default search action
IEEE Network, Volume 30
Volume 30, Number 1, January - February 2016
- Nei Kato:
On cloud computing [Editor's Note]. 2 - Song Guo, Shui Yu, Jie Li, Nirwan Ansari:
Big data for networking [Guest Editorial]. 4-5 - Bo Fan, Supeng Leng, Kun Yang:
A dynamic bandwidth allocation algorithm in mobile networks with big data of users and networks. 6-10 - Eleni Stai, Vasileios Karyotis, Symeon Papavassiliou:
A hyperbolic space analytics framework for big network data and their applications. 11-17 - Chengchen Hu, Hao Li, Yuming Jiang, Yu Cheng, Poul E. Heegaard:
Deep semantics inspection over big network data at wire speed. 18-23 - Mauro De Sanctis, Igor Bisio, Giuseppe Araniti:
Data mining algorithms for communication networks control: concepts, survey and guidelines. 24-29 - Liwei Kuang, Laurence T. Yang, Xiaokang Wang, Puming Wang, Yaliang Zhao:
A tensor-based big data model for QoS improvement in software defined networks. 30-35 - Kun Wang, Yun Shao, Lei Shu, Chunsheng Zhu, Yan Zhang:
Mobile big data fault-tolerant processing for ehealth networks. 36-42 - Kan Zheng, Zhe Yang, Kuan Zhang, Periklis Chatzimisios, Kan Yang, Wei Xiang:
Big data-driven optimization for mobile networks toward 5G. 44-51 - Zhou Su, Qichao Xu, Qifan Qi:
Big data in mobile social networks: a QoE-oriented framework. 52-57 - Laizhong Cui, F. Richard Yu, Qiao Yan:
When big data meets software-defined networking: SDN for big data and big data for SDN. 58-65 - Nirwan Ansari, Tao Han:
Freenet: Spectrum and energy harvesting wireless networks. 66-71 - You Wang, Jun Bi, Athanasios V. Vasilakos:
An identifier-based approach to internet mobility: a survey. 72-79 - Lorenzo Carla, Romano Fantacci, Francesco Gei, Dania Marabissi, Luigia Micciullo:
LTE enhancements for public safety and security communications to support group multimedia communications. 80-85 - Toshikazu Sakano, Satoshi Kotabe, Tetsuro Komukai, Tomoaki Kumagai, Yoshitaka Shimizu, Atsushi Takahara, Thuan Ngo, Zubair Md. Fadlullah, Hiroki Nishiyama, Nei Kato:
Bringing movable and deployable networks to disaster areas: development and field test of MDRU. 86-91 - Lingyang Song, Xiang Cheng, Minghua Chen, Shengli Zhang, Ying Jun Zhang:
Coordinated device-to-device local area networks: the approach of the China 973 project D2D-LAN. 92-99 - Zubair Md. Fadlullah, Daisuke Takaishi, Hiroki Nishiyama, Nei Kato, Ryu Miura:
A dynamic trajectory control algorithm for improving the communication throughput and delay in UAV-aided networks. 100-105 - Sachin Sharma, Dimitri Staessens, Didier Colle, Mario Pickavet, Piet Demeester:
In-band control, queuing, and failure recovery functionalities for openflow. 106-112
Volume 30, Number 2, March - April 2016
- Nei Kato:
On 5G wireless systems [Editor's Note]. 2-3 - Matthew Andrews, Mung Chiang, Sangtae Ha, Jianwei Huang, Soumya Sen:
Innovation in network pricing [Guest Editorial]. 4-5 - Eran Simhon, David Starobinski:
A game-theoretic perspective on advance reservations. 6-11 - Xin Wang, Richard T. B. Ma, Yinlong Xu:
The role of data cap in two-part pricing under market competition. 12-17 - Dusit Niyato, Dinh Thai Hoang, Nguyen Cong Luong, Ping Wang, Dong In Kim, Zhu Han:
Smart data pricing models for the internet of things: a bundling strategy approach. 18-25 - Hassan Habibi Gharakheili, Arun Vishwanath, Vijay Sivaraman:
An economic model for a new broadband ecosystem based on fast and slow lanes. 26-31 - Fraida Fund, S. Amir Hosseini, Shivendra S. Panwar:
Under a cloud of uncertainty: legal questions affecting internet storage and transmission of copyright-protected video content. 32-38 - Yong Li, Fengli Xu:
Trace-driven analysis for location-dependent pricing in mobile cellular networks. 40-45 - Tamer Abdelkader, Kshirasagar Naik, Amiya Nayak, Nishith Goel, Vineet Srivastava:
A performance comparison of delay-tolerant network routing protocols. 46-53 - Enzo Baccarelli, Nicola Cordeschi, Alessandro Mei, Massimo Panella, Mohammad Shojafar, Julinda Stefa:
Energy-efficient dynamic traffic offloading and reconfiguration of networked data centers for big data stream mobile computing: review, challenges, and a case study. 54-61 - Heng Zhang, Yuanchao Shu, Peng Cheng, Jiming Chen:
Privacy and performance trade-off in cyber-physical systems. 62-66 - Yong Cui, Lian Wang, Xin Wang, Yisen Wang, Fengyuan Ren, Shu-Tao Xia:
End-to-end coding for TCP. 68-73 - Huacheng Zeng, Feng Tian, Y. Thomas Hou, Wenjing Lou, Scott F. Midkiff:
Interference alignment for multihop wireless networks: challenges and research directions. 74-80 - Haojun Huang, Hao Yin, Yan Luo, Xu Zhang, Geyong Min, Qilin Fan:
Three-dimensional geographic routing in wireless mobile ad hoc and sensor networks. 82-90 - Marica Amadeo, Claudia Campolo, José Quevedo, Daniel Corujo, Antonella Molinaro, Antonio Iera, Rui L. Aguiar, Athanasios V. Vasilakos:
Information-centric networking for the internet of things: challenges and opportunities. 92-100 - Ke Xu, Yi Qu, Kun Yang:
A tutorial on the internet of things: from a heterogeneous network integration perspective. 102-108 - Faqir Zarrar Yousaf, Tarik Taleb:
Fine-grained resource-aware virtual network function management for 5G carrier cloud. 110-115 - Haijun Zhang, Chunxiao Jiang, Rose Qingyang Hu, Yi Qian:
Self-organization in disaster-resilient heterogeneous small cell networks. 116-121 - Li Wang, Gordon L. Stüber:
Pairing for resource sharing in cellular device-to-device underlays. 122-128
Volume 30, Number 3, May - June 2016
- Nei Kato:
On device-to-device (D2D) communication [Editor's note]. 2 - Jun Guo, Mischa Dohler, Whoi-Yul Kim, Ah Chung Tsoi, Kan Zheng:
Mobile big data [Guest editorial]. 4-5 - Fengli Xu, Yong Li, Min Chen, Sheng Chen:
Mobile cellular big data: linking cyberspace and the physical world with social ecology. 6-12 - Yuanyuan Qiao, Xiao-Xing Zhao, Jie Yang, Jiajia Liu:
Mobile big-data-driven rating framework: measuring the relationship between human mobility and app usage behavior. 14-21 - Mohammad Abu Alsheikh, Dusit Niyato, Shaowei Lin, Hwee-Pink Tan, Zhu Han:
Mobile big data analytics using deep learning and apache spark. 22-29 - Wei Xiang, Gengkun Wang, Mark Pickering, Yongbing Zhang:
Big video data for light-field-based 3D telemedicine. 30-38 - Jun Bi, Shuyong Zhu, Chen Sun, Guang Yao, Hongxin Hu:
Supporting virtualized network functions with stateful data plane abstraction. 40-45 - Hongke Zhang, Wei Quan, Han-Chieh Chao, Chunming Qiao:
Smart identifier network: A collaborative architecture for the future internet. 46-51 - Ian F. Akyildiz, Ahyoung Lee, Pu Wang, Min Luo, Wu Chou:
Research challenges for traffic engineering in software defined networks. 52-58 - An-Dee Lin, Hubertus Franke, Chung-Sheng Li, Wanjiun Liao:
Toward performance optimization with CPU offloading for virtualized multi-tenant data center networks. 59-63 - Ming Zhu, Jiannong Cao, Zhiping Cai, Zongjian He, Ming Xu:
Providing flexible services for heterogeneous vehicles: an NFV-based approach. 64-71 - Carla Mouradian, Tonmoy Saha, Jagruti Sahoo, Mohammad Abu-Lebdeh, Roch H. Glitho, Monique Morrow, Paul A. Polakos:
Network functions virtualization architecture for gateways for virtualized wireless sensor and actuator networks. 72-80 - Zilong Ye, Xiaojun Cao, Jianping Wang, Hong-Fang Yu, Chunming Qiao:
Joint topology design and mapping of service function chains for efficient, scalable, and reliable network functions virtualization. 81-87 - Hossein Shokri Ghadikolaei, Carlo Fischione, Petar Popovski, Michele Zorzi:
Design aspects of short-range millimeter-wave networks: A MAC layer perspective. 88-96
Volume 30, Number 4, July - August 2016
- Nei Kato:
Statistics for the past six months [Editor's Note]. 2 - Bruno Chatras, François Frédéric Ozog:
Network functions virtualization: the portability challenge. 4-8 - Zongjian He, Jiannong Cao, Xuefeng Liu:
SDVN: enabling rapid network innovation for heterogeneous vehicular communication. 10-15 - Yong Cui, Zeqi Lai, Ningwei Dai:
A first look at mobile cloud storage services: architecture, experimentation, and challenges. 16-21 - Hassan Aboubakr Omar, Ning Lu, Weihua Zhuang:
Wireless access technologies for vehicular network safety applications. 22-26 - Jianwei Niu, Danning Wang, Milica Stojmenovic:
How does information diffuse in large recommendation social networks? 28-33 - Yuehua Wang, Yu Chen, Chuan Li, Hongwei Zhang, Jayanthi Rao, Patrick Gossman, Jing Zhu:
VLnsight: enabling open innovation in networked vehicle sensing and control. 34-44 - Mugen Peng, Shi Yan, Kecheng Zhang, Chonggang Wang:
Fog-computing-based radio access networks: issues and challenges. 46-53 - Xiaoming Li, Qing Yang, Xiaodong Lin, Shaoen Wu, Mike P. Wittie:
Itrust: interpersonal trust measurements from social interactions. 54-58 - Fei-Yue Wang, Liuqing Yang, Xiang Cheng, Shuangshuang Han, Jian Yang:
Network softwarization and parallel networks: beyond software-defined networks. 60-65 - Yao Zheng, Assad Moini, Wenjing Lou, Y. Thomas Hou, Yuichi Kawamoto:
Cognitive security: securing the burgeoning landscape of mobile networks. 66-71 - Kan Zheng, Lu Hou, Hanlin Meng, Qiang Zheng, Ning Lu, Lei Lei:
Soft-defined heterogeneous vehicular network: architecture and challenges. 72-80
Volume 30, Number 5, September - October 2016
- Nei Kato:
Challenges of anything as a service in the cloud [Editor's Note]. 2 - Xiaohua Tian:
Scanning the literature. 3 - Wenlong Shen, Bo Yin, Xianghui Cao, Lin X. Cai, Yu Cheng:
Secure device-to-device communications over WiFi direct. 4-9 - Qiang Duan, Nirwan Ansari, Mehmet Toy:
Software-defined network virtualization: an architectural framework for integrating SDN and NFV for service provisioning in future networks. 10-16 - Baochun Li, Y. Thomas Hou:
The new automated IEEE INFOCOM review assignment system. 18-24 - Qiang Liu, Xiping Hu, Edith C. H. Ngai, Min Liang, Victor C. M. Leung, Zhiping Cai, Jianping Yin:
A security patch addressing bandwidth request vulnerabilities in the IEEE 802.16 standard. 26-34 - Zhi Wang, Jiangchuan Liu, Wenwu Zhu:
Social-aware video delivery: challenges, approaches, and directions. 35-39 - Mingjie Feng, Shiwen Mao:
Harvest the potential of massive MIMO with multi-layer techniques. 40-45 - Tianyu Wang, Lingyang Song, Zhu Han, Walid Saad:
Overlapping coalition formation games for emerging communication networks. 46-53 - Wei Song, Weihua Zhuang:
Packet assignment under resource constraints with D2D communications. 54-60 - Shengling Wang, Rongfang Bie, Feng Zhao, Nan Zhang, Xiuzhen Cheng, Hyeong-Ah Choi:
Security in wearable communications. 61-67 - Zhengguo Bian, Ruhai Wang, Kanglian Zhao, Dongming Bian, Zhidong Xie, Yi Qian:
Bundle protocol for data delivery over highly asymmetric deep-space channels. 68-73 - Yulong Zou, Jia Zhu, Xuelong Li, Lajos Hanzo:
Relay selection for wireless communications against eavesdropping: a security-reliability trade-off perspective. 74-79
Volume 30, Number 6, November - December 2016
- Nei Kato:
Mobile Social Networks: Prospects and Challenges. 2 - Xiaodong Lin, Kim-Kwang Raymond Choo, Ying-Dar Lin, Peter Mueller:
Guest Editorial: Network Forensics and Surveillance for Emerging Networks. 4-5 - Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Ahmed Abdelaziz, Kwangman Ko, Muhammad Khurram Khan, Mohsen Guizani:
Software-Defined Network Forensics: Motivation, Potential Locations, Requirements, and Challenges. 6-13 - Krzysztof Cabaj, Wojciech Mazurczyk:
Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall. 14-20 - Taejin Ha, Seunghyun Yoon, Aris Cahyadi Risdianto, JongWon Kim, Hyuk Lim:
Suspicious Flow Forwarding for Multiple Intrusion Detection Systems on Software-Defined Networks. 22-27 - Peng Zhang, Huanzhao Wang, Chengchen Hu, Chuang Lin:
On Denial of Service Attacks in Software Defined Networks. 28-33 - Ana Nieto, Rodrigo Roman, Javier López:
Digital Witness: Safeguarding Digital Evidence by Using Secure Architectures in Personal Devices. 34-41 - Seon-Ho Shin, Jooyoung Lee, Ji-Man Jeong, HyunBong Kim, Jong-Hyun Kim, Ikkyun Kim, MyungKeun Yoon:
PrIDE: A Protocol-Independent De-Duplication Engine for Packet Recording. 42-48 - Kun Wang, Miao Du, Yanfei Sun, Alexey V. Vinel, Yan Zhang:
Attack Detection and Distributed Forensics in Machine-to-Machine Networks. 49-55 - Jiajia Liu, Zhihong Liu, Yong Zeng, Jianfeng Ma:
Cooperative Jammer Placement for Physical Layer Security Enhancement. 56-61 - Rong Yu, Yan Zhang, Yi Liu, Stein Gjessing, Mohsen Guizani:
Securing Cognitive Radio Networks against Primary User Emulation Attacks. 62-69 - Peican Zhu, Jie Han, Yangming Guo, Fabrizio Lombardi:
Reliability and Criticality Analysis of Communication Networks by Stochastic Computation. 70-76 - Lifang Feng, Rose Qingyang Hu, Jianping Wang, Peng Xu, Yi Qian:
Applying VLC in 5G Networks: Architectures and Key Technologies. 77-83 - Tarik Taleb, Adlen Ksentini, Riku Jäntti:
"Anything as a Service" for 5G Mobile Systems. 84-91 - Jia Peng, Yanmin Zhu, Wei Shu, Min-You Wu:
Behavior Dynamics of Multiple Crowdsourcers in Mobile Crowdsourcing Markets. 92-96
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.