Abstract is missing.
- Towards name-based trust and security for content-centric networkXinwen Zhang, Katharine Chang, Huijun Xiong, Yonggang Wen, Guangyu Shi, Guoqiang Wang. 1-6 [doi]
- Source address validation solution with OpenFlow/NOX architectureGuang Yao, Jun Bi, Peiyao Xiao. 7-12 [doi]
- LENS: Leveraging social networking and trust to prevent spam transmissionSufian Hameed, Xiaoming Fu, Pan Hui, Nishanth R. Sastry. 13-18 [doi]
- A deployable approach for inter-AS anti-spoofingBingyang Liu, Jun Bi, Yu Zhu. 19-24 [doi]
- Network-level characteristics of spamming: An empirical analysisMarios Kokkodis, Michalis Faloutsos, Athina Markopoulou. 25-30 [doi]
- Machine learning for implanted malicious code detection with incompletely specified system implementationsYating Hsu, David Lee. 31-36 [doi]
- Shield: DoS filtering using traffic deflectingErik Kline, Alexander Afanasyev, Peter L. Reiher. 37-42 [doi]
- Argus: An accurate and agile system to detecting IP prefix hijackingYang Xiang, Zhiliang Wang, Xia Yin, Jianping Wu. 43-48 [doi]
- Scalable routing easy as PIE: A practical isometric embedding protocolJulien Herzen, Cédric Westphal, Patrick Thiran. 49-58 [doi]
- Characterization and design of effective BGP AS-path prependingYing Zhang, Mallik Tatipamula. 59-68 [doi]
- Inferring a network congestion map with zero traffic overheadFlorin Dinu, T. S. Eugene Ng. 69-78 [doi]
- Generalized graph products for network design and analysisEric Parsonage, Hung X. Nguyen, Rhys Alistair Bowden, Simon Knight, Nickolas J. G. Falkner, Matthew Roughan. 79-88 [doi]
- Link quality aware code dissemination in wireless sensor networksWei Dong, Yunhao Liu, Chao Wang, Xue Liu, Chun Chen, Jiajun Bu. 89-98 [doi]
- Efficient and fast distributed top-k query protocol in wireless sensor networksShaoJie Tang, Xufei Mao, Xiang-Yang Li. 99-108 [doi]
- Geocast for wireless sensor networksRajesh Krishna Panta, Robert J. Hall, Josh Auzins, Maria Fernandez. 109-118 [doi]
- REPICK: Random access MAC with reversed contention and Piggy-backed ACKXiaojun Feng, Jin Zhang, Qian Zhang, Bo Li 0001. 119-120 [doi]
- Understanding and mitigating TCP starvation in 802.11 wireless mesh networksWei Wang, Ben Leong, Wei Tsang Ooi. 121-122 [doi]
- IPv6 evolution, stability and deploymentXiaoke Jiang, Jun Bi, Yangyang Wang, Zhijie He, Wei Zhang 0040, Hongcheng Tian. 123-124 [doi]
- TUNIE: A virtualized platform for network experiment on programmable infrastructureYong Li 0008, Li Su, Depeng Jin, Lieguang Zeng. 125-126 [doi]
- Probabilistic verification of BGP convergenceSoroush Haeri, Dario Kresic, Ljiljana Trajkovic. 127-128 [doi]
- EasyTrace: An easily-deployable light-weight IP traceback on an AS-level overlay networkHongcheng Tian, Jun Bi, Wei Zhang 0040, Xiaoke Jiang. 129-130 [doi]
- Gaming over COPSS: A content centric communication infrastructure for gaming applicationsJiachen Chen, Mayutan Arumaithurai, Xiaoming Fu, K. K. Ramakrishnan. 131-132 [doi]
- Real-time Netshuffle: Graph distortion for on-line anonymizationRuma R. Paul, Victor C. Valgenti, Min Sik Kim. 133-134 [doi]
- Striking the balance between content diversity and content importance in swarm-based P2P streamingChun-Yun Chang, Cheng-Fu Chou, Ming-Hung Chen. 135-136 [doi]
- AIDR: Aggregation of BGP routing table with AS path stretchYangyang Wang, Jun Bi, Jianping Wu. 137-138 [doi]
- Self-organizing TDMA for multihop networksLaura Marie Feeney. 139-140 [doi]
- OpenRouter: OpenFlow extension and implementation based on a commercial routerTao Feng, Jun Bi, Hongyu Hu. 141-142 [doi]
- Network fault localization with small TCBXin Zhang 0003, Zongwei Zhou, Geoffrey Hasker, Adrian Perrig, Virgil D. Gligor. 143-154 [doi]
- Privacy-preserving cross-domain network reachability quantificationFei Chen, Bezawada Bruhadeshwar, Alex X. Liu. 155-164 [doi]
- EphPub: Toward robust Ephemeral PublishingClaude Castelluccia, Emiliano De Cristofaro, Aurélien Francillon, Mohamed Ali Kâafar. 165-175 [doi]
- Efficient data capturing for network forensics in cognitive radio networksShaxun Chen, Kai Zeng, Prasant Mohapatra. 176-185 [doi]
- What is wrong/right with IEEE 802.11n Spatial Multiplexing Power Save feature?Ioannis Pefkianakis, Chi-Yu Li, Songwu Lu. 186-195 [doi]
- The case for addressing the limiting impact of interference on wireless schedulingXin Che, Xi Ju, Hongwei Zhang. 196-205 [doi]
- Win-Coupon: An incentive framework for 3G traffic offloadingXuejun Zhuo, Wei Gao, Guohong Cao, Yiqi Dai. 206-215 [doi]
- Out-of-band sensing with ZigBee for dynamic channel assignment in on-the-move hotspotsJaehyuk Choi, Kang G. Shin. 216-225 [doi]
- Global optimization of file availability through replication for efficient file sharing in MANETsKang Chen, Haiying Shen. 226-235 [doi]
- Contact duration aware data replication in Delay Tolerant NetworksXuejun Zhuo, Qinghua Li, Wei Gao, Guohong Cao, Yiqi Dai. 236-245 [doi]
- A case for coalitions in data swarming systemsHonggang Zhang, Sudarshan Vasudevan, Ran Li, Don Towsley. 246-255 [doi]
- Building mega data center from heterogeneous containersDan Li, Mingwei Xu, Hongze Zhao, Xiaoming Fu. 256-265 [doi]
- Scalable data center multicast using multi-class Bloom FilterDan Li, Henggang Cui, Yan Hu, Yong Xia, Xin Wang 0001. 266-275 [doi]
- Analysis of adaptive streaming for hybrid CDN/P2P live video systemsAhmed Mansy, Mostafa H. Ammar. 276-285 [doi]
- Impact of mobility on user-centric routingNamusale Chama, Rute C. Sofia, Susana Sargento. 286-288 [doi]
- Improving mobile networks based on social mobility modelingAndrea G. Ribeiro, Rute C. Sofia, Andre Zuquete. 289-291 [doi]
- Internet exchange points and Internet routingMohammad Zubair Ahmad, Ratan Guha. 292-294 [doi]
- Energy-efficient routingAntonio Junior, Rute C. Sofia, António Costa. 295-297 [doi]
- PhD Forum: On the scalability of source routing architecturesOnur Ascigil. 298-300 [doi]
- Sidekick: AP aggregation over partially overlapping channelsEugene Chai, Kang G. Shin. 301-310 [doi]
- Adaptive Subcarrier Nulling: Enabling partial spectrum sharing in wireless LANsXinyu Zhang, Kang G. Shin. 311-320 [doi]
- Video-Aware Rate Adaptation for MIMO WLANsAn (Jack) Chan, Henrik Lundgren, Theodoros Salonidis. 321-330 [doi]
- A practical approach to rate adaptation for multi-antenna systemsDuy Nguyen, J. J. Garcia-Luna-Aceves. 331-340 [doi]
- Dynamic Window Coupling for multipath congestion controlSofiane Hassayoun, Janardhan R. Iyengar, David Ros. 341-352 [doi]
- Moving bits from 3G to metro-scale WiFi for vehicular network access: An integrated transport layer solutionXiaoxiao Hou, Pralhad Deshpande, Samir R. Das. 353-362 [doi]
- Fast tag searching protocol for large-scale RFID systemsYuanqing Zheng, Mo Li. 363-372 [doi]
- J-RoC: A Joint Routing and Charging scheme to prolong sensor network lifetimeZi Li, Yang Peng, Wensheng Zhang, Daji Qiao. 373-382 [doi]
- Correlated flooding in low-duty-cycle wireless sensor networksShuo Guo, Song Min Kim, Ting Zhu, Yu Gu 0001, Tian He. 383-392 [doi]
- Anti-jamming communication in cognitive radio networks with unknown channel statisticsQian Wang, Kui Ren, Peng Ning. 393-402 [doi]