Abstract is missing.
- Toward profit-seeking virtual network embedding algorithm via global resource capacityLong Gong, Yonggang Wen, Zuqing Zhu, Tony Lee. 1-9 [doi]
- Online allocation of virtual machines in a distributed cloudFang Hao, Murali S. Kodialam, T. V. Lakshman, Sarit Mukherjee. 10-18 [doi]
- HadoopWatch: A first step towards comprehensive traffic forecasting in cloud computingYang Peng, Kai Chen, Guohui Wang, Wei Bai, Zhiqiang Ma, Lin Gu. 19-27 [doi]
- Multi-objective data placement for multi-cloud socially aware servicesLei Jiao, Jun Li, Wei Du, Xiaoming Fu. 28-36 [doi]
- Near-pri: Private, proximity based location sharingEdmund Novak, Qun Li. 37-45 [doi]
- 3D surface localization with terrain modelYang Yang, Miao Jin, Hongyi Wu. 46-54 [doi]
- Towards ubiquitous indoor localization service leveraging environmental physical featuresYang Tian, Ruipeng Gao, Kaigui Bian, Fan Ye, Tao Wang, Yizhou Wang, Xiaoming Li. 55-63 [doi]
- Suave: Swarm underwater autonomous vehicle localizationJun Liu, Zhaohui Wang, Zheng Peng, Jun-Hong Cui, Lance Fiondella. 64-72 [doi]
- Robust uncoded video transmission over wireless fast fading channelHao Cui, Chong Luo, Chang Wen Chen, Feng Wu. 73-81 [doi]
- NOVA: QoE-driven optimization of DASH-based video delivery in networksVinay Joseph, Gustavo de Veciana. 82-90 [doi]
- Joint online transcoding and geo-distributed delivery for dynamic adaptive streamingZhi Wang, Lifeng Sun, Chuan Wu, Wenwu Zhu, Shiqiang Yang. 91-99 [doi]
- Improving mobile video streaming with link aware scheduling and client cachesRandeep Bhatia, T. V. Lakshman, Arun N. Netravali, Krishan K. Sabnani. 100-108 [doi]
- PROMISE: A framework for truthful and profit maximizing spectrum double auctionsDejun Yang, Xiang Zhang, Guoliang Xue. 109-117 [doi]
- Dynamic pricing and profit maximization for the cloud with geo-distributed data centersJian Zhao, Hongxing Li, Chuan Wu, Zongpeng Li, Zhizhong Zhang, Francis C. M. Lau. 118-126 [doi]
- Profit-maximizing incentive for participatory sensingTie Luo, Hwee Pink Tan, Lirong Xia. 127-135 [doi]
- Assurable, transparent, and mutual restraining e-voting involving multiple conflicting partiesXukai Zou, Huian Li, Yan Sui, Wei Peng, Feng Li. 136-144 [doi]
- Efficiently collecting histograms over RFID tagsLei Xie, Hao Han, Qun Li, Jie Wu 0001, Sanglu Lu. 145-153 [doi]
- A Parallel Identification Protocol for RFID systemsLinghe Kong, Liang He, Yu Gu 0001, Min-You Wu, Tian He. 154-162 [doi]
- Efficient distributed query processing in large RFID-enabled supply chainsJia Liu, Bin Xiao, Kai Bu, Lijun Chen. 163-171 [doi]
- Pandaka: A lightweight cipher for RFID systemsMin Chen, Shigang Chen, Qingjun Xiao. 172-180 [doi]
- Multi-Terabyte and multi-Gbps information centric routersGiuseppe Rossini, Dario Rossi, Michele Garetto, Emilio Leonardi. 181-189 [doi]
- Towards zero-time wakeup of line cards in power-aware routersTian Pan, Ting Zhang, Junxiao Shi, Yang Li, Linxiao Jin, Fuliang Li, Jiahai Yang, Beichuan Zhang, Bin Liu. 190-198 [doi]
- Safe routing reconfigurations with route redistributionStefano Vissicchio, Laurent Vanbever, Luca Cittadini, Geoffrey G. Xie, Olivier Bonaventure. 199-207 [doi]
- Scalable forwarding tables for supporting flexible policies in enterprise networksShu Yang, Mingwei Xu, Dan Wang, Gautier Bayzelon, Jianping Wu. 208-216 [doi]
- Learning in hide-and-seekQingsi Wang, Mingyan Liu. 217-225 [doi]
- Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloudWenhai Sun, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, Hui Li. 226-234 [doi]
- Will cyber-insurance improve network security? A market analysisRanjan Pal, Leana Golubchik, Konstantinos Psounis, Pan Hui. 235-243 [doi]
- FINE: A fine-grained privacy-preserving location-based service framework for mobile devicesJun Shao, Rongxing Lu, Xiaodong Lin. 244-252 [doi]
- Does full-duplex double the capacity of wireless networks?Xiufeng Xie, Xinyu Zhang. 253-261 [doi]
- Characterizing the achievable throughput in wireless networks with two active RF chainsYang Yang, Bo Chen, Kannan Srinivasan, Ness B. Shroff. 262-270 [doi]
- WiFall: Device-free fall detection by wireless networksChunmei Han, Kaishun Wu, Yuxi Wang, Lionel M. Ni. 271-279 [doi]
- Distributed learning for utility maximization over CSMA-based wireless multihop networksHyeryung Jang, Se-Young Yun, Jinwoo Shin, Yung Yi. 280-288 [doi]
- Venice: Reliable virtual data center embedding in cloudsQi Zhang, Mohamed Faten Zhani, Maissa Jabri, Raouf Boutaba. 289-297 [doi]
- Meeting service level agreement cost-effectively for video-on-demand applications in the cloudYuhong Zhao, Hong Jiang, Ke Zhou, Zhijie Huang, Ping Huang. 298-306 [doi]
- Beyond the MDS bound in distributed cloud storageJian Li, Tongtong Li, Jian Ren. 307-315 [doi]
- Cooperative repair with minimum-storage regenerating codes for distributed storageJun Li, Baochun Li. 316-324 [doi]
- Heat-Diffusion: Pareto optimal dynamic routing for time-varying wireless networksReza Banirazi, Edmond A. Jonckheere, Bhaskar Krishnamachari. 325-333 [doi]
- From least interference-cost paths to maximum (Concurrent) multiflow in MC-MR wireless networksPeng-Jun Wan, Zhu Wang, Lei Wang, Zhiguo Wan, Sai Ji. 334-342 [doi]
- Multirate multicast: Optimal algorithms and implementationGeorgios S. Paschos, Chih-Ping Li, Eytan Modiano, Kostas Choumas, Thanasis Korakis. 343-351 [doi]
- Routing games with progressive fillingTobias Harks, Martin Hoefer, Kevin Schewior, Alexander Skopalik. 352-360 [doi]
- Electronic frog eye: Counting crowd using WiFiWei Xi, Jizhong Zhao, Xiang-Yang Li, Kun Zhao, ShaoJie Tang, Xue Liu, Zhiping Jiang. 361-369 [doi]
- Shake and walk: Acoustic direction finding and fine-grained indoor localization using smartphonesWenchao Huang, Yan Xiong, Xiang-Yang Li, Hao Lin, Xufei Mao, Panlong Yang, Yunhao Liu. 370-378 [doi]
- Anchor-free backscatter positioning for RFID tags with high accuracyTianci Liu, Lei Yang, Qiongzheng Lin, Yi Guo, Yunhao Liu. 379-387 [doi]
- TOC: Localizing wireless rechargeable sensors with time of chargeYuanchao Shu, Peng Cheng, Yu Gu 0001, Jiming Chen, Tian He. 388-396 [doi]
- On the geographic patterns of a large-scale mobile video-on-demand systemZhenyu Li, Gaogang Xie, Jiali Lin, Yun Jin, Mohamed Ali Kâafar, Kavé Salamatian. 397-405 [doi]
- Optimal rate allocation for adaptive wireless video streaming in networks with user dynamicsVinay Joseph, Sem C. Borst, Martin I. Reiman. 406-414 [doi]
- SoCast: Social ties based cooperative video multicastYang Cao, Xu Chen, Tao Jiang, Junshan Zhang. 415-423 [doi]
- Reliable video multicast over Wi-Fi networks with coordinated multiple APsMunhwan Choi, Weiping Sun, Jonghoe Koo, Sunghyun Choi, Kang G. Shin. 424-432 [doi]
- Dynamic resource provisioning in cloud computing: A randomized auction approachLinquan Zhang, Zongpeng Li, Chuan Wu. 433-441 [doi]
- Exploring bundling sale strategy in online service markets with network effectsWeijie Wu, Richard T. B. Ma, John C. S. Lui. 442-450 [doi]
- Enabling crowd-sourced mobile Internet accessGeorge Iosifidis, Lin Gao, Jianwei Huang, Leandros Tassiulas. 451-459 [doi]
- Trade-offs in optimizing the cache deployments of CDNsSyed Hasan, Sergey Gorinsky, Constantine Dovrolis, Ramesh K. Sitaraman. 460-468 [doi]
- Twins: Device-free object tracking using passive tagsJinsong Han, Chen Qian, Xing Wang, Dan Ma, Jizhong Zhao, Pengfeng Zhang, Wei Xi, Zhiping Jiang. 469-476 [doi]
- Arbitrarily accurate approximation scheme for large-scale RFID cardinality estimationWei Gong, Kebin Liu, Xin Miao, Haoxiang Liu. 477-485 [doi]
- Towards adaptive continuous scanning in large-scale RFID systemsHaoxiang Liu, Wei Gong, Xin Miao, Kebin Liu, Wenbo He. 486-494 [doi]
- Read bulk data from computational RFIDsYuanqing Zheng, Mo Li. 495-503 [doi]
- Achieving differential privacy of data disclosure in the smart gridJing Zhao, Taeho Jung, Yu Wang, Xiangyang Li. 504-512 [doi]
- Optimal privacy-preserving energy management for smart metersLei Yang, Xu Chen, Junshan Zhang, H. Vincent Poor. 513-521 [doi]
- VABKS: Verifiable attribute-based keyword search over outsourced encrypted dataQingji Zheng, Shouhuai Xu, Giuseppe Ateniese. 522-530 [doi]
- Deep packet inspection with DFA-trees and parametrized language overapproximationDaniel Luchaup, Lorenzo De Carli, Somesh Jha, Eric Bach. 531-539 [doi]
- Hello: A generic flexible protocol for neighbor discoveryWei Sun, Zheng Yang, Keyu Wang, Yunhao Liu. 540-548 [doi]
- Cooperative anti-jamming for infrastructure-less wireless networks with stochastic relayingLiyang Zhang, Zhangyu Guan, Tommaso Melodia. 549-557 [doi]
- Restricted coverage in wireless networksXiaoHua Xu, Min Song. 558-564 [doi]
- Optimal delay bound for maximum weight scheduling policy in wireless networksCem Boyaci, Ye Xia 0001. 565-573 [doi]
- Delay guaranteed live migration of Virtual MachinesJiao Zhang, Fengyuan Ren, Chuang Lin. 574-582 [doi]
- Dominant resource fairness in cloud computing systems with heterogeneous serversWei Wang 0030, Baochun Li, Ben Liang. 583-591 [doi]
- SAP: Similarity-aware partitioning for efficient cloud storageBharath Balasubramanian, Tian Lan, Mung Chiang. 592-600 [doi]
- Scheduling jobs with dwindling resource requirements in cloudsSivan Albagli-Kim, Hadas Shachnai, Tami Tamir. 601-609 [doi]
- Spatio-temporal factorization of log data for understanding network eventsTatsuaki Kimura, Keisuke Ishibashi, Tatsuya Mori, Hiroshi Sawada, Tsuyoshi Toyono, Ken Nishimatsu, Akio Watanabe, Akihiro Shimoda, Kohei Shiomoto. 610-618 [doi]
- Mining checkins from location-sharing services for client-independent IP geolocationHao Liu, Yaoxue Zhang, Yuezhi Zhou, Di Zhang, Xiaoming Fu, K. K. Ramakrishnan. 619-627 [doi]
- Packet classification using binary Content Addressable MemoryAlex X. Liu, Chad R. Meiners, Eric Torng. 628-636 [doi]
- A reduction-based approach towards scaling up formal analysis of internet configurationsAnduo Wang, Alexander J. T. Gurney, Xianglong Han, Jinyan Cao, Boon Thau Loo, Carolyn L. Talcott, Andre Scedrov. 637-645 [doi]
- A matroid theory approach to multicast network codingXunrui Yin, Zongpeng Li, Xin Wang. 646-654 [doi]
- Robust and optimal opportunistic scheduling for downlink 2-flow inter-session network coding with varying channel qualityWei-Cheng Kuo, Chih-Chun Wang. 655-663 [doi]
- DAWN: Defending against wormhole attacks in wireless network coding systemsShiyu Ji, Tingting Chen, Sheng Zhong, Subhash Kak. 664-672 [doi]
- Secure cloud storage meets with secure network codingFei Chen, Tao Xiang, Yuanyuan Yang, Sherman S. M. Chow. 673-681 [doi]
- Hybrid data pricing for network-assisted user-provided connectivityLin Gao, George Iosifidis, Jianwei Huang, Leandros Tassiulas. 682-690 [doi]
- EasyBid: Enabling cellular offloading via small playersZhixue Lu, Prasun Sinha, R. Srikant. 691-699 [doi]
- Time dependent pricing in wireless data networks: Flat-rate vs. usage-based schemesLiang Zhang, Weijie Wu, Dan Wang. 700-708 [doi]
- Double auctions for dynamic spectrum allocationWei Dong, Swati Rallapalli, Lili Qiu, K. K. Ramakrishnan, Yin Zhang. 709-717 [doi]
- A generalized coverage-preserving scheduling in WSNs: A case study in structural health monitoringXuefeng Liu, Jiannong Cao, ShaoJie Tang, Peng Guo. 718-726 [doi]
- SenSpeed: Sensing driving conditions to estimate vehicle speed in urban environmentsHaofu Han, Jiadi Yu, Hongzi Zhu, Yingying Chen, Jie Yang 0003, Yanmin Zhu, Guangtao Xue, Minglu Li. 727-735 [doi]
- An optimal data collection technique for improved utility in UAS-aided networksAhmed E. A. A. Abdulla, Zubair Md. Fadlullah, Hiroki Nishiyama, Nei Kato, Fumie Ono, Ryu Miura. 736-744 [doi]
- Toward optimal allocation of location dependent tasks in crowdsensingShibo He, Dong-Hoon Shin, Junshan Zhang, Jiming Chen. 745-753 [doi]
- Achieving k-anonymity in privacy-aware location-based servicesBen Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, Hui Li. 754-762 [doi]
- PLAM: A privacy-preserving framework for local-area mobile social networksRongxing Lu, Xiaodong Lin, Zhiguo Shi, Jun Shao. 763-771 [doi]
- Preserving secondary users' privacy in cognitive radio networksZhengrui Qin, Shanhe Yi, Qun Li, Dmitry Zamkov. 772-780 [doi]
- Markov chain fingerprinting to classify encrypted trafficMaciej Korczynski, Andrzej Duda. 781-789 [doi]
- 3D pipeline contention: Asymmetric full duplex in wireless networksShaohe Lv, Xuan Dong, Yong Lu, Xiaoli Du, Xiaodong Wang, Yong Dou, Xingming Zhou. 790-798 [doi]
- Montage: Combine frames with movement continuity for realtime multi-user trackingLan Zhang, Kebin Liu, Yonghang Jiang, Xiang-Yang Li, Yunhao Liu, Panlong Yang. 799-807 [doi]
- Scalable user selection for MU-MIMO networksXiufeng Xie, Xinyu Zhang. 808-816 [doi]
- iBeam: Intelligent client-side multi-user beamforming in wireless networksYongjiu Du, Ehsan Aryafar, Joseph Camp, Mung Chiang. 817-825 [doi]
- TOFEC: Achieving optimal throughput-delay trade-off of cloud storage using erasure codesGuanfeng Liang, Ulas C. Kozat. 826-834 [doi]
- New bandwidth sharing and pricing policies to achieve a win-win situation for cloud provider and tenantsHaiying Shen, Zhuozhao Li. 835-843 [doi]
- Neptune: Efficient remote communication services for cloud backupsYu Hua, Xue Liu, Dan Feng. 844-852 [doi]
- Dynamic content allocation for cloud-assisted service of periodic workloadsGyörgy Dán, Niklas Carlsson. 853-861 [doi]
- WiSlow: A Wi-Fi network performance troubleshooting tool for end usersKyung-Hwa Kim, Hyunwoo Nam, Henning Schulzrinne. 862-870 [doi]
- Scaling laws for heterogeneous cognitive radio networks with cooperative secondary usersRiheng Jia, Jinbei Zhang, Xinbing Wang, Xiaohua Tian, Qian Zhang. 871-879 [doi]
- Cooperative cross-technology interference mitigation for heterogeneous multi-hop networksYantian Hou, Ming Li, Xu Yuan, Y. Thomas Hou, Wenjing Lou. 880-888 [doi]
- On the expected size of minimum-energy path-preserving topologies for wireless multi-hop networksAshikur Rahman, Nael B. Abu-Ghazaleh. 889-897 [doi]
- Distributed opportunistic scheduling for wireless networks powered by renewable energy sourcesHang Li, Chuan Huang, Shuguang Cui, Junshan Zhang. 898-906 [doi]
- Relax, but Do Not Sleep: A new perspective on Green Wireless NetworkingChenfei Gao, Weiyi Zhang, Jian Tang, Chonggang Wang, Shihong Zou, Sen Su. 907-915 [doi]
- Energy optimization through traffic aggregation in wireless networksWenjie Hu, Guohong Cao. 916-924 [doi]
- Contextual localization through network traffic analysisAveek K. Das, Parth H. Pathak, Chen-Nee Chuah, Prasant Mohapatra. 925-933 [doi]
- Intelligent SDN based traffic (de)Aggregation and Measurement Paradigm (iSTAMP)Mehdi Malboubi, Liyuan Wang, Chen-Nee Chuah, Puneet Sharma. 934-942 [doi]
- Separating wheat from chaff: Winnowing unintended prefixes using machine learningAndra Lutu, Marcelo Bagnulo, Jesús Cid-Sueiro, Olaf Maennel. 943-951 [doi]
- An overlay automata approach to regular expression matchingAlex X. Liu, Eric Torng. 952-960 [doi]
- Walking down the STAIRS: Efficient collision resolution for wireless sensor networksXiaoyu Ji, Yuan He, Jiliang Wang, Wei Dong, Xiaopei Wu, Yunhao Liu. 961-969 [doi]
- Critical sensing range for mobile heterogeneous camera sensor networksYitao Hu, Xinbing Wang, Xiaoying Gan. 970-978 [doi]
- Bounded stretch geographic homotopic routing in sensor networksKan Huang, Chien-Chun Ni, Rik Sarkar, Jie Gao, Joseph S. B. Mitchell. 979-987 [doi]
- Maximizing the value of sensed information in underwater wireless sensor networks via an autonomous underwater vehicleStefano Basagni, Ladislau Bölöni, Petrika Gjanci, Chiara Petrioli, Cynthia A. Phillips, Danila Turgut. 988-996 [doi]
- SYNERGY: A game-theoretical approach for cooperative key generation in wireless networksJingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, Junshan Zhang. 997-1005 [doi]
- Utility-based cooperative decision in cooperative authenticationYunchuan Guo, Lihua Yin, Licai Liu, Binxing Fang. 1006-1014 [doi]
- Security vulnerability and countermeasures of frequency offset correction in 802.11a systemsHanif Rahbari, Marwan Krunz, Loukas Lazos. 1015-1023 [doi]
- A new efficient physical layer OFDM encryption schemeFei Huo, Guang Gong. 1024-1032 [doi]
- Consolidating complementary VMs with spatial/temporal-awareness in cloud datacentersLiuhua Chen, Haiying Shen. 1033-1041 [doi]
- When queueing meets coding: Optimal-latency data retrieving scheme in storage cloudsShengbo Chen, Yin Sun, Ulas C. Kozat, Longbo Huang, Prasun Sinha, Guanfeng Liang, Xin Liu, Ness B. Shroff. 1042-1050 [doi]
- Power consumption of virtual machines with network transactions: Measurement and improvementsRyan Shea, Haiyang Wang, Jiangchuan Liu. 1051-1059 [doi]
- Can mobile cloudlets support mobile applications?Yujin Li, Wenye Wang. 1060-1068 [doi]
- Structured spectrum allocation and user association in heterogeneous cellular networksWei Bao, Ben Liang. 1069-1077 [doi]
- Video delivery over heterogeneous cellular networks: Optimizing cost and performanceKonstantinos Poularakis, George Iosifidis, Antonios Argyriou, Leandros Tassiulas. 1078-1086 [doi]
- Cell planning for heterogeneous networks: An approximation algorithmWentao Zhao, Shaowei Wang, Chonggang Wang, Xiaobing Wu. 1087-1095 [doi]
- A college admissions game for uplink user association in wireless small cell networksWalid Saad, Zhu Han, Rong Zheng, Mérouane Debbah, H. Vincent Poor. 1096-1104 [doi]
- Safe Charging for wireless power transferHaipeng Dai, Yunhuai Liu, Guihai Chen, Xiaobing Wu, Tian He. 1105-1113 [doi]
- Energy-efficient cooperative broadcast in fading wireless networksChenxi Qiu, Haiying Shen, Lei Yu. 1114-1122 [doi]
- Performance-aware energy optimization on mobile devices in cellular networkYong Cui, Shihan Xiao, Xin Wang 0001, Minming Li, Hongyi Wang, Zeqi Lai. 1123-1131 [doi]
- Microeconomic analysis of base-station sharing in green cellular networksBingjie Leng, Parisa Mansourifard, Bhaskar Krishnamachari. 1132-1140 [doi]
- Optimal collaborative access point association in wireless networksOuldooz Baghban Karimi, Jiangchuan Liu, Jennifer Rexford. 1141-1149 [doi]
- kBF: A Bloom Filter for key-value storage with an application on approximate state machinesSisi Xiong, Yanjun Yao, Qing Cao, Tian He. 1150-1158 [doi]
- Detecting malicious HTTP redirections using trees of user browsing activityHesham Mekky, Ruben Torres, Zhi-Li Zhang, Sabyasachi Saha, Antonio Nucci. 1159-1167 [doi]
- What scale of audience a campaign can reach in what price on Twitter?Yubao Zhang, Xin Ruan, Haining Wang, Hui Wang. 1168-1176 [doi]
- How to identify global trends from local decisions? Event region detection on mobile networksAndreas Loukas, Marco Zuniga, Ioannis Protonotarios, Jie Gao. 1177-1185 [doi]
- Sleep in the Dins: Insomnia therapy for duty-cycled sensor networksJiliang Wang, Zhichao Cao, Xufei Mao, Yunhao Liu. 1186-1194 [doi]
- Mobile-to-mobile energy replenishment in mission-critical robotic sensor networksLiang He, Peng Cheng, Yu Gu 0001, Jianping Pan, Ting Zhu, Cong Liu. 1195-1203 [doi]
- Connected wireless camera network deployment with visibility coverageHua Huang, Chien-Chun Ni, Xiaomeng Ban, Jie Gao, Andrew T. Schneider, Shan Lin. 1204-1212 [doi]
- How to crowdsource tasks truthfully without sacrificing utility: Online incentive mechanisms with budget constraintDong Zhao, Xiang-Yang Li, Huadong Ma. 1213-1221 [doi]
- Compressive sensing over strongly connected digraph and its application in traffic monitoringXiao Qi, Yongcai Wang, Yuexuan Wang, Liwen Xu. 1222-1230 [doi]
- TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcingZhenni Feng, Yanmin Zhu, Qian Zhang, Lionel M. Ni, Athanasios V. Vasilakos. 1231-1239 [doi]
- ShopProfiler: Profiling shops with crowdsourcing dataXiaonan Guo, Eddie C. L. Chan, Ce Liu, Kaishun Wu, Siyuan Liu, Lionel M. Ni. 1240-1248 [doi]
- PS-TRUST: Provably secure solution for truthful double spectrum auctionsZhili Chen, Liusheng Huang, Lu Li, Wei Yang, Haibo Miao, Miaomiao Tian, Fei Wang. 1249-1257 [doi]
- Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networksPengfei Hu, Kai Xing, Xiuzhen Cheng, Hao Wei, Haojin Zhu. 1258-1266 [doi]
- Secure cooperative spectrum sensing and access against intelligent malicious behaviorsWei Wang 0021, Lin Chen, Kang G. Shin, Lingjie Duan. 1267-1275 [doi]
- Physical layer challenge-response authentication in wireless networks with relayXianru Du, Dan Shan, Kai Zeng, Lauren M. Huie. 1276-1284 [doi]
- A deep investigation into network performance in virtual machine based cloud environmentsRyan Shea, Feng Wang, Haiyang Wang, Jiangchuan Liu. 1285-1293 [doi]
- RIAL: Resource Intensity Aware Load balancing in cloudsLiuhua Chen, Haiying Shen, Karan Sapra. 1294-1302 [doi]
- Optimal approximation algorithm of virtual machine placement for data latency minimization in cloud systemsJian-Jhih Kuo, Hsiu-Hsien Yang, Ming-Jer Tsai. 1303-1311 [doi]
- Using stop-and-wait to improve TCP throughput in fast optical switching (FOS) networks over short physical distancesPablo Jesús Argibay-Losada, Kseniia Nozhnina, Gokhan Sahin, Chunming Qiao. 1312-1320 [doi]
- "Wireless networks without edges": Dynamic radio resource clustering and user schedulingYuhuan Du, Gustavo de Veciana. 1321-1329 [doi]
- Cellular multi-coverage with non-uniform ratesOmer Gurewitz, Yakov Sandomirsky, Gabriel Scalosub. 1330-1338 [doi]
- Exploiting mobility in proportional fair cellular scheduling: Measurements and algorithmsRobert Margolies, Ashwin Sridharan, Vaneet Aggarwal, Rittwik Jana, N. K. Shankaranarayanan, Vinay A. Vaishampayan, Gil Zussman. 1339-1347 [doi]
- User mobility from the view of cellular data networksYing Zhang. 1348-1356 [doi]
- Energy efficient Wifi tethering on a smartphoneKyoung-Hak Jung, Yuepeng Qi, Chansu Yu, Young-Joo Suh. 1357-1365 [doi]
- Fair energy-efficient sensing task allocation in participatory sensing with smartphonesQingwen Zhao, Yanmin Zhu, Hongzi Zhu, Jian Cao, Guangtao Xue, Bo Li 0001. 1366-1374 [doi]
- Improved structures for data collection in wireless sensor networksJon Crowcroft, Michael Segal, Liron Levin. 1375-1383 [doi]
- Energy-efficient capacity optimization in wireless networksLu Liu, Xianghui Cao, Yu Cheng, Lili Du, Wei Song, Yu Wang. 1384-1392 [doi]
- ProWord: An unsupervised approach to protocol feature word extractionZhuo Zhang, Zhibin Zhang, Patrick P. C. Lee, Yunjie Liu, Gaogang Xie. 1393-1401 [doi]
- TorWard: Discovery of malicious traffic over TorZhen Ling, Junzhou Luo, Kui Wu, Wei Yu, Xinwen Fu. 1402-1410 [doi]
- Transductive malware label propagation: Find your lineage from your neighborsDeguang Kong, Guanhua Yan. 1411-1419 [doi]
- LD-Sketch: A distributed sketching design for accurate and scalable anomaly detection in network data streamsQun Huang, Patrick P. C. Lee. 1420-1428 [doi]
- Bloom tree: A search tree based on Bloom filters for multiple-set membership testingMyungKeun Yoon, JinWoo Son, Seon-Ho Shin. 1429-1437 [doi]
- A longitudinal analysis of Internet rate limitationsJoão Taveira Araújo, Raul Landa, Richard G. Clegg, George Pavlou, Kensuke Fukuda. 1438-1446 [doi]
- Monitor placement for maximal identifiability in network tomographyLiang Ma, Ting He, Kin K. Leung, Ananthram Swami, Don Towsley. 1447-1455 [doi]
- "Can you SEE me now?" A measurement study of mobile video callsChenguang Yu, Yang Xu, Bo Liu, Yong Liu. 1456-1464 [doi]
- Optimal link scheduling for delay-constrained periodic traffic over unreliable wireless linksYan Li, Haibo Zhang, Zhiyi Huang, Michael Albert. 1465-1473 [doi]
- Approximate multiple count in Wireless Sensor NetworksXiaolin Fang, Hong Gao, Jianzhong Li, Yingshu Li. 1474-1482 [doi]
- EV-sounding: A visual assisted electronic channel sounding systemGang Li, Jin Teng, Fan Yang, Adam C. Champion, Dong Xuan, Hong Luan, Yuan F. Zheng. 1483-1491 [doi]
- Coverage in visual sensor networks with Pan-Tilt-Zoom cameras: The MaxFoV problemVikram P. Munishwar, Vinay Kolar, Nael B. Abu-Ghazaleh. 1492-1500 [doi]
- How can botnets cause storms? Understanding the evolution and impact of mobile botnetsZhuo Lu, Wenye Wang, Cliff Wang. 1501-1509 [doi]
- COLLECTOR: A secure RFID-enabled batch recall protocolSaiyu Qi, Yuanqing Zheng, Mo Li, Li Lu, Yunhao Liu. 1510-1518 [doi]
- Analysis and detection of SIMbox fraud in mobility networksIlona Murynets, Michael Zabarankin, Roger Piqueras Jover, Adam Panagia. 1519-1526 [doi]
- Scaling laws for secrecy capacity in cooperative wireless networksMahtab Mirmohseni, Panagiotis Papadimitratos. 1527-1535 [doi]
- Fast resource scheduling in HetNets with D2D supportFrancesco Malandrino, Claudio Casetti, Carla-Fabiana Chiasserini, Zana Limani. 1536-1544 [doi]
- INDAPSON: An incentive data plan sharing system based on self-organizing networkTuo Yu, Zilong Zhou, Da Zhang, Xinbing Wang, Yunxin Liu, Songwu Lu. 1545-1553 [doi]
- A mean field game approach to scheduling in cellular systemsMayank Manjrekar, Vinod Ramaswamy, Srinivas Shakkottai. 1554-1562 [doi]
- R2D2: Embracing device-to-device communication in next generation cellular networksTarun Bansal, Karthikeyan Sundaresan, Sampath Rangarajan, Prasun Sinha. 1563-1571 [doi]
- On efficient bandwidth allocation for traffic variability in datacentersJian Guo, Fangming Liu, Xiaomeng Huang, John C. S. Lui, Mi Hu, Qiao Gao, Hai Jin. 1572-1580 [doi]
- RepFlow: Minimizing flow completion times with replicated flows in data centersHong Xu, Baochun Li. 1581-1589 [doi]
- Traffic engineering with Equal-Cost-Multipath: An algorithmic perspectiveMarco Chiesa, Guy Kindler, Michael Schapira. 1590-1598 [doi]
- Towards performance-centric fairness in datacenter networksLi Chen, Yuan Feng, Baochun Li, Bo Li. 1599-1607 [doi]
- Geometric evaluation of survivability of disaster-affected network with probabilistic failureHiroshi Saito. 1608-1616 [doi]
- Keep Forwarding: Towards k-link failure resilient routingBaohua Yang, Junda Liu, Scott Shenker, Jun Li, Kai Zheng. 1617-1625 [doi]
- Restorable logical topology in the face of no or partial traffic demand knowledgeReuven Cohen, Gabi Nakibly. 1626-1634 [doi]
- Max-flow min-cut theorem and faster algorithms in a circular disk failure modelYusuke Kobayashi, Kensuke Otsuki. 1635-1643 [doi]
- Distributed backup scheduling: Modeling and optimizationPeter M. van de Ven, Bo Zhang, Angela Schörgendorfer. 1644-1652 [doi]
- Fast and simple approximation algorithms for maximum weighted independent set of linksPeng-Jun Wan, Xiaohua Jia, Guojun Dai, Hongwei Du, Ophir Frieder. 1653-1661 [doi]
- A high-order Markov chain based scheduling algorithm for low delay in CSMA networksJaewook Kwak, Chul-Ho Lee, Do Young Eun. 1662-1670 [doi]
- Scheduling of multicast and unicast services under limited feedback by using rateless codesYin Sun, Can Emre Koksal, Kyu-Han Kim, Ness B. Shroff. 1671-1679 [doi]
- LBSNSim: Analyzing and modeling location-based social networksWei Wei, Xiaojun Zhu 0001, Qun Li. 1680-1688 [doi]
- On designing neighbor discovery protocols: A code-based approachTong Meng, Fan Wu, Guihai Chen. 1689-1697 [doi]
- Assessment of multi-hop interpersonal trust in social networks by Three-Valued Subjective LogicGuangchi Liu, Qing Yang, Honggang Wang, Xiaodong Lin, Mike P. Wittie. 1698-1706 [doi]
- FluidRating: A time-evolving rating scheme in trust-based recommendation systems using fluid dynamicsWenjun Jiang, Jie Wu 0001, Guojun Wang, Huanyang Zheng. 1707-1715 [doi]
- On diagnosis of forwarding plane via static forwarding rules in Software Defined NetworksUlas C. Kozat, Guanfeng Liang, Koray Kokten. 1716-1724 [doi]
- Software Defined Monitoring of application protocolsLukas Kekely, Viktor Pus, Jan Korenek. 1725-1733 [doi]
- On the effect of forwarding table size on SDN network utilizationRami Cohen, Liane Lewin-Eytan, Joseph Naor, Danny Raz. 1734-1742 [doi]
- Software defined green data center network with exclusive routingDan Li, Yunfei Shang, Congjie Chen. 1743-1751 [doi]
- Towards automatic phone-to-phone communication for vehicular networking applicationsShaohan Hu, Hengchang Liu, Lu Su, Hongyan Wang, Tarek F. Abdelzaher, Pan Hui, Wei Zheng, Zhiheng Xie, John A. Stankovic. 1752-1760 [doi]
- POST: Exploiting dynamic sociality for mobile advertising in vehicular networksJun Qin, Hongzi Zhu, Yanmin Zhu, Li Lu, Guangtao Xue, Minglu Li. 1761-1769 [doi]
- On multihop communications for in-vehicle Internet access based on a TDMA MAC protocolHassan Aboubakr Omar, Weihua Zhuang, Li Li. 1770-1778 [doi]
- GeoMob: A mobility-aware geocast scheme in metropolitans via taxicabs and busesLei Zhang, Boyang Yu, Jianping Pan. 1779-1787 [doi]
- Automated dynamic offset applied to cell associationMajed Haddad, Habib B. A. Sidi, Piotr Wiecek, Eitan Altman. 1788-1796 [doi]
- Interference coordination strategies for content update dissemination in LTE-AVincenzo Sciancalepore, Vincenzo Mancuso, Albert Banchs, Shmuel Zaks, Antonio Capone. 1797-1805 [doi]
- Classifying call profiles in large-scale mobile traffic datasetsDiala Naboulsi, Razvan Stanica, Marco Fiore. 1806-1814 [doi]
- Cross-layer path management in multi-path transport protocol for mobile devicesYeon-sup Lim, Yung-Chih Chen, Erich M. Nahum, Don Towsley, Kang-Won Lee. 1815-1823 [doi]
- Practical DCB for improved data center networksBrent Stephens, Alan L. Cox, Ankit Singla, John B. Carter, Colin Dixon, Wes Felter. 1824-1832 [doi]
- Distributed data storage systems with opportunistic repairVaneet Aggarwal, Chao Tian, Vinay A. Vaishampayan, Yih-Farn Robin Chen. 1833-1841 [doi]
- Let's stay together: Towards traffic aware virtual machine placement in data centersXin Li, Jie Wu 0001, ShaoJie Tang, Sanglu Lu. 1842-1850 [doi]
- On the design and analysis of Data Center Network architectures for interconnecting dual-port serversDawei Li, Jie Wu 0001. 1851-1859 [doi]
- Signaling free localization of node failures in all-optical networksJános Tapolcai, Lajos Rónyai, Eva Hosszu, Pin-Han Ho, Suresh Subramaniam. 1860-1868 [doi]
- Fault tolerant barrier coverage for wireless sensor networksZhibo Wang, Honglong Chen, Qing Cao, Hairong Qi, Zhi Wang. 1869-1877 [doi]
- Heterogeneity-aware data regeneration in distributed storage systemsYan Wang, Dongsheng Wei, Xunrui Yin, Xin Wang. 1878-1886 [doi]
- CauseInfer: Automatic and distributed performance diagnosis with hierarchical causality graph in large distributed systemsPengfei Chen, Yong Qi, Pengfei Zheng, Di Hou. 1887-1895 [doi]
- Sharp per-flow delay bounds for bursty arrivals: The case of FIFO, SP, and EDF schedulingFlorin Ciucu, Felix Poloczek, Jens Schmitt. 1896-1904 [doi]
- LP-relaxation based distributed algorithms for scheduling in wireless networksChandramani Singh, Angelia Nedic, R. Srikant. 1905-1913 [doi]
- Low complexity multi-resource fair queueing with bounded delayWei Wang, Ben Liang, Baochun Li. 1914-1922 [doi]
- Rate-control and multi-channel scheduling for wireless live streaming with stringent deadlinesShizhen Zhao, Xiaojun Lin. 1923-1931 [doi]
- Information diffusion in mobile social networks: The speed perspectiveZongqing Lu, Yonggang Wen, Guohong Cao. 1932-1940 [doi]
- Improving data forwarding in Mobile Social Networks with infrastructure support: A space-crossing community approachZhong Li, Cheng Wang, Siqian Yang, Changjun Jiang, Ivan Stojmenovic. 1941-1949 [doi]
- Optimizing offline access to social network content on mobile devicesNgoc Minh Do, Ye Zhao, Shu-Ting Wang, Cheng-Hsin Hsu, Nalini Venkatasubramanian. 1950-1958 [doi]
- A social group utility maximization framework with applications in database assisted spectrum accessXu Chen, Xiaowen Gong, Lei Yang, Junshan Zhang. 1959-1967 [doi]
- A Cooperative Advanced Driver Assistance System to mitigate vehicular traffic shock wavesMarkus Forster, Raphael Frank, Mario Gerla, Thomas Engel. 1968-1976 [doi]
- Data-driven traffic flow analysis for vehicular communicationsYang Wang 0015, Liusheng Huang, Tianbo Gu, Hao Wei, Kai Xing, Junshan Zhang. 1977-1985 [doi]
- CityDrive: A map-generating and speed-optimizing driving systemYiran Zhao, Yang Zhang, Tuo Yu, Tianyuan Liu, Xinbing Wang, Xiaohua Tian, Xue Liu. 1986-1994 [doi]
- ForeSight: Mapping vehicles in visual domain and electronic domainDong Li, Zhixue Lu, Tarun Bansal, Erik Schilling, Prasun Sinha. 1995-2003 [doi]
- Online load balancing for MapReduce with skewed data inputYanfang Le, Jiangchuan Liu, Funda Ergün, Dan Wang. 2004-2012 [doi]
- Enabling efficient access control with dynamic policy updating for big data in the cloudKan Yang, Xiaohua Jia, Kui Ren, Ruitao Xie, Liusheng Huang. 2013-2021 [doi]
- Online algorithms for uploading deferrable big data to the cloudLinquan Zhang, Zongpeng Li, Chuan Wu, Minghua Chen. 2022-2030 [doi]
- TideWatch: Fingerprinting the cyclicality of big data workloadsDan Williams, Shuai Zheng, Xiangliang Zhang, Hani Jamjoom. 2031-2039 [doi]
- A unified approach to the performance analysis of caching systemsValentina Martina, Michele Garetto, Emilio Leonardi. 2040-2048 [doi]
- Scalable Pending Interest Table design: From principles to practiceHaowei Yuan, Patrick Crowley. 2049-2057 [doi]
- REIN: A fast event matching approach for content-based publish/subscribe systemsShiyou Qian, Jian Cao, Yanmin Zhu, Minglu Li. 2058-2066 [doi]
- Reducing forwarding state in content-centric networks with semi-stateless forwardingChristos Tsilopoulos, George Xylomenos, Yannis Thomas. 2067-2075 [doi]
- A unified framework for wireless max-min utility optimization with general monotonic constraintsYao-Wen Peter Hong, Chee-Wei Tan, Liang Zheng, Cheng-Lin Hsieh, Chia-han Lee. 2076-2084 [doi]
- A practical self-adaptive rendezvous protocol in cognitive radio ad hoc networksXingya Liu, Jiang Xie. 2085-2093 [doi]
- Delay-constrained caching in cognitive radio networksJing Zhao, Wei Gao, Yi Wang 0014, Guohong Cao. 2094-2102 [doi]
- Probability distribution of spectral hole duration in cognitive networksJelena V. Misic, Vojislav B. Misic. 2103-2111 [doi]
- Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloudBing Wang, Shucheng Yu, Wenjing Lou, Y. Thomas Hou. 2112-2120 [doi]
- Efficient public integrity checking for cloud data sharing with multi-user modificationJiawei Yuan, Shucheng Yu. 2121-2129 [doi]
- A privacy-aware cloud-assisted healthcare monitoring system via compressive sensingCong Wang, Bingsheng Zhang, Kui Ren, Janet Meiling Wang Roveda, Chang Wen Chen, Zhen Xu. 2130-2138 [doi]
- Aggrecode: Constructing route intersection for data reconstruction in erasure coded storageJing Zhang, Xiangke Liao, Shanshan Li, Yu Hua, Xue Liu, Bin Lin. 2139-2147 [doi]
- IP fast rerouting for multi-link failuresTheodore Elhourani, Abishek Gopalan, Srinivasan Ramasubramanian. 2148-2156 [doi]
- Rippler: Delay injection for service dependency detectionAli Zand, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel. 2157-2165 [doi]
- Minimizing makespan and total completion time in MapReduce-like systemsYuqing Zhu, Yiwei Jiang, Weili Wu, Ling Ding, Ankur Teredesai, Deying Li, Wonjun Lee. 2166-2174 [doi]
- Joint scheduling of MapReduce jobs with servers: Performance bounds and experimentsYi Yuan, Dan Wang, Jiangchuan Liu. 2175-2183 [doi]
- Scheduling in a secure wireless networkXuan Wang, Yi Chen, Lin Cai, Jianping Pan. 2184-2192 [doi]
- Scheduling multicast traffic with deadlines in wireless networksKyu Seob Kim, Chih-Ping Li, Eytan Modiano. 2193-2201 [doi]
- Epidemic thresholds with external agentsSiddhartha Banerjee, Avhishek Chatterjee, Sanjay Shakkottai. 2202-2210 [doi]
- A robust information source estimator with sparse observationsKai Zhu, Lei Ying. 2211-2219 [doi]
- Personal clouds: Sharing and integrating networked resources to enhance end user experiencesMinsung Jang, Karsten Schwan, Ketan Bhardwaj, Ada Gavrilovska, Adhyas Avasthi. 2220-2228 [doi]
- Modeling social network relationships via t-cherry junction treesBrian Proulx, Junshan Zhang. 2229-2237 [doi]
- Spectrum-aware data replication in intermittently connected cognitive radio networksJing Zhao, Guohong Cao. 2238-2246 [doi]
- Rendezvous for heterogeneous spectrum-agile devicesShan-Hung Wu, Ching-Chan Wu, Wing-Kai Hon, Kang G. Shin. 2247-2255 [doi]
- GHz-wide sensing and decoding using the sparse Fourier transformHaitham Hassanieh, Lixin Shi, Omid Abari, Ezzeldin Hamed, Dina Katabi. 2256-2264 [doi]
- Flexauc: Serving dynamic demands in spectrum trading markets with flexible auctionPeng Lin, Xiaojun Feng, Qian Zhang. 2265-2273 [doi]
- Multiple heterogeneous data ferry trajectory planning in wireless sensor networksLirong Xue, Donghyun Kim, Yuqing Zhu, Deying Li, Wei Wang 0032, Alade O. Tokuta. 2274-2282 [doi]
- DSearching: Distributed searching of mobile nodes in DTNs with floating mobility informationKang Chen, Haiying Shen. 2283-2291 [doi]
- Dynamic speed scaling for energy minimization in delay-tolerant smartphone applicationsJeongho Kwak, Okyoung Choi, Song Chong, Prasant Mohapatra. 2292-2300 [doi]
- Forwarding redundancy in opportunistic mobile networks: Investigation and eliminationWei Gao, Qinghua Li, Guohong Cao. 2301-2309 [doi]
- Privacy-preserving high-quality map generation with participatory sensingXi Chen, Xiaopei Wu, Xiang-Yang Li, Yuan He, Yunhao Liu. 2310-2318 [doi]
- Multi-lateral privacy-preserving localization in pervasive environmentsTao Shu, Yingying Chen, Jie Yang 0003, Albert Williams. 2319-2327 [doi]
- A stochastic game for privacy preserving context sensing on mobile phoneWei Wang 0050, Qian Zhang. 2328-2336 [doi]
- Achieving privacy preservation in WiFi fingerprint-based localizationHong Li, Limin Sun, Haojin Zhu, Xiang Lu, Xiuzhen Cheng. 2337-2345 [doi]
- TOSS: Traffic offloading by social network service-based opportunistic sharing in mobile social networksXiaofei Wang, Min Chen, Zhu Han, Dapeng Oliver Wu, Ted Taekyoung Kwon. 2346-2354 [doi]
- Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware systemMarco Valerio Barbera, Sokol Kosta, Alessandro Mei, Vasile Claudiu Perta, Julinda Stefa. 2355-2363 [doi]
- Is it worth to be patient? Analysis and optimization of delayed mobile data offloadingFidan Mehmeti, Thrasyvoulos Spyropoulos. 2364-2372 [doi]
- Ready, Set, Go: Coalesced offloading from mobile devices to the cloudLiyao Xiang, Shiwen Ye, Yuan Feng, Baochun Li, Bo Li. 2373-2381 [doi]
- Towards a statistical network calculus - Dealing with uncertainty in arrivalsMichael A. Beck, Sebastian A. Henningsen, Simon B. Birnbach, Jens B. Schmitt. 2382-2390 [doi]
- Towards a system theoretic approach to wireless network capacity in finite time and spaceFlorin Ciucu, Ramin Khalili, Yuming Jiang, Liu Yang, Yong Cui. 2391-2399 [doi]
- Fluctuation analysis of debt based policies for wireless networks with hard delay constraintsRahul Singh, I-Hong Hou, P. R. Kumar. 2400-2408 [doi]
- Price of Anarchy in network routing with class based capacity guaranteesEhsan Monsef, Tricha Anjali, Sanjiv Kapoor. 2409-2417 [doi]
- Distributed stochastic optimization via correlated schedulingMichael J. Neely. 2418-2426 [doi]
- Multi-dimensional OFDMA scheduling in a wireless network with relay nodesReuven Cohen, Guy Grebla. 2427-2435 [doi]
- Application-level scheduling with deadline constraintsHuasen Wu, Xiaojun Lin, Xin Liu, Youguang Zhang. 2436-2444 [doi]
- Joint static and dynamic traffic scheduling in data center networksZizhong Cao, Murali S. Kodialam, T. V. Lakshman. 2445-2453 [doi]
- SimCast: Efficient video delivery in MU-MIMO WLANsGuanhua Wang, Kaishun Wu, Qian Zhang, Lionel M. Ni. 2454-2462 [doi]
- Loss differentiation: Moving onto high-speed wireless LANsRuwaifa Anwar, Kamran Nishat, Mohsin Ali, Zahaib Akhtar, Haseeb Niaz, Ihsan Ayyub Qazi. 2463-2471 [doi]
- MISC: Merging incorrect symbols using constellation diversity for 802.11 retransmissionJiajue Ou, Yuanqing Zheng, Mo Li. 2472-2480 [doi]
- Unleashing exposed terminals in enterprise WLANs: A rate adaptation approachJun Huang, Guoliang Xing, Gang Zhou. 2481-2489 [doi]
- Incentivize cooperative sensing in distributed cognitive radio networks with reputation-based pricingTongjie Zhang, Zongpeng Li, Reihaneh Safavi-Naini. 2490-2498 [doi]
- Hitchhike: Riding control on preamblesXiaoyu Ji, Jiliang Wang, Mingyan Liu, Yubo Yan, Panlong Yang, Yunhao Liu. 2499-2507 [doi]
- QUILT: A Decode/Quantize-Interleave-Transmit approach to cooperative relayingSiddhartha Brahma, Melissa Duarte, Ayan Sengupta, I-Hsiang Wang, Christina Fragouli, Suhas N. Diggavi. 2508-2516 [doi]
- FastProbe: Malicious user detection in Cognitive Radio Networks through active transmissionsTarun Bansal, Bo Chen, Prasun Sinha. 2517-2525 [doi]
- Optimal CSMA-based wireless communication with worst-case delay and non-uniform sizesHongxing Li, Nitin Vaidya. 2526-2534 [doi]
- Provable per-link delay-optimal CSMA for general wireless network topologyDongmyung Lee, Donggyu Yun, Jinwoo Shin, Yung Yi, Se-Young Yun. 2535-2543 [doi]
- Analysis of a proportionally fair and locally adaptive Spatial Aloha in Poisson NetworksFrançois Baccelli, Bartlomiej Blaszczyszyn, Chandramani Singh. 2544-2552 [doi]
- Communication through collisions: Opportunistic utilization of past receptionsAlireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr. 2553-2561 [doi]
- Open peering by Internet transit providers: Peer preference or peer pressure?Aemen Lodhi, Amogh Dhamdhere, Constantine Dovrolis. 2562-2570 [doi]
- A stable fountain code mechanism for peer-to-peer content distributionCédric Westphal. 2571-2579 [doi]
- Maximizing the number of satisfied subscribers in pub/sub systems under capacity constraintsVinay Setty, Gunnar Kreitz, Guido Urdaneta, Roman Vitenberg, Maarten van Steen. 2580-2588 [doi]
- Delay-throughput tradeoff with correlated mobility of ad-hoc networksShuochao Yao, Xinbing Wang, Xiaohua Tian, Qian Zhang. 2589-2597 [doi]
- Joint power optimization of data center network and servers with correlation analysisKuangyu Zheng, Xiaodong Wang, Li Li, Xiaorui Wang. 2598-2606 [doi]
- Performance evaluation and asymptotics for Content Delivery NetworksVirag Shah, Gustavo de Veciana. 2607-2615 [doi]
- On the catalyzing effect of randomness on the per-flow throughput in wireless networksFlorin Ciucu, Jens Schmitt. 2616-2624 [doi]
- Greenbench: A benchmark for observing power grid vulnerability under data-centric threatsMingkui Wei, Wenye Wang. 2625-2633 [doi]
- Power grid vulnerability to geographically correlated failures - Analysis and control implicationsAndrey Bernstein, Daniel Bienstock, David Hay, Meric Uzunoglu, Gil Zussman. 2634-2642 [doi]
- Structure-aware stochastic load management in smart gridsYu Zhang, Mihaela van der Schaar. 2643-2651 [doi]
- Stochastic information management for voltage regulation in smart distribution systemsHao Liang, Atef Abdrabou, Weihua Zhuang. 2652-2660 [doi]
- SBVLC: Secure barcode-based visible light communication for smartphonesBingsheng Zhang, Kui Ren, Guoliang Xing, Xinwen Fu, Cong Wang. 2661-2669 [doi]
- Frogeye: Perception of the slightest tag motionLei Yang, Yong Qi, Jianbing Fang, Xuan Ding, Tianci Liu, Mo Li. 2670-2678 [doi]
- Sonar inside your body: Prototyping ultrasonic intra-body sensor networksGiuseppe Enrico Santagati, Tommaso Melodia. 2679-2687 [doi]
- LiFi: Line-Of-Sight identification with WiFiZimu Zhou, Zheng Yang, Chenshu Wu, Wei Sun, Yunhao Liu. 2688-2696 [doi]
- MIMO-based jamming resilient communication in wireless networksQiben Yan, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou, Y. Thomas Hou. 2697-2706 [doi]
- CACH: Cycle-Adjustable Channel hopping for control channel establishment in cognitive radio networksTsung-Ying Wu, Wanjiun Liao, Cheng-Shang Chang. 2706-2714 [doi]
- A credit-token-based spectrum etiquette framework for coexistence of heterogeneous cognitive radio networksBo Gao, Yaling Yang, Jung-Min "Jerry" Park. 2715-2723 [doi]
- Throughput-efficient channel allocation in multi-channel cognitive vehicular networksYou Han, Eylem Ekici, Haris Kremo, Onur Altintas. 2724-2732 [doi]
- Interference-aware proportional fairness for multi-rate wireless networksDouglas M. Blough, Giovanni Resta, Paolo Santi. 2733-2741 [doi]
- FD-MMAC: Combating multi-channel hidden and exposed terminals using a single transceiverYan Zhang, Loukas Lazos, Kai Chen 0006, Bocan Hu, Swetha Shivaramaiah. 2742-2750 [doi]
- Competitive MAC under adversarial SINRAdrian Ogierman, Andréa W. Richa, Christian Scheideler, Stefan Schmid, Jin Zhang. 2751-2759 [doi]
- Optimal Rate Sampling in 802.11 systemsRichard Combes, Alexandre Proutiere, Donggyu Yun, Jungseul Ok, Yung Yi. 2760-2767 [doi]
- Throughput-delay tradeoff in mobile ad hoc networks with correlated mobilityJiajia Liu, Hiroki Nishiyama, Nei Kato, Jianfeng Ma, Xiaohong Jiang. 2768-2776 [doi]
- An approximation algorithm for client assignment in client/server systemsYuqing Zhu, Weili Wu, James Willson, Ling Ding, Lidong Wu, Deying Li, Wonjun Lee. 2777-2785 [doi]
- Sojourn time approximations in a multi-class time-sharing serverA. Izagirre, Urtzi Ayesta, Ina Maria Verloop. 2786-2794 [doi]
- A general framework of hybrid graph sampling for complex network analysisXin Xu, Chul-Ho Lee, Do Young Eun. 2795-2803 [doi]
- Proactive fault-tolerant aggregation protocol for privacy-assured smart meteringJongho Won, Chris Y. T. Ma, David K. Y. Yau, Nageswara S. V. Rao. 2804-2812 [doi]
- Blowing hard is not all we want: Quantity vs quality of wind power in the smart gridFanxin Kong, Chuansheng Dong, Xue Liu, Haibo Zeng. 2813-2821 [doi]
- Robust and cost-effective architecture design for smart grid communications: A multi-stage middleware deployment approachDong-Hoon Shin, Shibo He, Junshan Zhang. 2822-2830 [doi]
- Optimal Combined Heat and Power system scheduling in smart gridKan Zhou, Jianping Pan, Lin Cai. 2831-2839 [doi]
- RollCaller: User-friendly indoor navigation system using human-item spatial relationYi Guo, Lei Yang, Bowen Li, Tianci Liu, Yunhao Liu. 2840-2848 [doi]
- BlueID: A practical system for Bluetooth device identificationJun Huang, Wahhab Albazrqaoe, Guoliang Xing. 2849-2857 [doi]
- Enhancing ZigBee throughput under WiFi interference using real-time adaptive codingPeng Guo, Jiannong Cao, Kui Zhang, Xuefeng Liu. 2858-2866 [doi]