Abstract is missing.
- Solving the Multi-Operator Placement Problem in Large-Scale Operator NetworksStamatia Rizou, Frank Dürr, Kurt Rothermel. 1-6 [doi]
- An Adaptive Growing Hierarchical Self Organizing Map for Network Intrusion DetectionDennis Ippoliti, Xiaobo Zhou. 1-7 [doi]
- On Communication Determinism in Parallel HPC ApplicationsFranck Cappello, Amina Guermouche, Marc Snir. 1-8 [doi]
- Energy Per Useful Packet Optimization on a TDMA WSN ChannelFrancisco Ganhão, Miguel P. Pereira, Luis Bernardo, Rui Dinis, Rodolfo Oliveira, Paulo Pinto. 1-6 [doi]
- The Effect of Packet Reordering and Encrypted Traffic on Streaming Content Leakage DetectionAtsushi Asano, Hiroki Nishiyama, Nei Kato. 1-6 [doi]
- Hybrid Redundancy Schemes with Random Linear Coding for Peer-to-Peer Storage SystemsYaser Houri, Thomas Fuhrmann. 1-6 [doi]
- A Fully Decentralized File System Cache for the CernVM-FSJakob Blomer, Thomas Fuhrmann. 1-6 [doi]
- Exploiting Multichannel Diversity in Cognitive Radio NetworksTuan Do, Brian L. Mark. 1-6 [doi]
- Decentralized As-Soon-As-Possible Grid Scheduling: A Feasibility StudyXenofon Vasilakos, Jan Sacha, Guillaume Pierre. 1-6 [doi]
- Achieving Unified Protection for IP RoutingQi Li, Mingwei Xu, Jianping Wu, Xingang Shi, Dah-Ming Chiu, Patrick P. C. Lee. 1-6 [doi]
- Leveraging Organizational Etiquette to Improve Internet SecurityNiklas Carlsson, Martin F. Arlitt. 1-6 [doi]
- DPillar: Scalable Dual-Port Server Interconnection for Data Center NetworksYong Liao, Dong Yin, Lixin Gao. 1-6 [doi]
- Modeling Malware Diffusion in Wireless Networks with Nodes Heterogeneity and MobilityHoai-Nam Nguyen, Yoichi Shinoda. 1-8 [doi]
- Qualitative Evaluation of Cross-Layer Approaches in Wireless Sensor NetworksWaltenegus Dargie. 1-6 [doi]
- Optimal Multi-Tree Peer-to-Peer Video StreamingGaspare G. E. Bruno, Daniel R. Figueiredo. 1-6 [doi]
- Dynamic Provisioning of Optical Networks with Many-to-Many Traffic GroomingMohammad A. Saleh, Ahmed E. Kamal. 1-7 [doi]
- Making Attractive Channel Estimation Method Using Truncated SVD for MIMO-OFDM Systems Thanks to Large Complexity ReductionMoussa Diallo, Rodrigue Rabineau, Laurent Cariou, Maryline Hélard. 1-5 [doi]
- Sliding Mode Control with Fuzzy Reaching Law for Queue Management in the InternetHao Wang, Zuohua Tian, Qinlong Zhang. 1-5 [doi]
- On the Balance between Accuracy and Robustness for Online Estimation of Delay Tail ProbabilityGuoqiang Hu, Yuming Jiang. 1-5 [doi]
- AEROMAN: A Novel Architecture to Evaluate Routing Protocols for Multi-Hop Ad-Hoc NetworksLan Tien Nguyen, Razvan Beuran, Yoichi Shinoda. 1-7 [doi]
- Audio Steganography Using Bit Modification - A Tradeoff on Perceptibility and Data Robustness for Large Payload Audio EmbeddingKaliappan Gopalan, Qidong Shi. 1-6 [doi]
- Fast Privacy-Preserving Top-k Queries Using Secret SharingMartin Burkhart, Xenofontas A. Dimitropoulos. 1-7 [doi]
- Maximizing Workflow Throughput for Streaming Applications in Distributed EnvironmentsYi Gu, Qishi Wu. 1-6 [doi]
- Performance Trade-Offs in a Network Coding RouterOmer H. Abdelrahman, Erol Gelenbe. 1-6 [doi]
- Message Duplication Reduction in Dense Mobile Social NetworksKen-ichi Kawarabayashi, Fawad Nazir, Helmut Prendinger. 1-6 [doi]
- An Energy Efficient Flat Routing Protocol for Wireless Ad Hoc NetworksVahid Nazari Talooki, Hugo Marques, Jonathan Rodriguez, Hugo Água, Nelson Blanco, Luís Campos. 1-6 [doi]
- CARNIVORE: A Disruption-Tolerant System for Studying WildlifeMatthew Rutishauser, Vladislav Petkov, Jay Boice, Katia Obraczka, Patrick Mantey, Terrie M. Williams, Christopher C. Wilmers. 1-8 [doi]
- Implementation and Evaluation of Handoff Method between Access Nodes for P2PSIP and IMS Cooperating NetworksTsunehiko Chiba, Takayuki Warabino, Hidetoshi Yokota. 1-6 [doi]
- MPEG-2/H.264 Transcoding with Vector Conversion Reducing Re-Quantization NoiseTakeshi Yoshitome, Kazuto Kamikura, Shoji Makino, Nobuhiko Kitawaki. 1-6 [doi]
- Finding Maximum Reliable Path in Mesh Networks under Multiple FailuresShengli Yuan, Balaji Raghavachari, Ankitkumar Patel. 1-6 [doi]
- Toward Ensemble Characterization and Projection of Multistage Cyber AttacksHaitao Du, Daniel F. Liu, Jared Holsopple, Shanchieh Jay Yang. 1-8 [doi]
- Performance Comparison of Diversity Combining ARQ Error Control Schemes with Multi-Packet Detection SchemesMiguel P. Pereira, Luis Bernardo, Rui Dinis, Rodolfo Oliveira, Paulo Pinto. 1-7 [doi]
- A Retrospective Approach for Accurate Network Latency PredictionFan Ping, Christopher McConnell, Jeong-Hyon Hwang. 1-6 [doi]
- Quantifying Overprovisioning vs. Class-of-Service: Informing the Net Neutrality DebateMurat Yuksel, K. K. Ramakrishnan, Shivkumar Kalyanaraman, Joseph D. Houle, Rita Sadhvani. 1-8 [doi]
- Security and Privacy Objectives for Sensing Applications in Wireless Community NetworksDelphine Christin, Matthias Hollick, Mark Manulis. 1-6 [doi]
- Taking Too Many Destinations Can Be Bad for Traceroute SamplingZhongliang Qiao, Mingming Chen, Ke Xu. 1-6 [doi]
- Proxy-P2P Streaming under the Microscope: Fine-Grain Measurement of a Configurable PlatformWenjie Jiang, Mung Chiang, Jennifer Rexford, S.-H. Gary Chan, Kin Fung Simon Wong, Philip Chun Ho Yuen. 1-6 [doi]
- Maximal Lifetime Scheduling for Cooperative Communications in Wireless NetworksGang Liu, Liusheng Huang, Hongli Xu, Wang Liu, Yindong Zhang. 1-6 [doi]
- On the Integration of LTE and Mobile WiMAX NetworksTara Ali-Yahiya, Hakima Chaouchi. 1-5 [doi]
- Redundancy-Aware Routing with Limited ResourcesYang Song, Katherine Guo, Lixin Gao. 1-6 [doi]
- DynaStream: Adaptive Overlay Management for Peer-to-Peer Video StreamingMoonkyung Ryu, Umakishore Ramachandran. 1-6 [doi]
- A Dynamic Spectrum Assignment Method Based on Call Blocking Probability Prediction in WiFi/WiMAX Integrated NetworksKazuhiko Kinoshita, Yuichi Kanamori, Keita Kawano, Koso Murakami. 1-6 [doi]
- Adaptive Directional Window Selection for Edge-Directed InterpolationChi-Shing Wong, Wan-Chi Siu. 1-6 [doi]
- MR. BIN: Multicast Routing with Branch Information Nodes for Wireless Sensor NetworksSejun Song, Baek-Young Choi, Daehee Kim. 1-6 [doi]
- A Hybrid Adaptive Routing Protocol for Extreme Emergency Ad Hoc CommunicationTipu Arvind Ramrekha, Christos Politis. 1-6 [doi]
- Impact of Operating Systems on Wireless Sensor Networks (Security) Applications and TestbedsCintia B. Margi, Bruno Trevizan de Oliveira, Gustavo T. de Sousa, Marcos A. Simplício Jr., Paulo S. L. M. Barreto, Tereza Cristina M. B. Carvalho, Mats Näslund, Richard Gold. 1-6 [doi]
- A Novel Greedy Forward Algorithm for Routing Data toward a High Speed Sink in Wireless Sensor NetworksHoracio A. B. F. de Oliveira, Raimundo S. Barreto, Awdren L. Fontao, Antonio Alfredo Ferreira Loureiro, Eduardo Freire Nakamura. 1-7 [doi]
- Autonomic Provisioning in Non-Linear Network TrafficAndrzej Tucholski, Emil Kowalczyk, Arkadiusz Majka. 1-4 [doi]
- Adaptive Network Coding for Wireless Access NetworksTuan Tran, Thinh Nguyen. 1-6 [doi]
- On Overlay-Based Addressing and Routing in Heterogeneous Future NetworksOliver P. Waldhorst. 1-8 [doi]
- Interference and Outage in Doubly Poisson Cognitive NetworksChia-han Lee, Martin Haenggi. 1-6 [doi]
- Is Network Coding Helpful for BitTorrent: From a Practitioner s PerspectiveShuai Wang, Jin Zhao, Xin Wang. 1-6 [doi]
- Ns-2 Based Emulator for Multicast ServicesEugene Su, Ray-Guang Cheng, Jim Hsieh, Chang-Long Chu, Chih-Wei Su. 1-6 [doi]
- The Triangle Metric: Fast Link Quality Estimation for Mobile Wireless Sensor NetworksCarlo Alberto Boano, Marco Antonio Zúñiga Zamalloa, Thiemo Voigt, Andreas Willig, Kay Römer. 1-7 [doi]
- A New Human Identification Method for Intelligent Video Surveillance SystemHae-Min Moon, Sung Bum Pan. 1-6 [doi]
- Message-Passing for Wireless Scheduling: An Experimental StudyPaolo Giaccone, Devavrat Shah. 1-6 [doi]
- MOJO: A Middleware That Converts Sensor Nodes into Java ObjectsKumar Padmanabh, Lakshya Malhotra, Vanteddu Adi Mallikarjun Reddy, Amrit Kumar, Vuppala Sunil Kumar, Sanjoy Paul. 1-6 [doi]
- You re Not Who You Claim to Be: Website Identity Check for Phishing DetectionInsoon Jo, Eunjin Jung, Heon Young Yeom. 1-6 [doi]
- Network Integration in 3G and 4G Wireless NetworksMichael Lin, Heesook Choi, Travis Dawson, Tom La Porta. 1-8 [doi]
- The TASEP: A Statistical Mechanics Tool to Study the Performance of Wireless Line NetworksSunil Srinivasa, Martin Haenggi. 1-6 [doi]
- Modeling and Analysis of End-to-End Quality of Service Provisioning in Virtualization-Based Future InternetQiang Duan. 1-6 [doi]
- BGP-Based Locality Promotion for P2P ApplicationsPeter Racz, Simon Oechsner, Frank Lehrieder. 1-8 [doi]
- Mash up of Breaking News and Contextual Web Information: A Novel Service for Connected TelevisionTanushyam Chattopadhyay, Arpan Pal, Utpal Garain. 1-6 [doi]
- Automated Service Composition and Routing in Networks with Data-Path ServicesXin Huang, Shashank Shanbhag, Tilman Wolf. 1-8 [doi]
- A Diagnosis-Based Soft Vertical Handoff Mechanism for TCP Performance ImprovementTong Shu, Min Liu, Zhongcheng Li, Anfu Zhou. 1-6 [doi]
- Resource Allocation in Sensor Networks with Renewable EnergyZhoujia Mao, Can Emre Koksal, Ness B. Shroff. 1-6 [doi]
- Supply and Demand Coordination in Energy Adaptive ComputingKrishna Kant. 1-6 [doi]
- Extended Features for the Ginga-NCL Environment: Introducing the LuaTV APIRafael R. de Mello Brandão, Guido Lemos de Souza Filho, Carlos Eduardo Coelho Freire Batista, Luiz Fernando Gomes Soares. 1-6 [doi]
- Route Extrapolation for Source and Destination Camouflage in Wireless Ad Hoc NetworksM. Razvi Doomun, K. M. Sunjiv Soyjaudah. 1-7 [doi]
- On Enhancing Network-Lifetime Using Opportunistic Routing in Wireless Sensor NetworksMichael Chien-Chun Hung, Kate Ching-Ju Lin, Chih-Cheng Hsu, Cheng-Fu Chou, Chang-Jen Tu. 1-6 [doi]
- Survivable Traffic Grooming with Impairment ConstraintsAnkitkumar N. Patel, Jason P. Jue, Xi Wang, Qiong Zhang, Paparao Palacharla, Takao Naito. 1-6 [doi]
- Modeling the Extinction in the Information Diffusion Process in Wireless Sensor NetworksKenji Leibnitz, Marie-Ange Remiche. 1-5 [doi]
- Cooperative P2P Video Streaming for Mobile PeersMartin Stiemerling, Sebastian Kiesel. 1-7 [doi]
- Beyond Multi-Hop: Optimal Cooperation in Large Wireless NetworksAyfer Özgür Aydin, Olivier Lévêque, David Tse. 1-6 [doi]
- Secure Data Aggregation through Proactive DefenseShuo Chen, Guillaume Pierre, Chi-Hung Chi. 1-6 [doi]
- Evaluation of Labeled OBS with Home CircuitsMiguel A. González-Ortega, Andrés Suárez-González, José-Carlos López-Ardao, Cándido López-García, Guiling Wu, Chunming Qiao. 1-6 [doi]
- A Communication Framework for Improving End-to-End Seamless Connections and TCP Performance in Wireless Home NetworksSungwoo Tak, Taehoon Kim, E. K. Park. 1-6 [doi]
- On the Goodput of TCP NewReno in Mobile NetworksSushant Sharma, Donald W. Gillies, Wu-chun Feng. 1-8 [doi]
- Group Management in P2P NetworksBenedikt Elser, Georg Groh, Thomas Fuhrmann. 1-8 [doi]
- Self-Tuning Price-Based Congestion Control Supporting TCP NetworksHao Wang, Zuohua Tian, Qinlong Zhang. 1-6 [doi]
- Mantlet Trilogy: DDoS Defense Deployable with Innovative Anti-Spoofing, Attack Detection and MitigationPing Du, Akihiro Nakao. 1-7 [doi]
- Vehicular Networks EmulationAnthony Buisset, Bertrand Ducourthial, Farah El Ali, Sofiane Khalfallah. 1-7 [doi]
- An Analytical Approach for Performance Analysis of Handoffs in the Next Generation Integrated Cellular Networks and WLANsYonal Kirsal, Eser Gemikonakli, Enver Ever, Glenford E. Mapp, Orhan Gemikonakli. 1-6 [doi]
- Recommending and Finding Multimedia Resources in Knowledge Acquisition Based on Web ResourcesChristoph Rensing, Philipp Scholl, Doreen Böhnstedt, Ralf Steinmetz. 1-6 [doi]
- Recovery from Shared Risk Link Group Failures Using IP Fast RerouteKang Xi, H. Jonathan Chao, Chaoyi Guo. 1-7 [doi]
- Enhanced Efficiency of Mapping Distribution Protocols in Scalable Routing and Addressing ArchitecturesKotikalapudi Sriram, Patrick Gleichmann, Young-Tak Kim, Doug Montgomery. 1-7 [doi]
- Improving Prediction Accuracy of Matrix Factorization Based Network Coordinate SystemsYang Chen, Peng Sun, Xiaoming Fu, Tianyin Xu. 1-8 [doi]
- PiCAT: Palliating Channel Assignment Assaults Using Adjustable Trust in Wireless Mesh NetworksSadeq Ali Makram, Fahad Samad. 1-7 [doi]
- Algorithm to Realize Real-Time Dense Disparity Map of Stereo Vision with the Embedded Video System for Distance Sensing ApplicationsKunio Takaya. 1-4 [doi]
- The Minimum Server Bandwidth in Peer-Assisted VoD SystemsSong Lin, Jianping Wu, Ke Xu, Zhen Ma. 1-7 [doi]
- On Tree Construction of Super Peers for Hybrid P2P Live Media StreamingXukang Lu, Qishi Wu, Runzhi Li, Yunyue Lin. 1-6 [doi]
- A Feasibility Study of an Arbitrary Search in Structured Peer-to-Peer NetworksJani Hautakorpi, Göran Schultz. 1-8 [doi]
- The Seeder Promotion Problem: Measurements, Analysis and Solution SpaceSebastian Kaune, Gareth Tyson, Konstantin Pussep, Andreas U. Mauthe, Ralf Steinmetz. 1-8 [doi]
- Towards User-Oriented Live Video StreamingKai Song, Leana Golubchik. 1-6 [doi]
- A Low Delay Multiple Reader Passive RFID System Using Orthogonal TH-PPM IR-UWBZhi Zhang, Zhonghai Lu, Zhibo Pang, Xiaolang Yan, Qiang Chen, Li-Rong Zheng. 1-6 [doi]
- Designing Data Center Networks Using Analytic Hierarchy ProcessNoriaki Kamiyama. 1-6 [doi]
- Optimized Hybrid Overlay Design for Real Time BroadcastingSanghwan Lee, Sambit Sahu. 1-6 [doi]
- Practical Network Coding with Resilient Subspace CodesHannes Bartz, Tobias Lutz, Christoph Hausl, João Barros. 1-6 [doi]
- Converting the Nonlinear Least Squares Problem for Localization in Wireless Sensor NetworksAlexander Born, Frank Reichenbach. 1-6 [doi]
- Heuristic Resource Optimization for Dynamic Wavelength Services on Optically Reconfigurable NetworksXiaolan Joy Zhang, Steven S. Lumetta, Angela L. Chiu, Robert D. Doverspike. 1-8 [doi]
- ITGR: Intermediate Target Based Geographic RoutingJianjun Yang, Zongming Fei. 1-6 [doi]
- Route Positional Method for IPv6 Alias ResolutionShiyao Qian, Meng Xu, Zhongliang Qiao, Ke Xu. 1-6 [doi]
- Using Directional Antennas on Stub Wireless Mesh Networks: Impact on Throughput, Delay, and FairnessSaravanan Kandasamy, Rui Lopes Campos, Ricardo Morla, Manuel Ricardo. 1-6 [doi]
- A Taxonomy and Comparative Evaluation of Algorithms for Parallel Anomaly DetectionShashank Shanbhag, Yu Gu, Tilman Wolf. 1-8 [doi]
- HDAR: Hole Detection and Adaptive Geographic Routing for Ad Hoc NetworksJianjun Yang, Zongming Fei. 1-6 [doi]
- Hybrid Regular Expression Matching for Deep Packet Inspection on Multi-Core ArchitectureYan Sun, Haiqin Liu, Victor C. Valgenti, Min Sik Kim. 1-7 [doi]
- Network Bandwidth Optimization of Ethernet-Based Streaming Applications in Automotive Embedded SystemsAndreas Kern, Christoph Schmutzler, Thilo Streichert, Michael Hübner, Jürgen Teich. 1-6 [doi]
- Exploiting Gaps of Real-Time Traffic to Improve Handover Performance in Wireless NetworksJia Liu, Chuang Lin, Fengyuan Ren. 1-6 [doi]
- LEDBAT: The New BitTorrent Congestion Control ProtocolDario Rossi, Claudio Testa, Silvio Valenti, Luca Muscariello. 1-6 [doi]
- Challenges for High-Performance Networking for Exascale ComputingRon Brightwell, Brian W. Barrett, Karl S. Hemmert, Keith D. Underwood. 1-6 [doi]
- Understanding Individual Nodes in Peer-to-Peer SystemsGyuwon Song, Suhyun Kim, Sunghwan Jang, Daeil Seo. 1-6 [doi]
- A Motion Estimation IP with Low Memory Access for H.264/AVC Encoder Based on Fully Parallel Hardware-Oriented AlgorithmShi Hye Kim, Nam Thang Ta, Jeong-Hoon Kim, Jun Rim Choi. 1-4 [doi]
- An In-Depth Cross-Layer Experimental Study of Transport Protocols over CircuitsMark E. McGinley, Helali Bhuiyan, Tao Li, Malathi Veeraraghavan. 1-6 [doi]
- Enhancements to Statistical Protocol IDentification (SPID) for Self-Organised QoS in LANsChristopher Köhnen, Christian Überall, Florian Adamsky, Veselin Rakocevic, Muttukrishnan Rajarajan, Rudolf Jäger. 1-6 [doi]
- Emerging Platform for Healthcare IT ServicesWei Liu, E. K. Park. 1-6 [doi]
- A Rate and Resource Detection Based Receive Buffer Adaptation Approach for High-Speed Data TransportationHao Liu, Yaoxue Zhang, Yuezhi Zhou, Ruini Xue. 1-6 [doi]
- Link State Protocol Data Mining for Shared Risk Link Group DetectionGoutam Das, Dimitri Papadimitriou, Wouter Tavernier, Didier Colle, Tom Dhaene, Mario Pickavet, Piet Demeester. 1-8 [doi]
- Analysis of Energy Consumption on Data Sharing in Beamforming for Wireless Sensor NetworksJing Feng, Yamini Nimmagadda, Yung-Hsiang Lu, Byunghoo Jung, Dimitrios Peroulis, Y. Charlie Hu. 1-6 [doi]
- Error-Resilient Video Transmission for Short-Range Point-to-Point Wireless CommunicationYang Peng, Fan Zhang, Eckehard G. Steinbach. 1-6 [doi]
- When Do Cooperative Networks Profit from CSI Feedback? - An Outage Capacity PerspectiveStefan Valentin. 1-7 [doi]
- Energy-Efficient and Topology-Aware Routing for Underwater Sensor NetworksXiaobing Wu, Guihai Chen, Jinming Chen. 1-6 [doi]
- An Improved Conflict Detection System with Periodic Cycle Treatment for Time-Based Firewall PoliciesSubana Thanasegaran, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi. 1-8 [doi]
- PiSA-SA: Municipal Wi-Fi Based on Wi-Fi SharingTobias Heer, Thomas Jansen, René Hummen, Stefan Götz, Hanno Wirtz, Elias Weingärtner, Klaus Wehrle. 1-8 [doi]
- A Cross-Layer Routing Scheme for Scalable Triple Play Service in Wireless Mesh NetworksVinicius C. M. Borges, Marilia Curado, Edmundo Monteiro. 1-6 [doi]
- Channel Reservation in Cellular Wireless Networks with Spectrum LeasingShow-Shiow Tzeng, Yu-Ching Hsu. 1-7 [doi]