Abstract is missing.
- WebProfiler: Cooperative diagnosis of Web failuresSharad Agarwal, Nikitas Liogkas, Prashanth Mohan, Venkata N. Padmanabhan. 1-11 [doi]
- SPAMMS: A sensor-based pipeline autonomous monitoring and maintenance systemJong-Hoon Kim, Gokarna Sharma, Noureddine Boudriga, S. Sitharama Iyengar. 1-10 [doi]
- Coping with link failures in centralized control plane architecturesMaulik Desai, Thyaga Nandagopal. 1-10 [doi]
- On the robustness of wireless opportunistic routing toward inaccurate link-level measurementsPatrick Pak-Ching Lee, Vishal Misra, Dan Rubenstein. 1-10 [doi]
- QuRiNet: A wide-area wireless mesh testbed for research and experimental evaluationsDaniel Wu, Prasant Mohapatra. 1-10 [doi]
- Enhanced Genetic algorithm for solving broadcast scheduling problem in TDMA based wireless networksR. Srivathsan, S. Siddharth, Raghavan Muthuregunathan, R. Gunasekaran, V. Rhymend Uthariaraj. 1-10 [doi]
- Engineering location based pathfinding on Indian road networks over low end mobile phonesSiddharth Jain, Ratan K. Ghosh, R. K. Shyamsundar. 1-9 [doi]
- Primal meets dual: A generalized theory of logical topology survivability in IP-over-WDM optical networksKrishnaiyan Thulasiraman, Muhammad S. Javed, Guoliang Xue. 1-10 [doi]
- Efficiency of social connection-based routing in P2P VoIP networksVikram Chandrasekaran, Ram Dantu, Neeraj K. Gupta, Xiaohui Yang, Duminda Wijesekera. 1-6 [doi]
- Analytical models for energy consumption in infrastructure WLAN STAs carrying TCP trafficPranav Agrawal, Anurag Kumar 0001, Joy Kuri, Manoj Kumar Panda, Vishnu Navda, Ramachandran Ramjee, Venkata N. Padmanabhan. 1-10 [doi]
- Towards a relation oriented service architectureR. Kumar, A. Haber, Anis Yazidi, Frank Reichert. 1-8 [doi]
- Terminal reliability evaluation of the Augmented Data Vortex all optical interconnection networkN. Sharma, D. Chadha, Vinod Chandra. 1-2 [doi]
- MTorrent: A multicast enabled BitTorrent protocolPiyush Agrawal, Hitesh Khandelwal, Ratan K. Ghosh. 1-10 [doi]
- Smart applications for energy harvested WSNsTamma V. Prabhakar, Shruti Devasenapathy, H. S. Jamadagni, R. Venkatesha Prasad. 1-7 [doi]
- Unlocking wireless performance with co-operation in co-located base station poolsParul Gupta, Arun Vishwanath, Shivkumar Kalyanaraman, Yonghua Lin. 1-8 [doi]
- Automated debugging of SLO violations in enterprise systemsMaitreya Natu, Sangameshwar Patil, Vaishali P. Sadaphal, Harrick M. Vin. 1-10 [doi]
- Selection of time synchronizing nodes in wireless sensor networkT. Ratnaparkhe, S. Natekar, S. Chandan, V. P. Sadaphal. 1-8 [doi]
- An integrated soft handoff approach to IP fast reroute in wireless mobile networksSelcuk Cevher, Ta Chen, Ibrahim Hökelek, JaeWon Kang, Vikram Kaul, Yow-Jian Lin, Marcus Pang, Mete Rodoper, Sunil Samtani, Chintan Shah, Jeffrey Bowcock, Gregory B. Rucker, Jonathan L. Simbol, Aristides Staikos. 1-10 [doi]
- NashWifi: Coordinated management of heterogenous home 802.11 networks using bargainingAditya Akella, Pratap Ramamurthy, Almir Mutapcic. 1-10 [doi]
- Energy-efficient mobile data collection in Wireless Sensor Networks with delay reduction using wireless communicationArun K. Kumar, Krishna M. Sivalingam. 1-10 [doi]
- Coordinated sampling sans Origin-Destination identifiers: Algorithms and analysisVyas Sekar, Anupam Gupta, Mike K. Reiter, Hui Zhang 0001. 1-10 [doi]
- Probe station selection algorithms for fault management in computer networksDeepak Jeswani, Nakul Korde, Dinesh Patil, Maitreya Natu, John Augustine. 1-9 [doi]
- A generic framework for mobility prediction and resource utilization in wireless networksPratap S. Prasad, Prathima Agrawal. 1-10 [doi]
- Understanding topological mesoscale features in community miningSue B. Moon, Jinyoung You, Haewoon Kwak, D. Kim, Hawoong Jeong. 1-10 [doi]
- Experimental validation of analytical performance models for IEEE 802.11 networksS. Mare, D. Kotz, A. Kumar. 1-8 [doi]
- An end-to-end QoS aware greedy distributed scheduling framework for WiMAX mesh networksA. Kapoor, V. J. Ribeiro. 1-8 [doi]
- Zone based ant colony routing in mobile ad-hoc networkMaumita Bandyopadhyay, Parama Bhaumik. 1-10 [doi]
- Vector method based coverage hole recovery in Wireless Sensor NetworksPrasan Kumar Sahoo, Jang-Zern Tsai, Hong-Lin Ke. 1-9 [doi]
- Robustness of DTN against routing attacksFai Cheong Choo, Mun Choon Chan, Ee-Chien Chang. 1-10 [doi]
- Bandwidth adaptation in streaming overlaysSimon Schubert, Frank Uyeda, Nedeljko Vasic, Naveen Cherukuri, Dejan Kostic. 1-10 [doi]
- A near-optimal scheme for TCP ACK pacing to maintain throughput in wireless networksG. Bhutani. 1-7 [doi]
- Scalable rekeying for dynamic groups using key path compressionD. V. Naga Raju, V. Valli Kumari, K. V. S. V. N. Raju. 1-2 [doi]
- Analysis of performance degradation with generalized orthogonal codes due to channel estimation errors in Pre-Rake TDD/DS-CDMA downlinkChennapalli Subhas, Kurukundu Rama Naidu, Y. Venkatarami Reddy. 1-9 [doi]
- RAMP system for proactive pipeline monitoringJong-Hoon Kim, Gokarna Sharma, Noureddine Boudriga, S. S. Iyengar. 1-2 [doi]
- P2P content sharing in spontaneous multi-hop wireless networksMohamed Karim Sbai, Emna Salhi, Chadi Barakat. 1-10 [doi]
- Networking at 60 GHz: The emergence of multiGigabit wirelessUpamanyu Madhow. 1-6 [doi]
- The Stratified Shortest-Paths Problem (invited paper)T. G. Griffin. 1-10 [doi]
- Colorless, Directionless and Contentionless multi-degree ROADM architecture for mesh optical networksA. Devarajan, K. Sandesha, R. Gowrishankar, Bhyri Sai Kishore, Prasanna Ganesan, Ron Johnson, Pavan Voruganti. 1-10 [doi]
- Probabilistic routing using contact sequencing in delay tolerant networksRugved Jathar, Arobinda Gupta. 1-10 [doi]
- Socio-technical aspects of video phonesVikram Chandrasekaran, S. Dantu, P. Kadiyala, Ram Dantu, Santi Phithakkitnukoon. 1-7 [doi]
- Rate adaptation in MIMO antenna selection system with imperfect CSITT. R. Ramya, Srikrishna Bhashyam. 1-5 [doi]
- StrandCast: Peer-to-peer content distribution for latency tolerant applicationsKetan Mayer-Patel, Andrew D. Jones. 1-10 [doi]
- ADWISER: An integrated approach for Internet access bandwidth and performance management of an enterprise networkP. Kumar, K. R. Vasudev, Malati Hegde, S. Anand, Anurag Kumar 0001, Joy Kuri. 1-2 [doi]
- A channel-based hypothesis testing approach to enhance user authentication in wireless networksJitendra K. Tugnait, Hyosung Kim. 1-9 [doi]
- Distributed adaptation algorithms for rate-controlled video multicast over shared infrastructure networksMohammad Rabby, Kaliappa Ravindran, Jun Wu. 1-11 [doi]
- Collaborative spectrum sensing in the presence of Byzantine attacks in Cognitive Radio NetworksPriyank Anand, Ankit Singh Rawat, Hao Chen, Pramod K. Varshney. 1-9 [doi]
- Energy efficient learning solution for intrusion detection in Wireless Sensor NetworksSudip Misra, P. Venkata Krishna, Kiran Isaac Abraham. 1-6 [doi]
- A framework for security quantification of networked machinesHui Wang, S. Roy, A. Das, S. Paul. 1-8 [doi]
- Regulating user arrivals at a Mobile IP Home AgentMaulik Desai, Thyaga Nandagopal. 1-10 [doi]
- On social behavior of wireless sensor nodeK. Padmanabh, S. Paul, A. Kumar. 1-8 [doi]
- Towards securing data delivery in peer-to-peer streamingJeffrey Seibert, Xin Sun, Cristina Nita-Rotaru, Sanjay G. Rao. 1-10 [doi]
- Adaptive Power Control with Overhearing Avoidance for wireless sensor networksMaharajan Ramakrishnan, P. Vanaja Ranjan. 1-8 [doi]
- On the effectiveness of IP reputation for spam filteringHolly Esquivel, Aditya Akella, Tatsuya Mori. 1-10 [doi]
- LTE WLAN interworking for Wi-Fi hotspotsG. I. Naik. 1-2 [doi]
- A scheduling and Call Admission Control algorithm for WiMax mesh network with strict QoS guaranteePulkit Goyal, Aniruddha Sahoo. 1-10 [doi]
- Effectiveness of copy-transmission in Go-Back-N ARQ system with selective repeat in intra-block and with limited retransmissionsShumji Fujii, Toyohisa Kaneko, Yukuo Hayashida. 1-6 [doi]
- Secure self organization of wireless sensor network: A new approachHemanta Kumar Kalita, Abhijit Kar. 1-2 [doi]
- Using bandwidth-road maps for improving vehicular internet accessJun Yao, Salil S. Kanhere, Mahbub Hassan. 1-2 [doi]
- Cross-layer techniques for failure restoration of IP multicast with applications to IPTVMurat Yuksel, K. K. Ramakrishnan, Robert D. Doverspike, Rakesh K. Sinha, Guangzhi Li, Kostas N. Oikonomou, Dongmei Wang. 1-10 [doi]
- Restricting internt access: Ideology and technologyS. Wong, E. Altman. 1-8 [doi]
- SpinThrift: Saving energy in viral workloadsNishanth Sastry, Anthony Hylick, Jon Crowcroft. 1-6 [doi]
- Network bandwidth configuration tool for Xen virtual machinesK. Mathew, P. Kulkarni, V. Apte. 1-2 [doi]
- An energy efficient and Fault-Tolerant Clock Synchronization Protocol for wireless sensor networksAmulya Ratna Swain, R. C. Hansdah. 1-10 [doi]