Path selection for quantum repeater networks Rodney Van MeterTakahiko SatohKae Nemoto Research Article 15 December 2013 Pages: 82 - 95
A conceptual framework for the design of IoT architectures that support end-user development Irene MavrommatiGeorge BirbilisJohn Darzentas Research Article 15 December 2013 Pages: 71 - 81
Optimal 1-coverage by homogeneous mobile sensor nodes using hexagonal scheme Ganala SantoshiR. J. D’Souza Research Article 16 February 2014 Pages: 96 - 107
Discovering the geographic properties of the Internet AS-level topology Enrico GregoriAlessandro ImprotaLuca Sani Research Article 15 November 2013 Pages: 34 - 42
Diffusion of real-time information in overlaying social-physical networks: Network coupling and clique structure Dajun QianOsman YağanKai Xing Research Article 15 October 2013 Pages: 43 - 53
Towards realistic modeling of IP-level routing topology dynamics Clémence MagnienAmélie MedemFabien Tarissan Research Article 15 October 2013 Pages: 24 - 33
Improving medication adherence in home care using a bidirectional medication assistance system Shiori SuzukiJin MitsugiJun Murai Research Article 15 August 2013 Pages: 63 - 70
IDS for ARP spoofing using LTL based discrete event system framework Mahasweta MitraPrithu BanerjeeSukumar Nandi Research Article 18 July 2013 Pages: 114 - 134
Detection of neighbor discovery protocol based attacks in IPv6 network Ferdous A. BarbhuiyaGunjan BansalSukumar Nandi Research Article 18 July 2013 Pages: 91 - 113
Introduction to the special issue on Next Generation Network Architectures, Protocols, Theory, Systems and Applications Mehmet A. OrgunJosef PieprzykHuaxiong Wang Editorial 18 July 2013 Pages: 67 - 68
On link encryption against wiretapping attack in network coding Zhaohui Tang Research Article 23 May 2013 Pages: 81 - 90
The structure and traffic flow anatomy of the planet-scale urban vehicular mobility Gautam S. ThakurPan HuiAhmed Helmy Research Article 15 May 2013 Pages: 13 - 23
Heterogeneous MAC duty-cycling for energy-efficient Internet of Things deployments Julien BeaudauxAntoine GallaisThomas Noël Research Article 15 April 2013 Pages: 54 - 62
Fighting spam using social GateKeepers Sufian HameedXiaoming FuPan Hui Research Article 02 April 2013 Pages: 28 - 41
On the choice of a spanning tree for greedy embedding of network graphs Andrej CvetkovskiMark Crovella Research Article 15 February 2013 Pages: 2 - 12
Generating attack scenarios for the system security validation Anderson MoraisIksoon HwangEliane Martins Research Article 27 December 2012 Pages: 69 - 80
A mobility model for shopping mall environments founded on real traces Adriano GalatiKarim DjemameChris Greenhalgh Research Article 08 November 2012 Pages: 1 - 11
Mobility aware distributed diagnosis of mobile ad hoc sensor networks Arunanshu MahapatroPabitra Mohan Khilar Research Article 11 October 2012 Pages: 52 - 65
A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications Ashok Kumar Das Research Article 02 July 2012 Pages: 12 - 27
An adaptive probabilistic marking scheme for fast and secure traceback Hongcheng TianJun BiXiaoke Jiang Research Article 22 March 2012 Pages: 42 - 51
Radio resources management in green femtocell networks Kaouthar SethomFadoua MhiriRidha Bouallegue Research Article 11 April 2012 Pages: 34 - 38
Internet resource pricing models, mechanisms, and methods Huan HeKe XuYing Liu Survey Article 29 December 2011 Pages: 48 - 66
Flexible integration of tunneling and translation for IPv6 transition Peng WuYong CuiChris Metz Research Article 29 December 2011 Pages: 23 - 33
Exploring the stratified shortest-paths problem Timothy G. Griffin Research Article 04 November 2011 Pages: 2 - 14
The K-observer problem in computer networks Hrishikesh B. AcharyaTaehwan ChoiMohamed G. Gouda Research Article 18 August 2011 Pages: 15 - 22
Rotation based secure multicast key management for batch rekeying operations P. VijayakumarS. BoseA. Kannan Research Article 28 July 2011 Pages: 39 - 47