Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 10

Securing wireless sensor networks: a survey

Zhou, Y.; Fang, Y.; Zhang, Y.


Page(s): 6-28
Digital Object Identifier 10.1109/COMST.2008.4625802
AbstractPlus | Full Text: PDF (313 KB)
Rights and Permissions
Service discovery for mobile Ad Hoc networks: a survey of issues and
techniques
Ververidis, C.N.; Polyzos, G.C.
Page(s): 30-45
Digital Object Identifier 10.1109/COMST.2008.4625803
AbstractPlus | Full Text: PDF (193 KB)
Rights and Permissions
Ethernet passive optical network architectures and dynamic bandwidth
allocation algorithms
Mcgarry, M.P.; Reisslein, M.; Maier, M.
Page(s): 46-60
Digital Object Identifier 10.1109/COMST.2008.4625804
AbstractPlus | Full Text: PDF (375 KB)
Rights and Permissions
A design framework and taxonomy for hybrid routing protocols in mobile Ad
Hoc networks
Cheng, H.; Cao, J.
Page(s): 62-73
Digital Object Identifier 10.1109/COMST.2008.4625805
AbstractPlus | Full Text: PDF (297 KB)
Rights and Permissions
Vehicle Ad Hoc networks: applications and related technical issues
Toor, Y.; Muhlethaler, P.; Laouiti, A.; De La Fortelle, A.
Page(s): 74-88
Digital Object Identifier 10.1109/COMST.2008.4625806
AbstractPlus | Full Text: PDF (232 KB)
Rights and Permissions
Peer-to-peer-based resource discovery in global grids: a tutorial
Ranjan, R.; Harwood, A.; Buyya, R.
Page(s): 6-33
Digital Object Identifier 10.1109/COMST.2008.4564477
AbstractPlus | Full Text: PDF (554 KB)
Rights and Permissions
Fault tolerance for highly available internet services: concepts, approaches, and
issues

Ayari, N.; Barbaron, D.; Lefevre, L.; Primet, P.


Page(s): 34-46
Digital Object Identifier 10.1109/COMST.2008.4564478
AbstractPlus | Full Text: PDF (424 KB)
Rights and Permissions
Network topologies: inference, modeling, and generation
Haddadi, H.; Rio, M.; Iannaccone, G.; Moore, A.; Mortier, R.
Page(s): 48-69
Digital Object Identifier 10.1109/COMST.2008.4564479
AbstractPlus | Full Text: PDF (722 KB)
Rights and Permissions
Transport control protocol in optical burst switched networks: issues, solutions,
and challenges
Shihada, B.; Pin-Han Ho
Page(s): 70-86
Digital Object Identifier 10.1109/COMST.2008.4564480
AbstractPlus | Full Text: PDF (376 KB)
Rights and Permissions
Inter-vehicle communication systems: a survey
Sichitiu, M.L.; Kihl, M.
Page(s): 88-105
Digital Object Identifier 10.1109/COMST.2008.4564481
AbstractPlus | Full Text: PDF (324 KB)
Taxonomies of attacks and vulnerabilities in computer systems
Igure, V.; Williams, R.
Page(s): 6-19
Digital Object Identifier 10.1109/COMST.2008.4483667
AbstractPlus | Full Text: PDF (128 KB)
Rights and Permissions
A survey of internet worm detection and containment
Pele Li; Salour, M.; Xiao Su
Page(s): 20-35
Digital Object Identifier 10.1109/COMST.2008.4483668
AbstractPlus | Full Text: PDF (314 KB)
Rights and Permissions
An overview of routing optimization for internet traffic engineering
Ning Wang; Kin Ho; Pavlou, G.; Howarth, M.
Page(s): 36-56
Digital Object Identifier 10.1109/COMST.2008.4483669
AbstractPlus | Full Text: PDF (384 KB)
Rights and Permissions

Meshed high data rate personal area networks


Mahmud, S.; Khan, S.; Al-Raweshidy, H.; Sivarajah, K.
Page(s): 58-69
Digital Object Identifier 10.1109/COMST.2008.4483670
AbstractPlus | Full Text: PDF (379 KB)
Rights and Permissions
Cross-layer design proposals for wireless mobile networks: a survey and
taxonomy
Foukalas, F.; Gazis, V.; Alonistioti, N.
Page(s): 70-85
Digital Object Identifier 10.1109/COMST.2008.4483671
AbstractPlus | Full Text: PDF (223 KB)
Resource and service discovery in large-scale multi-domain networks
Ahmed, R.; Limam, N.; Xiao, J.; Iraqi, Y.; Boutaba, R.
Page(s): 2-30
Digital Object Identifier 10.1109/COMST.2007.4444748
Abstract | Full Text: PDF (704 KB)
Rights and Permissions
A survey of resilience differentiation frameworks in communication networks
Cholda, P.; Mykkeltveit, A.; Helvik, B.E.; Wittner, O.J.; Jajszczyk, A.
Page(s): 32-55
Digital Object Identifier 10.1109/COMST.2007.4444749
Abstract | Full Text: PDF (552 KB)
Rights and Permissions
INTERNET TOPOLOGY DISCOVERY: A SURVEY
Donnet, B.; Friedman, T.
Page(s): 56-69
Digital Object Identifier 10.1109/COMST.2007.4444750
Abstract | Full Text: PDF (299 KB)
Rights and Permissions
Surveying security analysis techniques in manet routing protocols
Andel, T.R.; Yasinsac, A.
Page(s): 70-84
Digital Object Identifier 10.1109/COMST.2007.4444751
Abstract | Full Text: PDF (367 KB)
Rights and Permissions
A survey on power control issues in wireless sensor networks
Pantazis, N.A.; Vergados, D.D.
Page(s): 86-107
Digital Object Identifier 10.1109/COMST.2007.4444752

Abstract | Full Text: PDF (225 KB)


Rights and Permissions
Recovery Techniques in Next Generation Networks
Haider, A.; Harris, R.
Page(s): 2-17
Digital Object Identifier 10.1109/COMST.2007.4317617
Abstract | Full Text: PDF (358 KB)
Rights and Permissions
Survey of secure handoff optimization schemes for multimedia services over allIP wireless heterogeneous networks
Karopoulos, G.; Kambourakis, G.; Gritzalis, S.
Page(s): 18-28
Digital Object Identifier 10.1109/COMST.2007.4317619
Abstract | Full Text: PDF (306 KB)
Rights and Permissions
Optical Control Plane for the Grid Community
Jukan, A.; Karmous-Edwards, G.
Page(s): 30-44
Digital Object Identifier 10.1109/COMST.2007.4317618
Abstract | Full Text: PDF (1093 KB)
Rights and Permissions
A Survey of Covert Channels and Countermeasures in Computer Network
Protocols
Zander, S.; Armitage, G.; Branch, P.
Page(s): 44-57
Digital Object Identifier 10.1109/COMST.2007.4317620
Abstract | Full Text: PDF (229 KB)
Rights and Permissions
A Survey of Application-Layer Multicast Protocols
Hosseini, M.; Ahmed, D.T.; Shirmohammadi, S.; Georganas, N.D.
Page(s): 58-74
Digital Object Identifier 10.1109/COMST.2007.4317616
Abstract | Full Text: PDF (402 KB)
Rights and Permissions
INFORMATION THEORY OF WIDEBAND COMMUNICATIONS
Porrat, D.
Page(s): 2-16
Digital Object Identifier 10.1109/COMST.2007.382405
Abstract | Full Text: PDF (269 KB)
Rights and Permissions
CHANNEL ESTIMATION FOR WIRELESS OFDM SYSTEMS

Ozdemir, M.K.; Arslan, H.


Page(s): 18-48
Digital Object Identifier 10.1109/COMST.2007.382406
Abstract | Full Text: PDF (638 KB)
Rights and Permissions
A SURVEY OF QOS ROUTING SOLUTIONS FOR MOBILE AD HOC
NETWORKS
Hanzo-II, L.; Tafazolli, R.
Page(s): 50-70
Digital Object Identifier 10.1109/COMST.2007.382407
Abstract | Full Text: PDF (336 KB)
Rights and Permissions
ADMISSION CONTROL IN MULTI-SERVICE IP NETWORKS: A
TUTORIAL
Wright, S.
Page(s): 72-87
Digital Object Identifier 10.1109/COMST.2007.382408
Abstract | Full Text: PDF (316 KB)
Rights and Permissions
PRICING-BASED APPROACHES IN THE DESIGN OF NEXTGENERATIONWIRELESS NETWORKS: A REVIEW AND A UNIFIED
PROPOSAL
Pandey, V.; Ghosal, D.; Mukherjee, B.
Page(s): 88-101
Digital Object Identifier 10.1109/COMST.2007.382409
Abstract | Full Text: PDF (599 KB)
FAST-HANDOFF SUPPORT IN IEEE 802.11 WIRELESS NETWORKS
Pack, S.; Choi, J.; Kwon, T.; Choi, Y.
Page(s): 2-12
Digital Object Identifier 10.1109/COMST.2007.358968
Abstract | Full Text: PDF (199 KB)
Rights and Permissions
A SURVEY OF INTEGRATING IP MOBILITY PROTOCOLS AND MOBILE
AD HOC NETWORKS
Abduljalil, F.M.; Bodhe, S.K.
Page(s): 14-30
Digital Object Identifier 10.1109/COMST.2007.358969
Abstract | Full Text: PDF (423 KB)
Rights and Permissions
DYNAMIC TRAFFIC GROOMING: THE CHANGING ROLE OF TRAFFIC
GROOMING
Huang, S.; Dutta, R.

Page(s): 32-50
Digital Object Identifier 10.1109/COMST.2007.358970
Abstract | Full Text: PDF (219 KB)
Rights and Permissions
A SURVEY OF VOID HANDLING TECHNIQUES FOR GEOGRAPHIC
ROUTING IN WIRELESS NETWORKS
Chen, D.; Varshney, P.K.
Page(s): 50-67
Digital Object Identifier 10.1109/COMST.2007.358971
Abstract | Full Text: PDF (277 KB)
Rights and Permissions
ON EPON SECURITY ISSUES
Marek Hajduczenia; Pedro R. M. Inacio; Henrique J.A. Da Silva; Mario M. Freire;
Paulo P. Monteiro
Page(s): 68-83
Digital Object Identifier 10.1109/COMST.2007.358972
Abstract | Full Text: PDF (297 KB)
FAST-HANDOFF SUPPORT IN IEEE 802.11 WIRELESS NETWORKS
Pack, S.; Choi, J.; Kwon, T.; Choi, Y.
Page(s): 2-12
Digital Object Identifier 10.1109/COMST.2007.358968
Abstract | Full Text: PDF (199 KB)
Rights and Permissions
Handover schemes in satellite networks: state-of-the-art and future research
directions
Chowdhury, P.K.; Atiquzzaman, M.; Ivancic, W.
Page(s): 2-14
Digital Object Identifier 10.1109/COMST.2006.283818
Abstract | Full Text: PDF (239 KB)
Rights and Permissions
A survey of handover algorithms in DVB-H
Xiaodong Yang; Vare, J.; Owens, T.J.
Page(s): 16-29
Digital Object Identifier 10.1109/COMST.2006.283819
Abstract | Full Text: PDF (260 KB)
Rights and Permissions
A survey of multipoint relay based broadcast schemes in wireless ad hoc
networks
Ou Liang; Y. Ahmet Sekercioglu; Nallasamy Mani
Page(s): 30-46
Digital Object Identifier 10.1109/COMST.2006.283820
Abstract | Full Text: PDF (239 KB)

Rights and Permissions


Data-aggregation techniques in sensor networks: a survey
Rajagopalan, R.; Varshney, P.K.
Page(s): 48-63
Digital Object Identifier 10.1109/COMST.2006.283821
Abstract | Full Text: PDF (218 KB)
Rights and Permissions
Transmission control protocol (TCP) in wireless networks: issues, approaches,
and challenges
Ka-Cheong Leung; Li, V.O.K.
Page(s): 64-79
Digital Object Identifier 10.1109/COMST.2006.283822
Abstract | Full Text: PDF (201 KB)

A survey of envelope processes and their applications in quality of service


provisioning
Shiwen Mao; Shivendra S. Panwar
Page(s): 2-20
Digital Object Identifier 10.1109/COMST.2006.253272
Abstract | Full Text: PDF (326 KB)
Rights and Permissions
A survey of tcp enhancements for last-hop wireless networks
Sardar, B.; Saha, D.
Page(s): 20-34
Digital Object Identifier 10.1109/COMST.2006.253273
Abstract | Full Text: PDF (202 KB)
Rights and Permissions
Playout buffering in ip telephony: a survey discussing problems and approaches
Atzori, L.; Lobina, M.L.
Page(s): 36-46
Digital Object Identifier 10.1109/COMST.2006.253269
Abstract | Full Text: PDF (197 KB)
Rights and Permissions
A survey of key management in ad hoc networks
Hegland, A.M.; Winjum, E.; Mjolsnes, S.F.; Rong, C.; Kure, O.; Spilling, P.

Page(s): 48-66
Digital Object Identifier 10.1109/COMST.2006.253271
Abstract | Full Text: PDF (280 KB)
Rights and Permissions
Survey of security vulnerabilities in session initiation protocol
Geneiatakis, D.; Dagiuklas, T.; Kambourakis, G.; Lambrinoudakis, C.; Gritzalis, S.;
Ehlert, K.S.; Sisalem, D.
Page(s): 68-81
Digital Object Identifier 10.1109/COMST.2006.253270
Abstract | Full Text: PDF (216 KB)
A survey of security issues in wireless sensor networks
Yong Wang; Attebury, G.; Ramamurthy, B.
Page(s): 2-23
Digital Object Identifier 10.1109/COMST.2006.315852
Abstract | Full Text: PDF (250 KB)
Rights and Permissions
Profiling and accelerating string matching algorithms in three network content
security applications
Po-Ching Lin; Zhi-Xiang Li; Ying-Dar Lin; Yuan-Cheng Lai; Lin, F.C.
Page(s): 24-37
Digital Object Identifier 10.1109/COMST.2006.315851
Abstract | Full Text: PDF (269 KB)
Rights and Permissions
The paths toward IPv6 multihoming
De Launois, C.; Bagnulo, M.
Page(s): 38-51
Digital Object Identifier 10.1109/COMST.2006.315853
Abstract | Full Text: PDF (186 KB)
Rights and Permissions
A decade of dynamic web content: a structured survey on past and present
practices and future trends
Papastavrou, S.; Samaras, G.; Evripidou, P.; Chrysanthis, P.K.
Page(s): 52-60
Digital Object Identifier 10.1109/COMST.2006.315854
Abstract | Full Text: PDF (150 KB)
Evolution of the air interface of cellular communications systems toward 4G
realization
Marcus L. Roberts; Michael A.Temple; Robert F. Mills; Richard A. Raines
Page(s): 2-23
Digital Object Identifier 10.1109/COMST.2006.323439
Abstract | Full Text: PDF (370 KB)
Rights and Permissions

Routing in intermittently connected mobile ad hoc networks and delay tolerant


networks: overview and challenges
Zhensheng Zhang
Page(s): 24-37
Digital Object Identifier 10.1109/COMST.2006.323440
Abstract | Full Text: PDF (210 KB)
Rights and Permissions
A review of mobility support paradigms for the internet
Deguang Le; Xiaoming Fu; Dieter Hogrefe
Page(s): 38-51
Digital Object Identifier 10.1109/COMST.2006.323441
Abstract | Full Text: PDF (236 KB)
A survey of security issues in mobile ad hoc and sensor networks
Djenouri, D.; Khelladi, L.; Badache, A.N.
Page(s): 2- 28
Abstract | Full Text: PDF (287 KB)
Rights and Permissions
Handover management architectures in integrated WLAN/cellular networks
Lampropoulos, G.; Passas, N.; Merakos, L.; Kaloxylos, A.
Page(s): 30- 44
Abstract | Full Text: PDF (185 KB)
Rights and Permissions
Using game theory to analyze wireless ad hoc networks
Srivastava, V.; Neel, J.; Mackenzie, A.B.; Menon, R.; Dasilva, L.A.; Hicks, J.E.;
Reed, J.H.; Gilles, R.P.
Page(s): 46- 56
Abstract | Full Text: PDF (187 KB)
Rights and Permissions
Charging and pricing challenges for 3G systems
Ezziane, Z.
Page(s): 58- 68
Abstract | Full Text: PDF (155 KB)
Secure routing for mobile ad hoc networks
Argyroudis, P.G.; O'Mahony, D.
Page(s): 2- 21
Abstract | Full Text: PDF (210 KB)
Rights and Permissions
A survey of TCP over ad hoc networks
Al Hanbali, A.; Altman, E.; Nain, P.

Page(s): 22- 36
Abstract | Full Text: PDF (200 KB)
Rights and Permissions
Service naming in large-scale and multi-domain networks
Ahmed, R.; Boutaba, R.; Cuervo, F.; Iraqi, Y.; Tianshu Li; Limam, N.; Jin Xiao;
Ziembicki, J.
Page(s): 38- 54
Abstract | Full Text: PDF (218 KB)

You might also like