| 849 | -- | 860 | Zhiting Lin, Xiufang Jiang. Universal scheme improving probabilistic routing in delay-tolerant networks |
| 861 | -- | 874 | Nilesh Padhariya, Anirban Mondal, Sanjay Kumar Madria, Masaru Kitsuregawa. Economic incentive-based brokerage schemes for improving data availability in mobile-P2P networks |
| 875 | -- | 880 | Sathiamoorthy Manoharan, Tianxu Ge. A demerit point strategy to reduce free-riding in BitTorrent |
| 881 | -- | 894 | Bernardo de la Ossa, José A. Gil, Julio Sahuquillo, Ana Pont. Referrer Graph: A cost-effective algorithm and pruning method for predicting web accesses |
| 895 | -- | 907 | Y. Xie, S. Tang, X. Huang, C. Tang, X. Liu. Detecting latent attack behavior from aggregated Web traffic |
| 908 | -- | 926 | Frederic Raspall-Chaure. Scalable identification and measurement of heavy-hitters |
| 927 | -- | 938 | Brad Whitehead, Chung-Horng Lung, Peter Rabinovitch. An efficient hybrid approach to per-flow state tracking for high-speed networks |
| 939 | -- | 946 | Sungwook Kim. A repeated Bayesian auction game for cognitive radio spectrum sharing scheme |
| 947 | -- | 961 | Arash Azarfar, Jean-François Frigon, Brunilde Sansò. Reliability analysis of a channel restoration mechanism for opportunistic spectrum access |