Journal: IEEE/ACM Trans. Netw.

Volume 15, Issue 6

1217 -- 1230Long Le, Jay Aikat, Kevin Jeffay, F. Donelson Smith. The effects of active queue management and explicit congestion notification on web performance
1231 -- 1239Thomas Voice. Stability of multi-path dual congestion control algorithms
1240 -- 1253Prashanth Hande, Shengyu Zhang, Mung Chiang. Distributed rate allocation for inelastic flows
1254 -- 1265Patrick G. Bridges, Gary T. Wong, Matti A. Hiltunen, Richard D. Schlichting, Matthew J. Barrick. A configurable and extensible transport protocol
1266 -- 1279Nick Feamster, Ramesh Johari, Hari Balakrishnan. Implications of autonomy for the expressiveness of policy routing
1280 -- 1292Pierre Francois, Olivier Bonaventure. Avoiding transient loops during the convergence of link-state routing protocols
1293 -- 1306Gábor Rétvári, József Bíró, Tibor Cinkler. On shortest path representation
1307 -- 1320Jin Xiao, Raouf Boutaba. Assessing network service profitability: modeling from market science perspective
1321 -- 1332Amos Beimel, Shlomi Dolev, Noam Singer. RT oblivious erasure correcting
1333 -- 1344Atilla Eryilmaz, R. Srikant. Fair resource allocation in wireless networks using queue-length-based scheduling and congestion control
1345 -- 1358Mohammad Taghi Hajiaghayi, Nicole Immorlica, Vahab S. Mirrokni. Power optimization in fault-tolerant topology control algorithms for wireless multi-hop networks
1359 -- 1372Ritesh Madan, Shuguang Cui, Sanjay Lall, Andrea J. Goldsmith. Modeling and optimization of transmission schemes in energy-constrained wireless sensor networks
1373 -- 1386Yaling Yang, Jun Wang, Robin Kravets. Distributed optimal contention window control for elastic traffic in single-cell wireless LANs
1387 -- 1400Xiangying Yang, Gustavo de Veciana. Inducing multiscale clustering using multistage MAC contention in CDMA ad hoc networks
1401 -- 1413Huiyu Luo, Gregory J. Pottie. Designing routes for source coding with explicit side information in sensor networks
1414 -- 1427Sandro Bosio, Antonio Capone, Matteo Cesana. Radio planning of wireless local area networks
1428 -- 1441Satish Raghunath, K. K. Ramakrishnan, Shivkumar Kalyanaraman. Measurement-based characterization of IP VPNs
1442 -- 1453Chengzhi Li, Almut Burchard, Jörg Liebeherr. A network calculus with effective bandwidth
1454 -- 1466Paolo Valente. Exact GPS simulation and optimal fair scheduling with logarithmic complexity
1467 -- 1477Fang Hao, Murali S. Kodialam, T. V. Lakshman, Shantidev Mohanty. Fast, memory efficient flow rate estimation using runs
1478 -- 1489Jie Lian, Kshirasagar Naik, Gordon B. Agnew. A framework for evaluating the performance of cluster algorithms for hierarchical networks
1490 -- 1501Patrick P. C. Lee, Vishal Misra, Dan Rubenstein. Distributed algorithms for secure multipath routing in attack-resistant networks
1502 -- 1513Heng Yin, Haining Wang. Building an application-aware IPsec policy system
1514 -- 1526Yan Sun, K. J. Ray Liu. Hierarchical group access control for secure multicast communications
1527 -- 1540Javier Salido, Loukas Lazos, Radha Poovendran. Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach
1541 -- 1554Emilio Leonardi, Marco Mellia, Marco Ajmone Marsan, Fabio Neri. Optimal scheduling and routing for maximum network throughput
1555 -- 1564Olufemi Komolafe, David Harle. An holistic framework for regular virtual topology design
1565 -- 1578Haitham S. Hamza, Jitender S. Deogun. WDM optical interconnects: a balanced design approach
1579 -- 1592Piotr Cholda, Andrzej Jajszczyk. Reliability assessment of optical p-cycles
1593 -- 1602Mordechai Shalom, Shmuel Zaks. A 10/7 + epsilon approximation for minimizing the number of ADMs in SONET rings
1603 -- 1615François Abel, Cyriel Minkenberg, Ilias Iliadis, Antonius P. J. Engbersen, Mitchell Gusat, Ferdinand Gramsamer, Ronald P. Luijten. Design issues in next-generation merchant switch fabrics
1616 -- 0Hongbin Luo, Hongfang Yu, Lemin Li. Comments on segment shared protection in mesh communication networks with bandwidth guaranteed tunnels

Volume 15, Issue 5

981 -- 992Gaurav Sharma, Ravi Mazumdar, Ness B. Shroff. Delay and capacity trade-offs in mobile ad hoc networks: a global perspective
993 -- 1006Richard J. La, Yijie Han. Distribution of path durations in mobile ad hoc networks and path selection
1007 -- 1020Daji Qiao, Sunghyun Choi, Kang G. Shin. Interference analysis and transmit power control in IEEE 802.11a/h wireless LANs
1021 -- 1034Longbi Lin, Ness B. Shroff, R. Srikant. Asymptotically optimal energy-aware routing for multihop wireless networks with renewable energy sources
1035 -- 1045Aditya Karnik, Anurag Kumar. Distributed optimal self-organization in ad hoc wireless sensor networks
1046 -- 1058Shailesh Patil, Gustavo de Veciana. Managing resources and quality of service in heterogeneous wireless systems exploiting opportunism
1059 -- 1072Robert T. Schweller, Zhichun Li, Yan Chen, Yan Gao, Ashish Gupta, Yin Zhang, Peter A. Dinda, Ming-Yang Kao, Gokhan Memik. Reversible sketches: enabling monitoring and analysis over high-speed data streams
1073 -- 1083Bozidar Radunovic, Jean-Yves Le Boudec. A unified framework for max-min and min-max fairness with applications
1084 -- 1097Yan Chen, David Bindel, Han Hee Song, Randy H. Katz. Algebra-based scalable overlay network monitoring: algorithms, evaluation, and applications
1098 -- 1108Yasong Jin, Soshant Bali, Tyrone E. Duncan, Victor S. Frost. Predicting properties of congestion events for a queueing system with fBm traffic
1109 -- 1122Yee-Ting Li, Douglas J. Leith, Robert Shorten. Experimental evaluation of TCP protocols for high-speed networks
1123 -- 1135Olivier Bonaventure, Clarence Filsfils, Pierre Francois. Achieving sub-50 milliseconds recovery upon BGP peering link failures
1136 -- 1148Anton Riedl, Dominic A. Schupke. Routing optimization in IP networks utilizing additive and concave link metrics
1149 -- 1162Yanping Zhao, Derek L. Eager, Mary K. Vernon. Scalable on-demand streaming of nonlinear media
1163 -- 1176Jikai Li, Chunming Qiao, Jinhui Xu, Dahai Xu. Maximizing throughput for optical burst switching networks
1177 -- 1190Jing Zhang, Keyao Zhu, Hui Zang, Norman S. Matloff, Biswanath Mukherjee. Availability-aware provisioning strategies for differentiated protection services in wavelength-convertible WDM mesh networks
1191 -- 1203Zhenghao Zhang, Yuanyuan Yang. A novel analytical model for switches with shared buffer
1204 -- 1215Dijiang Huang, Manish Mehta 0003, Appie van de Liefvoort, Deep Medhi. Modeling pairwise key establishment for random key predistribution in large-scale sensor networks

Volume 15, Issue 4

737 -- 749Ron Banner, Ariel Orda. The power of tuning: a novel approach for the efficient design of survivable networks
750 -- 760Kwok Shing Ho, Kwok-Wai Cheung. Generalized survivable network
761 -- 774Renata Teixeira, Timothy G. Griffin, Mauricio G. C. Resende, Jennifer Rexford. TIE breaking: tunable interdomain egress selection
775 -- 788Xiaowei Yang, David Clark, Arthur W. Berger. NIRA: a new inter-domain routing architecture
789 -- 802Antonio Nucci, Supratik Bhattacharyya, Nina Taft, Christophe Diot. IGP link weight assignment for operational Tier-1 backbones
803 -- 812Smita Rai, Omkar Deshpande, Canhui Ou, Charles U. Martel, Biswanath Mukherjee. Reliable multipath provisioning for high-capacity backbone mesh networks
813 -- 823Bernardo A. Movsichoff, Constantino M. Lagoa, Hao Che. End-to-end optimal algorithms for integrated QoS, traffic engineering, and failure recovery
824 -- 837Ao Tang, Jiantao Wang, Steven H. Low, Mung Chiang. Equilibrium of heterogeneous congestion control: existence and uniqueness
838 -- 851Yueping Zhang, Seong-ryong Kang, Dmitri Loguinov. Delay-independent stability and performance of distributed congestion control
852 -- 865Injong Rhee, Lisong Xu. Limitations of equation-based congestion control
866 -- 877Robert Shorten, Douglas J. Leith. On queue provisioning, network efficiency and the transmission control protocol
878 -- 891Yanping Zhao, Derek L. Eager, Mary K. Vernon. Network bandwidth requirements for scalable on-demand streaming
892 -- 905Xiaoming Wang, Dmitri Loguinov. Load-balancing performance of consistent hashing: asymptotic analysis of random node join
906 -- 917Pi-Chung Wang, Chun-Liang Lee, Chia-Tai Chan, Hung-Yi Chang. Performance improvement of two-dimensional packet classification by filter rephrasing
918 -- 931Xiliang Liu, Kaliappa Nadar Ravindran, Dmitri Loguinov. A queueing-theoretic foundation of available bandwidth estimation: single-hop analysis
932 -- 943Reuven Cohen, Liran Katzir. A generic quantitative approach to the scheduling of synchronous packets in a shared uplink wireless channel
944 -- 956Gábor Fodor, Miklós Telek. Bounding the blocking probabilities in multirate CDMA networks supporting elastic services
957 -- 968Xiaojun Cao, Vishal Anand, Chunming Qiao. Waveband switching for dynamic traffic demands in multigranular optical networks
969 -- 979Hung Q. Ngo, Dazhen Pan, Yuanyuan Yang. Optical switching networks with minimum number of limited-range wavelength converters

Volume 15, Issue 3

485 -- 498Augustin Soule, Antonio Nucci, Rene L. Cruz, Emilio Leonardi, Nina Taft. Estimating dynamic traffic matrices by using viable routing changes
499 -- 511David E. Taylor, Jonathan S. Turner. ClassBench: a packet classification benchmark
512 -- 520Mortada Mehyar, Demetri Spanos, John Pongsajapan, Steven H. Low, Richard M. Murray. Asynchronous distributed averaging on communication networks
521 -- 532Iordanis Koutsopoulos, Leandros Tassiulas. Joint optimal access point selection and channel assignment in wireless networks
533 -- 545Ashutosh Sabharwal, Ahmad Khoshnevis, Edward W. Knightly. Opportunistic spectral usage: bounds and a multi-band CSMA/CA protocol
546 -- 559Karthikeyan Sundaresan, Raghupathy Sivakumar. A unified MAC layer framework for ad-hoc networks with smart antennas
560 -- 573Yigal Bejerano, Seung-Jae Han, Li Li. Fairness and load balancing in wireless LANs using association control
574 -- 587Mehmet C. Vuran, Ian F. Akyildiz. A-MAC: adaptive medium access control for next generation wireless terminals
588 -- 601Anurag Kumar, Eitan Altman, Daniele Miorandi, Munish Goyal. New insights from a fixed-point analysis of single cell IEEE 802.11 WLANs
602 -- 615Denizhan N. Alparslan, Khosrow Sohraby. A generalized random mobility model for wireless ad hoc networks and its analysis: one-dimensional case
616 -- 629Denizhan N. Alparslan, Khosrow Sohraby. Two-dimensional modeling and analysis of generalized random mobility models for wireless ad hoc networks
630 -- 643Junsoo Lee, Stephan Bohacek, João P. Hespanha, Katia Obraczka. Modeling communication networks with hybrid systems
644 -- 656Derek Leonard, Zhongmei Yao, Vivek Rai, Dmitri Loguinov. On lifetime-based node failure and stochastic resilience of decentralized peer-to-peer networks
657 -- 668Michael J. Neely, Eytan Modiano, Yuan-Sheng Cheng. Logarithmic delay for N × N packet switches under the crossbar constraint
669 -- 682Nicolas Christin, Jörg Liebeherr, Tarek F. Abdelzaher. Enhancing class-based service architectures with adaptive rate allocation and dropping mechanisms
683 -- 696Balaji Krithikaivasan, Yong Zeng, Kaushik Deka, Deep Medhi. ARCH-based traffic forecasting and dynamic bandwidth provisioning for periodically measured nonstationary traffic
697 -- 708Cheng Chen, Zhengguo Li, Yeng Chai Soh. MRF: a framework for source and destination based bandwidth differentiation service
709 -- 720Massimo Tornatore, Guido Maier, Achille Pattavina. WDM network design by ILP models based on flow aggregation
721 -- 733Chunsheng Xin. Blocking analysis of dynamic traffic grooming in mesh WDM optical networks

Volume 15, Issue 2

253 -- 266Nick Feamster, Jennifer Rexford. Network-wide prediction of BGP routes
267 -- 280Giuseppe Di Battista, Thomas Erlebach, Alexander Hall, Maurizio Patrignani, Maurizio Pizzonia, Thomas Schank. Computing the types of the relationships between autonomous systems
281 -- 294Ping Ji, Zihui Ge, Jim Kurose, Donald F. Towsley. A comparison of hard-state and soft-state signaling protocols
295 -- 308Predrag R. Jelenkovic, Petar Momcilovic, Mark S. Squillante. Scalability of wireless networks
309 -- 322Ping Chung Ng, Soung Chang Liew. Throughput analysis of IEEE802.11 multi-hop ad hoc networks
323 -- 333Gennaro Boggia, Pietro Camarda, Luigi Alfredo Grieco, Saverio Mascolo. Feedback-based control for providing real-time services with the 802.11e MAC
334 -- 345Hai Liu, Xiaohua Jia, Peng-Jun Wan, Chih-Wei Yi, S. Kami Makki, Niki Pissinou. Maximizing lifetime of sensor surveillance systems
346 -- 358Seyit Ahmet Çamtepe, Bülent Yener. Combinatorial design of key distribution mechanisms for wireless sensor networks
359 -- 372Srihari Nelakuditi, Sanghwan Lee, Yinzhe Yu, Zhi-Li Zhang, Chen-Nee Chuah. Fast local rerouting for handling transient link failures
373 -- 386Sonia Fahmy, Minseok Kwon. Characterizing overlay multicast networks and their costs
387 -- 399Marjan Bozinovski, Hans-Peter Schwefel, Ramjee Prasad. Maximum availability server selection policy for efficient and reliable session control systems
400 -- 412Mansoor Alicherry, Randeep Bhatia. Simple pre-provisioning scheme to enable fast restoration
413 -- 424Ron Banner, Ariel Orda. Multipath routing algorithms for congestion minimization
436 -- 449Nicholas B. Chang, Mingyan Liu. Controlled flooding search in a large network
450 -- 461Aggelos Ioannou, Manolis Katevenis. Pipelined heap (priority queue) management for advanced scheduling in high-speed networks
462 -- 472Haibin Lu, Sartaj Sahni. O(logW) multidimensional packet classification
473 -- 484Eli Brosh, Asaf Levin, Yuval Shavitt. Approximation and heuristic algorithms for minimum-delay application-layer multicast trees

Volume 15, Issue 1

1 -- 13Nathaniel E. Baughman, Marc Liberatore, Brian Neil Levine. Cheat-proof playout for centralized and peer-to-peer gaming
14 -- 25Ramana Rao Kompella, Sumeet Singh, George Varghese. On scalable attack detection in the network
26 -- 39Ramaswamy Ramaswamy, Tilman Wolf. High-speed prefix-preserving IP address anonymization for passive measurement systems
40 -- 53Haining Wang, Cheng Jin, Kang G. Shin. Defense against spoofed IP traffic using hop-count filtering
54 -- 66Sharad Jaiswal, Gianluca Iannaccone, Christophe Diot, James F. Kurose, Donald F. Towsley. Measurement and classification of out-of-sequence packets in a tier-1 IP backbone
67 -- 79Dogu Arifler, Gustavo de Veciana, Brian L. Evans. A factor analytic approach to inferring congestion sharing based on flow level measurements
80 -- 92Caixia Chi, Dawei Huang, David Lee, Xiaorong Sun. Lazy flooding: a new technique for information dissemination in distributed network systems
93 -- 104Seung Jun Baek, Gustavo de Veciana. Spatial energy balancing through proactive multipath routing in wireless multihop networks
105 -- 118Ioannis Ch. Paschalidis, Wei Lai, David Starobinski. Asymptotically optimal transmission policies for large-scale low-power wireless sensor networks
119 -- 132Jakob Eriksson, Michalis Faloutsos, Srikanth V. Krishnamurthy. DART: dynamic address routing for scalable ad hoc and mesh networks
133 -- 144Yung Yi, Sanjay Shakkottai. Hop-by-hop congestion control over a wireless multi-hop network
145 -- 158Liang Song, Dimitrios Hatzinakos. A cross-layer architecture of wireless sensor networks for target tracking
159 -- 172David Malone, Ken Duffy, Douglas J. Leith. Modeling the 802.11 distributed coordination function in nonsaturated heterogeneous conditions
173 -- 186Zongming Fei, Mengkun Yang. A proactive tree recovery mechanism for resilient overlay multicast
187 -- 200Seong-ryong Kang, Dmitri Loguinov. Modeling best-effort and FEC streaming of scalable video in lossy network channels
201 -- 211Guoliang Xue, Arunabha Sen, Weiyi Zhang, Jian Tang, Krishnaiyan Thulasiraman. Finding a path subject to many additive QoS constraints
212 -- 225Yong Lee 0003, Jianyu Lou, Junzhou Luo, Xiaojun Shen. An efficient packet scheduling algorithm with deadline guarantees for input-queued switches
226 -- 233Ayman G. Fayoumi, Anura P. Jayasumana. A surjective-mapping based model for optical shared-buffer cross-connect
234 -- 245Zhenghao Zhang, Yuanyuan Yang. On-line optimal wavelength assignment in WDM networks with shared wavelength converter pool