Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here .

Computer networks

  • Computer and information sciences
  • Network bandwidth
  • Get an email alert for Computer networks
  • Get the RSS feed for Computer networks

Showing 1 - 13 of 2,372

View by: Cover Page List Articles

Sort by: Recent Popular

research papers on computer networks

How does the Chinese digital transformation of enterprises affect the auditor switch?

Ruohao Liang

research papers on computer networks

The impact of COVID-19 on smoking cessation services with insights for post-pandemic delivery

Windi Lameck Marwa, Claire Griffiths,  [ ... ], Carlton Cooke

research papers on computer networks

The impact of digital transformation of commercial banks on household income: Evidence from China

Yuran Chen, Ruoxuan Huang, Yuying Zhang, Qinghong Shuai

research papers on computer networks

Romantic relationship configurations and their correlates among LGBTQ+ persons: A latent class analysis

Fabio Cannas Aghedu, Martin Blais, Léa J. Séguin, Isabel Côté

research papers on computer networks

MsDD: A novel NDN producer mobility support scheme based on multi-satellite data depot

Zhiguo Liu, Qing Zou, Lin Wang, Zhengxia Liu

research papers on computer networks

An efficient blockchain-based authentication scheme with transferability

Xiushu Jin, Kazumasa Omote

research papers on computer networks

The “opinion matching effect” (OME): A subtle but powerful new form of influence that is apparently being used on the internet

Robert Epstein, Yunyi Huang, Miles Megerdoomian, Vanessa R. Zankich

research papers on computer networks

Internet use and adolescent development in rural China: A scoping review protocol of research landscape and gaps

Linxiao Zhang

research papers on computer networks

Vulnerability extraction and prediction method based on improved information gain algorithm

Peng Yang, Xiaofeng Wang

research papers on computer networks

Unleashing the role of e-word of mouth on purchase intention in select Facebook fan pages of smart phone users

Mohammed Arshad Khan, Syed Mohd Minhaj,  [ ... ], Asra Inkesar

research papers on computer networks

Caring is not always sharing: A scoping review exploring how COVID-19 containment measures have impacted unpaid care work and mental health among women and men in Europe

Hande Gencer, Regina Brunnett,  [ ... ], Kathleen Pöge

research papers on computer networks

Can internet use promote farmers to adopt chemical fertilizer reduction and efficiency enhancement technology in China?—an empirical analysis based on endogenous switching probit model

Zhifei Ma, Huan Huang,  [ ... ], Xiaodi Li

research papers on computer networks

Pricing and service effort strategy in live streaming commerce supply chain under the equal proportion settlement mode

Jinrong Liu, Yanfen Zhang, Zhongmiao Sun

Connect with Us

  • PLOS ONE on Twitter
  • PLOS on Facebook

research papers on computer networks

Communications and Networking Research Group

PUBLICATIONS

Journal articles | other papers | conference papers | book chapters | technical reports, journal articles.

134. Vishrant Tripathi, Nick Jones, Eytan Modiano, Fresh-CSMA: A Distributed Protocol for Minimizing Age of Information, IEEE Journal on Communications and Networks, 2024.

133. Bai Liu, Quang Nguyen, Qingkai Liang, Eytan Modiano, Tracking Drift-Plus-Penalty: Utility Maximization for Partially Observable and Controllable Networks, IEEE/ACM Transactions on Networking, 2024.

132. Xinzhe Fu, Eytan Modiano, Optimal Routing to Parallel Servers with Unknown Utilities – Multi-armed Bandit With Queues, IEEE/ACM Transactions on Networking, January 2022.

131. Bai Liu, Qingkai Liang, Eytan Modiano, Tracking MaxWeight: Optimal Control for Partially Observable and Controllable Networks, IEEE/ACM Transactions on Networking, August 2023.

130. Xinzhe Fu, Eytan Modiano, Joint Learning and Control in Stochastic Queueing Networks with unknown Utilities, Proceedings of the ACM on Measurement and Analysis of Computing Systems, 2023.

129. Vishrant Tripathi, Rajat Talak, Eytan Modiano, Information Freshness in Multi-Hop Wireless Networks, IEEE/ACM Transactions on Networking,” April 2023.

128.  Xinzhe Fu, Eytan Modiano, “ Learning-NUM: Network Utility Maximization with Unknown Utility Functions and Queueing Delay ,”  IEEE/ACM Transactions on Networking,” 2022.

127.  Bai Liu, Qiaomin Xie, Eytan Modiano,  “ RL-QN: A Reinforcement Learning Framework for Optimal Control of Queueing Systems ,”  ACM Transactions on Modeling and Performance Evaluation of Computing Systems (TOMPECS), 2022.

126. Xinzhe Fu and E. Modiano,  “ Elastic Job Scheduling with Unknown Utility Functions ,” Performance Evaluation, 2021.

125. Bai Liu and E. Modiano, “ Optimal Control for Networks with Unobservable Malicious Nodes ,”  Performance Evaluation, 2021.

124. Vishrant Tripathi, Rajat Talak, Eytan Modiano, “ Age Optimal Information Gathering and Dissemination on Graphs ,”  Transactions on Mobile Computing, April 2021.

123.  Xinyu Wu, Dan Wu, Eytan Modiano, “ Predicting Failure Cascades in Large Scale Power Systems via the Influence Model Framework, ”  IEEE Transactions on Power Systems, 2021.

122.   Roy D. Yates, Yin Sun, D. Richard Brown III, Sanjit K. Kaul, Eytan Modiano and Sennur Ulukus, “ Age of Information: An Introduction and Survey, ”  Journal on Selected Areas in Communications, February 2021.

121.   Jianan Zhang, Abhishek Sinha, Jaime Llorca, Anonia Tulino, Eytan Modiano, “ Optimal Control of Distributed Computing Networks with Mixed-Cast Traffic Flows ,”  IEEE/ACM Transactions on Networking, 2021.

120.   Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano, “ Learning Algorithms for Minimizing Queue Length Regret ,”  IEEE Transactions on Information Theory, 2021.

119.   Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano, “ Throughput Maximization in Uncooperative Spectrum Sharing Networks ,”  IEEE/ACM IEEE/ACM Transactions on Networking, Vol. 28, No. 6, December 2020.

118.   Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano, “ Learning algorithms for scheduling in wireless networks with unknown channel statistics ,” Ad Hoc Networks, Vol. 85, pp. 131-144, 2019.

117.   Rajat Talak, Eytan Modiano, “ Age-Delay Tradeoffs in Queueing Systems ,”  IEEE Transactions on Information Theory, 2021.

116.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Improving Age of Information in Wireless Networks with Perfect Channel State Information ,”  IEEE/ACM Transactions on Networking, Vol. 28, No. 4, August 2020.

115.   Igor Kadota and Eytan Modiano, “ Minimizing the Age of Information in Wireless Networks with Stochastic Arrivals ,” IEEE Transactions on Mobile Computing, 2020.

114.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Optimizing Information Freshness in Wireless Networks under General Interference Constraints ,”  IEEE/ACM transactions on Networking, Vol. 28, No. 1, February 2020.

113.   X. Fu and E. Modiano, “ Fundamental Limits of Volume-based Network DoS Attacks ,” Proceedings of the ACM on Measurement and Analysis of Computing Systems, Vol. 3, No. 3, December 2019. 

112.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Capacity and Delay Scaling for Broadcast Transmission in Highly Mobile Wireless Networks ,” IEEE Transactions on Mobile Computing, 2019.

111.   Abhishek Sinha and Eytan Modiano, “ Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions , IEEE Transactions on Mobile Computing, Vol. 19, No. 9, September 2020.

110.   Yu-Pin Hsu, Eytan Modiano, Lingjie Duan, “ Scheduling Algorithms for Minimizing Age of Information in Wireless Broadcast Networks with Random Arrivals ,”  IEEE Transactions on Mobile Computing, Vol. 19, No. 12, December 2020.

109.   Xiaolin Jiang, Hossein S. Ghadikolaei, Gabor Fodor, Eytan Modiano, Zhibo Pang, Michele Zorzi, Carlo Fischione, “ Low-latency Networking: Where Latency Lurks and How to Tame It ,”  Proceedings of the IEEE, 2019.

108.   Jianan Zhang, Edmund Yeh, Eytan Modiano, “ Robustness of Interdependent Random Geometric Networks ,” IEEE Transactions on Network Science and Engineering, Vol. 6, No. 3, July-September 2019.

107.   Qingkai Liang, Hyang-Won Lee, Eytan Modiano, “ Robust Design of Spectrum-Sharing Networks ,” IEEE Transactions on Mobile Computing, Vol. 18, No. 8, August 2019.

106.   A. Sinha, L. Tassiulas, E. Modiano, “ Throughput-Optimal Broadcast in Wireless Networks with Dynamic Topology ,”  IEEE Transactions on Mobile Computing, Vol. 18, No. 5, May 2019.

105. Igor Kadota, Abhishek Sinha, Eytan Modiano, “ Scheduling Algorithms for Optimizing Age of Information in Wireless Networks With Throughput Constraints ,”  IEEE/ACM Transactions on Networking, August 2019.

104.   Igor Kadota, Abhishek Sinha, Rahul Singh, Elif Uysal-Biyikoglu, Eytan Modjano, “ Scheduling Policies for Minimizing Age of Information in Broadcast Wireless Networks ,” IEEE/ACM Transactions on Networking, Vol. 26, No. 5, October 2018.

103.   Jianan Zhang and Eytan Modiano, “ Connectivity in Interdependent Networks ,”  IEEE/ACM Transactions on Networking, 2018.

102.   Qingkai Liang, Eytan Modiano, “ Minimizing Queue Length Regret Under Adversarial Network Models ,” Proceedings of the ACM on Measurement and Analysis of Computing Systems, Volume 2, Issue 1, April 2018, Article No.: 11, pp 1-32. (same as Sigmetrics 2018).

101.   A. Sinha and E. Modiano, “ Optimal Control for Generalized Network Flow Problems ,”  IEEE/ACM Transactions on Networking, 2018.

100.   Hossein Shokri-Ghadikolaei, Carlo Fischione, Eytan Modiano  “ Interference Model Similarity Index and Its Applications to mmWave Networks ,”  IEEE Transactions on Wireless Communications, 2018.

99.   Matt Johnston, Eytan Modiano, “ Wireless Scheduling with Delayed CSI: When Distributed Outperforms Centralized, ’ IEEE Transactions on Mobile Computing, 2018.

98.   A. Sinha, G. Paschos, E. Modiano, “ Throughput-Optimal Multi-hop Broadcast Algorithms ,” IEEE/ACM Transactions on Networking, 2017.

97.   Nathan Jones, Georgios Paschos, Brooke Shrader, Eytan Modiano, “ An Overlay Architecture for Throughput Optimal Multipath Routing ,” IEEE/ACM Transactions on Networking, 2017.

96.   Greg Kuperman, Eytan Modiano, “ Providing Guaranteed Protection in Multi-Hop Wireless Networks with Interference Constraints ,” IEEE Transactions on Mobile Computing, 2017.

95.   Matt Johnston, Eytan Modiano, Isaac Kesslassy, “ Channel Probing in Opportunistic Communications Systems ,”  IEEE Transactions on Information Theory, November, 2017.

94.   Anurag Rai, Georgios Paschos, Chih-Ping Lee, Eytan Modiano, “ Loop-Free Backpressure Routing Using Link-Reversal Algorithms “, IEEE/ACM Transactions on Networking, October, 2017.

93.   Matt Johnston and Eytan Modiano, “” Controller Placement in Wireless Networks with Delayed CSI ,” IEEE/ACM Transactions on Networking, 2017.

92.   Jianan Zheng, E. Modiano, D. Hay, “ Enhancing Network Robustness via Shielding ,”  IEEE Transactions on Networking, 2017.

91.   M. Markakis, E. Modiano, J.N. Tsitsiklis, “ Delay Analysis of the Max-Weight Policy under Heavy-Tailed Traffic via Fluid Approximations ,” Mathematics of Operations Research, October, 2017.

90.   Qingkai Liang and E. Modiano, “ Survivability in Time-Varying Graphs ,”  IEEE Transactions on Mobile Computing, 2017.

89.   A. Sinha, G. Paschos, C. P. Li, and E. Modiano, “ Throughput-Optimal Multihop Broadcast on Directed Acyclic Wireless Networks ,” IEEE/ACM Transactions on Networking, Vol. 25, No. 1, Feb. 2017.

88.   G. Celik, S. Borst, , P. Whiting , E. Modiano, “ Dynamic Scheduling with Reconfiguration Delays ,”  Queueing Systems, 2016.

87.  G. Paschos, C. P. Li, E. Modiano, K. Choumas, T. Korakis, “ In-network Congestion Control for Multirate Multicast ,”   IEEE/ACM Transactions on Networking,  2016.

86.   H. Seferoglu and E. Modiano, “ TCP-Aware Backpressure Routing and Scheduling ,” IEEE Transactions on Mobile Computing, 2016.

85.   H. Seferoglu and E. Modiano, “ Separation of Routing and Scheduling in Backpressure-Based Wireless Networks ,” IEEE/ACM Transactions on Networking, Vol. 24, No. 3, 2016.

84.   M. Markakis, E. Modiano, J.N. Tsitsiklis, “ Delay Stability of Back-Pressure Policies in the presence of Heavy-Tailed Traffic ,”  IEEE/ACM Transactions on Networking, 2015.

83.   S. Neumayer, E. Modiano,  “ Network Reliability Under Geographically Correlated Line and Disk Failure Models ,” Computer Networks, to appear, 2016.

82.   S. Neumayer, E. Modiano, A. Efrat, “ Geographic Max-Flow and Min-Cut Under a Circular Disk Failure Model ,” Computer Networks, 2015.

81.   Marzieh Parandehgheibi, Hyang-Won Lee, Eytan Modiano, Survivable Path Sets:  A new approach to survivability in multi-layer networks ,”  IEEE Journal on Lightwave Technology, 2015.

80.   G. Kuperman, E. Modiano, A. Narula-Tam, “ Network Protection with Multiple Availability Guarantees ,” Computer Networks, 2015.

79.   G. Kuperman, E. Modiano, A. Narula-Tam, “ Analysis and Algorithms for Partial Protection in Mesh Networks ,” IEEE/OSA Journal of Optical Communications and Networks, 2014.

78.   Krishna Jagannathan, Mihalis Markakis, Eytan Modiano, John Tsitsiklis, “ Throughput Optimal Scheduling over Time-Varying Channels in the presence of Heavy-Tailed Traffic ,” IEEE Transactions on Information Theory, 2014.

77.   Chih-Ping Li and Eytan Modiano, “ Receiver-Based Flow Control for Networks in Overload ,” IEEE/ACM Transactions on Networking, Vol. 23, No. 2, 2015.

76.   Matthew Johnston, Hyang-Won Lee, Eytan Modiano, “ A Robust Optimization Approach to Backup Network Design with Random Failures ,” IEEE/ACM Transactions on Networking, Vol. 23, No. 4, 2015.

75.   Guner Celik and Eytan Modiano, “ Scheduling in Networks with Time-Varying Channels and Reconfiguration Delay ,” IEEE/ACM Transactions on Networking, Vol. 23, No. 1, 2015.

74.   Matt Johnston, H.W. Lee, E. Modiano, “ Robust Network Design for Stochastic Traffic Demands ,” IEEE Journal of Lightwave Technology, 2013.

73.   Mihalis Markakis, Eytan Modiano, John Tsitsiklis, “ Max-Weight Scheduling in Queueing Networks With Heavy-Tailed Traffic, ” IEEE/ACM Transactions on Networking, 2014.

72.   Kayi Lee, Hyang-Won Lee, Eytan Modiano, “ Maximizing Reliability in WDM Networks through Lightpath Routing ,”  IEEE ACM Transactions on Networking, 2014.

71.   Krishna Jaggannathan and Eytan Modiano, “ The Impact of Queue Length Information on Buffer Overflow in Parallel Queues ,”  IEEE transactions on Information Theory, 2013.

70.   Krishna Jagannathan, Ishai Menashe, Gil Zussman, Eytan Modiano, “ Non-cooperative Spectrum Access – The Dedicated vs. Free Spectrum Choice ,” IEEE JSAC, special issue on Economics of Communication Networks & Systems, to appear, 2012.

69.   Guner Celik and Eytan Modiano, “ Dynamic Server Allocation over Time Varying Channels with Switchover Delay ,” IEEE Transactions on Information Theory, to appear, 2012.

68.   Anand Srinivas and Eytan Modiano, “ Joint Node Placement and Assignment for Throughput Optimization in Mobile Backbone Networks ,” IEEE JSAC, special issue on Communications Challenges and Dynamics for Unmanned Autonomous Vehicles, June, 2012.

67.   Guner Celik and Eytan Modiano, “ Controlled Mobility in Stochastic and Dynamic Wireless Networks ,” Queueing Systems, 2012.

66.   Krishna Jagannathan, Shie Mannor, Ishai Menache, Eytan Modiano, “ A State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels ,” Internet Mathematics, Vol. 9, Nos. 2–3: 136–160.

65.   Long Le, E. Modiano, N. Shroff, “Optimal Control of Wireless Networks with Finite Buffers ,” IEEE/ACM Transactions on Networking, to appear, 2012.

64.   K. Jagannathan, M. Markakis, E. Modiano, J. Tsitsiklis, “Queue Length Asymptotics for Generalized Max-Weight Scheduling in the presence of Heavy-Tailed Traffic,” IEEE/ACM Transactions on Networking, Vol. 20, No. 4, August 2012.

63.   Kayi Lee, Hyang-Won Lee, Eytan Modiano, “ Reliability in Layered Networks with Random Link Failures, ” IEEE/ACM Transactions on Networking, December 2011.

62.   Krishna Jagannathan, Eytan Modiano, Lizhong Zheng, “ On the Role of Queue Length Information in Network Control ,” IEEE Transactions on Information Theory, September 2011.

61.   Hyang-Won Lee, Long Le, Eytan Modiano, “ Distributed Throughput Maximization in Wireless Networks via Random Power Allocation, ” IEEE Transactions on Mobile Computing, 2011.

60.   Sebastian Neumayer, Gil Zussman, Rueven Cohen, Eytan Modiano, “ Assessing the Vulnerability of the Fiber Infrastructure to Disasters, ” IEEE/ACM Transactions on Networking, December 2011.

59.   Kayi Lee, Eytan Modiano, Hyang-Won Lee, “ Cross Layer Survivability in WDM-based Networks ,” IEEE/ACM Transactions on Networking, August 2011.

58.   Emily Craparo, Jon How, and Eytan Modiano, “Throughput Optimization in Mobile Backbone Networks,” IEEE Transactions on Mobile Computing, April, 2011.

57.   Hyang-Won Lee, Kayi Lee, and Eytan Modiano, “Diverse Routing in Networks with Probabilistic Failures,” IEEE/ACM Transactions on Networking, December, 2010.

56.   Guner Celik, Gil Zussman, Wajahat Khan and Eytan Modiano, “MAC Protocols For Wireless Networks With Multi-packet Reception Cabaility ,” IEEE Transactions on Mobile Computing, February, 2010.

55.   Atilla Eryilmaz, Asuman Ozdaglar, Devavrat Shah, and Eytan Modiano, “Distributed Cross-Layer Algorithms for the Optimal Control of Multi-hop Wireless Networks,” IEEE/ACM Transactions on Networking, April 2010.

54.   Murtaza Zafer and Eytan Modiano, “Minimum Energy Transmission over a Wireless Channel With Deadline and Power Constraints ,” IEEE Transactions on Automatic Control, pp. 2841-2852, December, 2009.

53.   Murtaza Zafer and Eytan Modiano, “A Calculus Approach to Energy-Efficient Data Transmission with Quality of Service Constraints,” IEEE/ACM Transactions on Networking, 2009.

52.   Anand Srinivas, Gil Zussman, and Eytan Modiano, “Construction and Maintenance of Wireless Mobile Backbone Networks,” IEEE/ACM Transactions on Networking, 2009.

51.   Andrew Brzezinski, Gil Zussman, and Eytan Modiano, “Distributed Throughput Maximization in Wireless Mesh Networks Via Pre-Partitioning,” IEEE/ACM Transactions on Networking, December, 2008.

50.   Amir Khandani, Eytan Modiano, Jinane Abounadi, Lizhong Zheng, “Reliability and Route Diversity in Wireless Networks,” IEEE Transactions on Wireless Communications, December, 2008.

49.   Alessandro Tarello, Jun Sun, Murtaza Zafer and Eytan Modiano, “Minimum Energy Transmission Scheduling Subject to Deadline Constraints,” ACM Wireless Networks, October, 2008.

48.   Murtaza Zafer, Eytan Modiano, “Optimal Rate Control for Delay-Constrained Data Transmission over a Wireless Channel,” IEEE Transactions on Information Theory, September, 2008.

47.   Andrew Brzezinski and Eytan Modiano, “Achieving 100% Throughput In Reconfigurable IP/WDM Networks,” IEEE/ACM Transactions on Networking, August, 2008.

46.   Michael Neely, Eytan Modiano and C. Li, “Fairness and Optimal Stochastic Control for Heterogeneous Networks,” IEEE/ACM Transactions on Networking, September, 2008.

45.   Amir Khandani, Jinane Abounadi, Eytan Modiano, Lizhong Zheng, “Cooperative Routing in Static Wireless Networks,” IEEE Transactions on Communications, November 2007.

44.   Murtaza Zafer, Eytan Modiano, “Joint Scheduling of Rate-guaranteed and Best-effort Users over a Wireless Fading Channel,” IEEE Transactions on Wireless Communications, October, 2007.

43.   Krishna Jagannathan, Sem Borst, Phil Whiting and Eytan Modiano, “Scheduling of Multi-Antenna Broadcast Systems with Heterogeneous Users,” IEEE Journal of Selected Areas in Communications, September, 2007.Amir Khandani, Jinane

42.   Anand Ganti, Eytan Modiano, and John Tsitsiklis, “Optimal Transmission Scheduling in Symmetric Communication Models with Intermittent Connectivity, ” IEEE Transactions on Information Theory, March, 2007.

41.   Michael Neely and Eytan Modiano, “Logarithmic Delay for NxN Packet Switches Under Crossbar Constraints,” IEEE/ACM Transactions on Networking, November, 2007.

40.   Jun Sun, Jay Gao, Shervin Shambayati and Eytan Modiano, “Ka-Band Link Optimization with Rate Adaptation for Mars and Lunar Communications,”   International Journal of Satellite Communications and Networks, March, 2007.

39.   Jun Sun and Eytan Modiano, “Fair Allocation of A Wireless Fading Channel: An Auction Approach” Institute for Mathematics and its Applications, Volume 143: Wireless Communications, 2006.

38.   Jun Sun, Eytan Modiano and Lizhong Zhang, “Wireless Channel Allocation Using An Auction Algorithm,” IEEE Journal on Selected Areas in Communications, May, 2006.

37.   Murtaza Zafer and Eytan Modiano, “Blocking Probability and Channel Assignment for Connection Oriented Traffic in Wireless Networks,” IEEE Transactions on Wireless Communications, April, 2006.

36.   Alvin Fu, Eytan Modiano, and John Tsitsiklis, “Optimal Transmission Scheduling over a fading channel with Energy and Deadline Constraints” IEEE Transactions on Wireless Communications, March,2006.

35.   Poompat Saengudomlert, Eytan Modiano and Rober Gallager, “On-line Routing and Wavelength Assignment for Dynamic Traffic in WDM Ring and Torus Networks,” IEEE Transactions on Networking, April, 2006.

34.   Li-Wei Chen, Eytan Modiano and Poompat Saengudomlert, “Uniform vs. Non-Uniform band Switching in WDM Networks,” Computer Networks (special issue on optical networks), January, 2006.

33.   Andrew Brzezinski and Eytan Modiano, “Dynamic Reconfiguration and Routing Algorithms for IP-over-WDM networks with Stochastic Traffic,” IEEE Journal of Lightwave Technology, November, 2005

32.   Randall Berry and Eytan Modiano, “Optimal Transceiver Scheduling in WDM/TDM Networks,” IEEE Journal on Selected Areas in Communications, August, 2005.

31.   Poompat Saengudomlert, Eytan Modiano, and Robert G. Gallager, “Dynamic Wavelength Assignment for WDM All-Optical Tree Networks,” IEEE Transactions on Networking, August, 2005.

30.   Ashwinder Ahluwalia and Eytan Modiano, “On the Complexity and Distributed Construction of Energy Efficient Broadcast Trees in Wireless Ad Hoc Networks,” IEEE Transactions on Wireless Communications, October, 2005.

29.   Michael Neely, Charlie Rohrs and Eytan Modiano, “Equivalent Models for Analysis of Deterministic Service Time Tree Networks,” IEEE Transactions on Information Theory, October, 2005.

28.   Michael Neely and Eytan Modiano, “Capacity and Delay Tradeoffs for Ad Hoc Mobile Networks,” IEEE Transactions on Information Theory, May, 2005.

27.   Li-Wei Chen and Eytan Modiano, “Efficient Routing and Wavelength Assignment for Reconfigurable WDM Networks with Wavelength Converters,” IEEE/ACM Transactions on Networking, February, 2005. Selected as one of the best papers from Infocom 2003 for fast-track publication in IEEE/ACM Transactions on Networking.

26.   Michael Neely and Eytan Modiano, “Convexity in Queues with General Inputs,” IEEE Transactions on Information Theory, May, 2005.

25.   Anand Srinivas and Eytan Modiano, “Finding Minimum Energy Disjoint Paths in Wireless Ad Hoc Networks,” ACM Wireless Networks, November, 2005. Selected to appear in a special issue dedicated to best papers from Mobicom 2003.

24.   Michael Neely, Eytan Modiano and Charlie Rohrs, “Dynamic Power Allocation and Routing for Time-Varying Wireless Networks,” IEEE Journal of Selected Areas in Communication, January, 2005.

23.   Chunmei Liu and Eytan Modiano, “On the performance of additive increase multiplicative decrease (AIMD) protocols in hybrid space-terrestrial networks,” Computer Networks, September, 2004.

22.   Li-Wei Chen and Eytan Modiano, “Dynamic Routing and Wavelength Assignment with Optical Bypass using Ring Embeddings,” Optical Switching and Networking (Elsevier), December, 2004.

21.   Aradhana Narula-Tam, Eytan Modiano and Andrew Brzezinski, “Physical Topology Design for Survivable Routing of Logical Rings in WDM-Based Networks,” IEEE Journal of Selected Areas in Communication, October, 2004.

20.   Randall Berry and Eytan Modiano, “‘The Role of Switching in Reducing the Number of Electronic Ports in WDM Networks,” IEEE Journal of Selected Areas in Communication, October, 2004.

19.   Jun Sun and Eytan Modiano, “Routing Strategies for Maximizing Throughput in LEO Satellite Networks,,” IEEE JSAC, February, 2004.

18.   Jun Sun and Eytan Modiano, “Capacity Provisioning and Failure Recovery for Low Earth Orbit Satellite Networks,” International Journal on Satellite Communications, June, 2003.

17.   Alvin Fu, Eytan Modiano, and John Tsitsiklis, “Optimal Energy Allocation and Admission Control for Communications Satellites,” IEEE Transactions on Networking, June, 2003.

16.   Michael Neely, Eytan Modiano and Charles Rohrs, “Power Allocation and Routing in Multi-Beam Satellites with Time Varying Channels,” IEEE Transactions on Networking, February, 2003.

15.   Eytan Modiano and Aradhana Narula-Tam, “Survivable lightpath routing: a new approach to the design of WDM-based networks,” IEEE Journal of Selected Areas in Communication, May 2002.

14.   Aradhana Narula-Tam, Phil Lin and Eytan Modiano, “Efficient Routing and Wavelength Assignment for Reconfigurable WDM Networks,” IEEE Journal of Selected Areas in Communication, January, 2002.

13.   Brett Schein and Eytan Modiano, “Quantifying the benefits of configurability in circuit-switched WDM ring networks with limited ports per node,” IEEE Journal on Lightwave Technology, June, 2001.

12.   Aradhana Narula-Tam and Eytan Modiano, “Dynamic Load Balancing in WDM Packet Networks with and without Wavelength Constraints,” IEEE Journal of Selected Areas in Communications, October 2000.

11.   Randy Berry and Eytan Modiano, “Reducing Electronic Multiplexing Costs in SONET/WDM Rings with Dynamically Changing Traffic,” IEEE Journal of Selected Areas in Communications, October 2000.

10.   Eytan Modiano and Richard Barry, “A Novel Medium Access Control Protocol for WDM-Based LANs and Access Networks Using a Master-Slave Scheduler,” IEEE Journal on Lightwave Technology, April 2000.

9.   Eytan Modiano and Anthony Ephremides, “Communication Protocols for Secure Distributed Computation of Binary Functions,” Information and Computation, April 2000.

8.   Angela Chiu and Eytan Modiano, “Traffic Grooming Algorithms for Reducing Electronic Multiplexing Costs in WDM Ring Networks,” IEEE Journal on Lightwave Technology, January 2000.

7.   Eytan Modiano, “An Adaptive Algorithm for Optimizing the Packet Size Used in Wireless ARQ Protocols,” Wireless Networks, August 1999.

6.   Eytan Modiano, “Random Algorithms for Scheduling Multicast Traffic in WDM Broadcast-and-Select Networks,” IEEE Transactions on Networking, July, 1999.

5.   Eytan Modiano and Richard Barry, “Architectural Considerations in the Design of WDM-based Optical Access Networks,” Computer Networks, February 1999.

4.   V.W.S. Chan, K. Hall, E. Modiano and K. Rauschenbach, “Architectures and Technologies for High-Speed Optical Data Networks,” IEEE Journal of Lightwave Technology, December 1998.

3.   Eytan Modiano and Anthony Ephremides, “Efficient Algorithms for Performing Packet Broadcasts in a Mesh Network,” IEEE Transactions on Networking, May 1996.

2.   Eytan Modiano, Jeffrey Wieselthier and Anthony Ephremides, “A Simple Analysis of Queueing Delay in a Tree Network of Discrete-Time Queues with Constant Service Times,” IEEE Transactions on Information Theory, February 1996.

1.   Eytan Modiano and Anthony Ephremides, “Communication Complexity of Secure Distributed Computation in the Presence of Noise,” IEEE Transactions on Information Theory, July 1992.

Other Papers

5.  Eytan Modiano, “Satellite Data Networks,” AIAA Journal on Aerospace Computing, Information and Communication, September, 2004.

4.  Eytan Modiano and Phil Lin, “Traffic Grooming in WDM networks,” IEEE Communications Magazine, July, 2001.

3.  Eytan Modiano and Aradhana Narula, “Mechanisms for Providing Optical Bypass in WDM-based Networks,” SPIE Optical Networks, January 2000.

2.  K. Kuznetsov, N. M. Froberg, Eytan Modiano, et. al., “A Next Generation Optical Regional Access Networks,” IEEE Communications Magazine, January, 2000.

1.  Eytan Modiano, “WDM-based Packet Networks,” (Invited Paper) IEEE Communications Magazine, March 1999.

Conference Papers

246. Xinyu Wu, Dan Wu, Eytan Modiano, “ Overload Balancing in Single-Hop Networks With Bounded Buffers ,” IFIP Networking, 2022.

245.  Xinzhe Fu, Eytan Modiano, “ Optimal Routing for Stream Learning Systems ,”  IEEE Infocom, April 2022.

244.  Vishrant Tripathi, Luca Ballotta, Luca Carlone, E. Modiano, “ Computation and Communication Co-Design for Real-Time Monitoring and Control in Multi-Agent Systems ,”  IEEE Wiopt, 2021.

243. Eray Atay, Igor Kadota, E. Modiano, “ Aging Wireless Bandits: Regret Analysis and Order-Optimal Learning Algorithm ,”  IEEE Wiopt 2021.

242. Xinzhe Fu and E. Modiano,  “ Elastic Job Scheduling with Unknown Utility Functions ,” IFIP Performance, Milan, 2021.

241. Bai Liu and E. Modiano, “ Optimal Control for Networks with Unobservable Malicious Nodes ,”  IFIP Performance, Milan, 2021.

240. Bai Liu, Qiaomin Xie,  Eytan Modiano, “ RL-QN:  A Reinforcement Learning Framework for Optimal Control of Queueing Systems ,”  ACM Sigmetrics Workshop on Reinforcement Learning in Networks and Queues (RLNQ), 2021.

239. Xinzhe Fu and E. Modiano,  “ Learning-NUM: Network Utility Maximization with Unknown Utility Functions and Queueing Delay ,  ACM MobiHoc 2021.  

238. Vishrant Tripathi and Eytan Modiano,  “ An Online Learning Approach to Optimizing Time-Varying Costs of AoI ,”  ACM MobiHoc 2021. 

237.   Igor Kadota, Muhammad Shahir Rahman, and Eytan Modiano, “ WiFresh: Age-of-Information from Theory to Implementation ,”  International Conference on Computer Communications and Networks (ICCCN), 2021.

236. Vishrant Tripathi and Eytan Modiano, “ Age Debt: A General Framework For Minimizing Age of Information ,”  IEEE Infocom Workshop on Age-of-Information, 2021.

235. Igor Kadota, Eytan Modiano, “ Age of Information in Random Access Networks with Stochastic Arrivals ,” IEEE Infocom, 2020.

234. Igor Kadota, M. Shahir Rahman, Eytan Modiano, Poster: Age of Information in Wireless Networks: from Theory to Implementation , ACM Mobicom, 2020.

233. Xinyu Wu, Dan Wu, Eytan Modiano, “ An Influence Model Approach to Failure Cascade Prediction in Large Scale Power Systems ,” IEEE American Control Conference, July, 2020.

232. X. Fu and E. Modiano, “ Fundamental Limits of Volume-based Network DoS Attacks ,” Proc. ACM Sigmetrics, Boston, MA, June 2020.

231. Vishrant Tripathi, Eytan Modiano, “ A Whittle Index Approach to Minimizing Functions of Age of Information ,” Allerton Conference on Communication, Control, and Computing, September 2019.

230. Bai Liu, Xiaomin Xie, Eytan Modiano, “ Reinforcement Learning for Optimal Control of Queueing Systems ,” Allerton Conference on Communication, Control, and Computing, September 2019.

229. Rajat Talak, Sertac Karaman, Eytan Modiano, “ A Theory of Uncertainty Variables for State Estimation and Inference ,” Allerton Conference on Communication, Control, and Computing, September 2019.

228. Rajat Talak, Eytan Modiano, “ Age-Delay Tradeoffs in Single Server Systems ,” IEEE International Symposium on Information Theory, Paris, France, July, 2019.

227. Rajat Talak, Sertac Karaman, Eytan Modiano, “ When a Heavy Tailed Service Minimizes Age of Information ,” IEEE International Symposium on Information Theory, Paris, France, July, 2019.

226. Qingkai Liang, Eytan Modiano, “ Optimal Network Control with Adversarial Uncontrollable Nodes ,” ACM MobiHoc, Catania, Italy, June 2019.

225. Igor Kadota, Eytan Modiano, “ Minimizing the Age of Information in Wireless Networks with Stochastic Arrivals ,” ACM MobiHoc, June 2019.

224. Maotong Xu, Jelena Diakonikolas, Suresh Subramaniam, Eytan Modiano, “ A Hierarchical WDM-based Scalable Data Center Network Architecture ,” IEEE International Conference on Communications (ICC), Shanghai, China, June 2019.

223. Maotong Xu, Min Tian, Eytan Modiano, Suresh Subramaniam, “ RHODA Topology Configuration Using Bayesian Optimization

222.   Anurag Rai, Rahul Singh and Eytan Modiano, “ A Distributed Algorithm for Throughput Optimal Routing in Overlay Networks ,”  IFIP Networking 2019, Warsaw, Poland, May 2019.

221.   Qingkai Liang and Eytan Modiano, “ Optimal Network Control in Partially-Controllable Networks ,”  IEEE Infocom, Paris, April 2019.

220.   Xinzhe Fu and Eytan Modiano, “ Network Interdiction Using Adversarial Traffic Flows ,”  IEEE Infocom, Paris, April 2019.

219.   Vishrant Tripathi, Rajat Talak, Eytan Modiano, “ Age Optimal Information Gathering and Dissemination on Graphs ,”  IEEE Infocom, Paris, April 2019.

218.   Jianan Zhang, Hyang-Won Lee, Eytan Modiano, “ On the Robustness of Distributed Computing Networks ,”  DRCN 2019, Coimbra, Portugal, March, 2019.

217.   Hyang-Won Lee, Jianan Zhang and Eytan Modiano, “ Data-driven Localization and Estimation of Disturbance in the Interconnected Power System ,”  IEEE Smartgridcomm, October, 2018.

216.   Jianan Zhang and Eytan Modiano, “ Joint Frequency Regulation and Economic Dispatch Using Limited Communication ,”  IEEE Smartgridcomm, October, 2018.

215.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Scheduling Policies for Age Minimization in Wireless Networks with Unknown Channel State ,”  IEEE International Symposium on Information Theory, July 2018.

214.   Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano, “ Online Learning Algorithms for Minimizing Queue Length Regret ,”  IEEE International Symposium on Information Theory, July 2018.

213.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Distributed Scheduling Algorithms for Optimizing Information Freshness in Wireless Networks ,”  IEEE SPAWC, Kalamata, Greece, June, 2018.

212.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Optimizing Information Freshness in Wireless Networks under General Interference Constraints ,”  ACM MobiHoc 2018, Los Angeles, CA, June 2018.

211.   Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano, “ Learning Algorithms for Scheduling in Wireless Networks with Unknown Channel Statistics ,”  ACM MobiHoc, June 2018.

210.   Khashayar Kamran, Jianan Zhang, Edmund Yeh, Eytan Modiano, “ Robustness of Interdependent Geometric Networks Under Inhomogeneous Failures ,”  Workshop on Spatial Stochastic Models for Wireless Networks (SpaSWiN), Shanghai, China, May 2018.

209.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Optimizing Age of Information in Wireless Networks with Perfect Channel State Information ,”  Wiopt 2018, Shanghai, China, May 2018.

208.   Abhishek Sinha, Eytan Modiano, “ Network Utility Maximization with Heterogeneous Traffic Flows ,”  Wiopt 2018, Shanghai, China, May 2018.

207.   Qingkai Liang, Eytan Modiano, “ Minimizing Queue Length Regret Under Adversarial Network Models ,”  ACM Sigmetrics, 2018.

206.   Jianan Zhang, Abhishek Sinha, Jaime Llorca, Anonia Tulino, Eytan Modiano, “ Optimal Control of Distributed Computing Networks with Mixed-Cast Traffic Flows ,”  IEEE Infocom, Honolulu, HI, April 2018.

205.   Qingkai Liang, Eytan Modiano, “ Network Utility Maximization in Adversarial Environments ,”  IEEE Infocom, Honolulu, HI, April 2018.

204.   Igor Kadota, Abhishek Sinha, Eytan Modiano, “ Optimizing Age of Information in Wireless Networks with Throughput Constraints ,”  IEEE Infocom, Honolulu, HI, April 2018.

203.   QIngkai Liang, Verina (Fanyu) Que, Eytan Modiano, “ Accelerated Primal-Dual Policy Optimization for Safe Reinforcement Learning ,”  NIPS workshop on “Transparent and interpretable machine learning in safety critical environments,”December 2017.

202.   Rahul Singh, Xueying Guo,Eytan Modiano, “ Risk-Sensitive Optimal Control of Queues ,”  IEEE Conference on Decision and Control (CDC), December 2017.

201.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Minimizing Age of Information in Multi-Hop Wireless Networks ,”  Allerton Conference on Communication, Control, and Computing, September 2017.

200.   Abhishek Sinha, Eytan Modiano, “ Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions ,”  ACM MobiHoc, Madras, India, July 2017.

199.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Capacity and delay scaling for broadcast transmission in highly mobile wireless networks ,”  ACM MobiHoc, Madras, India, July 2017.

198.5 . Y.-P. Hsu, E. Modiano, and L. Duan, “ Age of Information: Design and Analysis of Optimal Scheduling Algorithms ,”  IEEE International Symposium on Information Theory (ISIT), 2017.

198.   Qingkai Liang and Eytan Modiano, “ Coflow Scheduling in Input-Queued Switches: Optimal Delay Scaling and Algorithms ,”  IEEE Infocom, Atlanta, GA, May 2017.

197.   Jianan Zhang and Eytan Modiano, “ Robust Routing in Interdependent Networks ,”  IEEE Infocom, Atlanta, GA, May 2017.

196.   Abhishek Sinha, Eytan Modiano, “ Optimal Control for Generalized Network Flow Problems ,”  IEEE Infocom, Atlanta, GA, May 2017.

195.   Rajat Talak*, Sertac Karaman, Eytan Modiano, “ Speed Limits in Autonomous Vehicular Networks due to Communication Constraints ,”  IEEE Conference on Decision and Control (CDC), Las Vegas, NV, December 2016.

194.   Marzieh Parandehgheibi*, Konstantin Turitsyn, Eytan Modiano, “ Distributed Frequency Control in Power Grids Under Limited Communication ,”  IEEE Conference on Decision and Control (CDC), Las Vegas, NV, December 2016.

193.   Igor Kadota, Elif Uysal-Biyikoglu, Rahul Singh, Eytan Modiano, “ Minimizing Age of Information in Broadcast Wireless Networks ,”  Allerton Allerton Conference on Communication, Control, and Computing, September 2016.

192.   Jianan Zhang, Edmund Yeh, Eytan Modiano, “ Robustness of Interdependent Random Geometric Networks ,”  Allerton Conference on Communication, Control, and Computing, September 2016.

191.   Abhishek Sinha, Leandros Tassiulas, Eytan Modiano, “ Throughput-Optimal Broadcast in Wireless Networks with Dynamic Topology ,”  ACM MobiHoc’16, Paderborn, Germany, July, 2016. (winner of best paper award)

190.   Abishek Sinha, Georgios Paschos, Eytan Modiano, “ Throughput-Optimal Multi-hop Broadcast Algorithms ,”  ACM MobiHoc’16, Paderborn, Germany, July, 2016.

189.   Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano, “ Throughput Maximization in Uncooperative Spectrum Sharing Networks ,”  IEEE International Symposium on Information Theory, Barcelona, Spain, July 2016.

188.   Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano, “ Topology Control for Wireless Networks with Highly-Directional Antennas ,”  IEEE Wiopt, Tempe, Arizona, May, 2016.

187.   Qingkai Liang, H.W. Lee, Eytan Modiano, “ Robust Design of Spectrum-Sharing Networks ,”  IEEE Wiopt, Tempe, Arizona, May, 2016.

186.   Hossein Shokri-Ghadikolae, Carlo Fischione and Eytan Modiano, “ On the Accuracy of Interference Models in Wireless Communications ,”  IEEE International Conference on Communications (ICC), 2016.

185.   Qingkai Liang and Eytan Modiano, “ Survivability in Time-varying Networks ,”  IEEE Infocom, San Francisco, CA, April 2016.

184.   Kyu S. Kim, Chih-Ping Li, Igor Kadota, Eytan Modiano, “ Optimal Scheduling of Real-Time Traffic in Wireless Networks with Delayed Feedback ,”  Allerton conference on Communication, Control, and Computing, September 2015.

183.   Marzieh Parandehgheibi, Eytan Modiano, “ Modeling the Impact of Communication Loss on the Power Grid Under Emergency Control ,”  IEEE SmartGridComm, Miami, FL, Nov. 2015.

182.   Anurag Rai, Chih-ping Li, Georgios Paschos, Eytan Modiano, “ Loop-Free Backpressure Routing Using Link-Reversal Algorithms ,”  Proceedings of the ACM MobiHoc, July 2015.

181.   Longbo Huang, Eytan Modiano, “ Optimizing Age of Information in a Multiclass Queueing System ,”  Proceedings of IEEE ISIT 2015, Hong Kong, Jun 2015.

180.   M. Johnston, E. Modiano, “ A New Look at Wireless Scheduling with Delayed Information ,”  Proceedings of IEEE ISIT 2015, Hong Kong, June 2015.

179.   M. Johnston, E. Modiano, “ Scheduling over Time Varying Channels with Hidden State Information ,”  Proceedings of IEEE ISIT 2015, Hong Kong, June 2015.

178.   M. Johnston and E. Modiano, “ Controller Placement for Maximum Throughput Under Delayed CSI ,”  IEEE Wiopt, Mombai, India, May 2015.

177.   A. Sinha, G. Paschos, C. P. Li, and E. Modiano, “ Throughput Optimal Broadcast on Directed Acyclic Graphs ,”  IEEE Infocom, Hong Kong, April 2015.

176.   J. Zheng and E. Modiano, “ Enhancing Network Robustness via Shielding ,”  IEEE Design of Reliable Communication Networks, Kansas City, March 2015.

175.   H. W. Lee and E. Modiano, “ Robust Design of Cognitive Radio Networks ,”  Information and Communication Technology Convergence (ICTC), 2014.

174.   Greg Kuperman and Eytan Modiano, “ Disjoint Path Protection in Multi-Hop Wireless Networks with Interference Constraints ,”  IEEE Globecom, Austin, TX, December 2014.

173.   Marzieh Parandehgheibi, Eytan Modiano, David Hay, “ Mitigating Cascading Failures in Interdependent Power Grids and Communication Networks ,”  IEEE Smartgridcomm, Venice, Italy, November 2014.

172.   Georgios Paschos and Eytan Modiano, “ Throughput optimal routing in overlay networks ,”  Allerton conference on Communication, Control, and Computing, September 2014.

171.   Nathan Jones, George Paschos, Brooke Shrader, Eytan Modiano, “ An overlay architecture for Throughput Optimal Multipath Routing ,”  ACM MobiHoc, August 2014.

170.   Matt Johnston, Eytan Modiano, Yuri Polyanskiy, “ Opportunistic Scheduling with Limited Channel State Information: A Rate Distortion Approach ,”  IEEE International Symposium on Information Theory, Honolulu, HI, July 2014.

169.   Chih-Ping Li, Georgios Paschos, Eytan Modiano, Leandros Tassiulas, “ Dynamic Overload Balancing in Server Farms ,”  Networking 2014, Trondheim, Norway, June, 2014.

168.   Hulya Seferonglu and Eytan Modiano, “ TCP-Aware Backpressure Routing and Scheduling ,”  Information Theory and Applications, San Diego, CA, February 2014.

167.   Mihalis Markakis, Eytan Modiano, John Tsitsiklis, “ Delay Stability of Back-Pressure Policies in the presence of Heavy-Tailed Traffic ,”  Information Theory and Applications, San Diego, CA, February 2014.

166.   Kyu Soeb Kim, Chih-ping Li, Eytan Modiano, “ Scheduling Multicast Traffic with Deadlines in Wireless Networks ,”  IEEE Infocom, Toronto, CA, April 2014.

165.   Georgios Paschos, Chih-ping Li, Eytan Modiano, Kostas Choumas, Thanasis Korakis, “ A Demonstration of Multirate Multicast Over an 802.11 Mesh Network ,”  IEEE Infocom, Toronto, CA, April 2014.

164.   Sebastian Neumayer, Eytan Modiano, “ Assessing the Effect of Geographically Correlated Failures on Interconnected Power-Communication Networks ,”  IEEE SmartGridComm, 2013.

163.   Marzieh Parandehgheibi, Eytan Modiano, “ Robustness of Interdependent Networks: The case of communication networks and the power grid ,”  IEEE Globecom, December 2013.

162.   Matt Johnston, Eytan Modiano, “ Optimal Channel Probing in Communication Systems: The Two-Channel Case ,”  IEEE Globecom, December 2013.

161.   Mihalis Markakis, Eytan Modiano, John N. Tsitsiklis, “ Delay Analysis of the Max-Weight Policy under Heavy-Tailed Traffic via Fluid Approximations ,”  Allerton Conference, October 2013.

160.   Matthew Johnston, Isaac Keslassy, Eytan Modiano, “ Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal ,”  IEEE International Symposium on Information Theory, July 2013.

159.   Krishna P Jagannathan, Libin Jiang, Palthya Lakshma Naik, Eytan Modiano, “ Scheduling Strategies to Mitigate the Impact of Bursty Traffic in Wireless Networks ,”  11th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks Wiopt 2013, Japan, May 2013. (Winner – Best Paper Award).

158.   Hulya Seferoglu and Eytan Modiano, “ Diff-Max: Separation of Routing and Scheduling in Backpressure-Based Wireless Networks ,”  IEEE Infocom, Turin, Italy, April 2013.

157.   Chih-Ping Li, Eytan Modiano, “ Receiver-Based Flow Control for Networks in Overload ,”  IEEE Infocom, Turin, Italy, April 2013.

156.   Nathan Jones, Brooke Shrader, Eytan Modiano, “ Distributed CSMA with Pairwise Coding ,”  IEEE Infocom, Turin, Italy, April 2013.

155.   Greg Kuperman and Eytan Modiano, “ Network Protection with Guaranteed Recovery Times using Recovery Domains ,”  IEEE Infocom, Turin, Italy, April 2013.

154.   Greg Kuperman and Eytan Modiano, “ Providing Protection in Multi-Hop Wireless Networks ,”  IEEE Infocom, Turin, Italy, April 2013.

153.   Greg Kuperman, Eytan Modiano, Aradhana Narula-Tam, “ Network Protection with Multiple Availability Guarantees ,”  IEEE ICC workshop on New Trends in Optical Networks Survivability, June 2012.

152.   Nathaniel Jones, Brooke Shrader, Eytan Modiano, “ Optimal Routing and Scheduling for a Simple Network Coding Scheme ,”  IEEE Infocom, Orlando, Fl, March, 2012.

151.   Mihalis Markakis, Eytan Modiano, John Tsitsiklis, “ Max-Weight Scheduling in Networks with Heavy-Tailed Traffic ,”  IEEE Infocom, Orlando, Fl, March, 2012.

150.   Guner Celik and Eytan Modiano, “ Scheduling in Networks with Time-Varying Channels and Reconfiguration Delay ,”  IEEE Infocom, Orlando, Fl, March, 2012.

149.   Sebastian Neumayer, Alon Efrat, Eytan Modiano, “ Geographic Max-Flow and Min-cut Under a Circular Disk Failure Model ,”  IEEE Infocom (MC), Orlando, Fl, March, 2012.

148.   Marzieh Parandehgheibi, Hyang-Won Lee, and Eytan Modiano, “ Survivable Paths in Multi-Layer Networks ,”  Conference on Information Science and Systems, March, 2012.

147.   Greg Kuperman, Eytan Modiano, and Aradhana Narula-Tam, “ Partial Protection in Networks with Backup Capacity Sharing ,”  Optical Fiber Communications Conference (OFC), Anaheim, CA, March, 2012.

146.   Krishna Jagannathan, Libin Jiang, Eytan Modiano, “ On Scheduling Algorithms Robust to Heavy-Tailed Traffic ,”  Information Theory and Applications (ITA), San Diego, CA, February 2012.

145.   M. Johnston, H.W. Lee, E. Modiano, “ Robust Network Design for Stochastic Traffic Demands ,”  IEEE Globecom, Next Generation Networking Symposium, Houston, TX, December 2011.

144.   S. Neumayer, E. Modiano, “ Network Reliability Under Random Circular Cuts ,”  IEEE Globecom, Optical Networks and Systems Symposium, Houston, TX, December 2011.

143.   H.W. Lee, K. Lee, E. Modiano, “ Maximizing Reliability in WDM Networks through Lightpath Routing ,”  IEEE Globecom, Optical Networks and Systems Symposium, Houston, TX, December 2011.

142.   Guner Celik, Sem Borst, Eytan Modiano, Phil Whiting, “ Variable Frame Based Max-Weight Algorithms for Networks with Switchover Delay ,”  IEEE International Symposium on Information Theory, St. Petersburgh, Russia, August 2011.

141.   Krishna Jaganathan, Ishai Menache, Eytan Modiano, and Gil Zussman, “ Non-cooperative Spectrum Access – The Dedicated vs. Free Spectrum Choice ,”  ACM MOBIHOC’11, May 2011.

140.   Krishna Jagannathan, Shie Mannor, Ishai Menache, Eytan Modiano, “ A State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels ,”  IEEE Infocom (Mini-conference), Shanghai, China, April 2011.

139.   Guner Celik, Long B. Le, Eytan Modiano, “ Scheduling in Parallel Queues with Randomly Varying Connectivity and Switchover Delay ,”  IEEE Infocom (Mini-conference), Shanghai, China, April 2011.

138.   Gregory Kuperman, Eytan Modiano, Aradhana Narula-Tam, “ Analysis and Algorithms for Partial Protection in Mesh Networks ,”  IEEE Infocom (Mini-conference), Shanghai, China, April 2011.

137.   Matthew Johnston, Hyang-Won Lee, Eytan Modiano, “ A Robust Optimization Approach to Backup Network Design with Random Failures ,”  IEEE Infocom, Shanghai, China, April 2011.

136.   Krishna Jagannathan, Mihalis Markakis, Eytan Modiano, John Tsitsiklis, “ Queue Length Asymptotics for Generalized Max-Weight Scheduling in the presence of Heavy-Tailed Traffic ,”  IEEE Infocom, Shanghai, China, April 2011.

135.   Guner Celik and Eytan Modiano, “ Dynamic Vehicle Routing for Data Gathering in Wireless Networks ,”  In Proc. IEEE CDC’10, Dec. 2010..***

134.   Long B. Le, Eytan Modiano, Changhee Joo, and Ness B. Shroff, “ Longest-queue-first scheduling under the SINR interference model ,”  ACM MobiHoc, September 2010..***

133.   Krishna Jagannathan, Mihalis Markakis, Eytan Modiano, John Tsitsiklis, “ Throughput Optimal Scheduling in the Presence of Heavy-Tailed Traffic ,”  Allerton Conference on Communication, Control, and Computing, September 2010..**

132.   Delia Ciullo, Guner Celik, Eytan Modiano, “ Minimizing Transmission Energy in Sensor Networks via Trajectory Control ,”  IEEE Wiopt 2010, Avignon, France, June 2010, (10 pages; CD proceedings – page numbers not available).

131.   Sebastian Neumayer and Eytan Modiano, “ Network Reliability with Geographically Correlated Failures ,”  IEEE Infocom 2010, San Diego, CA, March 2010, (9 pages; CD proceedings – page numbers not available).**

130.   Long Le, Eytan Modiano, Ness Shroff, “ Optimal Control of Wireless Networks with Finite Buffers ,”  IEEE Infocom 2010, San Diego, CA, March 2010, (9 pages; CD proceedings – page numbers not available).

129.   Kayi Lee, Hyang-Won Lee, Eytan Modiano, “ Reliability in Layered Network with Random Link Failures ,”  IEEE Infocom 2010, San Diego, CA, March 2010, (9 pages; CD proceedings – page numbers not available).**

128.   Krishna Jagannathan, Eytan Modiano, “ The Impact of Queue length Information on Buffer Overflow in Parallel Queues ,”  Allerton Conference on Communication, Control, and Computing, September 2009, pgs. 1103 -1110 **

127.   Mihalis Markakis, Eytan Modiano, John Tsitsiklis, “ Scheduling Policies for Single-Hop with Heavy-Tailed Traffic ,”  Allerton Conference on Communication, Control, and Computing, September 2009, pgs. 112 – 120..**

126.   Dan Kan, Aradhana Narula-Tam, Eytan Modiano, “ Lightpath Routing and Capacity Assignment for Survivable IP-over-WDM Networks ,”  DRCN 2009, Alexandria, VA October 2009, pgs. 37 -44..**

125.   Mehdi Ansari, Alireza Bayesteh, Eytan Modiano, “ Opportunistic Scheduling in Large Scale Wireless Networks ,”  IEEE International Symposium on Information Theory, Seoul, Korea, June 2009, pgs. 1624 – 1628.

124.   Hyang-Won Lee, Eytan Modiano and Long Bao Le, “ Distributed Throughput Maximization in Wireless Networks via Random Power Allocation ,”  IEEE Wiopt, Seoul, Korea, June 2009. (9 pages; CD proceedings – page numbers not available).

123.   Wajahat Khan, Eytan Modiano, Long Le, “ Autonomous Routing Algorithms for Networks with Wide-Spread Failures ,”  IEEE MILCOM, Boston, MA, October 2009. (6 pages; CD proceedings – page numbers not available).**

122.   Guner Celik and Eytan Modiano, “ Random Access Wireless Networks with Controlled Mobility ,”  IEEE Med-Hoc-Nets, Haifa, Israel, June 2009, pgs. 8 – 14.**

121.   Hyang-Won Lee and Eytan Modiano, “ Diverse Routing in Networks with Probabilistic Failures ,”  IEEE Infocom, April 2009, pgs. 1035 – 1043.

120.   Kayi Lee and Eytan Modiano, “ Cross-layer Survivability in WDM-based Networks ,”  IEEE Infocom, April 2009, pgs. 1017 -1025..**

119.   Krishna Jagannathan, Eytan Modiano, Lizhong Zheng, “ On the Trade-off between Control Rate and Congestion in Single Server Systems ,”  IEEE Infocom, April 2009, pgs. 271 – 279.**

118.   Sebastian Neumayer, Gil Zussman, Rueven Cohen, Eytan Modiano, “ Assessing the Vulnerability of the Fiber Infrastructure to Disasters ,”  IEEE Infocom, April 2009, pgs. 1566 – 1574.**

117.   Long Le, Krishna Jagannathan and Eytan Modiano, “ Delay analysis of max-weight scheduling in wireless ad hoc networks ,”  Conference on Information Science and Systems, Baltimore, MD, March, 2009, pgs. 389 – 394.**

116.   Krishna Jagannathan, Eytan Modiano, Lizhong Zheng, “ Effective Resource Allocation in a Queue: How Much Control is Necessary? ,”  Allerton Conference on Communication, Control, and Computing, September 2008, pgs. 508 – 515.**

115.   Sebastian Neumayer, Gil Zussman, Rueven Cohen, Eytan Modiano, “ Assessing the Impact of Geographically Correlated Network Failures ,”  IEEE MILCOM, November 2008. (6 pages; CD proceedings – page numbers not available).**

114.   Emily Craparo, Jonathan P. How, and Eytan Modiano, “ Simultaneous Placement and Assignment for Exploration in Mobile Backbone Networks ,”  IEEE conference on Decision and Control (CDC), November 2008, pgs. 1696 – 1701 **

113.   Anand Srinivas and Eytan Modiano, “ Joint node placement and assignment for throughput optimization in mobile backbone networks ,”  IEEE INFOCOM’08, pp. 1130 – 1138, Phoenix, AZ, Apr. 2008, pgs. 1130 – 1138.**

112.   Guner Celik, Gil Zussman, Wajahat Khan and Eytan Modiano, “ MAC for Networks with Multipacket Reception Capability and Spatially Distributed Nodes ,”  IEEE INFOCOM’08, Phoenix, AZ, Apr. 2008, pgs. 1436 – 1444.**

111.   Gil Zussman, Andrew Brzezinski, and Eytan Modiano, “ Multihop Local Pooling for Distributed Throughput Maximization in Wireless Networks ,”  IEEE INFOCOM’08, Phoenix, AZ, Apr. 2008, pgs 1139 – 1147.**

110.   Emily Craparo, Jonathan How and Eytan Modiano, “ Optimization of Mobile Backbone Networks: Improved Algorithms and Approximation ,”  IEEE American Control Conference, Seattle, WA, June 2008, pgs. 2016 – 2021.**

109.   Atilla Eryilmaz, Asuman Ozdaglar, Devavrat Shah, Eytan Modiano, “ Imperfect Randomized Algorithms for the Optimal Control of Wireless Networks ,”  Conference on Information Science and Systems, Princeton, NJ, March, 2008, pgs. 932 – 937.

108.   Anand Srinivas and Eytan Modiano, “ Optimal Path Planning for Mobile Backbone Networks ,”  Conference on Information Science and Systems, Princeton, NJ, March, 2008, pgs. 913 – 918.

107.   Kayi Lee and Eytan Modiano, “ Cross-layer Survivability in WDM Networks with Multiple Failures ,”  IEEE Optical Fiber Communications Conference, San Diego, CA February, 2008 (3 pages; CD proceedings – page numbers not available).

106.   Andrew Brzezinski, Gil Zussman and Eytan Modiano, “ Local Pooling Conditions for Joint Routing and Scheduling ,”  Workshop on Information Theory and Applications, pp. 499 – 506, La Jolla, CA, January, 2008, pgs. 499 – 506.

105.   Murtaza Zafer and Eytan Modiano, “ Minimum Energy Transmission over a Wireless Fading Channel with Packet Deadlines ,”  Proceedings of IEEE Conference on Decision and Control (CDC), New Orleans, LA, December, 2007, pgs. 1148 – 1155.**

104.   Atilla Eryilmaz, Asuman Ozdaglar, Eytan Modiano, “ Polynomial Complexity Algorithms for Full Utilization of Multi-hop Wireless Networks ,”  IEEE Infocom, Anchorage, AK, April, 2007, pgs. 499 – 507.

103.   Murtaza Zafer and Eytan Modiano, “ Delay Constrained Energy Efficient Data Transmission over a Wireless Fading Channel ,”  Workshop on Information Theory and Application, University of California, San Diego, CA, February, 2007, pgs. 289 – 298.**

102.   Atilla Eryilmaz, Eytan Modiano, Asuman Ozdaglar, “ Randomized Algorithms for Throughput-Optimality and Fairness in Wireless Networks ,”  Proceedings of IEEE Conference on Decision and Control (CDC), San Diego, CA, December, 2006, pgs. 1936 – 1941.

101.   Anand Srinivas, Gil Zussman, and Eytan Modiano, “ Distributed Mobile Disk Cover – A Building Block for Mobile Backbone Networks ,”  Proc. Allerton Conf. on Communication, Control, and Computing, Allerton, IL, September 2006, (9 pages; CD proceedings – page numbers not available).**

100.   Krishna Jagannathan, Sem Borst, Phil Whiting, Eytan Modiano, “ Scheduling of Multi-Antenna Broadcast Systems with Heterogeneous Users ,”  Allerton Conference on Communication, Control and Computing, Allerton, IL, September 2006, (10 pages; CD proceedings – page numbers not available).**

99.   Andrew Brzezinski, Gil Zussman, and Eytan Modiano, “ Enabling Distributed Throughput Maximization in Wireless Mesh Networks – A Partitioning Approach ,”  Proceedings of ACM MOBICOM’06, Los Angeles, CA, Sep. 2006, (12 pages; CD proceedings – page numbers not available).**

98.   Eytan Modiano, Devavrat Shah, and Gil Zussman, “ Maximizing Throughput in Wireless Networks via Gossiping ,”  Proc. ACM SIGMETRICS / IFIP Performance’06, Saint-Malo, France, June 2006, (12 pages; CD proceedings – page numbers not available). (best paper award)

97.   Anand Srinivas, Gil Zussman, and Eytan Modiano, “ Mobile Backbone Networks – Construction and Maintenance ,”  Proc. ACM MOBIHOC’06, Florence, Italy, May 2006, (12 pages; CD proceedings – page numbers not available).**

96.   Andrew Brzezinski and Eytan Modiano, “ Achieving 100% throughput in reconfigurable optical networks ,”  IEEE INFOCOM 2006 High-Speed Networking Workshop, Barcelona, Spain, April 2006, (5 pages; CD proceedings – page numbers not available).**

95.   Krishna P. Jagannathan, Sem Borst, Phil Whiting, Eytan Modiano, “ Efficient scheduling of multi-user multi-antenna systems ,”  Proceedings of WiOpt 2006, Boston, MA, April 2006, (8 pages; CD proceedings – page numbers not available).**

94.   Andrew Brzezinski and Eytan Modiano, “ Greedy weighted matching for scheduling the input-queued switch ,”  Conference on Information Sciences and Systems (CISS), Princeton, NJ, March 2006, pgs. 1738 – 1743.**

93.   Murtaza Zafer and Eytan Modiano, “ Optimal Adaptive Data Transmission over a Fading Channel with Deadline and Power Constraints ,”  Conference on Information Sciences and Systems (CISS), Princeton, New Jersey, March 2006, pgs. 931 – 937.**

92.   Li-Wei Chen and E. Modiano, “ A Geometric Approach to Capacity Provisioning in WDM Networks with Dynamic Traffic ,”  Conference on Information Science and Systems (CISS), Princeton, NJ, March, 2006, pgs. 1676 – 1683, **

91.   Jun Sun and Eytan Modiano, “ Channel Allocation Using Pricing in Satellite Networks ,”  Conference on Information Science and Systems (CISS), Princeton, NJ, March, 2006, pgs. 182 – 187.**

90.   Jun Sun, Jay Gao, Shervin Shambayatti and Eytan Modiano, “ Ka-Band Link Optimization with Rate Adaptation ,”  IEEE Aerospace Conference, Big Sky, MN, March, 2006. (7 pages; CD proceedings – page numbers not available).

89.   Alessandro Tarello, Eytan Modiano and Jay Gao, “ Energy efficient transmission scheduling over Mars proximity links ,”  IEEE Aerospace Conference, Big Sky, MN, March, 2006. (10 pages; CD proceedings – page numbers not available).

88.   A. Brzezinski and E. Modiano, “ RWA decompositions for optimal throughput in reconfigurable optical networks ,”  INFORMS Telecommunications Conference, Dallas, TX, March 2006 (3 pages; CD proceedings – page numbers not available).**

87.   Li Wei Chen and E. Modiano, “ Geometric Capacity Provisioning for Wavelength Switched WDM Networks ,”  Workshop on Information Theory and Application, University of California, San Diego, CA, February, 2006. (8 pages; CD proceedings – page numbers not available).**

86.   Murtaza Zafer and Eytan Modiano, “ Joint Scheduling of Rate-guaranteed and Best-effort Services over a Wireless Channel ,”  IEEE Conference on Decision and Control, Seville, Spain, December, 2005, pgs. 6022–6027.**

85.   Jun Sun and Eytan Modiano, “ Opportunistic Power Allocation for Fading Channels with Non-cooperative Users and Random Access ,”  IEEE BroadNets – Wireless Networking Symposium, Boston, MA, October, 2005, pgs. 397–405.**

84.   Li Wei Chen and Eytan Modiano, “ Uniform vs. Non-uniform Band Switching in WDM Networks ,”  IEEE BroadNets-Optical Networking Symposium, Boston, MA, October, 2005, pgs. 219– 228.**

83.   Sonia Jain and Eytan Modiano, “ Buffer Management Schemes for Enhanced TCP Performance over Satellite Links ,”  IEEE MILCOM, Atlantic City, NJ, October 2005 (8 pages; CD proceedings – page numbers not available).**

82.   Murtaza Zafer and Eytan Modiano, “ Continuous-time Optimal Rate Control for Delay Constrained Data Transmission ,”  Allerton Conference on Communications, Control and Computing, Allerton, IL, September, 2005 (10 pages; CD proceedings – page numbers not available).**

81.   Alessandro Tarello, Eytan Modiano, Jun Sun, Murtaza Zafer, “ Minimum Energy Transmission Scheduling subject to Deadline Constraints ,”  IEEE Wiopt, Trentino, Italy, April, 2005, pgs. 67–76. (Winner of best student paper award).**

80.   Amir Khandani, Eytan Modiano, Jinane Abounadi, Lizhong Zheng, “ Reliability and Route Diversity in Wireless Networks ,”  Conference on Information Science and System, Baltimore, MD, March, 2005, (8 pages; CD proceedings – page numbers not available).**

79.   Andrew Brzezinski, Iraj Saniee, Indra Widjaja, Eytan Modiano, “ Flow Control and Congestion Management for Distributed Scheduling of Burst Transmissions in Time-Domain Wavelength Interleaved Networks ,”  IEEE/OSA Optical Fiber Conference (OFC), Anaheim, CA, March, 2005, pgs. WC4-1–WC4-3.

78.   Andrew Brzezinski and Eytan Modiano, “ Dynamic Reconfiguration and Routing Algorithms for IP-over-WDM Networks with Stochastic Traffic ,”  IEEE Infocom 2005, Miami, FL, March, 2005, pgs. 6–11.**

77.   Murtaza Zafer and Eytan Modiano, “ A Calculus Approach to Minimum Energy Transmission Policies with Quality of Service Guarantees ,”  IEEE Infocom 2005, Miami, FL, March, 2005, pgs. 548–559.**

76.   Michael Neely and Eytan Modiano, “ Fairness and optimal stochastic control for heterogeneous networks ,”  IEEE Infocom 2005, Miami, FL, March, 2005, pgs. 1723 – 1734.**

75.   Aradhana Narula-Tam, Thomas G. Macdonald, Eytan Modiano, and Leslie Servi, “ A Dynamic Resource Allocation Strategy for Satellite Communications ,”  IEEE MILCOM, Monterey, CA, October, 2004, pgs. 1415 – 1421.

74.   Li-Wei Chen, Poompat Saengudomlert and Eytan Modiano, “ Optimal Waveband Switching in WDM Networks ,”  IEEE International Conference on Communication (ICC), Paris, France, June, 2004, pgs. 1604 – 1608.**

73.   Michael Neely and Eytan Modiano, “ Logarithmic Delay for NxN Packet Switches ,”  IEEE Workshop on High performance Switching and Routing (HPSR 2004), Phoenix, AZ, April, 2004, pgs. 3–9.**

72.   Li-Wei Chen and Eytan Modiano, “ Dynamic Routing and Wavelength Assignment with Optical Bypass using Ring Embeddings ,”  IEEE Workshop on High performance Switching and Routing (HPSR 2004), Phoenix, Az, April, 2004, pgs. 119–125.**

71.   Randall Berry and Eytan Modiano, “ On the Benefits of Tunability in Reducing Electronic Port Counts in WDM/TDM Networks ,”  IEEE Infocom, Hong Kong, March 2004, pgs. 1340–1351.

70.   Andrew Brzezinski and Eytan Modiano, “ A new look at dynamic traffic scheduling in WDM networks with transceiver tuning latency ,”  Informs Telecommunications Conference, Boca Raton, FL, March 2004, pgs. 25–26.**

69.   Chunmei Liu and Eytan Modiano, “ Packet Scheduling with Window Service Constraints ,”  Conference on Information Science and System, Princeton, NJ, March, 2004, pgs. 178–184.**

68.   Jun Sun, Eytan Modiano, and Lizhong Zheng, “ A Novel Auction Algorithm for Fair Allocation of a Wireless Fading Channel ,”  Conference on Information Science and System, Princeton, NJ, March, 2004, pgs. 1377–1383.**

67.   Murtaza Zafer and Eytan Modiano, “ Impact of Interference and Channel Assignment on Blocking Probability in Wireless Networks ,”  Conference on Information Science and System, Princeton, NJ, March, 2004, pgs. 430–436.**

66.   Chunmei Liu and Eytan Modiano, “ An Analysis of TCP over Random Access Satellite Links ,”  IEEE Wireless Communications and Networking Conference (WCNC), Atlanta, GA, February, 2004, pgs. 2033–2040..**

65.   Randall Berry and Eytan Modiano, “ Using tunable optical transceivers for reducing the number of ports in WDM/TDM Networks ,”  IEEE/OSA Optical Fiber Conference (OFC), Los Angeles, CA, February, 2004, pgs. 23–27.

64.   Aradhana Narula-Tam, Eytan Modiano and Andrew Brzezinski, “ Physical Topology Design for Survivable Routiing of Logical Rings in WDM-based Networks ,”  IEEE Globecom, San francisco, CA, December, 2003, pgs. 2552–2557.

63.   Jun Sun, Lizhong Zheng and Eytan Modiano, “ Wireless Channel Allocation Using an Auction Algorithm ,”  Allerton Conference on Communications, Control and Computing, October, 2003, pgs. 1114–1123..**

62.   Amir Khandani, Jinane Abounadi, Eytan Modiano, Lizhong Zhang, “ Cooperative Routing in Wireless Networks ,”  Allerton Conference on Communications, Control and Computing, October, 2003, pgs. 1270–1279.**

61.   Poompat Saengudomlert, Eytan Modiano and Robert Gallager, “ Dynamic Wavelength Assignment for WDM all optical Tree Networks ,”  Allerton Conference on Communications, Control and Computing, October, 2003, 915–924.**

60.   Aradhana Narula-Tam and Eytan Modiano, “ Designing Physical Topologies that Enable Survivable Routing of Logical Rings ,”  IEEE Workshop on Design of Reliable Communication Networks (DRCN), October, 2003, pgs. 379–386.

59.   Anand Srinivas and Eytan Modiano, “ Minimum Energy Disjoint Path Routing in Wireless Ad Hoc Networks ,”  ACM Mobicom, San Diego, Ca, September, 2003, pgs. 122–133.**

58.   Michael Neely and Eytan Modiano, “ Improving Delay in Ad-Hoc Mobile Networks Via Redundant Packet Transfers ,”  Conference on Information Science and System, Baltimore, MD, March, 2003 (6 pages; CD proceedings – page numbers not available).**

57.   Michael Neely, Eytan Modiano and Charles Rohrs, “ Dynamic Power Allocation and Routing for Time Varying Wireless Networks ,”  IEEE Infocom 2003, San Francisco, CA, April, 2003, pgs. 745–755.**

56.   Alvin Fu, Eytan Modiano, and John Tsitsiklis, “ Optimal Energy Allocation for Delay-Constrained Data Transmission over a Time-Varying Channel ,”  IEEE Infocom 2003, San Francisco, CA, April, 2003, pgs. 1095–1105.**

55.   Poompat Saengudomlert, Eytan Modiano and Rober Gallager, “ On-line Routing and Wavelength Assignment for Dynamic Traffic in WDM Ring and Torus Networks ,”  IEEE Infocom 2003, San Francisco, CA, April, 2003, pgs. 1805–1815.**

54.   Li-Wei Chen and Eytan Modiano, “ Efficient Routing and Wavelength Assignment for Reconfigurable WDM Networks with Wavelength Converters ,”  IEEE Infocom 2003, San Francisco, CA, April, 2003, pgs. 1785–1794. Selected as one of the best papers of Infocom 2003 for fast track publication in IEEE/ACM Transactions on Networking.**

53.   Mike Neely, Jun Sun and Eytan Modiano, “ Delay and Complexity Tradeoffs for Dynamic Routing and Power Allocation in a Wireless Network ,”  Allerton Conference on Communication, Control, and Computing, Allerton, Illinois, October, 2002, pgs. 157 –159.**

52.   Anand Ganti, Eytan Modiano and John Tsitsiklis, “ Transmission Scheduling for Multi-Channel Satellite and Wireless Networks ,”  Allerton Conference on Communication, Control, and Computing, Allerton, Illinois, October, 2002, pgs. 1318–1327.**

51.   Poompat Saengudomlert, Eytan Modiano, and Robert G. Gallager, “ Optimal Wavelength Assignment for Uniform All-to-All Traffic in WDM Tree Networks ,”  Allerton Conference on Communication, Control, and Computing, Allerton, Illinois, October, 2002, pgs. 528–537.**

50.   Hungjen Wang, Eytan Modiano and Muriel Medard, “ Partial Path Protection for WDM Networks: End-to-End Recovery Using Local Failure Information ,”  IEEE International Symposium on Computer Communications (ISCC), Taormina, Italy, July 2002, pgs. 719–725.**

49.   Jun Sun and Eytan Modiano, “ Capacity Provisioning and Failure Recovery in Mesh-Torus Networks with Application to Satellite Constellations ,”  IEEE International Symposium on Computer Communications (ISCC), Taormina, Italy, July 2002, pgs. 77–84.**

48.   Alvin Fu, Eytan Modiano, and John Tsitsiklis, “ Optimal Energy Allocation and Admission Control for Communications Satellites ,”  IEEE INFOCOM 2002, New York, June, 2002, pgs. 648–656.**

47.   Michael Neely, Eytan Modiano and Charles Rohrs, “ Power and Server Allocation in a Multi-Beam Satellite with Time Varying Channels ,”  IEEE INFOCOM 2002, New York, June, 2002, pgs. 1451–1460..**

46.   Mike Neely, Eytan Modiano and Charles Rohrs, “ Tradeoffs in Delay Guarantees and Computation Complexity for N x N Packet Switches ,”  Conference on Information Science and Systems, Princeton, NJ, March, 2002, pgs. 136–148.**

45.   Alvin Fu, Eytan Modiano and John Tsitsiklis, “ Transmission Scheduling Over a Fading Channel with Energy and Deadline Constraints ,”  Conference on Information Science and System, Princeton, NJ, March, 2002, pgs. 1018–1023.**

44.   Chunmei Liu and Eytan Modiano, “ On the Interaction of Layered Protocols: The Case of Window Flow Control and ARQ ,”  Conference on Information Science and System, Princeton, NJ, March, 2002, pgs. 118–124.**

43.   Mike Neely, Eytan Modiano and Charles Rohrs, “ Packet Routing over Parallel Time-varying Queues with Application to Satellite and Wireless Networks ,”  Conference on Information Science and System, Princeton, NJ, March, 2002, pgs. 360–366.**

42.   Ahluwalia Ashwinder, Eytan Modiano and Li Shu, “ On the Complexity and Distributed Construction of Energy Efficient Broadcast Trees in Static Ad Hoc Wireless Networks ,”  Conference on Information Science and System, Princeton, NJ, March, 2002, pgs. 807–813.**

41.   Jun Sun and Eytan Modiano, “ Capacity Provisioning and Failure Recovery for Satellite Constellations ,”  Conference on Information Science and System, Princeton, NJ, March, 2002, pgs. 1039–1045.**

40.   Eytan Modiano, Hungjen Wang, and Muriel Medard, “ Partial Path Protection for WDM networks ,”  Informs Telecommunications Conference, Boca Raton, FL, March 2002, pgs. 78–79.**

39.   Poompat Saengudomlert, Eytan H. Modiano, and Robert G. Gallager, “ An On-Line Routing and Wavelength Assignment Algorithm for Dynamic Traffic in a WDM Bidirectional Ring ,”  Joint Conference on Information Sciences (JCIS), Durham, North Carolina, March, 2002, pgs. 1331–1334.**

38.   Randy Berry and Eytan Modiano, “ Switching and Traffic Grooming in WDM Networks ,”  Joint Conference on Information Sciences (JCIS), Durham, North Carolina, March, 2002, pgs. 1340–1343.

37.   Eytan Modiano, Hungjen Wang, and Muriel Medard, “ Using Local Information for WDM Network Protection ,”  Joint Conference on Information Sciences (JCIS), Durham, North Carolina, March, 2002, pgs. 1398–1401.**

36.   Aradhana Narula-Tam and Eytan Modiano, “ Network architectures for supporting survivable WDM rings ,”  IEEE/OSA Optical Fiber Conference (OFC) 2002, Anaheim, CA, March, 2002, pgs. 105–107.

35.   Michael Neely, Eytan Modiano, Charles Rohrs, “ Packet Routing over Parallel Time-Varying Queues with Application to Satellite and Wireless Networks ,”  Allerton Conference on Communication, Control, and Computing, Allerton, Illinois, September, 2001, pgs. 1110-1111.**

34.   Eytan Modiano and Randy Berry, “ The Role of Switching in Reducing Network Port Counts ,”  Allerton Conference on Communication, Control, and Computing, Allerton, Illinois, September, 2001, pgs. 376-385.

33.   Eytan Modiano, “ Resource allocation and congestion control in next generation satellite networks ,”  IEEE Gigabit Networking Workshop (GBN 2001), Anchorage, AK, April 2001, (2 page summary-online proceedings).

32.   Eytan Modiano and Aradhana Narula-Tam, “ Survivable Routing of Logical Topologies in WDM Networks ,”  IEEE Infocom 2001, Anchorage, AK, April 2001, pgs. 348–357.

31.   Michael Neely and Eytan Modiano, “ Convexity and Optimal Load Distribution in Work Conserving */*/1 Queues ,”  IEEE Infocom 2001, Anchorage, AK, April 2001, pgs. 1055–1064.

30.   Eytan Modiano and Randy Berry, “ Using Grooming Cross- Connects to Reduce ADM Costs in Sonet/WDM Ring Networks ,”  IEEE/OSA Optical Fiber Conference (OFC) 2001, Anaheim, CA March 2001, pgs. WL1- WL3.

29.   Eytan Modiano and Aradhana Narula-Tam, “ Designing Survivable Networks Using Effective Rounting and Wavelenght Assignment (RWA) ,”  IEEE/OSA Optical Fiber Conference (OFC) 2001, Anaheim, CA March 2001, pgs. TUG5-1 – TUG5– 3.

28.   Roop Ganguly and Eytan Modiano, “ Distributed Algorithms and Architectures for Optical Flow Switching in WDM networks ,”  IEEE International Symposium on Computer Communications (ISCC 2000), Antibes, France, July 2000, pgs. 134–139.

27.   Aradhana Narula-Tam, Philip J. Lin and Eytan Modiano, “ Wavelength Requirements for Virtual topology Reconfiguration in WDM Ring Networks ,”  IEEE International Conference on Communications (ICC 2000), New Orleans, LA, June 2000, pgs. 1650–1654.

26.   Eytan Modiano, “Optical Flow Switching for the Next Generation Internet,”  IEEE Gigabit Networking Workshop (GBN 2000), Tel-aviv, March 2000 (2 page summary-online proceedings).

25.   Aradhana Narula and Eytan Modiano, “ Dynamic Reconfiguration in WDM Packet Networks with Wavelength Limitations ,”  IEEE/OSA Optical Fiber Conference (OFC) 2000, Baltimore, MD, March, 2000, pgs. 1210–1212.

24.   Brett Schein and Eytan Modiano, “ Quantifying the benefits of configurability in circuit-switched WDM ring networks ,”  IEEE Infocom 2000, Tel Aviv, Israel, April, 2000, pgs.1752–1760..***

23.   Aradhana Narula-Tam and Eytan Modiano, “ Load Balancing Algorithms for WDM-based IP networks ,”  IEEE Infocom 2000, Tel Aviv, Israel, April, 2000, pgs. 1010–1019.

22.   Nan Froberg, M. Kuznetsov, E. Modiano, et. al., “ The NGI ONRAMP test bed: Regional Access WDM technology for the Next Generation Internet ,”  IEEE LEOS ’99, October, 1999, pgs. 230–231.

21.   Randy Berry and Eytan Modiano, “ Minimizing Electronic Multiplexing Costs for Dynamic Traffic in Unidirectional SONET Ring Networks ,”  IEEE International Conference on Communications (ICC ’99), Vancouver, CA, June 1999, pgs. 1724–1730..***

20.   Brett Schein and Eytan Modiano, “Increasing Traffic Capacity in WDM Ring Networks via Topology Reconfiguration,”  Conference on Information Science and Systems, Baltimore, MD, March 1999, pgs. 201 – 206.

19.   Eytan Modiano and Richard Barry, “ Design and Analysis of an Asynchronous WDM Local Area Network Using a Master/Slave Scheduler ,”  IEEE Infocom ’99, New York, NY, March 1999, pgs. 900–907.

18.   Randy Berry and Eytan Modiano, “ Grooming Dynamic Traffic in Unidirectional SONET Ring Networks ,”  IEEE/OSA Optical Fiber Conference (OFC) ’99, San Diego, CA, February 1999, pgs. 71–73.

17.   Angela Chiu and Eytan Modiano, “ Reducing Electronic Multiplexing Costs in Unidirectional SONET/WDM Ring Networks Via Efficient Traffic Grooming ,”  IEEE Globecom ’98, Sydney, Australia, November 1998, pgs. 322–327.

16.   Eytan Modiano, “ Throughput Analysis of Unscheduled Multicast Transmissions in WDM Broadcast-and-Select Networks ,”  IEEE International Symposium on Information Theory, Boston, MA, September 1998, pg. 167.

15.   Eytan Modiano and Angela Chiu, “Traffic Grooming Algorithms for Minimizing Electronic Multiplexing Costs in Unidirectional SONET/WDM Ring Networks,”  Conference on Information Science and Systems, Princeton, NJ, March 1998, 653–658.

14.   Eytan Modiano and Eric Swanson, “ An Architecture for Broadband Internet Services over a WDM-based Optical Access Network ,”  IEEE Gigabit Networking Workshop (GBN ’98), San Francisco, CA, March 1998 (2 page summary-online proceedings).

13.   Eytan Modiano, “ Unscheduled Multicasts in WDM Broadcast-and-Select Networks ,”  IEEE Infocom ’98, San Francisco, CA, March 1998, pgs. 86–93.

12.   Eytan Modiano, Richard Barry and Eric Swanson, “ A Novel Architecture and Medium Access Control (MAC) protocol for WDM Networks ,”  IEEE/OSA Optical Fiber Conference (OFC) ’98, San Jose, CA, February 1998, pgs. 90–91.

11.   Eytan Modiano, “ Scheduling Algorithms for Message Transmission Over a Satellite Broadcast System ,”  IEEE MILCOM 97, Monterey, CA, November 1997, pgs. 628–634.

10.   Eytan Modiano, “ Scheduling Packet Transmissions in A Multi-hop Packet Switched Network Based on Message Length ,”  IEEE International Conference on Computer Communications and Networks (IC3N) Las Vegas, Nevada, September 1997, pgs. 350–357.

9.   Eytan Modiano, “A Simple Algorithm for Optimizing the Packet Size Used in ARQ Protocols Based on Retransmission History,”  Conference on Information Science and Systems, Baltimore, MD, March 1997, pgs. 672–677.

8.   Eytan Modiano, “ A Multi-Channel Random Access Protocol for the CDMA Channel ,”  IEEE PIMRC ’95, Toronto, Canada, September 1995, pgs. 799–803.

7.   Eytan Modiano Jeffrey Wieselthier and Anthony Ephremides, “ A Simple Derivation of Queueing Delay in a Tree Network of Discrete-Time Queues with Deterministic Service Times ,”  IEEE International Symposium on Information Theory, Trondheim, Norway, June 1994, pg. 372.

6.   Eytan Modiano, Jeffrey Wieselthier and Anthony Ephremides, “An Approach for the Analysis of Packet Delay in an Integrated Mobile Radio Network,”  Conference on Information Sciences and Systems, Baltimore, MD, March 1993, pgs. 138-139.

5.   Eytan Modiano and Anthony Ephremides, “ A Method for Delay Analysis of Interacting Queues in Multiple Access Systems ,”  IEEE INFOCOM 1993, San Francisco, CA, March 1993, pgs. 447 – 454.

4.   Eytan Modiano and Anthony Ephremides, “ A Model for the Approximation of Interacting Queues that Arise in Multiple Access Schemes ,”  IEEE International Symposium on Information Theory, San Antonio, TX, January 1993, pg. 324.

3.   Eytan Modiano and Anthony Ephremides, “ Efficient Routing Schemes for Multiple Broadcasts in a Mesh ,”  Conference on Information Sciences and Systems, Princeton, NJ, March 1992, pgs. 929 – 934.

2.   Eytan Modiano and Anthony Ephremides, “ On the Secrecy Complexity of Computing a Binary Function of Non-uniformly Distributed Random Variables ,”  IEEE International Symposium on Information Theory, Budapest, Hungary, June 1991, pg. 213.

1.   Eytan Modiano and Anthony Ephremides, “Communication Complexity of Secure Distributed Computation in the Presence of Noise,”  IEEE International Symposium on Information Theory, San Diego, CA, January 1990, pg. 142.

Book Chapters

  • Hyang-Won Lee, Kayi Lee, Eytan Modiano, “ Cross-Layer Survivability ” in Cross-Layer Design in Optical Networks, Springer, 2013.
  • Li-Wei Chen and Eytan Modiano, “ Geometric Capacity Provisioning for Wavelength-Switched WDM Networks ,” Chapter in Computer Communications and Networks Series: Algorithms for Next Generation Networks, Springer, 2010.
  • Amir Khandani, Eytan Modiano, Lizhong Zhang, Jinane Aboundi, “ Cooperative Routing in Wireless Networks ,” Chapter in Advances in Pervasive Computing and Networking, Kluwer Academic Publishers, 2005.
  • Jian-Qiang Hu and Eytan Modiano, “ Traffic Grooming in WDM Networks ,” Chapter in Emerging Optical Network Technologies, Kluwer Academic Publishers, to appear, 2004.
  • Eytan Modiano, “ WDM Optical Networks ,” Wiley Encyclopedia of Telecommunications (John Proakis, Editor), 2003.
  • Eytan Modiano, “ Optical Access Networks for the Next Generation Internet ,” in Optical WDM Networks: Principles and Practice, Kluwer Academic Prublishers, 2002.
  • Eytan Modiano, Richard Barry and Eric Swanson, “ A Novel Architecture and Medium Access Control protocol for WDM Networks ,” Trends in Optics and Photonics Series (TOPS) volume on Optical Networks and Their Applications, 1998.
  • Eytan Modiano and Kai-Yeung Siu, “Network Flow and Congestion Control,” Wiley Encyclopedia of Electrical and Electronics Engineering, 1999.

Technical Reports

  • Amir Khandani, Eytan Modiano, Jinane Abounadi, Lizhong Zheng, “Reliability and Route Diversity in Wireless Networks, ” MIT LIDS Technical Report number 2634, November, 2004.
  • Anand Srinivas and Eytan Modiano, “Minimum Energy Disjoint Path Routing in Wireless Ad Hoc Networks, ” MIT LIDS Technical Report, P-2559, March, 2003.
  • Eytan Modiano and Aradhana Narula-Tam, “Survivable lightpath routing: a new approach to the design of WDM-based networks, ” LIDS report 2552, October, 2002.
  • Michael Neely, Eytan Modiano and Charles Rohrs, “Packet Routing over Parallel Time-Varying Queues with Application to Satellite and Wireless Networks,” LIDS report 2520, September, 2001.
  • Jun Sun and Eytan Modiano, “Capacity Provisioning and Failure Recovery in Mesh-Torus Networks with Application to Satellite Constellations,” LIDS report 2518, September, 2001.
  • Hungjen Wang, Eytan Modiano and Muriel Medard, “Partial Path Protection for WDM Networks: End-to-End Recovery Using Local Failure Information, ” LIDS report 2517, Sept. 2001.
  • Alvin Fu, Eytan Modiano, and John Tsitsiklis, “Optimal Energy Allocation and Admission Control for Communications Satellites, ” LIDS report 2516, September, 2001.
  • Michael Neely, Eytan Modiano and Charles Rohrs, “Power and Server Allocation in a Multi-Beam Satellite with Time Varying Channels, ” LIDS report 2515, September, 2001.
  • Eytan Modiano, “Scheduling Algorithms for Message Transmission Over the GBS Satellite Broadcast System, ” Lincoln Laboratory Technical Report Number TR-1035, June 1997.
  • Eytan Modiano, “Scheduling Packet Transmissions in A Multi-hop Packet Switched Network Based on Message Length, ” Lincoln Laboratory Technical Report number TR-1036, June, 1997.

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Journal Proposal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

electronics-logo

Article Menu

  • Subscribe SciFeed
  • Recommended Articles
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Computer network simulation with ns-3: a systematic literature review.

research papers on computer networks

1. Introduction

2. related work, 3. slr process.

  • Reporting the results

3.1. SLR Target

3.2. slr protocol, 4. research questions.

  • RQ1: which are the impacted application domains, according to the literature?
  • RQ2: how easily extensible did ns-3 prove to be with respect to its adaptation to new domains or uses?
  • RQ1.1: what kind of network technologies have been simulated?
  • RQ1.2: which are the related application field? (e.g., medicine, astrology, ...)
  • RQ1.3: what kind of problems have been addressed?
  • RQ2.1 Is it a new extension or module?
  • RQ2.2 Does it use an external module or extension?

5. Review Methods

5.1. data source and search strategy, the wns3 workshop on ns-3, 5.2. selection criteria, 5.3. data extraction form.

  • the first part collects all general information about the paper, as from Table 7 ;
  • the second part collects the information that is more related with the research questions, to address the research questions (see Table 8 ): - for RQ1 the questions characterize the field in which ns-3 is used in terms of networks technologies, area of application and kind of problem; - for RQ2 the answers are binary (yes/no), and describe if the paper presents a new module or extension for ns-3 and if it uses an already existing module.

6.1. Included and Excluded Studies

6.2. data synthesis, 7. conclusions and future works, author contributions, acknowledgments, conflicts of interest.

  • Riley, G.F.; Henderson, T.R. The ns-3 Network Simulator. In Modeling and Tools for Network Simulation ; Wehrle, K., Güneş, M., Gross, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2010; pp. 15–34. [ Google Scholar ] [ CrossRef ]
  • Barisic, A.; Amaral, V.; Goulao, M. Domain-Specific Language Domain Analysis and Evaluation: A Systematic Literature Review ; Technical Report; Faculdade de Ciencias e Tecnologia, Universidade Nova de Lisboa: Colombia, Portugal, 2015. [ Google Scholar ] [ CrossRef ]
  • Piro, G.; Grieco, L.A.; Boggia, G.; Camarda, P. Nano-Sim: Simulating Electromagnetic-Based Nanonetworks in the Network Simulator 3. In Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, Cannes, France, 6–8 March 2013; ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering): Brussels, Belgium, 2013; pp. 203–210. [ Google Scholar ]
  • Raman, A.; Chou, K.; Mastorakis, S. A simulation framework for Peer-to-Peer file sharing in named data networking. In Proceedings of the 2019 Workshop on ns-3, Florence, Italy, 18–21 June 2019; pp. 57–64. [ Google Scholar ]
  • Bakshi, S.; Tahiliani, M.P. Recent Acknowledgement Support for ns-3 TCP. In Proceedings of the 2019 Workshop on ns-3, Florence, Italy, 18–21 June 2019; pp. 9–16. [ Google Scholar ]
  • Rohrer, J.; Mauldin, A. Implementation of epidemic routing with IP convergence layer in ns-3. In Proceedings of the 10th Workshop on ns-3, Mangalore, India, 13–14 June 2018; ACM: New York, NY, USA, 2018; pp. 69–76. [ Google Scholar ]
  • Mittal, V.; Jain, V.; Tahiliani, M.P. Proportional Rate Reduction for ns-3 TCP. In Proceedings of the 10th Workshop on ns-3, Mangalore, India, 13–14 June 2018; ACM: New York, NY, USA, 2018; pp. 9–15. [ Google Scholar ]
  • Selinis, I.; Katsaros, K.; Vahid, S.; Tafazolli, R. Exploiting the capture effect on DSC and BSS color in dense IEEE 802.11ax deployments. In Proceedings of the Workshop on ns-3, Porto, Portugal, 13–14 June 2017; ACM: New York, NY, USA, 2017; Volume Part F128360, pp. 47–54. [ Google Scholar ]
  • Fontes, H.; Campos, R.; Ricardo, M. A trace-based ns-3 simulation approach for perpetuating real-world experiments. In Proceedings of the Workshop on ns-3, Porto, Portugal, 13–14 June 2017; ACM: New York, NY, USA, 2017; Volume Part F128360, pp. 118–124. [ Google Scholar ]
  • Franchi, M.; Pecorella, T.; Ridolfi, A.; Fantacci, R.; Allotta, B. Kinematic constraints and ns-3 mobility models: The AUV issue. In Proceedings of the Workshop on ns-3, Porto, Portugal, 13–14 June 2017; ACM: New York, NY, USA, 2017; Volume Part F128360, pp. 103–109. [ Google Scholar ]
  • Ford, R.; Zhang, M.; Dutta, S.; Mezzavilla, M.; Rangan, S.; Zorzi, M. A framework for end-to-end evaluation of 5G mmWave cellular networks in ns-3. In Proceedings of the Workshop on ns-3, Seattle, WA, USA, 15–16 June 2016; Volume Part F132163, pp. 85–92. [ Google Scholar ]
  • Dandoush, A.; Tuholukova, A.; Alouf, S.; Neglia, G.; Simoens, S.; Derouet, P.; Dersin, P. ns-3 Based framework for simulating Communication Based Train Control (CBTC) systems. In Proceedings of the Workshop on ns-3, Seattle, WA, USA, 15–16 June 2016; Volume Part F132163, pp. 116–123. [ Google Scholar ]
  • Lehmann, A.; Kreuzer, M.; Deutschmann, J.; Berold, U.; Huber, J. Topology simulation for aeronautical communication protocols with ns-3 and DCE. In Proceedings of the Workshop on ns-3, Seattle, WA, USA, 15–16 June 2016; Volume Part F132163, pp. 132–138. [ Google Scholar ]
  • Hood, C.; Riley, G. On predicting the performance characteristics of the NS-3 distributed simulator for scale-free internet models. In Proceedings of the 2015 Workshop on ns-3, Castelldefels, Spain, 13–14 May 2015; ACM: New York, NY, USA, 2015; pp. 54–59. [ Google Scholar ]
  • Conceicao, S.; Ribeiro, F.; Campos, R.; Ricardo, M. Novel NS-3 model enabling simulation of electromagnetic wireless underground networks. In Proceedings of the 2015 Workshop on ns-3, Castelldefels, Spain, 13–14 May 2015; ACM: New York, NY, USA, 2015; pp. 9–16. [ Google Scholar ]
  • Gupta, R.; Bachmann, B.; Ford, R.; Rangan, S.; Kundargi, N.; Ekbal, A.; Rathi, K.; Sanchez, M.; De La Oliva, A.; Morelli, A. Ns-3-based real-time emulation of LTE testbed using LabVIEW platform for software defined networking (SDN) in CROWD project. In Proceedings of the 2015 Workshop on ns-3, Castelldefels, Spain, 13–14 May 2015; ACM: New York, NY, USA, 2015; pp. 91–97. [ Google Scholar ]
  • Cerqueira, T.; Albano, M. RoutesMobilityModel: Easy realistic mobility simulation using external information services. In Proceedings of the 2015 Workshop on ns-3, Castelldefels, Spain, 13–14 May 2015; ACM: New York, NY, USA, 2015; pp. 40–46. [ Google Scholar ]
  • Newton, B.; Aikat, J.; Jeffay, K. Simulating large-scale airborne networks with NS-3. In Proceedings of the 2015 Workshop on ns-3, Castelldefels, Spain, 13–14 May 2015; ACM: New York, NY, USA, 2015; pp. 32–39. [ Google Scholar ]
  • Gómez, D.; Rodríguez, E.; Agüero, R.; Muñoz, L. Reliable communications over wireless mesh networks with inter and intra-flow network coding. In Proceedings of the 2014 Workshop on ns-3, Atlanta, USA, 7 May 2014. [ Google Scholar ]
  • Tariq, M.; Swenson, B.; Narasimhan, A.; Grijalva, S.; Riley, G.; Wolf, M. Cyber-physical co-simulation of smart grid applications using NS-3. In Proceedings of the 2014 Workshop on ns-3, Atlanta, GA, USA, 7 May 2014. [ Google Scholar ]
  • Zugno, T.; Polese, M.; Lecci, M.; Zorzi, M. Simulation of Next-generation Cellular Networks with ns-3: Open Challenges and New Directions. In Proceedings of the 2019 Workshop on Next-Generation Wireless with ns-3, Florence, Italy, 19 June 2019; ACM: New York, NY, USA, 2019; pp. 38–41. [ Google Scholar ]
  • Gawłowicz, P.; Baldo, N.; Miozzo, M. An extension of the ns-3 LTE module to simulate fractional frequency reuse algorithms. In Proceedings of the 2015 Workshop on ns-3, Castelldefels, Spain, 13–14 May 2015; ACM: New York, NY, USA, 2015; pp. 98–105. [ Google Scholar ]
  • Tian, L.; Šljivo, A.; Santi, S.; De Poorter, E.; Hoebeke, J.; Famaey, J. Extension of the IEEE 802.11 ah ns-3 Simulation Module. In Proceedings of the 10th Workshop on ns-3, Mangalore, India, 13–14 June 2018; ACM: New York, NY, USA, 2018; pp. 53–60. [ Google Scholar ]
  • Bojovic, B.; Abrignani, M.D.; Miozzo, M.; Giupponi, L.; Baldo, N. Towards LTE-Advanced and LTE-A Pro Network Simulations: Implementing Carrier Aggregation in LTE Module of ns-3. In Proceedings of the Workshop on ns-3, Porto, Portugal, 13–14 June 2017; ACM: New York, NY, USA, 2017; pp. 63–70. [ Google Scholar ]
  • Rahman, M.U.; Rehman, A.U.; Liu, H.; Chen, H.F. Inhibitory mechanism of 5-bromo-3-indoleacetic acid for non-structural-3 helicase hepatitis C virus with dynamics correlation network analysis. Comput. Biol. Chem. 2018 , 77 , 167–177. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Kwo, P.Y.; Lawitz, E.J.; McCone, J.; Schiff, E.R.; Vierling, J.M.; Pound, D.; Davis, M.N.; Galati, J.S.; Gordon, S.C.; Ravendhran, N.; et al. Efficacy of boceprevir, an NS3 protease inhibitor, in combination with peginterferon alfa-2b and ribavirin in treatment-naive patients with genotype 1 hepatitis C infection (SPRINT-1): An open-label, randomised, multicentre phase 2 trial. Lancet 2010 , 376 , 705–716. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Xu, L.; Wang, X.; Shen, J. Strategy and simulation of trust cluster based key management protocol for ad hoc networks. In Proceedings of the 2009 4th International Conference on Computer Science & Education, Nanning, China, 25–28 July 2009; pp. 269–274. [ Google Scholar ]
  • Yu, F.; Jain, R. A Survey of Wireless Sensor Network Simulation Tools ; Washington University: St. Louis, MO, USA, 2011; pp. 1–10. Available online: https://www.cse.wustl.edu/~jain/cse567-11/ftp/sensor/ (accessed on 3 September 2019).
  • Pereira, R.M.; Ruiz, L.B.; Ghizoni, M.L.A. MannaSim: A NS-2 extension to simulate wireless sensor network. In Proceedings of the ICN 2015, Barcelona, Spain, 19–24 April 2015; p. 107. [ Google Scholar ]
  • Wang, Z.; Feng, X.; Qin, H.; Guo, H.; Han, G. An AUV-Aided routing protocol based on dynamic gateway nodes for underwater wireless sensor networks. J. Internet Technol. 2017 , 18 , 333–343. [ Google Scholar ] [ CrossRef ]
  • Melo, R.; Polisciuc, R.; Nogueira, M.; Santos, A. Access Decision System for Seamless Connectivity in Heterogeneous Wireless Networks. In Proceedings of the 2015 XXXIII Brazilian Symposium on Computer Networks and Distributed Systems, Vitoria, Brazil, 18–22 May 2015; pp. 60–69. [ Google Scholar ] [ CrossRef ]
  • Maygua-Marcillo, L.; Urquiza-Aguiar, L.; Paredes-Paredes, M. Creating a New Model in NS3 Network Simulator. Preprints 2019 , 1–5. [ Google Scholar ] [ CrossRef ]
  • Wang, Y.; Jiang, Y.N.; Ma, Q.; Tian, C.; Bai, B.; Zhang, G. RDMA load balancing via data partition. In Proceedings of the 2019 28th International Conference on Computer Communication and Networks (ICCCN), Valencia, Spain, 29 July–1 August 2019; pp. 1–8. [ Google Scholar ] [ CrossRef ]
  • Ayaida, M.; Messai, N.; Najeh, S.; Boris Ndjore, K. A Macroscopic Traffic Model-based Approach for Sybil Attack Detection in VANETs. Ad Hoc Netw. 2019 , 90 , 101845. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Abbas, M.; Song, W.C. THERA: Two-level hierarchical hybrid road-aware routing for vehicular networks. KSII Trans. Internet Inf. Syst. 2019 , 13 , 3369–3385. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Eder-Neuhauser, P.; Zseby, T.; Fabini, J. Malware propagation in smart grid networks: Metrics, simulation and comparison of three malware types. J. Comput. Virol. Hacking Tech. 2019 , 15 , 109–125. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Fogwell, T.; Ochola, E. Comparison analysis of AODV and DSR under attack by black hole nodes in a NS3 simulation. In Proceedings of the International Conference on Cyber Warfare and Security, Stellenbosch, South Africa, 28 February–1 March 2019; pp. 574–587. [ Google Scholar ]
  • Bhattacharya, H.; Chattopadhyay, S.; Chattopadhyay, M. NS3 Based HDFS data placement algorithm evaluation framework. In Proceedings of the 2017 International Conference on Computer, Electrical & Communication Engineering (ICCECE), Kolkata, India, 22–23 December 2017; pp. 1–8. [ Google Scholar ] [ CrossRef ]
  • Anadu, D.; Mushagalusa, C.; Alsbou, N.; Abuabed, A. Internet of Things: Vehicle collision detection and avoidance in a VANET environment. In Proceedings of the 2018 IEEE International Instrumentation and Measurement Technology Conference (I2MTC), Houston, TX, USA, 14–17 May 2018; pp. 1–6. [ Google Scholar ] [ CrossRef ]
  • Tiennoy, S.; Saivichit, C. Using a Distributed Roadside Unit for the Data Dissemination Protocol in VANET with the Named Data Architecture. IEEE Access 2018 , 6 , 32612–32623. [ Google Scholar ] [ CrossRef ]
  • Wang, T.; Hussain, A. PySNS3: A real-time communication interface and protocol for vehicular Ad-Hoc networks. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST ; Springer: Cham, Switzerland, 2018; pp. 163–171. [ Google Scholar ] [ CrossRef ]
  • Xie, X.; Wang, J.; Guo, X.; Wu, X. Performance evaluation of ad-hoc routing protocols in hybrid MANET-satellite network. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST ; Springer: Cham, Switzerland, 2018; Volume 251, pp. 500–509. [ Google Scholar ] [ CrossRef ]
  • Tada, N.; Patalia, T.; Rupani, P. A new approach to mitigate jamming attack in wireless adhoc network using ARC technique. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST ; Springer: Cham, Switzerland, 2018; pp. 192–204. [ Google Scholar ] [ CrossRef ]
  • Liu, D.; Ni, J.; Li, H.; Shen, X. Achieving Adaptive Linkability for Cellular V2X Group Communications in 5G. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, UAE, 9–13 December 2018; pp. 1–7. [ Google Scholar ] [ CrossRef ]
  • Pospelova, I.; Chebotayev, P.; Klimenko, A.; Myakochin, Y.; Polyakov, I.; Shelupanov, A.; Zykov, D. Research of G3-PLC net self-organization processes in the NS-3 modeling framework. AIP Conf. Proc. 2017 , 1899 , 060017. [ Google Scholar ] [ CrossRef ]
  • Drissi, M.; Oumsis, M.; Aboutajdine, D. A Multi-Criteria Decision Framework for network selection over LTE and WLAN. Eng. Appl. Artif. Intell. 2017 , 66 , 113–127. [ Google Scholar ] [ CrossRef ]
  • Abdelsalam, A.; Luglio, M.; Roseti, C.; Zampognaro, F. TCP Connection management through combined use of terrestrial and satellite IP-based links. In Proceedings of the 2017 40th International Conference on Telecommunications and Signal Processing (TSP), Barcelona, Spain, 5–7 July 2017; pp. 37–42. [ Google Scholar ] [ CrossRef ]
  • Mao, Q.; Yue, P.; Xu, M.; Ji, Y.; Cui, Z. OCTMAC: A VLC based MAC protocol combining optical CDMA with TDMA for VANETs. In Proceedings of the International Conference on Computer, Information and Telecommunication Systems (CITS), Dalian, China, 21–23 July 2017; pp. 234–238. [ Google Scholar ] [ CrossRef ]
  • Karimzadeh, M.; Valtulina, L.; Van Den Berg, H.; Pras, A.; Ortiz, P.; Sadre, R. MultiPath TCP to support user’s mobility in future LTE network. In Proceedings of the 2017 10th IFIP Wireless and Mobile Networking Conference (WMNC), Valencia, Spain, 25–27 September 2017; pp. 1–8. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Agarwal, R.; Shukla, P.; Goyal, S. A Practical Approach of Network Simulation. In Detecting and Mitigating Robotic Cyber Security Risks ; Kumar, R., Pattnaik, P., Pandey, P., Eds.; IGI Global: Hershey, Pennsylvania, 2017; pp. 12–27. [ Google Scholar ] [ CrossRef ]
  • Liu, Y.; Piao, X.; Hou, C.; Lei, K. A CUBIC-Based explicit congestion control mechanism in named data networking. In Proceedings of the 2016 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Chengdu, China, 13–15 October 2016; pp. 360–363. [ Google Scholar ] [ CrossRef ]
  • Chiu, J.C.; Liu, A.T.; Liao, C.C. Design the DNS-Like Smart Switch for Heterogeneous Network Base on SDN Architecture. In Proceedings of the 2016 International Computer Symposium (ICS), Chiayi, Taiwan, 15–17 December 2016; pp. 187–191. [ Google Scholar ] [ CrossRef ]
  • Wu, W.; Li, Z.; Zhang, Y.; Guo, J.; Zhao, J. Design and implementation of distributed broadcast algorithm based on vehicle density for vanet safety-related messages. Commun. Comput. Inf. Sci. 2017 , 728 , 271–285. [ Google Scholar ] [ CrossRef ]
  • Sahu, A.; Goulart, A.; Butler-Purry, K. Modeling AMI network for real-time simulation in NS-3. In Proceedings of the 2016 Principles, Systems and Applications of IP Telecommunications (IPTComm), Chicago, IL, USA, 17–20 October 2016; pp. 1–8. [ Google Scholar ]
  • Yang, H.; Li, Z. A genetic-algorithm-based clustering protocol in MANET. In Proceedings of the 7th International Conference on Computing Communication and Networking Technologies, Dallas, TX, USA, 6–8 July 2016; pp. 1–5. [ Google Scholar ] [ CrossRef ]
  • Deng, X.; He, L.; Li, X.; Liu, Q.; Cai, L.; Chen, Z. A reliable QoS-aware routing scheme for neighbor area network in smart grid. Peer-to-Peer Netw. Appl. 2016 , 9 , 616–627. [ Google Scholar ] [ CrossRef ]
  • Wang, Z.; Guo, H.; Jiang, L.; Feng, X. AUV-aided communication method for underwater mobile sensor network. In Proceedings of the OCEANS 2016-Shanghai, Shanghai, China, 10–13 April 2016; pp. 1–7. [ Google Scholar ] [ CrossRef ]
  • Wang, S.; Sun, D.; Zhang, Y. Performance analysis for ALOHA protocol of underwater acoustic networks with a serial route. Harbin Gongcheng Daxue Xuebao/J. Harbin Eng. Univ. 2016 , 37 , 360–367. [ Google Scholar ] [ CrossRef ]
  • Choudhury, A.; Maszczyk, T.; Math, C.; Li, H.; Dauwels, J. An integrated simulation environment for testing V2X protocols and applications. Procedia Comput. Sci. 2016 , 80 , 2042–2052. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Kang, H.; Jiang, X.; Xiong, W. Research on wireless networking mode for the distributed satellite communication system. J. Comput. Inf. Syst. 2015 , 11 , 4211–4220. [ Google Scholar ] [ CrossRef ]
  • Aburumman, A.; Seo, W.; Islam, R.; Khan, M.; Choo, K.K. A secure cross-domain SIP solution for mobile ad hoc network using dynamic clustering. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST ; Springer: Cham, Switzerland, 2015; Volume 164, pp. 649–664. [ Google Scholar ] [ CrossRef ]
  • Guo, Y.; Ten, C.W.; Hu, S.; Weaver, W. Modeling distributed denial of service attack in advanced metering infrastructure. In Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 17–20 February 2015; pp. 1–5. [ Google Scholar ] [ CrossRef ]
  • Mallissery, S.; Manohara Pai, M.; Ajam, N.; Pai, R.; Mouzna, J. Transport and traffic rule violation monitoring service in ITS: A secured VANET cloud application. In Proceedings of the 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, 9–12 January 2015; pp. 213–218. [ Google Scholar ] [ CrossRef ]
  • Tang, C.; Song, L.; Balasubramani, J.; Wu, S.; Biaz, S.; Yang, Q.; Wang, H. Comparative investigation on CSMA/CA-based opportunistic random access for internet of things. IEEE Internet Things J. 2014 , 1 , 171–179. [ Google Scholar ] [ CrossRef ]
  • Molloy, T.; Yuan, Z.; Muntean, G.M. Real time emulation of an LTE network using NS-3. In Proceedings of the 25th IET Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014), Limerick, Ireland, 26–27 June 2014; Volume 2014, pp. 251–257. [ Google Scholar ] [ CrossRef ]
  • Satria, T.; Karimzadeh, M.; Karagiannis, G. Performance evaluation of ICN/CCN based service migration approach in virtualized LTE systems. In Proceedings of the 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet), Luxembourg, 8–10 October 2014; pp. 461–467. [ Google Scholar ] [ CrossRef ]
  • Shukla, S.; Chan, S.; Tam, A.W.; Gupta, A.; Xu, Y.; Chao, H. TCP PLATO: Packet labelling to alleviate time-out. IEEE J. Sel. Areas Commun. 2014 , 32 , 65–76. [ Google Scholar ] [ CrossRef ]
  • Marques, H.; Leguay, J.; Khalifé, H.; Conan, V.; Lavaux, D. Transparent IP proxy for tactical ad hoc networks. In Proceedings of the MILCOM 2013-2013 IEEE Military Communications Conference, San Diego, CA, USA, 17–20 November 2013; pp. 842–847. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Wang, Y.; Rozhnova, N.; Narayanan, A.; Oran, D.; Rhee, I. An improved hop-by-hop interest shaper for congestion control in named data networking. ACM SIGCOMM Comput. Commun. Rev. 2013 , 43 , 567–572. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Tsokalo, I.; Mudriievskyi, S.; Lehnert, R. Development and calibration of a PLC simulation model for UPA-compliant networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Springer: Berlin/Heidelberg, Germany, 2013; Volume 8115 LNCS, pp. 197–208. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Meneguette, R.; Bittencourt, L.; Madeira, E. User-centric mobility management architecture for vehicular networks. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST ; Springer: Berlin/Heidelberg, Germany, 2013; Volume 58, pp. 42–56. [ Google Scholar ] [ CrossRef ]
  • Carvin, D.; Kremer, G.; Owezarski, P.; Berthou, P. Assessment and event based analysis of dynamic wireless networks. In Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013), Zürich, Switzerland, 14–18 October 2013; pp. 175–179. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Biddlestone, S.; Redmill, K.; Miucic, R.; Ozguner, U. An integrated 802.11p WAVE DSRC and vehicle traffic simulator with experimentally validated urban (LOS and NLOS) propagation models. IEEE Trans. Intell. Transp. Syst. 2012 , 13 , 1792–1802. [ Google Scholar ] [ CrossRef ]
  • Vetrivelan, P.; Narayanasamy, P.; John Charlas, J. A multi-constraint real-time vehicular (MCRV) mobility framework for 4G heterogeneous Vehicular Ad-Hoc Networks. In Proceedings of the International MultiConference of Engineers and Computer Scientists, Hong Kong, China, 14–16 March 2012; Volume 2195, pp. 423–428. [ Google Scholar ]
  • Vetrivelan, P.; Narayanasamy, P. SMIRT with call admission control (CAC) based vertical handover decision for seamless mobility in multi-access 4G heterogeneous wireless overlav networks. In Proceedings of the International Multiconference of Engineers & Computer Scientists, Hong Kong, China, 14–16 March 2012; Volume 2195, pp. 408–413. [ Google Scholar ]
  • Qwasmi, N.; Ahmed, F.; Liscano, R. Simulation of DDOS attacks on P2P metworks. In Proceedings of the 2011 IEEE International Conference on High Performance Computing and Communications, Banff, AB, Canada, 2–4 September 2011; pp. 610–614. [ Google Scholar ] [ CrossRef ]
  • Katkar, P.S.; Ghorpade, D.V.R. Comparative study of network simulator: NS2 and NS3. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2016 , 6 , 608–612. [ Google Scholar ]
  • Siraj, S.; Gupta, A.; Badgujar, R. Network simulation tools survey. Int. J. Adv. Res. Comput. Commun. Eng. 2012 , 1 , 199–206. [ Google Scholar ]
  • Pan, J.; Jain, R. A Survey of Network Simulation Tools: Current Status and Future Developments. 2008, Volume 2, p. 45. Available online: https://www.cse.wustl.edu/~jain/cse567-08/ftp/simtools/index.html (accessed on 3 September 2019).
  • Korkalainen, M.; Sallinen, M.; Kärkkäinen, N.; Tukeva, P. Survey of wireless sensor networks simulation tools for demanding applications. In Proceedings of the 2009 Fifth International Conference on Networking and Services, Valencia, Spain, 20–25 April 2009; pp. 102–106. [ Google Scholar ]
  • Venkataramanan, V.; Lakshmi, S. A Case Study of Various Wireless Network Simulation Tools. Int. J. Commun. Netw. Inf. Secur. 2018 , 10 , 389–396. [ Google Scholar ]
  • Mehta, S.; Ullah, N.; Kabir, M.H.; Sultana, M.N.; Kwak, K.S. A Case Study of Networks Simulation Tools for Wireless Networks. In Proceedings of the 2009 Third Asia International Conference on Modelling Simulation, Bali, Indonesia, 25–29 May 2009; pp. 661–666. [ Google Scholar ] [ CrossRef ]
  • Dorathy, I.; Chandrasekaran, M. Simulation tools for mobile ad hoc networks: A survey. J. Appl. Res. Technol. 2018 , 16 , 437–445. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Mallapur, S.V.; Patil, S.R. Survey on simulation tools for mobile ad-hoc networks. In. J. Comput. Netw. Wirel. Commun. 2012 , 2 , 241–248. [ Google Scholar ]
  • Toor, A.S.; Jain, A. A survey on wireless network simulators. Bull. Electrical Eng. Inform. 2017 , 6 , 62–69. [ Google Scholar ]
  • Miozzo, M.; Bartzoudis, N.; Requena, M.; Font-Bach, O.; Harbanau, P.; López-Bueno, D.; Payaró, M.; Mangues, J. SDR and NFV extensions in the ns-3 LTE module for 5G rapid prototyping. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15–18 April 2018; pp. 1–6. [ Google Scholar ]
  • Giupponi, L.; Henderson, T.; Bojovic, B.; Miozzo, M. Simulating LTE and Wi-Fi coexistence in unlicensed spectrum with NS-3. arXiv 2016 , arXiv:1604.06826. [ Google Scholar ]
  • Zhong, P.; Li, Y.; Huang, W.; Kui, X.; Zhang, Y.; Chen, Y. An Extension to ns-3 for Simulating Mobile Charging with Wireless Energy Transfer. In Communications in Computer and Information Science ; Zou, B., Han, Q., Sun, G., Jing, W., Peng, X., Lu, Z., Eds.; Data Science. ICPCSEE 2017; Springer: Singapore, 2017; Volume 728, pp. 256–270. [ Google Scholar ]
  • Alwahab, D.A.; Laki, S. A simulation-based survey of active queue management algorithms. In Proceedings of the 6th International Conference on Communications and Broadband Networking, Singapore, 24–26 February 2018; pp. 71–77. [ Google Scholar ]
  • Jian, Y.; Krishnaswamy, B.; Austin, C.M.; Bicen, A.O.; Einolghozati, A.; Perdomo, J.E.; Patel, S.C.; Fekri, F.; Akyildiz, I.F.; Forest, C.R.; et al. nanoNS3: A network simulator for bacterial nanonetworks based on molecular communication. Nano Commun. Netw. 2017 , 12 , 1–11. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Bisio, I.; Delucchi, S.; Lavagetto, F.; Marchese, M.; Portomauro, G.; Zappatore, S. An Ns-3 based simulative and emulative platform. In Modeling and Simulation of Computer Networks and Systems ; Elsevier: Amsterdam, The Netherlands, 2015; pp. 555–575. [ Google Scholar ]
  • Kim, E.; Riley, G.F. Automatic State Saving and Rollback in ns-3. In Proceedings of the 2017 ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, Singapore, 24–26 May 2017; pp. 263–266. [ Google Scholar ]
  • Maskooki, A.; Sabatino, G.; Mitton, N. Chapter 21—Analysis and performance evaluation of the next generation wireless networks. In Modeling and Simulation of Computer Networks and Systems ; Obaidat, M.S., Nicopolitidis, P., Zarai, F., Eds.; Morgan Kaufmann: Boston, MA, USA, 2015; pp. 601–627. [ Google Scholar ] [ CrossRef ]
  • Fernandes, D.A.; Neto, M.; Soares, L.F.; Freire, M.M.; Inácio, P.R. Chapter 10—On the self-similarity of traffic generated by network traffic simulators. In Modeling and Simulation of Computer Networks and Systems ; Obaidat, M.S., Nicopolitidis, P., Zarai, F., Eds.; Morgan Kaufmann: Boston, MA, USA, 2015; pp. 285–311. [ Google Scholar ] [ CrossRef ]
  • Amoretti, M.; Picone, M.; Zanichelli, F.; Ferrari, G. Chapter 16—Simulating wireless and mobile systems: The Integration of DEUS and Ns-3. In Modeling and Simulation of Computer Networks and Systems ; Obaidat, M.S., Nicopolitidis, P., Zarai, F., Eds.; Morgan Kaufmann: Boston, MA, USA, 2015; pp. 465–484. [ Google Scholar ] [ CrossRef ]
  • Tsioliaridou, A.; Liaskos, C.; Dedu, E.; Ioannidis, S. Packet routing in 3D nanonetworks: A lightweight, linear-path scheme. Nano Commun. Netw. 2017 , 12 , 63–71. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Hossain, Z.; Xia, Q.; Jornet, J.M. TeraSim: An ns-3 extension to simulate Terahertz-band communication networks. Nano Commun. Netw. 2018 , 17 , 36–44. [ Google Scholar ] [ CrossRef ]
  • Barolli, A.; Oda, T.; Ikeda, M.; Barolli, L.; Xhafa, F.; Loia, V. Node placement for wireless mesh networks: Analysis of WMN-GA system simulation results for different parameters and distributions. J. Comput. Syst. Sci. 2015 , 81 , 1496–1507. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Habbal, A.; Goudar, S.I.; Hassan, S. A Context-aware Radio Access Technology selection mechanism in 5G mobile network for smart city applications. J. Netw. Comput. Appl. 2019 , 135 , 97–107. [ Google Scholar ] [ CrossRef ]
  • Aldalbahi, A.; Rahaim, M.; Khreishah, A.; Ayyash, M.; Ackerman, R.; Basuino, J.; Berreta, W.; Little, T.D. Extending ns3 to simulate visible light communication at network-level. In Proceedings of the 2016 23rd International Conference on Telecommunications (ICT), Thessaloniki, Greece, 16–18 May 2016; pp. 1–6. [ Google Scholar ]
  • Rajankumar, P.; Nimisha, P.; Kamboj, P. A comparative study and simulation of AODV MANET routing protocol in NS2 & NS3. In Proceedings of the 2014 International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 5–7 March 2014; pp. 889–894. [ Google Scholar ]
  • Aldalbahi, A.; Rahaim, M.; Khreishah, A.; Ayyash, M.; Little, T.D. Visible light communication module: An open source extension to the ns3 network simulator with real system validation. IEEE Access 2017 , 5 , 22144–22158. [ Google Scholar ] [ CrossRef ]
  • Liu, W.; Wang, X.; Zhang, W.; Yang, L.; Peng, C. Coordinative simulation with SUMO and NS3 for vehicular ad hoc networks. In Proceedings of the 2016 22nd Asia-Pacific Conference on Communications (APCC), Yogyakarta, Indonesia, 25–27 August 2016; pp. 337–341. [ Google Scholar ]
  • Jha, R.K.; Kharga, P. A comparative performance analysis of routing protocols in MANET using NS3 simulator. Int. J. Comput. Netw. Inf. Security 2015 , 7 , 62–68. [ Google Scholar ]
  • Bhatia, D.; Sharma, D.P. A comparative analysis of proactive, reactive and hybrid routing protocols over open source network simulator in mobile ad hoc network. Int. J. Appl. Eng. Res. 2016 , 11 , 3885–3896. [ Google Scholar ]
  • Naik, L.; Khan, R.; Mishra, R. Analysis of node velocity effects in MANET routing protocols using network simulator (NS3). Int. J. Comput. Appl. 2016 , 144 , 1–5. [ Google Scholar ] [ CrossRef ]
  • Aman, A.H.M.; Hashim, A.H.A.; Ramli, H.A.M. Simulation Analysis for Multicast Context Delivery Network Mobility Management. Indones. J. Electr. Eng. Inform. (IJEEI) 2017 , 5 , 390–394. [ Google Scholar ]
  • Saluja, A.; Dargad, S.; Mistry, K. A Detailed Analogy of Network Simulators—NS1, NS2, NS3 and NS4. Int. J. Future Revolut. Comput. Sci. Commun. Eng. 2017 , 3 , 291–295. [ Google Scholar ]
  • Spaho, E.; Bylykbashi, K.; Barolli, L.; Takizawa, M. Routing in a DTN: Performance evaluation for random waypoint and steady state random waypoint using NS3 simulator. In Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2017 ; Xhafa, F., Caballé, S., Barolli, L., Eds.; Lecture Notes on Data Engineering and Communications Technologies; Springer: Cham, Switzerland, 2017; Volume 13, pp. 133–141. [ Google Scholar ]
  • Patel, R.; Patel, N.; Patel, S. An Approach to Analyze Behavior of Network Events in NS2 and NS3 Using AWK and Xgraph. In Information and Communication Technology for Competitive Strategies ; Springer: Cham, Switzerland, 2019; pp. 137–147. [ Google Scholar ]
  • Amiri-Nezhad, M.; Guerrero-Zapata, M.; Bellalta, B.; Cerdà-Alabern, L. Simulation of multi-radio multi-channel 802.11-based mesh networks in ns-3. EURASIP J. Wirel. Commun. Netw. 2014 , 2014 , 118. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Nurchis, M.; Bellalta, B. Performance Evaluation of LAA-LTE and WiFi Coexistence in Unlicensed 5 GHz Band Under Asymmetric Network Deployments Using NS3. In Proceedings of the International Workshop on Multiple Access Communications, Aalborg, Denmark, 21–22 November 2016; Springer: Cham, Switzerland, 2016; pp. 86–97. [ Google Scholar ]
  • Paliwal, G.; Taterh, S. Impact of Dense Network in MANET Routing Protocols AODV and DSDV Comparative Analysis Through NS3. In Soft Computing: Theories and Applications ; Springer: Cham, Switzerland, 2018; pp. 327–335. [ Google Scholar ]
  • Khattak, R.; Chaltseva, A.; Riliskis, L.; Bodin, U.; Osipov, E. Comparison of wireless network simulators with multihop wireless network testbed in corridor environment. In Proceedings of the Multiple Access Communications, Lecture Notes in Computer Science, MACOM 2016, Thessaloniki, Greece, 25–27 May 2016; Madsen, T., Nielsen, J., Pratas, N., Eds.; Springer: Cham, Switzerland, 2011; Volume 10121, pp. 80–91. [ Google Scholar ]
  • Nabou, A.; Laanaoui, M.D.; Ouzzif, M. The Effect of Transmit Power on MANET Routing Protocols Using AODV, DSDV, DSR and OLSR in NS3. In Advanced Intelligent Systems for Sustainable Development (AI2SD’2018), Proceedings of the Advances in Intelligent Systems and Computing AI2SD 2018, Tangier, Morocco, 12–14 July 2018 ; Ezziyyani, M., Ed.; Springer: Cham, Switzerland, 2018; Volume 915, pp. 274–286. [ Google Scholar ]
  • Henderson, T.R.; Lacage, M.; Riley, G.F.; Dowell, C.; Kopena, J. Network simulations with the ns-3 simulator. SIGCOMM Demonstr. 2008 , 14 , 527. [ Google Scholar ]
  • Afanasyev, A.; Moiseenko, I.; Zhang, L. ndnSIM: NDN Simulator for NS-3 ; University of California: Los Angeles, CA, USA, 2012; Volume 4. [ Google Scholar ]
  • Mastorakis, S.; Afanasyev, A.; Moiseenko, I.; Zhang, L. ndnSIM 2: An Updated NDN Simulator for NS-3; NDN, Technical Report NDN-0028. 2016, pp. 1–8. Available online: http://named-data.net/publications/techreports/ndn-0028-2-ndnsim-v2/ (accessed on 3 September 2019).
  • Pei, G.; Henderson, T.R. Validation of OFDM error rate model in ns-3. Boeing Res. Technol. 2010 , 1–15. Available online: https://pdfs.semanticscholar.org/3f0a/b039b235bd0fa1e833876ba78e7ea99d9a04.pdf (accessed on 3 September 2019).
  • Carneiro, G.; Fortuna, P.; Ricardo, M. FlowMonitor: A network monitoring framework for the network simulator 3 (NS-3). In Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools, Pisa, Italy, 20–22 October 2009; ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering): Brussels, Belgium, 2009; pp. 1–10. [ Google Scholar ]
  • Arbabi, H.; Weigle, M.C. Highway mobility and vehicular ad-hoc networks in ns-3. In Proceedings of the Winter Simulation Conference, Baltimore, MA, USA, 5–8 December 2010; pp. 2991–3003. [ Google Scholar ]
  • Stoffers, M.; Riley, G. Comparing the ns-3 propagation models. In Proceedings of the 2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, San Francisco, CA, USA, 7–9 August 2012; pp. 61–67. [ Google Scholar ]
  • Narra, H.; Cheng, Y.; Cetinkaya, E.K.; Rohrer, J.P.; Sterbenz, J.P. Destination-sequenced distance vector (DSDV) routing protocol implementation in ns-3. In Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques, Barcelona, Spain, 21–25 March 2011; ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering): Brussels, Belgium, 2011; pp. 439–446. [ Google Scholar ]
  • Van den Abeele, F.; Haxhibeqiri, J.; Moerman, I.; Hoebeke, J. Scalability analysis of large-scale LoRaWAN networks in ns-3. IEEE Internet Things J. 2017 , 4 , 2186–2198. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Wu, X.; Brown, K.N.; Sreenan, C.J.; Alvarez, P.; Ruffini, M.; Marchetti, N.; Payne, D.; Doyle, L. An XG-PON module for the NS-3 network simulator. In Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, Cannes, France, 5–7 March 2013; ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering): Brussels, Belgium, 2013; pp. 195–202. [ Google Scholar ]
  • Lu, Z.; Qu, G.; Liu, Z. A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy. IEEE Trans. Intell. Transp. Syst. 2019 , 20 , 760–776. [ Google Scholar ] [ CrossRef ]
  • Dong, Q.; Chen, Y.; Li, X.; Zeng, K. A Survey on Simulation Tools and Testbeds for Cognitive Radio Networks Study. arXiv 2018 , arXiv:1808.09858. [ Google Scholar ]
  • Alenazi, M.J.F.; Cheng, Y.; Zhang, D.; Sterbenz, J.P.G. Epidemic routing protocol implementation in ns-3. In Proceedings of the 2015 Workshop on ns-3, Castelldefels, Spain, 13–14 May 2015; ACM: New York, NY, USA, 2015; pp. 54–59. [ Google Scholar ]

Click here to enlarge figure

Toolns-3ns-3OMNET++SWANSNetSimQualNet
InterfaceC++/PythonC++/OTclC++/NEDJavaC/Java/.NETParsec (C Based)
LicenseFreeFreeFree for academicFreeCommercialCommercial
ParallelismNoNoMPI/PVMNo-SMP/Beowulf
O.S.Linux, FreeBSD, Mac OS X, WindowsLinux, FreeBSD, Mac OS X, WindowsLinux, Mac OS X, WindowsLinux, Mac OS X, WindowsWindowsLinux, Mac OS X, Windows, Unix
Mobility SupportYesYesNoYesYesYes
GUI SupportLimitedYesYesYesYesYes
Data SourceWeb Site
Scopus
The ACM Digital Library
IEEE Xplore
Springer
Elsevier Science Direct
SourceNumber of Docs for ns3Number of Docs for ns-3
1Google Scholar28,70032,500
2Elsevier727,109
3Springer2173,518
4IEEE Explore D.L.4571816
5The ACM Digital Library394290,550
C.2.0General
C.2.1Network Architecture and Design
C.2.2Network Protocols
C.2.3Network Operations
C.2.4Distributed Systems
C.2.5Local and Wide-Area Networks
C.2.6Internetworking
C.2.mMiscellaneous
implementation31
implementing2
improved2
improvement1
improving2
enhancing1
extending2
extension3
integration1
integrating1
TypeCriteria
1ExclusionInformal literature
2ExclusionDuplicated papers
3ExclusionPapers that did not comply research questions
4ExclusionPapers not written in English language
5InclusionPapers that report any kind of use of ns-3
Id...
Author...
Title...
Year...
Venue...
Citations...
RQ1Which are the impacted Application Domains?
Q1.1What kind of the network technologies are simulated? (e.g., WSN, wireless networks,
mobile networks, internetworking...)
Q1.2Which are the related application field? (e.g., medicine, astrology, ...)
Q1.3What kind of problem is addressed? (e.g., security, assessment, experimental methodology...)
RQ2How much is this approach extensible?
Q2.1Is it a new extension or module? yes/no
Q2.2Does it use an external module or extension? yes/no
200920102011201220132014
Query2%0%2%6%5%5%
search(3)(0)(3)(8)(7)(7)
Selected2%0%2%7%6%6%
papers(2)(0)(2)(8)(7)(7)
20152016201720182019TOTAL
Query16%19%23%13%9%100%
search(21)(23)(28)(17)(11)128
Selected16%19%22%12%8%100%
papers(19)(23)(27)(15)(10)120
Application study68
Module extension5
Conceptual study36
Survey11
IdQuality Assessment CriteriaScore
A1What is the relevance of the paper according to the
conference/journal where it was published?
A2What is the relevance of the citation according to its
related citations?
A3How clearly is the problem of the study described?
A4How clearly is the research context stated?
A5How explicitly are the contributions presented?
A6How explicitly are the insights and issues for future
work stated?
RQ1Which are the Impacted Application Domains?
Q1.1What kind of network technologies are simulated?%n
MANET14%16
WSN8%10
Wireless Networks12%14
Mobile Networks15%18
Networking27%32
VANET17%18
Other7%9
Q1.2Which are the related application fields?
Medicine
Physics
Astronomy
Other
Q1.3What kind of problem is addressed?
Security11%11
Assessment33%34
Network Protocol26%27
Physical Layer6%6
Performance24%24
RQ2How Much Is This Approach Extensible?
Q2.1Is it a new extension or module?%n
Yes17%20
No83%100
Q2.2Does it use an external module or extension?
Yes31%37
No89%83
20092010201120122013201420152016201720182019
2028771923271510

Share and Cite

Campanile, L.; Gribaudo, M.; Iacono, M.; Marulli, F.; Mastroianni, M. Computer Network Simulation with ns-3: A Systematic Literature Review. Electronics 2020 , 9 , 272. https://doi.org/10.3390/electronics9020272

Campanile L, Gribaudo M, Iacono M, Marulli F, Mastroianni M. Computer Network Simulation with ns-3: A Systematic Literature Review. Electronics . 2020; 9(2):272. https://doi.org/10.3390/electronics9020272

Campanile, Lelio, Marco Gribaudo, Mauro Iacono, Fiammetta Marulli, and Michele Mastroianni. 2020. "Computer Network Simulation with ns-3: A Systematic Literature Review" Electronics 9, no. 2: 272. https://doi.org/10.3390/electronics9020272

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

Machine Learning for Computer Systems and Networking: A Survey

New citation alert added.

This alert has been successfully added and will be sent to:

You will be notified whenever a record that you have chosen has been cited.

To manage your alert preferences, click on the button below.

New Citation Alert!

Please log in to your account

Information & Contributors

Bibliometrics & citations, view options, 1 introduction.

research papers on computer networks

2.1 Problem Space

2.2 solution space, 2.3 classification of selected works.

SolutionParadigmsEnvironmentTemporality
SLUSLRLCentralizedDistributedOfflineOnline
       
LSTM Hardware Prefetcher [ ]   
Learning Access Patterns [ ]  
Compact Prefetcher [ ]    
Kleio [ ]   
Lightweight Caching [ ]    
RL-Cache [ ]    
       
DeepRM [ ]    
Device Placement [ ]    
Decima [ ]    
       
Learned Index Structures [ ]    
SkinnerDb [ ]    
DQ [ ]    
State Representations [ ]    
MSCN [ ]    
Neo [ ]    
       
Deep Packet [ ]    
NeuroCuts [ ]    
       
Learning to Route [ ]    
DQRC [ ]    
       
Remy [ ]    
Vivace [ ]    
Aurora [ ]    
Orca [ ]    
DRL-CC [ ]    
       
CS2P [ ]    
Pensieve [ ]    

3 Memory/cache Management

research papers on computer networks

3.1 Traditional Approaches and Limitations

3.2 ml-based approaches, 3.2.1 memory prefetchers., 3.2.2 page scheduling., 3.2.3 cache admission and eviction in cdns., 3.3 discussion on ml-based approaches, 4 cluster resource scheduling, 4.1 traditional approaches and limitations, 4.2 ml-based approaches, 4.3 discussion on ml-based approaches, 5 query optimization in database systems, 5.1 traditional approaches and limitations, 5.2 ml-based approaches, 5.2.1 index structure optimization., 5.2.2 cardinality estimation., 5.2.3 join ordering., 5.2.4 end-to-end query optimization., 5.3 discussion on ml-based approaches, 6 network packet classification.

research papers on computer networks

6.1 Traditional Approaches and Limitations

6.2 ml-based approaches, 6.3 discussion on ml-based approaches, 7 network routing, 7.1 traditional approaches and limitations, 7.2 ml-based approaches, 7.3 discussion on ml-based approaches, 8 congestion control, 8.1 traditional approaches and limitations, 8.2 ml-based approaches, 8.3 discussion on ml-based approaches, 9 adaptive video streaming.

research papers on computer networks

9.1 Traditional Approaches and Limitations

9.2 ml-based approaches, 9.3 discussion on ml-based approaches, 10 discussion and future directions, acknowledgments.

  • Xia Y Jiang S Meng L Ju X (2024) XGBoost-B-GHM: An Ensemble Model with Feature Selection and GHM Loss Function Optimization for Credit Scoring Systems 10.3390/systems12070254 12 :7 (254) Online publication date: 14-Jul-2024 https://doi.org/10.3390/systems12070254
  • Li Z Wang T Liu J Zhang Y Ma T Liu K (2024) TuplePick: A High Stability Packet Classification based on Neural Network 2024 IEEE 25th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) 10.1109/WoWMoM60985.2024.00066 (377-382) Online publication date: 4-Jun-2024 https://doi.org/10.1109/WoWMoM60985.2024.00066
  • Abboud M Baala O Drissi M Allio S (2024) Unsupervised Learning Approach for Network Traffic Classification 2024 International Wireless Communications and Mobile Computing (IWCMC) 10.1109/IWCMC61514.2024.10592501 (1155-1160) Online publication date: 27-May-2024 https://doi.org/10.1109/IWCMC61514.2024.10592501
  • Show More Cited By

Index Terms

Computer systems organization

General and reference

Document types

Surveys and overviews

Recommendations

A survey of machine learning for computer architecture and systems.

It has been a long time that computer architecture and systems are optimized for efficient execution of machine learning (ML) models. Now, it is time to reconsider the relationship between ML and systems and let ML transform the way that computer ...

Machine Learning: The State of the Art

The two fundamental problems in machine learning (ML) are statistical analysis and algorithm design. The former tells us the principles of the mathematical models that we establish from the observation data. The latter defines the conditions on which ...

Machine learning in computer forensics (and the lessons learned from machine learning in computer security)

In this paper, we discuss the role that machine learning can play in computer forensics. We begin our analysis by considering the role that machine learning has gained in computer security applications, with the aim of aiding the computer forensics ...

Information

Published in.

cover image ACM Computing Surveys

University of Sydney, Australia

Association for Computing Machinery

New York, NY, United States

Publication History

Permissions, check for updates, author tags.

  • Machine learning
  • computer systems
  • computer networking

Funding Sources

  • Dutch Research Council (NWO)
  • Open Competition Domain Science
  • German Research Foundation (DFG)
  • Collaborative Research Center (CRC)

Contributors

Other metrics, bibliometrics, article metrics.

  • 7 Total Citations View Citations
  • 4,170 Total Downloads
  • Downloads (Last 12 months) 2,736
  • Downloads (Last 6 weeks) 408
  • Doriguzzi-Corin R Knob L Mendozzi L Siracusa D Savi M (2024) Introducing packet-level analysis in programmable data planes to advance Network Intrusion Detection Computer Networks: The International Journal of Computer and Telecommunications Networking 10.1016/j.comnet.2023.110162 239 :C Online publication date: 12-Apr-2024 https://dl.acm.org/doi/10.1016/j.comnet.2023.110162
  • Schneider S Karl H Khalili R Hecker A (2023) Multi-Agent Deep Reinforcement Learning for Coordinated Multipoint in Mobile Networks IEEE Transactions on Network and Service Management 10.1109/TNSM.2023.3300962 21 :1 (908-924) Online publication date: 1-Aug-2023 https://dl.acm.org/doi/10.1109/TNSM.2023.3300962
  • Keshvadi S Hu S Lian Y Li G (2023) OpenData: A Framework to Train and Deploy ML Solutions in Wide-Area Networks IEEE Network: The Magazine of Global Internetworking 10.1109/MNET.2023.3320929 37 :5 (25-32) Online publication date: 6-Oct-2023 https://dl.acm.org/doi/10.1109/MNET.2023.3320929
  • Lin J Li Q Xie G Jiang Y Yuan Z Jiang C Yang Y (2023) In-Forest: Distributed In-Network Classification with Ensemble Models 2023 IEEE 31st International Conference on Network Protocols (ICNP) 10.1109/ICNP59255.2023.10355602 (1-12) Online publication date: 10-Oct-2023 https://doi.org/10.1109/ICNP59255.2023.10355602

View options

View or Download as a PDF file.

View online with eReader .

HTML Format

View this article in HTML Format.

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Full Access

Share this publication link.

Copying failed.

Share on social media

Affiliations, export citations.

  • Please download or close your previous search result export first before starting a new bulk export. Preview is not available. By clicking download, a status dialog will open to start the export process. The process may take a few minutes but once it finishes a file will be downloadable from your browser. You may continue to browse the DL while the export process is in progress. Download
  • Download citation
  • Copy citation

We are preparing your search results for download ...

We will inform you here when the file is ready.

Your file of search results citations is now ready.

Your search export query has expired. Please try again.

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

CS 243, Fall 2019: Advanced Computer Networks

This is a graduate-level course on computer networks. It provides a comprehensive overview on advanced topics in network protocols and networked systems. The course will cover both classic papers on computer networks and recent research results. It will examine a wide range of topics including routing, congestion control, network architectures, network management, datacenter networks, software-defined networking, and programmable networks, with an emphasis on core networking concepts and principles and their usage in practice. The course will include lectures, in-class presentations, paper discussions, and a research project.

  • Instructor: Minlan Yu (MD 137)
  • Lecture time: MW 1:30pm-2:45pm
  • Location: TBD
  • Office hour: We have unlimited office hours to discuss course projects. Please just email the instructor to schedule the time. We also have walk-in office hour time on Monday 12:30-1:30, MD 137
  • Discussion list: Piazza
  • Recommended prep: system programming at the level of CS 61 or CS 143 or CS 145.
  • Project: 50%
  • Reviews: 30%
  • Class presentation: 20%

Review format

Class presentation, presentation format, project timeline, project proposal presentation, midterm project report, final project presentations, final project report, code submission, evaluation testbed, diversity and inclusion, accommodations for disabilities.

Last updated: 2019-10-16 11:59:11 -0400 [ validate xhtml ]

PAWS Princeton Advanced Wireless Systems

Advanced computer networks.

Survey of computer networks covering end-to-end principle, multiplexing, virtualization, packet switching vs. circuit switching, router design, network protocols, congestion control, internet routing architecture, network measurement, network management, and overlay networks. Survey of research papers from classic literature through contemporary research.

research papers on computer networks

Computer Networks, Big Data and IoT

Proceedings of ICCBI 2020

  • Conference proceedings
  • © 2021
  • A.Pasumpon Pandian 0 ,
  • Xavier Fernando 1 ,
  • Syed Mohammed Shamsul Islam 2

Department of CSE, KGiSL Institute of Technology, Coimbatore, India

You can also search for this editor in PubMed   Google Scholar

Department of Electrical and Computer Engineering, Ryerson University, Toronto, Canada

Edith cowan university (ecu), joondalup, australia.

  • Presents research works in the field of computer networks, big data, and IoT
  • Contains best selected papers presented at ICCBI 2020 held in Madurai, India, during 15–16 December 2020
  • Serves as a reference for researchers and practitioners in academia and industry

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies (LNDECT, volume 66)

131k Accesses

223 Citations

1 Altmetric

This is a preview of subscription content, log in via an institution to check access.

Access this book

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
  • Durable hardcover edition

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

About this book

This book presents best selected research papers presented at the International Conference on Computer Networks, Big Data and IoT (ICCBI 2020), organized by Vaigai College Engineering, Madurai, Tamil Nadu, India, during 15–16 December 2020. The book covers original papers on computer networks, network protocols and wireless networks, data communication technologies and network security. The book is a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers and industry practitioners in those important areas.

Similar content being viewed by others

research papers on computer networks

Internet of Everything: Evolution and Fundamental Concepts

research papers on computer networks

Networking Big Data: Definition, Key Technologies and Challenging Issues of Transmission

research papers on computer networks

A Survey on Next Generation IoT Networks from Green IoT Perspective

  • ICCBI Proceedings
  • Data Communication
  • Computer Networks
  • Internet of Things
  • Wireless Communication
  • Big Data and Cloud Computing

Table of contents (73 papers)

Front matter, maximizing network lifetime in wsn using ant colony algorıthm.

  • M. D. Saranya, G. Pradeepkumar, J. L. Mazher Iqbal, B. Maruthi Shankar, K. S. Tamilselvan

Deep Ensemble Approach for Question Answer System

  • K. P. Moholkar, S. H. Patil

Information Sharing Over Social Media Analysis Using Centrality Measure

  • K. P. Ashvitha, B. Akshaya, S. Thilagavathi, M. Rajendiran

AndroHealthCheck: A Malware Detection System for Android Using Machine Learning

  • Prerna Agrawal, Bhushan Trivedi

Use of Machine Learning Services in Cloud

  • Chandrashekhar S. Pawar, Amit Ganatra, Amit Nayak, Dipak Ramoliya, Rajesh Patel

An Experimental Analysis on Selfish Node Detection Techniques for MANET Based on MSD and MBD-SNDT

  • V. Ramesh, C. Suresh Kumar

Metaheuristic-Enabled Shortest Path Selection for IoT-Based Wireless Sensor Network

  • Subramonian Krishna Sarma

Improved Harris Hawks Optimization Algorithm for Workflow Scheduling Challenge in Cloud–Edge Environment

  • Miodrag Zivkovic, Timea Bezdan, Ivana Strumberger, Nebojsa Bacanin, K. Venkatachalam

Generation of Random Binary Sequence Using Adaptive Row–Column Approach and Synthetic Color Image

  • C. Manikandan, N. Raju, K. Sai Siva Satwik, M. Chandrasekar, V. Elamaran

Blockchain: Application Domains, Research Issues and Challenges

  • Dipankar Debnath, Sarat Kr. Chettri

A Study of Mobile Ad hoc Network and Its Performance Optimization Algorithm

  • Vishal Polara, Jagdish M. Rathod

Industrial IoT: Challenges and Mitigation Policies

  • Pankaj Kumar, Amit Singh, Aritro Sengupta

Eclat_RPGrowth: Finding Rare Patterns Using Vertical Mining and Rare Pattern Tree

  • Sunitha Vanamala, L. Padma Sree, S. Durga Bhavani

Research Scholars transferring Scholarly Information through Social Medias and Networks in the Selected State Universities of Tamil Nadu

  • C. Baskaran, P. Pitchaipandi

Twitter-Based Disaster Management System Using Data Mining

  • V. G. Dhanya, Minu Susan Jacob, R. Dhanalakshmi

Sentimental Analysis on Twitter Data of Political Domain

  • Seenaiah Pedipina, S. Sankar, R. Dhanalakshmi

Cloud-Based Smart Environment Using Internet of Things (IoT)

  • E. Laxmi Lydia, Jose Moses Gummadi, Sharmili Nukapeyi, Sumalatha Lingamgunta, A. Krishna Mohan, Ravuri Daniel

A Review of Healthcare Applications on Internet of Things

  • S. Chitra, V. Jayalakshmi

Big Social Media Analytics: Applications and Challenges

  • Sonam Srivastava, Yogendra Narain Singh

Editors and Affiliations

A.Pasumpon Pandian

Xavier Fernando

Syed Mohammed Shamsul Islam

About the editors

Dr. Syed Mohammed Shamsul Islam completed his PhD with Distinction in Computer Engineering from the University of Western Australia (UWA) in 2011. He received his MSc in Computer Engineering from King Fahd University of Petroleum and Minerals in 2005 and BSc in Electrical and Electronic Engineering from Islamic Institute of Technology in 2000. Before joining ECU as a Lecturer in Computer Science, he worked in different teaching and research positions at UWA and Curtin University (2011-2016). He was promoted to Senior Lecturer in Nov 2020. He has published over 60 research articles and got 17 public media releases, including a TV news story and four live radio interviews. He has receivedthe NHMRC Ideas grant 2019 (AUD 467,980) and nine other external research grants. He is serving the scientific community as an Associate Editor of IEEE Access , a guest editor of Healthcare , a Technical Committee Member of 25 conferences and a regular reviewer of 26 journals. He is a Senior Member of IEEE and Australian Computer Society . His research interest includes Artificial Intelligence, Computer Vision, Pattern Recognition, Big-Data Analysis, Biometrics, Medical Imaging, Internet of Things (IoT), Image Processing and Biomedical Engineering.

Bibliographic Information

Book Title : Computer Networks, Big Data and IoT

Book Subtitle : Proceedings of ICCBI 2020

Editors : A.Pasumpon Pandian, Xavier Fernando, Syed Mohammed Shamsul Islam

Series Title : Lecture Notes on Data Engineering and Communications Technologies

DOI : https://doi.org/10.1007/978-981-16-0965-7

Publisher : Springer Singapore

eBook Packages : Engineering , Engineering (R0)

Copyright Information : The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021

Hardcover ISBN : 978-981-16-0964-0 Published: 22 June 2021

Softcover ISBN : 978-981-16-0967-1 Published: 23 June 2022

eBook ISBN : 978-981-16-0965-7 Published: 21 June 2021

Series ISSN : 2367-4512

Series E-ISSN : 2367-4520

Edition Number : 1

Number of Pages : XXII, 991

Number of Illustrations : 111 b/w illustrations, 327 illustrations in colour

Topics : Communications Engineering, Networks , Data Structures and Information Theory , Artificial Intelligence , Cyber-physical systems, IoT , Professional Computing , Big Data

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published by everscience publications, issn : 2395-0455, track paper.

IJCNA Cover Page

  • Multipath Routing for Internet of Vehicles using Master of Controller in Road Awareness (MRMOC-IOV)
  • Improved Wolf Prey Inspired Protocol for Routing in Cognitive Radio Ad Hoc Networks
  • Taylor Based Grey Wolf Optimization Algorithm (TGWOA) For Energy Aware Secure Routing Protocol
  • An Empirical Review on Blockchain Smart Contracts: Application and Challenges in Implementation
  • Concepts and Contributions of Edge Computing in Internet of Things (IoT): A Survey
  • Performance Evaluation of SHA-3(KECCAK) on ARM Cortex-A9 and Comparison with ARM 7TDMI and Cortex-M4
  • Fractional Gaussian Firefly Algorithm and Darwinian Chicken Swarm Optimization for IoT Multipath Fault-Tolerant Routing
  • Cluster Head Election in Wireless Sensor Network: A Comprehensive Study and Future Directions
  • A Comprehensive Survey on Routing Schemes and Challenges in Wireless Sensor Networks (WSN)
  • Energy Efficient Load Balancing Aware Task Scheduling in Cloud Computing using Multi-Objective Chaotic Darwinian Chicken Swarm Optimization
  • Vulnerability Exploitations Using Steganography in PDF Files
  • Performance Analysis of Various Mobility Management Protocols for IPv6 based Networks
  • Partial Topology-Aware Data Distribution within Large Unmanned Surface Vehicle Teams
  • Robust Resource Scheduling With Optimized Load Balancing Using Grasshopper Behavior Empowered Intuitionistic Fuzzy Clustering in Cloud Paradigm
  • A Comparative Study on Efficient Path Finding Algorithms for Route Planning in Smart Vehicular Networks
  • Evolutionary Computing Assisted Visually-Imperceptible Hybrid Cryptography and Steganography Model for Secure Data Communication over Cloud Environment
  • EEMCCP - A Novel Architecture Protocol Design for Efficient Data Transmission in Underwater Acoustic Wireless Sensor Network
  • A Novel Fragmentation Scheme for Textual Data Using Similarity-Based Threshold Segmentation Method in Distributed Network Environment
  • Support Vector Regressive Dragonfly Optimized Shift Invariant Deep Neural Learning Based Handover for Seamless Data Delivery in Heterogeneous Network
  • Design and Security Simulation of Wi-Fi Networks
  • A Novel Hybrid Approach for Detection of Web-Based Attacks in Intrusion Detection Systems
  • Big Data Analysis for M2M Networks: Research Challenges and Open Research Issues
  • A Study of Machine Learning in Wireless Sensor Network
  • A Survey on the Internet of Things Solutions for the Elderly and Disabled: Applications, Prospects, and Challenges
  • Exploring IOT Application Using Raspberry Pi
  • A Survey on Cybersecurity in Unmanned Aerial Vehicles: Cyberattacks, Defense Techniques and Future Research Directions
  • A Novel Distributed Token-Based Access Control Algorithm Using A Secret Sharing Scheme for Secure Data Access Control
  • Reliable and Efficient Routing Model for Unequal Clustering-Based Wireless Sensor Networks
  • Optimized Controller Scheme for Autonomous Navigation in Infotainment on Internet-of-Vehicles
  • Energy-Efficient Trust and Quarantine-Based Secure Data Transmission in Wireless Sensor Networks
  • Design and Simulation of Wireless Sensor Network Topologies Using the ZigBee Standard
  • Wireless Sensor Network-Based Health Monitoring System for the Elderly and Disabled
  • Evaluation of Optimum NPRACH Performance in NB-IoT Systems
  • Design and Implementation of a Smart Home for the Elderly and Disabled
  • MNP: Malicious Node Prevention in Vehicular Ad hoc Networks
  • Improved Signcryption Algorithm for Information Security in Networks
  • Application of Modified ACO Meta heuristic in Spray and Wait Routing
  • MA-LEACH: Energy Efficient Routing Protocol for WSNs using Particle Swarm Optimization and Mobile Aggregator
  • Mobility Management Scheme Based on Smart Buffering for Vehicular Networks
  • An Empirical Model of Job Shop Scheduling With Related To Tiny Chemical Assembly Instructions Inside of Living Things and Gels Techniques
  • Performance Comparison between LTE and WiMAX Based on Link Level Simulation
  • Automatic Feedback Framework for Deriving Educational Ontologies
  • Evaluation of the Effects of Measurement Interval on Artificial Neural Network-Based Prediction for Wireless Water Quality Monitoring Network
  • Improvement over AODV Considering QoS Support in Mobile Ad-hoc Networks
  • A Survey on Potential Applications of Honeypot Technology in Intrusion Detection Systems
  • Evaluation of TCP Congestion Control Modus Operandi in Mesh Networks
  • Energy Efficiency Optimization in Wireless Sensor Network Using Proposed Load Balancing Approach
  • Usage of Machine Learning for Intrusion Detection in a Network
  • Analysis of VBF protocol in Underwater Sensor Network for Static and Moving Nodes
  • Security and Fraud Issues of E-banking
  • A Study on 5G Evolution and Revolution
  • A Survey of Various Security Issues in Online Social Networks
  • The Influence of Smart Phones on Human Health and Behavior: Jordanians’ Perceptions
  • A Probabilistic Key Management Protocol based on Kryptograph for WSN
  • Enhancing Security of Cloud Data through Encryption with AES and Fernet Algorithm through Convolutional-Neural-Networks (CNN)
  • Enhanced Route Discovery Mechanism of Ad-Hoc On Demand Distance Vector for MANET
  • Connectivity Based Positioning System for Underground Vehicular Ad Hoc Networks
  • Design of a Monitor for Detecting Money Laundering and Terrorist Financing
  • Public-Key Cryptography Techniques Evaluation
  • Optimized Firewall with Traffic Awareness
  • A Fine-Grained Spatial Cloaking With Query Probability Levels for Privacy in LBS
  • Rethinking Audience Clustering in Sports Market using Gossip Protocol
  • A Novel Approach for Data Privacy Using Attribute Based Scheme Algorithm for Cloud Computing
  • A Framework for Effective Big data Analytics for Decision Support Systems
  • Prioritized and Secured Data Dissemination Technique in VANET Based on Optimal Blowfish Algorithm and Signcryption Method
  • TabSecure: An Anti-Phishing Solution with Protection against Tabnabbing
  • Efficient Collaborative Technique using Intrusion Detection System for Preserving Privacy in Location-based Services
  • Throughput and Delay Analysis of AODV, DSDV and DSR Routing Protocols in Mobile Ad Hoc Networks
  • Self-Correcting Localization Scheme for Vehicle to Vehicle Communication
  • The Provision of Information Technology Security Considerations by Legal Prescripts: South African Case
  • ZBLE: Zone Based Leader Election Energy Constrained AOMDV Routing Protocol
  • Machine-to-Machine Communications for Smart Homes
  • Time Based Fault Detection and Isolation In Wireless Sensors Network
  • A Novel Routing Scheme to Avoid Link Error and Packet Dropping in Wireless Sensor Networks
  • Effect of Quarantine & Vaccination on Infectious Nodes in Computer Network
  • Adaptive Routing Protocol based on Cuckoo Search algorithm (ARP-CS) for secured Vehicular Ad hoc network (VANET)
  • Interference Aware Cooperative Routing Algorithm for Wireless Ad Hoc Networks over Nakagami Fading and Lognormal Shadowing
  • Distributed File Systems Implementation on an Edge Router using GlusterFS for Cloud Applications
  • A Novel Efficient Rebroadcast Protocol for Minimizing Routing Overhead in Mobile Ad-Hoc Networks
  • Discovery of Multi-Objective Overlapping Communities within Social Networks using a Socially Inspired Metaheuristic Algorithm
  • A Novel Application based Generic Cluster Creation Mechanism in Ad Hoc Networks
  • A Study on Topology based Vehicular Ad hoc Network Routing Protocols
  • A Delay and Spectrum Aware Fuzzy Logic Based Routing Protocol for CRN
  • Clone Attack Detection Using Pair Access Witness Selection Technique
  • Abstracts Evaluation for Quality Assurance in Scientific Journal
  • Congestion Aware Packet Routing For Delay Sensitive Cloud Communications
  • A Robust Hybrid Steganography Mechanism for Security in Data Communication Networks
  • Dynamic Node Recovery in MANET for High Recovery Probability
  • IP Address Lookup in an IP Router Based On a Reorganized Binary Prefixes Value Tree (RBPVT)
  • Mitigation of Energy Depletion in Wireless Ad-hoc Sensor Networks through Path Optimization
  • Dynamic Transition of Bandwidth and Power Saving Mechanism to Support Multimedia Streaming Using H.264/SVC over the Wireless Networks
  • Design and Develop an Approach for Integrating Compression and Encryption on Textual Data
  • Energy Efficient Routing (EER) For Reducing Congestion and Time Delay in Wireless Sensor Network
  • Virtualization and IoT Resource Management: A Survey
  • Task scheduling in Cloud Using Hybrid Cuckoo Algorithm
  • Performance Evaluation of IPv4 and IPv6 Routing Protocols on Wired, Wireless and Hybrid Networks
  • Design and Implementation for SIP-based Push-to-Talk Services over 802.11 Networks
  • Security Concerns at Various Levels of Cloud Computing Paradigm: A Review
  • A Dynamic Approach of Malicious Node Detection for Internet Traffic Analysis
  • Grid and Cloud Computing Security: A Comparative Survey
  • Editorial Offer Supportive Review to Fresh Authors
  • Security Enhancement in Shoulder Surfing Attacks using Passpoints for Random Similar Images (PRSIm)
  • Comparative Study of Adaptive Filter Algorithm of a QO-STBC Encoded MIMO CDMA System
  • Implementation of a Novel Protocol for Coordination of Nodes in Manet
  • Overlapping Community Detection in Social Networks Using Parliamentary Optimization Algorithm
  • Secure and Fast Handovers Authentication Methods for Wi-Fi Based Networks: A Review perspective
  • A Novel Design of Instant Messaging Service Extended from Short Message Service with XMPP
  • A Diffie-Hellman and Two Step Verification based Secure Cloud Computing Paradigm
  • Adaptive Power Transmission and Efficient Energy Scheme of DSR Protocol (APEE-DSR)
  • QoS and Fuzzy Logic Based Routing Protocol for CRN
  • A Review on Intrusion Detection Systems to Secure IoT Networks
  • Efficient Multipath Zone-Based Routing in MANET Using (TID-ZMGR) Ticked-ID Based Zone Manager
  • Performance Analysis of Wireless Sensor Network Localization Algorithms
  • Textual Data Hiding in Digital Images Using Chaotic Maps
  • A Review of Static Malware Detection for Android Apps Permission Based on Deep Learning
  • A Survey on Edge-Based Internet-of-Things
  • Lane Id based Selective Emergency Message Forwarding Scheme for VANET
  • EDA-AODV: Energy and Distance Aware "AODV" Routing Protocol
  • Two-Level Grid Access Control Model Based on Resource Performance and Request Priority
  • Lucid Firefly Based Routing Protocol (LFRP) for Accessing Big Data in Cloud
  • Wireless Sensor Network Surveillance on Forest Illegal Mining using 'Planned Behaviour Abortion Tower': Analytical Modelling
  • An Analysis of Processing Multimedia Data in Mobile Ad Hoc Networks
  • Centroid Based Localization Utilizing Artificial Bee Colony Algorithm
  • 5G Network: Techniques to Increase Quality of Service and Quality of Experience
  • Energy Efficient Data Transfer in Mobile Cloud Computing Environment Using Particle-Salp Swarm Optimization Technique
  • Hybrid Approaches to Address Various Challenges in Wireless Sensor Network for IoT Applications: Opportunities and Open Problems
  • Query Aware Routing Protocol for Mobility Enabled Wireless Sensor Network
  • A Critical Survey on Overhead Control Traffic Reduction Strategies in Software-Defined Wireless Sensor Networking
  • A Survey of Medium Access Control Protocols for Unmanned Aerial Vehicle (UAV) Networks
  • Dolphin Swarm Inspired Protocol (DSIP) for Routing in Underwater Wireless Sensor Networks
  • A Hybrid Distance Vector Link State Algorithm: Distributed Sequence Number
  • Protected Light-Tree Reconfiguration without Flow Interruption in Elastic Optical Networks
  • Performance Evaluation of a MANET based Secure and Energy Optimized Communication Protocol (E2S-AODV) for Underwater Disaster Response Network
  • Cluster Head Selection Algorithm for MANETs Using Hybrid Particle Swarm Optimization-Genetic Algorithm
  • A Survey on Issues and Possible Solutions of Cross-Layer Design in Internet of Things
  • Ensemble Miscellaneous Classifiers Based Misbehavior Detection Model for Vehicular Ad-Hoc Network Security
  • Blockchain-Enabled Consensus Routing Protocol Improving the Security Data Communication in Internet of Things Applications
  • Probabilistic Based Optimized Adaptive Clustering Scheme for Energy-Efficiency in Sensor Networks
  • Elliptic Curve Cryptography based Secure Image Transmission in Clustered Wireless Sensor Networks
  • Towards Improved Detection of Intrusions with Constraint-Based Clustering (CBC)
  • Trust-Based Energy Efficient Secure Multipath Routing in MANET Using LF-SSO and SH2E
  • Wormhole Detection Using Encrypted Node IDs and Hop Counts in the Event Report of Statistical En-Route Filtering
  • Optimized Cluster Head Selection with Traffic-Aware Reliability Enhanced Routing Protocol for Heterogeneous Wireless Sensor Network (HWSN)
  • Reduce the Memory Used in Key Management for Security Systems
  • Secure Multi-Path Routing Using Splitting and Merging Based Clustering for Reducing Power Usage in MANET
  • Performance Analysis of a Dynamically Power Managed and Event-Based Wireless Sensor Node Enabled by Queue Discipline
  • Design and Analysis of a Reliable, Prioritized and Cognitive Radio-Controlled Telemedicine Network Architecture for Internet of Healthcare Things
  • A Comprehensive Survey of Various Localization Methods in Vehicular Ad Hoc Network
  • A Novel Three Layer Filtering (3L-F) Framework for Prevention of DDoS Attack in Cloud Environment
  • A Novel Technique for Blackhole Discernment Employing Big Data Analytics in IoT Networks
  • Performance Analysis and Enhancement of Contention-Based Sensors Medium Access Control Protocol in Wireless Sensor Networks
  • A Survey on Malware Classification Using Machine Learning and Deep Learning
  • The Impact of Mobility Models on Geographic Routing in Multi-Hop Wireless Networks and Extensions – A Survey
  • Throughput Optimization - Based Gateways Placement Methods in Wireless Networks
  • Dynamic Path Selection Based Video Transmission in User Preference Assisted Adaptive Rate Control in 5G Multi-RAT Network
  • Survey and testing of the IoT Cybersecurity Framework Using Intrusion Detection Systems
  • Link Failure Detection in Multimedia Sensor Networks Using Multi-Tier Clustering Based VGG-CNN Classification Approach
  • Whale Optimization Routing Protocol for Minimizing Energy Consumption in Cognitive Radio Wireless Sensor Network
  • Learning Based Task Placement Algorithm in the IoT Fog-Cloud Environment
  • A Novel Algorithm for Secured Data Sharing in Cloud using GWOA-DNA Cryptography
  • Energy-Efficient Perspicacious Ant Colony Optimization Based Routing Protocol for Mobile Ad-Hoc Network
  • Source Location Privacy for Geographical Routing in Wireless Sensor Networks: SLPGR
  • Securing Service Discovery from Denial of Service Attack in Mobile Ad Hoc Network (MANET)
  • Optimization of Smart Mobile Device Work Time Using an Optimal Decision Tree Classifier and Data Caching Technique in on Premise Network
  • RMBSRA: Routing Manager Based Secure Route Analysis Mechanism for Achieving Secure Routing Protocol in IOT MANET
  • Optimized Support Vector Machine Based Congestion Control in Wireless Sensor Network Based Internet of Things
  • Analysis of Energy, Coverage, and Fault Issues and their Impacts on Applications of Wireless Sensor Networks: A Concise Survey
  • Security Challenges and Related Solutions in Software Defined Networks: A Survey
  • Recursive Perceptron Long Short Term Memory for Wireless Data Transmission in Unmanned Aerial Vehicles
  • A Multi-Objective Metaheuristic Approach Based Adaptive Clustering and Path Selection in IoT Enabled Wireless Sensor Networks
  • Reliable Network Formation Using New Approach of Daemon Service Installation in Handheld Devices for Post-Disaster Search and Rescue
  • A Secure Image Encryption and Embedding Approach using MRSA and RC6 with DCT Transformation
  • Energy-Efficient Hybrid Protocol for Wireless Sensor Networks
  • A Secure and Reliable Handoff Authentication Protocol with Batch Verification for Internet of Things Environment
  • Real Time Two Hop Neighbour Strategic Secure Routing with Attribute Specific Blockchain Encryption Scheme for Improved Security in Wireless Sensor Networks
  • A Review of Chronological Development in Group and Hierarchical Key management Schemes in Access Control Model: Challenges and Solutions
  • An Efficient and Secure Text Encryption Scheme for Wireless Sensor Network (WSN) Using Dynamic Key Approach
  • Red-AODV: A Prevention Model of Black Hole Attack for VANET Protocols and Identification of Malicious Nodes in VANET
  • Modified Deep Learning Methodology Based Malicious Intrusion Detection System in Software Defined Networking
  • Efficient and Reliable Routing With Cloud Based Source-Location Privacy Protection in Wireless Sensor Networks
  • Efficient Cipher Scheme for Hybrid Models with Internal Structure Modification
  • COLSR An Efficient Mechanism to Secure OLSR Protocol Against Multipoint Relay Attack
  • Adaptive Neuro-Fuzzy Inference System Based On-Demand Fault Tolerant Routing Protocol (ANFIS-ODFTR) for MANETs
  • An Energy Aware Data Scheduling Approach in Cloud Using GK-ANFIS
  • Constrained Cuckoo Search Optimization Based Protocol for Routing in Cloud Network
  • Energy-Aware Optimal Clustering and Secure Routing Protocol for Heterogeneous Wireless Sensor Network
  • Migration Prediction Approach for Predict the Overloaded and Under Loaded Workload in Cloud Environment
  • CETA: Cooperation Enforcement and Trust Algorithm to Handle Selfish Attack in Delay Tolerant Network
  • Design a hybrid Optimization and Homomorphic Encryption for Securing Data in a Cloud Environment
  • Ambient Intelligence-Based Fish Swarm Optimization Routing Protocol for Congestion Avoidance in Mobile Ad-Hoc Network
  • A Comprehensive Simulation Study on the Multicast Operation of the AODV Routing Protocol for CBR Traffic in Mobile Ad-Hoc Networks
  • A Symmetric, Probabilistic, Non-Circuit Based Fully Homomorphic Encryption Scheme
  • Investigations on Bio-Inspired Algorithm for Network Intrusion Detection – A Review
  • Resource Provisioning and Utilization in 5G Network Slicing: A Survey of Recent Advances, Challenges, and Open Issues
  • A DCM Algorithm for AODV to Implement Energy Efficient Routing in MANET with Capacity Maximization
  • Trust-Based Co-Operative Cross-Layer Routing Protocol for Industrial Wireless Sensor Networks
  • Deep Q-Learning Network-Based Energy and Network-Aware Optimization Model for Resources in Mobile Cloud Computing
  • Hybrid Intrusion Detection Method Based on Constraints Optimized SAE and Grid Search Based SVM-RBF on Cloud
  • BTDEC: Blockchain-Based Trible Data Elliptic Curve Cryptosystem with Fine-Grained Access Control for Personal Data
  • A Novel Golden Eagle Optimizer Based Trusted Ad Hoc On-Demand Distance Vector (GEO-TAODV) Routing Protocol
  • Improving Performance and Efficiency of Software-Defined Networking by Identifying Malicious Switches through Deep Learning Model
  • NDTRA-MAT: A Novel Technique for Evaluating the Data Transfer Rate, Reducing the False Alarm Rate, and avoiding Packet Droppings Rate against Malicious Activity in Wireless Sensor Networks
  • A Survey on Emergency Vehicle Preemption Methods Based on Routing and Scheduling
  • Minimalistic Error via Clibat Algorithm for Attack-Defence Model on Wireless Sensor Networks (WSN)
  • A Container Migration Technique to Minimize the Network Overhead with Reusable Memory State
  • Blockchain Powered Mutual Authentication and Access Control Protocol
  • Optimum Selection of Virtual Machine Using Improved Particle Swarm Optimization in Cloud Environment
  • Hybrid Optimization-Based Secure Routing Protocol for Cloud Computing
  • Design of Maintaining Data Security on IoT Data Transferred Through IoT Gateway System to Cloud Storage
  • Enhanced Objective Function ETX Metric in Routing Protocol for Low-Power and Lossy Networks (RPL)
  • Hybrid Simulated Annealing with Lion Swarm Optimization Algorithm with Modified Elliptic Curve Cryptography for Secured Data Transmission Over Wireless Sensor Networks (WSN)
  • Improving Sinkhole Attack Detection Rate through Knowledge-Based Specification Rule for a Sinkhole Attack Intrusion Detection Technique of IoT
  • Scalable and Robust Intrusion Detection System to Secure the IoT Environments using Software Defined Networks (SDN) Enabled Architecture
  • Performance Analysis of Malicious Node Detection in Wireless Multimedia Sensor Networks using Modified LeNET Architecture
  • Energy Efficient Evolutionary Algorithm based Clustering with Route Selection Protocol for IoT Assisted Wireless Sensor Networks
  • Improved Performance of Cloud Networks Using Chaotic Black Widow Optimization Algorithm
  • Analysis of Machine Learning Classifiers to Detect Malicious Node in Vehicular Cloud Computing
  • Blockchain-Based Model for Smart Home Network Security
  • Optimization of Inter-Domain Routing and Resource Allocation in Elastic Multi-Domain Optical Networks
  • Minimizing Delay in Mobile Ad-Hoc Network Using Ingenious Grey Wolf Optimization Based Routing Protocol
  • Detection of Black and Grey Hole Attacks Using Hybrid Cat with PSO-Based Deep Learning Algorithm in MANET
  • Multi-Criteria Optimization Based VM Placement Strategy to Mitigate Co-Location Risks in Data Centers
  • Energy Efficient Device to Device Data Transmission Based on Deep Artificial Learning in 6G Networks
  • Optimization of Computation and Communication Driven Resource Allocation in Mobile Cloud
  • Erudite Fish Swarm Optimization Based Routing Protocol to Maximize Wireless Sensor Network Lifetime
  • Energy Efficient Trustworthy Target Tracking Scheme (3TS) Based on Clustering and Task Cycle Scheduling for Wireless Sensor Networks
  • Region Based Secured Data Transmission Protocol for Wireless Sensor Network
  • Hybrid Optimization-Based Efficient Routing Protocol for Energy Consumption Minimization in Mobile Wireless Sensor Network
  • Towards an Adaptive Routing Protocol for Low Power and Lossy Networks (RPL) for Reliable and Energy Efficient Communication in the Internet of Underwater Things (IoUT)
  • Privacy-Preserving Mechanism to Secure IoT-Enabled Smart Healthcare System in the Wireless Body Area Network
  • Security Model to Mitigate Black Hole Attack on Internet of Battlefield Things (IoBT) Using Trust and K-Means Clustering Algorithm
  • A Trust-Based Design for Secure and Quality of Service Routing in Mobile Ad Hoc Networks
  • Secure Storage and Data Sharing Scheme Using Private Blockchain-Based HDFS Data Storage for Cloud Computing
  • A Hybrid Cryptography and LogiXGBoost Model for Intelligent and Privacy Protection in Wireless Body Sensor Networks (WBSNS)
  • Hypervisor Attack Detection Using Advanced Encryption Standard (HADAES) Algorithm on Cloud Data
  • Enhanced Fractional Order Lorenz System for Medical Image Encryption in Cloud-Based Healthcare Administration
  • QSIH: Design of a Novel QoS-Aware Sidechain-Based IoT Network Design for Secure Healthcare Deployments
  • An Enhanced Authorization Protocol in Blockchain for Personal Health Information Management System
  • Deft Particle Swarm Optimization-Based Routing Protocol (DPSORP) for Energy Consumption Minimization in Mobile Ad-Hoc Network
  • A Survey on Clustering Algorithms and Proposed Architectural Framework for Border Surveillance System in Wireless Sensor Networks
  • Multi-Objective Fault Tolerance Model for Scientific Workflow Scheduling on Cloud Computing
  • A Novel Agent-Based Multipath Routing Protocol to Extend Lifetime and Enhancing Reliability of Clustered Wireless Sensor Networks
  • Trust Management Techniques and their Challenges in Cloud Computing: A Review
  • Hybrid Optimization Enabled Routing Protocol for Enhancing Source Location Privacy in Wireless Sensor Networks
  • Solitude Adaptable User Profile Matching for Mobile Social Cloud Networks
  • A Novel Trust Negotiation Protocol for Analysing and Approving IoT Edge Computing Devices Using Machine Learning Algorithm
  • Modified Fire Hawks Gazelle Optimization (MFHGO) Algorithm Based Optimized Approach to Improve the QoS Provisioning in Cloud Computing Environment
  • Reliable and Scalable Broadcast Scheme for Safety Applications in Vehicular Ad Hoc Network
  • Cluster Head Selection for Energy Balancing in Wireless Sensor Networks Using Modified Salp Swarm Optimization
  • An Automated Intrusion Detection and Prevention Model for Enhanced Network Security and Threat Assessment
  • Investigating Resource Allocation Techniques and Key Performance Indicators (KPIs) for 5G New Radio Networks: A Review
  • AFSORP: Adaptive Fish Swarm Optimization-Based Routing Protocol for Mobility Enabled Wireless Sensor Network
  • QMRNB: Design of an Efficient Q-Learning Model to Improve Routing Efficiency of UAV Networks via Bioinspired Optimizations
  • Intrusion Detection Systems for IoT Attack Detection and Identification Using Intelligent Techniques
  • Optimal Route Selection Using Hill Climbing Based Red Deer Algorithm in Vehicular Ad-Hoc Networks to Improve Energy Efficiency
  • Spectrum Management in 6G HetNet Based on Smart Contracts and Harmonized Software-Defined Networking-Enabled Approach
  • Amended Hybrid Scheduling for Cloud Computing with Real-Time Reliability Forecasting
  • A Competent Intelligence Modeling for Trust-Based Security Scheme in Mobile Ad Hoc Network
  • Game Theory Application for Misbehavior Detection and Prediction in VANET: Review and Challenges
  • Blockchain Assisted Chaotic Chameleon Swarm Optimization Based Clustering Technique in Vehicular Ad Hoc Networks
  • Scheduling Framework for Resource Management in IoT Ecosystem Over 5G Network
  • Towards Blockchain-Based Secure IoT Communication for 5G Enabled Intelligent Transportation System
  • Framework of Multiparty Computation for Higher Non-Repudiation in Internet-of-Things (IoT)
  • Ornstein Uhlenbeck Cache Obliviousness Neural Congestion Control in Wireless Network for IOT Data Transmission
  • A Collaborative Offloading Task Framework for IoT Fog Computing
  • Analysis of Improved Rate Adaptive Irregular Low Density Parity Check Encoding for Fifth Generation Networks Using Software Defined Radio
  • Honey Bee Based Improvised BAT Algorithm for Cloud Task Scheduling
  • Optimizing Virtual Machines Placement in a Heterogeneous Cloud Data Center System
  • Resilient Consensus-Based Time Synchronization with Distributed Sybil Attack Detection Strategy for Wireless Sensor Networks: A Graph Theoretic Approach
  • TCP Performance Enhancement in IoT and MANET: A Systematic Literature Review
  • Energy Aware Cross Layer Based Clustering and Congestion Control Using Mexican Axolotl Algorithm in VANET
  • Minimizing Energy Consumption in Vehicular Sensor Networks Using Relentless Particle Swarm Optimization Routing
  • Performance Enhancement of Mobility-Enabled Wireless Sensor Network Using Sophisticated Eagle Search Optimization-Based Gaussian Ad Hoc On-Demand Distance Vector (SESO-GAODV) Routing Protocol
  • A Novel All Members Group Search Optimization Based Data Acquisition in Cloud Assisted Wireless Sensor Network for Smart Farming
  • Energy Efficient Multi Hop D2D Communication Using Deep Reinforcement Learning in 5G Networks
  • Performance Analysis of Cluster-Based Dynamic Multipath Trust Secure Routing (DMTSR)-Protocol in Wireless Sensor Networks (WSNs)
  • Design of An efficient QoS-Aware Adaptive Data Dissemination Engine with DTFC for Mobile Edge Computing Deployments
  • Relentless Firefly Optimization-Based Routing Protocol (RFORP) for Securing Fintech Data in IoT-Based Ad-Hoc Networks
  • A Hybrid Secure and Optimized Execution Pattern Analysis Based O-HMACSHA 3 Resource Allocation in Cloud Environment
  • Taxonomy of Various Routing Protocols of IoT-Based on Wireless Sensor Networks for Healthcare: Review
  • Empowered Chicken Swarm Optimization with Intuitionistic Fuzzy Trust Model for Optimized Secure and Energy Aware Data Transmission in Clustered Wireless Sensor Networks
  • A Hybrid Cryptographic Cipher Solution for Secure Communication in Smart Cities
  • Robust Tristate Security Mechanism to Protect Against Selective Forwarding Attack and Black Hole Attack in Intra-Cluster Multi-Hop Communication
  • Improved Energy-Efficient Hybrid Protocol (I-EEHP) to Maximize Energy Conservation in Wireless Sensor Networks
  • Assessing a Real-time Adaptive Traffic Route Based on Ranking Software Defined Networking (SDN) Cluster of Controllers in a Datacenter
  • IoBTSec-RPL: A Novel RPL Attack Detecting Mechanism Using Hybrid Deep Learning Over Battlefield IoT Environment
  • Prediction Model to Analyze Source Node Localization Using Machine Learning and Fault-Tolerant in Wireless Sensor Networks
  • Extending the Energy Efficiency of Nodes in an Internet of Things (IoT) System via Robust Clustering Techniques
  • An Interoperability Framework for Enhanced Security of Handheld Devices Using IoT-Based Secure Energy Efficient Firefly Optimization Algorithm
  • ANFIS-RSOA Approach for Detecting and Preventing Network Layer Attacks in MANET
  • Energy Efficient Cluster Formation and Multihop Routing Based on Improved Harmony Search Algorithm for Wireless Sensor Networks
  • Distributed Self Intermittent Fault Diagnosis in Dense Wireless Sensor Network
  • Decisiveness PSO-Based Gaussian AOMDV (DPSO-GAOMDV) Routing Protocol: Smart Routing for Dynamic Traffic Conditions in Stochastic Vehicular Ad Hoc Network
  • Localization and Deployment Considerations into Quality of Service Optimization for Energy-Efficient Wireless Sensor Networks
  • Enhanced Intelligent Water Drop Algorithm Optimized Routing (EIWDR) for Quality of Service Enhancement in Internet of Things-Based Wireless Sensor Networks (IWSN)
  • TriChain: Kangaroo-Based Intrusion Detection for Secure Multipath Route Discovery and Route Maintenance in MANET Using Advanced Routing Protocol
  • Resilient Artificial Bee Colony Optimized AODV Routing Protocol (RABCO-AODV-RP) for Minimizing the Energy Consumption in Flying Ad-Hoc Network
  • Design of Hybrid Metaheuristic Optimization Algorithm for Trust-Aware Privacy Preservation in Cloud Computing
  • A Load Balancing Aware Task Scheduling using Hybrid Firefly Salp Swarm Algorithm in Cloud Computing
  • Secure Power Aware Hybrid Routing Strategy for Large-Scale Wireless Sensor Networks
  • An Efficient Restricted Flooding Based Route Discovery (RFBRD) Scheme for AODV Routing
  • Performance Evaluation of the K-Means-LSTM Hybrid Model for Optimization of Spectrum Sensing in Cognitive Radio Networks
  • Delay Aware Clustered Service Discovery Scheme Based on Trust for Mobile Ad Hoc Networks (MANET)
  • Co-Ordinated Blackhole and Grayhole Attack Detection Using Smart & Secure Ad Hoc On-Demand Distance Vector Routing Protocol in MANETs
  • A Survey of Current Detection and Prevention Techniques for Black Hole Attack in AODV of MANET
  • Efficacy Artificial Bee Colony Optimization-Based Gaussian AOMDV (EABCO-GAOMDV) Routing Protocol for Seamless Traffic Rerouting in Stochastic Vehicular Ad Hoc Network
  • A Novel Dynamic Link Prediction Protocol for Frequent Link Disconnections in Vehicular Ad Hoc Networks
  • Expedient Intrusion Detection System in MANET Using Robust Dragonfly-Optimized Enhanced Naive Bayes (RDO-ENB)
  • An Energy-Conserved Stability and Density-Aware QoS-Enabled Topological Change Adaptable Multipath Routing in MANET
  • Comparison of Data Rate and Energy Per Node of Wireless Sensor Network Under Small Scale Fading
  • Energizing Firefly Optimization-Inspired Routing Protocol (EFOIRP) for Performance Enhancement in IOT-Based Cloud Wireless Sensor Networks (IC-WSN)
  • Machine Learning Based Misbehavior Detection System for False Data Injection Attack in Internet of Vehicles Using Neighbor Public Transport Vehicle Approach
  • Vehicular Ad Hoc Networks Assisted Clustering Nodular Framework for Optimal Packet Routing and Scaling
  • Optimizing Ad-Hoc Routing Protocols in WSN to Enhance QoS Parameters Using Evolutionary Computation Algorithms
  • Dynamic Integration of Fast Furious Cheetah Optimization for Efficient and Secure Routing in Vehicular Ad Hoc Networks
  • Laplacian Kernel Clustering-Based Improved Certificateless Signcryption for a Secure Marine Data Aggregation in Network of Wireless Sensors
  • Strategies for Achieving Energy Efficiency and Data Security Through Data Aggregation in IoT Healthcare Applications: A Comprehensive Study
  • A Novel Dynamic Message Time Synchronization Protocol for Real Time Data Exchange in Vehicular Ad Hoc Networks
  • Invigorated Chameleon Swarm Optimization-Based Ad-Hoc On-Demand Distance Vector (ICSO-AODV) for Minimizing Energy Consumption in Healthcare Mobile Wireless Sensor Networks
  • A Power-Aware River Formation Dynamics Routing Algorithm for Enhanced Longevity in MANETs
  • SOAVMP: Multi-Objective Virtual Machine Placement in Cloud Computing Based on the Seagull Optimization Algorithm
  • Development of Hybrid Cognitive Security Managers on Improved Multilayer CFA Feed Forward Neural Network to Improve the Security on Wireless Networks
  • Preserving Security in Terms of Authentication on Blockchain-Based Wireless Sensor Network (WSN)
  • Broken-Stick Regressive Lightweight Speck Cryptographic Constrained Application Protocol for Data Security in IoT Aware Smart Home
  • Quality of Service (QoS) Enhancement in Healthcare Mobile Wireless Sensor Networks Using Adaptable Hummingbird Optimization Based Dynamic Source Routing (AHODSR)
  • Eigen Vector Based Trust Model (EVTM) for Ensuring Quality of Service (QoS) in Mobile Ad Hoc Networks
  • Energy Efficient Cluster Based Routing Using Multiobjective Improved Golden Jackal Optimization Algorithm in Wireless Sensor Networks
  • Multiple Route Selection for Avoiding Single Point Failure in Flying Ad Hoc Network (FANET)
  • Navigating Congestion in Wireless Sensor Network: A Comprehensive Survey
  • A Hybrid Improved Unequal Secure Cluster Based Distributed Routing Protocol with Quantum Key Distribution to Improve the Performance Measures in Wireless Body Sensor Network
  • HEERPOP: Hybrid Energy Efficiency Routing Protocol for Optimal Path in the Internet of Things-Based Sensor Networks
  • Decentralized Identity Management for Industrial Internet of Things Utilizing Blockchain-Enhanced Multi-Factor Authentication
  • Securing Data Communication in the Cloud Using Machine Learning-Based Blockchain Approach
  • Impact of Network Complexity, Mobility Models, and Wireless Technologies on SDN-DTN Performance in Internet of Vehicles (IoV) Environments
  • Enhancing Healthcare Monitoring with Efficient Computation Offloading in Fog Computing
  • PSA-LEACH: Improving Energy Efficiency and Classification in Wireless Sensor Networks Using Proximal Simulated Annealing with Low Energy Adaptive Clustering Hierarchical Routing Protocol
  • A Trust-Aware Framework for Reliable Content Dissemination in NDN-Based VANETs Using Hidden Markov Models
  • Congestion Control System Optimization with the Use of Vehicle Edge Computing in VANET Powered by Machine Learning

Vehicular Ad Hoc Network, Privacy in Vehicular Ad Hoc Network, Security in Vehicular Ad Hoc Network, Mobile Ad Hoc Network, Privacy in Mobile Ad Hoc Network, Security in Mobile Ad Hoc Network, Future Generation Networks and its Applications, Wireless Sensor Network, Security in Wireless Sensor Network, Social Networks, Privacy in Social Networks, Security in Social Networks, Web Services, Web Service Architecture, Web Protocol, Privacy in Web Communication, Security in Web Services, Human-Web Interaction, Network Protocol, Security in Network Protocol, Intrusion Detection and Prevention, Worm Propagation & Detection, Malware, Authentication in Network Architecture, Authentication in Web Services, Authentication in Social Networks, Biometric Security and modelling, Network Architecture and Protocols, Internet and Security, Bluetooth Technology and Security, Multimedia Networks, Cloud Computing, Big Data (Network Related), Mobile Computing, Internet Computing, Cyber Security, Underwater Sensor Networks, Cryptography & Information Security and Other Network Topics.

IJCNA DOI

  • Online First Articles -->
  • Track Your Paper

Announcements

  • IJCNA is Indexed by SCOPUS
  • Call for paper Vol 11 issue 5
  • Volume 11 issue 4 is published online
  • Manuscript Template
  • Copyright Form

Dr.M. Milton Joe EverScience Publications, Nagercoil, Tamilnadu,India

+91 9442777224

[email protected]

[email protected]

[email protected]

Quick Links

  • Paper Submission
  • Online First Articles
  • Ethics Statements
  •    Facebook
  •  Google Plus
  •   Twitter

Copyright © 2023; EverScience Publications

Designed & Maintained By Shiro Software Solutions

research papers on computer networks

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

  •  We're Hiring!
  •  Help Center

Computer Networks

  • Most Cited Papers
  • Most Downloaded Papers
  • Newest Papers
  • Last »
  • Science and Technology Studies Follow Following
  • Software Follow Following
  • Databases Follow Following
  • Science, Technology and Society Follow Following
  • Sociology of Science Follow Following
  • STS (Anthropology) Follow Following
  • Actor Network Theory Follow Following
  • Social Studies Of Science Follow Following
  • History of Science Follow Following
  • History of Science and Technology Follow Following

Enter the email address you signed up with and we'll email you a reset link.

  • Academia.edu Journals
  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

Help | Advanced Search

Computer Science > Social and Information Networks

Title: inside alameda research: a multi-token network analysis.

Abstract: We analyze the token transfer network on Ethereum, focusing on accounts associated with Alameda Research, a cryptocurrency trading firm implicated in the misuse of FTX customer funds. Using a multi-token network representation, we examine node centralities and the network backbone to identify critical accounts, tokens, and activity groups. The temporal evolution of Alameda accounts reveals shifts in token accumulation and distribution patterns leading up to its bankruptcy in November 2022. Through network analysis, our work offers insights into the activities and dynamics that shape the DeFi ecosystem.
Subjects: Social and Information Networks (cs.SI); Computational Engineering, Finance, and Science (cs.CE); Information Retrieval (cs.IR)
Cite as: [cs.SI]
  (or [cs.SI] for this version)
  Focus to learn more arXiv-issued DOI via DataCite (pending registration)

Submission history

Access paper:.

  • HTML (experimental)
  • Other Formats

References & Citations

  • Google Scholar
  • Semantic Scholar

BibTeX formatted citation

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

IMAGES

  1. (PDF) Approach To The Study Of Computer Networks

    research papers on computer networks

  2. Latest research papers on computer networks

    research papers on computer networks

  3. Research on the Computer Network Security

    research papers on computer networks

  4. The Research of Distributed Computer Network Technology Based on Web

    research papers on computer networks

  5. (DOC) COMPUTER NETWORKS Computer Networks

    research papers on computer networks

  6. Paper Review 2 on Computer Networks and Their Effects

    research papers on computer networks

VIDEO

  1. Different Network layer design issues in Computer Networks By Jayamma Rodda

  2. 25 Computer Papers You Should Read!

  3. computer science mcqs| computer science past papers| computer science test preparation

  4. International Journal of Computer Networks & Communications (IJCNC)

  5. PBA (practical)PAPERS COMPUTER SCIENCE CLASS 9TH #pba |PBA QUESTION PAPERS #practicalbasedassessment

  6. CS610 Computer Networks Lecture 37 TO 42 |Final Term preparation

COMMENTS

  1. Computer Networks

    Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The will consider any material for ...

  2. Journal of Computer Networks and Communications

    Journal of Computer Networks and Communications is an open access journal that publishes original research and review articles that investigate both the theoretical and practical aspects of computer networks and communications. As part of Wiley's Forward Series, this journal offers a streamlined, faster publication experience with a strong ...

  3. 290334 PDFs

    Deals with the various aspects and domain of Computer Networks and Communication, Cloud, and Grid Computing | Explore the latest full-text research PDFs, articles, conference papers, preprints and ...

  4. Computer Networks

    Deep Learning (DL)-based adaptive transport layer control in UAV Swarm Networks. Qian Mao, Lin Zhang, Fei Hu, Elizabeth Serena Bentley, Sunil Kumar. Article 108511. View PDF.

  5. Advancements and Challenges in Networking Technologies: A Comprehensive

    This survey paper provides a comprehensive overview of emerging technologies in networking, focusing on caching in Information-Centric Networking (ICN), context-aware radio access technology (RAT) selection in 5G ultra-dense networks, cryptocurrency adoption, and mobility support for routing in Low Power and Lossy Networks (LLNs). Adaptive RAT selection mechanisms are stressed in 5G context ...

  6. 376104 PDFs

    Explore the latest full-text research PDFs, articles, conference papers, preprints and more on COMPUTER NETWORKING. Find methods information, sources, references or conduct a literature review on ...

  7. Machine learning empowered computer networks

    Abstract. This special issue explores how emerging machine learning (ML) and artificial intelligence (AI) algorithms can help computer networks become smarter. The final goal is to disseminate cutting-edge research findings and computer network advances on innovative data-driven methodologies and technologies to grow innovation in ML-empowered ...

  8. Computer networks

    The satellite network cache placement strategy based on content popularity and node collaboration Zhiguo Liu, Zhengxia Liu, Lin Wang, Xiaoyong Jin The impact of directors' information technology experience on the financing constraints of internet start-ups—Data mining with python on the China's New OTC market

  9. PUBLICATIONS

    6. Eytan Modiano, "Random Algorithms for Scheduling Multicast Traffic in WDM Broadcast-and-Select Networks," IEEE Transactions on Networking, July, 1999. 5. Eytan Modiano and Richard Barry, "Architectural Considerations in the Design of WDM-based Optical Access Networks," Computer Networks, February 1999.

  10. Full article: The past, present, and future of network monitoring: A

    Research in network monitoring, and more generally network science, spans multiple disciplines, including mathematics, statistics, physics, and computer science, to name a few. Describe what you recognize as advantages and disadvantages associated with the interdisciplinary nature of this area, particularly as they pertain to research in, and ...

  11. (PDF) Computer Networking: A Survey

    Computer networks are a. system of i nterconnected computers for the purpose of. sharing digital information. The computer network. enables to analyze, organize and disseminate the. information ...

  12. Computer Network Simulation with ns-3: A Systematic Literature Review

    Complexity of current computer networks, including e.g., local networks, large structured networks, wireless sensor networks, datacenter backbones, requires a thorough study to perform analysis and support design. ... identify and obtain by ourselves by using the main research papers search engines, listed in Table 2: by the way, the ...

  13. Computer Networks: 27th International Conference, CN 2020, Gdańsk

    The CN 2020 proceedings focus on computer networks. They include the research work of scientists from numerous notable research centers. The selected papers are organized in topical sections on computer networks, cybersecurity and quality of service, queueing theory and queuing networks.

  14. Machine Learning for Computer Systems and Networking: A Survey

    Abstract. Machine learning (ML) has become the de-facto approach for various scientific domains such as computer vision and natural language processing. Despite recent breakthroughs, machine learning has only made its way into the fundamental challenges in computer systems and networking recently. This article attempts to shed light on recent ...

  15. Computer Networks

    LEO-based network-centric localization in 6G: Challenges and future perspectives. Ernestina Cianca, Syed Junaid Nawaz, Carla Amatetti, Tommaso Rossi, Mauro De Sanctis. In Press, Journal Pre-proof, Available online 3 August 2024. View PDF.

  16. Computer networks and communications

    A computer system including related peripherals, integrated as part of a network of one form or another, is becoming more and more a standard configuration being implemented by system designers today. Made possible through advances in communication technology and network concepts, these new configurations of telecommunications networks vary from simple arrangements of a minicomputer plus a few ...

  17. CS 243, Fall 2019: Advanced Computer Networks

    Overview. This is a graduate-level course on computer networks. It provides a comprehensive overview on advanced topics in network protocols and networked systems. The course will cover both classic papers on computer networks and recent research results. It will examine a wide range of topics including routing, congestion control, network ...

  18. Advanced Computer Networks

    Survey of computer networks covering end-to-end principle, multiplexing, virtualization, packet switching vs. circuit switching, router design, network protocols, congestion control, internet routing architecture, network measurement, network management, and overlay networks. Survey of research papers from classic literature through contemporary re

  19. Computer Networks, Big Data and IoT

    About this book. This book presents best selected research papers presented at the International Conference on Computer Networks, Big Data and IoT (ICCBI 2020), organized by Vaigai College Engineering, Madurai, Tamil Nadu, India, during 15-16 December 2020. The book covers original papers on computer networks, network protocols and wireless ...

  20. Computer Networks

    Special Issue on Selected papers from IFIP Networking Conference 2022; Special Issue on Machine Learning (ML) and Artificial Intelligence (AI) for the Internet of Things, 5G, and Beyond; Special Issue on Machine Learning empowered computer networks; Receive an update when the latest issues in this journal are published. ... Research article ...

  21. (PDF) ADVANCES IN NETWORK SECURITY: A COMPREHENSIVE ...

    The research is conducted based on analysis of threat, risk and vulnerability in an enterprise network along with countermeasures to overcome the security incidents in an enterprise network.

  22. International Journal of Computer Networks And Applications (IJCNA)

    IJCNA is Indexed by SCOPUS: Source ID Q3 International Journal of Computer Networks and Applications (IJCNA) is a scholarly open access online international journal, which aims to publish peer-reviewed original research papers in the field of Computer Networks and its applications. IJCNA aims to bring the new application developments among the researchers and academician and IJCNA lays the ...

  23. Computer Networks Research Papers

    This paper aims at investigating what happens on technology-driven markets when it is necessary to assess and evaluate information about the technology solutions before purchase. One of the major difficulties transaction participants face... more. Download. by Miglena Molhova, PhD. 6.

  24. Inside Alameda Research: A Multi-Token Network Analysis

    We analyze the token transfer network on Ethereum, focusing on accounts associated with Alameda Research, a cryptocurrency trading firm implicated in the misuse of FTX customer funds. Using a multi-token network representation, we examine node centralities and the network backbone to identify critical accounts, tokens, and activity groups. The temporal evolution of Alameda accounts reveals ...