Abstract is missing.
- Beware of the hidden! How cross-traffic affects quality assurances of competing real-time Ethernet standards for in-car communicationTill Steinbach, Hyung Taek Lim, Franz Korf, Thomas C. Schmidt, Daniel Herrscher, Adam Wolisz. 1-9 [doi]
- Exploring interconnect energy savings under east-west traffic pattern of mapreduce clustersRenan Fischer e Silva, Paul M. Carpenter. 10-18 [doi]
- Collaborative On-demand Wi-Fi sharingHanno Wirtz, Torsten Zimmermann, Martin Serror, Klaus Wehrle. 19-27 [doi]
- Content discovery in wireless information-centric networksCarlos Anastasiades, Arun Sittampalam, Torsten Braun. 28-36 [doi]
- Modelling the Pending Interest Table occupancy in CCN with interest timeout and retransmissionAmuda James Abu, Brahim Bensaou. 37-45 [doi]
- Performance analysis of probabilistic caching scheme using Markov chainsSaran Tarnoi, Vorapong Suppakitpaisarn, Wuttipong Kumwilaisak, Yusheng Ji. 46-54 [doi]
- Joint optimization of content replication and Traffic Engineering in ICNZhen Feng, Mingwei Xu, Yuan Yang, Qi Li, Yu Wang, Qing Li, Börje Ohlman, Meng Chen. 55-63 [doi]
- Persistent caching in information-centric networksCarlos Anastasiades, Andre Gomes, Rene Gadow, Torsten Braun. 64-72 [doi]
- Coordination supports security: A new defence mechanism against interest flooding in NDNHani Salah, Julian Wulfheide, Thorsten Strufe. 73-81 [doi]
- ELDA: Towards efficient and lightweight detection of cache pollution attacks in NDNZhiwei Xu, Bo Chen, Ninghan Wang, Yujun Zhang, Zhongcheng Li. 82-90 [doi]
- Rebound: Decoy routing on asymmetric routes via error messagesDaniel Ellard, Christine E. Jones, Victoria Manfredi, W. Timothy Strayer, Bishal Thapa, Megan Van Welie, Alden W. Jackson. 91-99 [doi]
- Growing a Web of TrustBenjamin Schiller, Thorsten Strufe, Dirk Kohlweyer, Jan Seedorf. 100-108 [doi]
- Using fake sinks and deceptive relays to boost base-station anonymity in Wireless Sensor NetworkNikolaos Baroutis, Mohamed Younis. 109-116 [doi]
- Toward a robust sparse data representation for wireless sensor networksMohammad Abu Alsheikh, Shaowei Lin, Hwee Pink Tan, Dusit Niyato. 117-124 [doi]
- Animal monitoring with unmanned aerial vehicle-aided wireless sensor networksJun Xu, Gürkan Solmaz, Rouhollah Rahmatizadeh, Damla Turgut, Ladislau Bölöni. 125-132 [doi]
- Reliable surveillance in ring deployed Wireless Sensor NetworksMohammed Elmorsy, Ehab S. Elmallah. 133-140 [doi]
- C-SDF: Practical solar-aware distributed flow controlImmanuel Schweizer, Tobias Petry, Max Mühlhäuser. 141-148 [doi]
- Scheduling multiple mobile sinks in Underwater Sensor NetworksFahad Ahmad Khan, Saad Ahmad Khan, Damla Turgut, Ladislau Bölöni. 149-156 [doi]
- D-RPL: Overcoming memory limitations in RPL point-to-multipoint routingCsaba Király, Timofei Istomin, Oana Iova, Gian Pietro Picco. 157-160 [doi]
- JitVector: Just-in-time code generation for network packet classificationSamuel Brack, Sven Hager, Björn Scheuermann. 161-164 [doi]
- Towards identifying Large-scale BGP EventsMeng Chen, Mingwei Xu, Xirui Song, Yuan Yang. 165-168 [doi]
- SDN shim: Controlling legacy devicesDaniel J. Casey, Barry E. Mullins. 169-172 [doi]
- An analytical model to achieve elasticity for cloud-based firewallsKhaled Salah. 173-176 [doi]
- Tracemax: A novel single packet IP traceback strategy for data-flow analysisPeter Hillmann, Frank Tietze, Gabi Dreo Rodosek. 177-180 [doi]
- Coverage preservation in energy harvesting wireless sensor networks for rare eventsDavid C. Harrison, Winston K. G. Seah, Ramesh K. Rayudu. 181-184 [doi]
- Incorporating multiple cluster models for network traffic classificationAnil Kumar, Jinoh Kim, Sang C. Suh, GanHo Choi. 185-188 [doi]
- Using a mobile vehicle for road condition surveillance by energy harvesting sensor nodesAbbas Mehrabi, Kiseon Kim. 189-192 [doi]
- Towards exploring the benefits of scope-flooding in Information-Centric NetworksAndriana Ioannou, Stefan Weber. 193-196 [doi]
- Fossa: Using genetic programming to learn ECA rules for adaptive networking applicationsAlexander Frömmgen, Robert Rehner, Max Lehn, Alejandro P. Buchmann. 197-200 [doi]
- An analytical model for bounded WSNs with unreliable cluster heads and linksFredrick A. Omondi, Purav Shah, Orhan Gemikonakli, Enver Ever. 201-204 [doi]
- Mobile data collection using multi-channel network coding in wireless sensor networksMansour Abdulaziz, Robert Simon. 205-208 [doi]
- Viterbi algorithm for detecting DDoS attacksWilson Bongiovanni, Adilson Eduardo Guelfi, Elvis Pontes, Anderson A. A. Silva, Fen Zhou, Sergio Takeo Kofuji. 209-212 [doi]
- Characterizing performance and fairness of big data transfer protocols on long-haul networksSe-Young Yu, Nevil Brownlee, Aniket Mahanti. 213-216 [doi]
- Avatar mobility and network condition-aware 3D game over wireless networksDonghyeok Ho, Hyungnam Kim, Hwangjun Song. 217-220 [doi]
- Towards a method of estimating one-way delays under delay asymmetry and unknown relative clock offsetJun Liu. 221-224 [doi]
- Towards a Context Aware Multipath-TCPRichard Withnell, Christopher Edwards. 225-228 [doi]
- Topology control with application constraintsMichael Stein, Géza Kulcsár, Immanuel Schweizer, Gergely Varró, Andy Schürr, Max Mühlhäuser. 229-232 [doi]
- Efficient multi-group formation and communication protocol for Wi-Fi DirectAhmed A. Shahin, Mohamed F. Younis. 233-236 [doi]
- Channel assignment in mobile networks based on geometric prediction and random coloringSubhankar Ghosal, Sasthi C. Ghosh. 237-240 [doi]
- Participatory-sensing-enabled efficient Parking Management in modern citiesSanket Gupte, Mohamed F. Younis. 241-244 [doi]
- Dependency-aware distributed video transcoding in the cloudMohammad Reza Zakerinasab, Mea Wang. 245-252 [doi]
- Chance-constrained QoS satisfaction for predictive video streamingRamy Atawia, Hatem Abou-zeid, Hossam S. Hassanein, Aboelmagd Noureldin. 253-260 [doi]
- RBCS: A resilient backbone construction scheme for hybrid Peer-To-Peer streamingGiang T. Nguyen, Stefanie Roos, Thorsten Strufe, Mathias Fischer. 261-269 [doi]
- An ITS solution providing real-time visual overtaking assistance using smartphonesSubhadeep Patra, Carlos T. Calafate, Juan-Carlos Cano, Pietro Manzoni. 270-278 [doi]
- FLOWER - Fuzzy Lower-than-Best-Effort transport protocolSi Quoc Viet Trang, Emmanuel Lochin, Cédric Baudoin, Emmanuel Dubois 0003, Patrick Gelard. 279-286 [doi]
- Latency and fairness trade-off for thin streams using redundant data bundling in TCPBendik R. Opstad, Jonas Markussen, Iffat Ahmed, Andreas Petlund, Carsten Griwodz, Pål Halvorsen. 287-294 [doi]
- Improving TCP performance in data center networks with Adaptive Complementary CodingJiyan Sun, Yan Zhang, Ding Tang, Shuli Zhang, Zhen Xu, Jingguo Ge. 295-302 [doi]
- Frugal topologies for saving energy in IP networksMohammed Hussein, Gentian Jakllari, Béatrice Paillassa. 303-311 [doi]
- Caching on the move: Towards D2D-based information centric networking for mobile content distributionGanesh Chandrasekaran, Ning Wang, Rahim Tafazolli. 312-320 [doi]
- Data bundling for energy efficient communication of wearable devicesJung-Woong Sung, Seung-Jae Han. 321-328 [doi]
- DLINK: Dual link based radio frequency fingerprinting for wearable devicesGirish Revadigar, Chitra Javali, Wen Hu, Sanjay Jha. 329-337 [doi]
- Predictive mobile IP handover for vehicular networksAlexander Magnano, Xin Fei, Azzedine Boukerche. 338-346 [doi]
- Augmenting home routers for socially-aware traffic managementAndri Lareida, George Petropoulos, Valentin Burger, Michael Seufert, Sergios Soursos, Burkhard Stiller. 347-355 [doi]
- FRoDO: Friendly routing over dunbar-based overlaysTobias Amft, Barbara Guidi, Kalman Graffi, Laura Ricci. 356-364 [doi]
- Competitive equilibrium and stable coalition in overlay environmentsShan Jiang, Jianxin Liao, Jun Gong, Jingyu Wang, Tonghong Li. 365-372 [doi]
- Energy-efficient overlay networks for mobile devices with buffered relaying and push notificationsThomas Bocek, Nico Rutishauser, Burkhard Stiller. 373-381 [doi]
- Measuring and modeling performance of WLAN communication for multistatic sonar applicationsSascha Alexander Jopen, Arne Schulz, Raphael Ernst. 382-385 [doi]
- VirtualStack: A framework for protocol stack virtualization at the edgeJens Heuschkel, Immanuel Schweizer, Max Mühlhäuser. 386-389 [doi]
- Reference equipment of cross-layer control for live video transmission on various physical linksShuhei Oda, Kurozumi Masaaki, Yosuke Endo. 390-393 [doi]
- ULLA-X: a unified programmatic middleware for on-demand network reconfigurationAvishek Patra, Andreas Achtzehn, Petri Mähönen. 394-397 [doi]
- Challenges for 100 Gbit/s end to end communication: Increasing throughput through parallel processingSteffen Büchner, Jörg Nolte, Rolf Kraemer, Lukasz Lopacinski, Reinhardt Karnapke. 398-401 [doi]
- Cooperative spectrum mobility in heterogeneous opportunistic networks using cognitive radioAvirup Das, Sasthi C. Ghosh, Nabanita Das, Abhirup Das Barman. 402-405 [doi]
- Method for providing secure and private fine-grained access to outsourced dataMosarrat Jahan, Mohsen Rezvani, Aruna Seneviratne, Sanjay Jha. 406-409 [doi]
- O-ACK: An adaptive wireless MAC protocol exploiting opportunistic token-passing and ack piggybackingShegufta Bakht Ahsan, Nitin Vaidya. 410-413 [doi]
- a-kTC: Integrating topology control into the stackImmanuel Schweizer, Ralf Zimmermann, Michael Stein, Max Mühlhäuser. 414-417 [doi]
- SEARS: Space efficient and reliable storage system in the cloudYing Li, Katherine Guo, Xin Wang, Emina Soljanin, Thomas Woo. 418-421 [doi]
- LAC: Introducing latency-aware caching in Information-Centric NetworksGiovanna Carofiglio, Leonce Mekinda, Luca Muscariello. 422-425 [doi]
- Performance evaluation of Joint Transmission Coordinated-Multipoint in dense Very High Throughput WLANs scenarioIyad Lahsen Cherif, Lynda Zitoune, Véronique Vèque. 426-429 [doi]
- Cache coherence in Machine-to-Machine Information Centric NetworksMaroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, Khalil Drira. 430-433 [doi]
- A partial-decentralized coflow scheduling scheme in data center networksShuli Zhang, Yan Zhang, Ding Tang, Zhen Xu, Jingguo Ge, Zhijun Zhao. 434-437 [doi]
- OrLiOn: Optimized Route Planning for the Localization of Indoor Nodes from Outdoor environmentAlina Rubina, Oleksandr Artemenko, Andreas Mitschele-Thiel. 438-441 [doi]
- Can Multipath TCP save energy? A measuring and modeling study of MPTCP energy consumptionFabian Kaup, Matthias Wichtlhuber, Stefan Rado, David Hausheer. 442-445 [doi]
- Performance of a tiered architecture to support end-host mobility in a locator identity split environmentAvinash Mungur, Christopher Edwards. 446-449 [doi]
- Revisiting the controller placement problemMd Tanvir Ishtaique ul Huque, Guillaume Jourjon, Vincent Gramoli. 450-453 [doi]
- Content retrieval method in cooperation with CDN and ICN-based in-network guidance over IP networkYutaro Inaba, Yosuke Tanigawa, Hideki Tode. 454-457 [doi]
- Evaluation of topology optimization objectivesY. Sinan Hanay, Shin'ichi Arakawa, Masayuki Murata. 458-461 [doi]
- A step towards a protocol-independent measurement framework for dynamic networksNils Richerzhagen, Tao Li, Dominik Stingl, Björn Richerzhagen, Ralf Steinmetz, Silvia Santini. 462-465 [doi]
- Cooperative traffic management for co-existing overlaysZiteng Cui, Jianxin Liao, Jingyu Wang, Qi Qi, Jing Wang. 466-469 [doi]
- Efficient camera selection for maximized target coverage in underwater acoustic sensor networksBilal Gonen, Kemal Akkaya, Fatih Senel. 470-473 [doi]
- Performance evaluation of delay-tolerant wireless friend-to-friend networks for undetectable communicationAna Barroso, Matthias Hollick. 474-477 [doi]
- Publish-subscribe-based control mechanism for scheduling integration in Mobile IPv6Tobias Rueckelt, Florian Jomrich, Daniel Burgstahler, Doreen Böhnstedt, Ralf Steinmetz. 478-481 [doi]
- Group key establishment for secure multicasting in IoT-enabled Wireless Sensor NetworksPawani Porambage, An Braeken, Corinna Schmitt, Andrei Gurtov, Mika Ylianttila, Burkhard Stiller. 482-485 [doi]
- A reputation-based method for detection of attacks in Virtual Coordinate based Wireless Sensor NetworksDivyanka Bose, Anura P. Jayasumana. 486-489 [doi]
- Real-time streaming with millisecond granularitySimon Ofner, Matthias Frank. 490-493 [doi]
- SSIDs in the wild: Extracting semantic information from WiFi SSIDsSuranga Seneviratne, Fangzhou Jiang, Mathieu Cunche, Aruna Seneviratne. 494-497 [doi]
- Exploring energy consumption issues for multimedia streaming in LTE HetNet Small CellsRamona Trestian, Quoc-Tuan Vien, Purav Shah, Glenford E. Mapp. 498-501 [doi]
- The (in)security of Topology Discovery in Software Defined NetworksTalal Alharbi, Marius Portmann, Farzaneh Pakzad. 502-505 [doi]
- Unknown pattern extraction for statistical network protocol identificationYu Wang, Chao Chen, Yang Xiang. 506-509 [doi]
- An experimental study on inter-domain routing dynamics using IP-level path tracesNazim Ahmed, Kamil Saraç. 510-517 [doi]
- Efficient one-to-many broadcasting for resource-constrained wireless networksJames Pope, Robert Simon. 518-525 [doi]
- COSC: Paths with Combined Optimal Stability and Capacity in opportunistic networksShiraz Qayyum, Peizhao Hu, Mohan Kumar. 526-534 [doi]
- Fast detection of compact topology representation for wireless networksYigal Bejerano, Katherine Guo, Thyaga Nandagopal. 535-543 [doi]
- Congestion modeling and management techniques for predictable disruption tolerant networksJuan A. Fraire, Pablo Madoery, Jorge M. Finochietto, Edward J. Birrane. 544-551 [doi]
- A lossless switch for data acquisition networksGrzegorz Jereczek, Giovanna Lehmann Miotto, David Malone, Miroslaw Walukiewicz. 552-560 [doi]
- RODA: A reconfigurable optical data center network architectureAmitangshu Pal, Krishna Kant. 561-569 [doi]
- Capacitated cloudlet placements in Wireless Metropolitan Area NetworksZichuan Xu, Weifa Liang, Wenzheng Xu, Mike Jia, Song Guo. 570-578 [doi]
- Leveraging network structure in centrality evaluation of large scale networksSima Das, Sajal K. Das. 579-586 [doi]
- On periodic scheduling of fixed-slot bandwidth reservations for big data transferYongqiang Wang, Chase Q. Wu, Aiqin Hou, Wenyu Peng, Shuting Xu, Meng Shi. 587-594 [doi]