Abstract is missing.
- SolarCode: Utilizing Erasure Codes for Reliable Data Delivery in Solar-powered Wireless Sensor NetworksYong Yang, Lu Su, Yan Gao, Tarek F. Abdelzaher. 1-5 [doi]
- Improved Multi-criteria Spanners for Ad-Hoc Networks Under Energy and Distance MetricsMichael Segal, Hanan Shpungin. 6-10 [doi]
- Joint Random Access and Power Selection for Maximal Throughput in Wireless NetworksYan Gao, Zheng Zeng, P. R. Kumar. 11-15 [doi]
- Maximizing Energy Efficiency for Convergecast via Joint Duty Cycle and Route OptimizationWenjie Zeng, Anish Arora, Ness B. Shroff. 16-20 [doi]
- Routing and Scheduling for Energy and Delay Minimization in the Powerdown ModelMatthew Andrews, Antonio Fernández, Lisa Zhang, Wenbo Zhao. 21-25 [doi]
- A Secondary Market for SpectrumHong Xu, Jin Jin, Baochun Li. 31-35 [doi]
- Change Management in Enterprise IT Systems: Process Modeling and Capacity-optimal SchedulingPraveen Kumar Muthuswamy, Koushik Kar, Sambit Sahu, Prashant Pradhan, Saswati Sarkar. 36-40 [doi]
- Socially-Aware Network Design GamesJocelyne Elias, Fabio Martignon, Konstantin Avrachenkov, Giovanni Neglia. 41-45 [doi]
- Interactions, Competition and Innovation in a Service-Oriented Internet: An Economic ModelZhi-Li Zhang, Papak Nabipay, Andrew M. Odlyzko, Roch Guérin. 46-50 [doi]
- Capacity Region of a Wireless Mesh Backhaul Network over the CSMA/CA MACYu Cheng, Hongkun Li, Peng-Jun Wan, Xinbing Wang. 51-55 [doi]
- PinPoint Time Difference of Arrival for Unsynchronized 802.11 Wireless CardsMatthew Mah, Neha Gupta, Ashok K. Agrawala. 56-60 [doi]
- Sample Path Bounds for Long Memory FBM TrafficAmr Rizk, Markus Fidler. 61-65 [doi]
- alpha-Optimal User Association and Cell Load Balancing in Wireless NetworksHongseok Kim, Gustavo de Veciana, Xiangying Yang. 66-70 [doi]
- On Providing Non-uniform Scheduling Guarantees in a Wireless NetworkVartika Bhandari, Nitin H. Vaidya. 71-75 [doi]
- Measuring Availability in the Domain Name SystemCasey T. Deccio, Jeff Sedayao, Krishna Kant, Prasant Mohapatra. 76-80 [doi]
- Topology Discovery for Virtual Local Area NetworksHassan Gobjuka. 81-85 [doi]
- High Performance Dictionary-Based String Matching for Deep Packet InspectionYi-Hua Edward Yang, Hoang Le, Viktor K. Prasanna. 86-90 [doi]
- Network Coding Tomography for Network FailuresHongyi Yao, Sidharth Jaggi, Minghua Chen. 91-95 [doi]
- Tracking Skype VoIP Calls Over The InternetHemant Sengar, Zhen Ren, Haining Wang, Duminda Wijesekera, Sushil Jajodia. 96-100 [doi]
- Recognizing Exponential Inter-Contact Time in VANETsHongzi Zhu, Luoyi Fu, Guangtao Xue, Yanmin Zhu, Minglu Li, Lionel M. Ni. 101-105 [doi]
- Optimal Activation and Transmission Control in Delay Tolerant NetworksEitan Altman, Amar Prakash Azad, Tamer Basar, Francesco De Pellegrini. 106-110 [doi]
- PeopleRank: Social Opportunistic ForwardingAbderrahmen Mtibaa, Martin May, Christophe Diot, Mostafa H. Ammar. 111-115 [doi]
- Assessing the VANET s Local Information Storage Capability under Different Traffic MobilityBojin Liu, Behrooz Khorashadi, Dipak Ghosal, Chen-Nee Chuah, Michael Zhang. 116-120 [doi]
- Dynamic Control of Coding in Delay Tolerant NetworksEitan Altman, Francesco De Pellegrini, Lucile Sassatelli. 121-125 [doi]
- On the Fundamental Limits of Broadcasting in Wireless Mobile NetworksGiovanni Resta, Paolo Santi. 126-130 [doi]
- On Delay Constrained Multicast Capacity of Large-Scale Mobile Ad-Hoc NetworksShan Zhou, Lei Ying. 131-135 [doi]
- Throughput and Delay Analysis on Uncoded and Coded Wireless Broadcast with Hard Deadline ConstraintsXiaohang Li, Chih-Chun Wang, Xiaojun Lin. 136-140 [doi]
- On the Impact of Mobility on Multicast Capacity of Wireless NetworksJubin Jose, Ahmed Abdel-Hadi, Piyush Gupta, Sriram Vishwanath. 141-145 [doi]
- Deterministic Broadcast on Multiple Access ChannelsLakshmi Anantharamu, Bogdan S. Chlebus, Dariusz R. Kowalski, Mariusz A. Rokicki. 146-150 [doi]
- Making the Case for Random Access Scheduling in Wireless Multi-hop NetworksApoorva Jindal, Ann Arbor, Konstantinos Psounis. 151-155 [doi]
- From Theory to Practice: Evaluating Static Channel Assignments on a Wireless Mesh NetworkDaniel Wu, Prasant Mohapatra. 156-160 [doi]
- Optimal Solutions for Single Fault Localization in Two Dimensional Lattice NetworksJános Tapolcai, Lajos Rónyai, Pin-Han Ho. 161-165 [doi]
- An Experimental Case for SIMO Random Access in Multi-hop Wireless NetworksAhmed Khattab. 166-170 [doi]
- SlideOR: Online Opportunistic Network Coding in Wireless Mesh NetworksYunfeng Lin, Ben Liang, Baochun Li. 171-175 [doi]
- Estimating Link Reliability in Wireless Networks: An Empirical Study and Interference ModelingShinuk Woo, Hwangnam Kim. 176-180 [doi]
- Cross-layer Optimization for Wireless Networks with Deterministic Channel ModelsZiyu Shao, Minghua Chen, Salman Avestimehr, Shuo-Yen Robert Li. 181-185 [doi]
- Non-Preemptive Buffer Management for Latency Sensitive PacketsMoran Feldman, Joseph Naor. 186-190 [doi]
- A Frequency Domain Model to Predict the Estimation Accuracy of Packet SamplingLuigi Alfredo Grieco, Chadi Barakat. 191-195 [doi]
- On Global Modeling of Backbone Network TrafficStilian Stoev, George Michailidis, Joel Vaughan. 196-200 [doi]
- Path Stitching: Internet-Wide Path and Delay Estimation from Existing MeasurementsD. K. Lee, Keon Jang, Changhyun Lee, Gianluca Iannaccone, Sue B. Moon. 201-205 [doi]
- Tracking Long Duration Flows in Network TrafficAiyou Chen, Yu Jin, Jin Cao. 206-210 [doi]
- Tracking Quantiles of Network Data Streams with Dynamic OperationsJin Cao, Li (Erran) Li, Aiyou Chen, Tian Bu. 211-215 [doi]
- Predicting Prefix Availability in the InternetRavish Khosla, Sonia Fahmy, Y. Charlie Hu, Jennifer Neville. 216-220 [doi]
- Link Homophily in the Application Layer and its Usage in Traffic ClassificationBrian Gallagher, Marios Iliofotou, Tina Eliassi-Rad, Michalis Faloutsos. 221-225 [doi]
- Layered Internet Video Engineering (LIVE): Network-Assisted Bandwidth Sharing and Transient Loss Protection for Scalable Video StreamingXiaoqing Zhu, Rong Pan, Nandita Dukkipati, Vijay Subramanian, Flavio Bonomi. 226-230 [doi]
- Scalable Modulation for Scalable Wireless VideocastLin Cai, Yuanqian Luo, Siyuan Xiang, Jianping Pan. 231-235 [doi]
- Channel-based Unidirectional Stream Protocol (CUSP)Wesley W. Terpstra, Christof Leng, Max Lehn, Alejandro P. Buchmann. 236-240 [doi]
- Buffer Management for Aggregated Streaming Data with Packet DependenciesGabriel Scalosub, Peter Marbach, Jörg Liebeherr. 241-245 [doi]
- Characterizing Interactive Behavior in a Large-Scale Operational IPTV EnvironmentVijay Gopalakrishnan, Rittwik Jana, Ralph Knag, K. K. Ramakrishnan, Deborah F. Swayne, Vinay A. Vaishampayan. 246-250 [doi]
- Lightweight Mutual Authentication and Ownership Transfer for RFID SystemsLars Kulseng, Zhen Yu, Yawen Wei, Yong Guan. 251-255 [doi]
- CoTrack: A Framework for Tracking Dynamic Features with Static and Mobile SensorsThanh Dang, Nirupama Bulusu, Wu-chi Feng, Sergey Frolov. 256-260 [doi]
- Mobility Assisted Secret Key Generation Using Wireless Link SignaturesJunxing Zhang, Sneha Kumar Kasera, Neal Patwari. 261-265 [doi]
- A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc NetworksNatalia Castro Fernandes, Marcelo D. D. Moreira, Otto Carlos Muniz Bandeira Duarte. 266-270 [doi]
- Q-CSMA: Queue-Length Based CSMA/CA Algorithms for Achieving Maximum Throughput and Low Delay in Wireless NetworksJian Ni, Bo Tan, R. Srikant. 271-275 [doi]
- Linear Programming Models For Multi-Channel P2P Streaming SystemsMiao Wang, Lisong Xu, Byrav Ramamurthy. 276-280 [doi]
- Understanding Sub-stream Scheduling in P2P Hybrid Live Streaming SystemsZhenjiang Li, Danny H. K. Tsang, Wang-Chien Lee. 281-285 [doi]
- A Balanced Consistency Maintenance Protocol for Structured P2P SystemsYi Hu, Min Feng, Laxmi N. Bhuyan. 286-290 [doi]
- Network Positioning from the Edge - An Empirical Study of the Effectiveness of Network Positioning in P2P SystemsDavid R. Choffnes, Mario Sanchez, Fabian E. Bustamante. 291-295 [doi]
- MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer StreamingQiyan Wang, Long Vu, Klara Nahrstedt, Himanshu Khurana. 296-300 [doi]
- BGP Skeleton - An Alternative to iBGP Route ReflectionBakr Sarakbi, Stéphane Maag. 301-305 [doi]
- Back-Pressure Routing for Intermittently Connected NetworksJung Ryu, Lei Ying, Sanjay Shakkottai. 306-310 [doi]
- Performance Modeling and Analysis of Multi-Path Routing in Integrated Fiber-Wireless NetworksJianping Wang, Kui Wu, Shiliang Li, Chunming Qiao. 311-315 [doi]
- A Theoretical Framework for Hierarchical Routing GamesVijay Kamble, Eitan Altman, Rachid El Azouzi, Vinod Sharma. 316-320 [doi]
- Evaluating Potential Routing Diversity for Internet Failure RecoveryChengchen Hu, Kai Chen, Yan Chen, Bin Liu. 321-325 [doi]
- Malicious Hubs: Detecting Abnormally Malicious Autonomous SystemsAndrew J. Kalafut, Craig A. Shue, Minaxi Gupta. 326-330 [doi]
- An Optimal Key Distribution Scheme for Secure Multicast Group CommunicationZhibin Zhou, Dijiang Huang. 331-335 [doi]
- Sybil Attacks Against Mobile Users: Friends and Foes to the RescueDaniele Quercia, Stephen Hailes. 336-340 [doi]
- Towards Automatic Creation of Usable Security ConfigurationBin Zhang, Ehab Al-Shaer. 341-345 [doi]
- PhishNet: Predictive Blacklisting to Detect Phishing AttacksPawan Prakash, Manish Kumar, Ramana Rao Kompella, Minaxi Gupta. 346-350 [doi]
- Reliable GPS-Free Double-Ruling-Based Information Brokerage in Wireless Sensor NetworksChia-Hung Lin, Jian-Jhih Kuo, Ming-Jer Tsai. 351-355 [doi]
- Capacity of Data Collection in Arbitrary Wireless Sensor NetworksSiyuan Chen, ShaoJie Tang, Minsu Huang, Yu Wang 0003. 356-360 [doi]
- Critical Sensor Density for Partial Connectivity in Large Area Wireless Sensor NetworksHaiyan Cai, Xiaohua Jia, Mo Sha. 361-365 [doi]
- VBS: Maximum Lifetime Sleep Scheduling for Wireless Sensor Networks Using Virtual BackbonesYaxiong Zhao, Jie Wu, Feng Li, Sanglu Lu. 366-370 [doi]
- Handling Triple Hidden Terminal Problems for Multi-Channel MAC in Long-Delay Underwater Sensor NetworksZhong Zhou, Zheng Peng, Jun-Hong Cui, Zaihan Jiang. 371-375 [doi]
- Mobile Real-Time Group Communication ServiceZohar Naor, Sajal K. Das. 376-380 [doi]
- Spatio-Temporal Fusion for Small-scale Primary Detection in Cognitive Radio NetworksAlexander W. Min, Xinyu Zhang, Kang G. Shin. 381-385 [doi]
- CapAuth: A Capability-based Handover SchemeLiang Cai, Sridhar Machiraju, Hao Chen. 386-390 [doi]
- Enhancing Wireless TCP: A Serialized-Timer ApproachChengdi Lai, Ka-Cheong Leung, Victor O. K. Li. 391-395 [doi]
- On the Cost of Knowledge of Mobility in Dynamic NetworksDi Wang, Alhussein A. Abouzeid. 396-400 [doi]
- A Hybrid Decision Approach for the Association Problem in Heterogeneous NetworksSalah-Eddine Elayoubi, Eitan Altman, Majed Haddad, Zwi Altman. 401-405 [doi]
- Resource Allocation over Network Dynamics without Timescale SeparationAlexandre Proutiere, Yung Yi, Tian Lan, Mung Chiang. 406-410 [doi]
- User-Centric Network Fairness through Connection-Level ControlAndrés Ferragut, Fernando Paganini. 411-415 [doi]
- Overcoming Failures: Fault-tolerance and Logical Centralization in Clean-Slate Network ManagementHammad Iqbal, Taieb Znati. 416-420 [doi]
- Safeguarding Data Delivery by Decoupling Path Propagation and AdoptionMingui Zhang, Bin Liu, Beichuan Zhang. 421-425 [doi]
- Distributed Dynamic Speed ScalingRade Stanojevic, Robert Shorten. 426-430 [doi]
- Survivable Distributed Storage with Progressive DecodingYunghsiang Han, Oluwasoji Omiwade, Rong Zheng. 431-435 [doi]
- Price of Anarchy in Non-Cooperative Load BalancingUrtzi Ayesta, Olivier Brun, Balakrishna Prabhu. 436-440 [doi]
- Fuzzy Keyword Search over Encrypted Data in Cloud ComputingJin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, Wenjing Lou. 441-445 [doi]
- Distributed Resource Allocation for Synchronous Fork and Join Processing NetworksHaiquan (Chuck) Zhao, Cathy H. Xia, Zhen Liu, Donald F. Towsley. 446-450 [doi]
- Haste: Practical Online Network Coding in a Multicast SwitchShuang Yang, Xin Wang, Baochun Li. 451-455 [doi]
- Worst-Case TCAM Rule ExpansionOri Rottenstreich, Isaac Keslassy. 456-460 [doi]
- Simple Efficient TCAM Based Range ClassificationRami Cohen, Danny Raz. 461-465 [doi]
- Chip Error Pattern Analysis in IEEE 802.15.4Kaishun Wu, Haoyu Tan, Hoilun Ngan, Lionel M. Ni. 466-470 [doi]
- Mobile Sensor Deployment in Unknown FieldsNovella Bartolini, Tiziana Calamoneri, Thomas F. La Porta, Simone Silvestri. 471-475 [doi]
- Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless NetworksKai Zeng, Zhenyu Yang, Wenjing Lou. 476-480 [doi]
- On Channel-Discontinuity-Constraint Routing in Wireless NetworksSwaminathan Sankararaman, Alon Efrat, Srinivasan Ramasubramanian, Pankaj K. Agarwal. 481-485 [doi]
- Extending Access Point Connectivity through Opportunistic Routing in Vehicular NetworksIlias Leontiadis, Paolo Costa, Cecilia Mascolo. 486-490 [doi]
- Joint Routing and Scheduling in Multi-hop Wireless Networks with Directional AntennasPartha Dutta, Vivek Mhatre, Debmalya Panigrahi, Rajeev Rastogi. 491-495 [doi]
- Opportunistic Routing with Congestion Diversity in Wireless Multi-hop NetworksMohammad Naghshvar, Tara Javidi. 496-500 [doi]
- An Optimization Based Distributed Algorithm for Mobile Data Gathering in Wireless Sensor NetworksMiao Zhao, Yuanyuan Yang. 501-505 [doi]
- An Efficient Algorithm for Constructing Maximum lifetime Tree for Data Gathering Without Aggregation in Wireless Sensor NetworksJunbin Liang, Jianxin Wang, Jiannong Cao, Jianer Chen, Mingming Lu. 506-510 [doi]
- Maintaining Approximate Minimum Steiner Tree and k-center for Mobile Agents in a Sensor NetworkDengpan Zhou, Jie Gao. 511-515 [doi]
- Virtual Appliance Content Distribution for a Global Infrastructure Cloud ServiceAmir Epstein, Dean H. Lorenz, Ezra Silvera, Inbar Shapira. 516-524 [doi]
- Privacy-Preserving Public Auditing for Data Storage Security in Cloud ComputingCong Wang, Qian Wang, Kui Ren, Wenjing Lou. 525-533 [doi]
- Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud ComputingShucheng Yu, Cong Wang, Kui Ren, Wenjing Lou. 534-542 [doi]
- Asymmetry-Aware Real-Time Distributed Joint Resource Allocation in IEEE 802.22 WRANsHyoil Kim, Kang G. Shin. 543-551 [doi]
- Cooperative Resource Management in Cognitive WiMAX with Femto CellsJin Jin, Baochun Li. 552-560 [doi]
- Efficient Resource Allocation with Flexible Channel Cooperation in OFDMA Cognitive Radio NetworksHong Xu, Baochun Li. 561-569 [doi]
- Optimal Control of Constrained Cognitive Radio Networks with Dynamic Population SizeMahdi Lotfinezhad, Ben Liang, Elvino S. Sousa. 570-578 [doi]
- Approximation Algorithms for Many-to-Many Traffic Grooming in WDM Mesh NetworksMohammad A. Saleh, Ahmed E. Kamal. 579-587 [doi]
- Risk-Aware Routing for Optical Transport NetworksMing Xia, Massimo Tornatore, Charles U. Martel, Biswanath Mukherjee. 588-595 [doi]
- Optimal Waveband Switching in Optical Ring NetworksOnur Turkcu, Suresh Subramaniam. 596-604 [doi]
- An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNsHaojin Zhu, Xiaodong Lin, Rongxing Lu, Xuemin Shen, Dongsheng Xing, Zhenfu Cao. 605-613 [doi]
- Optimal Channel Choice for Collaborative Ad-Hoc DisseminationLiang Hu, Jean-Yves Le Boudec, Milan Vojnovic. 614-622 [doi]
- On Space-Time Capacity Limits in Mobile and Delay Tolerant NetworksPhilippe Jacquet, Bernard Mans, Georgios Rodolakis. 623-631 [doi]
- SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant NetworksRongxing Lu, Xiaodong Lin, Xuemin Shen. 632-640 [doi]
- Discrete Gene Regulatory Networks (dGRNs): A Novel Approach to Configuring Sensor NetworksAndrew Markham, Agathoniki Trigoni. 641-649 [doi]
- High Quality Sensor Placement for SHM Systems: Refocusing on Application DemandsBo Li, Dan Wang, Feng Wang, Yi Qing Ni. 650-658 [doi]
- CompactDFA: Generic State Machine Compression for Scalable Pattern MatchingAnat Bremler-Barr, David Hay, Yaron Koral. 659-667 [doi]
- SparseTrack: Enhancing Indoor Pedestrian Tracking with Sparse Infrastructure SupportYunye Jin, Mehul Motani, Wee-Seng Soh, Juanjuan Zhang. 668-676 [doi]
- Joint Power and Secret Key Queue Management for Delay Limited Secure CommunicationOnur Güngör 0002, Jian Tan, Can Emre Koksal, Hesham El Gamal, Ness B. Shroff. 677-685 [doi]
- Towards a Theory of Anonymous NetworkingJavad Ghaderi, Rayadurgam Srikant. 686-694 [doi]
- Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast CommunicationYao Liu, Peng Ning, Huaiyu Dai, An Liu. 695-703 [doi]
- Refresh: Weak Privacy Model for RFID SystemsLi Lu, Yunhao Liu, Xiang-Yang Li. 704-712 [doi]
- A Signal Processing View on Packet Sampling and Anomaly DetectionDaniela Brauckhoff, Kavé Salamatian, Martin May. 713-721 [doi]
- URCA: Pulling out Anomalies by their Root CausesFernando Silveira, Christophe Diot. 722-730 [doi]
- Scalable NIDS via Negative Pattern Matching and Exclusive Pattern MatchingKai Zheng, Xin Zhang, Zhiping Cai, Zhijun Wang, Baohua Yang. 731-739 [doi]
- Robust and Fast Pattern Matching for Intrusion DetectionKedar S. Namjoshi, Girija J. Narlikar. 740-748 [doi]
- Maximum Damage Malware Attack in Mobile Wireless NetworksM. H. R. Khouzani, Saswati Sarkar, Eitan Altman. 749-757 [doi]
- PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing SystemsJing Shi, Rui Zhang, Yunzhong Liu, Yanchao Zhang. 758-766 [doi]
- Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless EnvironmentsJie Yang, Yong Ge, Hui Xiong, Yingying Chen, Hongbo Liu. 767-775 [doi]
- Stimulating Cooperation in Multi-hop Wireless Networks Using Cheating Detection SystemMohamed Elsalih Mahmoud, Xuemin Shen. 776-784 [doi]
- Cognitive Mobile Virtual Network Operator: Investment and Pricing with Supply UncertaintyLingjie Duan, Jianwei Huang, Biying Shou. 785-793 [doi]
- An Auction Framework for Spectrum Allocation with Interference Constraint in Cognitive Radio NetworksLin Chen, Stefano Iellamo, Marceau Coupechoux, Philippe Godlewski. 794-802 [doi]
- Opportunistic Spectrum Access with Multiple Users: Learning under CompetitionAnimashree Anandkumar, Nithin Michael, Ao Tang. 803-811 [doi]
- Learning to Optimally Exploit Multi-Channel Diversity in Wireless SystemsPrasanna Chaporkar, Alexandre Proutiere, Himanshu Asnani. 812-820 [doi]
- FlashTrie: Hash-based Prefix-Compressed Trie for IP Route Lookup Beyond 100GbpsMasanori Bando, H. Jonathan Chao. 821-829 [doi]
- Leaping Multiple Headers in a Single Bound: Wire-Speed Parsing Using the Kangaroo SystemChristos Kozanitis, John Huber, Sushil Singh, George Varghese. 830-838 [doi]
- A Bit-Stuffing Algorithm for Crosstalk Avoidance in High Speed SwitchingCheng-Shang Chang, Jay Cheng, Tien-Ke Huang, Xuan-Chao Huang, Duan-Shin Lee. 839-847 [doi]
- On the Aggregatability of Router Forwarding TablesXin Zhao, Yaoqing Liu, Lan Wang, Beichuan Zhang. 848-856 [doi]
- Routing in Socially Selfish Delay Tolerant NetworksQinghua Li, Sencun Zhu, Guohong Cao. 857-865 [doi]
- Know Thy Neighbor: Towards Optimal Mapping of Contacts to Social Graphs for DTN RoutingTheus Hossmann, Thrasyvoulos Spyropoulos, Franck Legendre. 866-874 [doi]
- MobiCent: a Credit-Based Incentive System for Disruption Tolerant NetworkBin Bin Chen, Mun Choon Chan. 875-883 [doi]
- A Reaction-Diffusion Model for Epidemic Routing in Sparsely Connected MANETsDaniel J. Klein, João Pedro Hespanha, Upamanyu Madhow. 884-892 [doi]
- Delay Performance of Scheduling with Data Aggregation in Wireless Sensor NetworksChanghee Joo, Jin-Ghoo Choi, Ness B. Shroff. 893-901 [doi]
- Joint Energy Management and Resource Allocation in Rechargeable Sensor NetworksRen-Shiou Liu, Prasun Sinha, Can Emre Koksal. 902-910 [doi]
- ACR: Active Collision Recovery in Dense Wireless Sensor NetworksYafeng Wu, Gang Zhou, John A. Stankovic. 911-919 [doi]
- Tunable Locally-Optimal Geographical Forwarding in Wireless Sensor Networks With Sleep-Wake Cycling NodesKolar Purushothama Naveen, Anurag Kumar. 920-928 [doi]
- On the Viability of Paris Metro Pricing for Communication and Service NetworksChi-Kin Chau, Qian Wang, Dah-Ming Chiu. 929-937 [doi]
- Pricing under Constraints in Access Networks: Revenue Maximization and Congestion ManagementPrashanth Hande, Mung Chiang, A. Robert Calderbank, Junshan Zhang. 938-946 [doi]
- On-line Pricing of Secondary Spectrum Access with Unknown Demand Function and Call Length DistributionHuseyin Mutlu, Murat Alanyali, David Starobinski. 947-955 [doi]
- File Fragmentation over an Unreliable ChannelJayakrishnan Nair, Martin Andreasson, Lachlan L. H. Andrew, Steven H. Low, John Doyle. 965-973 [doi]
- Malicious Shellcode Detection with Virtual Memory SnapshotsBoxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champion, Dong Xuan. 974-982 [doi]
- Password Strength: An Empirical AnalysisMatteo Dell Amico, Pietro Michiardi, Yves Roudier. 983-991 [doi]
- A Collaboration-based Autonomous Reputation System for Email ServicesMengjun Xie, Haining Wang. 992-1000 [doi]
- Efficient Tag Identification in Mobile RFID SystemsLei Xie, Bo Sheng, Chiu Chiang Tan, Hao Han, Qun Li, Daoxu Chen. 1001-1009 [doi]
- Efficient Continuous Scanning in RFID SystemsBo Sheng, Qun Li, Weizhen Mao. 1010-1018 [doi]
- Energy Efficient Algorithms for the RFID Estimation ProblemTao Li, Samuel Wu, Shigang Chen, Mark Yang. 1019-1027 [doi]
- Counting RFID Tags Efficiently and AnonymouslyHao Han, Bo Sheng, Chiu Chiang Tan, Qun Li, Weizhen Mao, Sanglu Lu. 1028-1036 [doi]
- Truthful Least-Priced-Path Routing in Opportunistic Spectrum Access NetworksTao Shu, Marwan Krunz. 1037-1045 [doi]
- Queuing Analysis in Multichannel Cognitive Spectrum Access: A Large Deviation ApproachAmine Laourine, Shiyao Chen, Lang Tong. 1046-1054 [doi]
- Delay Analysis for Cognitive Radio Networks with Random Access: A Fluid Queue ViewShanshan Wang, Junshan Zhang, Lang Tong. 1055-1063 [doi]
- DAC: Distributed Asynchronous Cooperation for Wireless Relay NetworksXinyu Zhang, Kang G. Shin. 1064-1072 [doi]
- Incorporating Random Linear Network Coding for Peer-to-Peer Network DiagnosisElias Kehdi, Baochun Li. 1073-1081 [doi]
- Collaborative Measurements of Upload Speeds in P2P SystemsJohn R. Douceur, James W. Mickens, Thomas Moscibroda, Debmalya Panigrahi. 1082-1090 [doi]
- Measurement and Diagnosis of Address Misconfigured P2P TrafficZhichun Li, Anup Goyal, Yan Chen, Aleksandar Kuzmanovic. 1091-1099 [doi]
- Approximate Models for General Cache NetworksElisha J. Rosensweig, James F. Kurose, Donald F. Towsley. 1100-1108 [doi]
- Maximizing the Contact Opportunity for Vehicular Internet AccessZizhan Zheng, Zhixue Lu, Prasun Sinha, Santosh Kumar. 1109-1117 [doi]
- Retiring Replicants: Congestion Control for Intermittently-Connected NetworksNathanael Thompson, Samuel C. Nelson, Mehedi Bakht, Tarek F. Abdelzaher, Robin Kravets. 1118-1126 [doi]
- Multi-Channel Assignment in Wireless Sensor Networks: A Game Theoretic ApproachQing Yu, Jiming Chen, Yanfei Fan, Xuemin Shen, Youxian Sun. 1127-1135 [doi]
- Max-Contribution: On Optimal Resource Allocation in Delay Tolerant NetworksKyunghan Lee, Yung Yi, Jaeseong Jeong, Hyungsuk Won, Injong Rhee, Song Chong. 1136-1144 [doi]
- Minimizing Electricity Cost: Optimization of Distributed Internet Data Centers in a Multi-Electricity-Market EnvironmentLei Rao, Xue Liu, Le Xie, Wenyu Liu. 1145-1153 [doi]
- Improving the Scalability of Data Center Networks with Traffic-aware Virtual Machine PlacementXiaoqiao Meng, Vasileios Pappas, Li Zhang. 1154-1162 [doi]
- The Impact of Virtualization on Network Performance of Amazon EC2 Data CenterGuohui Wang, T. S. Eugene Ng. 1163-1171 [doi]
- Distance Estimation by Constructing The Virtual Ruler in Anisotropic Sensor NetworksYun Wang, Kai Li, Jie Wu. 1172-1180 [doi]
- Bernoulli Sampling Based (element of, delta)-Approximate Aggregation in Large-Scale Sensor NetworksSiyao Cheng, Jianzhong Li, Qianqian Ren, Lei Yu. 1181-1189 [doi]
- Compressive Oversampling for Robust Data Transmission in Sensor NetworksZainul Charbiwala, Supriyo Chakraborty, Sadaf Zahedi, Younghun Kim, Ting He, Chatschik Bisdikian, Mani B. Srivastava. 1190-1198 [doi]
- Verifiable Fine-Grained Top-k Queries in Tiered Sensor NetworksRui Zhang, Jing Shi, Yunzhong Liu, Yanchao Zhang. 1199-1207 [doi]
- BGP Churn Evolution: a Perspective from the CoreAhmed Elmokashfi, Amund Kvalbein, Constantine Dovrolis. 1208-1216 [doi]
- Demand-Oblivious Routing: Distributed vs. Centralized ApproachesGábor Rétvári, Gábor Németh. 1217-1225 [doi]
- Limitations and Possibilities of Path Trading between Autonomous SystemsYuval Shavitt, Yaron Singer. 1226-1234 [doi]
- On the Feasibility and Efficacy of Protection Routing in IP NetworksKin Wah Kwong, Lixin Gao, Roch Guérin, Zhi-Li Zhang. 1235-1243 [doi]
- Optimal Probing for Unicast Network Delay TomographyYu Gu, Guofei Jiang, Vishal Singh, Yueping Zhang. 1244-1252 [doi]
- High-Speed Per-Flow Traffic Measurement with Probabilistic Multiplicity CountingPeter Lieven, Björn Scheuermann. 1253-1261 [doi]
- Netscope: Practical Network Loss TomographyDenisa Ghita, Hung Xuan Nguyen, Maciej Kurant, Katerina J. Argyraki, Patrick Thiran. 1262-1270 [doi]
- MeasuRouting: A Framework for Routing Assisted Traffic MonitoringSaqib Raza, Guanyao Huang, Chen-Nee Chuah, Srini Seetharaman, Jatinder Singh. 1271-1279 [doi]
- Distributed Power Control for Cognitive User Access based on Primary Link Control FeedbackSenhua Huang, Xin Liu, Zhi Ding. 1280-1288 [doi]
- Multicast Scheduling with Cooperation and Network Coding in Cognitive Radio NetworksJin Jin, Hong Xu, Baochun Li. 1289-1297 [doi]
- Cooperative Boundary Detection for Spectrum Sensing Using Dedicated Wireless Sensor NetworksYanyan Yang, Yunhuai Liu, Qian Zhang, Lionel M. Ni. 1298-1306 [doi]
- Implementation and Evaluation of Cooperative Communication Schemes in Software-Defined Radio TestbedJin Zhang, Juncheng Jia, Qian Zhang, Eric M. K. Lo. 1307-1315 [doi]
- Tight Performance Bounds in the Worst-Case Analysis of Feed-Forward NetworksAnne Bouillard, Laurent Jouhet, Eric Thierry. 1316-1324 [doi]
- Non-asymptotic Delay Bounds for Networks with Heavy-Tailed TrafficJörg Liebeherr, Almut Burchard, Florin Ciucu. 1325-1333 [doi]
- Transition from Heavy to Light Tails in Retransmission DurationsJian Tan, Ness B. Shroff. 1334-1342 [doi]
- An Axiomatic Theory of Fairness in Network Resource AllocationTian Lan, David Kao, Mung Chiang, Ashutosh Sabharwal. 1343-1351 [doi]
- ARBOR: Hang Together Rather Than Hang Separately in 802.11 WiFi NetworksXinyu Xing, Shivakant Mishra, Xue Liu. 1352-1360 [doi]
- Designing a Practical Access Point Association ProtocolFengyuan Xu, Chiu Chiang Tan, Qun Li, Guanhua Yan, Jie Wu. 1361-1369 [doi]
- MAC-layer Time Fairness across Multiple Wireless LANsMing Zhang, Shigang Chen, Ying Jian. 1370-1378 [doi]
- Employing the One-Sender-Multiple-Receiver Technique in Wireless LANsZhenghao Zhang, Steven Bronson, Jin Xie, Hu Wei. 1379-1387 [doi]
- Approximate Capacity Subregions of Uniform Multihop Wireless NetworksPeng-Jun Wan, Lixin Wang, Ai Huang, Minming Li, F. Frances Yao. 1388-1396 [doi]
- Distributed Algorithms for Approximating Wireless Network CapacityMichael Dinitz. 1397-1405 [doi]
- Throughput, Delay, and Mobility in Wireless Ad Hoc NetworksPan Li, Yuguang Fang, Jie Li. 1406-1414 [doi]
- The Capacity of Ad Hoc Networks with Heterogeneous Traffic Using CooperationMingyue Ji, Zheng Wang, Hamid R. Sadjadpour, Jose Joaquin Garcia-Luna-Aceves. 1415-1423 [doi]
- A Practical On-line Pacing Scheme at Edges of Small Buffer NetworksYan Cai, Bo Jiang, Tilman Wolf, Weibo Gong. 1424-1432 [doi]
- Enabling a Bufferless Core Network Using Edge-to-Edge Packet-Level FECArun Vishwanath, Vijay Sivaraman, Marina Thottan, Constantine Dovrolis. 1433-1441 [doi]
- Building Scalable Virtual Routers with Trie BraidingHaoyu Song, Murali S. Kodialam, Fang Hao, T. V. Lakshman. 1442-1450 [doi]
- A Systematic Approach for Evolving VLAN DesignsXin Sun, Yu-Wei Eric Sung, Sunil Krothapalli, Sanjay G. Rao. 1451-1459 [doi]
- BitTorrent DarknetsChao Zhang, Prithula Dhungel, Di Wu, Zhengye Liu, Keith W. Ross. 1460-1468 [doi]
- ISP-Enabled Behavioral Ad Targeting without Deep Packet InspectionGabriel Maciá-Fernández, Yong Wang, Rafael Rodríguez-Gomez, Aleksandar Kuzmanovic. 1469-1477 [doi]
- Distributed Caching Algorithms for Content Distribution NetworksSem C. Borst, Varun Gupta, Anwar Walid. 1478-1486 [doi]
- Efficient Similarity Estimation for Systems Exploiting Data RedundancyKanat Tangwongsan, Himabindu Pucha, David G. Andersen, Michael Kaminsky. 1487-1495 [doi]
- Flow Control for Cost-Efficient Peer-to-Peer StreamingDan-Cristian Tomozei, Laurent Massoulié. 1496-1504 [doi]
- Reciprocity and Barter in Peer-to-Peer SystemsDaniel Sadoc Menasché, Laurent Massoulié, Donald F. Towsley. 1505-1513 [doi]
- How do Superpeer Networks Emerge?Bivas Mitra, Abhishek Kumar Dubey, Sujoy Ghose, Niloy Ganguly. 1514-1522 [doi]
- TopBT: A Topology-Aware and Infrastructure-Independent BitTorrent ClientShansi Ren, Enhua Tan, Tian Luo, Songqing Chen, Lei Guo, Xiaodong Zhang. 1523-1531 [doi]
- Toward the Practical Use of Network Tomography for Internet Topology DiscoveryBrian Eriksson, Gautam Dasarathy, Paul Barford, Robert Nowak. 1532-1540 [doi]
- Design and Analysis of a Robust Pipelined Memory SystemHao Wang, Haiquan (Chuck) Zhao, Bill Lin, Jun Xu. 1541-1549 [doi]
- Online Scheduling of Targeted Advertisements for IPTVMurali S. Kodialam, T. V. Lakshman, Sarit Mukherjee, Limin Wang. 1550-1558 [doi]
- On the Impact of TCP and Per-Flow Scheduling on Internet PerformanceGiovanna Carofiglio, Luca Muscariello. 1559-1567 [doi]
- Secure Wireless Communication with Dynamic SecretsSheng Xiao, Weibo Gong, Donald F. Towsley. 1568-1576 [doi]
- On the Age of Pseudonyms in Mobile Ad Hoc NetworksJulien Freudiger, Mohammad Hossein Manshaei, Jean-Yves Le Boudec, Jean-Pierre Hubaux. 1577-1585 [doi]
- An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing NetworksSanthanakrishnan Anand, Shamik Sengupta, Rajarathnam Chandramouli. 1586-1594 [doi]
- From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc NetworksKai Xing, Xiuzhen Cheng. 1595-1603 [doi]
- HaND: Fast Handoff with Null Dwell Time for IEEE 802.11 NetworksXi Chen, Daji Qiao. 1604-1612 [doi]
- Metrics for Evaluating Video Streaming Quality in Lossy IEEE 802.11 Wireless NetworksAn Chan, Kai Zeng, Prasant Mohapatra, Sung-Ju Lee, Sujata Banerjee. 1613-1621 [doi]
- Coupled 802.11 Flows in Urban Channels: Model and Experimental EvaluationJoseph Camp, Ehsan Aryafar, Edward W. Knightly. 1622-1630 [doi]
- Compressive Sensing Based Positioning Using RSS of WLAN Access PointsChen Feng, Wain Sy Anthea Au, Shahrokh Valaee, Zhenhui Tan. 1631-1639 [doi]
- Predictive Blacklisting as an Implicit Recommendation SystemFabio Soldo, Anh Le, Athina Markopoulou. 1640-1648 [doi]
- DiffProbe: Detecting ISP Service DiscriminationPartha Kanuparthy, Constantine Dovrolis. 1649-1657 [doi]
- Network Reliability With Geographically Correlated FailuresSebastian Neumayer, Eytan Modiano. 1658-1666 [doi]
- Reliability in Layered Networks with Random Link FailuresKayi Lee, Hyang-Won Lee, Eytan Modiano. 1667-1675 [doi]
- Pressure Routing for Underwater Sensor NetworksUichin Lee, Paul Wang, Youngtae Noh, Luiz Filipe M. Vieira, Mario Gerla, Jun-Hong Cui. 1676-1684 [doi]
- On Distributed Time-Dependent Shortest Paths over Duty-Cycled Wireless Sensor NetworksShouwen Lai, Binoy Ravindran. 1685-1693 [doi]
- Resilient Routing for Sensor Networks Using Hyperbolic Embedding of Universal Covering SpaceWei Zeng, Rik Sarkar, Feng Luo 0002, Xianfeng Gu, Jie Gao. 1694-1702 [doi]
- Information Quality Aware Routing in Event-Driven Sensor NetworksHwee-Xian Tan, Mun Choon Chan, Wendong Xiao, Peng Yong Kong, Chen-Khong Tham. 1703-1711 [doi]
- Asymptotic Analysis of Precoded Small Cell NetworksSreenath Ramanath, Mérouane Debbah, Eitan Altman, Vinod Kumar. 1712-1719 [doi]
- Elastic Rate Limiting for Spatially Biased Wireless Mesh NetworksVincenzo Mancuso, Omer Gurewitz, Ahmed Khattab, Edward W. Knightly. 1720-1728 [doi]
- Magnetworks: How Mobility Impacts the Design of Mobile Ad Hoc NetworksAlonso Silva, Eitan Altman, Mérouane Debbah, Giuseppa Alfano. 1729-1737 [doi]
- Impact of Correlated Mobility on Delay-Throughput Performance in Mobile Ad-Hoc NetworksDelia Ciullo, Valentina Martina, Michele Garetto, Emilio Leonardi. 1738-1746 [doi]
- Chorus: Collision Resolution for Efficient Wireless BroadcastXinyu Zhang, Kang G. Shin. 1747-1755 [doi]
- Distributed Coordination with Deaf Neighbors: Efficient Medium Access for 60 GHz Mesh NetworksSumit Singh, Raghuraman Mudumbai, Upamanyu Madhow. 1765-1773 [doi]
- A General Algorithm for Interference Alignment and Cancellation in Wireless NetworksErran L. Li, Richard Alimi, Dawei Shen, Harish Viswanathan, Yang Richard Yang. 1774-1782 [doi]
- Markov Approximation for Combinatorial Network OptimizationMinghua Chen, Soung Chang Liew, Ziyu Shao, Caihong Kai. 1783-1791 [doi]
- Convergence Speed of Binary Interval ConsensusMoez Draief, Milan Vojnovic. 1792-1800 [doi]
- Multicast Scaling Laws with Hierarchical CooperationChenhui Hu, Xinbing Wang, Ding Nie, Jun Zhao. 1801-1809 [doi]
- Network Coding for Multi-Resolution MulticastMinji Kim, Daniel Enrique Lucani, Xiaomeng Shi, Fang Zhao, Muriel Médard. 1810-1818 [doi]
- On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless NetworksZhuo Lu, Wenye Wang, Cliff Wang. 1819-1827 [doi]
- INPAC: An Enforceable Incentive Scheme for Wireless Networks using Network CodingTingting Chen, Sheng Zhong. 1828-1836 [doi]
- Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless NetworksKai Zeng, Daniel Wu, An Chan, Prasant Mohapatra. 1837-1845 [doi]
- Optimizing the Batch Mode of Group Rekeying: Lower Bound and New ProtocolsYang Ji, Seung-Woo Seo. 1846-1854 [doi]
- Towards an Efficient Reservation Algorithm for Distributed Reservation ProtocolsMaryam Daneshi, Jianping Pan, Sudhakar Ganti. 1855-1863 [doi]
- Designing Low-Capacity Backup Networks for Fast RestorationRon Banner, Ariel Orda. 1864-1872 [doi]
- EmNet: Satisfying The Individual User Through Empathic Home NetworksJohn R. Lange, J. Scott Miller, Peter A. Dinda. 1873-1881 [doi]
- Characterizing the Spread of Correlated Failures in Large Wireless NetworksYi Xu, Wenye Wang. 1882-1890 [doi]
- Towards Reliable Scheduling Schemes for Long-lived Replaceable Sensor NetworksBin Tong, Zi Li, Guiling Wang, Wensheng Zhang. 1891-1899 [doi]
- Green Wave: Latency and Capacity-Efficient Sleep Scheduling for Wireless NetworksSaikat Guha, Chi-Kin Chau, Prithwish Basu. 1900-1908 [doi]
- Minimizing End-to-End Delay in Wireless Networks Using a Coordinated EDF SchedulePraveen Jayachandran, Matthew Andrews. 1909-1917 [doi]
- Practical Scheduling Algorithms for Concurrent Transmissions in Rate-adaptive Wireless NetworksZhe Yang, Lin Cai, Wu-Sheng Lu. 1918-1926 [doi]
- Bargaining and Price-of-Anarchy in Repeated Inter-Session Network Coding GamesAmir Hamed Mohsenian Rad, Jianwei Huang, Vincent W. S. Wong, Robert Schober. 1927-1935 [doi]
- Multipath Wireless Network Coding: A Population Game PerspectiveVinith Reddy, Srinivas Shakkottai, Alex Sprintson, Natarajan Gautam. 1936-1944 [doi]
- Wireless Network Virtualization as A Sequential Auction GameFangwen Fu, Ulas C. Kozat. 1945-1953 [doi]
- Near-Optimal Power Control in Wireless Networks: A Potential Game ApproachOzan Candogan, Ishai Menache, Asuman E. Ozdaglar, Pablo A. Parrilo. 1954-1962 [doi]
- Bayesian Inference for Localization in Cellular NetworksHui Zang, François Baccelli, Jean Bolot. 1963-1971 [doi]
- Beyond Triangle Inequality: Sifting Noisy and Outlier Distance Measurements for LocalizationLirong Jian, Zheng Yang, Yunhao Liu. 1972-1980 [doi]
- Cramer-Rao Bound Analysis of Localization Using Signal Strength Difference as Location FingerprintA. K. M. Mahtab Hossain, Wee-Seng Soh. 1981-1989 [doi]
- Is Network Coding Always Good for Cooperative Communications?Sushant Sharma, Yi Shi, Jia Liu, Y. Thomas Hou, Sastry Kompella. 1990-1998 [doi]
- Practical and General Amplify-and-Forward Designs for Cooperative NetworksQijia Liu, Wei Zhang, Xiaoli Ma. 1999-2007 [doi]
- Towards Efficient Designs for In-network Computing with Noisy Wireless ChannelsChengzhi Li, Huaiyu Dai. 2008-2015 [doi]
- Cooperative Communications in Multi-hop Wireless Networks: Joint Flow Routing and Relay Node AssignmentSushant Sharma, Yi Shi, Y. Thomas Hou, Hanif D. Sherali, Sastry Kompella. 2016-2024 [doi]
- Diversity-Rate Trade-off in Erasure NetworksShahab Oveis Gharan, Shervan Fashandi, Amir K. Khandani. 2025-2033 [doi]
- Optimal Control of Wireless Networks with Finite BuffersLong Bao Le, Eytan Modiano, Ness B. Shroff. 2034-2042 [doi]
- The k-Constrained Bipartite Matching Problem: Approximation Algorithms and Applications to Wireless NetworksAndre Berger, James Gross, Tobias Harks. 2043-2051 [doi]
- Rate Adaptation Games in Wireless LANs: Nash Equilibrium and Price of AnarchyBozidar Radunovic, Prasanna Chaporkar, Alexandre Proutiere. 2052-2060 [doi]
- Improving QoS in BitTorrent-like VoD SystemsYan Yang, Alix L. H. Chow, Leana Golubchik, Danielle Bragg. 2061-2069 [doi]
- UUSee: Large-Scale Operational On-Demand Streaming with Random Network CodingZimu Liu, Chuan Wu, Baochun Li, Shuqiao Zhao. 2070-2078 [doi]
- Minimizing the Worst-Case Playback Delay in VoD Services over Passive Optical NetworksJianping Wang, Chunming Qiao, Yan Li, Kejie Lu. 2079-2087 [doi]
- Chameleon: Adaptive Peer-to-Peer Streaming with Network CodingAnh Tuan Nguyen, Baochun Li, Frank Eliassen. 2088-2096 [doi]
- Distributed Monitoring and Aggregation in Wireless Sensor NetworksChanglei Liu, Guohong Cao. 2097-2105 [doi]
- Collaborative Data Compression Using Clustered Source Coding for Wireless Multimedia Sensor NetworksPu Wang, Rui Dai, Ian F. Akyildiz. 2106-2114 [doi]
- On Computing Compression Trees for Data Collection in Wireless Sensor NetworksJian Li, Amol Deshpande, Samir Khuller. 2115-2123 [doi]
- Adaptive Calibration for Fusion-based Wireless Sensor NetworksRui Tan, Guoliang Xing, Xue Liu, Jianguo Yao, Zhaohui Yuan. 2124-2132 [doi]
- Resource Allocation in Multi-cell OFDMA-based Relay NetworksYao Hua, Qian Zhang, Zhisheng Niu. 2133-2141 [doi]
- Deploying Mesh Nodes under Non-Uniform PropagationJoshua Robinson, Mohit Singh, Ram Swaminathan, Edward W. Knightly. 2142-2150 [doi]
- M-Polar: Channel Allocation for Throughput Maximization in SDR Mesh NetworksEugene Chai, Kang Shin. 2151-2159 [doi]
- Efficient Two-dimensional Data Allocation in IEEE 802.16 OFDMAClaudio Cicconetti, Luciano Lenzini, Andrea Lodi, Silvano Martello, Enzo Mingozzi, Michele Monaci. 2160-2168 [doi]
- Efficient Active Probing for Fault Diagnosis in Large Scale and Noisy NetworksLu Cheng, Xuesong Qiu, Luoming Meng, Yan Qiao, Raouf Boutaba. 2169-2177 [doi]
- Reliable Adaptive Multipath Provisioning with Bandwidth and Differential Delay ConstraintsWeiyi Zhang, Jian Tang, Chonggang Wang, Shanaka de Soysa. 2178-2186 [doi]
- Measurement Data Reduction through Variation Rate MeteringGiuseppe Bianchi, Elisa Boschi, Simone Teofili, Brian Trammell. 2187-2195 [doi]
- Two Samples are Enough: Opportunistic Flow-level Latency Estimation using NetFlowMyungjin Lee, Nick G. Duffield, Ramana Rao Kompella. 2196-2204 [doi]
- First-Fit Scheduling for Beaconing in Multihop Wireless NetworksPeng-Jun Wan, Zhu Wang, Hongwei Du, Scott C.-H. Huang, Zhiyuan Wan. 2205-2212 [doi]
- Analyzing the Performance of Greedy Maximal Scheduling via Local Pooling and Graph TheoryBerk Birand, Maria Chudnovsky, Bernard Ries, Paul D. Seymour, Gil Zussman, Yori Zwols. 2213-2221 [doi]
- Low-complexity Scheduling Algorithms for Multi-channel Downlink Wireless NetworksShreeshankar Bodas, Sanjay Shakkottai, Lei Ying, R. Srikant. 2222-2230 [doi]
- Optimal Scheduling for Fair Resource Allocation in Ad Hoc Networks with Elastic and Inelastic TrafficJuan José Jaramillo, R. Srikant. 2231-2239 [doi]
- Optimal Linear Network Coding Design for Secure Unicast with Multiple StreamsJin Wang, Jianping Wang, Kejie Lu, Bin Xiao, Naijie Gu. 2240-2248 [doi]
- P-Coding: Secure Network Coding against Eavesdropping AttacksPeng Zhang, Yixin Jiang, Chuang Lin, Yanfei Fan, Xuemin Shen. 2249-2257 [doi]
- RIPPLE Authentication for Network CodingYaping Li, Hongyi Yao, Minghua Chen, Sidharth Jaggi, Alon Rosen. 2258-2266 [doi]
- When Watchdog Meets CodingGuanfeng Liang, Rachit Agarwal, Nitin Vaidya. 2267-2275 [doi]
- MSET: A Mobility Satellite Emulation TestbedRoman Chertov, Daniel M. Havey, Kevin C. Almeroth. 2276-2284 [doi]
- A Flexible Platform for Hardware-Aware Network Experiments and a Case Study on Wireless Network CodingXi Deng, Yuanyuan Yang, Sangjin Hong. 2285-2293 [doi]
- An Interaction-Based Mobility Model for Dynamic Hot Spot AnalysisFrédéric Morlot, Salah-Eddine Elayoubi, François Baccelli. 2294-2302 [doi]
- Intrusion-Resilience in Mobile Unattended WSNsRoberto Di Pietro, Gabriele Oligeri, Claudio Soriente, Gene Tsudik. 2303-2311 [doi]
- Universal Rigidity: Towards Accurate and Efficient Localization of Wireless NetworksZhisu Zhu, Anthony Man-Cho So, Yinyu Ye. 2312-2320 [doi]
- Towards Mobile Phone Localization without War-DrivingIonut Constandache, Romit Roy Choudhury, Injong Rhee. 2321-2329 [doi]
- Towards Cooperative Localization of Wearable Sensors using Accelerometers and CamerasDeokwoo Jung, Thiago Teixeira, Andreas Savvides. 2330-2338 [doi]
- Understanding Node Localizability of Wireless Ad-hoc NetworksZheng Yang, Yunhao Liu. 2339-2347 [doi]
- A Tractable and Accurate Cross-Layer Model for Multi-Hop MIMO NetworksJia Liu, Yi Shi, Y. Thomas Hou. 2348-2356 [doi]
- Topology Control for Effective Interference Cancellation in Multi-User MIMO NetworksEce Gelal, Konstantinos Pelechrinis, Tae-Suk Kim, Ioannis Broustis, Srikanth V. Krishnamurthy, Bhaskar Rao. 2357-2365 [doi]
- DPLC: Dynamic Packet Length Control in Wireless Sensor NetworksWei Dong, Xue Liu, Chun Chen, Yuan He, Gong Chen, Yunhao Liu, Jiajun Bu. 2366-2374 [doi]
- Neighbor Discovery with Reception Status Feedback to TransmittersRamin Khalili, Dennis Goeckel, Donald F. Towsley, Ananthram Swami. 2375-2383 [doi]
- Optimal SINR-based Random AccessAmir Hamed Mohsenian Rad, Vincent W. S. Wong, Robert Schober. 2384-2392 [doi]
- Minimum Energy per Bit for Wideband Wireless Multicasting: Performance of Decode-and-ForwardAman Jain, Sanjeev R. Kulkarni, Sergio Verdú. 2393-2401 [doi]
- Dynamic Power Allocation Under Arbitrary Varying Channels - The Multi-User CaseNiv Buchbinder, Liane Lewin-Eytan, Ishai Menache, Joseph Naor, Ariel Orda. 2402-2410 [doi]
- Minimum Power Energy Spanners in Wireless Ad Hoc NetworksA. Karim Abu-Affash, Rom Aschner, Paz Carmi, Matthew J. Katz. 2411-2416 [doi]
- Characterization of Non-Manipulable and Pareto Optimal Resource Allocation Strategies for Interference Coupled Wireless SystemsHolger Boche, Siddharth Naik, Tansu Alpcan. 2417-2425 [doi]
- Utility Maximization for Delay Constrained QoS in WirelessI-Hong Hou, P. R. Kumar. 2426-2434 [doi]
- Routing for Energy Minimization in the Speed Scaling ModelMatthew Andrews, Antonio Fernández, Lisa Zhang, Wenbo Zhao. 2435-2443 [doi]
- The Capacity of Heterogeneous Wireless NetworksPan Li, Yuguang Fang. 2444-2452 [doi]
- Minimizing Energy Consumption with Probabilistic Distance Models in Wireless Sensor NetworksYanyan Zhuang, Jianping Pan, Lin Cai. 2453-2461 [doi]
- Multi-Round Sensor Deployment for Guaranteed Barrier CoverageGuanqun Yang, Daji Qiao. 2462-2470 [doi]
- Delay Tolerant Event Collection in Sensor Networks with Mobile SinkXing Xu, Ji Luo, Qian Zhang. 2471-2479 [doi]
- Pattern Mutation in Wireless Sensor DeploymentXiaole Bai, Ziqiu Yun, Dong Xuan, Weijia Jia, Wei Zhao. 2480-2488 [doi]
- P2P Trading in Social Networks: The Value of Staying ConnectedZhengye Liu, Hao Hu, Yong Liu, Keith W. Ross, Yao Wang, Markus Mobius. 2489-2497 [doi]
- Walking in Facebook: A Case Study of Unbiased Sampling of OSNsMinas Gjoka, Maciej Kurant, Carter T. Butts, Athina Markopoulou. 2498-2506 [doi]
- Surfing the Blogosphere: Optimal Personalized Strategies for Searching the WebStratis Ioannidis, Laurent Massoulié. 2507-2515 [doi]
- A Privacy-Preserving Scheme for Online Social Networks with Efficient RevocationJinyuan Sun, Xiaoyan Zhu, Yuguang Fang. 2516-2524 [doi]
- Topological Properties Affect the Power of Network Coding in Decentralized BroadcastDi Niu, Baochun Li. 2525-2533 [doi]
- Stable Maximum Throughput Broadcast in Wireless Fading ChannelsWei Pu, Hao Cui, Chong Luo, Feng Wu, Chang Wen Chen. 2534-2542 [doi]
- Reliable Wireless Broadcasting with Near-Zero FeedbackWeiyao Xiao, Sachin Agarwal, David Starobinski, Ari Trachtenberg. 2543-2551 [doi]
- Reliable Broadcasting in Random Networks and the Effect of DensityNikolaos Fountoulakis, Anna Huber, Konstantinos Panagiotou. 2552-2560 [doi]
- On the Absence of Isolated Nodes in Wireless Ad-Hoc Networks with Unreliable Links - a Curious GapN. Prasanth Anthapadmanabhan, Armand M. Makowski. 2561-2569 [doi]
- Stochastic Analysis of Non-Slotted Aloha in Wireless Ad-Hoc NetworksBartlomiej Blaszczyszyn, Paul Mühlethaler. 2570-2578 [doi]
- An Investigation on the Nature of Wireless SchedulingCem Boyaci, Bo Li, Ye Xia. 2579-2587 [doi]
- Effective Carrier Sensing in CSMA Networks under Cumulative InterferenceLiqun Fu, Soung Chang Liew, Jianwei Huang. 2588-2596 [doi]
- Frequency-Domain Packet Scheduling for 3GPP LTE UplinkHongkun Yang, Fengyuan Ren, Chuang Lin, Jiao Zhang. 2597-2605 [doi]
- Scheduling Heterogeneous Real-Time Traffic over Fading Wireless ChannelsI-Hong Hou, P. R. Kumar. 2606-2614 [doi]
- Fair Scheduling in Cellular Systems in the Presence of Noncooperative MobilesVeeraruna Kavitha, Eitan Altman, Rachid El Azouzi, Rajesh Sundaresan. 2615-2623 [doi]
- Energy-Conserving Scheduling in Multi-hop Wireless Networks with Time-Varying ChannelsYang Song, Chi Zhang, Yuguang Fang, Zhisheng Niu. 2624-2632 [doi]
- Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic NetworksRui Zhang, Yanchao Zhang. 2633-2641 [doi]
- SafeQ: Secure and Efficient Query Processing in Sensor NetworksFei Chen, Alex X. Liu. 2642-2650 [doi]
- Group Device Pairing based Secure Sensor Association and Key Management for Body Area NetworksMing Li, Shucheng Yu, Wenjing Lou, Kui Ren. 2651-2659 [doi]
- Source-Location Privacy through Dynamic Routing in Wireless Sensor NetworksYun Li, Jian Ren. 2660-2668 [doi]
- Delay-Based Network Utility MaximizationMichael J. Neely. 2669-2677 [doi]
- On Approximation of New Optimization Methods for Assessing Network VulnerabilityThang N. Dinh, Ying Xuan, My T. Thai, E. K. Park, Taieb Znati. 2678-2686 [doi]
- Twister Networks and Their Applications to Load-Balanced SwitchesChing-Ming Lien, Cheng-Shang Chang, Jay Cheng, Duan-Shin Lee, Jou-Ting Liao. 2687-2695 [doi]
- Analyzing Nonblocking Switching Networks using Linear Programming (Duality)Hung Q. Ngo, Atri Rudra, Anh N. Le, Thanh-Nhan Nguyen. 2696-2704 [doi]
- Forward Contracts for Complementary Segments of a Communication NetworkMiklós Reiter, Richard Steinberg. 2705-2713 [doi]
- Multipath Network Flows: Bounded Buffers and JitterTricha Anjali, Gruia Calinescu, Alexander Fortin, Sanjiv Kapoor, Nandakiran Kirubanandan, Sutep Tongngam. 2714-2720 [doi]
- Utility Functionals Associated With Available Congestion Control AlgorithmsJavad Lavaei, John C. Doyle, Steven H. Low. 2721-2729 [doi]
- Value-aware Resource Allocation for Service Guarantees in NetworksParimal Parag, Srinivas Shakkottai, Jean-François Chamberland. 2730-2738 [doi]
- A New Constant Factor Approximation for Computing 3-Connected m-Dominating Sets in Homogeneous Wireless NetworksDonghyun Kim, Wei Wang, Xianyue Li, Zhao Zhang, Weili Wu. 2739-2747 [doi]
- On the Connectivity Analysis over Large-Scale Hybrid Wireless NetworksChi Yi, Wenye Wang. 2748-2756 [doi]
- Design and Optimization of a Tiered Wireless Access NetworkIn Keun Son, Shiwen Mao. 2757-2765 [doi]
- A Novel Xcast-based Caching Architecture for Inter-gateway Handoffs in Infrastructure Wireless Mesh NetworksWeiyi Zhao, Jiang Xie. 2766-2774 [doi]
- Random Walks on Digraphs: A Theoretical Framework for Estimating Transmission Costs in Wireless RoutingYanhua Li, Zhi-Li Zhang. 2775-2783 [doi]
- MIMO-Aware Routing in Wireless Mesh NetworksShan Chu, Xin Wang. 2784-2792 [doi]
- Routing Primitives for Wireless Mesh Networks: Design, Analysis and ExperimentsStanislav Miskovic, Edward W. Knightly. 2793-2801 [doi]
- Multihop Transmission Opportunity in Wireless Multihop NetworksChansu Yu, Tianning Shen, Kang G. Shin, Jeong-Yoon Lee, Young-Joo Suh. 2802-2810 [doi]
- CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile NetworksFeng Li, Yinying Yang, Jie Wu. 2811-2819 [doi]
- A Node-failure-resilient Anonymous Communication Protocol through Commutative Path HoppingFengJun Li, Bo Luo, Peng Liu, Chao-Hsien Chu. 2820-2828 [doi]
- Castor: Scalable Secure Routing for Ad Hoc NetworksWojciech Galuba, Panos Papadimitratos, Marcin Poturalski, Karl Aberer, Zoran Despotovic, Wolfgang Kellerer. 2829-2837 [doi]
- A Formal Study of Trust-Based Routing in Wireless Ad Hoc NetworksChi Zhang, Xiaoyan Zhu, Yang Song, Yuguang Fang. 2838-2846 [doi]
- On Scheduling for Minimizing End-to-End Buffer Usage over Multihop Wireless NetworksV. J. Venkataramanan, Xiaojun Lin, Lei Ying, Sanjay Shakkottai. 2847-2855 [doi]
- A Greedy Link Scheduler for Wireless Networks with Gaussian Multiple Access and Broadcast ChannelsArun Sridharan, Can Emre Koksal, Elif Uysal-Biyikoglu. 2856-2864 [doi]
- CSMA-Based Distributed Scheduling in Multi-hop MIMO Networks under SINR ModelDajun Qian, Dong Zheng, Junshan Zhang, Ness B. Shroff. 2865-2873 [doi]
- Distributed Opportunistic Scheduling for Ad-Hoc Communications Under Delay ConstraintsSheu Sheu Tan, Dong Zheng, Junshan Zhang, James R. Zeidler. 2874-2882 [doi]
- Throughput-Optimal Opportunistic Scheduling in the Presence of Flow-Level DynamicsShihuan Liu, Lei Ying, R. Srikant. 2883-2891 [doi]
- Tree-structured Data Regeneration in Distributed Storage Systems with Regenerating CodesJun Li, Shuang Yang, Xin Wang, Baochun Li. 2892-2900 [doi]
- Optimizing Throughput and Latency under Given Power Budget for Network Packet ProcessingJilong Kuang, Laxmi N. Bhuyan. 2901-2909 [doi]
- On Constructing Efficient Shared Decision Trees for Multiple Packet FiltersBo Zhang, T. S. Eugene Ng. 2910-2918 [doi]
- CCACK: Efficient Network Coding Based Opportunistic Routing Through Cumulative Coded AcknowledgmentsDimitrios Koutsonikolas, Chih-Chun Wang, Y. Charlie Hu. 2919-2927 [doi]
- Cooperative Bridges: Topology Control in Cooperative Wireless Ad Hoc NetworksJieun Yu, Heejun Roh, Wonjun Lee, Sangheon Pack, Ding-Zhu Du. 2928-2936 [doi]
- A Framework for Joint Network Coding and Transmission Rate Control in Wireless NetworksTae-Suk Kim, Serdar Vural, Ioannis Broustis, Dimitris Syrivelis, Srikanth V. Krishnamurthy, Thomas F. La Porta. 2937-2945 [doi]
- On the Impact of Random Losses on TCP Performance in Coded Wireless Mesh NetworksSofiane Hassayoun, Patrick Maillé, David Ros. 2946-2954 [doi]
- Overhearing-aware Joint Routing and Rate Selection in Multi-hop Multi-rate UWB-based WPANsRaed T. Al-Zubi, Marwan Krunz. 2955-2963 [doi]
- Robust and Scalable Integrated Routing in MANETs Using Context-Aware Ordered MeshesRolando Menchaca Mendez, J. J. Garcia-Luna-Aceves. 2964-2972 [doi]
- Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric SpacesFragkiskos Papadopoulos, Dmitri V. Krioukov, Marián Boguñá, Amin Vahdat. 2973-2981 [doi]
- A New Phase Transitions for Local Delays in MANETsFrançois Baccelli, Bartlomiej Blaszczyszyn. 2982-2990 [doi]