Abstract is missing.
- Security Risk Management in Computing Systems with Constraints on Service DisruptionPraveen Bommannavar, Nicholas Bambos. 1-6 [doi]
- On Capacity Scaling Law of Cognitive Radio Ad Hoc NetworksYi Shi, Canming Jiang, Y. Thomas Hou, Sastry Kompella. 1-8 [doi]
- Self-Adaptive Routing for Temporary Information Sharing in Wireless Mesh NetworksKei Ohnishi, Takeshi Koga, Kazuya Tsukamoto, Yuji Oie. 1-6 [doi]
- A Study of the Impact of Network Traffic Pacing from Network and End-User PerspectivesYan Cai, Y. Sinan Hanay, Tilman Wolf. 1-6 [doi]
- Minimizing Broadcast Delay in Location-Based Channel Access ProtocolsShan-Hung Wu, Chung-Min Chen. 1-6 [doi]
- Rule-Based Verification of Network Protocol Implementations Using Symbolic ExecutionJaeSeung Song, Tiejun Ma, Cristian Cadar, Peter Pietzuch. 1-8 [doi]
- Blind Identification of Convolutional Encoder Parameters over GF(2m) in the Noiseless CaseYasamine Zrelli, Mélanie Marazin, Roland Gautier, Eric Rannou. 1-5 [doi]
- An Algebraic Approach to Computing the Reliability of Internet RoutingQi Li, Mingwei Xu, Jianping Wu, Patrick P. C. Lee, Ke Xu. 1-6 [doi]
- Advances on Time-Division Unbalanced Carrier Sense Multiple AccessAndrea Vesco, Riccardo Scopigno. 1-6 [doi]
- Dynamic Service-Aware Reservation Framework for Multi-Layer High-Speed NetworksJoan Triay, Derek R. Rousseau, Cristina Cervello-Pastor, Vinod Vokkarane. 1-7 [doi]
- On the Evolution of Interference in Time for Cellular Mobile Radio NetworksAli Riza Ekti, Serhan Yarkan, Khalid A. Qaraqe, Erchin Serpedin. 1-6 [doi]
- Secure Authentication Protocol for RFID SystemsGul N. Khan, Markus B. Moessner. 1-7 [doi]
- Using DE-Optimized LFS Processing to Enhance 4G Communication SecurityPaul K. Harmer, McKay D. Williams, Michael A. Temple. 1-8 [doi]
- Design and Analysis of a Mobile File Sharing System for Opportunistic NetworksShanshan Lu, Gautam Chavan, Yanliang Liu, Yonghe Liu. 1-6 [doi]
- Empirical Evaluation of the Efficiency of Spatial Subdivision Schemes and Load Balancing Strategies for Networked GamesPeter Quax, Jimmy Cleuren, Wouter Vanmontfort, Wim Lamotte. 1-6 [doi]
- TaCo: Semantic Equivalence of IP Prefix TablesAhsan Tariq, Sana Jawad, Zartash Afzal Uzmi. 1-6 [doi]
- Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh NetworksYongkun Li, John C. S. Lui. 1-6 [doi]
- Efficient Channel Estimation for OFDM and SC-FDE SchemesFábio Coelho, Rui Dinis, Paulo Montezuma. 1-7 [doi]
- Evaluating the Impact of Transmission Power on QoS in Wireless Mesh NetworksAndreas Noack, Patrick-Benjamin Bök, Sebastian Krück. 1-6 [doi]
- AWG-Based Shuffle-Exchange Optical-Interconnection ArchitecturesGuido Maier, Paolo Valzasina, Achille Pattavina. 1-6 [doi]
- An Assessment of Technologies for In-Home EntertainmentS. Srinivasan. 1-6 [doi]
- Optimization and Performance Analysis of the AEDB Broadcasting AlgorithmPatricia Ruiz, Bernabé Dorronsoro, Pascal Bouvry. 1-6 [doi]
- Temperature-Aware Scheduling for Embedded Heterogeneous MPSoCs with Special Purpose IP CoresShervin Sharifi, Yen-Kuan Wu, Tajana Simunic Rosing. 1-6 [doi]
- On the Performance of Multi-Channel Wireless Sensor Networks in Smart Grid EnvironmentsBilal Erman Bilgin, Vehbi Cagri Gungor. 1-6 [doi]
- An Efficient Scheduler for Real and Non-Real Time Services Maximizing Satisfied Users in Wireless NetworksCarlos Eduardo Uc-Rios, Domingo Lara-Rodríguez. 1-5 [doi]
- XTEA Based Secure Authentication Protocol for RFID SystemsGul N. Khan, Jack Yu, Fei Yuan. 1-6 [doi]
- Modeling Stochastic Correlated Failures and their Effects on Network ReliabilityMahshid Rahnamay-Naeini, Jorge E. Pezoa, Ghady Azar, Nasir Ghani, Majeed M. Hayat. 1-6 [doi]
- Accurate Extraction of Face-to-Face Proximity Using Smartphones and BluetoothShu Liu, Aaron Striegel. 1-5 [doi]
- Mobi-Sync: Configurable Time Synchronization for Mobile Multihop NetworksJun Yi, Christian Poellabauer, Liqiang Zhang. 1-6 [doi]
- Noncooperative Distributed Wireless Relay Networks under Channel Uncertainty and Power ConstraintKanghee Lee, Hyuck M. Kwon, Zuojun Wang. 1-5 [doi]
- How Can Multipath Dissemination Help to Detect Prefix Hijacking?Feng Wang, Bin Dai, Jinshu Su. 1-8 [doi]
- SIPp-DD: SIP DDoS Flood-Attack Simulation ToolJan Stanek, Lukas Kencl. 1-7 [doi]
- On Kleinrock's Power Metric for Queueing SystemsGerardo Rubino. 1-6 [doi]
- NFA-Based Pattern Matching for Deep Packet InspectionYan Sun, Victor C. Valgenti, Min Sik Kim. 1-6 [doi]
- Data Loss Modeling and Analysis in Partially-Covered Delay-Tolerant NetworksKyle Bradford, Max Brugger, Samina Ehsan, Bechir Hamdaoui, Yevgeniy Kovchegov. 1-7 [doi]
- Providing Support for Legacy IPv4 Applications in IPv6 Network with Network Aware MobilityMarkus Luoto, Teemu Rautio, Jukka Mäkelä. 1-6 [doi]
- P2P Distributed Data ReplenishmentKien Nguyen, Thinh P. Nguyen, Viet Le, Yevgeniy Kovchegov. 1-6 [doi]
- Local Dimming of Liquid Crystal Display Using Visual Attention Prediction ModelChia-Hang Lee, Wen-Hsiang Shaw, Hsin-I. Liao, Su-Ling Yeh, Homer H. Chen. 1-6 [doi]
- Knowledge-Based Policy Conflict Analysis in Mobile Social NetworksZhengping Wu, Yuanyao Liu. 1-6 [doi]
- ZigZag: A Content-Based Publish/Subscribe Architecture for Human NetworksYaxiong Zhao, Jie Wu 0001. 1-6 [doi]
- Towards a Basic DHT Service: Analyzing Network Characteristics of a Widely Deployed DHTKonrad Jünemann, Philipp Andelfinger, Hannes Hartenstein. 1-7 [doi]
- Using Dijkstra to Compute Hop-by-Hop QoS PathsBradley R. Smith. 1-6 [doi]
- Optimal Energy-Aware Distributed Estimation in Wireless Sensor NetworksXusheng Sun, Edward J. Coyle. 1-6 [doi]
- Identifying Smartphone Malware Using Data Mining TechnologyHsiu-Sen Chiang, Woei-Jiunn Tsaur. 1-6 [doi]
- NETbalance: Reducing the Runtime of Network Emulation Using Live MigrationAndreas Grau, Klaus Herrmann, Kurt Rothermel. 1-6 [doi]
- SAVT: A Practical Scheme for Source Address Validation and Traceback in Campus NetworkGuangwu Hu, Jianping Wu, Ke Xu, Wenlong Chen. 1-8 [doi]
- Aggregation-Friendly Data Collection Protocol of Wireless Sensor Networks for PoI MonitoringXiaobing Wu, Shen Li, Guihai Chen. 1-6 [doi]
- Improving Network Services Configuration ManagementKhalid Elbadawi, James Yu. 1-6 [doi]
- Power-Efficient Lightpath-Based Grooming Strategies in WDM Mesh NetworksFarid Farahmand, Mohammad Masud Hasan, Isabella Cerutti, Jason P. Jue, Joel J. P. C. Rodrigues. 1-6 [doi]
- Local Channel Assignments in Cognitive Radio NetworksJie Wu 0001, Ying Dai, Yanchao Zhao. 1-6 [doi]
- Exploiting Mobility for Trust Propagation in Mobile Ad Hoc NetworksNingning Cheng, Kannan Govindan, Prasant Mohapatra. 1-6 [doi]
- BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent ClientsMartin Szydlowski, Ben Y. Zhao, Engin Kirda, Christopher Kruegel. 1-6 [doi]
- Exploring the Benefits of Symbiotic RoutingBora Karaoglu, Ilker Demirkol, Wendi B. Heinzelman. 1-6 [doi]
- FailDetect: Gossip-Based Failure Estimator for Large-Scale Dynamic NetworksAndrei Pruteanu, Venkat Iyer, Stefan Dulman. 1-6 [doi]
- Extraction of Hidden Common Interests between People Using New Social-Graph RepresentationKazufumi Yogo, Akihiro Kida, Ryoichi Shinkuma, Tatsuro Takahashi, Hiroyuki Kasai, Kazuhiro Yamaguchi. 1-6 [doi]
- Determination of Communication Range for Range-Free Multi-Hop Localization in Wireless Sensor NetworksSangho Lee, Kiseon Kim. 1-4 [doi]
- Quantifying and Improving DNSSEC AvailabilityCasey T. Deccio, Jeff Sedayao, Krishna Kant, Prasant Mohapatra. 1-7 [doi]
- Restoring End-to-End Resilience in the Presence of MiddleboxesEric J. Brown, Mark K. Gardner, Umar Kalim, Wu-chun Feng. 1-7 [doi]
- On the Network Coding Delay in Multi-Hop Wireless Networks with Multiple Coding PointsYoung-Sil Kim, Kyungran Kang, Young-Jong Cho. 1-5 [doi]
- Friends or Foes: Detecting Dishonest Recommenders in Online Social NetworksYongkun Li, John C. S. Lui. 1-6 [doi]
- Enhancing Enterprise Virtual Worlds with Real-World Event InformationSurjeet Mishra, Atul Agarwal, Vinay Khemka, Geetika Sharma. 1-4 [doi]
- A Delay-Optimal Spectrum Access Policy for Cognitive Coexistence SystemsXiaohui Li, YongQiang Hei, Guanghui Yu. 1-4 [doi]
- Separation-Based Joint Decoding in Compressive SensingHsieh-Chung Chen, H. T. Kung. 1-6 [doi]
- Flexible Unequal Error Protection Scheme for Uncompressed Video Transmission over 60GHz Multi-Gigabit Wireless SystemSeung-Eun Hong, Woo-Yong Lee. 1-6 [doi]
- STBC-MIMO Network Coding with Dual Polarization AntennasShinji Ogawa, Fumie Ono. 1-6 [doi]
- Profile-Based Adaptive DiffServ Policing with Learning TechniquesLaercio Cruvinel, Teresa Vazão. 1-7 [doi]
- Ring Optimal Assignment of Slot Reservations for Cyclic TDMA ProtocolsMarc Mosko, Ignacio Solis, J. J. Garcia-Luna-Aceves. 1-8 [doi]
- A Picture is Worth a Thousand Words: Improving Usability and Robustness of Online Recommendation SystemsTiffany Hyun-Jin Kim, Virgil D. Gligor, Adrian Perrig. 1-6 [doi]
- Context-Aware Mechanism for IEEE 802.21 Media Independent HandoverMiao Xiong, Jiannong Cao, Jun Zhang. 1-6 [doi]
- Cross-Layer Assisted Network Interface Selection for Multi-Interface Video StreamingTiia Sutinen, Helena Rivas. 1-6 [doi]
- Community-Centric Approaches for Confidentiality Management in Online SystemsAmin Ranjbar, Muthucumaru Maheswaran. 1-6 [doi]
- Security Verification of Trust-Based Authentication Handover in IP NetworksSaleh Al-shadly, Omar Alfandi, Henrik Brosenne, Dieter Hogrefe. 1-6 [doi]
- HTTPI: An HTTP with IntegrityTaehwan Choi, Mohamed G. Gouda. 1-6 [doi]
- A Collaborative Cloud-Based Multimedia Sharing Platform for Social Networking EnvironmentsCristian Gadea, Bogdan Solomon, Bogdan Ionescu, Dan Ionescu. 1-6 [doi]
- Contact Information Management System Architecture for Social MediaChi-Lun Liu. 1-5 [doi]
- Relay-Aided Broadcasting with Instantaneously Decodable Binary Network CodesLu Lu, Ming Xiao, Lars K. Rasmussen. 1-5 [doi]
- Improving Sustainability of Private P2P CommunitiesXiaowei Chen, Xiaowen Chu, Zongpeng Li. 1-6 [doi]
- Understanding the Impact of Neighborhood Information on End-to-End Fairness in Multi-Hop Wireless NetworksJia Bai, Yuan Xue. 1-8 [doi]
- An FPGA-Based Distributed Computing System with Power and Thermal Management CapabilitiesHao Shen, Qinru Qiu. 1-6 [doi]
- Context-Aware QoS Control for Wireless Mesh Networks of UAVsPatrick-Benjamin Bök, York Tüchelmann. 1-6 [doi]
- Where Do You "Tube"? Uncovering YouTube Server Selection StrategyVijay Kumar Adhikari, Sourabh Jain, Zhi-Li Zhang. 1-6 [doi]
- Biometrics-Based Authentication: A New ApproachYan Sui, Xukai Zou, Eliza Yingzi Du. 1-6 [doi]
- Fast, Scalable, Model-Free Trajectory Optimization for Wireless Data FerriesBenjamin Pearre, Timothy X. Brown. 1-8 [doi]
- Eye Detection and Eye Blink Detection Using AdaBoost Learning and GroupingInho Choi, Seungchul Han, Daijin Kim. 1-4 [doi]
- Improving the Spectral Efficiency of Amplify-and-Forward Cooperative Relay Network with Adaptive M-QAM ModulationBhuvan Modi, Annamalai Annamalai. 1-6 [doi]
- A New Approach to Weighted Multi-Secret SharingXukai Zou, Fabio Maino, Elisa Bertino, Yan Sui, Kai Wang, Feng Li. 1-6 [doi]
- Measurement-Based Short-Term Performance Prediction in Wireless Mesh NetworksHua Yu, Kai Zeng, Prasant Mohapatra. 1-6 [doi]
- Performance of Hybrid ARQ for Network Diversity Multiple Access SchemesFrancisco Ganhão, Miguel P. Pereira, Luis Bernardo, Rui Dinis, Rodolfo Oliveira, Paulo Pinto. 1-6 [doi]
- Battery-Aware Multimedia Coding Optimization by Dynamic Frequency ScalingJianxin Sun, Xueyi Wang, Song Ci. 1-6 [doi]
- Achieving High Throughput Ground-to-UAV Transport via Parallel LinksChit-Kwan Lin, H. T. Kung, Tsung-Han Lin, Stephen J. Tarsa, Dario Vlah. 1-7 [doi]
- Mesh-Pull-Based P2P Video Streaming System Using Fountain CodesHyung Rai Oh, Hwangjun Song. 1-6 [doi]
- Wireless Adapter Sleep Scheduling Based on Video QoE: How to Improve Battery Life When Watching Streaming Video?Márton Csernai, András Gulyás. 1-6 [doi]
- Inbound Mobility Management on LTE-Advanced Femtocell Topology Using X2 InterfaceSangchul Oh, Hongsoog Kim, Byunghan Ryu, Namhoon Park. 1-5 [doi]
- Network Assisted Media Streaming in Multi-Hop Wireless NetworksYingnan Zhu, Hang Liu, Yang Guo, Wenjun Zeng. 1-7 [doi]
- Low-Coupling Cluster-Based Multipath Routing for Wireless Mesh NetworksCristina Fonseca, José Mocito, Luís Rodrigues. 1-6 [doi]
- Congestion Control in Networks with Mixed IP and P2P TrafficZhiqiang Shi, Dan Ionescu, Dongli Zhang. 1-6 [doi]
- TPP: The Two-Way Password ProtocolTaehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda. 1-6 [doi]
- Energy-Aware Cooperative Spectrum Sensing with Inter-Channel Interference Cancellation for Cognitive Radio NetworksBingxuan Zhao, Shigeru Shimamoto. 1-6 [doi]
- Detecting Practical Speech Emotion in a Cognitive TaskCairong Zou, Chengwei Huang, Dong Han, Li Zhao. 1-5 [doi]
- Making P2P Downloading Dependable by Exploiting Social NetworksYingwu Zhu. 1-6 [doi]
- A Multimodal Interaction Method that Combines Gestures and Physical Game ControllersDan Ionescu, Bogdan Ionescu, Cristian Gadea, Shahidul Islam. 1-6 [doi]
- Optimal Client-Server Assignment for Internet Distributed SystemsHiroshi Nishida, Thinh P. Nguyen. 1-6 [doi]
- The Complexity of Minimizing Receiver-Based and SINR Edge InterferenceTrac N. Nguyen, Min Kyung An, Nhat X. Lam, Dung T. Huynh. 1-7 [doi]
- Harmony: Integrated Resource and Reputation Management for Large-Scale Distributed SystemsHaiying Shen, Guoxin Liu. 1-6 [doi]
- Modified Decision Feedback Channel Estimation Method for Mobile OFDM SystemsDah-Chung Chang, Shih-Kang Wang. 1-6 [doi]
- Power Control for AP-Based Wireless Networks under the SINR Interference Model: Complexity and Efficient Algorithm DevelopmentShuang Li, Eylem Ekici, Ness B. Shroff. 1-6 [doi]
- Approximating the Number of Active Nodes Behind a NAT DeviceAli Tekeoglu, Nihat Altiparmak, Ali Saman Tosun. 1-7 [doi]
- Analyzing Flow Isolation in Shared Resource SystemsJack Brassil. 1-7 [doi]
- MDTN: Mobile Delay/Disruption Tolerant NetworkClaudio E. Palazzi, Armir Bujari, Stefano Bonetta, Gustavo Marfia, Marco Roccetti, Alessandro Amoroso. 1-6 [doi]
- Cooperative Approaches Indicating to Capacity and Power Control for Ad Hoc Wireless NetworkLiuju Wu, Maciej J. Zawodniok. 1-6 [doi]
- Distributed and Adaptive Interface Switch Off for Internet Energy SavingAngelo Coiro, Flavio Iervini, Marco Listanti. 1-8 [doi]
- CID3: System Support for Loosely-Coupled Personal Computing EnvironmentsMohammad Al-Mutawa, Shivakant Mishra. 1-6 [doi]
- Location and Allocation of Switching Equipment (Splitters/AWGs) in a WDM PON NetworkBrigitte Jaumard, Rejaul Chowdhury. 1-8 [doi]
- Authenticated Setup of Virtual Links with Quality-of-Service GuaranteesRoland Bless, Martin Röhricht, Christoph Werle. 1-8 [doi]
- A QoS Enhanced Routing Protocol in Wireless Sensor NetworksJing Feng, Xiaoxing Yu, Zijun Liu, Cuihan Wang. 1-6 [doi]
- e-Health Service Characteristics and QoS GuaranteeWei Liu, E. K. Park. 1-5 [doi]
- DYNABYTE: A Dynamic Sampling Algorithm for Redundant Content DetectionEmir Halepovic, Carey Williamson, Majid Ghaderi. 1-8 [doi]
- Multi-Swarm Collaboration for Improving Content Availability in Swarming SystemsHyunYong Lee, Masahiro Yoshida, Akihiro Nakao. 1-6 [doi]
- A Simulative Evaluation of V2V Algorithms for Road Safety and In-Car EntertainmentAlessandro Amoroso, Gustavo Marfia, Marco Roccetti, Claudio E. Palazzi. 1-6 [doi]
- Robust Wireless Sensor Network Featuring Automatic Function AlternationToshiaki Miyazaki, Daiki Shitara, Ryouhei Kawano, Yuji Endo, Yuuki Tanno, Hidenori Igari. 1-6 [doi]
- Characterizing Transition Behaviors in Internet Attack SequencesHaitao Du, Shanchieh Jay Yang. 1-6 [doi]
- Multiple Access Performance for Repeated-Permutation MPPM with Interference AvoidanceTatsuya Muramatsu, Toshiki Kato, Fumie Ono, Hiromasa Habuchi. 1-6 [doi]
- Adaptive Load Balancing for Parallel IDS on Multi-Core Systems Using Prioritized FlowsTobias Limmer, Falko Dressler. 1-8 [doi]
- Ensemble of Bayesian Predictors for Autonomic Failure Management in Cloud ComputingQiang Guan, Ziming Zhang, Song Fu. 1-6 [doi]
- Personalisation in a System Combining Pervasiveness and Social NetworkingSarah Gallacher, Elizabeth Papadopoulou, Nick K. Taylor, Fraser R. Blackmun, M. Howard Williams, Ioanna Roussaki, Nikos Kalatzis, Nicolas Liampotis, Daqing Zhang. 1-6 [doi]
- Impact of Slow Start on SCTP Handover PerformanceJohan Eklund, Karl-Johan Grinnemo, Anna Brunstrom, Georgios Cheimonidis, Yuri Ismailov. 1-7 [doi]
- A Context-Aware Approach for Enhanced Security and Privacy in RFID Electronic Toll Collection SystemsDi Ma, Anudath K. Prasad. 1-6 [doi]
- Reactive Virtual Position-Based Routing in Wireless Sensor NetworksAbdalkarim Awad, Andreas Mitschele-Thiel, Falko Dressler. 1-6 [doi]
- A Semi-Distributed Fast Channel Change Framework for IPTV NetworksAytac Azgin, Yucel Altunbasak. 1-8 [doi]
- Consistent Random Backoff to Reduce Channel Access Delay Jitter in IEEE 802.11 WLANsSangheon Pack, Kihun Kim, Wonjung Kim, Taewon Song. 1-5 [doi]
- Social Forwarding in Large Scale Networks: Insights Based on Real Trace AnalysisAbderrahmen Mtibaa, Khaled A. Harras. 1-8 [doi]
- Timing Offsets-Resilient OFDMA for Asynchronous Wireless Ad Hoc NetworksBong Seok Kim, Kwonhue Choi. 1-5 [doi]
- OpenFlow for Wireless Mesh NetworksPeter Dely, Andreas Kassler, Nico Bayer. 1-6 [doi]
- Markov Modeling of Fault-Tolerant Wireless Sensor NetworksArslan Munir, Ann Gordon-Ross. 1-6 [doi]
- Adaptive Sensing Scheduling and Spectrum Selection in Cognitive Wireless Mesh NetworksMarco Di Felice, Kaushik R. Chowdhury, Andreas J. Kassler, Luciano Bononi. 1-6 [doi]
- A White-Box Empirical Study of P2P-VoD Systems: Several Unconventional New FindingsTieying Zhang, Zhenhua Li, Huawei Shen, Yan Huang, Xueqi Cheng. 1-6 [doi]
- An Energy Efficient Link Layer Protocol for Power-Constrained Wireless NetworksSohraab Soltani, Muhammad Usman Ilyas, Hayder Radha. 1-6 [doi]
- On QoS Provisioning in Context-Aware Wireless Sensor Networks for HealthcareMarion Souil, Abdelmadjid Bouabdallah. 1-6 [doi]
- Analysis of Cognitive Radio Networks with Channel Aggregation and Imperfect SensingTelex Magloire Nkouatchah Ngatched, Attahiru Sule Alfa, Jun Cai. 1-6 [doi]
- Optimal Backbone Generation for Robotic Relay NetworksYing Zhang, Mark Quilling. 1-6 [doi]
- Joint Routing and Stream Control Scheduling in MIMO-Based WMNsMatadeen Bansal, Aditya Trivedi. 1-6 [doi]
- Attacks on Network InfrastructureDanai Chasaki, Qiang Wu, Tilman Wolf. 1-8 [doi]
- Digital Filter Design for Jamming Mitigation in 802.15.4 CommunicationBruce DeBruhl, Patrick Tague. 1-6 [doi]
- Energy Efficiency and Goodput Analysis in Two-Way Wireless Relay NetworksQing Chen, Mustafa Cenk Gursoy. 1-6 [doi]
- Transmission Queuing Schemes for Improving Downlink Throughput on IEEE 802.11 WLANsTakefumi Hiraguri, Toshiyuki Ogawa, Takahiro Ueno, Kentaro Nishimori, Kenya Jin'no. 1-5 [doi]
- Optimal Caching Router Placement for Reduction in Retransmission DelayMichael P. McGarry, Rosish Shakya, Mesrob I. Ohannessian, Rony Ferzli. 1-8 [doi]
- End-to-End Performance of Heterogeneous Multi-EPON/OBS NetworksMaurizio Casoni, Walter Cerroni. 1-6 [doi]
- A Framed Packet Switch Without Control LoopLe Yu, Ge Nong, Mounir Hamdi. 1-5 [doi]
- Performance Management in Mixed Wireless Networks Using Multi Distortion MeasuresYacob Astatke, Yonas Woldearegay, Richard Dean, Abdoulaye Traore. 1-6 [doi]
- Modulation Classification for M-ary CPM Signals: Based on PAM Decomposition and Phase Detection MethodsChih-Ping Tsu, Dah-Chung Chang. 1-5 [doi]
- Seamless Macro-Cell Anchored Radio Transmission for Enhanced Downlink Performance in Heterogeneous NetworksKrishna Balachandran, Joseph H. Kang, Mehmet Kemal Karakayali, Kiran M. Rege. 1-5 [doi]
- Service Oriented Resource Orchestration in Future Optical NetworksChinwe E. Abosi, Reza Nejabati, Dimitra Simeonidou. 1-6 [doi]
- Towards Optimal Monitoring in Cooperative IDS for Resource Constrained Wireless NetworksAmin Hassanzadeh, Radu Stoleru. 1-8 [doi]
- Using Reconfigurable Devices to Maximize Spectral Efficiency in Future Heterogeneous Wireless SystemsJim Martin, Rahul Amin, Ahmed M. Eltawil, Amr M. A. Hussien. 1-8 [doi]
- Utility-Based Subchannel Allocation for OFDMA Femtocell NetworksByung-Gook Kim, Jeong-Ahn Kwon, Jang-Won Lee. 1-6 [doi]
- Providing NPR-Style Time-Shifted Streaming in P2P SystemsZhipeng Ouyang, Lisong Xu, Byrav Ramamurthy. 1-6 [doi]
- Inter-Cell Interference Coordination for Expanded Region Picocells in Heterogeneous NetworksDavid López-Pérez, Xiaoli Chu. 1-6 [doi]
- Delay Constrained Throughput Analysis of a Correlated MIMO Wireless ChannelKashif Mahmood, Mikko Vehkaperä, Yuming Jiang. 1-7 [doi]
- Stability and Scalability Properties for Dynamic Content Updates Over Delay Tolerant NetworksYong Li 0008, Depeng Jin, Li Su, Lieguang Zeng. 1-6 [doi]
- A Groupwise Universal Improvement Scheme for Location Estimation in Wireless NetworksOleksandr Artemenko, Gunar Schorcht, Sebastian Mann, Dominik Schulz, Mikhail Tarasov. 1-5 [doi]
- Traditional and Reacquisition-Induced Outage Prediction for DSSS and OFDMA Systems on Multipath Fading ChannelsScott Shepard, Douglas Schmidt. 1-6 [doi]
- Opportunistic Fair Parallel Download ProtocolJu-Won Park, Chan Kyou Hwang, Jae-Hyoung Yoo, Roger Karrer. 1-7 [doi]
- On Link Layer Prioritization for Wireless CommunicationSohraab Soltani, Kiran Misra, Hayder Radha. 1-6 [doi]
- ASER Analysis of Cooperative Non-Regenerative Relay Systems over Generalized Fading ChannelsOluwatobi Olabiyi, Annamalai Annamalai. 1-6 [doi]
- Game Theoretic Power Control under Rician Slow-Flat Fading Channels in Cognitive Radios NetworksMahmoud Ayesh Alayesh, Nasir Ghani. 1-6 [doi]
- Detecting Opportunistic Cheaters in Volunteer ComputingMatthäus Wander, Torben Weis, Arno Wacker. 1-6 [doi]
- MCS Selection for Throughput Improvement in Downlink LTE SystemsJiancun Fan, Qinye Yin, Geoffrey Ye Li, Bingguang Peng, Xiaolong Zhu. 1-5 [doi]
- LARX: Large-Scale Anti-Phishing by Retrospective Data-Exploring Based on a Cloud Computing PlatformTianyang Li, Fuye Han, Shuai Ding, Zhen Chen. 1-5 [doi]
- Cost and Reliability Considerations in Designing the Next-Generation IP over WDM Backbone NetworksByrav Ramamurthy, K. K. Ramakrishnan, Rakesh K. Sinha. 1-6 [doi]
- Toward Future Network Systems Boosting Interactions between People in Social NetworksRyoichi Shinkuma, Yoshinori Takata, Naoki Yoshinaga 0002, Satoko Itaya, Shinichi Doi, Tatsuro Takahashi, Keiji Yamada. 1-6 [doi]
- Theoretical Capacity Analysis for Multi-Hop Backscatter Communication NetworksAditya V. Padaki, Maciej J. Zawodniok. 1-6 [doi]
- A Hybrid Adaptive Traffic Control Strategy in Wireless Mesh NetworksPei-Jung Lin, Chyi-Ren Dow, Lu-Hui Huang, Shiow-Fen Hwang. 1-5 [doi]
- STEP: Source Traceability Elimination for Privacy against Global Attackers in Sensor NetworksSejun Song, Hyungbae Park, Baek-Young Choi. 1-6 [doi]
- Enhancement of LCD Images Illuminated with Dim BacklightTai-Hsiang Huang, Su-Ling Yeh, Homer H. Chen. 1-5 [doi]
- SOS: A Safe, Ordered, and Speedy Emergency Navigation Algorithm in Wireless Sensor NetworksAndong Zhan, Fan Wu, Guihai Chen. 1-6 [doi]
- Mesh Router Placement Exploiting Obstacles for Mitigating InterferenceSanghwan Lee, YoungJun Lee, Min Sun Jeong, Sambit Sahu. 1-6 [doi]
- Challenges for Selecting Optimal Coordinators in Peer-to-Peer-Based Massively Multi-User Virtual EnvironmentsRichard Süselbeck, Florian Heger, Gregor Schiele, Christian Becker. 1-6 [doi]
- Interleaving Wavelet Coefficients for Adaptive Data Transmission from Pervasive Sensing SystemsAnand Panangadan, Ashit Talukder. 1-6 [doi]
- Video Games at the Library: A Historical PerspectiveGustavo Marfia, Alessandro Amoroso, Marco Roccetti, Giulio Basile, Claudio E. Palazzi. 1-6 [doi]
- TMAC: Timestamp-Ordered MAC for CSMA/CA Wireless Mesh NetworksFaisal Nawab, Kamran Jamshaid, Basem Shihada, Pin-Han Ho. 1-6 [doi]
- An Empirical Study of NetEm Network Emulation FunctionalitiesAudrius Jurgelionis, Jukka-Pekka Laulajainen, Matti Hirvonen, Alf Inge Wang. 1-6 [doi]
- An Efficient Scheduling Architecture for QR Decomposition Using Fixed-Point Arithmetic for Detection of STBC-VBLAST CodesJoaquín Cortez González, Miguel Bazdresch, Deni Torres Román, Erica Ruiz-Ibarra. 1-5 [doi]
- A Model of Path Stretch in Proactive Routing in MANETsStephan Bohacek, Andres Medina. 1-7 [doi]
- A Revenue Maximization Model for Call Admission Control Problem of Media on Demand Service ProvidersMatin Bagherpour, Mehdi Sharifyazdi, Øivind Kure. 1-7 [doi]
- Design and Implementation of Aggregation Framework for UPnP/DLNA Media ServerSeung-woo Kum, Kyung Won Kim, Yun-Ju Lee, Tae-Beom Lim, Seok-Pil Lee. 1-4 [doi]
- Securing Mobile Devices with BiotelemetryAndrew D. Jurik, Alfred C. Weaver. 1-6 [doi]
- Improving Location Estimation with Two-Tier Particle Filtering in Mobile Wireless EnvironmentKwangjae Sung, Suk-Kyu Lee, Hwangnam Kim. 1-6 [doi]
- A Content-Adaptive Distortion-Quantization Model for Intra Coding in H.264/AVCChing-Yu Wu, Po-Chyi Su. 1-6 [doi]
- Spectrum Allocation for Distributed Throughput Maximization under Secondary Interference Constraints in Wireless Mesh NetworksTong Shu, Min Liu, Zhongcheng Li. 1-6 [doi]
- Achieving the Maximum P2P Streaming Rate Using a Small Number of TreesJoohwan Kim, R. Srikant. 1-6 [doi]
- Location-Free Semi-Directional Flooding for On-Demand Routing in Low-Rate Wireless Mesh NetworksSeong-Hoon Kim, Pohkit Chong, Woncheol Cho, Daeyoung Kim 0001. 1-7 [doi]
- Decision-Theoretic Communication Standard Recognition in the European 868 MHz BandMatthias Kuba, Karlheinz Ronge, Robert Weigel. 1-4 [doi]
- Aligning Spectrum-User Objectives for Maximum Inelastic-Traffic RewardBechir Hamdaoui, MohammadJavad NoroozOliaee, Kagan Tumer, Ammar Rayes. 1-6 [doi]
- Service Degradation in Context Management FrameworksAhmed Shawky, Rasmus L. Olsen, Jens Myrup Pedersen, Jakob Gulddahl Rasmussen. 1-6 [doi]
- Security Protection for Online Learning of MusicHaifan Yao, Yue Ji. 1-4 [doi]
- Sum-Product Based Optimization for Scalable Video Streams in Peer-to-Peer Mesh NetworkTareq Hossain, Yi Cui. 1-8 [doi]
- Static Thermal Model Learning for High-Performance Multicore ServersFrancesco Beneventi, Andrea Bartolini, Luca Benini. 1-6 [doi]
- Caching Popular BGP Prefixes with Grey Modeling PredictionWei Zhang 0040, Jun Bi, Jianping Wu, Baobao Zhang. 1-6 [doi]
- FIPACT: A Frame-Oriented Dynamic Bandwidth Allocation Scheme for Triple-Play Services over EPONsHui-Tang Lin, Chai-Lin Lai, Wang-Rong Chang, Chin-Lien Liu. 1-6 [doi]
- Refining Reputation to Truly Select High-QoS Servers in Peer-to-Peer NetworksHaiying Shen, Lianyu Zhao. 1-6 [doi]
- On Secure Multi-Copy Based Routing in Compromised Delay Tolerant NetworksEyuphan Bulut, Boleslaw K. Szymanski. 1-7 [doi]
- Data Aggregation Protocol for Multiple Sound Sources Acquisition with Microphone Array NetworkShintaro Izumi, Hiroki Noguchi, Tomoya Takagi, Koji Kugata, Shinpei Soda, Masahiko Yoshimoto, Hiroshi Kawaguchi. 1-6 [doi]
- Wavelength Retuning in Optical Waveband Switching NetworksYang Wang 0016, Xiaojun Cao. 1-6 [doi]
- Backpacking: Deployment of Heterogeneous Radios in High Data Rate Sensor NetworksA. B. M. Alim Al Islam, Mohammad Sajjad Hossain, Vijay Raghunathan, Y. Charlie Hu. 1-8 [doi]
- Adaptive Block-Level Resource Allocation in OFDMA NetworksJiancun Fan, Qinye Yin, Geoffrey Ye Li, Bingguang Peng, Xiaolong Zhu. 1-5 [doi]
- Calculating the Minimum Bounds of Energy Consumption for Cloud NetworksJens Buysse, Konstantinos Georgakilas, Anna Tzanakaki, Marc De Leenheer, Bart Dhoedt, Chris Develder, Piet Demeester. 1-7 [doi]
- System-Level Evaluation of Opportunistic Client Cooperation in Wireless Cellular NetworksAlexander Pyattaev, Sergey D. Andreev, Olga Galinina, Yevgeni Koucheryavy. 1-6 [doi]
- Cross-Modal Analysis of Audio-Visual Film MontageMatthias Zeppelzauer, Dalibor Mitrovic, Christian Breiteneder. 1-6 [doi]
- Dynamic Soft-Frequency Reuse with Inter-Cell Coordination in OFDMA NetworksDeli Jia, Gang Wu, Shaoqian Li, Geoffrey Ye Li, Xiaolong Zhu. 1-6 [doi]
- Resource Allocation for Real-Time Tasks Using Cloud ComputingKarthik Kumar, Jing Feng, Yamini Nimmagadda, Yung-Hsiang Lu. 1-7 [doi]
- A Hybrid Cross-Layer Routing Protocol for MANETsXiaolong Li, Homayoun Yousefi'zadeh. 1-6 [doi]
- Peak Power Reduction of OFDM Signals Using Trellis Shaping with M-AlgorithmRyota Yoshizawa, Hideki Ochiai. 1-5 [doi]
- Layered Sequential Decision Policies for Cross-Layer Design of Wireless Ad-Hoc NetworksZhenzhen Ye, Alhussein A. Abouzeid. 1-6 [doi]
- A Protocol-Aware Network Control Method for Large-Scale Data Transfer in Long-Distance Broadband NetworksJin Hirose, Ken-ichi Baba, Hirotake Abe. 1-6 [doi]
- Challenges to Privacy in Social Networking Mashups: Social TV as a Case StudyKaren R. Sollins. 1-6 [doi]
- A Simulative Performance Study of the Semantic QoS Provisioning Scheme sQoSPatrick-Benjamin Bök, Stephanie Dünhaupt. 1-6 [doi]
- Parallel Adaptive HTTP Media StreamingChenghao Liu, Imed Bouazizi, Moncef Gabbouj. 1-6 [doi]
- Performance Assessment of Wireless ECG Transmission over IEEE 802.11 WLANsKyungtae Kang, Dong Kun Noh. 1-5 [doi]
- Comparison between Two Implementations of ParFlow for Simulating Femtocell NetworksGuillaume de la Roche, Jean-Frédéric Wagen, Guillaume Villemaud, Jean-Marie Gorce, Jie Zhang. 1-4 [doi]
- A Machine Learning Approach to End-to-End RTT Estimation and its Application to TCPBruno Astuto A. Nunes, Kerry Veenstra, William Ballenthin, Stephanie Lukin, Katia Obraczka. 1-6 [doi]
- Impact of EPON DBA Components on PerformanceMichael P. McGarry, Martin Reisslein, Frank Aurzada, Michael Scheutzow. 1-5 [doi]
- Another CDFA Based Multi-Pattern Matching Algorithm and Architecture for Packet InspectionTian Song, Dongsheng Wang. 1-8 [doi]
- Distributed Mass-Spring-Relaxation for Anchor-Free Self-Localization in Sensor and Actor NetworksJuergen Eckert, Félix Jesús Villanueva, Reinhard German, Falko Dressler. 1-8 [doi]
- Moment Analysis of Decision Variables for MAP DecodingAki Kaizu, Yu Morishima, Ikuo Oka, Shingo Ata. 1-5 [doi]
- Implementation of an Adaptive Intelligent Home Energy Management System Using a Wireless Ad-Hoc and Sensor Network in Pervasive EnvironmentsJinsung Byun, Insung Hong, Byeongkwan Kang, Sehyun Park. 1-6 [doi]
- Maintenance-Efficient Erasure Coding for Distributed Archival StorageCuong Pham, Feng Zhang, Duc A. Tran. 1-5 [doi]
- Low Overhead Dynamic Spectrum Reallocation in Opportunistic Spectrum Access NetworksYu Tian, Wenzhong Li, Zhuo Li, Sanglu Lu, Xiaoming Fu. 1-6 [doi]
- CapMan: Capability-Based Defense against Multi-Path Denial of Service (DoS) Attacks in MANETQuan Jia, Kun Sun, Angelos Stavrou. 1-6 [doi]
- Highly Realistic MPEG-4 Compliant Facial Animation with CharismaAbdennour El Rhalibi, Chris Carter, Simon Cooper, Madjid Merabti. 1-6 [doi]
- Survivable Network Design Models Based on Pre-Cross-Connected TrailsMohammad S. Kiaei, Samir Sebbah, Anton Cerný, Hamed M. K. Alazemi, Chadi Assi. 1-7 [doi]
- Fine-Grained DDoS Detection Scheme Based on Bidirectional Count SketchHaiqin Liu, Yan Sun, Min Sik Kim. 1-6 [doi]
- QDV - A QoS Enabled Packet Scheduling Scheme for Mobile WiMAX in UAV SwarmsBjoern Dusza, Christian Wietfeld. 1-5 [doi]
- Development Framework for Prototyping Heterogeneous Multi-Radio Wireless NetworksThorsten Horstmann, Mathias Kretschmer, Jens Mödeker, Christian Niephaus, Stefan Sauer. 1-5 [doi]
- Towards Accountable Mobility Model: A Language Approach on User Behavior Modeling in Office WLANJiang Zhu, Ying Zhang. 1-6 [doi]
- DynamicSD: Discover Dynamic and Uncertain Services in Pervasive Computing EnvironmentsFeng Zhu, Ajinkya Kulkarni. 1-8 [doi]
- Social-Based Trust in Mobile Opportunistic NetworksAbderrahmen Mtibaa, Khaled A. Harras. 1-6 [doi]
- A Multimedia-Based Fuzzy Queue-Aware Routing Approach for Wireless Mesh NetworksBilly Pinheiro, Vagner Nascimento, Rafael Lopes Gomes, Eduardo Cerqueira, Antonio Abelém. 1-7 [doi]