networks . . . . . . . . . . . . . . . . 120--129
                  Tian Wang and   
              Jiandian Zeng and   
    MD Zakirul Alam Bhuiyan and   
              Yonghong Chen and   
                 Yiqiao Cao and   
                   Hui Tian and   
                      Mande Xie   Energy-efficient relay tracking with
                                  multiple mobile camera sensors . . . . . 130--140
              Sana Belguith and   
           Nesrine Kaaniche and   
           Maryline Laurent and   
           Abderrazak Jemai and   
                    Rabah Attia   PHOABE: Securely outsourcing
                                  multi-authority attribute based
                                  encryption with policy hidden for cloud
                                  assisted IoT . . . . . . . . . . . . . . 141--156
                    Hui Cui and   
             Robert H. Deng and   
                 Junzuo Lai and   
                     Xun Yi and   
                    Surya Nepal   An efficient and expressive
                                  ciphertext-policy attribute-based
                                  encryption scheme with partially hidden
                                  access structures, revisited . . . . . . 157--165
                  Huan Chen and   
                 Xiong Wang and   
              Yangming Zhao and   
                Tongyu Song and   
                  Yang Wang and   
                Shizhong Xu and   
                       Lemin Li   MOSC: a method to assign the outsourcing
                                  of service function chain across
                                  multiple clouds  . . . . . . . . . . . . 166--182
            Jessie Hui Wang and   
                   Changqing An   A study on geographic properties of
                                  Internet routing . . . . . . . . . . . . 183--194
             Shadi Moazzeni and   
 Mohammad Reza Khayyambashi and   
         Naser Movahhedinia and   
               Franco Callegati   On reliability improvement of
                                  Software-Defined Networks  . . . . . . . 195--211
                      Bo Yi and   
               Xingwei Wang and   
                   Keqin Li and   
               Sajal K. Das and   
                      Min Huang   A comprehensive survey of Network
                                  Function Virtualization  . . . . . . . . 212--262


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 134, Number ??, April 7, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
Sergio M. Martínez-Chavez and   
    Mario E. Rivero-Angeles and   
     Laura I. Garay-Jimenez and   
          Elena F. Ruiz-Ledesma   Cognitive radio system for interference
                                  reduction in BANETs focused on epilepsy
                                  diagnosis  . . . . . . . . . . . . . . . 1--22
           G. Stergiopoulos and   
               D. Gritzalis and   
                 V. Kouktzoglou   Using formal distributions for threat
                                  likelihood estimation in cloud-enabled
                                  IT risk assessment . . . . . . . . . . . 23--45
               Javier Lopez and   
                  Juan E. Rubio   Access control for cyber-physical
                                  systems interconnected to the cloud  . . 46--54
               Andrea Detti and   
          Lorenzo Bracciale and   
           Pierpaolo Loreti and   
         Nicola Blefari Melazzi   Modeling LRU cache with invalidation . . 55--65
                 Long Cheng and   
                Jianwei Niu and   
               Chengwen Luo and   
                    Lei Shu and   
                Linghe Kong and   
                Zhiwei Zhao and   
                          Yu Gu   Towards minimum-delay and
                                  energy-efficient flooding in
                                  low-duty-cycle wireless sensor networks  66--77
    Seyed Morteza Pournaghi and   
          Behnam Zahednejad and   
                Majid Bayat and   
                Yaghoub Farjami   NECPPA: A novel and efficient
                                  conditional privacy-preserving
                                  authentication scheme for VANET  . . . . 78--92
       Francesco Malandrino and   
  Carla-Fabiana Chiasserini and   
                Claudio Casetti   Virtualization-based evaluation of
                                  backhaul performance in vehicular
                                  applications . . . . . . . . . . . . . . 93--104
              Daisuke Satoh and   
                Yuji Takano and   
             Ryunosuke Sudo and   
                 Takemi Mochida   Reduction of communication demand under
                                  disaster congestion using control to
                                  change human communication behavior
                                  without direct restriction . . . . . . . 105--115
             Xiaoxiong Weng and   
                Yongxin Liu and   
               Houbing Song and   
                Shushen Yao and   
                  Pengfei Zhang   Mining urban passengers' travel patterns
                                  from incomplete data with use cases  . . 116--126
             Mario Collotta and   
               Giovanni Pau and   
                Daniel G. Costa   A fuzzy-based approach for
                                  energy-efficient Wi-Fi communications in
                                  dense wireless multimedia sensor
                                  networks . . . . . . . . . . . . . . . . 127--139
              Ilhan Demirci and   
        Ömer Korçak   Cell breathing algorithms for load
                                  balancing in Wi-Fi/cellular
                                  heterogeneous networks . . . . . . . . . 140--151
          Aous Thabit Naman and   
                    Yu Wang and   
  Hassan Habibi Gharakheili and   
            Vijay Sivaraman and   
                  David Taubman   Responsive high throughput congestion
                                  control for interactive applications
                                  over SDN-enabled networks  . . . . . . . 152--166
                   Wei Feng and   
                     Yu Qin and   
                Shijun Zhao and   
                   Dengguo Feng   AAoT: Lightweight attestation and
                                  authentication of low-resource things in
                                  IoT and CPS  . . . . . . . . . . . . . . 167--182
           A. K. Marnerides and   
              D. P. Pezaros and   
                   D. Hutchison   Internet traffic characterisation:
                                  Third-order statistics and higher-order
                                  spectra for precise traffic modelling    183--201
               Quanzhong Li and   
                       Sai Zhao   Secure transmission for multi-antenna
                                  wireless powered communication with
                                  co-channel interference and self-energy
                                  recycling  . . . . . . . . . . . . . . . 202--214
    Lakshmikanth Guntupalli and   
      Jorge Martinez-Bauset and   
                    Frank Y. Li   Performance of frame transmissions and
                                  event-triggered sleeping in duty-cycled
                                  WSNs with error-prone wireless links . . 215--227
               Rafael Kunst and   
              Leandro Avila and   
            Edison Pignaton and   
               Sergio Bampi and   
                 Juergen Rochol   Improving network resources allocation
                                  in smart cities video surveillance . . . 228--244
              G. Siracusano and   
                 S. Salsano and   
               P. L. Ventre and   
                   A. Detti and   
                  O. Rashed and   
             N. Blefari-Melazzi   A framework for experimenting ICN over
                                  SDN solutions using physical and virtual
                                  testbeds . . . . . . . . . . . . . . . . 245--259
               Yanxiao Zhao and   
            MD Nashid Anjum and   
                    Lina Pu and   
               Guodong Wang and   
                         Yu Luo   Optimal On Demand Delay-constrained Fair
                                  Distribution for self-coexistence WRAN   260--271
              Ismail Bennis and   
           Hac\`ene Fouchal and   
           Kandaraj Piamrat and   
                 Marwane Ayaida   Efficient queuing scheme through
                                  cross-layer approach for multimedia
                                  transmission over WSNs . . . . . . . . . 272--282


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 135, Number ??, April 22, 2018

        Saptarshi Chaudhuri and   
                 Irfan Baig and   
                  Debabrata Das   A novel QoS aware medium access control
                                  scheduler for LTE-advanced network . . . 1--14
                    Hui Xia and   
                   Bin Fang and   
            Matthew Roughan and   
                Kenjiro Cho and   
                      Paul Tune   A BasisEvolution framework for network
                                  traffic anomaly detection  . . . . . . . 15--31
               Yingjie Wang and   
                Zhipeng Cai and   
             Xiangrong Tong and   
                   Yang Gao and   
                   Guisheng Yin   Truthful incentive mechanism with
                                  location privacy-preserving for mobile
                                  crowdsourcing systems  . . . . . . . . . 32--43
       Mohiyeddin Mozaffari and   
     Behrouz Safarinejadian and   
             Mokhtar Shasadeghi   Probability density estimation in sensor
                                  networks based on distributed mixture of
                                  factor analyzers, mobile agents and
                                  stochastic sensor selection  . . . . . . 44--53
        Geraldo P. R. Filho and   
          Leandro A. Villas and   
             Heitor Freitas and   
                Alan Valejo and   
          Daniel L. Guidoni and   
               Jó Ueyama   ResiDI: Towards a smarter smart home
                                  system for decision-making using
                                  wireless sensors and actuators . . . . . 54--69
          Gloria Ciavarrini and   
             Maria S. Greco and   
                Alessio Vecchio   Geolocation of Internet hosts: Accuracy
                                  limits through Cramér--Rao lower bound    70--80
              Murat Karakus and   
                  Arjan Durresi   Economic Viability of Software Defined
                                  Networking (SDN) . . . . . . . . . . . . 81--95
                E. Schiller and   
                 N. Nikaein and   
              E. Kalogeiton and   
               M. Gasparyan and   
                       T. Braun   CDS-MEC: NFV/SDN-based Application
                                  Management for MEC in 5G Systems . . . . 96--107
Charalampos Konstantopoulos and   
            Nikolaos Vathis and   
          Grammati Pantziou and   
               Damianos Gavalas   Employing mobile elements for
                                  delay-constrained data gathering in WSNs 108--131
            Arvind Merwaday and   
               Murat Yuksel and   
               Thomas Quint and   
  Ismail Güvenç and   
                 Walid Saad and   
                    Naim Kapucu   Incentivizing spectrum sharing via
                                  subsidy regulations for future wireless
                                  networks . . . . . . . . . . . . . . . . 132--146
Andrés F. Murillo Piedrahita and   
                Vikram Gaur and   
              Jairo Giraldo and   
         Alvaro A. Cardenas and   
           Sandra Julieta Rueda   Virtual incident response functions in
                                  control systems  . . . . . . . . . . . . 147--159
              Walid Khallef and   
             Sylvain Durand and   
    Miklós Molnár   ILP formulation of the exact solution of
                                  multi-constrained minimum cost multicast 160--170
         Azzedine Boukerche and   
            Robson E. De Grande   Vehicular cloud computing:
                                  Architectures, applications, and
                                  mobility . . . . . . . . . . . . . . . . 171--189
                Haitao Zhao and   
                Lingchu Mao and   
                       Jibo Wei   Coverage on demand: A simple motion
                                  control algorithm for autonomous robotic
                                  sensor networks  . . . . . . . . . . . . 190--200
                 Sana Rekik and   
              Nouha Baccour and   
             Mohamed Jmaiel and   
               Khalil Drira and   
           Luigi Alfredo Grieco   Autonomous and traffic-aware scheduling
                                  for TSCH networks  . . . . . . . . . . . 201--212
 Marcos R. M. Falcão and   
         Andson M. Balieiro and   
                 Kelvin L. Dias   A flexible-bandwidth model with channel
                                  reservation and channel aggregation for
                                  three-layered Cognitive Radio Networks   213--225
Kushan Sudheera Kalupahana Liyanage and   
                   Maode Ma and   
            Peter Han Joo Chong   Controller placement optimization in
                                  hierarchical distributed software
                                  defined vehicular networks . . . . . . . 226--239
                Mira Morcos and   
              Tijani Chahed and   
                   Lin Chen and   
             Jocelyne Elias and   
                Fabio Martignon   A two-level auction for resource
                                  allocation in multi-tenant C-RAN . . . . 240--252
                 Sven Hager and   
                Patrik John and   
             Stefan Dietzel and   
         Björn Scheuermann   RuleBender: Tree-based policy
                                  transformations for practical packet
                                  classification systems . . . . . . . . . 253--265
                 Heng Zhang and   
                 Wei Xing Zheng   Optimum transmission policy for remote
                                  state estimation with opportunistic
                                  energy harvesting  . . . . . . . . . . . 266--274
            Alexandra Cetto and   
              Mathias Klier and   
          Alexander Richter and   
           Jan Felix Zolitschka   ``Thanks for sharing'' --- Identifying
                                  users' roles based on knowledge
                                  contribution in Enterprise Social
                                  Networks . . . . . . . . . . . . . . . . 275--288
José Suárez-Varela and   
                Pere Barlet-Ros   Flow monitoring in Software-Defined
                                  Networks: Finding the
                                  accuracy/performance tradeoffs . . . . . 289--301


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 136, Number ??, May 8, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                Yehuda Afek and   
          Anat Bremler-Barr and   
        Shir Landau Feibish and   
                   Liron Schiff   Detecting heavy flows in the SDN match
                                  and action model . . . . . . . . . . . . 1--12
            Miguel Sepulcre and   
                Javier Gozalvez   Context-aware heterogeneous V2X
                                  communications for connected vehicles    13--21
           Maciej Ku\'zniar and   
      Peter Peresíni and   
             Dejan Kosti\'c and   
                   Marco Canini   Methodology, measurement and analysis of
                                  flow table update characteristics in
                                  hardware OpenFlow switches . . . . . . . 22--36
          Vajiheh Hajisalem and   
                 Shahram Babaie   A hybrid intrusion detection system
                                  based on ABC-AFS algorithm for misuse
                                  and anomaly detection  . . . . . . . . . 37--50
              Ivano Cerrato and   
                   Fulvio Risso   Enabling precise traffic filtering based
                                  on protocol encapsulation rules  . . . . 51--67
                 Junmei Yao and   
                    Wei Lou and   
                  Chao Yang and   
                     Kaishun Wu   Efficient Interference-Aware Power
                                  Control for Wireless Networks  . . . . . 68--79
               Zhaomin Chen and   
              Chai Kiat Yeo and   
                Bu Sung Lee and   
                 Chiew Tong Lau   Power spectrum entropy based detection
                                  and mitigation of low-rate DoS attacks   80--94
              Tingting Yang and   
                 Xiang Long and   
        Arun Kumar Sangaiah and   
               Zhigao Zheng and   
                      Chao Tong   Deep detection network for real-life
                                  traffic sign in vehicular networks . . . 95--104
  Seilendria A. Hadiwardoyo and   
Enrique Hernández-Orallo and   
         Carlos T. Calafate and   
           Juan Carlos Cano and   
                 Pietro Manzoni   Experimental characterization of
                                  UAV-to-car communications  . . . . . . . 105--118
                    Ming Li and   
              Joseph Reeves and   
                  Carlos Moreno   Multi-level sample importance ranking
                                  based progressive transmission strategy
                                  for time series body sensor data . . . . 119--127
                Siqian Yang and   
                 Cheng Wang and   
                 Changjun Jiang   Centron: Cooperative neighbor discovery
                                  in mobile Ad-hoc networks  . . . . . . . 128--136
              Murat Semerci and   
          Ali Taylan Cemgil and   
             Bülent Sankur   An intelligent cyber security system
                                  against DDoS attacks in SIP networks . . 137--154
                   Lijie Xu and   
                  Geng Yang and   
                     Jia Xu and   
                   Lei Wang and   
                    Haipeng Dai   Achieving adaptive broadcasting
                                  performance tradeoff for energy-critical
                                  sensor networks: a bottom-up approach    155--170


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 137, Number ??, June 4, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                Yu-Ting Lin and   
              Thomas Bonald and   
          Salah Eddine Elayoubi   Flow-level traffic model for adaptive
                                  streaming services in mobile networks    1--16
           Ryoichi Shinkuma and   
              Yusuke Tanaka and   
           Yoshinobu Yamada and   
             Eiji Takahashi and   
                   Takeo Onishi   User instruction mechanism for temporal
                                  traffic smoothing in mobile networks . . 17--26
       Muhammad Awais Javed and   
           Sherali Zeadally and   
                     Zara Hamid   Trust-based security adaptation
                                  mechanism for Vehicular Sensor Networks  27--36
             Sabrina Sicari and   
        Alessandra Rizzardi and   
           Daniele Miorandi and   
          Alberto Coen-Porisini   REATO: REActing TO Denial of Service
                                  attacks in the Internet of Things  . . . 37--48
              ChunSheng Xin and   
               Sharif Ullah and   
                   Min Song and   
                    Zhao Wu and   
                   Qiong Gu and   
                   Huanqing Cui   Throughput oriented lightweight
                                  near-optimal rendezvous algorithm for
                                  cognitive radio networks . . . . . . . . 49--60
                Zhengyu Zhu and   
             Zhongyong Wang and   
                  Zheng Chu and   
                   Di Zhang and   
                  Byonghyo Shim   Robust energy harvest balancing
                                  optimization with V2X-SWIPT over MISO
                                  secrecy channel  . . . . . . . . . . . . 61--68
               Mahdi Zareei and   
       Cesar Vargas-Rosales and   
Rafaela Villalpando-Hernandez and   
          Leyre Azpilicueta and   
     Mohammad Hossein Anisi and   
        Mubashir Husain Rehmani   The effects of an Adaptive and
                                  Distributed Transmission Power Control
                                  on the performance of energy harvesting
                                  sensor networks  . . . . . . . . . . . . 69--82
               Suman Bhunia and   
      Paulo Alexandre Regis and   
                Shamik Sengupta   Distributed adaptive beam nulling to
                                  survive against jamming in $3$D UAV mesh
                                  networks . . . . . . . . . . . . . . . . 83--97
             Danda B. Rawat and   
              Reham Alsabet and   
        Chandra Bajracharya and   
                       Min Song   On the performance of cognitive
                                  internet-of-vehicles with unlicensed
                                  user-mobility and licensed user-activity 98--106
                   N. Anand and   
                Sarath Babu and   
                    B. S. Manoj   On detecting compromised controller in
                                  software defined networks  . . . . . . . 107--118
                Sungjin Kim and   
                Jinkook Kim and   
                Seokwoo Nam and   
                     Dohoon Kim   WebMon: ML- and YARA-based malicious
                                  webpage detection  . . . . . . . . . . . 119--131
              Yunchong Guan and   
                 Weimin Lei and   
                  Wei Zhang and   
                Shaowei Liu and   
                         Hao Li   Scalable orchestration of software
                                  defined service overlay network for
                                  multipath transmission . . . . . . . . . 132--146
             Ali Safa Sadiq and   
               Suleman Khan and   
        Kayhan Zrar Ghafoor and   
             Mohsen Guizani and   
             Seyedali Mirjalili   Transmission power adaption scheme for
                                  improving IoV awareness exploiting:
                                  evaluation weighted matrix based on
                                  piggybacked information  . . . . . . . . 147--159
                    Wei Guo and   
               V. Mahendran and   
          Sridhar Radhakrishnan   Join and spilt TCP for SDN networks:
                                  Architecture, implementation, and
                                  evaluation . . . . . . . . . . . . . . . 160--172
              Mohammed Amer and   
             Anthony Busson and   
 Isabelle Guérin Lassous   Association optimization based on access
                                  fairness for Wi-Fi networks  . . . . . . 173--188


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 138, Number ??, June 19, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                   Quang Do and   
                Ben Martini and   
         Kim-Kwang Raymond Choo   Cyber-physical systems information
                                  gathering: A smart home case study . . . 1--12
           Cristina Alcaraz and   
                Xinyi Huang and   
                     Erich Rome   Security and privacy in cloud-assisted
                                  cyber-physical systems . . . . . . . . . 13--14
             David Hausheer and   
            Oliver Hohlfeld and   
              Stefan Schmid and   
                      Guofei Gu   Security and performance of
                                  software-defined networks and functions
                                  virtualization . . . . . . . . . . . . . 15--17
        Qamas Gul Khan Safi and   
                 Senlin Luo and   
                  Limin Pan and   
               Wangtong Liu and   
            Rasheed Hussain and   
                 Safdar H. Bouk   SVPS: Cloud-based smart vehicle parking
                                  system over ubiquitous VANETs  . . . . . 18--30
               Afraa Attiah and   
      Muhammad Faisal Amjad and   
          Mainak Chatterjee and   
                      Cliff Zou   An evolutionary routing game for energy
                                  balance in Wireless Sensor Networks  . . 31--43
             Ali M. Mahmood and   
             Adil Al-Yasiri and   
                  Omar Y. Alani   Latency reduction by dynamic channel
                                  estimator selection in C-RAN networks
                                  using fuzzy logic  . . . . . . . . . . . 44--56
                 Yantao Liu and   
                  Yasser Morgan   Security against passive attacks on
                                  network coding system --- a survey . . . 57--76
              Jianwei Zhang and   
             Xinchang Zhang and   
                  Chunling Yang   Towards the multi-request mechanism in
                                  pull-based peer-to-peer live streaming
                                  systems  . . . . . . . . . . . . . . . . 77--89
             Karishma Singh and   
                Karan Singh and   
               Le Hoang Son and   
                     Ahmed Aziz   Congestion control in wireless sensor
                                  networks by hybrid multi-objective
                                  optimization algorithm . . . . . . . . . 90--107
                    Lin Cui and   
                Fung Po Tso and   
                     Weijia Jia   Enforcing network policy in
                                  heterogeneous network function box
                                  environment  . . . . . . . . . . . . . . 108--118
Iván García-Magariño and   
 Guillermo Palacios-Navarro and   
            Raquel Lacuesta and   
                   Jaime Lloret   ABSCEV: An agent-based simulation
                                  framework about smart transportation for
                                  reducing waiting times in charging
                                  electric vehicles  . . . . . . . . . . . 119--135
                   O. Arana and   
                  F. Garcia and   
                   J. Gomez and   
                      V. Rangel   MSP: Providing location privacy in WLAN
                                  networks with a MAC Swapping Protocol    136--148
               Xiaofeng Gao and   
                   Tao Chen and   
              Zongchen Chen and   
                    Guihai Chen   NEMO: Novel and efficient multicast
                                  routing schemes for Hybrid Data Center
                                  Networks . . . . . . . . . . . . . . . . 149--163
              Katty Rohoden and   
             Rebeca Estrada and   
                 Hadi Otrok and   
                Zbigniew Dziong   Game theoretical framework for
                                  clustering and resource allocation in
                                  macro-femtocell networks . . . . . . . . 164--176
               Javier Ramos and   
               David Muelas and   
Jorge E. López de Vergara and   
                  Javier Aracil   Estimation of the parameters of
                                  token-buckets in multi-hop environments  177--191
                  Qing Yang and   
                 Yiran Shen and   
              Fengyuan Yang and   
              Jianpei Zhang and   
                  Wanli Xue and   
                    Hongkai Wen   HealCam: Energy-efficient and
                                  privacy-preserving human vital cycles
                                  monitoring on camera-enabled smart
                                  devices  . . . . . . . . . . . . . . . . 192--200
              Shireesh Bhat and   
          George N. Rouskas and   
                     Iyad Katib   On time dependent routing algorithms for
                                  open marketplaces of path services with
                                  support for in-advance path reservation  201--212


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 139, Number ??, July 5, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
           Anand M. Baswade and   
         Touheed Anwar Atif and   
    Bheemarjuna Reddy Tamma and   
                Antony Franklin   A novel coexistence scheme for IEEE
                                  802.11 for user fairness and efficient
                                  spectrum utilization in the presence of
                                  LTE-U  . . . . . . . . . . . . . . . . . 1--18
            Shabnam Shadroo and   
            Amir Masoud Rahmani   Systematic survey of big data and data
                                  mining in Internet of Things . . . . . . 19--47
                     Dan Xu and   
                 Wenli Jiao and   
                 Zhuang Yin and   
               Junjie Huang and   
                   Yao Peng and   
             Xiaojiang Chen and   
                Dingyi Fang and   
                  Zhanyong Tang   Maximizing throughput for low
                                  duty-cycled sensor networks  . . . . . . 48--59
                Masahiro Sasabe   Analysis of optimal piece flow in
                                  tit-for-tat-based P2P streaming  . . . . 60--69
                Lingnan Gao and   
              George N. Rouskas   A spectral clustering approach to
                                  network-aware virtual request
                                  partitioning . . . . . . . . . . . . . . 70--80
               Chenhong Cao and   
                     Yi Gao and   
                   Wei Dong and   
                      Jiajun Bu   Accurate per-link loss tomography in
                                  dynamic sensor networks  . . . . . . . . 81--91
            Kawther Hassine and   
              Mounir Frikha and   
                  Tijani Chahed   Access point backhaul capacity
                                  aggregation as a matching game in the
                                  context of Wireless Local Area Networks  92--108
               Aaqib Khalid and   
                 Tariq Umer and   
      Muhammad Khalil Afzal and   
               Sheraz Anjum and   
               Adnan Sohail and   
            Hafiz Muhammad Asif   Autonomous data driven surveillance and
                                  rectification system using in-vehicle
                                  sensors for intelligent transportation
                                  systems (ITS)  . . . . . . . . . . . . . 109--118
                   Rui Wang and   
              Zhiyong Zhang and   
               Zhiwei Zhang and   
                    Zhiping Jia   ETMRM: An Energy-efficient Trust
                                  Management and Routing Mechanism for
                                  SDWSNs . . . . . . . . . . . . . . . . . 119--135
          Lars Kröhnke and   
               Jelte Jansen and   
                 Harald Vranken   Resilience of the Domain Name System: A
                                  case study of the \tt .nl-domain . . . . 136--150
              Ivano Cerrato and   
               Fulvio Risso and   
         Roberto Bonafiglia and   
         Kostas Pentikousis and   
    Gergely Pongrácz and   
                  Hagen Woesner   COMPOSER: A compact open-source service
                                  platform . . . . . . . . . . . . . . . . 151--174


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 140, Number ??, July 20, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
             Pratima Biswas and   
             Ashok Singh Sairam   Modeling privacy approaches for location
                                  based services . . . . . . . . . . . . . 1--14
      Ahmed Salim Chekkouri and   
      Abdellatif Ezzouhairi and   
                  Samuel Pierre   A new integrated VANET-LTE --- a
                                  architecture for enhanced mobility in
                                  small cells HetNet using dynamic gateway
                                  and traffic forwarding . . . . . . . . . 15--27
                Bruna Peres and   
            Bruno P. Santos and   
      Otavio A. de O. Souza and   
          Olga Goussevskaia and   
        Marcos A. M. Vieira and   
          Luiz F. M. Vieira and   
         Antonio A. F. Loureiro   Matrix: Multihop Address allocation and
                                  dynamic any-To-any Routing for 6LoWPAN   28--40
              Hasmukh Patel and   
              Devesh C. Jinwala   LPM: A lightweight authenticated packet
                                  marking approach for IP traceback  . . . 41--50
         George Koufoudakis and   
     Konstantinos Oikonomou and   
     Konstantinos Giannakis and   
                 Sonia A\"\issa   Probabilistic flooding coverage analysis
                                  for efficient information dissemination
                                  in wireless networks . . . . . . . . . . 51--61
                 Jingyu Hua and   
               Laiping Zhao and   
               Suohao Zhang and   
               Yangyang Liu and   
                     Xin Ge and   
                    Sheng Zhong   Topology-Preserving Traffic Engineering
                                  for Hierarchical Multi-Domain SDN  . . . 62--77
             Bitan Banerjee and   
             Adita Kulkarni and   
                Anand Seetharam   Greedy Caching: An optimized content
                                  placement strategy for
                                  information-centric networks . . . . . . 78--91
                 Guoquan Li and   
                  Ying Zhou and   
                   Tong Bai and   
                Jinzhao Lin and   
                    Yu Pang and   
                     Wei Wu and   
                  Sadia Din and   
                  Gwanggil Jeon   Performance analysis for low-complexity
                                  detection of MIMO V2V communication
                                  systems  . . . . . . . . . . . . . . . . 92--100
     Mohammed Yazid Lyazidi and   
            Nadjib Aitsaadi and   
                    Rami Langar   A dynamic resource allocation framework
                                  in LTE downlink for Cloud-Radio Access
                                  Network  . . . . . . . . . . . . . . . . 101--111
               Adele Lu Jia and   
                  Siqi Shen and   
               Dongsheng Li and   
                 Shengling Chen   Predicting the implicit and the explicit
                                  video popularity in a User Generated
                                  Content site with enhanced social
                                  features . . . . . . . . . . . . . . . . 112--125
       Moustafa M. Nasralla and   
             Manzoor Razaak and   
            Ikram U. Rehman and   
               Maria G. Martini   Content-aware packet scheduling strategy
                                  for medical ultrasound videos over LTE
                                  wireless networks  . . . . . . . . . . . 126--137
             Aneesh M. Koya and   
                  Deepthi P. P.   Anonymous hybrid mutual authentication
                                  and key agreement scheme for wireless
                                  body area network  . . . . . . . . . . . 138--151
Seyyed Naser Seyyed Hashemi and   
                   Ali Bohlooli   Analytical modeling of multi-source
                                  content delivery in information-centric
                                  networks . . . . . . . . . . . . . . . . 152--162
                    Qian He and   
                 Ning Zhang and   
             Yongzhuang Wei and   
                      Yan Zhang   Lightweight attribute based encryption
                                  scheme for mobile cloud assisted
                                  cyber-physical systems . . . . . . . . . 163--173


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 141, Number ??, August 4, 2018

                    Hui Cai and   
                 Yanmin Zhu and   
                Zhenni Feng and   
                 Hongzi Zhu and   
                   Jiadi Yu and   
                       Jian Cao   Truthful incentive mechanisms for mobile
                                  crowd sensing with dynamic smartphones   ii--ii
             Tongxiang Wang and   
               Xianglin Wei and   
                Jianhua Fan and   
                      Tao Liang   Adaptive jammer localization in wireless
                                  networks . . . . . . . . . . . . . . . . 1--16
                      Anonymous   Editorial Board  . . . . . . . . . . . . 1--234
              A. Serdar Tan and   
                   Engin Zeydan   Performance maximization of network
                                  assisted mobile data offloading with
                                  opportunistic Device-to-Device
                                  communications . . . . . . . . . . . . . 17--30
                      Yu Li and   
              Xiaotian Wang and   
               Dae Wook Kim and   
               Junjie Zhang and   
                        Rui Dai   Designing self-destructing wireless
                                  sensors with security and performance
                                  assurance  . . . . . . . . . . . . . . . 31--43
                  Qing Yang and   
                Paolo Gasti and   
             Kiran Balagani and   
                  Yantao Li and   
                      Gang Zhou   USB side-channel attack on Tor . . . . . 44--56
               Ramin Karimi and   
              Saeed Shokrollahi   PGRP: Predictive geographic routing
                                  protocol for VANETs  . . . . . . . . . . 57--66
                 Haibo Wang and   
                  Hongli Xu and   
             Liusheng Huang and   
               Jianxin Wang and   
                     Xuwei Yang   Load-balancing routing in software
                                  defined networks with multiple
                                  controllers  . . . . . . . . . . . . . . 67--81
           Anubhab Banerjee and   
             Bitan Banerjee and   
            Anand Seetharam and   
             Chintha Tellambura   Content search and routing under
                                  custodian unavailability in
                                  information-centric networks . . . . . . 82--91
                  Yuan Yang and   
                     Mingwei Xu   Demand-oblivious routing with planned
                                  link pruning . . . . . . . . . . . . . . 92--101
                   Dali Zhu and   
                 Bobai Zhao and   
                      Siye Wang   Mobile target indoor tracking based on
                                  Multi-Direction Weight Position Kalman
                                  Filter . . . . . . . . . . . . . . . . . 102--114
                 Kyubo Shin and   
                  Hyoil Kim and   
              Se Young Chun and   
                  Donghoon Shin   TVWS assisted performance anomaly
                                  mitigation exploiting spectrum
                                  heterogeneity  . . . . . . . . . . . . . 115--127
                  Cuicui Lv and   
                 Qiang Wang and   
                 Wenjie Yan and   
                         Jia Li   A sparsity feedback-based data gathering
                                  algorithm for Wireless Sensor Networks   128--144
             Morteza Tavana and   
                Ali Rahmati and   
            Vahid Shah-Mansouri   Congestion control with adaptive access
                                  class barring for LTE M2M overload using
                                  Kalman filters . . . . . . . . . . . . . 145--156
         Georgios Tsoumanis and   
     Konstantinos Oikonomou and   
         George Koufoudakis and   
                 Sonia A\"\issa   Energy-efficient sink placement in
                                  wireless sensor networks . . . . . . . . 157--165
                  Zhuo Wang and   
              Xiaoning Feng and   
               Guangjie Han and   
               Yancheng Sui and   
                     Hongde Qin   EODL: Energy Optimized Distributed
                                  Localization Method in three-dimensional
                                  underwater acoustic sensors networks . . 166--178
                     Chi Xu and   
                Chunhe Song and   
                  Peng Zeng and   
                      Haibin Yu   Secure resource allocation for energy
                                  harvesting cognitive radio sensor
                                  networks without and with cooperative
                                  jamming  . . . . . . . . . . . . . . . . 179--188
                 Heyuan Shi and   
                 Xibin Zhao and   
                    Hai Wan and   
                Huihui Wang and   
                  Jian Dong and   
                   Kun Tang and   
                     Anfeng Liu   Multi-model induced network for
                                  participatory-sensing-based
                                  classification tasks in intelligent and
                                  connected transportation systems . . . . 199--221
      Djamel Eddine Kouicem and   
    Abdelmadjid Bouabdallah and   
                 Hicham Lakhlef   Internet of Things security: a top-down
                                  survey . . . . . . . . . . . . . . . . . 222--233


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 142, Number ??, September 4, 2018

            Kamal Adli Mehr and   
          Javad Musevi Niya and   
                      Nail Akar   Queue management for two-user cognitive
                                  radio with delay-constrained primary
                                  user . . . . . . . . . . . . . . . . . . ii--ii
               Andrea Detti and   
          Lorenzo Bracciale and   
           Pierpaolo Loreti and   
               Giulio Rossi and   
         Nicola Blefari Melazzi   A cluster-based scalable router for
                                  information centric networks . . . . . . 1--12
                      Anonymous   Editorial Board  . . . . . . . . . . . . 1--290
        Saifur Rahman Sabuj and   
              Masanori Hamamura   Two-slope path-loss design of energy
                                  harvesting in random cognitive radio
                                  networks . . . . . . . . . . . . . . . . 13--23
             Dilara Akdogan and   
      Duygu Karaoglan Altop and   
          Laleh Eskandarian and   
                    Albert Levi   Secure key agreement protocols: Pure
                                  biometrics and cancelable biometrics . . 24--32
          Ram Narayan Yadav and   
                    Rajiv Misra   Approximating the largest connected
                                  topology in cognitive radio networks . . 33--48
     Mahya Mohammadi Golchi and   
               Homayun Motameni   Evaluation of the improved particle
                                  swarm optimization algorithm efficiency
                                  inward peer to peer video streaming  . . 49--63
        Ali Safari Khatouni and   
        Marco Ajmone Marsan and   
               Marco Mellia and   
                    Reza Rejaie   Deadline-constrained content upload from
                                  multihomed devices: Formulations and
                                  algorithms . . . . . . . . . . . . . . . 64--75
                 Meihui Gao and   
          Bernardetta Addis and   
              Mathieu Bouet and   
                  Stefano Secci   Optimal orchestration of virtual network
                                  functions  . . . . . . . . . . . . . . . 76--92
          Sourav Kumar Bhoi and   
              Deepak Puthal and   
       Pabitra Mohan Khilar and   
    Joel J. P. C. Rodrigues and   
        Sanjaya Kumar Panda and   
               Laurence T. Yang   Adaptive routing protocol for urban
                                  vehicular networks to support sellers
                                  and buyers on wheels . . . . . . . . . . 93--107
                Malak Sadik and   
              Nadine Akkari and   
               Ghadah Aldabbagh   SDN-based handover scheme for multi-tier
                                  LTE/Femto and D2D networks . . . . . . . 108--127
            Reem E. Mohamed and   
            Walid R. Ghanem and   
            Abeer T. Khalil and   
           Mohamed Elhoseny and   
            Muhammad Sajjad and   
             Mohamed A. Mohamed   Energy efficient collaborative proactive
                                  routing protocol for Wireless Sensor
                                  Network  . . . . . . . . . . . . . . . . 128--141
                  Weiwei Li and   
             Petros Spachos and   
              Mark Chignell and   
        Alberto Leon-Garcia and   
             Leon Zucherman and   
                      Jie Jiang   A quantitative relationship between
                                  Application Performance Metrics and
                                  Quality of Experience for Over-The-Top
                                  video  . . . . . . . . . . . . . . . . . 142--153
               Salma Bradai and   
           Sofien Khemakhem and   
                 Mohamed Jmaiel   Real-time and energy aware opportunistic
                                  mobile crowdsensing framework based on
                                  people's connectivity habits . . . . . . 154--167
                  Zhetao Li and   
                  YuXin Liu and   
                    Ming Ma and   
                 Anfeng Liu and   
              Xiaozhi Zhang and   
                   Gungming Luo   MSDG: a novel green data gathering
                                  scheme for wireless sensor networks  . . 179--193
Rubén Rumipamba-Zambrano and   
       Jordi Perelló and   
        Joan M. Gené and   
              Salvatore Spadaro   On the scalability of dynamic
                                  Flex-Grid/SDM optical core networks  . . 194--207
              Samoda Gamage and   
              Jamil Y. Khan and   
                     Duy T. Ngo   Adaptive resource allocation with
                                  traffic peak duration prediction and
                                  admission control for cognitive Wi-Fi
                                  networks . . . . . . . . . . . . . . . . 208--222
               Sheneela Naz and   
        Rao Naveed Bin Rais and   
            Peer Azmat Shah and   
               Sadaf Yasmin and   
                Amir Qayyum and   
               Seungmin Rho and   
                   Yunyoung Nam   A dynamic caching strategy for CCN-based
                                  MANETs . . . . . . . . . . . . . . . . . 223--239
                 Wenbo Zhao and   
                Xueyan Tang and   
                      Luping Xu   Constructing routing structures for
                                  sensor data collection with dynamic
                                  traffic patterns . . . . . . . . . . . . 240--252
                 Fanzi Zeng and   
                 Jisheng Xu and   
                Yongfeng Li and   
                    Kang Li and   
                       Lei Jiao   Performance analysis of underlay two-way
                                  relay cooperation in cognitive radio
                                  networks with energy harvesting  . . . . 253--271
               Shenghong Li and   
                     Wei Ni and   
           Chang Kyung Sung and   
                    Mark Hedley   Recent advances on cooperative wireless
                                  localization and their application in
                                  inhomogeneous propagation environments   272--290


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 143, Number ??, October 9, 2018

                 Junfeng Li and   
                     Dan Li and   
                  Yirong Yu and   
                Yukai Huang and   
                   Jing Zhu and   
                    Jinkun Geng   Towards full virtualization of SDN
                                  infrastructure . . . . . . . . . . . . . ii--ii
                 Zichuan Xu and   
                Weifa Liang and   
                 Alex Galis and   
                      Yu Ma and   
                 Qiufen Xia and   
                    Wenzheng Xu   Throughput optimization for admitting
                                  NFV-enabled requests in cloud networks   1--14
                      Anonymous   Editorial Board  . . . . . . . . . . . . 1--288
               Pengchao Han and   
                  Yejun Liu and   
                        Lei Guo   QoS satisfaction aware and network
                                  reconfiguration enabled resource
                                  allocation for virtual network embedding
                                  in Fiber--Wireless access network  . . . 15--29
                 Weibin Xie and   
                  Fang Wang and   
                   Dan Feng and   
             Lingling Zhang and   
                Tingwei Zhu and   
                     Qingyu Shi   Host-based scheduling: Achieving
                                  near-optimal transport for datacenter
                                  networks . . . . . . . . . . . . . . . . 30--48
            Gokhan Sagirlar and   
          Barbara Carminati and   
                  Elena Ferrari   Decentralizing privacy enforcement for
                                  Internet of Things smart objects . . . . 49--61
               Junchao Wang and   
                Kaining Han and   
    Anastasios Alexandridis and   
               Zeljko Zilic and   
                    Yu Pang and   
                     Wei Wu and   
                  Sadia Din and   
                  Gwanggil Jeon   A novel security scheme for Body Area
                                  Networks compatible with smart vehicles  62--73
           Joaquim Ferreira and   
              Muhammad Alam and   
            Bruno Fernandes and   
                 Luis Silva and   
        João Almeida and   
                 Lara Moura and   
                  Rui Costa and   
            Giovanni Iovino and   
               Elena Cordiviola   Cooperative sensing for improved traffic
                                  efficiency: the highway field trial  . . 74--81
                 Sijia Chen and   
                   Bin Song and   
                    Jie Guo and   
              Yanling Zhang and   
               Xiaojiang Du and   
                 Mohsen Guizani   FPAN: Fine-grained and progressive
                                  attention localization network for data
                                  retrieval  . . . . . . . . . . . . . . . 82--97
         Khalil Al-Hussaeni and   
        Benjamin C. M. Fung and   
             Farkhund Iqbal and   
             Gaby G. Dagher and   
                    Eun G. Park   SafePath: Differentially-private
                                  publishing of passenger trajectories in
                                  transportation systems . . . . . . . . . 98--111
                  P. A. Baziana   Exploring the optimum number of
                                  receivers per station in WDM networks    112--125
            Claudia Campolo and   
         Antonella Molinaro and   
                   Antonio Iera   A reference framework for
                                  social-enhanced Vehicle-to-Everything
                                  communications in 5G scenarios . . . . . 126--139
      Gagangeet Singh Aujla and   
               Anish Jindal and   
                   Neeraj Kumar   EVaaS: Electric vehicle-as-a-service for
                                  energy trading in SDN-enabled smart
                                  transportation system  . . . . . . . . . 140--152
                    Ming Li and   
                 Dejun Yang and   
                   Jian Lin and   
                    Ming Li and   
                      Jian Tang   SpecWatch: a framework for adversarial
                                  spectrum monitoring with unknown
                                  statistics . . . . . . . . . . . . . . . 153--165
                   Chen Liu and   
                Dingyi Fang and   
                     Yue Hu and   
             Shensheng Tang and   
                     Dan Xu and   
                    Wen Cui and   
             Xiaojiang Chen and   
                Baoying Liu and   
               Guangquan Xu and   
                       Hao Chen   EasyGo: Low-cost and robust geographic
                                  opportunistic sensing routing in a strip
                                  topology wireless sensor network . . . . 166--175
                     Jie Li and   
               Xingwei Wang and   
                      Min Huang   SVDR: a scalable virtual domain-based
                                  routing scheme for CCN . . . . . . . . . 176--190
                Faisal Riaz and   
               Sania Khadim and   
                 Rabia Rauf and   
             Mudassar Ahmad and   
              Sohail Jabbar and   
                Junaid Chaudhry   A validated fuzzy logic inspired driver
                                  distraction evaluation system for road
                                  safety using artificial human driver
                                  emotion  . . . . . . . . . . . . . . . . 191--205
            Mustapha Khiati and   
                Djamel Djenouri   Adaptive learning-enforced broadcast
                                  policy for solar energy harvesting
                                  wireless sensor networks . . . . . . . . 206--220
               Haibin Zhang and   
                 Jiajia Liu and   
                   Ai-Chun Pang   A Bayesian network model for data losses
                                  and faults in medical body sensor
                                  networks . . . . . . . . . . . . . . . . 221--246
    Vijayalakshmi Murugesan and   
    Mercy Shalinie Selvaraj and   
                 Ming-Hour Yang   HPSIPT: a high-precision single-packet
                                  IP traceback scheme  . . . . . . . . . . 263--274
                 Ola Salman and   
                Imad Elhajj and   
                 Ali Chehab and   
                   Ayman Kayssi   IoT survey: an SDN and fog computing
                                  perspective  . . . . . . . . . . . . . . 275--288


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 144, Number ??, October 24, 2018

                Tim Strayer and   
              Samuel Nelson and   
                Amando Caro and   
                Joud Khoury and   
              Bryan Tedesco and   
              Olivia DeRosa and   
              Carsten Clark and   
              Kolia Sadeghi and   
           Michael Matthews and   
                Jake Kurzer and   
           Philip Lundrigan and   
              Vikas Kawadia and   
               Dorene Ryder and   
              Keith Gremban and   
                    Wayne Phoel   Content sharing with mobility in an
                                  infrastructure-less environment  . . . . ii--ii
                    Xi Chen and   
              Chuanhe Huang and   
                 Xiying Fan and   
                     Di Liu and   
                        Peng Li   LDMAC: a propagation delay-aware MAC
                                  scheme for long-distance UAV networks    1--16
                      Anonymous   Editorial Board  . . . . . . . . . . . . 1--296
               Fatma Karray and   
            Mohamed W. Jmal and   
       Alberto Garcia-Ortiz and   
               Mohamed Abid and   
           Abdulfattah M. Obeid   A comprehensive survey on wireless
                                  sensor node hardware platforms . . . . . 17--39
        Bahare M. Khorsandi and   
                Carla Raffaelli   BBU location algorithms for survivable
                                  5G C-RAN over WDM  . . . . . . . . . . . 40--52
               Jung-Han Han and   
                  Seung-Jae Han   Non-intrusive estimation of available
                                  throughput for IEEE 802.11 link  . . . . 53--63
                   Lei Wang and   
                    Qing Li and   
            Richard Sinnott and   
                 Yong Jiang and   
                    Jianping Wu   An intelligent rule management scheme
                                  for Software Defined Networking  . . . . 64--76
             Tamer Aldwairi and   
              Dilina Perera and   
                Mark A. Novotny   An evaluation of the performance of
                                  Restricted Boltzmann Machines as a model
                                  for anomaly network intrusion detection  77--88
            Hadi Habibzadeh and   
               Tolga Soyata and   
             Burak Kantarci and   
         Azzedine Boukerche and   
                     Cem Kaptan   Sensing, communication and security
                                  planes: a new challenge for a smart city
                                  system design  . . . . . . . . . . . . . 89--110
         Mikhail Zolotukhin and   
          Alexander Sayenko and   
 Timo Hämäläinen   On optimal deployment of low power nodes
                                  for high frequency next generation
                                  wireless systems . . . . . . . . . . . . 111--119
              Sohail Sarang and   
           Micheal Drieberg and   
                Azlan Awang and   
                   Rizwan Ahmad   A QoS MAC protocol for prioritized data
                                  in energy harvesting wireless sensor
                                  networks . . . . . . . . . . . . . . . . 120--140
          Natthanan Promsuk and   
Attaphongse Taparugssanagorn and   
             Johanna Vartiainen   Probability of false alarm based
                                  interference suppression methods in
                                  Internet of Things (IoT) systems . . . . 141--153
    Priyan Malarvizhi Kumar and   
                Usha Devi G and   
      Gunasekaran Manogaran and   
       Revathi Sundarasekar and   
         Naveen Chilamkurti and   
      Ramachandran Varatharajan   Ant colony optimization algorithm with
                                  Internet of Vehicles for intelligent
                                  traffic control system . . . . . . . . . 163--200
          Simon Yusuf Enoch and   
                Mengmeng Ge and   
                Jin B. Hong and   
                Hani Alzaid and   
                 Dong Seong Kim   A systematic evaluation of cybersecurity
                                  metrics for dynamic networks . . . . . . 201--215
               Chun-Chih Lo and   
                  Yau-Hwang Kuo   A geo-temporal mobility prediction
                                  method for cooperative
                                  time-validity-constrained content
                                  delivery in opportunistic networks . . . 216--229
           Sadananda Behera and   
              Jithin George and   
                     Goutam Das   Effect of transmission impairments in
                                  CO-OFDM based Elastic Optical Network
                                  design . . . . . . . . . . . . . . . . . 230--241
            Fawaz AL-Hazemi and   
                Yuyang Peng and   
             Chan-Hyun Youn and   
              Josip Lorincz and   
                    Chao Li and   
                   Guo Song and   
                  Raouf Boutaba   Dynamic allocation of power delivery
                                  paths in consolidated data centers based
                                  on adaptive UPS switching  . . . . . . . 242--253
Julian Andres Caicedo-Muñoz and   
     Agapito Ledezma Espino and   
       Juan Carlos Corrales and   
           Alvaro Rendón   QoS-Classifier for VPN and Non-VPN
                                  traffic based on time-related features   254--270
                  Yuhang Ye and   
                  Brian Lee and   
                Ronan Flynn and   
               Niall Murray and   
               Guiming Fang and   
                Jianwen Cao and   
                  Yuansong Qiao   PTP: Path-specified transport protocol
                                  for concurrent multipath transmission in
                                  named data networks  . . . . . . . . . . 271--279
           Alem Colakovi\'c and   
              Mesud Hadziali\'c   Internet of Things (IoT): a review of
                                  enabling technologies, challenges, and
                                  open research issues . . . . . . . . . . 280--296


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 145, Number ??, November 9, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
               Jonas Hansen and   
            Jeppe Krigslund and   
           Daniel E. Lucani and   
           Peyman Pahlevani and   
             Frank H. P. Fitzek   Bridging inter-flow and intra-flow
                                  network coding in wireless mesh
                                  networks: From theory to implementation  1--12
    Carles Angl\`es-Tafalla and   
      Jordi Castell\`a-Roca and   
     Maci\`a Mut-Puigserver and   
M. Magdalena Payeras-Capell\`a and   
                Alexandre Viejo   Secure and privacy-preserving
                                  lightweight access control system for
                                  low emission zones . . . . . . . . . . . 13--26
                   G. Reali and   
              M. Femminella and   
                   E. Nunzi and   
                    D. Valocchi   Genomics as a service: a joint computing
                                  and networking perspective . . . . . . . 27--51
              Adel Abusitta and   
          Martine Bellaiche and   
                Michel Dagenais   On trustworthy federated clouds: a
                                  coalitional game approach  . . . . . . . 52--63
                 I-Fen Chao and   
                 Chain-Hung Lee   AWG-based WDM ring networks:
                                  High-performance and low-cost system
                                  designs  . . . . . . . . . . . . . . . . 64--75
                Won-Suk Kim and   
                 Sang-Hwa Chung   User incentive model and its
                                  optimization scheme in
                                  user-participatory fog computing
                                  environment  . . . . . . . . . . . . . . 76--88
                   Mohamed Saad   Non-isotonic routing metrics solvable to
                                  optimality via shortest path . . . . . . 89--95
                  Fahed H. Awad   Optimization of relay node deployment
                                  for multisource multipath routing in
                                  Wireless Multimedia Sensor Networks
                                  using Gaussian distribution  . . . . . . 96--106
                     Tao Wu and   
               Panlong Yang and   
                Haipeng Dai and   
                    Ping Li and   
                    Xunpeng Rao   Near optimal bounded route association
                                  for drone-enabled rechargeable WSNs  . . 107--117
                 Koki Inoue and   
          Shin'ichi Arakawa and   
               Satoshi Imai and   
              Toru Katagiri and   
                Masayuki Murata   Noise-induced VNE method for
                                  software-defined infrastructure with
                                  uncertain delay behaviors  . . . . . . . 118--127
             Iftikhar Ahmad and   
            Rafidah Md Noor and   
              Ismail Ahmedy and   
        Syed Adeel Ali Shah and   
               Ibrar Yaqoob and   
                 Ejaz Ahmed and   
                 Muhammad Imran   VANET-LTE based heterogeneous vehicular
                                  clustering for driving assistance and
                                  route planning applications  . . . . . . 128--140
       Fatima Zohra Bousbaa and   
          Nasreddine Lagraa and   
  Chaker Abdelaziz Kerrache and   
                   Fen Zhou and   
     Mohamed Bachir Yagoubi and   
                Rasheed Hussain   A distributed time-limited multicast
                                  algorithm for VANETs using incremental
                                  power strategy . . . . . . . . . . . . . 141--155
                  Chuan Zhu and   
              Kangning Quan and   
               Guangjie Han and   
        Joel J. P. C. Rodrigues   A high-available and location predictive
                                  data gathering scheme with mobile sinks
                                  for wireless sensor networks . . . . . . 156--164
                Xiaoyun Yan and   
                  Ping Dong and   
               Xiaojiang Du and   
                  Tao Zheng and   
                 Jianan Sun and   
                 Mohsen Guizani   Improving flow delivery with link
                                  available time prediction in
                                  software-defined high-speed vehicular
                                  networks . . . . . . . . . . . . . . . . 165--174
               Chun-Yu Wang and   
                Chi-Lung Ou and   
                Yu-En Zhang and   
               Feng-Min Cho and   
               Pin-Hao Chen and   
             Jyh-Biau Chang and   
                  Ce-Kuen Shieh   BotCluster: a session-based P2P botnet
                                  clustering system on NetFlow . . . . . . 175--189
         Sunder Ali Khowaja and   
         Aria Ghora Prabono and   
              Feri Setiawan and   
     Bernardo Nugroho Yahya and   
                 Seok-Lyong Lee   Contextual activity based Healthcare
                                  Internet of Things, Services, and People
                                  (HIoTSP): an architectural framework for
                                  healthcare monitoring using wearable
                                  sensors  . . . . . . . . . . . . . . . . 190--206
         Ismaeel Al Ridhawi and   
            Moayad Aloqaily and   
             Burak Kantarci and   
             Yaser Jararweh and   
             Hussein T. Mouftah   A continuous diversified vehicular cloud
                                  service availability framework for smart
                                  cities . . . . . . . . . . . . . . . . . 207--218
           Madhusudan Singh and   
                      Shiho Kim   Branch based blockchain technology in
                                  intelligent vehicle  . . . . . . . . . . 219--231
                   Xin Chen and   
             Guoqiang Zhang and   
                   Qian Gao and   
                     Huajun Cui   Improving NDN forwarding engine
                                  performance by rendezvous-based caching
                                  and forwarding . . . . . . . . . . . . . 232--242
             Alassane Samba and   
                Yann Busnel and   
              Alberto Blanc and   
             Philippe Dooze and   
                  Gwendal Simon   Predicting file downloading time in
                                  cellular network: Large-scale analysis
                                  of machine learning approaches . . . . . 243--254
     Oluwatosin Ahmed Amodu and   
                 Mohamed Othman   Machine-to-Machine Communication: an
                                  Overview of Opportunities  . . . . . . . 255--276


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 146, Number ??, December 9, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
   Israel L. C. Vasconcelos and   
            Ivan C. Martins and   
    Carlos M. S. Figueiredo and   
             Andre L. L. Aquino   A data sample algorithm applied to
                                  wireless sensor network with disruptive
                                  connections  . . . . . . . . . . . . . . 1--11
  Diego Cruz Abrahão and   
Flávio Henrique Teles Vieira   Scheduling algorithm for the LTE
                                  downlink with F-OFDM using adaptive
                                  multifractal envelope process and
                                  minimum service curve  . . . . . . . . . 12--32
          Farzad Tashtarian and   
           Alireza Erfanian and   
                  Amir Varasteh   $S$2VC: an SDN-based framework for
                                  maximizing QoE in SVC-based HTTP
                                  adaptive streaming . . . . . . . . . . . 33--46
Behrouz Shahgholi Ghahfarokhi and   
          Maryam Azadmanesh and   
       Samaneh Khadem Khorasani   Energy and spectrum efficient
                                  mobility-aware resource management for
                                  D2D multicasting . . . . . . . . . . . . 47--64
          Massimo Condoluci and   
                Toktam Mahmoodi   Softwarization and virtualization in 5G
                                  mobile networks: Benefits, trends and
                                  challenges . . . . . . . . . . . . . . . 65--84
                 Jain-Shing Liu   Joint downlink resource allocation in
                                  LTE-Advanced heterogeneous networks  . . 85--103
               Chuanwen Luo and   
                   Jiguo Yu and   
                  Deying Li and   
              Honglong Chen and   
                    Yi Hong and   
                        Lina Ni   A novel distributed algorithm for
                                  constructing virtual backbones in
                                  wireless sensor networks . . . . . . . . 104--114
           Yoshinobu Yamada and   
           Ryoichi Shinkuma and   
              Takanori Iwai and   
               Takeo Onishi and   
          Takahiro Nobukiyo and   
                    Kozo Satoda   Temporal traffic smoothing for IoT
                                  traffic in mobile networks . . . . . . . 115--124
                Jack Kirton and   
           Matthew Bradbury and   
                  Arshad Jhumka   Towards optimal source location
                                  privacy-aware TDMA schedules in wireless
                                  sensor networks  . . . . . . . . . . . . 125--137
                   Lun Tang and   
                Guofan Zhao and   
              Chenmeng Wang and   
                Peipei Zhao and   
                   Qianbin Chen   Queue-aware reliable embedding algorithm
                                  for 5G network slicing . . . . . . . . . 138--150
                Tarek Gaber and   
           Sarah Abdelwahab and   
           Mohamed Elhoseny and   
           Aboul Ella Hassanien   Trust-based secure clustering in
                                  WSN-based intelligent transportation
                                  systems  . . . . . . . . . . . . . . . . 151--158
                   Hao Yang and   
                     Xiwei Wang   ECO CS: Energy consumption optimized
                                  compressive sensing in group sensor
                                  networks . . . . . . . . . . . . . . . . 159--166
            Piotr Lechowicz and   
        Krzysztof Walkowiak and   
            Miroslaw Klinkowski   Greedy randomized adaptive search
                                  procedure for joint optimization of
                                  unicast and anycast traffic in
                                  spectrally-spatially flexible optical
                                  networks . . . . . . . . . . . . . . . . 167--182
                     Dan Xu and   
                 Wenli Jiao and   
                 Zhuang Yin and   
                     Bin Wu and   
                   Yao Peng and   
             Xiaojiang Chen and   
                  Feng Chen and   
                    Dingyi Fang   Enabling robust and reliable
                                  transmission in Internet of Things with
                                  multiple gateways  . . . . . . . . . . . 183--199
                    Gewu Bu and   
           Maria Potop-Butucaru   FIFO order reliable convergecast in WBAN 200--216
                   Peng Sun and   
             Azzedine Boukerche   Performance modeling and analysis of a
                                  UAV path planning and target detection
                                  in a UAV-based wireless sensor network   217--231
            Khaled Almi'ani and   
            Young Choon Lee and   
                   Bernard Mans   On efficient resource use for scientific
                                  workflows in clouds  . . . . . . . . . . 232--242


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 147, Number ??, December 24, 2018

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                   Lei Wang and   
                    Qing Li and   
                 Yong Jiang and   
                   Xuya Jia and   
                    Jianping Wu   Woodpecker: Detecting and mitigating
                                  link-flooding attacks via SDN  . . . . . 1--13
                Yongwook Ra and   
        June-Koo Kevin Rhee and   
              Junseong Bang and   
                     Yunjoo Kim   Photonic-Frame-Based TCP proxy
                                  architecture in optically interconnected
                                  data center networks . . . . . . . . . . 14--26
             Prabhat Thakur and   
                 Alok Kumar and   
                  S. Pandit and   
                   G. Singh and   
                 S. N. Satashia   Analysis of high-traffic cognitive radio
                                  network with imperfect spectrum
                                  monitoring technique . . . . . . . . . . 27--37
              Jianhua Huang and   
                Danwei Ruan and   
                  Weiqiang Meng   An annulus sector grid aided
                                  energy-efficient multi-hop routing
                                  protocol for wireless sensor networks    38--48
                    Yu Zhao and   
                Yunhuai Liu and   
                Tingting Yu and   
                    Tian He and   
                      Chen Qian   FREDI: Robust RSS-based ranging with
                                  multipath effect and radio interference  49--63
              Xiaodong Wang and   
                    Ye Tian and   
                   Min Zhao and   
               Mingzheng Li and   
                    Lei Mei and   
                  Xinming Zhang   PNPL: Simplifying programming for
                                  protocol-oblivious SDN networks  . . . . 64--80
         Sylvie Delaët and   
               Shlomi Dolev and   
             Daniel Khankin and   
             Shimrit Tzur-David   Make&activate-before-break for seamless
                                  SDN route updates  . . . . . . . . . . . 81--97
                     Kai Bu and   
                 Kaiwen Zhu and   
                   Yi Zheng and   
              Yuanyuan Yang and   
                Yutian Yang and   
                  Linfeng Cheng   Fastlane-ing more flows with less
                                  bandwidth for software-defined
                                  networking . . . . . . . . . . . . . . . 98--111
                Nils Dorsch and   
               Fabian Kurtz and   
             Christian Wietfeld   Enabling hard service guarantees in
                                  Software-Defined Smart Grid
                                  infrastructures  . . . . . . . . . . . . 112--131
               Luigi Atzori and   
          Alessandro Floris and   
              Roberto Girau and   
              Michele Nitti and   
                   Giovanni Pau   Towards the implementation of the Social
                                  Internet of Vehicles . . . . . . . . . . 132--145
        Slawomir Hanczewski and   
             Maciej Stasiak and   
             Joanna Weissenberg   Queueing model of a multi-service system
                                  with elastic and adaptive traffic  . . . 146--161
              Chedia Jarray and   
          Anastasios Giovanidis   Successful file transmission in mobile
                                  D2D networks with caches . . . . . . . . 162--179
          Abolfazl Hajisami and   
                  Dario Pompili   Cloud-BSS: Joint intra- and
                                  inter-cluster interference cancellation
                                  in uplink 5G cellular networks . . . . . 180--190
                  A. Grassi and   
                    G. Piro and   
                  G. Boggia and   
                  M. Kurras and   
                  W. Zirwas and   
        R. SivaSiva Ganesan and   
                K. Pedersen and   
                      L. Thiele   Massive MIMO interference coordination
                                  for 5G broadband access: Integration and
                                  system level study . . . . . . . . . . . 191--203
               Itamar Cohen and   
               Gabriel Scalosub   Queueing in the mist: Buffering and
                                  scheduling with limited knowledge  . . . 204--220
           Maroua Ben Attia and   
            Kim-Khoa Nguyen and   
                Mohamed Cheriet   QoS-aware software-defined routing in
                                  smart community network  . . . . . . . . 221--235
                Xiaoqian Li and   
                  Kwan L. Yeung   Bandwidth-efficient network monitoring
                                  algorithms based on segment routing  . . 236--245
     Muhammad Jawad Khokhar and   
       Nawfal Abbassi Saber and   
         Thierry Spetebroot and   
                  Chadi Barakat   An intelligent sampling framework for
                                  controlled experimentation and QoE
                                  modeling . . . . . . . . . . . . . . . . 246--261
             I. F. Akyildiz and   
                     A. Kak and   
                  E. Khorov and   
                A. Krasilov and   
                      A. Kureev   ARBAT: a flexible network architecture
                                  for QoE-aware communications in 5G
                                  systems  . . . . . . . . . . . . . . . . 262--279


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 148, Number ??, January 15, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
            Ian F. Akyildiz and   
                Harry Rudin and   
               Burkhard Stiller   Computer Networks (COMNET) Editorial for
                                  2018 . . . . . . . . . . . . . . . . . . iii--iv
              Hailong Huang and   
           Andrey V. Savkin and   
                  Ming Ding and   
                     Chao Huang   Mobile robots in wireless sensor
                                  networks: a survey on tasks  . . . . . . 1--19
               Jaehyun Park and   
                  Jaehee Ha and   
       Brent Byunghoon Kang and   
                  Myungchul Kim   MoHoP: a protocol providing for both
                                  mobility management and host privacy . . 20--33
                Yazhou Yuan and   
                Xiaoqin Sun and   
                 Zhixin Liu and   
                 Yuefeng Li and   
                   Xinping Guan   Approach of personnel location in
                                  roadway environment based on
                                  multi-sensor fusion and activity
                                  classification . . . . . . . . . . . . . 34--45
               Yanling Shao and   
                 Chunlin Li and   
                 Hengliang Tang   A data replica placement strategy for
                                  IoT workflows in collaborative edge and
                                  cloud environments . . . . . . . . . . . 46--59
        Konrad-Felix Krentz and   
               Christoph Meinel   Denial-of-sleep defenses for IEEE
                                  802.15.4 coordinated sampled listening
                                  (CSL)  . . . . . . . . . . . . . . . . . 60--71
                    Chi Lin and   
                     Yu Sun and   
                   Kai Wang and   
               Zhunyue Chen and   
                      Bo Xu and   
                      Guowei Wu   Double warning thresholds for preemptive
                                  charging scheduling in Wireless
                                  Rechargeable Sensor Networks . . . . . . 72--87
Rafael B. R. Lourenço and   
      Gustavo B. Figueiredo and   
          Massimo Tornatore and   
            Biswanath Mukherjee   Data evacuation from data centers in
                                  disaster-affected regions through
                                  software-defined satellite networks  . . 88--100
             Huansheng Ning and   
                 Feifei Shi and   
                    Tao Zhu and   
                Qingjuan Li and   
                    Liming Chen   A novel ontology consistent with
                                  acknowledged standards in smart homes    101--107
         Yannick Léo and   
       Christophe Crespelle and   
                    Eric Fleury   Non-altering time scales for aggregation
                                  of dynamic networks into series of
                                  graphs . . . . . . . . . . . . . . . . . 108--119
                  Yuan Chai and   
                  Xiao-Jun Zeng   Regional condition-aware hybrid routing
                                  protocol for hybrid wireless mesh
                                  network  . . . . . . . . . . . . . . . . 120--128
            Thi-Minh Nguyen and   
              Michel Minoux and   
                    Serge Fdida   Optimizing resource utilization in NFV
                                  dynamic systems: New exact and heuristic
                                  approaches . . . . . . . . . . . . . . . 129--141
                   Hao Wang and   
               Guangjie Han and   
                  Lina Zhou and   
           James Adu Ansere and   
                    Wenbo Zhang   A source location privacy protection
                                  scheme based on ring-loop routing for
                                  the IoT  . . . . . . . . . . . . . . . . 142--150
    Mojtaba Ghermezcheshmeh and   
        Vahid Shah-Mansouri and   
              Mohammad Ghanbari   Analysis and performance evaluation of
                                  scalable video coding over heterogeneous
                                  cellular networks  . . . . . . . . . . . 151--163
                  Fadi Salo and   
             Ali Bou Nassif and   
               Aleksander Essex   Dimensionality reduction with IG-PCA and
                                  ensemble classifier for network
                                  intrusion detection  . . . . . . . . . . 164--175
           Francesco Marino and   
              Corrado Moiso and   
                Matteo Petracca   Automatic contract negotiation, service
                                  discovery and mutual authentication
                                  solutions: a survey on the enabling
                                  technologies of the forthcoming IoT
                                  ecosystems . . . . . . . . . . . . . . . 176--195
              Marko Kompara and   
           SK Hafizul Islam and   
               Marko Hölbl   A robust and efficient mutual
                                  authentication and key agreement scheme
                                  with untraceability for WBANs  . . . . . 196--213
                Abdul Wahid and   
             Humera Yasmeen and   
             Munam Ali Shah and   
                Masoom Alam and   
            Sayed Chhattan Shah   Holistic approach for coupling privacy
                                  with safety in VANETs  . . . . . . . . . 214--230
                     Cun Ji and   
                  Chao Zhao and   
                 Shijun Liu and   
              Chenglei Yang and   
                     Li Pan and   
                     Lei Wu and   
                   Xiangxu Meng   A fast shapelet selection algorithm for
                                  time series classification . . . . . . . 231--240
           Parvaneh Asghari and   
        Amir Masoud Rahmani and   
        Hamid Haj Seyyed Javadi   Internet of Things applications: a
                                  systematic review  . . . . . . . . . . . 241--261
              Neda Petreska and   
         Hussein Al-Zubaidy and   
                 Rudi Knorr and   
                    James Gross   Bound-based power optimization for
                                  multi-hop heterogeneous wireless
                                  industrial networks under statistical
                                  delay constraints  . . . . . . . . . . . 262--279
          Matthias Schunter and   
                  Andreas Wespi   Editorial: Special issue on IoT security
                                  and privacy  . . . . . . . . . . . . . . 280--282
Mardiana binti Mohamad Noor and   
             Wan Haslina Hassan   Current research on Internet of Things
                                  (IoT) security: a survey . . . . . . . . 283--294
                Jianwei Hou and   
                  Leilei Qu and   
                   Wenchang Shi   A survey on Internet of Things security
                                  from data perspectives . . . . . . . . . 295--306
                 Zheng Zhou and   
              Weiming Zhang and   
                Shangbin Li and   
                     Nenghai Yu   Potential risk of IoT device supporting
                                  IR remote control  . . . . . . . . . . . 307--317
                   Kai Yang and   
                   Qiang Li and   
                      Limin Sun   Towards automatic fingerprinting of IoT
                                  devices in the cyberspace  . . . . . . . 318--327
          Mohamed Eldefrawy and   
               Ismail Butun and   
               Nuno Pereira and   
                 Mikael Gidlund   Formal security analysis of LoRaWAN  . . 328--339
                Yi-Ning Liu and   
              Yan-Ping Wang and   
              Xiao-Fen Wang and   
                    Zhe Xia and   
                   Jing-Fang Xu   Privacy-preserving raw data collection
                                  without a trusted authority for IoT  . . 340--348
                 Yuxian Liu and   
               Shaohua Tang and   
                Hao-Tian Wu and   
                  Xinglin Zhang   RTPT: a framework for real-time
                                  privacy-preserving truth discovery on
                                  crowdsensed data streams . . . . . . . . 349--360
              Umair Sarfraz and   
                Masoom Alam and   
           Sherali Zeadally and   
                      Abid Khan   Privacy aware IOTA ledger: Decentralized
                                  mixing and unlinkable IOTA transactions  361--372


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 149, Number ??, February 11, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                    Qing Li and   
                   Yang Liu and   
                 Zhijie Zhu and   
                Hengtong Li and   
                     Yong Jiang   BOND: Flexible failure recovery in
                                  software defined networks  . . . . . . . 1--12
           Cesar Bernardini and   
             Samuel Marchal and   
     Muhammad Rizwan Asghar and   
                   Bruno Crispo   PrivICN: Privacy-preserving content
                                  retrieval in information-centric
                                  networking . . . . . . . . . . . . . . . 13--28
                Ankur Gupta and   
         Meenakshi Tripathi and   
        Tabish Jamil Shaikh and   
                   Aakar Sharma   A lightweight anonymous user
                                  authentication and key establishment
                                  scheme for wearable devices  . . . . . . 29--42
     Rodrigo Vieira Steiner and   
                      Emil Lupu   Towards more practical software-based
                                  attestation  . . . . . . . . . . . . . . 43--55
                   Tong Liu and   
                 Yanmin Zhu and   
                    Liqun Huang   TGBA: a two-phase group buying based
                                  auction mechanism for recruiting workers
                                  in mobile crowd sensing  . . . . . . . . 56--75
           Mohamad Zalghout and   
               Ayman Khalil and   
  Matthieu Crussiére and   
           Samih Abdul-Nabi and   
    Jean-Francois Hélard   Context-aware and priority-based user
                                  association and resource allocation in
                                  heterogeneous wireless networks  . . . . 76--92
                Sok-Ian Sou and   
                 Ming-Ru Li and   
             Shan-Huei Wang and   
                 Meng-Hsun Tsai   File distribution via proximity group
                                  communications in LTE-advanced public
                                  safety networks  . . . . . . . . . . . . 93--101
     Bala Prakasa Rao Killi and   
     Seela Veerabhadreswara Rao   Towards improving resilience of
                                  controller placement with minimum backup
                                  capacity in software defined networks    102--114
           Martino Trevisan and   
               Idilio Drago and   
                   Marco Mellia   PAIN: a Passive Web performance
                                  indicator for ISPs . . . . . . . . . . . 115--126
                Rongjun Xie and   
             Ibrahim Khalil and   
            Shahriar Badsha and   
           Mohammed Atiquzzaman   Collaborative extreme learning machine
                                  with a confidence interval for P2P
                                  learning in healthcare . . . . . . . . . 127--143
                Xueyang Qin and   
              Xiaoming Wang and   
                 Liang Wang and   
                Yaguang Lin and   
                    Xinyan Wang   An efficient probabilistic routing
                                  scheme based on game theory in
                                  opportunistic networks . . . . . . . . . 144--153
                Asad Arfeen and   
      Krzysztof Pawlikowski and   
               Don McNickle and   
                 Andreas Willig   Global and local scaling analysis of
                                  link streams in access and backbone core
                                  networks . . . . . . . . . . . . . . . . 154--172
                  Tong Wang and   
                MengBo Tang and   
               Houbing Song and   
                     Y. Cao and   
                    Zaheer Khan   Opportunistic protocol based on social
                                  probability and resources efficiency for
                                  the intelligent and connected
                                  transportation system  . . . . . . . . . 173--186
      Leonardo Linguaglossa and   
                Dario Rossi and   
       Salvatore Pontarelli and   
                Dave Barach and   
              Damjan Marjon and   
                 Pierre Pfister   High-speed data plane and network
                                  functions virtualization by vectorizing
                                  packet processing  . . . . . . . . . . . 187--199
                  L. Atzori and   
              J. L. Bellido and   
                   R. Bolla and   
                G. Genovese and   
                    A. Iera and   
                    A. Jara and   
                C. Lombardo and   
                    G. Morabito   SDN&NFV contribution to IoT objects
                                  virtualization . . . . . . . . . . . . . 200--212
                Shiyou Qian and   
                   Jian Cao and   
                Weichao Mao and   
                 Yanmin Zhu and   
                   Jiadi Yu and   
                  Minglu Li and   
                       Jie Wang   A fast and anti-matchability matching
                                  algorithm for content-based
                                  publish/subscribe systems  . . . . . . . 213--225
          Partha Pratim Ray and   
                Dinesh Dash and   
                    Debashis De   Internet of Things-based real-time model
                                  study on e-healthcare: Device, message
                                  service and dew computing  . . . . . . . 226--239
              Xiaozheng Gao and   
                   Kai Yang and   
                   Nan Yang and   
                     Jinsong Wu   Energy-efficient resource block
                                  assignment and power control for
                                  underlay device-to-device communications
                                  in multi-cell networks . . . . . . . . . 240--251
       Israel Leyva-Mayorga and   
Miguel A. Rodriguez-Hernandez and   
                 Vicent Pla and   
      Jorge Martinez-Bauset and   
             Luis Tello-Oquendo   Adaptive access class barring for
                                  efficient mMTC . . . . . . . . . . . . . 252--264
            S. Ramakrishnan and   
                 Subrat Kar and   
          Dharmaraja Selvamuthu   Analysis of energy efficiency in cloud
                                  based heterogeneous RAN with large-scale
                                  antenna systems  . . . . . . . . . . . . 265--276


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 150, Number ??, February 26, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                Siyao Cheng and   
                 Yingshu Li and   
                   Zhi Tian and   
                  Wei Cheng and   
                  Xiuzhen Cheng   A model for integrating heterogeneous
                                  sensory data in IoT systems  . . . . . . 1--14
             You-Chiun Wang and   
               Chien-Chun Huang   Efficient management of interference and
                                  power by jointly configuring ABS and DRX
                                  in LTE-A HetNets . . . . . . . . . . . . 15--27
               Puneet Kumar and   
                Behnam Dezfouli   Implementation and analysis of QUIC for
                                  MQTT . . . . . . . . . . . . . . . . . . 28--45
                Jin B. Hong and   
        Armstrong Nhlabatsi and   
             Dong Seong Kim and   
               Alaa Hussein and   
               Noora Fetais and   
                 Khaled M. Khan   Systematic identification of threats in
                                  the cloud: a survey  . . . . . . . . . . 46--69
              Pedro Batista and   
       Ivanes Araújo and   
               Neiva Linder and   
                Kim Laraqui and   
               Aldebaro Klautau   Testbed for ICN media distribution over
                                  LTE radio access networks  . . . . . . . 70--80
                  Sadia Din and   
                 Anand Paul and   
                   Abdul Rehman   $5$G-enabled Hierarchical architecture
                                  for software-defined intelligent
                                  transportation system  . . . . . . . . . 81--89
                 Kaiyang Li and   
                  Ling Tian and   
                     Wei Li and   
              Guangchun Luo and   
                    Zhipeng Cai   Incorporating social interaction into
                                  three-party game towards privacy
                                  protection in IoT  . . . . . . . . . . . 90--101
                 Ajay Nehra and   
         Meenakshi Tripathi and   
           Manoj Singh Gaur and   
        Ramesh Babu Battula and   
                    Chhagan Lal   SLDP: a secure and lightweight link
                                  discovery protocol for software defined
                                  networking . . . . . . . . . . . . . . . 102--116
               Niezi Mharsi and   
                 Makhlouf Hadji   A mathematical programming approach for
                                  full coverage hole optimization in Cloud
                                  Radio Access Networks  . . . . . . . . . 117--126
             Tiphaine Viard and   
Raphaël Fournier-S'niehotta   Augmenting content-based rating
                                  prediction with link stream features . . 127--133
            Ian F. Akyildiz and   
                       Ahan Kak   The Internet of Space Things/CubeSats: a
                                  ubiquitous cyber-physical system for the
                                  connected world  . . . . . . . . . . . . 134--149
              Gongbing Hong and   
               James Martin and   
                  James Westall   Adaptive bandwidth binning for bandwidth
                                  management . . . . . . . . . . . . . . . 150--169
          Takayuki Hatanaka and   
               Takuji Tachibana   LE-MRC: Low-energy based multiple
                                  routing configurations for fast failure
                                  recovery . . . . . . . . . . . . . . . . 170--178
                  Aya Ayadi and   
            Oussama Ghorbel and   
             M. S. BenSalah and   
                   Mohamed Abid   Kernelized technique for outliers
                                  detection to monitoring water pipeline
                                  based on WSNs  . . . . . . . . . . . . . 179--189
                    Sen Bai and   
                 Yunhao Liu and   
                 Zhenhua Li and   
                        Xin Bai   Detecting wormhole attacks in $3$D
                                  wireless ad hoc networks via $3$D
                                  forbidden substructures  . . . . . . . . 190--200
             Chuan-Gang Liu and   
                I-Hsien Liu and   
               Chang-De Lin and   
                  Jung-Shian Li   A novel tag searching protocol with time
                                  efficiency and searching accuracy in
                                  RFID systems . . . . . . . . . . . . . . 201--216
  Islam Tharwat Abdel-Halim and   
 Hossam Mahmoud Ahmed Fahmy and   
          Ayman M. Bahaa-El Din   Mobility prediction-based efficient
                                  clustering scheme for connected and
                                  automated vehicles in VANETs . . . . . . 217--233
            Enrico Cambiaso and   
            Giovanni Chiola and   
                Maurizio Aiello   Introducing the SlowDrop Attack  . . . . 234--249
                  Binbin Li and   
                    Yuan He and   
                Wenyuan Liu and   
                       Lin Wang   Towards time-efficient localized polling
                                  for large-scale RFID systems . . . . . . 250--262
            Matthieu Latapy and   
                Marco Fiore and   
                  Artur Ziviani   Link streams: Methods and applications   263--265
                    Feng Li and   
                   Shibo He and   
                    Jun Luo and   
             Mohan Gurusamy and   
                  Junshan Zhang   Editorial: Green computing in Wireless
                                  Sensor Networks  . . . . . . . . . . . . 266--268


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 151, Number ??, March 14, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
      Renan Fischer e Silva and   
              Paul M. Carpenter   TCP proactive congestion control for
                                  east--west traffic: the marking
                                  threshold  . . . . . . . . . . . . . . . 1--11
              Ilhem Souissi and   
          Nadia Ben Azzouna and   
                Lamjed Ben Said   A multi-level study of information trust
                                  models in WSN-assisted IoT . . . . . . . 12--30
                Abdul Salam and   
            Mehmet C. Vuran and   
                     Suat Irmak   Di-Sense: In situ real-time permittivity
                                  estimation and soil moisture sensing
                                  using wireless underground
                                  communications . . . . . . . . . . . . . 31--41
                      Yu He and   
                     Lin Ma and   
               Ruiting Zhou and   
              Chuanhe Huang and   
                    Zongpeng Li   Online task allocation in mobile cloud
                                  computing with budget constraints  . . . 42--51
        Aljawharah Alnasser and   
               Hongjian Sun and   
                     Jing Jiang   Cyber security challenges and solutions
                                  for V2X communications: a survey . . . . 52--67
                  B. Asvija and   
                  R. Eswari and   
                    M. B. Bijoy   Security in hardware assisted
                                  virtualization for cloud computing ---
                                  state of the art issues and challenges   68--92
   Edmundo de Souza e Silva and   
     Rosa M. M. Leão and   
  Daniel S. Menasché and   
                    Don Towsley   On the scalability of P2P swarming
                                  systems  . . . . . . . . . . . . . . . . 93--113
                 Xiaocui Li and   
             Zhangbing Zhou and   
                  Junqi Guo and   
            Shangguang Wang and   
                 Junsheng Zhang   Aggregated multi-attribute query
                                  processing in edge computing for
                                  industrial IoT applications  . . . . . . 114--123
              V. R. Kavitha and   
                     M. Moorthi   A quality of service load balanced
                                  connected dominating set-stochastic
                                  diffusion search (CDS-SDS) network
                                  backbone for MANET . . . . . . . . . . . 124--131
         Mohammadhasan Miri and   
          Kamal Mohamedpour and   
             Yousef Darmani and   
           Mahasweta Sarkar and   
                 R. Lal Tummala   An efficient resource allocation
                                  algorithm based on vertex coloring to
                                  mitigate interference among coexisting
                                  WBANs  . . . . . . . . . . . . . . . . . 132--146
      Kelton A. P. da Costa and   
        João P. Papa and   
            Celso O. Lisboa and   
              Roberto Munoz and   
  Victor Hugo C. de Albuquerque   Internet of Things: a survey on machine
                                  learning-based intrusion detection
                                  approaches . . . . . . . . . . . . . . . 147--157
                Maicon Kist and   
Juliano Araújo Wickboldt and   
Lisandro Zambenedetti Granville and   
             Juergen Rochol and   
            Luiz A. DaSilva and   
          Cristiano Bonato Both   Flexible fine-grained baseband
                                  processing with network functions
                                  virtualization: Benefits and impacts . . 158--165
                  Junqi Guo and   
                   Lan Yang and   
               Rongfang Bie and   
                   Jiguo Yu and   
                   Yuan Gao and   
                   Yan Shen and   
                      Anton Kos   An XGBoost-based physical fitness
                                  evaluation model using advanced feature
                                  selection and Bayesian hyper-parameter
                                  optimization for wearable running
                                  monitoring . . . . . . . . . . . . . . . 166--180
Balasubramanian Prabhu kavin and   
              Sannasi Ganapathy   A secured storage and privacy-preserving
                                  model using CRT for providing security
                                  on cloud and IoT-based applications  . . 181--190
    Dinesh Jackson Samuel R and   
                   E. Fenil and   
      Gunasekaran Manogaran and   
          G. N. Vivekananda and   
          M. Thanjaivadivel and   
                   S. Jeeva and   
                      A. Ahilan   Real time violence detection framework
                                  for football stadium comprising of big
                                  data analysis and deep learning through
                                  bidirectional LSTM . . . . . . . . . . . 191--200
         Sivakumar Krishnan and   
                  S. Lokesh and   
                  M. Ramya Devi   An efficient Elman neural network
                                  classifier with cloud supported Internet
                                  of Things structure for health
                                  monitoring system  . . . . . . . . . . . 201--210
             K. Thangaramya and   
             K. Kulothungan and   
              R. Logambigai and   
                   M. Selvi and   
          Sannasi Ganapathy and   
                      A. Kannan   Energy aware cluster and neuro-fuzzy
                                  based routing algorithm for wireless
                                  sensor networks in IoT . . . . . . . . . 211--223
             Osama AlFarraj and   
                  Amr Tolba and   
             Salem Alkhalaf and   
                   Ahmad AlZubi   Neighbor predictive adaptive handoff
                                  algorithm for improving mobility
                                  management in VANETs . . . . . . . . . . 224--231
                     Kan Yu and   
              Yinglong Wang and   
                   Jiguo Yu and   
                Dongxiao Yu and   
              Xiuzhen Cheng and   
                  Zhiguang Shan   Localized and distributed link
                                  scheduling algorithms in IoT under
                                  Rayleigh fading  . . . . . . . . . . . . 232--244
           Aziza Ben Mosbah and   
        Seid Eddine Hammami and   
            Hassine Moungla and   
               Hossam Afifi and   
                 Ahmed E. Kamal   Enhancing Device-to-Device direct
                                  discovery based on predicted user
                                  density patterns . . . . . . . . . . . . 245--259
                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 152, Number ??, April 7, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
          Maram Bani Younes and   
             Azzedine Boukerche   Safety and efficiency control protocol
                                  for highways using intelligent vehicular
                                  networks . . . . . . . . . . . . . . . . 1--11
                  Defang Li and   
                Peilin Hong and   
                Kaiping Xue and   
                    Jianing Pei   Virtual network function placement and
                                  resource optimization in NFV and edge
                                  computing enabled networks . . . . . . . 12--24
Carlos M. J. M. Dourado, Jr. and   
    Suane Pires P. da Silva and   
Raul Victor M. da Nóbrega and   
Antonio Carlos da S. Barros and   
    Pedo P. Rebouças and   
  Victor Hugo C. de Albuquerque   Deep learning IoT system for online
                                  stroke detection in skull computed
                                  tomography images  . . . . . . . . . . . 25--39
Sergio Barrachina-Muñoz and   
          Francesc Wilhelmi and   
                 Boris Bellalta   To overlap or not to overlap: Enabling
                                  channel bonding in high-density WLANs    40--53
    Francisco H. M. B. Lima and   
          Luiz F. M. Vieira and   
        Marcos A. M. Vieira and   
             Alex B. Vieira and   
   José Augusto M. Nacif   Water ping: ICMP for the Internet of
                                  Underwater Things  . . . . . . . . . . . 54--63
                  Zhijun Wu and   
                 Qingbo Pan and   
                   Meng Yue and   
                      Liang Liu   Sequence alignment detection of
                                  TCP-targeted synchronous low-rate DoS
                                  attacks  . . . . . . . . . . . . . . . . 64--77
                      Amr Tolba   Content accessibility preference
                                  approach for improving service
                                  optimality in Internet of Vehicles . . . 78--86
             Adelina Madhja and   
        Sotiris Nikoletseas and   
        Alexandros A. Voudouris   Adaptive wireless power transfer in
                                  mobile ad hoc networks . . . . . . . . . 87--97
         Mohammed Al-Maitah and   
           Ahmad Ali AlZubi and   
              Abdulaziz Alarifi   An optimal storage utilization technique
                                  for IoT devices using sequential machine
                                  learning . . . . . . . . . . . . . . . . 98--105
           Ahmad Ali AlZubi and   
         Mohammed Al-Maitah and   
              Abdulaziz Alarifi   A best-fit routing algorithm for
                                  non-redundant communication in
                                  large-scale IoT based network  . . . . . 106--113
                  Yupeng Hu and   
                Pengjie Ren and   
                    Wei Luo and   
                  Peng Zhan and   
                     Xueqing Li   Multi-resolution representation with
                                  recurrent neural networks application
                                  for streaming time series in IoT . . . . 114--132
               Rafael Leira and   
Guillermo Julián-Moreno and   
Iván González and   
Francisco J. Gómez-Arribas and   
Jorge E. López de Vergara   Performance assessment of 40 Gbit/s
                                  off-the-shelf network cards for virtual
                                  network probes in 5G networks  . . . . . 133--143
                  S. Baskar and   
            S. Periyanayagi and   
         P. Mohamed Shakeel and   
          V. R. Sarma Dhulipala   An energy persistent Range-dependent
                                  Regulated Transmission Communication
                                  model for vehicular network applications 144--153
               Jiaqing Dong and   
                    Hao Yin and   
                  Chen Tian and   
       Ahmed M. Abdelmoniem and   
              Huapoing Zhou and   
                     Bo Bai and   
                     Gong Zhang   Uranus: Congestion-proportionality among
                                  slices based on Weighted Virtual
                                  Congestion Control . . . . . . . . . . . 154--166
Kushan Sudheera Kalupahana Liyanage and   
                   Maode Ma and   
            Peter Han Joo Chong   Connectivity aware tribrid routing
                                  framework for a generalized software
                                  defined vehicular network  . . . . . . . 167--177
                  Chun Shan and   
               Shanshan Mei and   
               Changzhen Hu and   
                 Liyuan Liu and   
                      Limin Mao   Software structure characteristic
                                  measurement method based on weighted
                                  network  . . . . . . . . . . . . . . . . 178--185
          Pedro M Rodriguez and   
              Aitor Lizeaga and   
            Mikel Mendicute and   
               Iñaki Val   Spectrum handoff strategy for cognitive
                                  radio-based MAC for real-time industrial
                                  wireless sensor and actuator networks    186--198
                  Chao Zhai and   
                 Zhiyuan Yu and   
                    Xinhua Wang   High-efficient cooperative relaying with
                                  wireless powered source and relay  . . . 199--209
                    Hui Xia and   
              Chun-qiang Hu and   
                    Fu Xiao and   
            Xiang-guo Cheng and   
                  Zhen-kuan Pan   An efficient social-like semantic-aware
                                  service discovery mechanism for
                                  large-scale Internet of Things . . . . . 210--220


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 153, Number ??, April 22, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                  Jialu Hao and   
                Cheng Huang and   
                Jianbing Ni and   
                  Hong Rong and   
                  Ming Xian and   
          Xuemin (Sherman) Shen   Fine-grained data access control with
                                  attribute-hiding policy for cloud-based
                                  IoT  . . . . . . . . . . . . . . . . . . 1--10
        Roberto M. Oliveira and   
             Alex B. Vieira and   
              Moises V. Ribeiro   EPLC--CMAC: an enhanced cooperative MAC
                                  protocol for broadband PLC systems . . . 11--22
                Caihong Kai and   
               Yuting Liang and   
                  Xinyue Hu and   
             Zhengqiong Liu and   
                   Lusheng Wang   An effective channel allocation
                                  algorithm to maximize system utility in
                                  heterogeneous DCB WLANs  . . . . . . . . 23--35
               Anish Jindal and   
      Gagangeet Singh Aujla and   
                   Neeraj Kumar   SURVIVOR: a blockchain based
                                  edge-as-a-service framework for secure
                                  energy trading in SDN-enabled
                                  vehicle-to-grid environment  . . . . . . 36--48
                   Yahui Li and   
              Zhiliang Wang and   
              Jiangyuan Yao and   
                    Xia Yin and   
                Xingang Shi and   
                Jianping Wu and   
                      Han Zhang   MSAID: Automated detection of
                                  interference in multiple SDN
                                  applications . . . . . . . . . . . . . . 49--62
                   Yu Liang and   
                  Jidong Ge and   
                Sheng Zhang and   
                        Bin Luo   Modeling and deploying hybrid tenant
                                  requests with shared networklets . . . . 63--72
       Christos Tsilopoulos and   
               George Xylomenos   Adaptive semi-stateless forwarding for
                                  Content-Centric Networks . . . . . . . . 73--85
   Fabrício N. Godoi and   
        Gustavo W. Denardin and   
          Carlos H. Barriquello   Reliability enhancement of packet
                                  delivery in multi-hop wireless sensor
                                  network  . . . . . . . . . . . . . . . . 86--91
                    L. Song and   
                 K. K. Chai and   
                    Y. Chen and   
                     J. Loo and   
                   S. Jimaa and   
                       Y. Iraqi   Energy efficient cooperative coalition
                                  selection in cluster-based capillary
                                  networks for CMIMO IoT systems . . . . . 92--102
            Chuan-Sheng Lin and   
                    Sok-Ian Sou   QoS-aware dynamic bandwidth reallocation
                                  with deadline assurance for multipath
                                  data offloading  . . . . . . . . . . . . 103--112
        Mrinai M. Dhanvijay and   
              Shailaja C. Patil   Internet of Things: a survey of enabling
                                  technologies in healthcare and its
                                  applications . . . . . . . . . . . . . . 113--131
             Debasish Ghose and   
     Anders Fròytlog and   
                    Frank Y. Li   Enabling early sleeping and early data
                                  transmission in wake-up radio-enabled
                                  IoT networks . . . . . . . . . . . . . . 132--144


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 154, Number ??, May 8, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
Francisco-Javier Moreno Muro and   
          Nina Skorin-Kapov and   
             Pablo Pavon-Marino   Revisiting core traffic growth in the
                                  presence of expanding CDNs . . . . . . . 1--11
                 Muge Sayit and   
            Cihat Cetinkaya and   
        Huseyin Ugur Yildiz and   
                   Bulent Tavli   DASH-QoS: a scalable network layer
                                  service differentiation architecture for
                                  DASH over SDN  . . . . . . . . . . . . . 12--25
            Roberto Bruschi and   
               Florin Ciucu and   
                  Thomas Zinner   Application areas and fundamental
                                  challenges in Network Functions
                                  Virtualization . . . . . . . . . . . . . 26--27
               Subir Halder and   
              Amrita Ghosal and   
                    Mauro Conti   Efficient physical intrusion detection
                                  in Internet of Things: a Node deployment
                                  approach . . . . . . . . . . . . . . . . 28--46
                  Cuicui Lv and   
                 Qiang Wang and   
                 Wenjie Yan and   
                         Jia Li   Compressive sensing-based sequential
                                  data gathering in WSNs . . . . . . . . . 47--59
                 Yingya Guo and   
              Zhiliang Wang and   
                Zhifeng Liu and   
                    Xia Yin and   
                Xingang Shi and   
                Jianping Wu and   
                    Yang Xu and   
               H. Jonathan Chao   SOTE: Traffic engineering in hybrid
                                  software defined networks  . . . . . . . 60--72
                   Xiuwu Yu and   
                Lixing Zhou and   
                   Xiangyang Li   A novel hybrid localization scheme for
                                  deep mine based on wheel graph and
                                  chicken swarm optimization . . . . . . . 73--78
            Shishupal Kumar and   
                  Nidhi Lal and   
         Vijay Kumar Chaurasiya   An energy efficient IPv6 packet delivery
                                  scheme for industrial IoT over G.9959
                                  protocol based Wireless Sensor Network
                                  (WSN)  . . . . . . . . . . . . . . . . . 79--87
        G. G. Md. Nawaz Ali and   
                    Kai Liu and   
           Victor C. S. Lee and   
          Peter H. J. Chong and   
            Yong Liang Guan and   
                       Jun Chen   Towards efficient and scalable
                                  implementation for coding-based
                                  on-demand data broadcast . . . . . . . . 88--104


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 155, Number ??, May 22, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                 Heedo Kang and   
             Changhoon Yoon and   
                  Seungwon Shin   Astraea: Towards an effective and usable
                                  application permission system for SDN    1--14
      Vicente Casares-Giner and   
      Jorge Martinez-Bauset and   
                 Canek Portillo   Performance evaluation of framed slotted
                                  ALOHA with reservation packets and
                                  successive interference cancelation for
                                  M2M networks . . . . . . . . . . . . . . 15--30
                 Zhizhu Liu and   
              Yinqiao Xiong and   
                    Xin Liu and   
                    Wei Xie and   
                    Peidong Zhu   6Tree: Efficient dynamic discovery of
                                  active addresses in the IPv6 address
                                  space  . . . . . . . . . . . . . . . . . 31--46
              Marco Casazza and   
              Mathieu Bouet and   
                  Stefano Secci   Availability-driven NFV orchestration    47--61
                Zufan Zhang and   
               Zhangyi Wang and   
               Chenquan Gan and   
                    Porui Zhang   A double auction scheme of resource
                                  allocation with social ties and
                                  sentiment classification for
                                  Device-to-Device communications  . . . . 62--71
          Radhika Sukapuram and   
                   Gautam Barua   PPCU: Proportional per-packet consistent
                                  updates for SDNs using data plane time
                                  stamps . . . . . . . . . . . . . . . . . 72--86
            Najla Al-Nabhan and   
            Nadia Al-Aboody and   
         A. B. M. Alim Al Islam   A hybrid IoT-based approach for
                                  emergency evacuation . . . . . . . . . . 87--97
          Ahmed Y. Zakariya and   
            Sherif I. Rabia and   
            Yasmine Abouelseoud   An optimized general target channel
                                  sequence for prioritized cognitive radio
                                  networks . . . . . . . . . . . . . . . . 98--109
        K. Anish Pon Yamini and   
              K. Suthendran and   
                     T. Arivoli   Enhancement of energy efficiency using a
                                  transition state MAC protocol for MANET  110--118


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 156, Number ??, June 19, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                  Yuying Qi and   
                Xuanxia Yao and   
                    Tao Zhu and   
                 Huansheng Ning   A semantic-based inference control
                                  algorithm for OWL repository privacy
                                  protection . . . . . . . . . . . . . . . 1--8
                Dylan Smyth and   
               Donna O'Shea and   
              Victor Cionca and   
                 Sean McSweeney   Attacking distributed software-defined
                                  networks by leveraging network state
                                  consistency  . . . . . . . . . . . . . . 9--19
          Ararat Shaverdian and   
           Jagadish Ghimire and   
            Catherine Rosenberg   Simple and efficient network-aware user
                                  association rules for heterogeneous
                                  networks . . . . . . . . . . . . . . . . 20--32
           R. Vishnuvarthan and   
               R. Sakthivel and   
              V. Bhanumathi and   
                K. Muralitharan   Energy-efficient data collection in
                                  strip-based wireless sensor networks
                                  with optimal speed mobile data
                                  collectors . . . . . . . . . . . . . . . 33--40
              Zhenlong Peng and   
                Xiaolin Gui and   
                    Jian An and   
                 Tianjie Wu and   
                     Ruowei Gui   Multi-Task oriented data diffusion and
                                  transmission paradigm in crowdsensing
                                  based on city public traffic . . . . . . 41--51
         Sanaa Sharafeddine and   
               Rania Islambouli   On-demand deployment of multiple aerial
                                  base stations for traffic offloading and
                                  network recovery . . . . . . . . . . . . 52--61
Francisco Renato C. Araújo and   
        Antonio M. de Sousa and   
             Leobino N. Sampaio   SCaN-Mob: an opportunistic caching
                                  strategy to support producer mobility in
                                  named data wireless networking . . . . . 62--74


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 157, Number ??, July 5, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                  F. AL-Tam and   
                     N. Correia   Fractional switch migration in
                                  multi-controller software-defined
                                  networking . . . . . . . . . . . . . . . 1--10
           Ian Vilar Bastos and   
           Igor Monteiro Moraes   A diversity-based search-and-routing
                                  approach for named-data networking . . . 11--23
                 Zhiwei Yan and   
                 Jong-Hyouk Lee   Mobility capability negotiation for IPv6
                                  based ubiquitous mobile Internet . . . . 24--28
              Van-Van Huynh and   
            Hoang-Sy Nguyen and   
           Ly Tran Thai Hoc and   
          Thanh-Sang Nguyen and   
                Miroslav Voznak   Optimization issues for data rate in
                                  energy harvesting relay-enabled
                                  cognitive sensor networks  . . . . . . . 29--40
                Yujun Cheng and   
                  Dong Yang and   
               Huachun Zhou and   
                  Hongchao Wang   Adopting IEEE 802.11 MAC for industrial
                                  delay-sensitive wireless control and
                                  monitoring applications: a survey  . . . 41--67
              Changqing Xia and   
                     Xi Jin and   
                Linghe Kong and   
                     Chi Xu and   
                      Peng Zeng   Heterogeneous slot scheduling for
                                  real-time industrial wireless sensor
                                  networks . . . . . . . . . . . . . . . . 68--77
           Hashim A. Hashim and   
              Mohammad A. Abido   Location management in LTE networks
                                  using multi-objective particle swarm
                                  optimization . . . . . . . . . . . . . . 78--88
                     Cun Ji and   
                  Chao Zhao and   
                     Li Pan and   
                 Shijun Liu and   
              Chenglei Yang and   
                   Xiangxu Meng   A just-in-time shapelet selection
                                  service for online time series
                                  classification . . . . . . . . . . . . . 89--98
                Lu Xiaofeng and   
             Jiang Fangshuo and   
                  Zhou Xiao and   
                Yi Shengwei and   
                   Sha Jing and   
                     Pietro Lio   ASSCA: API sequence and statistics
                                  features combined architecture for
                                  malware detection  . . . . . . . . . . . 99--111
          T. P. Anithaashri and   
            G. Ravichandran and   
                    R. Baskaran   Security enhancement for software
                                  defined network using game theoretical
                                  approach . . . . . . . . . . . . . . . . 112--121
       Mohamed Abdel-Basset and   
      Gunasekaran Manogaran and   
                    Mai Mohamed   A neutrosophic theory based security
                                  approach for fog and mobile-edge
                                  computing  . . . . . . . . . . . . . . . 122--132
                 Qingyu Shi and   
                  Fang Wang and   
                   Dan Feng and   
                     Weibin Xie   Adaptive load balancing based on
                                  accurate congestion feedback for
                                  asymmetric topologies  . . . . . . . . . 133--145
                Enhuan Dong and   
                 Mingwei Xu and   
                Xiaoming Fu and   
                         Yu Cao   A loss aware MPTCP scheduler for highly
                                  lossy networks . . . . . . . . . . . . . 146--158


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 158, Number ??, July 20, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                 Dewang Ren and   
                Xiaolin Gui and   
              Kaiyuan Zhang and   
                         Jie Wu   Hybrid collaborative caching in mobile
                                  edge networks: an analytical approach    1--16
               Khaled Hejja and   
              Xavier Hesselbach   Offline and online power aware resource
                                  allocation algorithms with migration and
                                  delay constraints  . . . . . . . . . . . 17--34
            Soodeh Hosseini and   
                  Mehrdad Azizi   The hybrid technique for DDoS detection
                                  with supervised learning algorithms  . . 35--45
           Mariusz Gajewski and   
       Jordi Mongay Batalla and   
                Albert Levi and   
               Cengiz Togay and   
Constandinos X. Mavromoustakis and   
              George Mastorakis   Two-tier anomaly detection based on
                                  traffic profiling of the home automation
                                  system . . . . . . . . . . . . . . . . . 46--60
                  Huan Wang and   
               Zhaolin Yuan and   
                 Yibin Chen and   
              Bingyang Shen and   
                     Aixiang Wu   An industrial missing values processing
                                  method based on generating model . . . . 61--68
         N. L. Venkataraman and   
                       R. Kumar   Design and analysis of application
                                  specific network on chip for reliable
                                  custom topology  . . . . . . . . . . . . 69--76
                   Ming Xia and   
                 Kaikai Chi and   
               Xiaoyan Wang and   
                     Zhen Cheng   Mode-oriented hybrid programming of
                                  sensor network nodes for supporting
                                  rapid and flexible utility assembly  . . 77--97
            Oussama Soualah and   
            Marouen Mechtri and   
              Chaima Ghribi and   
               Djamal Zeghlache   Online and batch algorithms for VNFs
                                  placement and chaining . . . . . . . . . 98--113
                    Tao Han and   
               Lijuan Zhang and   
          Sandeep Pirbhulal and   
                 Wanqing Wu and   
  Victor Hugo C. de Albuquerque   A novel cluster head selection technique
                                  for edge-computing based IoMT systems    114--122
               Amit Agarwal and   
                Durga Toshniwal   SmPFT: Social media based profile fusion
                                  technique for data enrichment  . . . . . 123--131
                 Jiehong Wu and   
               Liangkai Zou and   
                 Liang Zhao and   
             Ahmed Al-Dubai and   
            Lewis Mackenzie and   
                     Geyong Min   A multi-UAV clustering strategy for
                                  reducing insecure communication range    132--142
       Klenilmar Lopes Dias and   
   Mateus Almeida Pongelupe and   
      Walmir Matos Caminhas and   
              Luciano de Errico   An innovative approach for real-time
                                  network traffic classification . . . . . 143--157
                      Bo Wu and   
                      Ke Xu and   
                      Qi Li and   
               Bingyang Liu and   
               Shoushou Ren and   
                   Fan Yang and   
                  Meng Shen and   
                        Kui Ren   RFL: Robust fault localization on
                                  unreliable communication channels  . . . 158--174
            Mahsa Ehsanpour and   
              Siavash Bayat and   
  Ali Mohammad Afshin Hemmatyar   An efficient and social-aware
                                  distributed in-network caching scheme in
                                  named data networks using matching
                                  theory . . . . . . . . . . . . . . . . . 175--183
                Mingkui Wei and   
                    Zhuo Lu and   
                 Yufei Tang and   
                       Xiang Lu   Cyber and physical interactions to
                                  combat failure propagation in smart
                                  grid: Characterization, analysis and
                                  evaluation . . . . . . . . . . . . . . . 184--192
             Bingchuan Tian and   
                  Chen Tian and   
              Bingquan Wang and   
                      Bo Li and   
                   Zehao He and   
                Haipeng Dai and   
                  Kexin Liu and   
                Wanchun Dou and   
                    Guihai Chen   Scheduling dependent coflows to minimize
                                  the total weighted job completion time
                                  in datacenters . . . . . . . . . . . . . 193--205


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 159, Number ??, August 4, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                     Kun Li and   
             Shengling Wang and   
                  Xiuzhen Cheng   Crowdsourcee evaluation based on
                                  persuasion game  . . . . . . . . . . . . 1--9
               Pasi Lassila and   
    Misikir Eyob Gebrehiwot and   
                   Samuli Aalto   Optimal energy-aware load balancing and
                                  base station switch-off control in $5$G
                                  HetNets  . . . . . . . . . . . . . . . . 10--22
               Amel Arfaoui and   
               Ali Kribeche and   
          Sidi-Mohammed Senouci   Context-aware anonymous authentication
                                  protocols in the Internet of Things
                                  dedicated to e-health applications . . . 23--36
               Md. Forkan Uddin   Energy efficiency maximization by joint
                                  transmission scheduling and resource
                                  allocation in downlink NOMA cellular
                                  networks . . . . . . . . . . . . . . . . 37--50
                      Bo Yi and   
               Xingwei Wang and   
                  Min Huang and   
                     Anwei Dong   A multi-criteria decision approach for
                                  minimizing the influence of VNF
                                  migration  . . . . . . . . . . . . . . . 51--62
                Xuanxia Yao and   
                Jiafei Wang and   
                Mengyu Shen and   
               Huafeng Kong and   
                 Huansheng Ning   An improved clustering algorithm and its
                                  application in IoT data analysis . . . . 63--72
Eduardo P. M. Câmara Júnior and   
          Luiz F. M. Vieira and   
            Marcos A. M. Vieira   3DVS: Node scheduling in underwater
                                  sensor networks using $3$D Voronoi
                                  diagrams . . . . . . . . . . . . . . . . 73--83
 Angelos-Christos Anadiotis and   
            Laura Galluccio and   
         Sebastiano Milardo and   
           Giacomo Morabito and   
                 Sergio Palazzo   SD-WISE: a Software-Defined WIreless
                                  SEnsor network . . . . . . . . . . . . . 84--95
         Guillermo Caminero and   
        Manuel Lopez-Martin and   
                    Belen Carro   Adversarial environment reinforcement
                                  learning algorithm for intrusion
                                  detection  . . . . . . . . . . . . . . . 96--109
                 Zhixin Liu and   
                 Peng Zhang and   
               Kit Yan Chan and   
                      Li Li and   
                   Xinping Guan   Robust resource allocation for rates
                                  maximization using fuzzy estimation of
                                  dynamic channel states in OFDMA
                                  femtocell networks . . . . . . . . . . . 110--124
                Amit Nayyer and   
          Aman Kumar Sharma and   
            Lalit Kumar Awasthi   Laman: a supervisor controller based
                                  scalable framework for software defined
                                  networks . . . . . . . . . . . . . . . . 125--134
         Michail Fasoulakis and   
   Eirini Eleni Tsiropoulou and   
           Symeon Papavassiliou   Satisfy instead of maximize: Improving
                                  operation efficiency in wireless
                                  communication networks . . . . . . . . . 135--146
           Mohamed Elhoseny and   
               Gui-Bin Bian and   
       S. K. Lakshmanaprabu and   
                 K. Shankar and   
           Amit Kumar Singh and   
                     Wanqing Wu   Effective features to classify ovarian
                                  cancer data in Internet of Medical
                                  Things . . . . . . . . . . . . . . . . . 147--156
                Haizhou Bao and   
              Chuanhe Huang and   
            Zhongzheng Tang and   
                   Qihui Li and   
                  Qiufen Ni and   
               Xiaodai Dong and   
                         Bin Fu   Coded multicasting in cache-enabled
                                  vehicular ad hoc network . . . . . . . . 157--170


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 160, Number ??, September 4, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
                  Sarah Jenkins   \booktitleComputer Networks: Publisher's
                                  Note . . . . . . . . . . . . . . . . . . iii--iii
                      Anonymous   Passing the BATON  . . . . . . . . . . . iv--v
                      Anonymous   Receiving the BATON  . . . . . . . . . . vi--vi
      Hossein Ghannadrezaii and   
  Jean-François Bousquet   Maximizing network coverage in a
                                  multichannel short-range underwater
                                  acoustic sensor network  . . . . . . . . 1--10
            Akhlaqur Rahman and   
                  Jiong Jin and   
            Ashfaqur Rahman and   
           Antonio Cricenti and   
              Mahbuba Afrin and   
                   Yu-ning Dong   Energy-efficient optimal task offloading
                                  in cloud networked multi-robot systems   11--32
      Muralitharan Krishnan and   
               Sangwoon Yun and   
                   Yoon Mo Jung   Enhanced clustering and ACO-based
                                  multiple mobile sinks for efficiency
                                  improvement of wireless sensor networks  33--40
              Apoorv Saxena and   
              Dieter Claeys and   
             Herwig Bruneel and   
               Joris Walraevens   Analysis of the age of data in data
                                  backup systems . . . . . . . . . . . . . 41--50
             Preeti A. Kale and   
                Manisha J. Nene   Scheduling of data aggregation trees
                                  using local heuristics to enhance
                                  network lifetime in sensor networks  . . 51--64
               Gaofei Huang and   
                     Wanqing Tu   A high-throughput wireless-powered relay
                                  network with joint time and power
                                  allocations  . . . . . . . . . . . . . . 65--76
     Håkon Gunleifsen and   
           Thomas Kemmerich and   
             Vasileios Gkioulos   Dynamic setup of IPsec VPNs in service
                                  function chaining  . . . . . . . . . . . 77--91
                 Zhixin Liu and   
                Guochen Hou and   
                   Yang Liu and   
                  Xinbin Li and   
                   Xinping Guan   Robust power control strategy based on
                                  hierarchical game with QoS provisioning
                                  in full-duplex femtocell networks  . . . 92--104
           Murtaza Cicioglu and   
              Ali Çalhan   HUBsFLOW: a novel interface protocol for
                                  SDN-enabled WBANs  . . . . . . . . . . . 105--117
             Serif Bahtiyar and   
         Mehmet Baris Yaman and   
           Can Yilmaz Altinigne   A multi-dimensional machine learning
                                  approach to predict advanced malware . . 118--129
               Duc Thang Ha and   
             Lila Boukhatem and   
              Megumi Kaneko and   
          Nhan Nguyen-Thanh and   
                  Steven Martin   Adaptive beamforming and user
                                  association in heterogeneous cloud radio
                                  access networks: a mobility-aware
                                  performance-cost trade-off . . . . . . . 130--143
             Maryam Ghasemi and   
              Ibrahim Matta and   
                Flavio Esposito   The effect of (non-)competing brokers on
                                  the quality and price of differentiated
                                  Internet services  . . . . . . . . . . . 144--164
        Somayye Hajiheidari and   
               Karzan Wakil and   
               Maryam Badri and   
         Nima Jafari Navimipour   Intrusion detection systems in the
                                  Internet of things: a comprehensive
                                  investigation  . . . . . . . . . . . . . 165--191
         A. Santhanavijayan and   
             S. R. Balasundaram   Multi swarm optimization based automatic
                                  ontology for e-assessment  . . . . . . . 192--199


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 161, Number ??, October 9, 2019

                      Anonymous   Editorial Board  . . . . . . . . . . . . ii--ii
            Marinela Shehaj and   
                Dritan Nace and   
            Ilya Kalesnikau and   
           Micha\l Pióro   Link dimensioning of hybrid FSO/fiber
                                  networks resilient to adverse weather
                                  conditions . . . . . . . . . . . . . . . 1--13
Ricardo José Pfitscher and   
        Arthur Selle Jacobs and   
          Luciano Zembruzki and   
    Ricardo Luis dos Santos and   
           Eder John Scheid and   
    Muriel Figueredo Franco and   
    Alberto Schaeffer-Filho and   
Lisandro Zambenedetti Granville   Guiltiness: a practical approach for
                                  quantifying virtual network functions
                                  performance  . . . . . . . . . . . . . . 14--31
             Manisha Chahal and   
                  Sandeep Harit   Network selection and data dissemination
                                  in heterogeneous software-defined
                                  vehicular network  . . . . . . . . . . . 32--44
                Max Alaluna and   
                  Eric Vial and   
                 Nuno Neves and   
           Fernando M. V. Ramos   Secure Multi-Cloud Network
                                  Virtualization . . . . . . . . . . . . . 45--60
                 Enis Kocan and   
        Aleksandra Lopusina and   
      Milica Pejanovic-Djurisic   Macro diversity for mmWave cellular
                                  communications in indoor environment . . 61--67
                   Xue Leng and   
                  Kaiyu Hou and   
                   Yan Chen and   
                     Kai Bu and   
                 Libin Song and   
                         You Li   A lightweight policy enforcement system
                                  for resource protection and management
                                  in the SDN-based cloud . . . . . . . . . 68--81
                 Zhixin Liu and   
            Changjian Liang and   
                Yazhou Yuan and   
                   Xinping Guan   Energy efficient resource allocation
                                  based on relay selection and subcarrier
                                  pairing with channel uncertainty in
                                  cognitive radio network  . . . . . . . . 82--92
             Chafiq Titouna and   
   Farid Na\"\it-Abdesselam and   
                 Ashfaq Khokhar   DODS: a Distributed Outlier Detection
                                  Scheme for Wireless Sensor Networks  . . 93--101
                 Wenbin Liu and   
                  Leye Wang and   
                    En Wang and   
              Yongjian Yang and   
           Djamal Zeghlache and   
                   Daqing Zhang   Reinforcement learning-based cell
                                  selection in sparse mobile crowdsensing  102--114
            Jessie Hui Wang and   
                Jilong Wang and   
               Changqing An and   
                   Qianli Zhang   A survey on resource scheduling for data
                                  transfers in inter-datacenter WANs . . . 115--137
               Zhenchun Wei and   
                    Fei Liu and   
                  Yan Zhang and   
                    Juan Xu and   
                 Jianjun Ji and   
                    Zengwei Lyu   A $Q$-learning algorithm for task
                                  scheduling based on improved SVM in
                                  wireless sensor networks . . . . . . . . 138--149
                   Bin Yang and   
               Zhenqiang Wu and   
                Yulong Shen and   
                 Xiaohong Jiang   Packet delivery ratio and energy
                                  consumption in multicast delay tolerant
                                  MANETs with power control  . . . . . . . 150--161
                    Elif Ak and   
                   Berk Canberk   BCDN: a proof of concept model for
                                  blockchain-aided CDN orchestration and
                                  routing  . . . . . . . . . . . . . . . . 162--171
              Hailong Huang and   
               Andrey V. Savkin   Reactive $3$D deployment of a flying
                                  robotic network for surveillance of
                                  mobile targets . . . . . . . . . . . . . 172--182
       Roberto P. Antonioli and   
       Emanuel B. Rodrigues and   
             Diego A. Sousa and   
          Igor M. Guerreiro and   
       Carlos F. M. e Silva and   
     Francisco R. P. Cavalcanti   Adaptive bearer split control for $5$G
                                  multi-RAT scenarios with dual
                                  connectivity . . . . . . . . . . . . . . 183--196
              Audrey Wilmet and   
             Tiphaine Viard and   
            Matthieu Latapy and   
          Robin Lamarche-Perrin   Outlier detection in IP traffic modelled
                                  as a link stream using the stability of
                                  degree distributions over time . . . . . 197--209
                      Wei W and   
                     Xu Xia and   
             Marcin Wozniak and   
                  Xunli Fan and   
  Robertas Dama\vsevi\vcius and   
                          Ye Li   Multi-sink distributed power control
                                  algorithm for cyber-physical-systems in
                                  coal mine tunnels  . . . . . . . . . . . 210--219
                    Xin Liu and   
             Ruisheng Zhang and   
                    Mingqi Zhao   A robust authentication scheme with
                                  dynamic password for wireless body area
                                  networks . . . . . . . . . . . . . . . . 220--234
                Yufeng Zhan and   
               Yuanqing Xia and   
        Athanasios V. Vasilakos   Future directions of networked control
                                  systems: a combination of cloud control
                                  and fog control approach . . . . . . . . 235--248
      Gunasekaran Manogaran and   
         Naveen Chilamkurti and   
                Ching-Hsien Hsu   Machine learning algorithms towards
                                  merging of mobile edge computing and
                                  Internet of Things . . . . . . . . . . . 249--250
                   Sen Wang and   
                     Jun Bi and   
                Jianping Wu and   
    Athanasios V. Vasilakos and   
                      Qilin Fan   VNE-TD: a virtual network embedding
                                  algorithm based on temporal-difference
                                  learning . . . . . . . . . . . . . . . . 251--263
                     Tao Hu and   
                    Peng Yi and   
                 Julong Lan and   
                 Yuxiang Hu and   
                    Penghao Sun   ACST: Audit-based compromised switch
                                  tolerance for enhancing data plane
                                  robustness in software-defined
                                  networking . . . . . . . . . . . . . . . 264--280
               Yunchuan Sun and   
              Xiuzhen Cheng and   
                     Yu Bai and   
                       Jiguo Yu   Information, knowledge, and semantics
                                  for interacting with Internet-of-Things  281--282


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 162, Number ??, 2019

             Faiza Al-Salti and   
             Nasser Alzeidi and   
                 Khaled Day and   
              Abderezak Touzene   An efficient and reliable grid-based
                                  routing protocol for UWSNs by exploiting
                                  minimum hop count  . . . . . . . . . . . Article 106869
             Yahya Alfadhli and   
               You-Wei Chen and   
                 Siming Liu and   
                 Shuyi Shen and   
                 Shuang Yao and   
            Daniel Guidotti and   
              Sufian Mitani and   
                 Gee-Kung Chang   Latency performance analysis of low
                                  layers function split for URLLC
                                  applications in $5$G networks  . . . . . Article 106865
                      Anonymous   Editorial Board  . . . . . . . . . . . . Article 106911
                      Anonymous   Publisher Note . . . . . . . . . . . . . Article 106912
             K. Tolga Bagci and   
                A. Murat Tekalp   SDN-enabled distributed open exchange:
                                  Dynamic QoS-path optimization in
                                  multi-operator services  . . . . . . . . Article 106845
             Rihab Boussada and   
             Balkis Hamdane and   
 Mohamed Elhoucine Elhdhili and   
            Leila Azouz Saidane   Privacy-preserving aware data
                                  transmission for IoT-based e-health  . . Article 106866
    Alberto Attilio Brincat and   
             Alfio Lombardo and   
           Giacomo Morabito and   
          Salvatore Quattropani   On the use of Blockchain technologies in
                                  WiFi networks  . . . . . . . . . . . . . Article 106855
       Premkumar Chithaluru and   
              Rajeev Tiwari and   
                    Kamal Kumar   AREOR --- Adaptive ranking based energy
                                  efficient opportunistic routing scheme
                                  in Wireless Sensor Network . . . . . . . Article 106863
     Mahya Mohammadi Golchi and   
            Shideh Saraeian and   
              Mehrnoosh Heydari   A hybrid of firefly and improved
                                  particle swarm optimization algorithms
                                  for load balancing in cloud
                                  environments: Performance evaluation . . Article 106860
           Miros\law Kantor and   
            Edyta Biernacka and   
              Piotr Bory\lo and   
            Jerzy Dom\.za\l and   
           Piotr Jurkiewicz and   
        Mi\losz Stypi\'nski and   
           Robert Wójcik   A survey on multi-layer IP and optical
                                  Software-Defined Networks  . . . . . . . Article 106844
         M. Khalily-Dermany and   
        M. J. Nadjafi-Arani and   
                    S. Doostali   Combining topology control and network
                                  coding to optimize lifetime in
                                  wireless-sensor networks . . . . . . . . Article 106859
          Morteza Kheirkhah and   
                Ian Wakeman and   
                 George Parisis   Multipath transport and packet spraying
                                  for efficient data delivery in data
                                  centres  . . . . . . . . . . . . . . . . Article 106852
                Mira Morcos and   
             Jocelyne Elias and   
            Fabio Martignon and   
              Tijani Chahed and   
                       Lin Chen   On efficient radio resource calendaring
                                  in cloud radio access network  . . . . . Article 106862
                Seungmin Oh and   
              Hyunchong Cho and   
                Sang-Ha Kim and   
                Wanseop Lee and   
                     Euisin Lee   Continuous object tracking protocol with
                                  selective wakeup based on practical
                                  boundary prediction in wireless sensor
                                  networks . . . . . . . . . . . . . . . . Article 106854
          Andrea Pimpinella and   
   Alessandro E. C. Redondi and   
                  Matteo Cesana   Walk this way! An IoT-based urban
                                  routing system for smart cities  . . . . Article 106857
                  S. Sicari and   
                A. Rizzardi and   
                    G. Piro and   
           A. Coen-Porisini and   
                   L. A. Grieco   Beyond the smart things: Towards the
                                  definition and the performance
                                  assessment of a secure architecture for
                                  the Internet of Nano-Things  . . . . . . Article 106856
         Mohammad M. Tajiki and   
          Mohammad Shojafar and   
              Behzad Akbari and   
            Stefano Salsano and   
                Mauro Conti and   
                 Mukesh Singhal   Joint failure recovery, fault
                                  prevention, and energy-efficient
                                  resource management for real-time SFC in
                                  fog-supported SDN  . . . . . . . . . . . Article 106850
                     An Xie and   
               Huawei Huang and   
             Xiaoliang Wang and   
                   Song Guo and   
              Zhuzhong Qian and   
                      Sanglu Lu   Dual: Deploy stateful virtual network
                                  function chains by jointly allocating
                                  data-control traffic . . . . . . . . . . Article 106868
                   Yan Yang and   
                    Xia Yin and   
                Xingang Shi and   
              Zhiliang Wang and   
                   Jiong He and   
               Tom Z. J. Fu and   
              Marianne Winslett   Inter-domain routing bottlenecks and
                                  their aggravation  . . . . . . . . . . . Article 106839
                   Yinbo Yu and   
                    Xing Li and   
                     Kai Bu and   
                   Yan Chen and   
                  Jianfeng Yang   Falcon: Differential fault localization
                                  for SDN control plane  . . . . . . . . . Article 106851
                  Rui Zhang and   
                   Peng Xie and   
                  Chen Wang and   
                Gaoyang Liu and   
                    Shaohua Wan   Classifying transportation mode and
                                  speed from trajectory data via deep
                                  multi-scale learning . . . . . . . . . . Article 106861
            Shunliang Zhang and   
              Yongming Wang and   
                    Weihua Zhou   Towards secure $5$G networks: a survey   Article 106871
                 Bobai Zhao and   
                   Dali Zhu and   
                    Tong Xi and   
              Chenggang Jia and   
                Shang Jiang and   
                      Siye Wang   Convolutional neural network and
                                  dual-factor enhanced variational Bayes
                                  adaptive Kalman filter based indoor
                                  localization with Wi-Fi  . . . . . . . . Article 106864


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 163, Number ??, 2019

             Dilara Akdogan and   
      Duygu Karaoglan Altop and   
                    Albert Levi   Secure key agreement based on ordered
                                  biometric features . . . . . . . . . . . Article 106885
                      Anonymous   Editorial Board  . . . . . . . . . . . . Article 106931
                   O. Arana and   
                  F. Garcia and   
                       J. Gomez   Analysis of the effectiveness of
                                  transmission power control as a location
                                  privacy technique  . . . . . . . . . . . Article 106880
               Amel Arfaoui and   
               Ali Kribeche and   
      Sidi Mohammed Senouci and   
                  Mohamed Hamdi   Game-based adaptive anomaly detection in
                                  wireless body area networks  . . . . . . Article 106870
       Hassan Jameel Asghar and   
     Emiliano De Cristofaro and   
          Guillaume Jourjon and   
        Mohammed Ali Kaafar and   
              Laurent Mathy and   
                 Luca Melis and   
              Craig Russell and   
                        Mang Yu   Fast privacy-preserving network function
                                  outsourcing  . . . . . . . . . . . . . . Article 106893
               Amira Chriki and   
               Haifa Touati and   
             Hichem Snoussi and   
                  Farouk Kamoun   FANET: Communication, mobility models
                                  and security issues  . . . . . . . . . . Article 106877
      Mohamed Mostafa Fouad and   
        Ahmed Ibrahem Hafez and   
           Aboul Ella Hassanien   Optimizing topologies in wireless sensor
                                  networks: a comparative analysis between
                                  the Grey Wolves and the Chicken Swarm
                                  Optimization algorithms  . . . . . . . . Article 106882
     Bala Prakasa Rao Killi and   
     Seela Veerabhadreswara Rao   Controller placement in software defined
                                  networks: a comprehensive survey . . . . Article 106883
               Yeonkeun Kim and   
                Jaehyun Nam and   
               Taejune Park and   
       Sandra Scott-Hayward and   
                  Seungwon Shin   SODA: a software-defined security
                                  framework for IoT environments . . . . . Article 106889
              Shuangjuan Li and   
                      Hong Shen   Minimizing maximum movement of sensors
                                  for line barrier coverage in the plane   Article 106841
                Jinting Lin and   
                    Lin Cui and   
              Yuxiang Zhang and   
                Fung Po Tso and   
                  Quanlong Guan   Extensive evaluation on the performance
                                  and behaviour of TCP congestion control
                                  protocols under varied network scenarios Article 106872
              Edoardo Longo and   
   Alessandro E. C. Redondi and   
                  Matteo Cesana   Accurate occupancy estimation with WiFi
                                  and bluetooth/BLE packet capture . . . . Article 106876
            Mohsen Mahmoudi and   
                 Karim Faez and   
             Abdorasoul Ghasemi   Uncoordinated frequency hopping scheme
                                  for defense against primary user
                                  emulation attack in cognitive radio
                                  networks . . . . . . . . . . . . . . . . Article 106884
            Hassan N. Noura and   
                 Reem Melki and   
             Mohammad Malli and   
                     Ali Chehab   Design and realization of efficient and
                                  secure multi-homed systems based on
                                  random linear network coding . . . . . . Article 106886
        Roberto M. Oliveira and   
       Lucas G. de Oliveira and   
             Alex B. Vieira and   
              Moises V. Ribeiro   An enhanced cooperative MAC protocol for
                                  hybrid PLC/wireless systems  . . . . . . Article 106878
               Saniya Zafar and   
            Rasheed Hussain and   
             Fatima Hussain and   
                 Sobia Jangsher   Interplay between Big Spectrum Data and
                                  Mobile Internet of Things: Current
                                  solutions and future challenges  . . . . Article 106879


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 164, Number ??, December 9, 2019

                      Anonymous   9 December 2019  . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . Article 106964
                  Hongli Xu and   
               Jianchun Liu and   
                  Chen Qian and   
                   He Huang and   
                  Chunming Qiao   Reducing controller response time with
                                  hybrid routing in software defined
                                  networks . . . . . . . . . . . . . . . . Article 106891
                 Chunlin Li and   
              Jianhang Tang and   
                 Yang Zhang and   
                    Xin Yan and   
                    Youlong Luo   Energy efficient computation offloading
                                  for nonorthogonal multiple access
                                  assisted mobile edge computing with
                                  energy harvesting devices  . . . . . . . Article 106890
              Pinaki Sarkar and   
                  Sukumar Nandi   A class of key-node indexed hash chains
                                  based key predistribution (KPS): Signed
                                  weighted graphs  . . . . . . . . . . . . Article 106881
     Oluwatosin Ahmed Amodu and   
             Mohamed Othman and   
       Nor Kamariah Noordin and   
                  Idawaty Ahmad   Transmission capacity analysis of
                                  relay-assisted D2D cellular networks
                                  with M2M coexistence . . . . . . . . . . Article 106887
                  Wenjun Li and   
                  Dagang Li and   
                 Xinwei Liu and   
                 Ting Huang and   
                Xianfeng Li and   
                  Wenxia Le and   
                         Hui Li   A power-saving pre-classifier for
                                  TCAM-based IP lookup . . . . . . . . . . Article 106898
             Chi-Dung Phung and   
        Benevid Felix Silva and   
           Michele Nogueira and   
                  Stefano Secci   MPTCP robustness against large-scale
                                  man-in-the-middle attacks  . . . . . . . Article 106896
                  Yuki Goto and   
                   Bryan Ng and   
         Winston K. G. Seah and   
               Yutaka Takahashi   Queueing analysis of software defined
                                  network with realistic OpenFlow-based
                                  switch model . . . . . . . . . . . . . . Article 106892
          Zakarya Benyamina and   
           Khelifa Benahmed and   
                 Fateh Bounaama   ANEL: a novel efficient and lightweight
                                  authentication scheme for vehicular ad
                                  hoc networks . . . . . . . . . . . . . . Article 106899
                Mauro Conti and   
            Muhammad Hassan and   
                    Chhagan Lal   BlockA\em uth: BlockChain based
                                  distributed producer authentication in
                                  ICN  . . . . . . . . . . . . . . . . . . Article 106888
                   Xia Wang and   
                    Jia Liu and   
                Yanyan Wang and   
                Xingyu Chen and   
                     Lijun Chen   Efficient missing tag identification in
                                  blocker-enabled RFID systems . . . . . . Article 106894
              Mennan Selimi and   
   Adisorn Lertsinsrubtavee and   
        Arjuna Sathiaseelan and   
Llorenç Cerd\`a-Alabern and   
                Leandro Navarro   PiCasso: Enabling information-centric
                                  multi-tenancy at the edge of community
                                  mesh networks  . . . . . . . . . . . . . Article 106897
  Mohammad Noormohammadpour and   
           Srikanth Kandula and   
     Cauligi S. Raghavendra and   
                     Sriram Rao   Efficient inter-datacenter bulk
                                  transfers with mixed completion time
                                  objectives . . . . . . . . . . . . . . . Article 106903
                 Yuqing Qiu and   
           Chung-Horng Lung and   
               Samuel Ajila and   
             Pradeep Srivastava   Experimental evaluation of LXC container
                                  migration for cloudlets using multipath
                                  TCP  . . . . . . . . . . . . . . . . . . Article 106900
               Niezi Mharsi and   
                 Makhlouf Hadji   Edge computing optimization for
                                  efficient RRH--BBU assignment in cloud
                                  radio access networks  . . . . . . . . . Article 106901
                  G. Rajesh and   
             Ashvini Chaturvedi   Correlation analysis and statistical
                                  characterization of heterogeneous sensor
                                  data in environmental sensor networks    Article 106902
                    Tuan Le and   
                    Mario Gerla   Fragmented data routing based on
                                  exponentially distributed contacts and
                                  inter-contact times in DTNs  . . . . . . Article 106917
       Antoine Saverimoutou and   
           Bertrand Mathieu and   
                 Sandrine Vaton   A $6$-month analysis of factors
                                  impacting web browsing quality for QoE
                                  prediction . . . . . . . . . . . . . . . Article 106905
                David Eugui and   
José Alberto Hernández   Analysis of a hybrid Fixed-Elastic DBA
                                  with guaranteed fronthaul delay in
                                  XG(s)-PONs . . . . . . . . . . . . . . . Article 106907
  Madhukrishna Priyadarsini and   
      Joy Chandra Mukherjee and   
           Padmalochan Bera and   
             Shailesh Kumar and   
           A. H. M. Jakaria and   
              M. Ashiqur Rahman   An adaptive load balancing scheme for
                                  software-defined network controllers . . Article 106918
               Xiaoyu Liang and   
                    Taieb Znati   On the performance of intelligent
                                  techniques for intensive and stealthy
                                  DDos detection . . . . . . . . . . . . . Article 106906
          Syed Hassan Ahmed and   
          Ali Kashif Bashir and   
                Awais Ahmad and   
                   Wael Guibene   Computer networks special issue on
                                  intelligent and connected transportation
                                  systems  . . . . . . . . . . . . . . . . Article 106895
                Seungmin Oh and   
              Hyunchong Cho and   
                Sang-Ha Kim and   
                Wanseop Lee and   
                     Euisin Lee   Corrigendum to ``Continuous object
                                  tracking protocol with selective wakeup
                                  based on practical boundary prediction
                                  in wireless sensor networks'' Computer
                                  Networks Volume \bf 162 (2019) 106854    Article 106938


Computer Networks (Amsterdam, Netherlands: 1999)
Volume 165, Number ??, December 24, 2019

                      Anonymous   24 December 2019 . . . . . . . . . . . . ??
                      Anonymous   Editorial Board  . . . . . . . . . . . . Article 107000
                      Anonymous   Publisher Note . . . . . . . . . . . . . Article 107001
             Alperen Eroglu and   
                 Okan Yaman and   
                     Ertan Onur   Density-aware cellular coverage control:
                                  Interference-based density estimation    Article 106922
                   Qiyue Wu and   
                   Peng Sun and   
             Azzedine Boukerche   Unmanned aerial vehicle-assisted
                                  energy-efficient data collection scheme
                                  for sustainable wireless sensor networks Article 106927
José Maurício Costa and   
           Pedro P. Paniago and   
         Joaquim de Andrade and   
          Thiago F. Noronha and   
            Marcos A. M. Vieira   Integer linear programming formulations
                                  for the variable data rate and variable
                                  channel bandwidth scheduling problem in
                                  wireless networks  . . . . . . . . . . . Article 106939
             Vineet Gokhale and   
          Jayakrishnan Nair and   
         Subhasis Chaudhuri and   
                       Jan Fesl   On QoS-compliant telehaptic
                                  communication over shared networks . . . Article 106935
     Muhammad Rizwan Asghar and   
                  Qinwen Hu and   
               Sherali Zeadally   Cybersecurity in industrial control
                                  systems: Issues, technologies, and
                                  challenges . . . . . . . . . . . . . . . Article 106946
                    Ze Yang and   
                  Kwan L. Yeung   Minimum weight controller tree design in
                                  SDN  . . . . . . . . . . . . . . . . . . Article 106949
             Giuseppe Aceto and   
           Domenico Ciuonzo and   
           Antonio Montieri and   
              Antonio Pescap\`e   MIMETIC: Mobile encrypted traffic
                                  classification using multimodal deep
                                  learning . . . . . . . . . . . . . . . . Article 106944
                  Lav Gupta and   
                Tara Salman and   
            Maede Zolanvari and   
                Aiman Erbad and   
                       Raj Jain   Fault and performance management in
                                  multi-cloud virtual network services
                                  using AI: a tutorial and a case study    Article 106950
        Ado Adamou Abba Ari and   
           Abdelhak Gueroui and   
             Chafiq Titouna and   
             Ousmane Thiare and   
                Zibouda Aliouat   Resource allocation scheme for $5$G
                                  C-RAN: a Swarm Intelligence based
                                  approach . . . . . . . . . . . . . . . . Article 106957
        Miguel López and   
            Alberto Peinado and   
            Andrés Ortiz   An extensive validation of a SIR
                                  epidemic model to study the propagation
                                  of jamming attacks against IoT wireless
                                  networks . . . . . . . . . . . . . . . . Article 106945
                 Sa'ed Abed and   
        Mohammad Al-Shayeji and   
                  Fahad Ebrahim   A secure and energy-efficient platform
                                  for the integration of Wireless Sensor
                                  Networks and Mobile Cloud Computing  . . Article 106956
            Faria Khandaker and   
             Sharief Oteafy and   
        Hossam S. Hassanein and   
                 Hesham Farahat   A functional taxonomy of caching
                                  schemes: Towards guided designs in
                                  information-centric networks . . . . . . Article 106937
              Hye-Rim Cheon and   
                   Jae-Hyun Kim   Social-aware mobile data offloading
                                  algorithm through small cell backhaul
                                  network: Direct and indirect user
                                  influence perspectives . . . . . . . . . Article 106951
            H. -F. Bermudez and   
       J. -M. Martinez-Caro and   
          R. Sanchez-Iborra and   
           J. L. Arciniegas and   
                    M. -D. Cano   Live video-streaming evaluation using
                                  the ITU-T P.1203 QoE model in LTE
                                  networks . . . . . . . . . . . . . . . . Article 106967
                 Siyuan Jia and   
             Matthew Luckie and   
           Bradley Huffaker and   
           Ahmed Elmokashfi and   
                 Emile Aben and   
            Kimberly Claffy and   
                Amogh Dhamdhere   Tracking the deployment of IPv6:
                                  Topology, routing and performance  . . . Article 106947