Bibliografía: al final de cada artículo Notas: al pie de texto
Resumen
Con: TOPICS IN OPTICAL COMMUNICATIONS Series editorial: Ethernet approaches lightspeed. p.S4 Benefits of EDC and linear receivers for short reach 40/100 GE / Ali Ghiasi and Mike Dudek. p.D17 Banwidth virtualizationsenalbes long - haul VDM transport of 40 Gb/s and 100 Gb/s services / Serge Melle; Rick Dood; Steve Grupp; Chris Liou; Vijay Vusirikala and Dave Welch. p.S22 A cross - layer optical circuit provisioning framework for data intensive IP end hosts / Weiqiang Sun, Guowu Xie; Yaohui Jin; Weisheng Hu; Xinhua Lin; Min - You Wu; Wntao Li; Rong Juang and Xuequin Wei. p.S30 IPTV SYSTMES, STANDARS, AND ARCHITECTURE: PART I Guest editorial. p.69 IPTV transport architecture alternatives and ecomnomic considerations / Sunan Han; Sam Lisle and Greg Nehib. p.70 Standarization activities in the ITU for a QoE assessment of IPTV / Akira Takahashi, David Hands and Vicent Barriac. p.78 IPTV Over P2P streaming networks: the mesh - pull approach / Xiaojun Hei; Yong Li and Keith W Ross. p.86 Increasing the user perceived quality for IPTV services / Natalie Degrande; Koen Laevens; Danny Vleeschuwer, and Randy Sharpe. p.94 SECURITY IN MOBILE AD HOC AND SENSRO NETWORKS: PART I Guest editorial. p.102 Efficient packet filtering in wireless AD HOC networks / Romano Fantacci; Leonardo Maccari; Pablo Neira Ayuso and Rafael M Gasca. p.104 Defense of thurs mangement vulnerabilities in distributed networks / Yan (Lindsay) Sun; Zhu Han and K. J. Ray Liu. p.112 Securing AODV. The A- SAODV secure routing prototype / Davide Cerri and Alessandro Ghioni. p.120 Selling multimedia resources in AD HOC networks / Gina Kounga and Christian Schaefer. p.126 Secure neighborhood discovery: a fundamental element for mobile AD HOC networking / Panos Papdimitratos; Marcin Poturalski; Patrick Schaller; Pascal Lafourcade; David Basin; Srdjan Capkun and Jean Hubaux. p.132 Toward an analytical approach to anonymous wireless networking / Parv Venkitasubramaniam; Ting He; Lang Tong and Stephen B. Wicker. p.140 Application of seqential detection schemes for obtaining performance bounds of greedy users in the IEEE 802.11 MAC / Svetlana Radosavac and John S Baras. p.148