SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
An analysis of BGP convergence properties
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Delayed Internet routing convergence
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
ACM Transactions on Computer Systems (TOCS)
On the use and performance of content distribution networks
IMW '01 Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement
DNS performance and the effectiveness of caching
IEEE/ACM Transactions on Networking (TON)
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Understanding BGP misconfiguration
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
How to Own the Internet in Your Spare Time
Proceedings of the 11th USENIX Security Symposium
XORP: an open platform for network research
ACM SIGCOMM Computer Communication Review
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
Aware, Adaptive and Cognitive Radio: The Engineering Foundations of Radio XML
Aware, Adaptive and Cognitive Radio: The Engineering Foundations of Radio XML
Fiber to the Home: The New Empowerment
Fiber to the Home: The New Empowerment
Maximizing Queueing Network Utility Subject to Stability: Greedy Primal-Dual Algorithm
Queueing Systems: Theory and Applications
Face to Face Collaborative AR on Mobile Phones
ISMAR '05 Proceedings of the 4th IEEE/ACM International Symposium on Mixed and Augmented Reality
Fundamentals of wireless communication
Fundamentals of wireless communication
Survey and benchmark of block ciphers for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Wireless Communications: The Future
Wireless Communications: The Future
MobiUS: enable together-viewing video experience across two mobile devices
Proceedings of the 5th international conference on Mobile systems, applications and services
SmartSiren: virus detection and alert for smartphones
Proceedings of the 5th international conference on Mobile systems, applications and services
Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Where We At? Mobile Phones Bring GPS to the Masses
IEEE Computer Graphics and Applications
Impact of Human Mobility on Opportunistic Forwarding Algorithms
IEEE Transactions on Mobile Computing
A survey of key management schemes in wireless sensor networks
Computer Communications
Social network analysis for routing in disconnected delay-tolerant MANETs
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
A survey on clustering algorithms for wireless sensor networks
Computer Communications
Designing mobility models based on social network theory
ACM SIGMOBILE Mobile Computing and Communications Review
The ghost in the browser analysis of web-based malware
HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
Urban sensing: out of the woods
Communications of the ACM - Urban sensing: out of the woods
OpenFlow: enabling innovation in campus networks
ACM SIGCOMM Computer Communication Review
Bubble rap: social-based forwarding in delay tolerant networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Review: Coverage and connectivity issues in wireless sensor networks: A survey
Pervasive and Mobile Computing
Peopletones: a system for the detection and notification of buddy proximity on mobile phones
Proceedings of the 6th international conference on Mobile systems, applications, and services
Reducing network energy consumption via sleeping and rate-adaptation
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
Pervasive and Mobile Computing
A Study of the Packer Problem and Its Solutions
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
Measuring and evaluating large-scale CDNs Paper withdrawn at Mirosoft's request
Proceedings of the 8th ACM SIGCOMM conference on Internet measurement
Secure aggregation in a publish-subscribe system
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Improving performance on the internet
Communications of the ACM - Inspiring Women in Computing
Energy conservation in wireless sensor networks: A survey
Ad Hoc Networks
Multicasting in delay tolerant networks: a social network perspective
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
Self-deployment of sensors for maximized coverage in underwater acoustic sensor networks
Computer Communications
DaVinci: dynamically adaptive virtual networks for a customized internet
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Towards high performance virtual routers on commodity hardware
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Spamalytics: an empirical analysis of spam marketing conversion
Communications of the ACM - The Status of the P versus NP Problem
Privacy in Content-Based Opportunistic Networks
WAINA '09 Proceedings of the 2009 International Conference on Advanced Information Networking and Applications Workshops
Routing in Delay-Tolerant Networks Comprising Heterogeneous Node Populations
IEEE Transactions on Mobile Computing
Energy-aware WLAN scanning in integrated IEEE 802.16e/802.11 networks
Computer Communications
Using cross-layer metrics to improve the performance of end-to-end handover mechanisms
Computer Communications
An encounter-based multicast scheme for disruption tolerant networks
Computer Communications
Deep-Space Transport Protocol: A novel transport scheme for Space DTNs
Computer Communications
DBS-IC: An adaptive Data Bundling System for Intermittent Connectivity
Computer Communications
The design and implementation of a session layer for delay-tolerant networks
Computer Communications
Editorial: Special issue of computer communications on delay and disruption tolerant networking
Computer Communications
On the implications of routing metric staleness in delay tolerant networks
Computer Communications
Hierarchical power management in disruption tolerant networks using traffic-aware optimization
Computer Communications
Performance comparison of different multicast routing strategies in disruption tolerant networks
Computer Communications
Secure network coding for wireless mesh networks: Threats, challenges, and directions
Computer Communications
Communications of the ACM - Finding the Fun in Computer Science Education
RouteBricks: exploiting parallelism to scale software routers
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles
Moving beyond end-to-end path information to optimize CDN performance
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
Search: A routing protocol for mobile cognitive radio ad-hoc networks
Computer Communications
Your botnet is my botnet: analysis of a botnet takeover
Proceedings of the 16th ACM conference on Computer and communications security
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Controlling resource hogs in mobile delay-tolerant networks
Computer Communications
On the applicability of available bandwidth estimation techniques and tools
Computer Communications
IEEE Spectrum
The fourth generation broadband concept
IEEE Communications Magazine
IEEE 802.16: History, status and future trends
Computer Communications
Task-execution scheduling schemes for network measurement and monitoring
Computer Communications
Towards utility-optimal random access without message passing
Wireless Communications & Mobile Computing - Recent Advances in Wireless Communications and Networks
Improving network lifetime with mobile wireless sensor networks
Computer Communications
Survey on anonymous communications in computer networks
Computer Communications
Use of aerial platforms for energy efficient medium access control in wireless sensor networks
Computer Communications
Review: Passive internet measurement: Overview and guidelines based on experiences
Computer Communications
Fast track article: Bubble-sensing: Binding sensing tasks to the physical world
Pervasive and Mobile Computing
Commentary: back to the future
IEEE Communications Magazine
Next-generation PON: part i: technology roadmap and general requirements
IEEE Communications Magazine
Vehicular telematics over heterogeneous wireless networks: A survey
Computer Communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Trust management systems for wireless sensor networks: Best practices
Computer Communications
Implementing utility-optimal CSMA
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
QoS-aware data reporting control in cluster-based wireless sensor networks
Computer Communications
Preserving privacy in participatory sensing systems
Computer Communications
Future Internet architecture: clean-slate versus evolutionary research
Communications of the ACM
A virtual cloud computing provider for mobile devices
Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond
Content delivery networks: protection or threat?
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Measuring long-term location privacy in vehicular communication systems
Computer Communications
Prisense: privacy-preserving data aggregation in people-centric urban sensing systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
Privacy and confidentiality in context-based and epidemic forwarding
Computer Communications
Coordinated multipoint transmission/reception techniques for LTE-advanced
IEEE Wireless Communications
Identifying Dormant Functionality in Malware Programs
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
Power Law and Exponential Decay of Intercontact Times between Mobile Devices
IEEE Transactions on Mobile Computing
Proceedings of the ACM SIGCOMM 2010 conference
Editorial: Editorial for the LTE special section
Computer Communications
LTE, the radio technology path towards 4G
Computer Communications
LTE key management analysis with session keys context
Computer Communications
Media coding for the next generation mobile system LTE
Computer Communications
Augmented smartphone applications through clone cloud execution
HotOS'09 Proceedings of the 12th conference on Hot topics in operating systems
Spamcraft: an inside look at spam campaign orchestration
LEET'09 Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more
Behavioral clustering of HTTP-based malware and signature generation using malicious network traces
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing
Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing
Privacy and security for online social networks: challenges and opportunities
IEEE Network: The Magazine of Global Internetworking
From opportunistic networks to opportunistic computing
IEEE Communications Magazine
A survey of mobile phone sensing
IEEE Communications Magazine
IEEE Spectrum
Comparing DNS resolvers in the wild
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Improving content delivery using provider-aided distance information
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Architectures for the future networks and the next generation Internet: A survey
Computer Communications
A Socratic method for validation of measurement-based networking research
Computer Communications
The impact of IXPs on the AS-level topology structure of the Internet
Computer Communications
A primer on spatial modeling and analysis in wireless networks
IEEE Communications Magazine
Android/OSGi-based vehicular network management system
Computer Communications
Location privacy and resilience in wireless sensor networks querying
Computer Communications
Trace-based mobility modeling for multi-hop wireless networks
Computer Communications
Optical packet buffers for backbone internet routers
IEEE/ACM Transactions on Networking (TON)
Review: Channel allocation in multi-channel wireless mesh networks
Computer Communications
Review: An overview of vertical handover techniques: Algorithms, protocols and tools
Computer Communications
Load-aware routing in mesh networks: Models, algorithms and experimentation
Computer Communications
A new paradigm for urban surveillance with vehicular sensor networks
Computer Communications
Fast track article: Connectivity in time-graphs
Pervasive and Mobile Computing
Pervasive and Mobile Computing
Data Collection in Wireless Sensor Networks with Mobile Elements: A Survey
ACM Transactions on Sensor Networks (TOSN)
Characterising aggregate inter-contact times in heterogeneous opportunistic networks
NETWORKING'11 Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part II
Review: Review of some fundamental approaches for power control in wireless networks
Computer Communications
Routing Internet traffic in heterogeneous mesh networks: Analysis and algorithms
Performance Evaluation
Effective Channel Exploitation in IEEE 802.16j Networks for Maritime Communications
ICDCS '11 Proceedings of the 2011 31st International Conference on Distributed Computing Systems
Fast track article: Comparing simulation tools and experimental testbeds for wireless mesh networks
Pervasive and Mobile Computing
Repetition-based cooperative broadcasting for vehicular ad-hoc networks
Computer Communications
Protocol design issues in underwater acoustic networks
Computer Communications
A directional data dissemination protocol for vehicular environments
Computer Communications
Throughput and Fairness Analysis of 802.11-Based Vehicle-to-Infrastructure Data Transfers
MASS '11 Proceedings of the 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems
Modelling social-aware forwarding in opportunistic networks
PERFORM'10 Proceedings of the 2010 IFIP WG 6.3/7.3 international conference on Performance Evaluation of Computer and Communication Systems: milestones and future challenges
Data dissemination in opportunistic networks using cognitive heuristics
WOWMOM '11 Proceedings of the 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels
IEEE Transactions on Information Forensics and Security - Part 1
A cautionary perspective on cross-layer design
IEEE Wireless Communications
Broadcast storm mitigation techniques in vehicular ad hoc networks
IEEE Wireless Communications
New directions in cryptography
IEEE Transactions on Information Theory
Source and Channel Coding for Cooperative Relaying
IEEE Transactions on Information Theory
Review: A critical look at power law modelling of the Internet
Computer Communications
QoS analysis of video streaming service in live cellular networks
Computer Communications
Mesh networks: commodity multihop ad hoc networks
IEEE Communications Magazine
MAC protocols for wireless sensor networks: a survey
IEEE Communications Magazine
Opportunistic networking: data forwarding in disconnected mobile ad hoc networks
IEEE Communications Magazine
Multihop Ad Hoc Networking: The Theory
IEEE Communications Magazine
Multihop Ad Hoc Networking: The Reality
IEEE Communications Magazine
A tutorial survey on vehicular ad hoc networks
IEEE Communications Magazine
Safebook: A privacy-preserving online social network leveraging on real-life trust
IEEE Communications Magazine
Optimizing OSPF/IS-IS weights in a changing world
IEEE Journal on Selected Areas in Communications
Cognitive radio: brain-empowered wireless communications
IEEE Journal on Selected Areas in Communications
Joint congestion control, routing, and MAC for stability and fairness in wireless networks
IEEE Journal on Selected Areas in Communications
Wide-area Internet traffic patterns and characteristics
IEEE Network: The Magazine of Global Internetworking
IEEE Network: The Magazine of Global Internetworking
Time synchronization in sensor networks: a survey
IEEE Network: The Magazine of Global Internetworking
Trends in Optical Switching Techniques: A Short Survey
IEEE Network: The Magazine of Global Internetworking
Fiber-wireless (FiWi) access networks: Challenges and opportunities
IEEE Network: The Magazine of Global Internetworking
Ego network models for Future Internet social networking environments
Computer Communications
Review: A survey of identity and handoff management approaches for the future Internet
Computer Communications
Reliable operational services in MANETs by misbehavior-tolerant quorum systems
Proceedings of the 8th International Conference on Network and Service Management
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Energy efficient and reliable data delivery in urban sensing applications: A performance analysis
Computer Networks: The International Journal of Computer and Telecommunications Networking
Editorial: Computer communications: Present status and future challenges
Computer Communications
Hi-index | 0.25 |
The convergence of computer-communication networks towards an all-IP integrated network has transformed Internet in a commercial commodity that has stimulated an un-precedent offer of novel communication services that are pushing the Internet architecture and protocols well beyond their original design. This calls for extraordinary research efforts at all levels of the protocol stack to address the challenges of existing and future networked applications and services in terms of scalability, mobility, flexibility, security, etc. In this article we focus on some hot research areas and discuss the research issues that need to be tackled for addressing the multiple challenges of the Future Internet. Far from being a comprehensive analysis of all the challenges faced by the Future Internet, this article tries to call the attention of Computer Communications readers to new and promising research areas, identified by members of the journal editorial board to stimulate further research activities in these areas. The survey of these research areas is then complemented with a brief review of the on-going activities in the other important research areas towards the Future Internet.