Abstract is missing.
- Theoretical Results on Base Station Movement Problem for Sensor NetworkYi Shi, Yiwei Thomas Hou. 1-5 [doi]
- Delay Analysis for Maximal Scheduling in Wireless Networks with Bursty TrafficMichael J. Neely. 6-10 [doi]
- Connectivity and Latency in Large-Scale Wireless Networks with Unreliable LinksZhenning Kong, Edmund M. Yeh. 11-15 [doi]
- The Speed of Information Propagation in Large Wireless NetworksYi Xu, Wenye Wang. 16-20 [doi]
- A Quasi-Likelihood Approach for Accurate Traffic Matrix Estimation in a High Speed NetworkJin Cao, Aiyou Chen, Tian Bu. 21-25 [doi]
- Accurate and Efficient Traffic Monitoring Using Adaptive Non-Linear Sampling MethodChengchen Hu, Sheng Wang, Jia Tian, Bin Liu, Yu Cheng, Yan Chen. 26-30 [doi]
- Turbo King: Framework for Large-Scale Internet Delay MeasurementsDerek Leonard, Dmitri Loguinov. 31-35 [doi]
- Network Routing Topology Inference from End-to-End MeasurementsJian Ni, Haiyong Xie 0002, Sekhar Tatikonda, Yang Richard Yang. 36-40 [doi]
- Attack-Tolerant Time-Synchronization in Wireless Sensor NetworksXin Hu, Taejoon Park, Kang G. Shin. 41-45 [doi]
- Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor NetworksBo Sheng, Qun Li. 46-50 [doi]
- Towards Statistically Strong Source Anonymity for Sensor NetworksMin Shao, Yi Yang, Sencun Zhu, Guohong Cao. 51-55 [doi]
- Confidentiality Protection for Distributed Sensor Data AggregationTaiming Feng, Chuang Wang, Wensheng Zhang, Lu Ruan. 56-60 [doi]
- On the Feasibility of the Link Abstraction in (Rural) Mesh NetworksDattatraya Y. Gokhale, Sayandeep Sen, Kameswari Chebrolu, Bhaskaran Raman. 61-65 [doi]
- iPack: in-Network Packet Mixing for High Throughput Wireless Mesh NetworksRichard Alimi, Erran L. Li, Ramachandran Ramjee, Harish Viswanathan, Yang Richard Yang. 66-70 [doi]
- Integrating Traffic Estimation and Routing Optimization for Multi-Radio Multi-Channel Wireless Mesh NetworksLiang Dai, Yuan Xue, Bin Chang, Yanchuan Cao, Yi Cui. 71-75 [doi]
- A Measurement Study of Multiplicative Overhead Effects in Wireless NetworksJoseph Camp, Vincenzo Mancuso, Omer Gurewitz, Edward W. Knightly. 76-80 [doi]
- Optimization Based Rate Control for Communication Networks with Inter-Session Network CodingAbdallah Khreishah, Chih-Chun Wang, Ness B. Shroff. 81-85 [doi]
- Impact of File Arrivals and Departures on Buffer Sizing in Core RoutersAshvin Lakshmikantha, R. Srikant, Carolyn L. Beck. 86-90 [doi]
- Window Flow Control: Macroscopic Properties from Microscopic FactorsAo Tang, Lachlan L. H. Andrew, Krister Jacobsson, Karl Henrik Johansson, Steven H. Low, Håkan Hjalmarsson. 91-95 [doi]
- On the Design of Load Factor based Congestion Control Protocols for Next-Generation NetworksIhsan A. Qazi, Taieb Znati. 96-100 [doi]
- Peacock Hashing: Deterministic and Updatable Hashing for High Performance NetworkingSailesh Kumar, Jonathan S. Turner, Patrick Crowley. 101-105 [doi]
- The Power of One Move: Hashing Schemes for HardwareAdam Kirsch, Michael Mitzenmacher. 106-110 [doi]
- All-Match Based Complete Redundancy Removal for Packet Classifiers in TCAMsAlex X. Liu, Chad R. Meiners, Yun Zhou. 111-115 [doi]
- Satisfying Arbitrary Delay Requirements in Multihop NetworksMatthew Andrews, Lisa Zhang. 116-120 [doi]
- MPLOT: A Transport Protocol Exploiting Multipath Diversity Using Erasure CodesVicky Sharma, Shivkumar Kalyanaraman, Koushik Kar, K. K. Ramakrishnan, Vijaynarayanan Subramanian. 121-125 [doi]
- Balanced Relay Allocation on Heterogeneous Unstructured OverlaysHung Xuan Nguyen, Daniel R. Figueiredo, Matthias Grossglauser, Patrick Thiran. 126-130 [doi]
- Proxy Caching in Split TCP: Dynamics, Stability and Tail AsymptoticsFrançois Baccelli, Giovanna Carofiglio, Serguei Foss. 131-135 [doi]
- Beltway Buffers: Avoiding the OS Traffic JamWillem de Bruijn, Herbert Bos. 136-140 [doi]
- Swarming on Optimized Graphs for n-Way BroadcastGeorgios Smaragdakis, Azer Bestavros, Nikolaos Laoutaris, John W. Byers, Pietro Michiardi, Mema Roussopoulos. 141-145 [doi]
- Link Lifetimes and Randomized Neighbor Selection in DHTsZhongmei Yao, Dmitri Loguinov. 146-150 [doi]
- Optimal Peer-to-Peer Technique for Massive Content DistributionXiaoying Zheng, Chunglae Cho, Ye Xia. 151-155 [doi]
- Algorithms for Low-Latency Remote File SynchronizationHao Yan, Utku Irmak, Torsten Suel. 156-160 [doi]
- Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic AnalysisPatrick Tague, David Slater, Jason Rogers, Radha Poovendran. 161-165 [doi]
- A Memory Efficient Multiple Pattern Matching Architecture for Network SecurityTian Song, Wei Zhang, Dongsheng Wang, Yibo Xue. 166-170 [doi]
- Live Baiting for Service-Level DoS AttackersSherif M. Khattab, Sameh Gobriel, Rami G. Melhem, Daniel Mossé. 171-175 [doi]
- Firewall Compressor: An Algorithm for Minimizing Firewall PoliciesAlex X. Liu, Eric Torng, Chad R. Meiners. 176-180 [doi]
- On Survivable Access Network Design: Complexity and AlgorithmsDahai Xu, Elliot Anshelevich, Mung Chiang. 186-190 [doi]
- Survivable Multipath Provisioning with Differential Delay Constraint in Telecom Mesh NetworksSheng Huang, Biswanath Mukherjee, Charles U. Martel. 191-195 [doi]
- Improving Efficiency of Backup Reprovisioning in WDM NetworksMassimo Tornatore, Diego Lucerna, Achille Pattavina. 196-200 [doi]
- Spectrum Sharing Between Wireless NetworksLeonard Grokop, David N. C. Tse. 201-205 [doi]
- Capacity Scaling of Sparse Mobile Ad Hoc NetworksMichele Garetto, Paolo Giaccone, Emilio Leonardi. 206-210 [doi]
- A Unifying Perspective on the Capacity of Wireless Ad Hoc NetworksZheng Wang, Hamid R. Sadjadpour, J. J. Garcia-Luna-Aceves. 211-215 [doi]
- Game-Theoretic Model for Collaborative Protocols in Selfish, Tariff-Free, Multihop Wireless NetworksSee-Kee Ng, Winston Khoon Guan Seah. 216-220 [doi]
- The Meandering Current Mobility Model and its Impact on Underwater Mobile Sensor NetworksAntonio Caruso, Francesco Paparella, Luiz Filipe M. Vieira, Melike Erol, Mario Gerla. 221-225 [doi]
- Cross-Layer Packet Size Optimization for Wireless Terrestrial, Underwater, and Underground Sensor NetworksMehmet C. Vuran, Ian F. Akyildiz. 226-230 [doi]
- T-Lohi: A New Class of MAC Protocols for Underwater Acoustic Sensor NetworksAffan A. Syed, Wei Ye, John S. Heidemann. 231-235 [doi]
- Underwater Localization in Sparse 3D Acoustic Sensor NetworksWei Cheng, Amin Y. Teymorian, Liran Ma, Xiuzhen Cheng, Xicheng Lu, Zexin Lu. 236-240 [doi]
- Throughput Anonymity Trade-off in Wireless Networks under Latency ConstraintsParvathinathan Venkitasubramaniam, Lang Tong. 241-245 [doi]
- An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor NetworksChenxi Zhang, Rongxing Lu, Xiaodong Lin, Pin-Han Ho, Xuemin Shen. 246-250 [doi]
- Modeling Secure Connectivity of Self-Organized Wireless Ad Hoc NetworksChi Zhang, Yang Song, Yuguang Fang. 251-255 [doi]
- A Scalable Method for Access Control in Location-Based Broadcast ServicesMudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu. 256-260 [doi]
- Tracking Down Skype TrafficDario Bonfiglio, Marco Mellia, Michela Meo, Nicolo Ritacca, Dario Rossi. 261-265 [doi]
- Automatic Profiling of Network Event Sequences: Algorithm and ApplicationsXiaoqiao Meng, Guofei Jiang, Hui Zhang 0002, Haifeng Chen, Kenji Yoshihira. 266-270 [doi]
- Characterizing and Modelling Clustering Features in AS-Level Internet TopologyYan Li, Jun-Hong Cui, Dario Maggiorini, Michalis Faloutsos. 271-275 [doi]
- Temporal Delay TomographyVijay Arya, Nick G. Duffield, Darryl Veitch. 276-280 [doi]
- Constrained Relay Node Placement in Wireless Sensor Networks to Meet Connectivity and Survivability RequirementsSatyajayant Misra, Seung Don Hong, Guoliang Xue, Jian Tang. 281-285 [doi]
- On Maintaining Sensor-Actor Connectivity in Wireless Sensor and Actor NetworksJie Wu, Shuhui Yang, Mihaela Cardei. 286-290 [doi]
- Simple and Efficient k-Coverage Verification without Location InformationYigal Bejerano. 291-295 [doi]
- Deploying Four-Connectivity and Full-Coverage Wireless Sensor NetworksXiaole Bai, Ziqiu Yun, Dong Xuan, Ten-Hwang Lai, Weijia Jia. 296-300 [doi]
- Fair Scheduling through Packet ElectionSrikanth Jagabathula, Vishal Doshi, Devavrat Shah. 301-305 [doi]
- Quasi-Output-Buffered SwitchesCheng-Shang Chang, Jay Cheng, Duan-Shin Lee, Chi-Feung Wu. 306-310 [doi]
- MultiLayer Compressed Counting Bloom FiltersDomenico Ficara, Stefano Giordano, Gregorio Procissi, Fabio Vitucci. 311-315 [doi]
- Low Power TCAMs for Very Large Forwarding TablesWencheng Lu, Sartaj Sahni. 316-320 [doi]
- How Bad is Suboptimal Rate Allocation?Tian Lan, Xiaojun Lin, Mung Chiang, Ruby B. Lee. 321-325 [doi]
- On the Performance of Primal/Dual Schemes for Congestion Control in Networks with Dynamic FlowsKexin Ma, Ravi Mazumdar, Jun Luo. 326-330 [doi]
- Utility Max-Min Fair Congestion Control with Time-Varying DelaysKonstantin Miller, Tobias Harks. 331-335 [doi]
- Reducing Maximum Stretch in Compact RoutingMihaela Enachescu, Mei Wang, Ashish Goel. 336-340 [doi]
- A p-norm Flow Optimization Problem in Dense Wireless Sensor NetworksMehdi Kalantari, Masoumeh Haghpanahi, Mark A. Shayman. 341-345 [doi]
- Select-and-Protest-Based Beaconless Georouting with Guaranteed Delivery in Wireless Sensor NetworksHanna Kalosha, Amiya Nayak, Stefan Rührup, Ivan Stojmenovic. 346-350 [doi]
- Virtual-Coordinate-Based Delivery-Guaranteed Routing Protocol in Wireless Sensor Networks with Unidirectional LinksChia-Hung Lin, Bing-Hong Liu, Hong-Yen Yang, Chi-Yen Kao, Ming-Jer Tsai. 351-355 [doi]
- On the Construction of a Maximum-Lifetime Data Gathering Tree in Sensor Networks: NP-Completeness and Approximation AlgorithmYan Wu, Sonia Fahmy, Ness B. Shroff. 356-360 [doi]
- Energy Efficient Opportunistic Network Coding for Wireless NetworksTao Cui, Lijun Chen, Tracey Ho. 361-365 [doi]
- Channelization for Network Coding in Wireless NetworksRaju Kumar, Heesook Choi, Jaesheung Shin, Tom La Porta. 366-370 [doi]
- How Many Packets Can We Encode? - An Analysis of Practical Wireless Network CodingJilin Le, John C. S. Lui, Dah-Ming Chiu. 371-375 [doi]
- Bounds on the Benefit of Network Coding: Throughput and Energy Saving in Wireless NetworksAlireza Keshavarz-Haddad, Rudolf H. Riedi. 376-384 [doi]
- Weighted Proportional Fairness Capacity of Gaussian MIMO Broadcast ChannelsJia Liu, Y. Thomas Hou. 385-393 [doi]
- Decentralized Rate Regulation in Random Access ChannelsIshai Menache, Nahum Shimkin. 394-402 [doi]
- Efficient Rate-Constrained Nash Equilibrium in Collision Channels with State InformationIshai Menache, Nahum Shimkin. 403-411 [doi]
- CTU: Capturing Throughput Dependencies in UWB NetworksIoannis Broustis, Aggelos Vlavianos, Prashant Krishnamurthy, Srikanth V. Krishnamurthy. 412-420 [doi]
- Online Energy Efficient Packet Scheduling with Delay Constraints in Wireless NetworksXiliang Zhong, Cheng-Zhong Xu. 421-429 [doi]
- Unified Energy-Efficient Routing for Multi-Hop Wireless NetworksSungoh Kwon, Ness B. Shroff. 430-438 [doi]
- An Energy Efficiency Evaluation for Sensor Nodes with Multiple Processors, Radios and SensorsDeokwoo Jung, Andreas Savvides. 439-447 [doi]
- Multi-Objective Topology Control in Wireless NetworksRon Banner, Ariel Orda. 448-456 [doi]
- Power Awareness in Network Design and RoutingJoseph Chabarek, Joel Sommers, Paul Barford, Cristian Estan, David Tsiang, Stephen Wright. 457-465 [doi]
- Link-State Routing with Hop-by-Hop Forwarding Can Achieve Optimal Traffic EngineeringDahai Xu, Mung Chiang, Jennifer Rexford. 466-474 [doi]
- Area Avoidance Routing in Distance-Vector NetworksHaim Zlatokrilov, Hanoch Levy. 475-483 [doi]
- Cluster-Based Back-Pressure Routing AlgorithmLei Ying, R. Srikant, Donald F. Towsley. 484-492 [doi]
- Cross-Layer Rate Control in Wireless Networks with Lossy Links: Leaky-Pipe Flow, Effective Network Utility Maximization and Hop-by-Hop AlgorithmsQinghai Gao, Junshan Zhang, Stephen V. Hanly. 493-501 [doi]
- Architecture and Abstractions for Environment and Traffic Aware System-Level Coordination of Wireless Networks: The Downlink CaseBalaji Rengarajan, Gustavo de Veciana. 502-510 [doi]
- Computational Analysis and Efficient Algorithms for Micro and Macro OFDMA SchedulingReuven Cohen, Liran Katzir. 511-519 [doi]
- On the Throughput Capacity of Opportunistic Multicasting with Erasure CodesUlas C. Kozat. 520-528 [doi]
- Adaptive SelectiveVerificationSanjeev Khanna, Santosh S. Venkatesh, Omid Fatemieh, Fariba Khan, Carl A. Gunter. 529-537 [doi]
- A Practical and Flexible Key Management Mechanism For Trusted Collaborative ComputingXukai Zou, Yuan-Shun Dai, Elisa Bertino. 538-546 [doi]
- Exploring Historical Location Data for Anonymity Preservation in Location-Based ServicesToby Xu, Ying Cai. 547-555 [doi]
- ALPACAS: A Large-Scale Privacy-Aware Collaborative Anti-Spam SystemZhenyu Zhong, Lakshmish Ramaswamy, Kang Li. 556-564 [doi]
- BodyQoS: Adaptive and Radio-Agnostic QoS for Body Sensor NetworksGang Zhou, Jian Lu, Chieh-Yih Wan, Mark D. Yarvis, John A. Stankovic. 565-573 [doi]
- CORD: Energy-Efficient Reliable Bulk Data Dissemination in Sensor NetworksLeijun Huang, Sanjeev Setia. 574-582 [doi]
- APL: Autonomous Passive Localization for Wireless Sensors Deployed in Road NetworksJaehoon Jeong, Shuo Guo, Tian He, David Du. 583-591 [doi]
- Probabilistic Approach to Provisioning Guaranteed QoS for Distributed Event DetectionYanmin Zhu, Lionel M. Ni. 592-600 [doi]
- Border Effects, Fairness, and Phase Transition in Large Wireless NetworksMathilde Durvy, Olivier Dousse, Patrick Thiran. 601-609 [doi]
- Resource Allocation in Multi-Radio Multi-Channel Multi-Hop Wireless NetworksSimone Merlin, Nitin H. Vaidya, Michele Zorzi. 610-618 [doi]
- Joint Scheduling and Congestion Control in Mobile Ad-Hoc NetworksUmut Akyol, Matthew Andrews, Piyush Gupta, John D. Hobby, Iraj Saniee, Alexander L. Stolyar. 619-627 [doi]
- On the Capacity of Multi-Channel Wireless Networks Using Directional AntennasHongning Dai, Kam-Wing Ng, Raymond Chi-Wing Wong, Min-You Wu. 628-636 [doi]
- Queueing Analysis of Loss Systems with Variable Optical Delay LinesDuan-Shin Lee, Cheng-Shang Chang, Jay Cheng, Horng-Sheng Yan. 637-645 [doi]
- Emergency Handling in Ethernet Passive Optical Networks Using Priority-Based Dynamic Bandwidth AllocationByongkwon Moon. 646-654 [doi]
- All-Optical Label Stacking: Easing the Trade-offs Between Routing and Architecture Cost in All-Optical Packet SwitchingFernando Solano, Ruth van Caenegem, Didier Colle, José-Luis Marzo, Mario Pickavet, Ramón Fabregat, Piet Demeester. 655-663 [doi]
- On Constructions of Optical Queues with a Limited Number of RecirculationsJay Cheng, Cheng-Shang Chang, Tsz-Hsuan Chao, Duan-Shin Lee, Ching-Ming Lien. 664-672 [doi]
- Closed Form Solutions for Symmetric Water Filling GamesEitan Altman, Konstantin Avrachenkov, Andrey Garnaev. 673-681 [doi]
- Spot Pricing of Secondary Spectrum Usage in Wireless Cellular NetworksHuseyin Mutlu, Murat Alanyali, David Starobinski. 682-690 [doi]
- Self-Organizing Dynamic Fractional Frequency Reuse in OFDMA SystemsAlexander L. Stolyar, Harish Viswanathan. 691-699 [doi]
- Cell Selection in 4G Cellular NetworksDavid Amzallag, Reuven Bar-Yehuda, Danny Raz, Gabriel Scalosub. 700-708 [doi]
- SRLG Failure Localization in All-Optical Networks Using Monitoring Cycles and PathsSatyajeet Ahuja, Srinivasan Ramasubramanian, Marwan Krunz. 700-708 [doi]
- A Novel Access Method for Supporting Absolute and Proportional Priorities in 802.11 WLANsMohammad Nassiri, Martin Heusse, Andrzej Duda. 709-717 [doi]
- Drive-By Localization of Roadside WiFi NetworksAnand Prabhu Subramanian, Pralhad Deshpande, Jie Gao, Samir R. Das. 718-725 [doi]
- Call Admission Control in IEEE 802.11 WLANs Using QP-CATSangho Shin, Henning Schulzrinne. 726-734 [doi]
- Diagnosing Wireless Packet Losses in 802.11: Separating Collision from Weak SignalShravan K. Rayanchu, Arunesh Mishra, Dheeraj Agrawal, Sharad Saha, Suman Banerjee. 735-743 [doi]
- Link Positions Matter: A Noncommutative Routing Metric for Wireless Mesh NetworkGentian Jakllari, Stephan Eidenbenz, Nicolas W. Hengartner, Srikanth V. Krishnamurthy, Michalis Faloutsos. 744-752 [doi]
- Network Formation Among Selfish Energy-Constrained Wireless DevicesHithesh Nama, Narayan B. Mandayam, Roy D. Yates. 753-761 [doi]
- Distance-1 Constrained Channel Assignment in Single Radio Wireless Mesh NetworksEhsan Aryafar, Omer Gurewitz, Edward W. Knightly. 762-770 [doi]
- Minimum Cost Topology Construction for Rural Wireless Mesh NetworksDebmalya Panigrahi, Partha Dutta, Sharad Jaiswal, K. V. M. Naidu, Rajeev Rastogi. 771-779 [doi]
- Minimum Cost Data Aggregation with Localized Processing for Statistical InferenceAnimashree Anandkumar, Lang Tong, Ananthram Swami, Anthony Ephremides. 780-788 [doi]
- Connectivity-Based Localization of Large Scale Sensor Networks with Complex ShapeSol Lederer, Yue Wang, Jie Gao. 789-797 [doi]
- Robust Planarization of Unlocalized Wireless Sensor NetworksFenghui Zhang, Anxiao Jiang, Jianer Chen. 798-806 [doi]
- On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with AnycastJoohwan Kim, Xiaojun Lin, Ness B. Shroff, Prasun Sinha. 807-815 [doi]
- On End-to-End Throughput of Opportunistic Routing in Multirate and Multihop Wireless NetworksKai Zeng, Wenjing Lou, Hongqiang Zhai. 816-824 [doi]
- An Information Model for Geographic Greedy Forwarding in Wireless Ad-Hoc Sensor NetworksZhen Jiang, Junchao Ma, Wei Lou, Jie Wu. 825-833 [doi]
- Randomized 3D Geographic RoutingRoland Flury, Roger Wattenhofer. 834-842 [doi]
- Embracing Interference in Ad Hoc Networks Using Joint Routing and Scheduling with Multiple Packet ReceptionXin Wang, J. J. Garcia-Luna-Aceves. 843-851 [doi]
- Dynamic Bandwidth Request-Allocation Algorithm for Real-Time Services in IEEE 802.16 Broadband Wireless Access NetworksEun-Chan Park, Hwangnam Kim, Jae-Young Kim, Han Seok Kim. 852-860 [doi]
- Creating Templates to Achieve Low Delay in Multi-Carrier Frame-Based Wireless Data SystemsMatthew Andrews, Lisa Zhang. 861-869 [doi]
- Stable and Efficient Spectrum Access in Next Generation Dynamic Spectrum NetworksLili Cao, Haitao Zheng. 870-878 [doi]
- End-to-End Resource Allocation in OFDM Based Linear Multi-Hop NetworksXiaolu Zhang, Wenhua Jiao, Meixia Tao. 879-887 [doi]
- Analysis of Price Competition in a Slotted Resource Allocation GamePatrick Maillé, Bruno Tuffin. 888-896 [doi]
- Design and Analysis of Hybrid Packet SchedulersDouglas Comer, Maxim Martynov. 897-905 [doi]
- Improved Smoothed Round Robin Schedulers for High-Speed Packet NetworksChuanxiong Guo. 906-914 [doi]
- Modeling Resource Sharing Dynamics of VoIP Users over a WLAN Using a Game-Theoretic ApproachEdson H. Watanabe, Daniel S. Menasché, Edmundo de Souza e Silva, Rosa Maria Meri Leão. 915-923 [doi]
- On the Levy-Walk Nature of Human MobilityInjong Rhee, Minsu Shin, Seongik Hong, Kyunghan Lee, Song Chong. 924-932 [doi]
- Joint Effects of Radio Channels and Node Mobility on Link Dynamics in Wireless NetworksWenye Wang, Ming Zhao 0001. 933-941 [doi]
- HERO: Online Real-Time Vehicle Tracking in ShanghaiHongzi Zhu, Yanmin Zhu, Minglu Li, Lionel M. Ni. 942-950 [doi]
- Wide-Area IP Network MobilityXin Hu, Erran L. Li, Zhuoqing Morley Mao, Yang Richard Yang. 951-959 [doi]
- Iso-Contour Queries and Gradient Descent with Guaranteed Delivery in Sensor NetworksRik Sarkar, Xianjin Zhu, Jie Gao, Leonidas J. Guibas, Joseph S. B. Mitchell. 960-967 [doi]
- iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor NetworksXiaoming Lu, Matt Spear, Karl N. Levitt, Shyhtsun Felix Wu. 968-976 [doi]
- Distributed Operator Placement and Data Caching in Large-Scale Sensor NetworksLei Ying, Zhen Liu, Donald F. Towsley, Cathy H. Xia. 977-985 [doi]
- Which Distributed Averaging Algorithm Should I Choose for my Sensor Network?Patrick Denantes, Florence Bénézit, Patrick Thiran, Martin Vetterli. 986-994 [doi]
- Feasible Rate Allocation in Wireless NetworksRamakrishna Gummadi, Kyomin Jung, Devavrat Shah, Ramavarapu Sreenivas. 995-1003 [doi]
- Proportional Fairness in Multi-Rate Wireless LANsErran L. Li, Martin Pal, Yang Richard Yang. 1004-1012 [doi]
- Topology Control for Maintaining Network Connectivity and Maximizing Network Capacity under the Physical ModelYan Gao, Jennifer C. Hou, Hoang Nguyen. 1013-1021 [doi]
- Starvation Modeling and Identification in Dense 802.11 Wireless Community NetworksCunqing Hua, Rong Zheng. 1022-1030 [doi]
- Inside the New Coolstreaming: Principles, Measurements and Performance ImplicationsBo Li, Susu Xie, Yang Qu, Gabriel Yik Keung, Chuang Lin, Jiangchuan Liu, Xinyan Zhang. 1031-1039 [doi]
- Achieving Honest Ratings with Reputation-Based Fines in Electronic MarketsThanasis G. Papaioannou, George D. Stamoulis. 1040-1048 [doi]
- Understanding Disconnection and Stabilization of ChordZhongmei Yao, Dmitri Loguinov. 1049-1057 [doi]
- On Reducing Mesh Delay for Peer-to-Peer Live StreamingDongni Ren, Y.-T. Hillman Li, Shueng-Han Gary Chan. 1058-1066 [doi]
- Incremental Bloom FiltersFang Hao, Murali S. Kodialam, T. V. Lakshman. 1067-1075 [doi]
- Resolving Anonymous Routers in Internet Topology Measurement StudiesMehmet Hadi Gunes, Kamil Saraç. 1076-1084 [doi]
- The Inframetric Model for the InternetPierre Fraigniaud, Emmanuelle Lebhar, Laurent Viennot. 1085-1093 [doi]
- Modeling the Evolution of Degree Correlation in Scale-Free Topology GeneratorsXiaoming Wang, Xiliang Liu, Dmitri Loguinov. 1094-1102 [doi]
- Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-Hop Wireless NetworksChanghee Joo, Xiaojun Lin, Ness B. Shroff. 1103-1111 [doi]
- Adaptive Frame Concatenation Mechanisms for QoS in Multi-Rate Wireless Ad Hoc NetworksMing Li, Hua Zhu, Yang Xiao, Imrich Chlamtac, Balakrishnan Prabhakaran. 1112-1120 [doi]
- Fast and Distributed Computation of Schedules in Wireless NetworksSupratim Deb, Karan Mangla, K. V. M. Naidu. 1121-1129 [doi]
- Joint Node Placement and Assignment for Throughput Optimization in Mobile Backbone NetworksAnand Srinivas, Eytan Modiano. 1130-1138 [doi]
- Multihop Local Pooling for Distributed Throughput Maximization in Wireless NetworksGil Zussman, Andrew Brzezinski, Eytan Modiano. 1139-1147 [doi]
- Capacity of Asynchronous Random-Access Scheduling in Wireless NetworksDeepti Chafekar, Dave Levin, V. S. Anil Kumar, Madhav V. Marathe, Srinivasan Parthasarathy 0002, Aravind Srinivasan. 1148-1156 [doi]
- Distributed Robust Optimization for Communication NetworksKai Yang, Yihong Wu, Jianwei Huang, Xiaodong Wang, Sergio Verdú. 1157-1165 [doi]
- Approximation Algorithms for Computing Capacity of Wireless Networks with SINR ConstraintsDeepti Chafekar, V. S. Anil Kumar, Madhav V. Marathe, Srinivasan Parthasarathy 0002, Aravind Srinivasan. 1166-1174 [doi]
- Light-Weight Contour Tracking in Wireless Sensor NetworksXianjin Zhu, Rik Sarkar, Jie Gao, Joseph S. B. Mitchell. 1175-1183 [doi]
- Essentia: Architecting Wireless Sensor Networks AsymmetricallyTian He, John A. Stankovic, Radu Stoleru, Yu Gu, Yafeng Wu. 1184-1192 [doi]
- Realistic and Efficient Multi-Channel Communications in Wireless Sensor NetworksYafeng Wu, John A. Stankovic, Tian He, Shan Lin. 1193-1201 [doi]
- Using Transmit-Only Sensors to Reduce Deployment Cost of Wireless Sensor NetworksBartlomiej Blaszczyszyn, Bozidar Radunovic. 1202-1210 [doi]
- Dynamic Jamming Mitigation for Wireless Broadcast NetworksJerry T. Chiang, Yih-Chun Hu. 1211-1219 [doi]
- A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi NetworksLiran Ma, Amin Y. Teymorian, Xiuzhen Cheng. 1220-1228 [doi]
- ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular CommunicationsRongxing Lu, Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen. 1229-1237 [doi]
- On Data-Centric Trust Establishment in Ephemeral Ad Hoc NetworksMaxim Raya, Panagiotis Papadimitratos, Virgil D. Gligor, Jean-Pierre Hubaux. 1238-1246 [doi]
- Adding Capacity Points to a Wireless Mesh Network Using Local SearchJoshua Robinson, Mustafa Uysal, Ram Swaminathan, Edward W. Knightly. 1247-1255 [doi]
- Association Control in Mobile Wireless NetworksMinkyong Kim, Zhen Liu, Srinivasan Parthasarathy 0002, Dimitrios E. Pendarakis, Hao Yang. 1256-1264 [doi]
- On the Performance of IEEE 802.11 under JammingEmrah Bayraktaroglu, Christopher King, Xin Liu, Guevara Noubir, Rajmohan Rajaraman, Bishal Thapa. 1265-1273 [doi]
- Measurement Based Analysis and Modeling of the Error Process in IEEE 802.15.4 LR-WPANsMuhammad Usman Ilyas, Hayder Radha. 1274-1282 [doi]
- Mobile Data Gathering with Space-Division Multiple Access in Wireless Sensor NetworksMiao Zhao, Ming Ma, Yuanyuan Yang. 1283-1291 [doi]
- A Distributed Optimization Algorithm for Multi-Hop Cognitive Radio NetworksYi Shi, Y. Thomas Hou. 1292-1300 [doi]
- Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio NetworksRahul Urgaonkar, Michael J. Neely. 1301-1309 [doi]
- Cooperative Opportunistic Routing Using Transmit Diversity in Wireless Mesh NetworksMathias Kurth, Anatolij Zubow, Jens-Peter Redlich. 1310-1318 [doi]
- Towards Optimal Resource Allocation in Partial-Fault Tolerant ApplicationsNikhil Bansal, Ranjita Bhagwan, Navendu Jain, Yoonho Park, Deepak S. Turaga, Chitra Venkatramani. 1319-1327 [doi]
- Optimal Geographic Routing for Wireless Networks with Near-Arbitrary Holes and TrafficSundar Subramanian, Sanjay Shakkottai, Piyush Gupta. 1328-1336 [doi]
- Link State Routing Overhead in Mobile Ad Hoc Networks: A Rate-Distortion FormulationDi Wang, Alhussein A. Abouzeid. 1337-1345 [doi]
- Circular Sailing Routing for Wireless NetworksFan Li, Yu Wang. 1346-1354 [doi]
- Multi-Channel Live P2P Streaming: Refocusing on ServersChuan Wu, Baochun Li, Shuqiao Zhao. 1355-1363 [doi]
- Stable Peers: Existence, Importance, and Application in Peer-to-Peer Live Video StreamingFeng Wang, Jiangchuan Liu, Yongqiang Xiong. 1364-1372 [doi]
- FLoD: A Framework for Peer-to-Peer 3D StreamingShun-Yun Hu, Ting-Hao Huang, Shao-Chen Chang, Wei-Lun Sung, Jehn-Ruey Jiang, Bing-Yu Chen. 1373-1381 [doi]
- Snoogle: A Search Engine for the Physical WorldHaodong Wang, Chiu Chiang Tan, Qun Li. 1382-1390 [doi]
- Towards a Theory of Robust Localization Against Malicious Beacon NodesSheng Zhong, Murtuza Jadliwala, Shambhu Upadhyaya, Chunming Qiao. 1391-1399 [doi]
- Optimal Sleep-Wake Scheduling for Quickest Intrusion Detection Using Wireless Sensor NetworksPremkumar Premkumar, Anurag Kumar. 1400-1408 [doi]
- An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution AttacksZhen Yu, Yawen Wei, Bhuvaneswari Ramkumar, Yong Guan. 1409-1417 [doi]
- Lightweight and Compromise-Resilient Message Authentication in Sensor NetworksWensheng Zhang, Nalin Subramanian, Guiling Wang. 1418-1426 [doi]
- Opportunistic Spectrum Access in Cognitive Radio NetworksSenhua Huang, Xin Liu, Zhi Ding. 1427-1435 [doi]
- MAC for Networks with Multipacket Reception Capability and Spatially Distributed NodesGuner D. Celik, Gil Zussman, Wajahat F. Khan, Eytan Modiano. 1436-1444 [doi]
- How Physical Carrier Sense Affects System Throughput in IEEE 802.11 Wireless NetworksZheng Zeng, Yong Yang, Jennifer C. Hou. 1445-1453 [doi]
- Channel Aware Distributed Scheduling for Exploiting Multi-Receiver Diversity and Multiuser Diversity in Ad-Hoc Networks: A Unified PHY/MAC ApproachDong Zheng, Min Cao, Junshan Zhang, P. R. Kumar. 1454-1462 [doi]
- Pricing, Competition, and Routing for Selfish and Strategic Nodes in Multi-Hop Relay NetworksYufang Xi, Edmund M. Yeh. 1463-1471 [doi]
- Guaranteeing Quality of Service to Peering TrafficRui Zhang-Shen, Nick McKeown. 1472-1480 [doi]
- A Stateless and Light-Weight Bandwidth Management Mechanism for Elastic TrafficRavi S. Prasad, Marina Thottan, T. V. Lakshman. 1481-1489 [doi]
- Stability and Delay Bounds in Heterogeneous Networks of Aggregate SchedulersGianluca Rizzo, Jean-Yves Le Boudec. 1490-1498 [doi]
- Efficient Broadcast in MANETs Using Network Coding and Directional AntennasShuhui Yang, Jie Wu, Mihaela Cardei. 1499-1507 [doi]
- Efficient Network Coded Data Transmissions in Disruption Tolerant NetworksYunfeng Lin, Baochun Li, Ben Liang. 1508-1516 [doi]
- AdapCode: Adaptive Network Coding for Code Updates in Wireless Sensor NetworksI-Hong Hou, Yu-En Tsai, Tarek F. Abdelzaher, Indranil Gupta. 1517-1525 [doi]
- Continuous Network Coding in Wireless Relay NetworksWei Pu, Chong Luo, Shipeng Li, Chang Wen Chen. 1526-1534 [doi]
- Competitive Analysis of Opportunistic Spectrum Access StrategiesNicholas B. Chang, Mingyan Liu. 1535-1542 [doi]
- Globally Optimal Channel Assignment for Non-Cooperative Wireless NetworksFan Wu, Sheng Zhong, Chunming Qiao. 1543-1551 [doi]
- On Wireless Social Community NetworksMohammad Hossein Manshaei, Julien Freudiger, Márk Félegyházi, Peter Marbach, Jean-Pierre Hubaux. 1552-1560 [doi]
- Prioritized Repeated Eliminations Multiple Access: A Novel Protocol for Wireless NetworksGreger Wikstrand, Thomas Nilsson, Mark S. Dougherty. 1561-1569 [doi]
- Index Policies for Real-Time Multicast Scheduling for Wireless Broadcast SystemsVivek Raghunathan, Vivek S. Borkar, Min Cao, P. R. Kumar. 1570-1578 [doi]
- Real-Time Video Multicast in WiMAX NetworksSupratim Deb, Sharad Jaiswal, Kanthi Nagaraj. 1579-1587 [doi]
- Cross-Monotonic MulticastZongpeng Li. 1588-1596 [doi]
- Multicast Tree Diameter for Dynamic Distributed Interactive ApplicationsKnut-Helge Vik, Pål Halvorsen, Carsten Griwodz. 1597-1605 [doi]
- Capacity of Hybrid Cellular-Ad Hoc Data NetworksLap Kong Law, Srikanth V. Krishnamurthy, Michalis Faloutsos. 1606-1614 [doi]
- Design Guidelines for Routing Metrics in Multihop Wireless NetworksYaling Yang, Jun Wang. 1615-1623 [doi]
- Building Robust Nomadic Wireless Mesh Networks Using Directional AntennasQunfeng Dong, Yigal Bejerano. 1624-1632 [doi]
- Measurement and Modeling of the Origins of Starvation in Congestion Controlled Mesh NetworksJingpu Shi, Omer Gurewitz, Vincenzo Mancuso, Joseph Camp, Edward W. Knightly. 1633-1641 [doi]
- A Device-Independent Router ModelRoman Chertov, Sonia Fahmy, Ness B. Shroff. 1642-1650 [doi]
- GRE Encapsulated Multicast Probing: A Scalable Technique for Measuring One-Way LossYu Gu, Lee Breslau, Nick G. Duffield, Subhabrata Sen. 1651-1659 [doi]
- Complex Network Measurements: Estimating the Relevance of Observed PropertiesMatthieu Latapy, Clémence Magnien. 1660-1668 [doi]
- Delay Bounds under Arbitrary Multiplexing: When Network Calculus Leaves You in the Lurch..Jens B. Schmitt, Frank A. Zdarsky, Markus Fidler. 1669-1677 [doi]
- Sampling Strategies for Epidemic-Style Information DisseminationMilan Vojnovic, Varun Gupta, Thomas Karagiannis, Christos Gkantsidis. 1678-1686 [doi]
- A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh NetworksJinyuan Sun, Chi Zhang, Yuguang Fang. 1687-1695 [doi]
- Exact Modeling of Propagation for Permutation-Scanning WormsParbati K. Manna, Shigang Chen, Sanjay Ranka. 1696-1704 [doi]
- Distributed Spatial Anomaly DetectionParminder Chhabra, Clayton Scott, Eric D. Kolaczyk, Mark Crovella. 1705-1713 [doi]
- HyperCBR: Large-Scale Content-Based Routing in a Multidimensional SpaceStefano Castelli, Paolo Costa, Gian Pietro Picco. 1714-1722 [doi]
- Searching for Rare Objects Using Index ReplicationKrishna Puttaswamy, Alessandra Sala, Ben Y. Zhao. 1723-1731 [doi]
- Bandwidth-Aware Routing in Overlay NetworksSung-Ju Lee, Sujata Banerjee, Puneet Sharma, Praveen Yalagandula, Sujoy Basu. 1732-1740 [doi]
- Minerva: Learning to Infer Network Path PropertiesRita H. Wouhaybi, Puneet Sharma, Sujata Banerjee, Andrew T. Campbell. 1741-1749 [doi]
- Design of Robust Random Access Protocols For Wireless Networks Using Game Theoretic ModelsYounggeun Cho, Chan-Soo Hwang, Fouad A. Tobagi. 1750-1758 [doi]
- A Stochastic Evolutionary Game of Energy Management in a Distributed Aloha NetworkEitan Altaian, Yezekael Hayel. 1759-1767 [doi]
- Detecting 802.11 MAC Layer Spoofing Using Received Signal StrengthYong Sheng, Keren Tan, Guanling Chen, David Kotz, Andrew Campbell. 1768-1776 [doi]
- Wireless Medium Access via Adaptive Backoff: Delay and Loss MinimizationGardar Hauksson, Murat Alanyali. 1777-1785 [doi]
- Beyond TCAMs: An SRAM-Based Parallel Multi-Pipeline Architecture for Terabit IP LookupWeirong Jiang, Qingbo Wang, Viktor K. Prasanna. 1786-1794 [doi]
- A Memory-Efficient Hashing by Multi-Predicate Bloom Filters for Packet ClassificationHeeyeol Yu, Rabi N. Mahapatra. 1795-1803 [doi]
- Time Blocking Analysis in Time-Driven Switching NetworksViet Thang Nguyen, Miklós Telek. 1804-1812 [doi]
- Run-Time System for Scalable Network ServicesUpendra Shevade, Ravi Kokku, Harrick M. Vin. 1813-1821 [doi]
- On Optimal Sizing of Tiered Network ServicesQian Lv, George N. Rouskas. 1822-1830 [doi]
- Maximum Coverage at Minimum Cost for Multi-Domain IP/MPLS NetworksMarcelo Yannuzzi, Xavier Masip-Bruin, René Serral-Gracià, Eva Marín-Tordera, Alexander Sprintson, Ariel Orda. 1831-1839 [doi]
- Non-Metric Coordinates for Predicting Network ProximityPeter B. Key, Laurent Massoulié, Dan-Cristian Tomozei. 1840-1848 [doi]
- Detecting Anomalies Using End-to-End Path MeasurementsK. V. M. Naidu, Debmalya Panigrahi, Rajeev Rastogi. 1849-1857 [doi]
- Design and Evaluation of a Routing-Informed Cooperative MAC Protocol for Ad Hoc NetworksHermann S. Lichte, Stefan Valentin, Holger Karl, Imad Aad, Luis Loyola, Jörg Widmer. 1858-1866 [doi]
- Residual Link Lifetime Prediction with Limited Information Input in Mobile Ad Hoc NetworksZygmunt J. Haas, Edward Y. Hua. 1867-1875 [doi]
- Robust Distributed Spectrum Sensing in Cognitive Radio NetworksRuiliang Chen, Jung Min Park, Kaigui Bian. 1876-1884 [doi]
- Spectrum Sharing in Cognitive Radio NetworksFan Wang, Marwan Krunz, Shuguang Cui. 1885-1893 [doi]
- Power-Adjusted Random Access to a Wireless ChannelYoung-June Choi, Kang G. Shin. 1894-1902 [doi]
- A Game-Theoretic Analysis of QoS in Wireless MACPavan Nuggehalli, Mahasweta Sarkar, Kishor Kulkarni, Ramesh R. Rao. 1903-1911 [doi]
- Optimizing Distributed MAC Protocol for Multi-Hop Ultra-Wideband Wireless NetworksLin X. Cai, Lin Cai, Xuemin Shen, Jon W. Mark. 1912-1920 [doi]
- Exploiting Multi-Channel Diversity in Spectrum-Agile NetworksAlexander W. Min, Kang G. Shin. 1921-1929 [doi]
- iLOC: An invisible LOCalization Attack to Internet Threat Monitoring SystemsXun Wang, Wei Yu, Xinwen Fu, Dong Xuan, Wei Zhao. 1930-1938 [doi]
- Cyber-Fraud is One Typo AwayAnirban Banerjee, Dhiman Barman, Michalis Faloutsos, Laxmi N. Bhuyan. 1939-1947 [doi]
- A New Perspective on Internet Security using InsuranceJean-Chrysostome Bolot, Marc Lelarge. 1948-1956 [doi]
- A Novel Quantitative Approach For Measuring Network SecurityMohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan. 1957-1965 [doi]
- Task Scheduling and Lightpath Establishment in Optical GridsXin Liu, Wei Wei, Chunming Qiao, Ting Wang, Weisheng Hu, Wei Guo, Min-You Wu. 1966-1974 [doi]
- On Transient-Constrained Wavelength AssignmentGuangzhi Li, Angela L. Chiu, Robert D. Doverspike, Martin Birk, Don Husa, Nick Zanki. 1975-1983 [doi]
- Theory of Linear Games with Constraints and Its Application to Power Control of Optical NetworksQuanyan Zhu, Lacra Pavel. 1984-1992 [doi]
- A Three-Stage Load-Balancing SwitchXiaolin Wang, Yan Cai, Sheng Xiao, Weibo Gong. 1993-2001 [doi]
- The Kraft s Inequality of Scheduling for Packet-Switched Clos NetworksTony Tong Lee. 2002-2010 [doi]
- Limit Theorems for Degree of Coverage and Lifetime in Large Sensor NetworksGabriel Paillard, Vlady Ravelomanana. 2011-2019 [doi]
- A Novel On-Demand Framework for Collaborative Object Detection in Sensor NetworksGuanqun Yang, Vinod Shukla, Daji Qiao. 2020-2028 [doi]
- Towards Energy-Optimal and Reliable Data Collection via Collision-Free Scheduling in Wireless Sensor NetworksHuang Lee, Abtin Keshavarzian. 2029-2037 [doi]
- Cross-Layer Quality of Service Support for UWB Wireless Multimedia Sensor NetworksTommaso Melodia, Ian F. Akyildiz. 2038-2046 [doi]
- A Singlehop Collaborative Feedback Primitive for Wireless Sensor NetworksMurat Demirbas, Onur Soysal, Muzammil Hussain. 2047-2055 [doi]
- A New ACK Policy To Mitigate the Effects of Coexisting IEEE 802.11/802.11e DevicesHaithem Al-Mefleh, J. Morris Chang. 2056-2064 [doi]
- An Empirical Activity Model for WLAN UsersCaleb T. Phillips, Suresh Singh. 2065-2073 [doi]
- Opportunistic Waiver of Data Reception for Exploiting Multiuser Diversity in the Uplink of IEEE 802.11 WLANSeong-il Hahm, Jongwon Lee, Chong-kwon Kim. 2074-2082 [doi]
- A Practical SNR-Guided Rate AdaptationJiansong Zhang, Kun Tan, Jun Zhao, Haitao Wu, Yongguang Zhang. 2083-2091 [doi]
- Approximation Algorithms for Scheduling Real-Time Multicast Flows in Wireless LANsYigal Bejerano, Dongwook Lee, Prasun Sinha, Lisa Zhang. 2092-2100 [doi]
- Delay Tolerant Collaborations among Campus-Wide Wireless UsersXuwen Yu, Surendar Chandra. 2101-2109 [doi]
- DRIP: A Dynamic VoRonoi RegIons-Based Publish/Subscribe Protocol in Mobile NetworksQuan Yuan, Jie Wu. 2110-2118 [doi]
- Information Concealing GamesSaswati Sarkar, Eitan Altman, Rachid El Azouzi, Yezekael Hayel. 2119-2127 [doi]
- SVATS: A Sensor-Network-Based Vehicle Anti-Theft SystemHui Song, Sencun Zhu, Guohong Cao. 2128-2136 [doi]
- Spatial Signatures for Lightweight Security in Wireless Sensor NetworksLifeng Sang, Anish Arora. 2137-2145 [doi]
- ACK-Clocking Dynamics: Modelling the Interaction between Windows and the NetworkKrister Jacobsson, Lachlan L. H. Andrew, Ao Tang, Karl Henrik Johansson, Håkan Hjalmarsson, Steven H. Low. 2146-2152 [doi]
- Maximal Recovery Network Coding under Topology ConstraintKiran Misra, Shirish S. Karande, Hayder Radha. 2153-2161 [doi]
- Is Random Network Coding Helpful in WiMAX?Jin Jin, Baochun Li, Taegon Kong. 2162-2170 [doi]
- Reliability Gain of Network Coding in Lossy Wireless NetworksMajid Ghaderi, Donald F. Towsley, James F. Kurose. 2171-2179 [doi]
- Making Large Scale Deployment of RCP Practical for Real NetworksChia-Hui Tai, Jiang Zhu, Nandita Dukkipati. 2180-2188 [doi]
- A Decomposition Method for Transmission Scheduling in Multi-Channel Wireless Sensor NetworksIoannis Ch. Paschalidis, Wei Lai, Xiangdong Song. 2189-2197 [doi]
- Scalable Localization with Mobility Prediction for Underwater Sensor NetworksZhong Zhou, Jun-Hong Cui, Amvrossios Bagtzoglou. 2198-2206 [doi]
- Asynchronous Sampling Benefits Wireless Sensor NetworksJing Wang, Yonghe Liu, Sajal K. Das. 2207-2215 [doi]
- Sensor-Aided Overlay Deployment and Relocation for Vast-Scale Sensor NetworksGuanqun Yang, Bin Tong, Daji Qiao, Wensheng Zhang. 2216-2224 [doi]
- Utility-Driven Spatiotemporal Sampling Using Mobile SensorsYang Yu, Loren J. Rittle. 2225-2233 [doi]
- Routing in Outer SpaceAlessandro Mei, Julinda Stefa. 2234-2242 [doi]
- Location-Dependent Network Performance and Design Strategies for Wireless Mesh NetworksTehuang Liu, Wanjiun Liao. 2243-2251 [doi]
- An Optimization Framework for Opportunistic Multipath Routing in Wireless Mesh NetworksBozidar Radunovic, Christos Gkantsidis, Peter B. Key, Pablo Rodriguez. 2252-2260 [doi]
- A New Channel Assignment Mechanism for Rural Wireless Mesh NetworksPartha Dutta, Sharad Jaiswal, Debmalya Panigrahi, Rajeev Rastogi. 2261-2269 [doi]
- DSCM: An Energy-Efficient and Rate-Optimal Multicast Protocol for Multihop Wireless Networks Using Distributed Source CodingMina Sartipi, Badri N. Vellambi, Nazanin Rahnavard, Faramarz Fekri. 2270-2278 [doi]
- Joint Traffic Routing and Distribution of Security Services in High Speed NetworksAndreas Hess, Sudipta Sengupta, Vijay P. Kumar. 2279-2287 [doi]
- L+1-MWM: A Fast Pattern Matching Algorithm for High-Speed Packet FilteringYoon Ho Choi, Moon-Young Jung, Seung-Woo Seo. 2288-2296 [doi]
- Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS AttacksUdi Ben-Porat, Anat Bremler-Barr, Hanoch Levy. 2297-2305 [doi]
- Spatial-Temporal Characteristics of Internet Malicious SourcesZesheng Chen, Chuanyi Ji, Paul Barford. 2306-2314 [doi]
- DAWN: A Novel Strategy for Detecting ASCII Worms in NetworksParbati K. Manna, Sanjay Ranka, Shigang Chen. 2315-2323 [doi]
- Maximizing Restorable Throughput in MPLS NetworksReuven Cohen, Gabi Nakibly. 2324-2332 [doi]
- A Backup Route Aware Routing Protocol - Fast Recovery from Transient Routing FailuresFeng Wang, Lixin Gao. 2333-2341 [doi]
- Policy-Aware Topologies for Efficient Inter-Domain Routing EvaluationsYihua He, Michalis Faloutsos, Srikanth V. Krishnamurthy, Marek Chrobak. 2342-2350 [doi]
- A Distributed Minimum-Distortion Routing Algorithm with In-Network Data ProcessingRamin Khalili, James F. Kurose. 2351-2359 [doi]
- Designing a Fault-Tolerant Network Using Valiant Load-BalancingRui Zhang-Shen, Nick McKeown. 2360-2368 [doi]
- Cooperative Routing in Multi-Source Multi-Destination Multi-Hop Wireless NetworksJin Zhang, Qian Zhang. 2369-2377 [doi]
- On a Non-Linear Optimization Approach for Proportional Fairness in Ad-Hoc Wireless NetworksNikhil Singh, Ramavarapu S. Sreenivas. 2378-2386 [doi]
- Exploiting Heavy-Tailed Statistics for Predictable QoS Routing in Ad Hoc Wireless NetworksSong Luo, Jason H. Li, Kihong Park, Renato Levy. 2387-2395 [doi]
- Beyond Proportional Fairness: A Resource Biasing Framework for Shaping Throughput Profiles in Multihop Wireless NetworksSumit Singh, Upamanyu Madhow, Elizabeth M. Belding. 2396-2404 [doi]
- Resource Allocation for Downlink Statistical Multiuser QoS Provisionings in Cellular Wireless NetworksQinghe Du, Xi Zhang. 2405-2413 [doi]
- State-Dependent Proportional Fair Scheduling Algorithms for Wireless Forward Link Data ServicesJung-Tsung Tsai. 2414-2422 [doi]
- QoS Performance Analysis of Cognitive Radio-Based Virtual Wireless NetworksBrent Ishibashi, Nizar Bouabdallah, Raouf Boutaba. 2423-2431 [doi]
- An Explanation for Unexpected 802.11 Outdoor Link-level Measurement ResultsDomenico Giustiniano, Giuseppe Bianchi, Luca Scalia, Ilenia Tinnirello. 2432-2440 [doi]
- Design of a Channel Characteristics-Aware Routing ProtocolRupa Krishnan, Ashish Raniwala, Tzi-cker Chiueh. 2441-2449 [doi]
- BAKE: A Balanced Kautz Tree Structure for Peer-to-Peer NetworksDeke Guo, Yunhao Liu, Xiangyang Li. 2450-2457 [doi]
- Maximizing Resilient Throughput in Peer-to-Peer Network: A Generalized Flow ApproachBin Chang, Yi Cui, Yuan Xue. 2458-2466 [doi]
- Exploiting the Properties of Query Workload and File Name Distributions to Improve P2P Synopsis-Based SearchesWilliam Acosta, Surendar Chandra. 2467-2475 [doi]
- Towards Collaborative User-Level Overlay Fault DiagnosisYongning Tang, Ehab Al-Shaer. 2476-2484 [doi]
- A Trust and Reputation based Anti-SPIM MethodJun Bi, Jianping Wu, Wenmao Zhang. 2485-2493 [doi]