Improving Network Coding Based File Sharing for Unstructured Peer-to-Peer Networks Jenq-Shiou LeuMin-Chieh YuHsiao-Chuan Yueh OriginalPaper 15 July 2014 Pages: 803 - 829
How Robust Can a Machine Learning Approach Be for Classifying Encrypted VoIP? Riyad AlshammariA. Nur Zincir-Heywood OriginalPaper 17 July 2014 Pages: 830 - 869
A Novel Data Centric Information Retrieval Protocol for Queries in Delay Tolerant Networks Zhenxin FengKwan-Wu Chin OriginalPaper 02 August 2014 Pages: 870 - 901
Selective RF Fingerprint Scanning for Large-Scale Wi-Fi Positioning Systems Jae-Hoon KimWoon-Young Yeo OriginalPaper 02 August 2014 Pages: 902 - 919
Study of Network Migration to New Technologies Using Agent-Based Modeling Techniques Tamal DasMarek DrogonMarco Hoffmann OriginalPaper 02 September 2014 Pages: 920 - 949
Adaptive Monitoring: Application of Probing to Adapt Passive Monitoring Deepak JeswaniMaitreya NatuR. K. Ghosh OriginalPaper 12 September 2014 Pages: 950 - 977
A Cloud-Based Authentication Protocol for RFID Supply Chain Systems Iuon-Chang LinHung-Huei HsuChen-Yang Cheng OriginalPaper 14 September 2014 Pages: 978 - 997
Designing an Internet Traffic Predictive Model by Applying a Signal Processing Method Soo-Yeon JiSeonho ChoiDong Hyun Jeong OriginalPaper 30 September 2014 Pages: 998 - 1015
A Delay-Oriented Prioritization Policy Based on Cooperative Lossless Buffering in PTN Domains Francisco-Javier Rodríguez-PérezJosé-Luis González-SánchezJavier Carmona-Murillo OriginalPaper 01 October 2014 Pages: 1016 - 1033
Online Incremental Clock Synchronization Masoume JabbarifarMichel DagenaisAlireza Shameli-Sendi OriginalPaper 01 October 2014 Pages: 1034 - 1066
Two Heuristics for Calculating a Shared Risk Link Group Disjoint Set of Paths of Min-Sum Cost Teresa GomesMiguel SoaresAndré Brízido OriginalPaper 02 October 2014 Pages: 1067 - 1103
CAR: Coding-Aware Opportunistic Routing for Unicast Traffic in Wireless Mesh Networks Hongquan LiuHongfeng YangYuantao Gu OriginalPaper 04 October 2014 Pages: 1104 - 1124