Abstract is missing.
- Resource optimization for speculative execution in a MapReduce ClusterHuanle Xu, Wing Cheong Lau. 1-3 [doi]
- Graceful router updates in link-state protocolsFrancois Clad, Pascal Mérindol, Stefano Vissicchio, Jean-Jacques Pansiot, Pierre François. 1-10 [doi]
- Async: De-congestion and yield management in cellular data networksVijay Gabale, UmaMaheswari Devi, Ravi Kokku, Vinay Kolar, Mukundan Madhavan, Shivkumar Kalyanaraman. 1-10 [doi]
- Effects of capacity sharing on mobile access competitionHenna Suomi, Arturo Basaure, Heikki Hämmäinen. 1-6 [doi]
- Skewless network clock synchronizationEnrique Mallada, Xiaoqiao Meng, Michel Hack, Li Zhang, Ao Tang. 1-10 [doi]
- L2Relay: Design and implementation of a layer 2 Wi-Fi packet relay protocolShuaiyuan Zhou, Zhenghao Zhang. 1-10 [doi]
- Experimental evaluation of 5.9 GHz link asymmetry using standards-compliant implementationHamid Menouar, Fethi Filali, Adnan Abu-Dayya. 1-6 [doi]
- Interference and capacity analysis in multi-hop wireless mesh networksMuhammad Zeeshan, Anjum Naveed. 1-3 [doi]
- Automated synthesis of reactive controllers for software-defined networksAnduo Wang, Salar Moarref, Boon Thau Loo, Ufuk Topcu, Andre Scedrov. 1-6 [doi]
- Mitigating malicious interference via subcarrier-level radio agility in wireless networksAhmed Osama Fathy Atya, Azeem Aqil, Shailendra Singh, Ioannis Broustis, Karthikeyan Sundaresan, Srikanth V. Krishnamurthy. 1-10 [doi]
- Software-defined networking based capacity sharing in hybrid networksMateus A. S. Santos, Bruno Trevizan de Oliveira, Cintia B. Margi, Bruno Astuto A. Nunes, Thierry Turletti, Katia Obraczka. 1-6 [doi]
- Disaster-tolerant authentication system for NDN using Hierarchical ID-Based EncryptionTakeo Ogawara, Yoshihiro Kawahara, Tohru Asami. 1-2 [doi]
- Eliminating network protocol vulnerabilities through abstraction and systems language designC. Jasson Casey, Andrew Sutton, Gabriel Dos Reis, Alex Sprintson. 1-6 [doi]
- On the opportunistic connectivity of large-scale urban vehicular networksXiangming Zhu, Yong Li, Depeng Jin, Pan Hui. 1-2 [doi]
- Falloc: Fair network bandwidth allocation in IaaS datacenters via a bargaining game approachJian Guo, Fangming Liu, Haowen Tang, Yingnan Lian, Hai Jin, John C. S. Lui. 1-10 [doi]
- eWARPE - Energy-efficient weather-aware route planner for electric bicyclesIrina Tal, Aida Olaru, Gabriel-Miro Muntean. 1-6 [doi]
- On the cascading failures of multi-controllers in Software Defined NetworksGuang Yao, Jun Bi, Luyi Guo. 1-2 [doi]
- Radio Access Network sharing in cellular networksRajesh Mahindra, Mohammad Ali Khojastepour, Honghai Zhang, Sampath Rangarajan. 1-10 [doi]
- Software defined live virtual machine migrationJiaqiang Liu, Depeng Jin. 1-3 [doi]
- Mitigating egregious ACK delays in cellular data networks by eliminating TCP ACK clockingWai Kay Leong, Yin Xu, Ben Leong, Zixiao Wang. 1-10 [doi]
- Joint Aggregation and MAC design to prolong sensor network lifetimeZi Li, Yang Peng, Daji Qiao, Wensheng Zhang. 1-10 [doi]
- Joint-Family: Enabling adaptive bitrate streaming in peer-to-peer video-on-demandKyung-Wook Hwang, Vijay Gopalakrishnan, Rittwik Jana, Seungjoon Lee, Vishal Misra, K. K. Ramakrishnan, Dan Rubenstein. 1-10 [doi]
- PhD forum: Not so cooperative cachingXiaoyan Hu, Jian Gong. 1-3 [doi]
- CNS: A Content-centric Notification ServiceJiachen Chen, Mayutan Arumaithurai, Xiaoming Fu, K. K. Ramakrishnan. 1-2 [doi]
- Optimal multipath congestion control and request forwarding in Information-Centric NetworksGiovanna Carofiglio, Massimo Gallo, Luca Muscariello, Michele Papalini, Sen Wang. 1-10 [doi]
- DOF: Duplicate Detectable Opportunistic Forwarding in duty-cycled wireless sensor networksDaibo Liu, Zhichao Cao, Jiliang Wang, Yuan He, Mengshu Hou, Yunhao Liu. 1-10 [doi]
- Optimal link-state hop-by-hop routingNithin Michael, Ao Tang, Dahai Xu. 1-10 [doi]
- OpenFlow: A security analysisRowan Kloti, Vasileios Kotronis, Paul Smith. 1-6 [doi]
- Power-aware design of IP core networks under general traffic demandsZhi Zhang, Yigal Bejerano, Spyridon Antonakopoulos. 1-11 [doi]
- Dynamic distributed algorithm for computing multiple next-hops on a treeHaijun Geng, Xingang Shi, Xia Yin, Zhiliang Wang. 1-10 [doi]
- On the effectiveness of sybil defenses based on online social networksDavid Koll, Jun Li, Joshua Stein, Xiaoming Fu. 1-2 [doi]
- Evaluation of the impact of packet drops due to AQM over capacity limited pathsEduard Grigorescu, Chamil Kulatunga, Gorry Fairhurst. 1-6 [doi]
- Guided multiple hashing: Achieving near perfect balance for fast routing lookupXi Tao, Yan Qiao, Jih-Kwon Peir, Shigang Chen, Zhuo Huang, Shih-Lien Lu. 1-10 [doi]
- CMES: Collaborative Energy Save for MIMO 802.11 wireless networksIoannis Pefkianakis, Chi-Yu Li, Chunyi Peng, Suk-Bok Lee, Songwu Lu. 1-10 [doi]
- Congestion-aware scalable video streamingNuruddeen Iya, Fabio Verdicchio, Gorry Fairhurst. 1-6 [doi]
- PVTCP: Towards practical and effective congestion control in virtualized datacentersLuwei Cheng, Cho-Li Wang, Francis C. M. Lau. 1-10 [doi]
- RLoad: Reputation-based load-balancing network selection strategy for heterogeneous wireless environmentsTing Bi, Ramona Trestian, Gabriel-Miro Muntean. 1-3 [doi]
- Optimizing energy consumption and qoe on mobile devicesFabian Kaup, David Hausheer. 1-3 [doi]
- Pathfinder: Robust path reconstruction in large scale sensor networks with lossy linksYi Gao, Wei Dong, Chun Chen, Jiajun Bu, Gaoyang Guan, Xuefeng Zhang, Xue Liu. 1-10 [doi]
- StEERING: A software-defined networking for inline service chainingYing Zhang, Neda Beheshti, Ludovic Beliveau, Geoffrey Lefebvre, Ravi Manghirmalani, Ramesh Mishra, Ritun Patney, Meral Shirazipour, Ramesh Subrahmaniam, Catherine Truchan, Mallik Tatipamula. 1-10 [doi]
- Real-time power control for dynamic optical networks - Algorithms and experimentationBerk Birand, Howard Wang, Keren Bergman, Daniel C. Kilper, Thyaga Nandagopal, Gil Zussman. 1-10 [doi]
- Stitch-n-Sync: Discreetly disclosing topology information using logically centralized controllersDaniel Philip Venmani, Yvon Gourhant, Djamal Zeghlache. 1-6 [doi]
- Is the network capable of computation?Peter Peresini, Dejan Kostic. 1-6 [doi]
- Community classification on Decentralized Social Networks based on 2-hop neighbourhood informationPili Hu, Wing Cheong Lau. 1-2 [doi]
- An evaluation study of driver profiling fuzzy algorithms using smartphonesGerman Castignani, Raphael Frank, Thomas Engel. 1-6 [doi]
- Security evaluation of a control system using Named Data NetworkingVictor Perez, Mevlut Turker Garip, Silas Lam, Lixia Zhang. 1-6 [doi]
- Formal methods to improve the identification and validation of network trafficMichael Finsterbusch, Jean-Alexander Muller. 1-3 [doi]
- Transient community detection and its application to data forwarding in delay tolerant networksXiaomei Zhang, Guohong Cao. 1-10 [doi]
- Taming TCP incast throughput collapse in data center networksJiao Zhang, Fengyuan Ren, Li Tang, Chuang Lin. 1-10 [doi]
- Enabling ICN in IP networks using SDNMarkus Vahlenkamp, Fabian Schneider, Dirk Kutscher, Jan Seedorf. 1-2 [doi]
- Service Boost: Towards on-demand QoS enhancements for OTT apps in LTEKonstantinos Samdanis, Faisal Ghias Mir, Dirk Kutscher, Tarik Taleb. 1-6 [doi]
- RCTC: Rapid concurrent transmission coordination in full DuplexWireless networksWenjie Zhou, Kannan Srinivasan, Prasun Sinha. 1-10 [doi]
- Async: De-congestion and yield management in cellular data networksVijay Gabale, Vinay Kolar, Uma Devi, Mukundan Madhavan, Ravi Kokku. 1-2 [doi]
- Message from general chairsXiaoming Fu, Volker Hilt. 1 [doi]
- A unified framework for line-like skeleton extraction in 2D/3D sensor networksWenPing Liu, Hongbo Jiang, Yang Yang, Zemeng Jin. 1-10 [doi]
- STRIP: Privacy-preserving vector-based routingWilko Henecka, Matthew Roughan. 1-10 [doi]
- Defining a network management architectureYury Jimenez, Cristina Cervello-Pastor, Aurelio J. Garcia. 1-3 [doi]
- Selective Data replication for Online Social Networks with Distributed DatacentersGuoxin Liu, Haiying Shen, Harrison Chandler. 1-10 [doi]
- Real-time verification of network properties using Atomic PredicatesHongkun Yang, Simon S. Lam. 1-11 [doi]
- Content-centric user networks: WebRTC as a path to name-based publishingChristian Vogt, Max Jonas Werner, Thomas C. Schmidt. 1-3 [doi]
- Security analysis of a future Internet architectureZhe Chen, Hongbin Luo, Jianbo Cui, Mingshuang Jin. 1-6 [doi]
- Testing OpenFlow interaction property based on hierarchy CPNLulu Dong, Hua Li, Nan He, Yi Xing. 1-2 [doi]
- Who are you talking to? Breaching privacy in encrypted IM networksMuhammad Usman Ilyas, Muhammad Zubair Shafiq, Alex X. Liu, Hayder Radha. 1-10 [doi]
- DFLOW: Low latency congestion controlPiers O'Hanlon, Ken Carlberg. 1-6 [doi]
- Standards-based end-to-end IP security for the Internet of ThingsRené Hummen, Klaus Wehrle. 1-3 [doi]
- Energy efficient carrier aggregation algorithms for next generation cellular networksKarthikeyan Sundaresan, Sampath Rangarajan. 1-10 [doi]
- vRGW: Towards network function virtualization enabled by software defined networkingHaiyong Xie, Yanhua Li, Jin Wang, Diego R. Lopez, Tina Tsou, Yonggang Wen. 1-2 [doi]
- OpenSession: SDN-based cross-layer multi-stream management protocol for 3D teleimmersionAhsan Arefin, Raoul Rivas, Rehana Tabassum, Klara Nahrstedt. 1-10 [doi]
- The impact of large flows in Content Centric NetworksYounghoon Kim, Yusung Kim, Ikjun Yeom. 1-2 [doi]
- Hop-by-hop computing for green Internet routingYuan Yang, Dan Wang, Mingwei Xu, Suogang Li. 1-10 [doi]
- A two-tier Content-Centric Architecture for Wireless Sensor NetworksJan Pieter Meijers, Marica Amadeo, Claudia Campolo, Antonella Molinaro, Stefano Yuri Paratore, Giuseppe Ruggeri, Marthinus J. Booysen. 1-2 [doi]
- Measurement-based TCP parameter tuning in cloud data centersSimon Jouet, Dimitrios P. Pezaros. 1-3 [doi]
- Measuring interdependencies and transitivity of end to end traffic flows by traffic correlationSabri-E. Zaman, Raul J. Mondragón. 1-3 [doi]
- On-demand video streaming based on dynamic adaptive encrypted content chunksDaniel Posch, Hermann Hellwagner, Peter Schartner. 1-6 [doi]
- Using routers to build logic circuits: How powerful is BGP?Marco Chiesa, Luca Cittadini, Giuseppe Di Battista, Laurent Vanbever, Stefano Vissicchio. 1-10 [doi]
- Dual-NAT: dynamic multipath flow scheduling for Data Center NetworksYu Cao, Mingwei Xu. 1-2 [doi]
- Let's ChronoSync: Decentralized dataset state synchronization in Named Data NetworkingZhenkai Zhu, Alexander Afanasyev. 1-10 [doi]
- Dynamic channel bonding in multicarrier wireless networksPei Huang, Xi Yang, Li Xiao. 1-10 [doi]
- Scalable opportunistic VANET Content Routing with encounter informationYu-Ting Yu, Yuanjie Li, Xingyu Ma, Wentao Shang, M. Y. Sanadidi, Mario Gerla. 1-6 [doi]
- STAMP: Ad hoc spatial-temporal provenance assurance for mobile usersXinlei Oscar Wang, Jindan Zhu, Amit Pande, Arun Raghuramu, Prasant Mohapatra, Tarek F. Abdelzaher, Raghu K. Ganti. 1-10 [doi]
- Efficient verification of network reachability propertiesHongkun Yang. 1-3 [doi]
- Optimal cache allocation for Content-Centric NetworkingYonggong Wang, Zhenyu Li, Gareth Tyson, Steve Uhlig, Gaogang Xie. 1-10 [doi]
- Voice over the dins: Improving wireless channel utilization with collision toleranceXiaoyu Ji, Yuan He, Jiliang Wang, Kaishun Wu, Ke Yi, Yunhao Liu. 1-10 [doi]
- Multipath policy routing using destination based hop-by-hop forwardingPedro Amaral, Luis Bernardo, Paulo Pinto. 1-6 [doi]
- Removing content consumers from mapping systemDan Wu, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu, Min Huang. 1-2 [doi]
- GenePrint: Generic and accurate physical-layer identification for UHF RFID tagsDan Ma, Chen Qian, Wenpu Li, Jinsong Han, Jizhong Zhao. 1-10 [doi]
- A lightweight many-to-many authentication protocol for Near Field CommunicationsVitaly Petrov, Maria Komar, Yevgeni Koucheryavy. 1-2 [doi]
- Multi-stream frame rate guarantee using cross-layer synergyAhsan Arefin, Klara Nahrstedt. 1-2 [doi]
- Modeling, identifying, and simulating Dynamic Adaptive Streaming over HTTPAndrew Reed, Jay Aikat. 1-2 [doi]
- Redundancy control and duplicate ACK suppression methods for TCP with FECYurino Sato, Hiroyuki Koga, Masayoshi Shimamura, Takeshi Ikenaga. 1-2 [doi]
- Augmented multipath TCP communicationsMatthieu Coudron, Stefano Secci, Guy Pujolle. 1-2 [doi]
- An economic perspective on traffic attraction by Internet transit providersPradeep Bangera, Sergey Gorinsky. 1-2 [doi]
- HTTP-CCN gateway: Adapting HTTP protocol to Content Centric NetworkZhaogeng Li, Jun Bi, Sen Wang. 1-2 [doi]
- LOOP: Layer-based overlay and optimized polymerization for multiple virtual tablesZhian Mi, Tong Yang, Jianyuan Lu, Hao Wu, Yi Wang, Tian Pan, Haoyu Song, Bin Liu. 1-10 [doi]
- Design and implementation of a proactive distributed authentication framework (PDAF)Ruidong Li, Kazuyuki Morioka, Yasunori Owada, Masaaki Ohnishi, Hiroaki Harai. 1-6 [doi]
- Multi-Resource Round Robin: A low complexity packet scheduler with Dominant Resource FairnessWei Wang, Baochun Li, Ben Liang. 1-10 [doi]
- Link quality aware geographical routing in hybrid cognitive radio mesh networksQian Li. 1-3 [doi]
- Leveraging WebRTC for P2P content distribution in web browsersChristian Vogt, Max Jonas Werner, Thomas C. Schmidt. 1-2 [doi]
- Collision-driven physical-layer identification of RFID UHF tagsDan Ma, Jinsong Han, Zhi Wang. 1-3 [doi]
- Improving traffic in urban environments applying the Wardrop equilibriumLara Codeca, Raphael Frank, Thomas Engel. 1-6 [doi]
- Message from the technical program chairsTilman Wolf, Lixia Zhang, Zhi-Li Zhang. 1 [doi]
- On the forwarding paths produced by Internet routing algorithmsSeweryn Dynerowicz, Timothy G. Griffin. 1-10 [doi]
- Rethinking congestion control in virtualized datacentersLuwei Cheng. 1-3 [doi]
- Tailoring end-to-end IP security protocols to the Internet of ThingsRené Hummen, Hanno Wirtz, Jan Henrik Ziegeldorf, Jens Hiller, Klaus Wehrle. 1-10 [doi]
- Scalable WiFi multicast services for very large groupsYigal Bejerano, Jaime Ferragut, Katherine Guo, Varun Gupta, Craig Gutterman, Thyaga Nandagopal, Gil Zussman. 1-12 [doi]
- Kistree: A reliable constant degree DHTMuhammad Irfan Yousuf, Suhyun Kim. 1-10 [doi]
- A few bits are enough - ASIC friendly Regular Expression matching for high speed network security systemsAlex X. Liu, Eric Norige, Sailesh Kumar. 1-10 [doi]