Abstract is missing.
- Exact throughput capacity under power control in mobile ad hoc networksJiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato. 1-9 [doi]
- Design and performance study of a Topology-Hiding Multipath Routing protocol for mobile ad hoc networksYujun Zhang, Guiling Wang, Qi Hu, Zhongcheng Li, Jie Tian. 10-18 [doi]
- Capacity of distributed content delivery in large-scale wireless ad hoc networksWang Liu, Kejie Lu, Jianping Wang, Yi Qian, Tao Zhang, Liusheng Huang. 19-27 [doi]
- On the spatial modeling of wireless networks by random packing modelsNguyen Tien Viet, François Baccelli. 28-36 [doi]
- Spectrum mobility gamesRichard Southwell, Jianwei Huang, Xin Liu. 37-45 [doi]
- Scaling laws for cognitive radio network with heterogeneous mobile secondary usersYingzhe Li, Xinbing Wang, Xiaohua Tian, Xue Liu. 46-54 [doi]
- Localization in 3D surface sensor networks: Challenges and solutionsYao Zhao, Hongyi Wu, Miao Jin, Su-Xia. 55-63 [doi]
- WILL: Wireless indoor localization without site surveyChenshu Wu, Zheng Yang, Yunhao Liu, Wei Xi. 64-72 [doi]
- Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networksZhiguo Wan, Kai Xing, Yunhao Liu. 73-81 [doi]
- UFlood: High-throughput flooding over wireless mesh networksJayashree Subramanian, Robert Morris, Hari Balakrishnan. 82-90 [doi]
- Memory-assisted universal compression of network flowsMohsen Sardari, Ahmad Beirami, Faramarz Fekri. 91-99 [doi]
- CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network codingPeng Li, Song Guo, Shui Yu, Athanasios V. Vasilakos. 100-108 [doi]
- E-V: Efficient visual surveillance with electronic footprintsJin Teng, Junda Zhu, Boying Zhang, Dong Xuan, Yuan F. Zheng. 109-117 [doi]
- Energy-efficient intrusion detection with a barrier of probabilistic sensorsJunkun Li, Jiming Chen, Ten H. Lai. 118-126 [doi]
- Submodular game for distributed application allocation in shared sensor networksChengjie Wu, You Xu, Yixin Chen, Chenyang Lu. 127-135 [doi]
- Energy-efficient reporting mechanisms for multi-type real-time monitoring in Machine-to-Machine communications networksHuai-Lei Fu, Hou-Chun Chen, Phone Lin, Yuguang Fang. 136-144 [doi]
- A generic framework for throughput-optimal control in MR-MC wireless networksHongkun Li, Yu Cheng, Xiaohua Tian, Xinbing Wang. 145-153 [doi]
- CSI-SF: Estimating wireless channel state using CSI sampling & fusionRiccardo Crepaldi, Jeongkeun Lee, Raúl H. Etkin, Sung-Ju Lee, Robin Kravets. 154-162 [doi]
- EleSense: Elevator-assisted wireless sensor data collection for high-rise structure monitoringFeng Wang, Dan Wang, Jiangchuan Liu. 163-171 [doi]
- Stochastic optimal multirate multicast in socially selfish wireless networksHongxing Li, Chuan Wu, Zongpeng Li, Wei Huang, Francis C. M. Lau. 172-180 [doi]
- VDN: Virtual machine image distribution network for cloud data centersChunyi Peng, Minkyong Kim, Zhe Zhang, Hui Lei. 181-189 [doi]
- Optimal bidding in spot instance marketYang Song, Murtaza Zafer, Kang-Won Lee. 190-198 [doi]
- CALMS: Cloud-assisted live media streaming for globalized demands with time/region diversitiesFeng Wang, Jiangchuan Liu, Minghua Chen. 199-207 [doi]
- SageShift: Managing SLAs for highly consolidated cloudOrathai Sukwong, Akkarit Sangpetch, Hyong S. Kim. 208-216 [doi]
- Minimum camera barrier coverage in wireless camera sensor networksHuan Ma, Meng Yang, Deying Li, Yi Hong, Wenping Chen. 217-225 [doi]
- A statistical approach for target counting in sensor-based surveillance systemsDengyuan Wu, Dechang Chen, Kai Xing, Xiuzhen Cheng. 226-234 [doi]
- A simpler and better design of error estimating codingNan Hua, Ashwin Lall, Baochun Li, Jun (Jim) Xu. 235-243 [doi]
- Strategizing surveillance for resource-constrained event monitoringXi Fang, Dejun Yang, Guoliang Xue. 244-252 [doi]
- Multicast capacity, delay and delay jitter in intermittently connected mobile networksJiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato. 253-261 [doi]
- Cooperative topology control with adaptation for improved lifetime in wireless ad hoc networksXiaoyu Chu, Harish Sethu. 262-270 [doi]
- Multicast capacity in mobile wireless ad hoc network with infrastructure supportXi Chen, Wentao Huang, Xinbing Wang, Xiaojun Lin. 271-279 [doi]
- Resource allocation in load-constrained multihopwireless networksXi Fang, Dejun Yang, Guoliang Xue. 280-288 [doi]
- What details are needed for wireless simulations? - A study of a site-specific indoor wireless modelMustafa Al-Bado, Cigdem Sengul, Ruben Merz. 289-297 [doi]
- TurfCast: A service for controlling information dissemination in wireless networksXinfeng Li, Jin Teng, Boying Zhang, Adam C. Champion, Dong Xuan. 298-306 [doi]
- A low-cost channel scheduling design for multi-hop handoff delay reduction in internet-based wireless mesh networksHaopeng Li, Jiang Xie. 307-315 [doi]
- Dynamic index coding for wireless broadcast networksMichael J. Neely, Arash Saber Tehrani, Zhen Zhang. 316-324 [doi]
- On benefits of network coding in bidirected networks and hyper-networksXunrui Yin, Xin Wang 0002, Jin Zhao, Xiangyang Xue, Zongpeng Li. 325-333 [doi]
- Cooperative multicasting in network-coding enabled multi-rate wireless relay networksHsiao-Chen Lu, Wanjiun Liao. 334-342 [doi]
- On detecting pollution attacks in inter-session network codingAnh Le, Athina Markopoulou. 343-351 [doi]
- Optimal routing and scheduling for a simple network coding schemeNathaniel M. Jones, Brooke Shrader, Eytan Modiano. 352-360 [doi]
- Robust multi-pipeline scheduling in low-duty-cycle wireless sensor networksYongle Cao, Shuo Guo, Tian He. 361-369 [doi]
- On capacity of magnetic induction-based wireless underground sensor networksZhi Sun, Ian F. Akyildiz. 370-378 [doi]
- A simple asymptotically optimal energy allocation and routing scheme in rechargeable sensor networksShengbo Chen, Prasun Sinha, Ness B. Shroff, Changhee Joo. 379-387 [doi]
- Exploiting prediction to enable Secure and Reliable routing in Wireless Body Area NetworksXiaohui Liang, Xu Li, Qinghua Shen, Rongxing Lu, Xiaodong Lin, Xuemin Shen, Weihua Zhuang. 388-396 [doi]
- Application-aware MIMO Video Rate AdaptationSobia Jangsher, Syed Ali Khayam, Qasim M. Chaudhari. 397-405 [doi]
- On the effect of channel fading on greedy schedulingAneesh Reddy, Sujay Sanghavi, Sanjay Shakkottai. 406-414 [doi]
- Maximizing capacity with power control under physical interference model in duplex modePeng-Jun Wan, Dechang Chen, Guojun Dai, Zhu Wang, F. Frances Yao. 415-423 [doi]
- Squeezing the most out of interference: An optimization framework for joint interference exploitation and avoidanceCanming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou, Sastry Kompella, Scott F. Midkiff. 424-432 [doi]
- Intra-cloud lightning: Building CDNs in the cloudFangfei Chen, Katherine Guo, John Lin, Thomas F. La Porta. 433-441 [doi]
- Measurement and utilization of customer-provided resources for cloud computingHaiyang Wang, Feng Wang, Jiangchuan Liu, Justin Groen. 442-450 [doi]
- Achieving usable and privacy-assured similarity search over outsourced cloud dataCong Wang, Kui Ren, Shucheng Yu, Karthik Mahendra Raje Urs. 451-459 [doi]
- Quality-assured cloud bandwidth auto-scaling for video-on-demand applicationsDi Niu, Hong Xu, Baochun Li, Shuqiao Zhao. 460-468 [doi]
- Inter-Call Mobility model: A spatio-temporal refinement of Call Data Records using a Gaussian mixture modelMichal Ficek, Lukas Kencl. 469-477 [doi]
- Expected loss bounds for authentication in constrained channelsChristos Dimitrakakis, Aikaterini Mitrokotsa, Serge Vaudenay. 478-485 [doi]
- Location Aware Peak Value Queries in sensor networksSiyao Cheng, Jianzhong Li, Lei Yu. 486-494 [doi]
- Traffic clustering and online traffic prediction in vehicle networks: A social influence perspectiveBowu Zhang, Kai Xing, Xiuzhen Cheng, Liusheng Huang, Rongfang Bie. 495-503 [doi]
- Minimizing data collection latency in wireless sensor network with multiple mobile elementsDonghyun Kim, Baraki H. Abay, R. N. Uma, Weili Wu, Wei Wang 0032, Alade O. Tokuta. 504-512 [doi]
- Percolation and connectivity on the signal to interference ratio graphRahul Vaze. 513-521 [doi]
- Impact of directional transmission in large-scale multi-hop wireless ad hoc networksChi-Kin Chau, Richard J. Gibbens, Don Towsley. 522-530 [doi]
- Asymptotic laws for content replication and delivery in wireless networksSavvas Gitzenis, Georgios S. Paschos, Leandros Tassiulas. 531-539 [doi]
- Distributed Opportunistic Scheduling: A control theoretic approachAndres Garcia-Saavedra, Albert Banchs, Pablo Serrano, Joerg Widmer. 540-548 [doi]
- Use your frequency wisely: Explore frequency domain for channel contention and ACKXiaojun Feng, Jin Zhang, Qian Zhang, Bo Li 0001. 549-557 [doi]
- RxIP: Monitoring the health of home wireless networksJustin Manweiler, Peter Franklin, Romit Roy Choudhury. 558-566 [doi]
- Jointly optimizing multi-user rate adaptation for video transport over wireless systems: Mean-fairness-variability tradeoffsVinay Joseph, Gustavo de Veciana. 567-575 [doi]
- Evaluating service disciplines for mobile elements in wireless ad hoc sensor networksLiang He, Zhe Yang, Jianping Pan, Lin Cai, Jingdong Xu. 576-584 [doi]
- Di-Sec: A distributed security framework for heterogeneous Wireless Sensor NetworksMarco Valero, Sang Shin Jung, A. Selcuk Uluagac, Yingshu Li, Raheem A. Beyah. 585-593 [doi]
- A binary-classification-tree based framework for distributed target classification in multimedia sensor networksLiang Liu, Anlong Ming, Huadong Ma, Xi Zhang. 594-602 [doi]
- Data gathering in wireless sensor networks through intelligent compressive sensingJin Wang, ShaoJie Tang, Baocai Yin, Xiang-Yang Li. 603-611 [doi]
- Maximizing profit on user-generated content platforms with heterogeneous participantsShaolei Ren, Jaeok Park, Mihaela van der Schaar. 612-620 [doi]
- Profiling Skype video calls: Rate control and video qualityXinggong Zhang, Yang Xu, Hao Hu, Yong Liu, Zongming Guo, Yao Wang. 621-629 [doi]
- Fully decentralized estimation of some global properties of a networkAntonio Carzaniga, Cyrus P. Hall, Michele Papalini. 630-638 [doi]
- Optimal resource allocation to defend against deliberate attacks in networking infrastructuresXun Xiao, Minming Li, Jianping Wang, Chunming Qiao. 639-647 [doi]
- Optimal max-min fairness rate control in wireless networks: Perron-Frobenius characterization and algorithmsDesmond W. H. Cai, Chee-Wei Tan, Steven H. Low. 648-656 [doi]
- Jointly optimal bit loading, channel pairing and power allocation for multi-channel relayingMahdi Hajiaghayi, Min Dong, Ben Liang. 657-665 [doi]
- Dynamic spectrum access as a serviceChunsheng Xin, Min Song. 666-674 [doi]
- Equilibrium selection in power control games on the interference channelGesualdo Scutari, Francisco Facchinei, Jong-Shi Pang, Lorenzo Lampariello. 675-683 [doi]
- Scaling social media applications into geo-distributed cloudsYu Wu, Chuan Wu, Bo Li 0001, Linquan Zhang, Zongpeng Li, Francis C. M. Lau. 684-692 [doi]
- LT codes-based secure and reliable cloud storage serviceNing Cao, Shucheng Yu, Zhenyu Yang, Wenjing Lou, Y. Thomas Hou. 693-701 [doi]
- Stochastic models of load balancing and scheduling in cloud computing clustersSiva Theja Maguluri, R. Srikant, Lei Ying. 702-710 [doi]
- A theory of cloud bandwidth pricing for video-on-demand providersDi Niu, Chen Feng, Baochun Li. 711-719 [doi]
- STROBE: Actively securing wireless communications using Zero-Forcing BeamformingNarendra Anand, Sung-Ju Lee, Edward W. Knightly. 720-728 [doi]
- Location privacy preservation in collaborative spectrum sensingShuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan, Kai Xing, Xuemin Shen. 729-737 [doi]
- Joint UFH and power control for effective wireless anti-jamming communicationKaihe Xu, Qian Wang, Kui Ren. 738-746 [doi]
- Detection of channel degradation attack by Intermediary Node in Linear NetworksEric Graves, Tan F. Wong. 747-755 [doi]
- Motioncast with general Markovian mobilityShangxing Wang, Youyun Xu, Xinbing Wang. 756-764 [doi]
- On the throughput-delay trade-off in georouting networksPhilippe Jacquet, Salman Malik, Bernard Mans, Alonso Silva. 765-773 [doi]
- Toward simple criteria to establish capacity scaling laws for wireless networksCanming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou, Sastry Kompella, Scott F. Midkiff. 774-782 [doi]
- Asymmetric topology control: Exact solutions and fast approximationsGruia Calinescu, K. Qiao. 783-791 [doi]
- Sherlock is around: Detecting network failures with local evidence fusionQiang Ma, Kebin Liu, Xin Miao, Yunhao Liu. 792-800 [doi]
- Towards energy-fairness in asynchronous duty-cycling sensor networksZhenjiang Li, Mo Li, Yunhao Liu. 801-809 [doi]
- Distributed node placement algorithms for constructing well-connected sensor networksArthur J. Friend, Vahideh H. Manshadi, Amin Saberi. 810-818 [doi]
- Cost-effective barrier coverage by mobile sensor networksShibo He, Jiming Chen, Xu Li, Xuemin Shen, Youxian Sun. 819-827 [doi]
- How to split a flow?Tzvika Hartman, Avinatan Hassidim, Haim Kaplan, Danny Raz, Michal Segalov. 828-836 [doi]
- Upward Max Min FairnessEmilie Danna, Avinatan Hassidim, Haim Kaplan, Alok Kumar, Yishay Mansour, Danny Raz, Michal Segalov. 837-845 [doi]
- A practical algorithm for balancing the max-min fairness and throughput objectives in traffic engineeringEmilie Danna, Subhasree Mandal, Arjun Singh. 846-854 [doi]
- Wireless capacity and admission control in cognitive radioMagnús M. Halldórsson, Pradipta Mitra. 855-863 [doi]
- Full/half duplex based resource allocations for statistical quality of service provisioning in wireless relay networksWenchi Cheng, Xi Zhang, Hailin Zhang. 864-872 [doi]
- Truthful spectrum auction design for secondary networksYuefei Zhu, Baochun Li, Zongpeng Li. 873-881 [doi]
- Channel allocation in non-cooperative multi-radio multi-channel wireless networksDejun Yang, Xi Fang, Guoliang Xue. 882-890 [doi]
- Efficient data retrieval scheduling for multi-channel wireless data broadcastZaixin Lu, Yan Shi, Weili Wu, Bin Fu. 891-899 [doi]
- Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networksQiben Yan, Ming Li, Tingting Jiang, Wenjing Lou, Y. Thomas Hou. 900-908 [doi]
- BitTrickle: Defending against broadband and high-power reactive jamming attacksYao Liu, Peng Ning. 909-917 [doi]
- A formal analysis of IEEE 802.11w deadlock vulnerabilitiesMartin Eian, Stig Fr. Mjølsnes. 918-926 [doi]
- Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networksHongbo Liu, Jie Yang 0003, Yan Wang, Yingying Chen. 927-935 [doi]
- When cloud meets eBay: Towards effective pricing for cloud computingQian Wang, Kui Ren, Xiaoqiao Meng. 936-944 [doi]
- ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloadingSokol Kosta, Andrius Aucinas, Pan Hui, Richard Mortier, Xinwen Zhang. 945-953 [doi]
- Energy-aware load balancing in content delivery networksVimal Mathew, Ramesh K. Sitaraman, Prashant J. Shenoy. 954-962 [doi]
- Network aware resource allocation in distributed cloudsMansoor Alicherry, T. V. Lakshman. 963-971 [doi]
- Traffic-aware multiple mix zone placement for protecting location privacyXinxin Liu, Han Zhao, Miao Pan, Hao Yue, Xiaolin Li 0001, Yuguang Fang. 972-980 [doi]
- On the design of scheduling algorithms for end-to-end backlog minimization in multi-hop wireless networksShizhen Zhao, Xiaojun Lin. 981-989 [doi]
- Scheduling in networks with time-varying channels and reconfiguration delayGuner D. Celik, Eytan Modiano. 990-998 [doi]
- On sample-path optimal dynamic scheduling for sum-queue minimization in trees under the K-hop interference modelSrikanth Hariharan, Ness B. Shroff. 999-1007 [doi]
- Efficient algorithms for sensor deployment and routing in sensor networks for network-structured environment monitoringShuguang Xiong, Lei Yu, Haiying Shen, Chen Wang, Wei Lu. 1008-1016 [doi]
- Environment-aware clock skew estimation and synchronization for wireless sensor networksZhe Yang, Lin Cai, Yu Liu, Jianping Pan. 1017-1025 [doi]
- Locating sensors in the forest: A case study in GreenOrbsCheng Bo, Danping Ren, ShaoJie Tang, Xiang-Yang Li, Xufei Mao, Qiuyuan Huang, Lufeng Mo, Zhiping Jiang, Yongmei Sun, Yunhao Liu. 1026-1034 [doi]
- Snapshot/Continuous Data Collection capacity for large-scale probabilistic Wireless Sensor NetworksShouling Ji, Raheem A. Beyah, Zhipeng Cai. 1035-1043 [doi]
- Mitigating timing based information leakage in shared schedulersSachin Kadloor, Negar Kiyavash, Parv Venkitasubramaniam. 1044-1052 [doi]
- Fair background data transfers of minimal delay impactCostas Courcoubetis, Antonis Dimakis. 1053-1061 [doi]
- Optimal scheduling policies with mutual information accumulation in wireless networksJing Yang 0002, Yanpei Liu, Stark C. Draper. 1062-1070 [doi]
- Low-delay wireless scheduling with partial channel-state informationAditya Gopalan, Constantine Caramanis, Sanjay Shakkottai. 1071-1079 [doi]
- Adaptive resource scheduling in wireless OFDMA relay networksKarthikeyan Sundaresan, Sampath Rangarajan. 1080-1088 [doi]
- Performance bounds and associated design principles for multi-cellular wireless OFDMA systemsRohit Aggarwal, Can Emre Koksal, Philip Schniter. 1089-1097 [doi]
- Queue-based sub-carrier grouping for feedback reduction in OFDMA systemsHarish Ganapathy, Constantine Caramanis. 1098-1106 [doi]
- FemtoCaching: Wireless video content delivery through distributed caching helpersNegin Golrezaei, Karthikeyan Shanmugam, Alexandros G. Dimakis, Andreas F. Molisch, Giuseppe Caire. 1107-1115 [doi]
- REWIRE: An optimization-based framework for unstructured data center network designAndrew R. Curtis, Tommy Carpenter, Mustafa Elsheikh, Alejandro López-Ortiz, Srinivasan Keshav. 1116-1124 [doi]
- CARPO: Correlation-aware power optimization in data center networksXiaodong Wang, Yanjun Yao, Xiaorui Wang, Kefa Lu, Qing Cao. 1125-1133 [doi]
- Bargaining towards maximized resource utilization in video streaming datacentersYuan Feng, Baochun Li, Bo Li 0001. 1134-1142 [doi]
- Joint scheduling of processing and Shuffle phases in MapReduce systemsFangfei Chen, Murali S. Kodialam, T. V. Lakshman. 1143-1151 [doi]
- Secret communication in large wireless networks without eavesdropper location informationCagatay Capar, Dennis Goeckel, Benyuan Liu, Don Towsley. 1152-1160 [doi]
- Detection and prevention of SIP flooding attacks in voice over IP networksJin Tang, Yu Cheng, Yong Hao. 1161-1169 [doi]
- Secure top-k query processing via untrusted location-based service providersRui Zhang 0007, Yanchao Zhang, Chi Zhang. 1170-1178 [doi]
- Physical layer security from inter-session interference in large wireless networksAzadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik, Don Towsley. 1179-1187 [doi]
- A novel multi-tariff charging method for next generation Multicast and Broadcast ServiceSok-Ian Sou, Phone Lin, Ssu-Shih Chen, Jeu-Yih Jeng. 1188-1196 [doi]
- GENESIS: An agent-based model of interdomain network formation, traffic flow and economicsAemen Lodhi, Amogh Dhamdhere, Constantine Dovrolis. 1197-1205 [doi]
- Multi-resource allocation: Fairness-efficiency tradeoffs in a unifying frameworkCarlee Joe-Wong, Soumya Sen, Tian Lan, Mung Chiang. 1206-1214 [doi]
- Spectrum leasing to femto service provider with hybrid accessYouwen Yi, Jin Zhang, Qian Zhang, Tao Jiang. 1215-1223 [doi]
- Asymptotically optimal downlink scheduling over Markovian fading channelsWenzhuo Ouyang, Atilla Eryilmaz, Ness B. Shroff. 1224-1232 [doi]
- HOSA: Holistic scheduling and analysis for scalable fault-tolerant FlexRay designYu Hua, Xue Liu, Wenbo He. 1233-1241 [doi]
- On managing quality of experience of multiple video streams in wireless networksPartha Dutta, Anand Seetharam, Vijay Arya, Malolan Chetlur, Shivkumar Kalyanaraman, Jim Kurose. 1242-1250 [doi]
- Stability of the Max-Weight protocol in adversarial wireless networksSungsu Lim, Kyomin Jung, Matthew Andrews. 1251-1259 [doi]
- Connectivity of large-scale Cognitive Radio Ad Hoc NetworksDianjie Lu, Xiaoxia Huang, Pan Li, Jianping Fan. 1260-1268 [doi]
- Wireless MAC processors: Programming MAC protocols on commodity HardwareIlenia Tinnirello, Giuseppe Bianchi, Pierluigi Gallo, Domenico Garlisi, Francesco Giuliano, Francesco Gringoli. 1269-1277 [doi]
- Understanding the tempo-spatial limits of information dissemination in multi-channel Cognitive Radio NetworksLei Sun, Wenye Wang. 1278-1286 [doi]
- On latency distribution and scaling: from finite to large Cognitive Radio Networks under general mobilityLei Sun, Wenye Wang. 1287-1295 [doi]
- Physarum optimization: A biology-inspired algorithm for minimal exposure path problem in wireless sensor networksLiang Liu, Yuning Song, Huadong Ma, Xi Zhang. 1296-1304 [doi]
- A distributed optimal framework for mobile data gathering with concurrent data uploading in wireless sensor networksSongtao Guo, Yuanyuan Yang. 1305-1313 [doi]
- Distributed critical location coverage in wireless sensor networks with lifetime constraintChanglei Liu, Guohong Cao. 1314-1322 [doi]
- 2: Lazy forwarding in low duty cycle wireless sensor networksZhichao Cao, Yuan He, Yunhao Liu. 1323-1331 [doi]
- A server's perspective of Internet streaming delivery to mobile devicesYao Liu, Fei Li, Lei Guo, Bo Shen, Songqing Chen. 1332-1340 [doi]
- Characterizing geospatial dynamics of application usage in a 3G cellular data networkMuhammad Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Jia Wang. 1341-1349 [doi]
- Threshold compression for 3G scalable monitoringSuk-Bok Lee, Dan Pei, MohammadTaghi Hajiaghayi, Ioannis Pefkianakis, Songwu Lu, He Yan, Zihui Ge, Jennifer Yates, Mario Kosseifi. 1350-1358 [doi]
- On the optimal mobile association in heterogeneous wireless relay networksQian Clara Li, Rose Qingyang Hu, Geng Wu, Yi Qian. 1359-1367 [doi]
- Social feature-based multi-path routing in delay tolerant networksJie Wu 0001, Yunsheng Wang. 1368-1376 [doi]
- Traps and pitfalls of using contact traces in performance studies of opportunistic networksNikodin Ristanovic, George Theodorakopoulos, Jean-Yves Le Boudec. 1377-1385 [doi]
- Efficient multicasting for delay tolerant networks using graph indexingMisael Mongiovì, Ambuj K. Singh, Xifeng Yan, Bo Zong, Konstantinos Psounis. 1386-1394 [doi]
- PReFilter: An efficient privacy-preserving Relay Filtering scheme for delay tolerant networksRongxing Lu, Xiaodong Lin, Tom H. Luan, Xiaohui Liang, Xu Li, Le Chen, Xuemin Shen. 1395-1403 [doi]
- Sliding Mode Congestion Control for data center Ethernet networksWanchun Jiang, Fengyuan Ren, Ran Shu, Chuang Lin. 1404-1412 [doi]
- Exploring server redundancy in nonblocking multicast data center networksZhiyang Guo, Zhemin Zhang, Yuanyuan Yang. 1413-1421 [doi]
- Experimental performance comparison of Byzantine Fault-Tolerant protocols for data centersGuanfeng Liang, Benjamin Sommer, Nitin H. Vaidya. 1422-1430 [doi]
- Data centers power reduction: A two time scale approach for delay tolerant workloadsYuan Yao, Longbo Huang, Abhishek Sharma, Leana Golubchik, Michael J. Neely. 1431-1439 [doi]
- AP association in 802.11n WLANs with heterogeneous clientsDawei Gong, Yuanyuan Yang. 1440-1448 [doi]
- HJam: Attachment transmission in WLANsKaishun Wu, Haochao Li, Lu Wang, Youwen Yi, Yunhuai Liu, Qian Zhang, Lionel M. Ni. 1449-1457 [doi]
- SAP: Smart Access Point with seamless load balancing multiple interfacesXi Chen, Yue Zhao, Brian Peck, Daji Qiao. 1458-1466 [doi]
- ADAM: An adaptive beamforming system for multicasting in wireless LANsEhsan Aryafar, Mohammad Ali Khojastepour, Karthikeyan Sundaresan, Sampath Rangarajan, Edward W. Knightly. 1467-1475 [doi]
- Capacity and delay analysis for social-proximity urban vehicular networksNing Lu, Tom H. Luan, Miao Wang, Xuemin Shen, Fan Bai. 1476-1484 [doi]
- Infrastructure-assisted routing in vehicular networksYuchen Wu, Yanmin Zhu, Bo Li 0001. 1485-1493 [doi]
- RISA: Distributed Road Information Sharing ArchitectureJoon Ahn, Yi Wang, Bo Yu, Fan Bai, Bhaskar Krishnamachari. 1494-1502 [doi]
- A measurement-based study of beaconing performance in IEEE 802.11p vehicular networksFrancesca Martelli, M. Elena Renda, Giovanni Resta, Paolo Santi. 1503-1511 [doi]
- Cache capacity allocation for BitTorrent-like systems to minimize inter-ISP trafficValentino Pacifici, Frank Lehrieder, György Dán. 1512-1520 [doi]
- Network optimization for DHT-based applicationsYi Sun, Yang Richard Yang, Xiaobing Zhang, Yang Guo, Jun Li 0002, Kavé Salamatian. 1521-1529 [doi]
- A unifying model and analysis of P2P VoD replication and schedulingYipeng Zhou, Tom Z. J. Fu, Dah-Ming Chiu. 1530-1538 [doi]
- Stochastic analysis of self-sustainability in peer-assisted VoD systemsDelia Ciullo, Valentina Martina, Michele Garetto, Emilio Leonardi, Giovanni Luca Torrisi. 1539-1547 [doi]
- Approximately optimal adaptive learning in opportunistic spectrum accessCem Tekin, Mingyan Liu. 1548-1556 [doi]
- Spectrum clouds: A session based spectrum trading system for multi-hop cognitive radio networksMiao Pan, Pan Li, Yang Song, Yuguang Fang, Phone Lin. 1557-1565 [doi]
- Uplink soft frequency reuse for self-coexistence of cognitive radio networks operating in white-space spectrumBo Gao, Jung-Min Park 0001, Yaling Yang. 1566-1574 [doi]
- Maximizing system throughput by cooperative sensing in Cognitive Radio NetworksShuang Li, Zizhan Zheng, Eylem Ekici, Ness B. Shroff. 1575-1583 [doi]
- Constant-approximation for target coverage problem in wireless sensor networksLing Ding, Weili Wu, James Willson, Lidong Wu, Zaixin Lu, Wonjun Lee. 1584-1592 [doi]
- DEAR: Delay-bounded Energy-constrained Adaptive Routing in wireless sensor networksShi Bai, Weiyi Zhang, Guoliang Xue, Jian Tang, Chonggang Wang. 1593-1601 [doi]
- A robust boundary detection algorithm based on connectivity only for 3D wireless sensor networksHongyu Zhou, Hongyi Wu, Miao Jin. 1602-1610 [doi]
- CitySee: Urban CO2 monitoring with sensorsXufei Mao, Xin Miao, Yuan He, Xiang-Yang Li, Yunhao Liu. 1611-1619 [doi]
- Unreeling netflix: Understanding and improving multi-CDN movie deliveryVijay Kumar Adhikari, Yang Guo, Fang Hao, Matteo Varvello, Volker Hilt, Moritz Steiner, Zhi-Li Zhang. 1620-1628 [doi]
- Robust multi-source network tomography using selective probesAkshay Krishnamurthy, Aarti Singh. 1629-1637 [doi]
- The Bloom paradox: When not to use a Bloom filter?Ori Rottenstreich, Isaac Keslassy. 1638-1646 [doi]
- Tracking millions of flows in high speed networks for application identificationTian Pan, Xiaoyu Guo, Chenhui Zhang, Junchen Jiang, Hao Wu, Bin Liuy. 1647-1655 [doi]
- Energy efficient delivery of immersive video centric servicesJaime Llorca, Kyle Guan, Gary Atkinson, Daniel C. Kilper. 1656-1664 [doi]
- Energy-efficient spectrum sharing and power allocation in cognitive radio femtocell networksRenchao Xie, F. Richard Yu, Hong Ji. 1665-1673 [doi]
- Towards optimal energy store-carry-and-deliver for PHEVs via V2G systemHao Liang, Bong-Jun Choi, Weihua Zhuang, Xuemin Shen. 1674-1682 [doi]
- On exploiting flow allocation with rate adaptation for green networkingJian Tang, Brendan Mumey, Yun Xing, Andy Johnson. 1683-1691 [doi]
- Sampling directed graphs with random walksBruno F. Ribeiro, Pinghui Wang, Fabricio Murai, Don Towsley. 1692-1700 [doi]
- Incentive mechanisms for smartphone collaboration in data acquisition and distributed computingLingjie Duan, Takeshi Kubo, Kohei Sugiyama, Jianwei Huang, Teruyuki Hasegawa, Jean C. Walrand. 1701-1709 [doi]
- Cosine-neighbourhood-refinement: Towards a robust network formation mechanismFelix Ming, Fai Wong, Peter Marbach. 1710-1718 [doi]
- Proactive seeding for information cascades in cellular networksFrancesco Malandrino, Maciej Kurant, Athina Markopoulou, Cédric Westphal, Ulas C. Kozat. 1719-1727 [doi]
- Firewall fingerprintingAmir R. Khakpour, Joshua W. Hulst, Zihui Ge, Alex X. Liu, Dan Pei, Jia Wang. 1728-1736 [doi]
- Hardware-accelerated regular expression matching at multiple tens of Gb/sJan van Lunteren, Alexis Guanella. 1737-1745 [doi]
- FlowSifter: A counting automata approach to layer 7 field extraction for deep flow inspectionChad R. Meiners, Eric Norige, Alex X. Liu, Eric Torng. 1746-1754 [doi]
- Robust feature selection and robust PCA for internet traffic anomaly detectionCláudia Pascoal, Maria Rosário de Oliveira, Rui Valadas, Peter Filzmoser, Paulo Salvador, António Pacheco. 1755-1763 [doi]
- Achievable transmission capacity of cognitive mesh networks with different media access controlTao Jing, Xiuying Chen, Yan Huo, Xiuzhen Cheng. 1764-1772 [doi]
- On Exploiting degrees-of-freedom in whitespacesHarish Ganapathy, Mukundan Madhavan, Malolan Chetlur, Shivkumar Kalyanaraman. 1773-1781 [doi]
- Spectrum sensing based on three-state model to accomplish all-level fairness for co-existing multiple cognitive radio networksYanxiao Zhao, Min Song, Chunsheng Xin, Manish Wadhwa. 1782-1790 [doi]
- Delay optimal multichannel opportunistic accessShiyao Chen, Lang Tong, Qing Zhao. 1791-1799 [doi]
- A Markov chain model for coarse timescale channel variation in an 802.16e wireless networkAnand Seetharam, Jim Kurose, Dennis Goeckel, Gautam D. Bhanage. 1800-1807 [doi]
- Stochastic geometry based medium access gamesManjesh Kumar Hanawal, Eitan Altman, François Baccelli. 1808-1816 [doi]
- A geometrical probability approach to location-critical network performance metricsYanyan Zhuang, Jianping Pan. 1817-1825 [doi]
- Probabilistic analysis of buffer starvation in Markovian queuesYuedong Xu, Eitan Altman, Rachid El Azouzi, Majed Haddad, Salah-Eddine Elayoubi, Tania Jiménez. 1826-1834 [doi]
- Geometric algorithms for target localization and tracking under location uncertainties in wireless sensor networksKhuong Vu, Rong Zheng. 1835-1843 [doi]
- LBA: Lifetime balanced data aggregation in low duty cycle sensor networksZi Li, Yang Peng, Daji Qiao, Wensheng Zhang. 1844-1852 [doi]
- Approximate convex decomposition based localization in wireless sensor networksWenPing Liu, Dan Wang, Hongbo Jiang, Wenyu Liu, Chonggang Wang. 1853-1861 [doi]
- Share risk and energy: Sampling and communication strategies for multi-camera wireless monitoring networksZichong Chen, Guillermo Barrenetxea, Martin Vetterli. 1862-1870 [doi]
- Sparse recovery with graph constraints: Fundamental limits and measurement constructionMeng Wang, Weiyu Xu, Enrique Mallada, Ao Tang. 1871-1879 [doi]
- The Variable-Increment Counting Bloom FilterOri Rottenstreich, Yossi Kanizo, Isaac Keslassy. 1880-1888 [doi]
- Estimators also need shared values to grow togetherErez Tsidon, Iddo Hanniel, Isaac Keslassy. 1889-1897 [doi]
- Hierarchical hybrid search structure for high performance packet classificationOguzhan Erdem, Hoang Le, Viktor K. Prasanna. 1898-1906 [doi]
- Energy efficient broadcast in multiradio multichannel wireless networksChangcun Ma, Deying Li, Hongwei Du, Huan Ma, Yuexuan Wang, Wonjun Lee. 1907-1915 [doi]
- Energy-efficient collaborative sensing with mobile phonesXiang-Sheng, Jian Tang, Weiyi Zhang. 1916-1924 [doi]
- Reducing power of traffic manager in routers via dynamic on/off-chip schedulingJindou Fan, Chengchen Hu, Keqiang He, Junchen Jiang, Bin Liuy. 1925-1933 [doi]
- Cherish every joule: Maximizing throughput with an eye on network-wide energy consumptionCanming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou. 1934-1941 [doi]
- Socialize spontaneously with mobile applicationsZimu Liu, Yuan Feng, Baochun Li. 1942-1950 [doi]
- SybilDefender: Defend against sybil attacks in large social networksWei Wei, Fengyuan Xu, Chiu Chiang Tan, Qun Li. 1951-1959 [doi]
- Preference-aware content dissemination in opportunistic mobile social networksKate Ching-Ju Lin, Chun-Wei Chen, Cheng-Fu Chou. 1960-1968 [doi]
- Fine-grained private matching for proximity-based mobile social networkingRui Zhang 0007, Yanchao Zhang, Jinyuan Sun, Guanhua Yan. 1969-1977 [doi]
- Memory-efficient pattern matching architectures using perfect hashing on graphic processing unitsCheng-Hung Lin, Chen-Hsiung Liu, Shih-Chieh Chang, Wing-Kai Hon. 1978-1986 [doi]
- Decompression-free inspection: DPI for shared dictionary compression over HTTPAnat Bremler-Barr, Shimrit Tzur-David, David Hay, Yaron Koral. 1987-1995 [doi]
- L2P2: Location-aware location privacy protection for location-based servicesYu Wang 0003, Dingbang Xu, Xiao He, Chao Zhang, Fan Li, Bin Xu. 1996-2004 [doi]
- Traffic anomaly detection based on the IP size distributionFabio Soldo, Ahmed Metwally. 2005-2013 [doi]
- Cooperative relay with interference alignment for video over cognitive radio networksDonglin Hu, Shiwen Mao. 2014-2022 [doi]
- Spectrum management and power allocation in MIMO cognitive networksDiep N. Nguyen, Marwan Krunz. 2023-2031 [doi]
- Robust topology control in multi-hop cognitive radio networksJing Zhao, Guohong Cao. 2032-2040 [doi]
- Spectrum trading with insurance in cognitive radio networksHaiming Jin, Gaofei Sun, Xinbing Wang, Qian Zhang. 2041-2049 [doi]
- A conservation-law-based modular fluid-flow model for network congestion modelingCorentin Briat, Emre A. Yavuz, Gunnar Karlsson. 2050-2058 [doi]
- Impact of jitter-based techniques on flooding over wireless ad hoc networks: Model and analysisJuan Antonio Cordero, Philippe Jacquet, Emmanuel Baccelli. 2059-2067 [doi]
- Effect of access probabilities on the delay performance of Q-CSMA algorithmsJavad Ghaderi, R. Srikant. 2068-2076 [doi]
- Stochastic analysis of horizontal IP scanningDerek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri Loguinov. 2077-2085 [doi]
- CONSEL: Connectivity-based segmentation in large-scale 2D/3D sensor networksHongbo Jiang, Tianlong Yu, Chen Tian, Guang Tan, Chonggang Wang. 2086-2094 [doi]
- On the topology of wireless sensor networksSen Yang, Xinbing Wang, Luoyi Fu. 2095-2103 [doi]
- Exploiting constructive interference for scalable flooding in wireless networksYin Wang, Yuan He, Xufei Mao, Yunhao Liu, Zhiyu Huang, Xiang-Yang Li. 2104-2112 [doi]
- Distributed data collection and its capacity in asynchronous wireless sensor networksShouling Ji, Zhipeng Cai. 2113-2121 [doi]
- iBGP deceptions: More sessions, fewer routesStefano Vissicchio, Luca Cittadini, Laurent Vanbever, Olivier Bonaventure. 2122-2130 [doi]
- Loop mitigation in bloom filter based multicast: A destination-oriented approachXiaohua Tian, Yu Cheng. 2131-2139 [doi]
- Reputation-based incentive protocols in crowdsourcing applicationsYu Zhang, Mihaela van der Schaar. 2140-2148 [doi]
- On frame-based scheduling for directional mmWave WPANsIn Keun Son, Shiwen Mao, Michelle X. Gong, Yihan Li. 2149-2157 [doi]
- A time-efficient information collection protocol for large-scale RFID systemsHao Yue, Chi Zhang, Miao Pan, Yuguang Fang, Shigang Chen. 2158-2166 [doi]
- Novel constructions of complex orthogonal designs for space-time block codesYuan Li, Chen Yuan, Haibin Kan. 2167-2173 [doi]
- Privacy-preserving RFID authentication based on cryptographical encodingTao Li, Wen Luo, Zhen Mo, Shigang Chen. 2174-2182 [doi]
- Fault-tolerant RFID reader localization based on passive RFID tagsWeiping Zhu 0004, Jiannong Cao, Yi Xu, Lei Yang, Junjun Kong. 2183-2191 [doi]
- On quantification of anchor placementYibei Ling, Scott Alexander, Richard Lau. 2192-2200 [doi]
- On distinguishing the multiple radio paths in RSS-based rangingDian Zhang, Yunhuai Liu, Xiaonan Guo, Min Gao, Lionel M. Ni. 2201-2209 [doi]
- FILA: Fine-grained indoor localizationKaishun Wu, Jiang Xiao, Youwen Yi, Min Gao, Lionel M. Ni. 2210-2218 [doi]
- HAWK: An unmanned mini helicopter-based aerial wireless kit for localizationZhongli Liu, Yinjie Chen, Benyuan Liu, Chengyu Cao, Xinwen Fu. 2219-2227 [doi]
- Efficient anonymous message submissionXinxin Zhao, Lingjun Li, Guoliang Xue, Gabriel Silva. 2228-2236 [doi]
- Effective ad targeting with concealed profilesMurali S. Kodialam, T. V. Lakshman, Sarit Mukherjee. 2237-2245 [doi]
- Data perturbation with state-dependent noise for participatory sensingFan Zhang, Li He, Wenbo He, Xue Liu. 2246-2254 [doi]
- SmartAnalyzer: A noninvasive security threat analyzer for AMI smart gridMohammad Ashiqur Rahman, Padmalochan Bera, Ehab Al-Shaer. 2255-2263 [doi]
- Resource allocation for heterogeneous multiuser OFDM-based cognitive radio networks with imperfect spectrum sensingShaowei Wang, Zhi-Hua Zhou, Mengyao Ge, Chonggang Wang. 2264-2272 [doi]
- A distributed broadcast protocol in multi-hop cognitive radio ad hoc networks without a common control channelYi Song, Jiang Xie. 2273-2281 [doi]
- Combinatorial auction with time-frequency flexibility in cognitive radio networksMo Dong, Gaofei Sun, Xinbing Wang, Qian Zhang. 2282-2290 [doi]
- Almost optimal accessing of nonstochastic channels in cognitive radio networksXiang-Yang Li, Panlong Yang, Yubo Yan, Lizhao You, ShaoJie Tang, Qiuyuan Huang. 2291-2299 [doi]
- Backpressure with Adaptive Redundancy (BWAR)Majed Alresaini, Maheswaran Sathiamoorthy, Bhaskar Krishnamachari, Michael J. Neely. 2300-2308 [doi]
- Closed-form throughput expressions for CSMA networks with collisions and hidden terminalsBruno Nardelli, Edward W. Knightly. 2309-2317 [doi]
- Max-weight scheduling in networks with heavy-tailed trafficMihalis G. Markakis, Eytan Modiano, John N. Tsitsiklis. 2318-2326 [doi]
- Learning to route queries in unstructured P2P networks: Achieving throughput optimality subject to query resolution constraintsVirag Shah, Gustavo de Veciana, George Kesidis. 2327-2335 [doi]
- On the admission of dependent flows in powerful sensor networksReuven Cohen, Ilia Nudelman, Gleb Polevoy. 2336-2344 [doi]
- Optimal surface deployment problem in wireless sensor networksMiao Jin, Guodong Rong, Hongyi Wu, Liang Shuai, Xiaohu Guo. 2345-2353 [doi]
- Optimal range assignment in solar powered active wireless sensor networksBenjamin Gaudette, Vinay Hanumaiah, Sarma B. K. Vrudhula, Marwan Krunz. 2354-2362 [doi]
- DEOS: Dynamic energy-oriented scheduling for sustainable wireless sensor networksTing Zhu, Abedelaziz Mohaisen, Yi-ping, Don Towsley. 2363-2371 [doi]
- Obfuscation of sensitive data in network flowsDaniele Riboni, Antonio Villani, Domenico Vitali, Claudio Bettini, Luigi V. Mancini. 2372-2380 [doi]
- Extensive analysis and large-scale empirical evaluation of tor bridge discoveryZhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen Fu. 2381-2389 [doi]
- A novel network delay based side-channel attack: Modeling and defenseZhen Ling, Junzhou Luo, Yang Zhang, Ming Yang, Xinwen Fu, Wei Yu. 2390-2398 [doi]
- Efficient algorithms for K-anonymous location privacy in participatory sensingKhuong Vu, Rong Zheng, Jie Gao. 2399-2407 [doi]
- An Opportunistic Resource Sharing and Topology-Aware mapping framework for virtual networksSheng Zhang, Zhuzhong Qian, Jie Wu 0001, Sanglu Lu. 2408-2416 [doi]
- Flow-aware traffic control for a content-centric networkSara Oueslati, James Roberts, Nada Sbihi. 2417-2425 [doi]
- Enhancing cache robustness for content-centric networkingMengjun Xie, Indra Widjaja, Haining Wang. 2426-2434 [doi]
- A hybrid IP lookup architecture with fast updatesLayong Luo, Gaogang Xie, Yingke Xie, Laurent Mathy, Kavé Salamatian. 2435-2443 [doi]
- Collaborative hierarchical caching with dynamic request routing for massive content distributionJie Dai, Zhan Hu, Bo Li 0001, Jiangchuan Liu, Baochun Li. 2444-2452 [doi]
- How good is bargained routing?Gideon Blocq, Ariel Orda. 2453-2461 [doi]
- Analysis of TDMA crossbar real-time switch design for AFDX networksLei Rao, Qixin Wang, Xue Liu, Yufei Wang. 2462-2470 [doi]
- Transparent acceleration of software packet forwarding using netmapLuigi Rizzo, Marta Carbone, Gaetano Catalli. 2471-2479 [doi]
- Efficient processing of location-cloaked queriesPatricio Galdames, Ying Cai. 2480-2488 [doi]
- A distributed Newton's method for joint multi-hop routing and flow control: Theory and algorithmJia Liu, Hanif D. Sherali. 2489-2497 [doi]
- Exact regenerating codes for Byzantine fault tolerance in distributed storageYunghsiang S. Han, Rong Zheng, Wai Ho Mow. 2498-2506 [doi]
- NSDMiner: Automated discovery of Network Service DependenciesArun Natarajan, Peng Ning, Yao Liu, Sushil Jajodia, Steve E. Hutchinson. 2507-2515 [doi]
- Distributed measurement-aware routing: Striking a balance between measurement and traffic engineeringChia-Wei Chang, Han Liu, Guanyao Huang, Bill Lin, Chen-Nee Chuah. 2516-2520 [doi]
- Vivisecting YouTube: An active measurement studyVijay Kumar Adhikari, Sourabh Jain, Yingying Chen, Zhi-Li Zhang. 2521-2525 [doi]
- Origin-destination flow measurement in high-speed networksTao Li, Shigang Chen, Yan Qiao. 2526-2530 [doi]
- China's Internet: Topology mapping and geolocatingYe Tian, Ratan Dey, Yong Liu, Keith W. Ross. 2531-2535 [doi]
- Characterizing end-host application performance across multiple networking environmentsDiana Joumblatt, Oana Goga, Renata Teixeira, Jaideep Chandrashekar, Nina Taft. 2536-2540 [doi]
- SubFlow: Towards practical flow-level traffic classificationGuowu Xie, Marios Iliofotou, Ram Keralapura, Michalis Faloutsos, Antonio Nucci. 2541-2545 [doi]
- TECC: Towards collaborative in-network caching guided by traffic engineeringHaiyong Xie, Guangyu Shi, Pengwei Wang. 2546-2550 [doi]
- Harnessing Internet topological stability in Thorup-Zwick compact routingStephen D. Strowes, Colin Perkins. 2551-2555 [doi]
- A fresh look at inter-domain route aggregationJoão L. Sobrinho, Franck Le. 2556-2560 [doi]
- Block permutations in Boolean Space to minimize TCAM for packet classificationRihua Wei, Yang Xu, H. Jonathan Chao. 2561-2565 [doi]
- Workload factoring with the cloud: A game-theoretic perspectiveAmir Nahir, Ariel Orda, Danny Raz. 2566-2570 [doi]
- Cost-minimizing dynamic migration of content distribution services into hybrid cloudsXuanjia Qiu, Hongxing Li, Chuan Wu, Zongpeng Li, Francis C. M. Lau. 2571-2575 [doi]
- Towards temporal access control in cloud computingYan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang, Shan-Biao Wang. 2576-2580 [doi]
- Efficient information retrieval for ranked queries in cost-effective cloud environmentsQin Liu, Chiu Chiang Tan, Jie Wu 0001, Guojun Wang. 2581-2585 [doi]
- Performance analysis of Coupling Scheduler for MapReduce/HadoopJian Tan, Xiaoqiao Meng, Li Zhang. 2586-2590 [doi]
- On the construction of data aggregation tree with minimum energy cost in wireless sensor networks: NP-completeness and approximation algorithmsTung-Wei Kuo, Ming-Jer Tsai. 2591-2595 [doi]
- Tracking and identifying burglar using collaborative sensor-camera networksHaitao Zhang, ShaoJie Tang, Xiang-Yang Li, Huadong Ma. 2596-2600 [doi]
- Optimal density estimation for exposure-path prevention in wireless sensor networks using percolation theoryLiang Liu, Xi Zhang, Huadong Ma. 2601-2605 [doi]
- Thermal Inertia: Towards an energy conservation room management systemDawei Pan, Yi Yuan, Dan Wang, XiaoHua Xu, Yu Peng, Xiyuan Peng, Peng-Jun Wan. 2606-2610 [doi]
- A POMDP framework for heterogeneous sensor selection in wireless body area networksDaphney-Stavroula Zois, Marco Levorato, Urbashi Mitra. 2611-2615 [doi]
- MobiShare: Flexible privacy-preserving location sharing in mobile online social networksWei Wei, Fengyuan Xu, Qun Li. 2616-2620 [doi]
- Trusted collaborative spectrum sensing for mobile cognitive radio networksShraboni Jana, Kai Zeng, Prasant Mohapatra. 2621-2625 [doi]
- Distributed online channel assignment toward optimal monitoring in multi-channel wireless networksDong-Hoon Shin, Saurabh Bagchi, Chih-Chun Wang. 2626-2630 [doi]
- Open WiFi networks: Lethal weapons for botnets?Matthew Knysz, Xin Hu, Yuanyuan Zeng, Kang G. Shin. 2631-2635 [doi]
- Enhanced wireless channel authentication using time-synched link signatureYao Liu, Peng Ning. 2636-2640 [doi]
- The sharing at roadside: Vehicular content distribution using parked vehiclesNianbo Liu, Ming Liu, Guihai Chen, Jiannong Cao. 2641-2645 [doi]
- Distributed storage codes reduce latency in vehicular networksMaheswaran Sathiamoorthy, Alexandros G. Dimakis, Bhaskar Krishnamachari, Fan Bai. 2646-2650 [doi]
- Trace-based performance analysis of opportunistic forwarding under imperfect node cooperationMerkourios Karaliopoulos, Christian Rohner. 2651-2655 [doi]
- A mixed queueing network model of mobility in a campus wireless networkYung-Chih Chen, Jim Kurose, Don Towsley. 2656-2660 [doi]
- POVA: Traffic light sensing with probe vehiclesXuemei Liu, Yanmin Zhu, Minglu Li, Qian Zhang. 2661-2665 [doi]
- An analytical approach towards cooperative relay scheduling under partial state informationHuijiang Li, Neeraj Jaggi, Biplab Sikdar. 2666-2670 [doi]
- Semi-structured and unstructured data aggregation scheduling in wireless sensor networksMiloud Bagaa, Abdelouahid Derhab, Noureddine Lasla, Abdelraouf Ouadjaout, Nadjib Badache. 2671-2675 [doi]
- Morello: A quality-of-monitoring oriented sensing scheduling protocol in Sensor NetworksShaoJie Tang, Lei Yang. 2676-2680 [doi]
- Scalable routing in 3D high genus sensor networks using graph embeddingXiaokang Yu, Xiaotian Yin, Wei Han, Jie Gao, Xianfeng Gu. 2681-2685 [doi]
- Fusion of state estimates over long-haul sensor networks under random delay and lossQiang Liu, Xin Wang, Nageswara S. V. Rao. 2686-2690 [doi]
- Distributed link scheduling for throughput maximization under physical interference modelYaqin Zhou, Xiang-Yang Li, Min Liu, Zhongcheng Li, ShaoJie Tang, Xufei Mao, Qiuyuan Huang. 2691-2695 [doi]
- Connection-level scheduling in wireless networks using only MAC-layer informationJavad Ghaderi, Tianxiong Ji, R. Srikant. 2696-2700 [doi]
- BOR/AC: Bandwidth-aware opportunistic routing with admission control in wireless mesh networksPeng Zhao, Xinyu Yang, Jiayin Wang, Benyuan Liu, Jie Wang. 2701-2705 [doi]
- PLASMA: A new routing paradigm for wireless multihop networksRafael P. Laufer, Pedro B. Velloso, Luiz Filipe M. Vieira, Leonard Kleinrock. 2706-2710 [doi]
- Context-aware sensor data dissemination for mobile users in remote areasEdith C. H. Ngai, Mani B. Srivastava, Jiangchuan Liu. 2711-2715 [doi]
- Energy-optimal mobile application execution: Taming resource-poor mobile devices with cloud clonesYonggang Wen, Weiwen Zhang, Haiyun Luo. 2716-2720 [doi]
- Dynamic lookahead mechanism for conserving power in multi-player mobile gamesKarthik Thirugnanam, Bhojan Anand, Jeena Sebastian, Pravein G. Kannan, Akkihebbal L. Ananda, Rajesh Krishna Balan, Mun Choon Chan. 2721-2725 [doi]
- Design and experimental evaluation of context-aware link-level adaptationJialin He, Hui Liu, Pengfei Cui, Jonathan Landon, Onur Altintas, Rama Vuyyuru, Dinesh Rajan, Joseph David Camp. 2726-2730 [doi]
- Real-time status: How often should one update?Sanjit Krishnan Kaul, Roy D. Yates, Marco Gruteser. 2731-2735 [doi]
- Geographic max-flow and min-cut under a circular disk failure modelSebastian Neumayer, Alon Efrat, Eytan Modiano. 2736-2740 [doi]
- A fast sketch for aggregate queries over high-speed network trafficYang Liu, Wenji Chen, Yong Guan. 2741-2745 [doi]
- Using host profiling to refine statistical application identificationMohamad Jaber, Roberto G. Cascella, Chadi Barakat. 2746-2750 [doi]
- Cuckoo sampling: Robust collection of flow aggregates under a fixed memory budgetJosep Sanjuàs-Cuxart, Pere Barlet-Ros, Nick G. Duffield, Ramana Rao Kompella. 2751-2755 [doi]
- Argus: End-to-end service anomaly detection and localization from an ISP's point of viewHe Yan, Ashley Flavel, Zihui Ge, Alexandre Gerber, Daniel Massey, Christos Papadopoulos, Hiren Shah, Jennifer Yates. 2756-2760 [doi]
- A reverse auction framework for access permission transaction to promote hybrid access in femtocell networkYanjiao Chen, Jin Zhang, Qian Zhang, Juncheng Jia. 2761-2765 [doi]
- Pricing strategies for user-provided connectivity servicesMohammad Hadi Afrasiabi, Roch Guérin. 2766-2770 [doi]
- Semi-dynamic Hawk and Dove game, applied to power controlEitan Altman, Dieter Fiems, Majed Haddad, Julien Gaillard. 2771-2775 [doi]
- Design and analysis of a choking strategy for coalitions in data swarming systemsHonggang Zhang, Sudarshan Vasudevan. 2776-2780 [doi]
- A bayesian based incentive-compatible routing mechanism for Dynamic Spectrum Access networksSwastik Brahma, Mainak Chatterjee. 2781-2785 [doi]
- Perception-based playout scheduling for high-quality real-time interactive multimediaZixia Huang, Klara Nahrstedt. 2786-2790 [doi]
- Coding and replication co-design for interactive multiview video streamingHuan Huang, Bo Zhang, S.-H. Gary Chan, Gene Cheung, Pascal Frossard. 2791-2795 [doi]
- Rate allocation for layered multicast streaming with inter-layer network codingJoerg Widmer, Andrea Capalbo, Antonio Fernández Anta, Albert Banchs. 2796-2800 [doi]
- Simple regenerating codes: Network coding for cloud storageDimitris S. Papailiopoulos, Jianqiang Luo, Alexandros G. Dimakis, Cheng Huang, Jin Li. 2801-2805 [doi]
- On region-based fault tolerant design of distributed file storage in networksSujogya Banerjee, Shahrzad Shirazipourazad, Arunabha Sen. 2806-2810 [doi]
- Energy and latency analysis for in-network computation with compressive sensing in wireless sensor networksHaifeng Zheng, Shilin Xiao, Xinbing Wang, Xiaohua Tian. 2811-2815 [doi]
- SpeedBalance: Speed-scaling-aware optimal load balancing for green cellular networksKyuho Son, Bhaskar Krishnamachari. 2816-2820 [doi]
- Realizing the full potential of PSM using proxyingNing Ding, Abhinav Pathak, Dimitrios Koutsonikolas, Clayton Shepard, Y. Charlie Hu, Lin Zhong. 2821-2825 [doi]
- Minimum energy coding for wireless nanosensor networksMurat Kocaoglu, Özgür B. Akan. 2826-2830 [doi]
- Selection of a rate adaptation scheme for network hardwareAndrea Francini. 2831-2835 [doi]
- Estimating age privacy leakage in online social networksRatan Dey, Cong Tang, Keith W. Ross, Nitesh Saxena. 2836-2840 [doi]
- Pssst, over here: Communicating without fixed infrastructureTom Callahan, Mark Allman, Michael Rabinovich. 2841-2845 [doi]
- EFFORT: Efficient and effective bot malware detectionSeungwon Shin, Zhaoyan Xu, Guofei Gu. 2846-2850 [doi]
- Can we beat legitimate cyber behavior mimicking attacks from botnets?Shui Yu, Song Guo, Ivan Stojmenovic. 2851-2855 [doi]
- Coordination in network security gamesMarc Lelarge. 2856-2860 [doi]
- Improving consolidation of virtual machines with risk-aware bandwidth oversubscription in compute cloudsDavid Breitgand, Amir Epstein. 2861-2865 [doi]
- RED-BL: Energy solution for loading data centersMuhammad Saqib Ilyas, Saqib Raza, Chao-Chih Chen, Zartash Afzal Uzmi, Chen-Nee Chuah. 2866-2870 [doi]
- To migrate or to wait: Bandwidth-latency tradeoff in opportunistic scheduling of parallel tasksTing He, Shiyao Chen, Hyoil Kim, Lang Tong, Kang-Won Lee. 2871-2875 [doi]
- Joint VM placement and routing for data center traffic engineeringJoe Wenjie Jiang, Tian Lan, Sangtae Ha, Minghua Chen, Mung Chiang. 2876-2880 [doi]
- Geographic trough filling for internet datacentersDan Xu, Xin Liu. 2881-2885 [doi]
- SocialTube: P2P-assisted video sharing in online social networksZe Li, Haiying Shen, Hailang Wang, Guoxin Liu, Jin Li. 2886-2890 [doi]
- Accelerating peer-to-peer file sharing with social relations: Potentials and challengesHaiyang Wang, Feng Wang, Jiangchuan Liu. 2891-2895 [doi]
- Mechanism design for finding experts using locally constructed social referral webLan Zhang, Xiang-Yang Li, Yunhao Liu, Qiuyuan Huang, ShaoJie Tang. 2896-2900 [doi]
- Guiding internet-scale video service deployment using microblog-based predictionZhi Wang, Lifeng Sun, Chuan Wu, Shiqiang Yang. 2901-2905 [doi]
- Near-optimal random walk sampling in distributed networksAtish Das Sarma, Anisur Rahaman Molla, Gopal Pandurangan. 2906-2910 [doi]
- Maximizing throughput when achieving time fairness in multi-rate wireless LANsYuan Le, Liran Ma, Wei Cheng, Xiuzhen Cheng, Biao Chen. 2911-2915 [doi]
- Fast and accurate packet delivery estimation based on DSSS chip errorsPirmin Heinzer, Vincent Lenders, Franck Legendre. 2916-2920 [doi]
- Is diversity gain worth the pain: A delay comparison between opportunistic multi-channel MAC and single-channel MACYang Liu, Mingyan Liu, Jing Deng. 2921-2925 [doi]
- WiBee: Building WiFi radio map with ZigBee sensor networksWenxian Li, Yanmin Zhu, Tian He. 2926-2930 [doi]
- VoIPiggy: Implementation and evaluation of a mechanism to boost voice capacity in 802.11WLANsPablo Salvador, Francesco Gringoli, Vincenzo Mancuso, Pablo Serrano, Andrea Mannocci, Albert Banchs. 2931-2935 [doi]
- MIMO downlink scheduling in LTE systemsHonghai Zhang, Narayan Prasad, Sampath Rangarajan. 2936-2940 [doi]
- MIMO wireless networks with directional antennas in indoor environmentsTae-Hyun Kim, Theodoros Salonidis, Henrik Lundgren. 2941-2945 [doi]
- Self-organization in wireless networks: A flow-level perspectiveRichard Combes, Zwi Altman, Eitan Altman. 2946-2950 [doi]
- Algorithm design for femtocell base station placement in commercial building environmentsJia Liu, Qian Chen, Hanif D. Sherali. 2951-2955 [doi]
- Experimental characterization of interference in OFDMA femtocell networksMustafa Y. Arslan, Jongwon Yoon, Karthikeyan Sundaresan, Srikanth V. Krishnamurthy, Suman Banerjee. 2956-2960 [doi]
- Analysis of backward congestion notification with delay for enhanced ethernet networksWanchun Jiang, Fengyuan Ren, Chuang Lin, Ivan Stojmenovic. 2961-2965 [doi]
- Anchored desynchronizationChing-Ming Lien, Shu-Hao Chang, Cheng-Shang Chang, Duan-Shin Lee. 2966-2970 [doi]
- Proactive failure detection for WDM carrying IPJelena Pesic, Julien Meuric, Esther Le Rouzic, Laurent Dupont, Michel Morvan. 2971-2975 [doi]
- Delay and rate-optimal control in a multi-class priority queue with adjustable service ratesChih-Ping Li, Michael J. Neely. 2976-2980 [doi]
- Weighted fair queuing with differential droppingFeng Lu, Geoffrey M. Voelker, Alex C. Snoeren. 2981-2985 [doi]
- Redundancy management for P2P backupLászló Toka, Pasquale Cataldi, Matteo Dell'Amico, Pietro Michiardi. 2986-2990 [doi]
- On superposition of heterogeneous edge processes in dynamic random graphsZhongmei Yao, Daren B. H. Cline, Dmitri Loguinov. 2991-2995 [doi]
- Reverse-engineering BitTorrent: A Markov approximation perspectiveZiyu Shao, Hao Zhang, Minghua Chen, Kannan Ramchandran. 2996-3000 [doi]
- Performance analysis of non-stationary peer-assisted VoD systemsDelia Ciullo, Valentina Martina, Michele Garetto, Emilio Leonardi, Giovanni Luca Torrisi. 3001-3005 [doi]
- Co-evolution of content popularity and delivery in mobile P2P networksSrinivasan Venkatramanan, Anurag Kumar 0001. 3006-3010 [doi]
- Compressive broadcast in MIMO systems with receive antenna heterogeneityXiao Lin Liu, Chong Luo, Wenjun Hu, Feng Wu. 3011-3015 [doi]
- Distributed power control and coding-modulation adaptation in wireless networks using annealed Gibbs samplingShan Zhou, Xinzhou Wu, Lei Ying. 3016-3020 [doi]
- Impact of channel state information on the stability of cognitive shared channelsSastry Kompella, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides. 3021-3025 [doi]
- Distributed channel probing for efficient transmission scheduling over wireless fading channelsBin Li, Atilla Eryilmaz. 3026-3030 [doi]
- Ad hoc wireless networks meet the infrastructure: Mobility, capacity and delayDevu Manikantan Shila, Yu Cheng. 3031-3035 [doi]
- Link correlation aware opportunistic routingAnas Basalamah, Song Min Kim, Shuo Guo, Tian He, Yoshito Tobe. 3036-3040 [doi]
- Revisiting delay-capacity tradeoffs for mobile networks: The delay is overestimatedYoora Kim, Kyunghan Lee, Ness B. Shroff, Injong Rhee. 3041-3045 [doi]
- Lower bound of weighted fairness guaranteed congestion control protocol for WSNsGuohua Li, Jianzhong Li, Bo Yu 0002. 3046-3050 [doi]
- Impact of secrecy on capacity in large-scale wireless networksJinbei Zhang, Luoyi Fu, Xinbing Wang. 3051-3055 [doi]
- Locating malicious nodes for data aggregation in wireless networksXiaoHua Xu, Qian Wang, Jiannong Cao, Peng-Jun Wan, Kui Ren, Yuanfang Chen. 3056-3060 [doi]
- Phantom: Physical layer cooperation for location privacy protectionSangho Oh, Tam Vu, Marco Gruteser, Suman Banerjee. 3061-3065 [doi]
- Hiding traffic with camouflage: Minimizing message delay in the smart grid under jammingZhuo Lu, Wenye Wang, Cliff Wang. 3066-3070 [doi]
- Providing hop-by-hop authentication and source privacy in wireless sensor networksYun Li, Jian Li, Jian Ren, Jie Wu 0001. 3071-3075 [doi]
- TAHES: Truthful double Auction for Heterogeneous SpectrumsXiaojun Feng, Yanjiao Chen, Jin Zhang, Qian Zhang, Bo Li 0001. 3076-3080 [doi]
- Almost optimal dynamically-ordered multi-channel accessing for cognitive networksBowen Li, Panlong Yang, Xiang-Yang Li, ShaoJie Tang, Yunhao Liu, QiHui Wu. 3081-3085 [doi]
- Efficient online learning for opportunistic spectrum accessWenhan Dai, Yi Gai, Bhaskar Krishnamachari. 3086-3090 [doi]
- Robust threshold design for cooperative sensing in cognitive radio networksShimin Gong, Ping Wang, Jianwei Huang. 3091-3095 [doi]
- Cooperative cognitive radio networking using quadrature signalingBin Cao, Lin X. Cai, Hao Liang, Jon W. Mark, Qinyu Zhang, H. Vincent Poor, Weihua Zhuang. 3096-3100 [doi]