Journal Contents: International Journal of Business Data Communications and Networking (IJBDCN)

Volume 14 (2018)
Issue 1
Article 1
Vertical Handover Decision Schemes in Fourth Generation Heterogeneous Cellular Networks: A Comprehensive Study (pages 1-26)
Adnan Mahmood (Faculty of Computer and Information Technology, Al-Madinah International University, Malaysia & Faculty of Engineering, Universiti Malaysia Sarawak, Malaysia), Shadi M. S. Hilles (Faculty of Computer and Information Technology, Al-Madinah International University, Malaysia), Hushairi Zen (Faculty of Engineering, Universiti Malaysia Sarawak, Malaysia)
Article 2
KDSR: A Scalable Key Distribution Protocol to Secure Multi-Hop Routing in Large-Scale Wireless Sensor Networks (pages 27-45)
Abderrahmen Guermazi (Higher Institute of Technological Studies, University of Sfax, Sfax, Tunisia), Abdelfettah Belghith (Department of Computer Science, King Saud University, Riyadh, Saudi Arabia), Mohamed Abid (Computer Embedded Ssytems (CES) Laboratory, National School of Engineers of Sfax, Sfax, Tunisia)
Article 3
Ant Based Adaptive Directional Monitoring MAC Protocol Using Smart Antennas in MANET (pages 46-66)
Sadanand Inamdar (Siddaganga Institute of Technology (SIT), Tumkur, India), B. Sathish Babu (Siddaganga Institute of Technology (SIT), Tumkur, India), Ravi Yadahalli (S. G. Balekundri Institute of Technology, Belagavi, India)
Article 4
Stakeholder Perceptions and Word-of-Mouth on CSR Dynamics: A Big Data Analysis from Twitter (pages 67-80)
Andrée Marie López-Fernández (Universidad Panamericana, Mexico City, Mexico), Zamira Burgos Silva (Medstent, S.A. de C.V., Mexico City, Mexico)
Article 5
Need of Algorithm Selection in Next Generation Optical Networks (pages 81-92)
P. Selvaraj (IT Department, SRM University, Chennai, India), V. Nagarajan (SRM University, Chennai, India)
Volume 13 (2017)
Issue 1
Special Issue on “Computers and Management”
Guest Editorial Preface
C. P. Gupta (Department of Computer Engineering, Rajasthan Technical University, Kota, India), Nishtha Kesswani (Central University of Rajasthan, Ajmer, India)
Article 1
MAQ: A Mobile Agent Based Quality of Service Platform for MANETs (pages 1-8)
Mamata Rath (C.V.Raman College of Engineering (Information Technology), Bhubaneswar, India), Binod Kumar Pattanayak (Department of Computer Science and Engineering, Siksha ‘O' Anusandhan University, Bhubaneswar, India)
Article 2
A Survey on Synchronization Approach in MAC Layer Protocols (pages 9-27)
Manali Chandnani (Government Mahila Engineering College, Ajmer, India), Mukesh Kumar Khandelwal (Government Mahila Engineering College, Ajmer, India), Meeta Sharma (Government Mahila Engineering College, Ajmer, India)
Article 3
Secure Buffer-Based Routing Protocol for WMN (pages 28-44)
Geetanjali Rathee (Department of Computer Science and Engineering, Jaypee University of Information Technology, Waknaghat, India), Hemraj Saini (Department of Computer Science and Engineering, Jaypee University of Information Technology, Waknaghat, India)
Article 4
Performance Evaluation of VM Placement Using Classical Bin Packing and Genetic Algorithm for Cloud Environment (pages 45-57)
Oshin Sharma (Department of Computer Science and Engineering, Jaypee University of Information Technology, Waknaghat, India), Hemraj Saini (Department of Computer Science and Engineering, Jaypee University of Information Technology, Waknaghat, India)
Article 5
Mathematical Model for Cyber Attack in Computer Network (pages 58-65)
Yerra Shankar Rao (Department of Mathematics, Gandhi Institute of Excellent Technocrats (GIET), Ghangapatana, India), Aswin Kumar Rauta (Department of Mathematics, S. K. C. G. Autonomous College, Paralakhemundi, India), Hemraj Saini (Department of Computer Science and Engineering, Jaypee University of Information Technology, Waknaghat, India), Tarini Charana Panda (Department of Mathematics, Ravenshaw University, Cuttack, India)
Article 6
Modification of Traditional RSA into Symmetric-RSA Cryptosystems (pages 66-73)
Prerna Mohit (Indian Institute of Technology (Indian School of Mines), Dhanbad, India), G. P. Biswas (Indian Institute of Technology (Indian School of Mines), Dhanbad, India)
Article 7
A Secure and Robust Three-Factor Based Authentication Scheme Using RSA Cryptosystem (pages 74-84)
Rifaqat Ali (Department of Computer Science and Engineering, Indian Institute of Technology (Indian School of Mines), Dhanbad, India), Arup Kumar Pal (Department of Computer Science and Engineering, Indian Institute of Technology (Indian School of Mines), Dhanbad, India)
Article 8
Cryptanalysis and Security Enhancement of Three-Factor Remote User Authentication Scheme for Multi-Server Environment (pages 85-101)
Preeti Chandrakar (Indian Institute of Technology (Indian School of Mines), Dhanbad, India), Hari Om (Indian Institute of Technology (Indian School of Mines), Dhanbad, India)
Article 9
Multi-Modal Biometric Authentication and Secure Transaction Operation Framework for E-Banking (pages 102-116)
Munish Sabharwal (School of Engineering and Technology, KITE Group of Institutions, Meerut, India)
Issue 2
Special Issue on New Techniques for Collaborative Information System and Applications
Guest Editorial Preface
Fatos Xhafa (Department of Computer Science, Technical University of Catalonia, Barcelona, Spain)
Article 1
Dynamic Combined with Static Analysis for Mining Network Protocol's Hidden Behavior (pages 1-14)
Yanjing Hu (National Key Laboratory of Integrated Services Networks, Xidian University, Xi'an, China & Key Laboratory of Network and Information Security, Engineering University of the Armed Police Force, Xi'an, China), Qingqi Pei (National Key Laboratory of Integrated Services Networks, Xidian University, Xi'an, China)
Article 2
A Minimum-Aware Container Live Migration Algorithm in the Cloud Environment (pages 15-27)
Peng Li (School of Computer Science and Jiangsu High Technology Research Key Laboratory for WSN, Nanjing University of Posts and Telecommunications, Nanjing, China), Huqing Nie (School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China), He Xu (School of Computer Science and Jiangsu High Technology Research Key Laboratory for WSN, Nanjing University of Posts and Telecommunications, Nanjing, China), Lu Dong (School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China)
Article 3
Bi-Term Topic Model for SMS Classification (pages 28-40)
Jialin Ma (The Laboratory for Internet of Things and Mobile Internet Technology of Jiangsu Province, Huaiyin Institute of Technology, Huaian, China & College of Computer and Information, Hohai University, Nanjing, China), Yongjun Zhang (Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huaian, China & College of Computer and Information, Hohai University, Nanjing, China), Lin Zhang (Faculty of Management Engineering, Huaiyin Institute of Technology, Huaian, China), Kun Yu (Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huaian, China), Jinlin Liu (Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huaian, China)
Article 4
A Special Collaborative Information System and Its Application in Kinetic Energy Impact (pages 41-54)
Wei Qi (Department of Information Engineering, Engineering University of the Armed Police Force, Xi'an, China), Hongwei Zhuang (College of Equipment Engineering, Engineering University of the Armed Police Force, Xi'an, China), Fadong Zhao (College of Equipment Engineering, Engineering University of the Armed Police Force, Xi'an, China)
Article 5
Directional AF Cooperative Communication System Based on Outage Probability (pages 55-68)
Ruilian Tan (Air Force Engineering University, Xi'an, China and Engineering University of the Armed Police Force, Xi'an, China), Zhe Li (Air Force Engineering University, Xi'an, China), Peng Bai (Air Force Engineering University, Xi'an, China), Kai Shi (The Military Representative Office of PLA, Chengdu Aircraft Industrial Company, Chengdu, China), Baoxiang Ren (Air Force Engineering University, Xi'an, China), Xuhua Wang (Air Force Engineering University, Xi'an, China)
Article 6
Indoor Localization Using the Reference Tags and Phase of Passive UHF-RFID Tags (pages 69-82)
He Xu (School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China & Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing, China), Ye Ding (School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China & Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing, China), Peng Li (School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China & Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing, China), Ruchuan Wang (School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China & Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing, China)
Article 7
An Insider Threat Detection Method Based on Business Process Mining (pages 83-98)
Taiming Zhu (Institute of Cyber Space Security, Information Engineering University, Zhengzhou, China), Yuanbo Guo (Institute of Cyber Space Security, Information Engineering University, Zhengzhou, China), Ankang Ju (Institute of Cyber Space Security, Information Engineering University, Zhengzhou, China), Jun Ma (Institute of Cyber Space Security, Information Engineering University, Zhengzhou, China), Xuan Wang (Department of Electronics Technology, Engineering University of the Armed Police Force, Xi'an, China)
Volume 12 (2016)
Issue 1
Article 1
QoS-Aware Service Selection and Multicast Framework for Wireless Mesh Networks (pages 1-15)
A. Narayana Rao (JNTU Ananthapur, Andhra Pradesh, India), Ch. D. V. Subba Rao (Sri Venkateswara University, Tirupati, India)
Article 2
Impact of Duty-Cycling: Towards Mostly-Off Sensor Networks (pages 16-35)
Nassima Bouadem (LIMED Laboratory, Faculty of Exact Sciences, University of Bejaia, 06000, Algeria), Rahim Kacimi (IRIT-UPS, University of Toulouse, France), Abdelkamel Tari (LIMED Laboratory, Faculty of Exact Sciences, University of Bejaia, 06000, Algeria)
Article 3
Analysis of IPv6 through Implementation of Transition Technologies and Security Attacks (pages 36-62)
Wael Alzaid (School of Computing, Teesside University, Middlesbrough, UK), Biju Issac (School of Computing, Teesside University, Middlesbrough, UK)
Issue 2
Special Issue on “Computational Technologies”
Guest Editorial Preface
Nishtha Kesswani (Central University of Rajasthan, Ajmer, India), Narendra Kumar Agrawal (Department of Physics, Poddar International College, Jaipur, India), Ravi Agarwal (Centre for Converging Technologies, University of Rajasthan, Jaipur, India)
Article 1
Digital and Traditional Tools for Communicating Corporate Social Responsibility: A Literature Review (pages 1-15)
Gianpaolo Tomaselli (Magna Græcia University, Catanzaro, Italy), Monia Melia (Magna Græcia University, Catanzaro, Italy), Lalit Garg (Department of Computer Information Systems, University of Malta, Msida, Malta), Vipul Gupta (Thapar University, Patiala, India), Peter Xuereb (University of Malta, Msida, Malta), Sandra Buttigieg (University of Malta, Msida, Malta)
Article 2
A Soft Computing Approach for Data Routing in Hospital Area Networks (HAN) (pages 16-27)
Rakhee (Birla Institute of Technology and Science Pilani, Hyderabad, India), M. B. Srinivas (Birla Institute of Technology and Science Pilani, Hyderabad, India)
Article 3
Improved Traceable-Resistant Efficient Authentication Schemes for Wireless Networks (pages 28-61)
Prajnamaya Dass (Department of Computer Science and Engineering, Indian School of Mines, Dhanbad, India), Pranay Kumar Saha (Department of Computer Science and Engineering, Indian School of Mines, Dhanbad, India), Hari Om (Department of Computer Science and Engineering, Indian School of Mines, Dhanbad, India)
Article 4
A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme (pages 62-79)
Preeti Chandrakar (Department of Computer Science and Engineering, Indian School of Mines, Dhanbad, India), Hari Om (Department of Computer Science and Engineering, Indian School of Mines, Dhanbad, India)
Article 5
An Improved Size Invariant (n, n) Extended Visual Cryptography Scheme (pages 80-88)
Rahul Sharma (Department of Computer Science and Engineering, Indian School of Mines, Dhanbad, India), Nitesh Kumar Agrawal (Department of Computer Science and Engineering, Indian School of Mines, Dhanbad, India), Ayush Khare (Department of Computer Science and Engineering, Indian School of Mines, Dhanbad, India), Arup Kumar Pal (Department of Computer Science and Engineering, Indian School of Mines, Dhanbad, India)
Article 6
Lightweight, ECC based RFID Authentication Scheme for WLAN (pages 89-103)
Amit Kumar (Department of Computer Science and Engineering, Indian School of Mines, Dhanbad, India), Hari Om (Department of Computer Science and Engineering, Indian School of Mines, Dhanbad, India)
Volume 11 (2015)
Issue 1
Special Issue on Computers and Management (ICCM 2015)
Guest Editorial Preface
Frank Lin (Department of Information and Decision Sciences, California State University, San Bernardino, CA, USA), Nishtha Kesswani (Central University of Rajasthan, Ajmer, India), Sanjay Kumar Garg (Central University of Rajasthan, Ajmer, India)
Article 1
Dual Transmission Power and Ant Colony Optimization based Lifespan Maximization Protocol for Sensor Networks (pages 1-14)
Rohini Sharma (School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi, India), D. K. Lobiyal (School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi, India)
Article 2
An Analysis of Factors Affecting the Adoption Intention of eLearning in India (pages 15-23)
Syed Fazal Karim (Delhi School of Management, Delhi Technological University, New Delhi, India)
Article 3
A Review on Bio-Inspired Migration Optimization Techniques (pages 24-35)
Jyotsna Verma (Department of Computer Science, Central University of Rajasthan, Ajmer, India), Nishtha Kesswani (Department of Computer Science, Central University of Rajasthan, Ajmer, India)
Article 4
A Novel Approach to Design a 4-Bit Binary Comparator Circuit with Reversible Logic using CDSM Gate (pages 36-49)
Vandana Shukla (Amity School of Engineering and Technology, Amity University Lucknow Campus, Lucknow, India), O. P. Singh (Amity School of Engineering and Technology, Amity University Lucknow Campus, Lucknow, India), G. R. Mishra (Amity School of Engineering and Technology, Amity University Lucknow Campus, Lucknow, India), R. K. Tiwari (Department of Physics and Electronics, Dr. Ram Manohar Lohia Avadh University, Faizabad, India)
Article 5
Energy Competent Routing Protocol Design in MANET with Real Time Application Provision (pages 50-60)
Mamata Rath (Department of Computer Science and Engineering, Siksha ‘O' Anusandhan University, Bhubaneswar, India), Binod Kumar Pattanayak (Department of Computer Science and Engineering, Siksha ‘O' Anusandhan University, Bhubaneswar, India), Bibudhendu Pati (Department of Computer Science and Engineering, C. V. Raman College of Engineering, Bhubaneswar, India)
Issue 2
Article 1
A Clustering Protocol for Maximum Coverage in Large-Scale Wireless Sensor Networks (pages 1-21)
Wassim Jerbi (Higher Institute of Technological Studies, Sfax, Tunisia), Abderrahmen Guermazi (Higher Institute of Technological Studies, Sfax, Tunisia), Hafedh Trabelsi (University of Sfax, Sfax, Tunisia)
Article 2
Price and Sales Volume Patterns of Mobile Handsets and Technologies (pages 22-39)
Antti Riikonen (Department of Communications and Networking, Aalto University, Espoo, Finland), Timo Smura (Verto Analytics, Espoo, Finland), Juuso Töyli (Turku School of Economics, University of Turku, Turku, Finland & Department of Communications and Networking, Aalto University, Espoo, Finland)
Article 3
Adaptive Routing for an Ad Hoc Network Based on Reinforcement Learning (pages 40-52)
Rahul Desai (Sinhgad College of Engineering, Pune, India), B.P. Patil (Army Institute of Technology, Pune University, Pune, India)
Article 4
An Efficient QoS Routing Protocol for Real Time Applications in MANET (pages 53-75)
Prakash Srivastava (Madan Mohan Malaviya University of Technology, Gorakhpur, India), Rakesh Kumar (Madan Mohan Malaviya University of Technology, Gorakhpur, India)
Volume 10 (2014)
Issue 1
Editorial Preface
Zoubir Mammeri (IRIT, Paul Sabatier University, Toulouse, France)
Article 1
An Overview of Maritime Wireless Mesh Communication Technologies and Protocols (pages 1-29)
Mohamed Manoufali (Khalifa University, Abu Dhabi, UAE), Hamada Alshaer (Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE), Peng-Yong Kong (Khalifa University, Abu Dhabi, UAE), Shihab Jimaa (Khalifa University, Abu Dhabi, UAE)
Article 2
Demand Curves and Operator Strategies in the Finnish Mobile Broadband Market (pages 30-46)
Michail Katsigiannis (Department of Communications and Networking, Aalto University, Espoo, Finland), Constantinos Valagiannopoulos (Department of Radio Science and Engineering, Aalto University, Espoo, Finland)
Article 3
A Framework to Measure and Estimate Video Quality in SVC Real-Time Adaptive Systems (pages 47-64)
Alberto Álvarez (Informatics Department, University of Oviedo, Gijón, Spain), Laura Pozueco (Informatics Department, University of Oviedo, Gijón, Spain), Sergio Cabrero (Informatics Department, University of Oviedo, Gijón, Spain), Xabiel G. Pañeda (Informatics Department, University of Oviedo, Gijón, Spain), Roberto García (Informatics Department, University of Oviedo, Gijón, Spain), David Melendi (Informatics Department, University of Oviedo, Gijón, Spain), Gabriel Díaz (Electrical and Computing Department, Spanish University for Distance Education (U.N.E.D), Madrid, Spain)
Issue 2
Article 1
A Graph Theoretic Algorithm for Virtual Network Embedding (pages 1-14)
Isha Pathak (School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi, India), Deo Prakash Vidyarthi (School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi, India)
Article 2
Mobile Agent Based Enhanced Security for Wireless Sensor Networks (pages 15-29)
D. Sheela (Department of Computer Science, PES Institute of Technology South Campus, Bangalore, India,), G. Mahadevan (Department of Computer Science and Engineering, Annai College of Engineering and Technology, Kumbakonam, India)
Article 3
A Survey on Key Management and Certificate Exchange in Mobile Adhoc Network (pages 30-46)
Saju P. John (Department of Computer Science, Thejus Engineering College, Thrissur, India), Philip Samuel (School of Engineering, Cochin University of Science and Technology, Kerala, India)
Article 4
An Energy Efficient Scheduling Manager for Cloud-Based Mobile Navigation Applications (pages 47-68)
Chutiwan Rakjit (School of Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand), William Liu (School of Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand), Jairo A. Gutiérrez (School of Computer and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand)
Issue 3
Article 1
A Security Based Greedy Method (SGMA) for VANETs in City Environment using Score Point Technique (pages 1-16)
C. Kumuthini (Department of Computer Science, Bharathiar University, Coimbatore, India), P. Krishnakumari (RVS College of Arts and Science, Bharathiar University, Coimbatore, India)
Article 2
Leveraging the Benefits of Fan Page: From Like to Love (pages 17-45)
Chetna Kudeshia (Department of Management, Birla Institute of Technology (BIT) Mesra, Noida Campus, India), Pallab Sikdar (Department of Management, Birla Institute of Technology (BIT) Mesra, Noida Campus, India), Arun Mittal (Department of Management, Birla Institute of Technology (BIT) Mesra, Noida Campus, India)
Article 3
Hybridization of the LEACH Protocol with Penalized Fuzzy C-Means (PFCM) and Self-Organization Map (SOM) Algorithms for Decreasing Energy in Wireless Sensor Networks (pages 46-64)
Asgarali Bouyer (Department of Computer Engineering, Azarbaijan Shahid Madani University, Tabriz, Iran), Abdolreza Hatamlou (Department of Computer Engineering, Khoy Branch, Islamic Azad University, Khoy, Iran)
Issue 4
Article 1
Towards an Effective QoS On Demand Multicast Routing Protocol for Multi-Channel Multi Interface WMNs (pages 1-20)
H. Santhi (School of Computer Science and Engineering, VIT University, Vellore, India), N. Jaisankar (School of Computer Science and Engineering, VIT University, Vellore, India)
Article 2
Economic Broadband Development through Infrastructure Sharing (pages 21-42)
Christos Bouras (Computer Technology Institute and Press "Diophantus", University of Patras, Patras, Greece), Konstantinos Antonis (Department of Computer Engineering, Technological Institute of Central Greece, Lamia, Greece), Georgios Diles (Computer Technology Institute & Press “Diophantus”, Computer Engineering and Informatics Department, University of Patras, Patras, Greece), Vasileios Kokkinos (Computer Engineering and Informatics Department, University of Patras, Patras, Greece), Leonidas Loukopoulos (Department of Computer Engineering, Technological Institute of Central Greece, Lamia, Greece)
Article 3
How Small and Medium Enterprises (SMEs) Should Bid for Spot Instances of Amazon's EC2 Cloud (pages 43-59)
Debashis Saha (Indian Institute of Management, Kolkata, India)
Volume 9 (2013)
Issue 1
Article 1
Platform on Platform (PoP) Model for Meta-Networking: A New Paradigm for Networks of the Future (pages 1-10)
Debashis Saha (MIS Group, Indian Institute of Management-Calcutta, Joka, Kolkata, Calcutta, India), Varadharajan Sridhar (Sasken Communication Technologies, Domlur, Bangalore, India)
Article 2
Design and Evaluation of a Cross-Layer Framework for Improving 802.11 Networks: An Empirical Study (pages 11-27)
Nurul I. Sarkar (School of Computing and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand)
Article 3
Analyzing Buffer Requirement for Wireless Enhancement of TCP in Network Mobility (pages 28-49)
Bhaskar Sardar (Department of Information Technology, Jadavpur University, Salt lake Campus, Kolkata, West Bengal, India)
Article 4
Evaluating IPv6 in Peer-to-Peer Gigabit Ethernet for TCP using Modern Windows and Linux Systems: An Empirical Study (pages 50-63)
Nurul I. Sarkar (School of Computing and Mathematical Sciences, Auckland University of Technology, Auckland, New Zealand), Burjiz K. Soorty (Auckland University of Technology, Auckland, New Zealand)
Issue 2
Editorial Preface
Debashis Saha (MIS Group, Indian Institute of Management-Calcutta, Calcutta, India), Varadharajan Sridhar (Sasken Communication Technologies, Bangalore, India)
First Special Issue on Green Networking and Computing
Guest Editorial Preface
Josip Lorincz (FESB, University of Split, Split, Croatia), Jinsong Wu (Bell Laboratories, Shanghai, China), Linjia Liu (Department of Electrical Engineering and Computer Science, University of Kansas, USA)
Article 1
Energy Consumption Effects of WiFi Off-Loading Access in 3G or LTE Public Wireless Networks (pages 1-10)
L.F. Pau (Faculty of Mobile Business, Copenhagen Business School, Frederiksberg, Denmark & Erasmus University, Rotterdam, Netherlands & University of Pretoria, Pretoria, South Africa)
Article 3
The TREND Meter: Monitoring the Energy Consumption of Networked Devices (pages 27-44)
Luca Chiaraviglio (DIET Department, University of Rome “La Sapienza”, Roma, Italy), Roberto Bruschi (Inter-university Consortium for Telecommunications (CNIT), Genoa, Italy), Antonio Cianfrani (DIET Department, University of Rome “La Sapienza”, Roma, Italy), Olga Maria Jaramillo Ortiz (DITEN, University of Genoa, Genoa, Italy), George Koutitas (School of Science and Technology, International Hellenic University, Thessaloniki Moudania, Greece)
Article 4
Efficient Forwarding With Power Saving and Load Balancing In Wireless Sensor Networks (pages 45-60)
Hanen Idoudi (National School of Computer Science, University of Manouba, Manouba, Tunisia)
Article 9
Energy-Efficient Wireless Cellular Communications through Network Resource Dynamic Adaptation (pages 11-26)
Josip Lorincz (FESB, University of Split, Split, Croatia)
Issue 3
Editorial Preface
Debashis Saha (Indian Institute of Management Calcutta, Calcutta, West Bengal, India), Varadharajan Sridhar (Sasken Communication Technologies, Bangalore, Karnataka, India)
Second Special Issue on Green Networking and Computing
Guest Editorial Preface
Josip Lorincz (Faculty of Electrical Engineering, Mechanical Engineering, and Naval Architecture (FESB), University of Split, Split, Croatia)
Article 1
A Game Theoretic Approach to Guarantee Fairness in Cooperation Among Green Mobile Network Operators (pages 1-15)
Leonardo Militano (University Mediterranea, Reggio Calabria, Italy), Antonella Molinaro (University Mediterranea, Reggio Calabria, Italy), Antonio Iera (University Mediterranea, Reggio Calabria, Italy), Ármin Petkovics (Budapest University of Technology and Economics, Budapest, Hungary)
Article 2
Design of a Temperature-Constrained Governor to Save Energy in an Open Multi-Frequency Green Router (pages 16-34)
Alfio Lombardo (Dipartimento di Ingegneria Elettrica, Elettronica e Informatica (DIEEI), University of Catania, Catania, Italy), Diego Reforgiato (Dipartimento di Ingegneria Elettrica, Elettronica e Informatica (DIEEI), University of Catania, Catania, Italy), Vincenzo Riccobene (Dipartimento di Ingegneria Elettrica, Elettronica e Informatica (DIEEI), University of Catania, Catania, Italy), Giovanni Schembra (Dipartimento di Ingegneria Elettrica, Elettronica e Informatica (DIEEI), University of Catania, Catania, Italy)
Article 3
Optimal Green Virtual Machine Migration Model (pages 35-52)
Noah Sabry (Department of Computing, Faculty of Engineering & Physical Sciences, University of Surrey, Guildford, UK), Paul Krause (Department of Computing, Faculty of Engineering & Physical Sciences, University of Surrey, Guildford, UK)
Article 4
Renewable Energy Sources for Power Supply of Base Station Sites (pages 53-74)
Josip Lorincz (Faculty of Electrical Engineering, Mechanical Engineering, and Naval Architecture (FESB), University of Split, Split, Croatia), Ivana Bule (Faculty of Electrical Engineering, Mechanical Engineering, and Naval Architecture (FESB), University of Split, Split, Croatia)
Issue 4
Special Issue from the IFIP Wireless and Mobile Networking Conference (WMNC)
Editorial Preface
Debashis Saha (Indian Institute of Management Calcutta, Kolkata, West Bengal, India), Varadharajan Sridhar (Sasken Communication Technologies, Bangalore, Karnataka, India)
Article 1
A Lifetime Forecast Scheme for a Distributed Low Duty Cycle Multi-Hop Routing in Wireless Sensor Networks (pages 1-22)
Oliver Stecklina (IHP, Frankfurt, Germany), Peter Langendörfer (IHP, Frankfurt, Germany), Christian Goltz (OpenSynergy GmbH, Berlin, Germany)
Article 2
Cross-Layered Secure and QoS Aware Design of VOIP over Wireless Ad-Hoc Networks (pages 23-45)
Shahin Vakilinia (Concordia University, Montréal, Canada), Mohammadhossein Alvandi (Concordia University, Montréal, Canada), Mohammadreza Khalili Shoja (AmirKabir University, Tehran, Iran), Iman Vakilinia (AmirKabir University, Tehran, Iran)
Article 3
OpenMobileNetwork: A Platform for Providing Estimated Semantic Network Topology Data (pages 46-64)
Abdulbaki Uzun (Telekom Innovation Laboratories, Technische Universität Berlin, Germany), Eric Neidhardt (Technische Universität Berlin, Germany), Axel Küpper (Telekom Innovation Laboratories, Technische Universität Berlin, Germany)
Article 4
ILR: Improving Location Reliability in Mobile Crowd Sensing (pages 65-85)
Manoop Talasila (Department of Computer Science, New Jersey Institute of Technology, Newark, NJ, USA), Reza Curtmola (Department of Computer Science, New Jersey Institute of Technology, Newark, NJ, USA), Cristian Borcea (Department of Computer Science, New Jersey Institute of Technology, Newark, NJ, USA)
Article 5
Multi-Hop Broadcasting in VANET for Safety Applications: Review and Classification of Protocols (pages 86-104)
Adel Berradj (IRIT, Paul Sabatier University, Toulouse, France), Zoubir Mammeri (IRIT, Paul Sabatier University, Toulouse, France)
Volume 8 (2012)
Issue 1
Article 1
Optimized Replication Strategy for Intermittently Connected Mobile Networks (pages 1-18)
C. Poongodi (Kongu Engineering College, Perundurai, India), A. M. Natarajan (Bannari Amman Institute of Technology, India)
Article 2
A Cooperative Cell Model in Computational Mobile Grid (pages 19-36)
Achal Kaushik (Jawaharlal Nehru University, India), Deo P. Vidyarthi (Jawaharlal Nehru University, India)
Article 3
Systems Dynamics Approach to Analyzing Spectrum Management Policies for Mobile Broadband Services in India (pages 37-55)
Varadharajan Sridhar (Sasken Communication Technologies, India), Thomas Casey (Aalto University, Finland), Heikki Hämmäinen (Aalto University, Finland)
Article 4
Computer Aided Planning for Wireless Systems (pages 56-67)
Amjad Umar (Harrisburg University of Science and Technology, USA)
Issue 2
Article 1
Impact of Applying Aggregate Query Processing in Mobile Commerce (pages 1-17)
Say Ying Lim (Sunway University, Malaysia), Siew Fan Wong (Sunway University, Malaysia)
Article 2
A Virtual Laboratory Environment for Tertiary Educational Institutions (pages 18-40)
Eduardo Correia (Christchurch Polytechnic Institute of Technology, New Zealand), Ricky Watson (Christchurch Polytechnic Institute of Technology, New Zealand), Adriana Quintana (Christchurch Polytechnic Institute of Technology, New Zealand), Madhu Perera (Christchurch Polytechnic Institute of Technology, New Zealand)
Article 3
The Sachet Telecom Architecture for Off Grid Locations: An Indian Case Study (pages 41-51)
Rohit Prasad (Management Development Institute, India), Rakesh Mehrotra (AKG Engineering College, India)
Article 4
The Many Faces of Green IT (pages 52-59)
Shun Cai (Xiamen University, China), Xi Chen (Zhejiang University, China), Indranil Bose (Indian Institute of Management Calcutta, India)
Issue 3
Article 1
Improving Quality of Experience of Subscribers through Post Deployment Network Planning in UMTS Cellular Networks (pages 1-27)
Samir Kumar Sadhukhan (Indian Institute of Management Calcutta, India), Swarup Mandal (Wipro Technologies, Kolkata, India)
Article 2
A Performance Evaluation of the Coverage Configuration Protocol Under Location Errors, Irregular Sensing Patterns, and a Noisy Channel (pages 28-41)
Amine Dhraief (HANA Research Group, University of Manouba, Tunisia), Imen Mahjri (HANA Research Group, University of Manouba, Tunisia), Abdelfettah Belghith (HANA Research Group, University of Manouba, Tunisia)
Article 3
Tapping the Wisdom of Crowd Phenomenon in Healthcare Social Networks (pages 42-56)
Alaa Al-Kadi (Claremont Graduate University, USA), Samir Chatterjee (Claremont Graduate University, USA)
Article 4
Proposing an Intelligent Cloud-Based Electronic Health Record System (pages 57-71)
Lara Khansa (Virginia Tech, USA), Jonathan Forcade (Virginia Tech, USA), Girivaraprasad Nambari (Virginia Tech, USA), Saravanan Parasuraman (Virginia Tech, USA), Patrick Cox (Virginia Tech, USA)
Issue 4
Article 1
NDA SNR and CRLB Estimation Over MISO with STBC Channels (pages 1-16)
Ahmed M. Almradi (Azzaytuna University, Tarhona, Libya), Sohail A. Dianat (Rochester Institute of Technology, Rochester, USA)
Article 2
Enhanced Relay Selection and Scheduling for Better Load Balancing in Multi-Hop Networks (pages 17-31)
Soumaya Hamouda (MEDIATRON Lab, University of Carthage, Carthage, Tunis, Tunisia), Tarek Bejaoui (MEDIATRON Lab, University of Carthage, Carthage, Tunis, Tunisia)
Article 3
Towards an Efficient Network Selection Technique Based on Differentiated Weight of Access Interface (pages 32-48)
Mohamed Lahby (Faculty of Science and Technology, Mohammedia University-Casablanca, Casablanca, Morocco), Leghris Cherkaoui (Faculty of Science and Technology, Mohammedia University-Casablanca, Casablanca, Morocco), Abdellah Adib (Faculty of Science and Technology, Mohammedia University-Casablanca, Casablanca, Morocco)
Article 4
Voice Traffic Service Guarantee in Wireless Mesh Networks Based on IEEE 802.11e (pages 49-66)
Livia F. Gerk (Universidade Federal Fluminense, Niterói, Rio de Janeiro, Brazil), Débora C. Muchaluat-Saade (Institute of Computing, Department of Computer Science, Universidade Federal Fluminense, Niterói, Rio de Janeiro, Brazil)
Article 5
Applying ADD Model to Enhance Quality of SOA Applications (pages 67-83)
Hamid Mcheick (Department of Computer Science and Mathematics, University of Quebec at Chicoutimi, Chicoutimi, QC, Canada)
Article 6
Mac for Physical-Layer Network Coding in VANETs (pages 84-106)
Eugène David Ngangue Ndih (Department of Electrical and Computer Engineering, Université de Sherbrooke, Sherbrooke, QC, Canada), Soumaya Cherkaoui (Department of Electrical and Computer Engineering, Université de Sherbrooke, Sherbrooke, QC, Canada)
Volume 7 (2011)
Issue 1
Article 1
Article 2
Antecedents of Security Pillars in E-Commerce Applications (pages 36-51)
Amin A. Shaqrah (Alzaytoonah University of Jordan, Jordan)
Article 3
A Novel Dynamic Noise-Dependent Probabilistic Algorithm for Route Discovery in MANETs (pages 52-67)
Hussein Al-Bahadili (Petra University, Jordan), Alia Sabri (Applied Sciences Private University, Jordan)
Issue 2
Article 1
Semantic Mobile Applications for Service Process Improvement (pages 1-16)
Markus Aleksy (ABB AG, Germany), Bernd Stieger (ABB AG, Germany), Thomas Janke (SAP Research Dresden, Germany)
Article 2
Acquiring the Gist of Social Network Service Threads via Comparison with Wikipedia (pages 17-28)
Akiyo Nadamoto (Konan University, Japan), Eiji Aramaki (The University of Tokyo, Japan), Takeshi Abekawa (National Institute Informatics, Japan), Yohei Murakami (National Institute of Information and Communications Technology, Japan)
Article 3
Query Processing in a Mediator Based Framework for Linked Data Integration (pages 29-47)
Vânia M. P. Vidal (Federal University of Ceará, Brazil), José A. F. de Macêdo (Federal University of Ceará, Brazil), João C. Pinheiro (Federal University of Ceará, Brazil), Marco A. Casanova (Pontifícia Universidade Católica do Rio de Janeiro, Brazil), Fábio Porto (Laboratório Nacional de Computação Científica, Brazil)
Article 4
Micro Context-Awareness for Autonomic Pervasive Computing (pages 48-68)
Bessam Abdulrazak (University of Sherbrooke, Canada), Patrice Roy (University of Sherbrooke, Canada), Charles Gouin-Vallerand (University of Sherbrooke, Canada), Yacine Belala (SAP Labs, Canada), Sylvain Giroux (University of Sherbrooke, Canada)
Article 5
Semantic Federation of Product Information from Structured and Unstructured Sources (pages 69-97)
Matthias Wauer (Technische Universität Dresden, Germany), Johannes Meinecke (SAP Research Dresden, Germany), Daniel Schuster (Technische Universität Dresden, Germany), Andreas Konzag (BMW Group, Germany), Markus Aleksy (ABB Corporate Research, Germany), Till Riedel (Karlsruhe Institute of Technology, Germany)
Issue 3
Article 1
The Role of Twitter in the World of Business (pages 1-15)
Kevin Curran (University of Ulster, UK), Kevin O’Hara (University of Ulster, UK), Sean O’Brien (University of Ulster, UK)
Article 2
Performance-Enhanced Caching Scheme for Web Clusters for Dynamic Content (pages 16-36)
A. Raghunathan (Bharat Heavy Electricals Limited, India), K. Murugesan (National Institute of Technology, Tiruchirappalli, India)
Article 3
Fuzzy Logic-based Mobility Metric Clustering Algorithm for MANETs (pages 37-50)
P. Venkateswaran (Jadavpur University, India), Mousumi Kundu (SAMEER, Kolkata Centre, India), Srishti Shaw (Jadavpur University, India), Kanika Orea (Jadavpur University, India), R. Nandi (Jadavpur University, India)
Article 4
How Evolving Network Access and Network Management Technologies are Redefining the Competitive Wireless Markets (pages 51-69)
Fernando Beltrán (University of Auckland, New Zealand), Jairo A. Gutiérrez (Universidad Tecnológica de Bolívar, Colombia), José Luis Melús (Universidad Politécnica de Cataluña, Spain)
Issue 4
Article 1
Secure Video Transmission Against Black Hole Attack in MANETs (pages 1-17)
M. Umaparvathi (Anna University of Technology, India), Dharmishtan K. Varughese (Karpagam College of Engineering, India)
Article 2
Enhancing Clustering in Wireless Sensor Networks with Energy Heterogeneity (pages 18-31)
Femi A. Aderohunmu (University of Otago, New Zealand), Jeremiah D. Deng (University of Otago, New Zealand), Martin Purvis (University of Otago, New Zealand)
Article 3
New Strategies and Extensions in Kruskal’s Algorithm in Multicast Routing (pages 32-51)
Mohamed Aissa (University of Nizwa, Oman), Adel Ben Mnaouer (Dar Al Uloom University, Saudi Arabia), Rion Murray (University of Trinidad and Tobago, Trinidad and Tobago), Abdelfettah Belghith (HANA Research Group University of Manouba, Tunisia)
Article 4
Emerging Areas of Research in Business Data Communications (pages 52-59)
Debashis Saha (Indian Institute of Management Calcutta, India), Varadharajan Sridhar (Sasken Communication Technologies, India)
Volume 6 (2010)
Issue 1
Article 1
Handoff Cost Minimization and Planning of Next Generation Heterogeneous Integrated Overlay Networks: Meta Heuristics Based Approach (pages 1-16)
Ayan Paul (Bharat Sanchar Nigam Limited, India), Madhubanti Maitra (Jadavpur University, India), Swarup Mandal (XLRI School of Business and Human Resources, India), Samir K. Sadhukhan (Indian Institute of Management, India)
Article 2
Using Real Options Theory to Evaluate Strategic Investment Options for Mobile Content Delivery: A Case Study (pages 17-37)
Divakaran Liginlal (Carnegie Mellon University, USA), Lara Khansa (Virginia Polytechnic Institute, USA), Stella C. Chia (City University of Hong Kong, Hong Kong)
Article 3
Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks (pages 38-57)
P. Subathra (Thiagarajar College of Engineering, India), S. Sivagurunathan (Thiagarajar College of Engineering, India), N. Ramaraj (GKM College of Engineering and Technology, India)
Article 4
Process Scheduling in Heterogeneous Multiprocessor Systems Using Task Duplication (pages 58-69)
Pranay Chaudhuri (Heritage Institute of Technology, India), Jeffrey Elcock (University of the West Indies, Barbados)
Issue 2
Article 1
Distributed Trust Based Authentication Scheme in a Clustered Environment Using Threshold Cryptography for Vehicular Ad Hoc Network (pages 1-18)
S. Sivagurunathan (Thiagarajar College of Engineering, India), V. Mohan (Thiagarajar College of Engineering, India), P. Subathra (Thiagarajar College of Engineering, India)
Article 2
A Dimensioning Study for UMTS Core Networks (pages 19-45)
Ye Ouyang (Stevens Institute of Technology, USA), M. Hosein Fallah (Stevens Institute of Technology, USA)
Article 3
Performance Evaluation of Different Architectures for an Internet Radio Service Deployed on an Fttx Network (pages 46-68)
David Melendi (University of Oviedo, Spain), Roberto García (Universitat de Lleida, Spain), Xabiel G. Pañeda (University of Oviedo, Spain), Sergio Cabrero (University of Oviedo, Spain), Victor García (University of Oviedo, Spain)
Article 4
Valuation of Alternative Business Models in Information, Communication and Media Markets: Convergence, Ubiquity and Pervasiveness (pages 69-89)
Álvaro Nascimento (Universidade Católica Portuguesa (Porto), Portugal), Fernando Santos (Universidade Católica Portuguesa, Portugal)
Issue 3
Article 1
Dependency of Transport Functions on IEEE802.11 and IEEE802.15.4 MAC/PHY Layer Protocols for WSN: A Step towards Cross-layer Design (pages 1-30)
Atif Sharif (Curtin University of Technology, Australia), Vidyasagar M. Potdar (Curtin University of Technology, Australia), A. J. D. Rathnayaka (Curtin University of Technology, Australia)
Article 2
A Spatio-Temporal Cache Replacement Policy for Location Dependent Data in Mobile Environments (pages 31-48)
Mary Magdalene Jane.F (P.S.G. College of Technology, India), R. Nadarajan (P.S.G. College of Technology, India), Maytham Safar (Kuwait University, Kuwait)
Article 3
Scalable P2P Video Streaming (pages 49-65)
Majed Alhaisoni (University of Essex, UK), Mohammed Ghanbari (University of Essex, UK), Antonio Liotta (Technische Universiteit Eindhoven, The Netherlands)
Article 4
Simple Lightweight Authentication Protocol: Security and Performance Considerations (pages 66-94)
Gyozo Gódor (Budapest University of Technology and Economics, Hungary), Sándor Imre (Budapest University of Technology and Economics, Hungary)
Issue 4
Article 1
Interoperable IPv6 Sensor Networking over PLC and RF Media (pages 1-20)
Cedric Chauvenet (INSA CITI Lab,Watteco Inc. and INRIA, France), Bernard Tourancheau (INSA CITI Lab,Universit´e Lyon1 and INRIA, France), Denis Genon-Catalot (LCI EA GrenobleINP-UPMF, France), Pierre-Emmanuel Goudet (Watteco Inc., France), Mathieu Pouillot (Watteco Inc., France)
Article 2
Period Size Self Tuning to Enhance Routing in MANETs (pages 21-37)
Mohamed Amine Abid (University of Manouba, Tunisia), Abdelfettah Belghith (University of Manouba, Tunisia)
Article 3
A Distributed Secure Architecture for Vehicular Ad Hoc Networks (pages 38-63)
Tahani Gazdar (University of Manouba, Tunisia), Abdelfettah Belghith (University of Manouba, Tunisia), Abderrahim Benslimane (University of Avignon, France)
Article 4
Predictive Dynamic Uplink /Downlink Resource Reservation for Vertical Handoff Optimization in 4G Networks (pages 64-85)
Sihem Trabelsi (High School of Communications (Sup’Com), Tunisia), Noureddine Boudriga (High School of Communications (Sup’Com), Tunisia)
Volume 5 (2009)
Issue 1
Article 1
Fairness Analysis and Improvement of Transport Layer Protocols (pages 1-21)
D. Tegze (Budapest University of Technology and Economics, Hungary), G. Hosszú (Budapest University of Technology and Economics, Hungary), F. Kovács (Budapest University of Technology and Economics, Hungary)
Article 2
Open Source Tool For Network Monitoring (pages 22-39)
Vreixo Formoso (University of A Coruña, Spain), Fidel Cacheda (University of A Coruña, Spain), Víctor Carneiro (University of A Coruña, Spain), Juan Valiño (University of A Coruña, Spain)
Article 3
Improvement of Simulative Analysis in Ad Hoc Networks (pages 40-59)
M. Fazio (Università di Messina, Italy), M. Villari (Università di Messina, Italy), A. Puliafito (Università di Messina, Italy)
Article 4
On a Modified Backoff Algorithm for MAC Protocol in MANETs (pages 60-73)
Saher S. Manaseer (University of Glasgow, UK), Mohamed Ould-Khaoua (University of Glasgow, UK), Lewis M. Mackenzie (University of Glasgow, UK)
Issue 2
Article 1
Comparison of Policies for Epidemic Broadcast in DTNs under Different Mobility Models (pages 1-15)
Francesco Giudici (Università degli Studi di Milano, Italy), Elena Pagani (Università degli Studi di Milano, Italy), Gian Paolo Rossi (Università degli Studi di Milano, Italy)
Article 2
On the Impact of Network Dynamics on a Discovery Protocol for Ad-Hoc Networks (pages 16-34)
Fei Liu (University of Twente, the Netherlands), Geert Heijenk (University of Twente, the Netherlands)
Article 3
Models and Architecture for Autonomic Network Management (pages 35-51)
N. Van Wambeke (Centre National de la Recherche Scientifique and Université de Toulouse, France), F. Armando (Centre National de la Recherche Scientifique and Université de Toulouse, France), A. Abdelkefi (Centre National de la Recherche Scientifique and Université de Toulouse, France)
Article 4
Reservation MAC protocols for Ad-Hoc Networks: Analysis of the Approaches (pages 52-67)
Ghalem Boudour (IRIT - Paul Sabatier University, France), Cédric Teyssié (IRIT - Paul Sabatier University, France), Mammeri Zoubir (IRIT - Paul Sabatier University, France)
Article 5
Slot Allocation Algorithms for Minimizing Delay in Alarm-Driven WSNs Applications (pages 68-83)
Mário Macedo (INESC-ID, Portugal), António Grilo (INESC-ID, Portugal), Mário Nunes (INESC-ID, Portugal)
Article 6
Use of Traffic Separation Techniques for the Transport of HSPA and R99 Traffic in the Radio Access Network with Differentiated Quality of Service (pages 84-100)
Xi Li (University of Bremen, Germany), Yasir Zaki (University of Bremen, Germany), Thushara Weerawardane (University of Bremen, Germany), Andreas Timm-Giel (University of Bremen, Germany), Carmelita Görg (University of Bremen, Germany), Gennaro Ciro Malafronte (Nokia Siemens Networks S.P.A, Italy)
Issue 3
Article 1
Service Offerings for Fixed-Mobile Convergence Scenario: An Integrated Operator Case (pages 1-16)
Jarmo Harno (Helsinki University of Technology, Finland), K.R. Renjish Kumar (Helsinki University of Technology, Finland), Mikko V.J. Heikkinen (Helsinki University of Technology, Finland), Mario Kind (Deutsche Telekom, Germany), Thomas Monath (Deutsche Telekom, Germany), Dirk Von Hugo (Deutsche Telekom, Germany)
Article 2
Subscription Policy Control Framework for IMS-Based Networks (pages 17-38)
Nidal Nasser (University of Guelph, Canada), Ming Shang (University of Guelph, Canada)
Article 3
What Happened to Preferences for Next Generation Internet? A Survey of College Students in Taiwan (pages 39-52)
Wen-Lung Shiau (Ming Chuan University, Taiwan), Chen-Yao Chung (National Central University, Taiwan), Ping-Yu Hsu (National Central University, Taiwan)
Article 4
On Demand Bandwidth Reservation for Real-Time Traffic in Cellular IP Network using Particle Swarm Optimization (pages 53-66)
Mohammad Anbar (Jawaharlal Nehru University, India), D.P. Vidyarthi (Jawaharlal Nehru University, India)
Article 5
Mobile Division Query Processing Incorporating Multiple Non-Collaborative Servers (pages 67-90)
Say Ying Lim (Monash University, Malaysia), David Taniar (Monash University, Australia), Bala Srinivasan (Monash University, Australia)
Issue 4
Article 1
A Survey on Classical Teletraffic Models and Network Planning Issues for Cellular Telephony (pages 1-15)
Francisco Barcelo-Arroyo (Universitat Politècnica de Catalunya, Spain), Israel Martin-Escalona (Universitat Politècnica de Catalunya, Spain)
Article 2
Testbed Implementation of a Pollution Monitoring System Using Wireless Sensor Network for the Protection of Public Spaces (pages 16-32)
Siuli Roy (Indian Institute of Management Calcutta, India), Anurag D (Indian Institute of Management Calcutta, India), Somprakash Bandyopadhyay (Indian Institute of Management Calcutta, India)
Article 3
A GPS Based Deterministic Channel Allocation for Cellular Network in Mobile Computing (pages 33-51)
Lutfi Mohammed Omer Khanbary (Aden University, Yemen), Deo Prakash Vidyarthi (Jawaharlal Nehru University - New Delhi, India)
Article 4
Energy-Efficient Self-Organizing Routing for Wireless Mobile Networks (pages 52-69)
Melody Moh (San Jose State University, USA), Rashmi Kukanur (San Jose State University, USA), Xuquan Lin (San Jose State University, USA), Subhankar Dhar (San Jose State University, USA)
Volume 4 (2008)
Issue 1
Article 1
An Asymptotic Analysis of a Queuing Model for a Call Center (pages 1-13)
K. Senthamarai Kannan (Manonmaniam Sundaranar University, India), C. Vijayalakshmi (Sathyabama University, India)
Article 2
Multiuser Detection In Dualrate DS-CDMA Systems Using ICA (pages 14-29)
Jyoti Saxena (GZS College of Engineering and Technology, India), C.S. Rai (University of School of Information Technology and Guru Gobind Singh Indraprastha University, India), P.K. Bansal (Malout Institute of Management and Information Technology, India)
Article 3
Developing a Telecommunication Operation Support Systems (OSS): The Impact of a Change in Network Technology (pages 30-51)
James G. Williams (University of Pittsburgh, USA), Kai A. Olsen (Molde College and University of Bergen, Norway)
Article 4
Performance Evaluation of Energy and Delay Aware Quality of Service (QoS) Routing Protocols in Mobile Adhoc Networks (pages 52-63)
R. Asokan (Kongu Engineering College, India), A.M. Natarajan (Kongu Engineering College, India)
Article 5
RFID: New Technology on the Horizon for IT Majors (pages 64-79)
Eric Puffenbarger (James Madison University, USA), Faye P. Teer (James Madison University, USA), S.E. Kruck (James Madison University, USA)
Article 6
Optimal Allocation of Multimedia Servers in the 3G Wireless Networks (pages 80-87)
Parag C. Pendharkar (Penn State Harrisburg, USA)
Issue 2
Article 1
QoS-Aware Multicast Routing for Mobile Ad Hoc Networks (pages 1-21)
A. Shajin Nargunam (Anna University, India), M.P. Sebastian (National Institute of Technology – Calicut, India)
Article 2
A Survey on Fuzzy Reasoning Applications for Routing Protocols in Wireless Ad Hoc Networks (pages 22-37)
Essam Natsheh (King Faisal University, Saudi Arabia)
Article 4
An Energy Aware Multi-Path Routing Algorithm for Mobile Ad Hoc Networks (pages 58-75)
S. Harous (University of Sharjah, UAE), M. Aldubai (University of Sharjah, UAE), Q. Nasir (University of Sharjah, UAE)
Issue 3
Article 1
Multivariate Fuzzy Analysis for Mobile Ad hoc Network Threat Detection (pages 1-30)
Sathish Kumar Alampalayam (University of Louisville, USA), Essam F. Natsheh (King Faisal University, Saudi Arabia)
Article 2
Ontology-Based Network Planning (pages 31-51)
Amjad Umar (University of Pennsylvania, USA), Ramesh Subbaraman (University of Pennsylvania, USA)
Article 3
Dynamics and Future of the Information and Communication Technology Sector in Canada (pages 52-68)
Shahzad Khan (University of Ottawa, Canada), Bijan Raahemi (University of Ottawa, Canada)
Article 4
Optimal Number of Mobile Service Providers in India: Trade-Off between Efficiency and Competition (pages 69-88)
Rohit Prasad (Management Development Institute, India), Varadharajan Sridhar (Management Development Institute, India)
Issue 4
Article 1
Integrating Caching Techniques in CDNs using a Classification Approach (pages 1-12)
George Pallis (University of Cyprus, Cyprus), Konstantinos Stamos (Aristotle University of Thessaloniki, Greece), Athena Vakali (Aristotle University of Thessaloniki, Greece), Charilaos Thomas (Aristotle University of Thessaloniki, Greece), George Andreadis (Aristotle University of Thessaloniki, Greece)
Article 2
Multi-Path Video Streaming in Wireless Networks using Time-Slot based Scheduling (pages 13-23)
Juan Carlos Fernandez (Tohoku University, Japan), Nei Kato (Tohoku University, Japan)
Article 3
A Cross-Layer Design Framework using Functional Components (pages 24-35)
Mike Slavik (Florida Atlantic University, USA), Imad Mahgoub (Florida Atlantic University, USA), Ahmed Badi (Florida Atlantic University, USA), Fadi Sibai (U.A.E. University, UAE)
Article 4
QoS Provisioning for Multimedia Applications on Ts by Adapting MPLS (pages 36-52)
Sadia Ashraf (National University of Science and Technology, Pakistan), Shoab A. Khan (National University of Science and Technology, Pakistan), Naveed S. Khattak (National University of Science and Technology, Pakistan)
Article 5
Multicast and Unicast ODMRP Routing in Ad hoc Networks Based on Quality of Service Support and Local Recovery Approach (pages 53-74)
Mehdi Effatparvar (Islamic Azad University - Ardebil Branch, Iran), Amir Darehshoorzadeh (Eyvanakey Institute of Higher Education, Iran), Mehdi Dehghan (Amirkabir University of Technology, Iran), Mohammad Reza EffatParvar (Informatics Services Corporation, Iran)
Article 6
Precise Analysis and Evaluation of OFDM Systems over a Mobile Frequency-Selective Nakagami-m Fading Channels (pages 75-98)
Mohmaed Essam Khedr (Arab Academy for Science and Technology, Egypt)
Volume 3 (2007)
Issue 1
Article 1
Cooperative Data Caching and Prefetching in Wireless Ad Hoc Networks (pages 1-15)
Mieso K. Denko (University of Guelph, Canada)
Article 2
Intelligent Reasoning Approach for Active Queue Management in Wireless Ad Hoc Networks (pages 16-35)
Essam Natsheh (University Putra Malaysia, Malaysia), Adznan B. Jantan (University Putra Malaysia, Malaysia), Sabira Khatun (University Putra Malaysia, Malaysia), Shamala Subramaniam (University Putra Malaysia, Malaysia)
Article 3
A Heuristic Search Algorithm for the Cellular Telecommunication Network Expansion Problem (pages 36-51)
Joon-Yeoul Oh (Texas A&M University-Kingsville, USA), John P. Mullen (New Mexico State University, USA)
Article 4
Simple Interference Cancellation Technique for Multicarrier DS-CDMA (pages 52-68)
R. Radhakrishnan (Sri Ramakrishna Engineering College, India), K. R. Shankarkumar (Sri Ramakrishna Engineering College, India), A. Ebenezer Jeyakumar (Government College of Engineering, India)
Issue 2
Article 1
Simultaneous Mobility: Probability of Lost Binding Updates and Mean Time to Occurrence (pages 1-12)
K. Daniel Wong (Malaysia University of Science and Technology, Malaysia), Seh Chun Ng (Malaysia University of Science and Technology, Malaysia), Wei Lee Woon (Malaysia University of Science and Technology, Malaysia)
Article 2
Effect of Wireless Channels on the Performance of Ad Hoc Networks (pages 22-35)
Q. Nasir (University of Sharjah, UAE), M. Al-Dubai (University of Sharjah, UAE), S. Harous (University of Sharjah, UAE)
Article 3
Location Area Design Algorithms for Minimizing Signalling Costs in Mobile Networks (pages 36-50)
Vilmos Simon (Budapest University of Technology and Economics, Hungary), Sándor Imre (Budapest University of Technology and Economics, Hungary)
Article 4
A Marketable Quality and Profit-ability Model Considering Service Providers and Consumers Relation (pages 51-71)
Heihachiro Fukuda (Fukuoka Institute of Technology, Japan), Valbona Barolli (Tokyo Denki University, Japan), Leonard Barolli (Fukuoka Institute of Technology, Japan), Makoto Takizawa (Tokyo Denki University, Japan)
Article 5
Mobile Information Processing Involving Multiple Non-collaborative Sources (pages 72-93)
Say Ying Lim (Monash University, Australia), David Taniar (Monash University, Australia), Bala Srinivasan (Monash University, Australia)
Issue 3
Article 1
Wireless Proxy: Distributed System to Mitigate the Effects of User Mobility Over Streaming Services on IEEE 802.11 Wireless LANs (pages 1-18)
Manuel Vilas (University of Oviedo, Spain), Xabiel G. Pañeda (University of Oviedo, Spain), David Melendi (University of Oviedo, Spain), Roberto García (University of Oviedo, Spain), Victor García (University of Oviedo, Spain)
Article 2
Performance Analysis of 3-Stage Cell Search Process in a WCDMA System (pages 19-38)
Shailendra Mishra (Dehradun Institute of Technology, Uttaranchal Technical University, India), Nipur (Gurukul Kangri Vishwavidyalaya, India)
Article 3
Suitability of IP telephony in the Public Switched Telephone Network (PSTN): A Case Study (pages 39-56)
Hak Ju Kim (University of Houston – Clear Lake, USA)
Article 4
Spread Spectrum Techniques for an Intelligent Energy Meter (pages 57-68)
C. D. Suriyakala (Sathyabama University, India), P. E. Sakaranarayanan (Sathyabama University, India)
Issue 4
Article 1
Empirical Prediction of Computer-Network Evolution (pages 1-16)
Sami J. Habib (Kuwait University, Kuwait)
Article 2
A Methodology for Performance, Content Analysis, and Configuration of Audio/Video-on-Demand Services (pages 17-46)
Xabiel G. Paneda (University of Oviedo, Spain), David Melendi (University of Oviedo, Spain), Roberto Garcia (University of Oviedo, Spain), Manuel Vilas (University of Oviedo, Spain), Victor Garcia (University of Oviedo, Spain)
Article 3
Performance of 802.11b Mesh Network Under Channel Interference for Wireless Internet (pages 47-59)
Suresh Sankaranarayanan (University of Sydney, Australia)
Article 4
Peer-to-Peer IP Traffic Classification Using Decision Tree and IP Layer Attributes (pages 60-74)
Bijan Raahemi (University of Ottawa, Canada), Ahmad Hayajneh (University of Ottawa, Canada), Peter Rabinovitch (Alcatel-Lucent Research and Innovation, Canada)
Volume 2 (2006)
Issue 1
Article 1
NetApp: Autonomic Network-Based Application Architecture for Creating New Value-Added Services (pages 1-14)
Tuan Loc Nguyen (University of Paris VI, France), Abbas Jamalipour (University of Sydney, Australia), Francine Krief (University of Bordeaux 1, France), Guy Pujolle (University of Paris VI, France)
Article 2
The Economic Value of Modularity in the IPQoS Network: The Real Options Approach (ROA) (pages 15-31)
Hak Ju Kim (University of Houston-Clear Lake, USA)
Article 3
Supporting Real-Time Service in Packet-Switched Wireless Networks (pages 32-43)
Maode Ma (Nanyang Technological University, Singapore), Zheng Xiang (Nanyang Technological University, Singapore)
Article 4
Risk Factors to Retrieve Anomaly Intrusion Information and Profile User Behavior (pages 44-60)
Yun Wang (Yale University & Yale-New Haven Health System and Qualidigm, USA), Lee Seidman (Qualidigm, USA)
Issue 2
Article 1
Strip-Mining the Web with SAIM: A System for the Analysis of Instant Messaging (pages 1-20)
David G. Schwartz (Bar-Ilan University, Israel), Zac Sadan (Bar-Ilan University, Israel)
Article 2
Article 3
Designing a Resilient and High Performance Network (pages 37-54)
Abid A. Ajeeli (University of Bahrain, Bahrain), Yousif Al-Bastaki (University of Bahrain, Bahrain)
Article 4
Multicast Copyright Protection System Based on a Trusted Soft-Engine (pages 55-67)
Josep Pegueroles (Technical University of Catalonia, Spain), Marcel Fernandez (Technical University of Catalonia, Spain), Francisco Rico-Novella (Technical University of Catalonia, Spain), Miguel Soriano (Technical University of Catalonia, Spain)
Issue 3
Article 1
Fuzzy Reasoning Approach for Local Connectivity Management in Mobile Ad Hoc Networks (pages 1-18)
Essam Natsheh (University Putra Malaysia, Malaysia), Adznan B. Jantan (University Putra Malaysia, Malaysia), Sabira Khatun (University Putra Malaysia, Malaysia), Shamala Subramaniam (University Putra Malaysia, Malaysia)
Article 2
Multiple Casting in a Wired LAN Using CDMA Technique (pages 19-30)
K.S. Shaji Britto (Sathyabama Deemed University, India), P.E. Sankaranarayanan (Sathyabama Deemed University, India)
Article 3
Determining the Minimum Sample Size of Audit Data Required to Profile User Behavior and Detect Anomaly Intrusion (pages 31-45)
Yun Wang (Center for Outcomes Research and Evaluation, Yale University and Yale New Haven Health, and Qualidigm, USA), Sharon-Lise T. Normand (Department of Biostatistics, Harvard School of Public Health, and Department of Health Care, USA)
Article 4
Interaction Between MIMD-Poly and PIPD-Poly Algorithms and Other TCP Variants in Multiple Bottleneck TCP Networks (pages 46-64)
M. Chandrasekaran (Government College of Engineering, India), R.S.D. Wahida Banu (Government College of Engineering, India)
Issue 4
Article 1
Network Setup for Secure Routing in Inter-Vehicle Communication Networks (pages 1-17)
Rania Wehbi (American University of Beirut, Lebanon), Ayman Kayssi (American University of Beirut, Lebanon), Ali Chehab (American University of Beirut, Lebanon), Zaher Dawy (American University of Beirut, Lebanon)
Article 2
Simulating Realistic Urban Scenarios for Ad Hoc Networks (pages 18-33)
Abdoul-Kader Harouna Souley (Université de Sherbrooke, Canada), Soumaya Cherkaoui (Université de Sherbrooke, Canada)
Article 3
Robust Algorithms for DOA Estimation and Adaptive Beamforming in Wireless Mobile Communications (pages 34-45)
R.M. Shubair (Etisalat University College, UAE), K.O. AlMidfa (Etisalat University College, UAE), A. Al-Marri (Etisalat University College, UAE), M. Al-Nuaimi (Etisalat University College, UAE)
Article 4
Distributed Resources Management in Wireless LANs (pages 46-58)
Ghassan Kbar (American University in Dubai, UAE), Wathiq Mansoor (Zayed University, UAE)
Article 5
Gigabit Ethernet Implementation: The Case of a Large New Zealand Organization (pages 59-77)
Nurul I. Sarkar (Auckland University of Technology, New Zealand), Catherine Byrne (Tonkin & Taylor Ltd, New Zealand), Nabeel A.Y. Al-Qirim (United Arab Emirates University, UAE)
Volume 1 (2005)
Issue 1
Article 1
Prototype Implementation of a Proxy Caching System for Streaming Media Objects (pages 1-16)
Guo Hui (Huazhong University of Science and Technology, China), Zhou Jingli (Huazhong University of Science and Technology, China), Wang Yunpeng (Huazhong University of Science and Technology, China), Yu Shengsheng (Huazhong University of Science and Technology, China)
Article 2
WebGuard: An Adult Content Detection and Filtering System (pages 17-32)
Mohamed Hammami (Ecole Centrale de Lyon, France), Liming Chen (Ecole Centrale de Lyon, France)
Article 3
The Use of Efficient Cost Allocation Mechanisms for Congestion Pricing in Data Networks with Priority Service Models (pages 33-49)
Fernando Beltran (University of Auckland, New Zealand), Cesar Garcia-Diaz (University of Groningen, The Netherlands)
Article 4
Mining Parallel Patterns from Mobile Users (pages 50-76)
John Goh (Monash University, Australia), David Taniar (Monash University, Australia)
Issue 2
Article 1
An Approach to Solving the Survivable Capacitated Network Design Problem (pages 1-16)
Varadharajan Sridhar (Management Development Institute, Gurgaon, India), June Sung Park (Samsung SDS Company Ltd., Seoul, South Korea)
Article 2
Query Processing Strategies for Location-Dependent Information Systems (pages 17-40)
James Jayaputera (Monash University, Australia), David Taniar (Monash University, Australia)
Article 3
Addressing Spam E-Mail Using Hashcast (pages 41-65)
Kevin Curran (University of Ulster, UK), John Stephen Honan (University of Ulster, UK)
Article 4
MANET: Applications, Issues, and Challenges for the Future (pages 66-92)
Subhankar Dhar (San Jose State University, USA)
Issue 3
Article 1
An Investigation into Factors Associated with Web Page Download Delay (pages 1-12)
Kevin Curran (University of Ulster at Magee, UK), Noel Broderick (University of Ulster at Magee, UK)
Article 2
A Framework for the Provision of Network Quality of Service for Enterprise Resource Planning Systems (pages 13-36)
Ted Chia-Han Lo (Genesis Energy, Auckland, New Zealand), Jairo Gutierrez (University of Auckland, New Zealand)
Article 3
Wi-Fi Development: A Survey of Large New Zealand Organizations (pages 37-58)
Bryan Houliston (Auckland University of Technology, New Zealand), Nurul I. Sarkar (Auckland University of Technology, New Zealand)
Article 4
Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks (pages 59-83)
Kevin Curran (University of Ulster at Magee, UK), Elaine Smyth (University of Ulster at Magee, UK)
Issue 4
Article 1
Wireless Data Broadcast Schemes for Location-Dependent Information Services Under a Geometric Location Model (pages 1-14)
KwangJin Park (Korea University, Republic of Korea), MoonBae Song (Korea University, Republic of Korea), Chong-Sun Hwang (Korea University, Republic of Korea)
Article 2
On Building a Data Broadcast System in a Wireless Environment (pages 15-37)
Agustinus Borgy Waluyo (Monash University, Australia), Gabriel Goh (Monash University, Australia), David Taniar (Monash University, Australia), Bala Srinivasan (Monash University, Australia)
Article 3
A Study on the Performance of IPv6-Based Mobility Protocols: Mobile IPv6 vs. Hierarchical Mobile IPv6 (pages 38-51)
Ki-Sik Kong (Korea University, Republic of Korea), Sung-Ju Roh (Technology R & D Center, LG Telecom Co., Republic of Korea), Chong-Sun Hwang (Korea University, Republic of Korea)
Article 4
Adaptation of Content in Personalized Redirection of Communication (pages 52-65)
Yuping Yang (Heriot-Watt University, UK), M. Howard Williams (Heriot-Watt University, UK)
Article 5
A SEEP (Security Enhanced Electronic Payment) Protocol Design Using 3BC, ECC (F), and HECC Algorithm (pages 66-80)
ByungKwan Lee (Kwandong University, Republic of Korea), SeungHae Yang (Kwandong University, Republic of Korea), Tai-Chi Lee (Saginaw Valley State University, USA)