Journal: IEEE/ACM Trans. Netw.

Volume 16, Issue 6

1153 -- 1166Jean-Yves Le Boudec, Milan Vojnovic. The random trip model: stability, stationary regime, and perfect simulation
1167 -- 1178Jerzy Konorski. A game-theoretic study of CSMA/CA under a backoff attack
1179 -- 1192Chun-Ting Chou, Kang G. Shin, Sai Shankar N.. Contention-based airtime usage control in multirate IEEE 802.11 wireless LANs
1193 -- 1206David Applegate, Edith Cohen. Making routing robust to changing traffic demands: algorithms and evaluation
1207 -- 1218Eddie Kohler, Jinyang Li, Vern Paxson, Scott Shenker. Observed structure of addresses in IP traffic
1219 -- 1232Bamba Gueye, Artur Ziviani, Mark Crovella, Serge Fdida. Constraint-based geolocation of internet hosts
1233 -- 1245Srinivas Shakkottai, R. Srikant. Economics of network pricing with multiple ISPs
1241 -- 1252Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya. Internet traffic behavior profiling for network security monitoring
1246 -- 1259David X. Wei, Cheng Jin, Steven H. Low, Sanjay Hegde. FAST TCP: motivation, architecture, algorithms, performance
1253 -- 1266Minho Sung, Jun Xu, Jun Li, Li Li. Large-scale IP traceback in high-speed internet: practical techniques and information-theoretic foundation
1260 -- 1271Huaizhong Han, Srinivas Shakkottai, C. V. Hollot, R. Srikant, Donald F. Towsley. Multi-path TCP: a joint congestion control and routing scheme to exploit path diversity in the internet
1267 -- 1280Xiaowei Yang, David Wetherall, Thomas E. Anderson. TVA: a DoS-limiting network architecture
1272 -- 1281Dritan Nace, Nhat Linh Doan, Éric Gourdin, Bernard Liau. Computing optimal max-min fair resource allocation for elastic flows
1281 -- 1294Yong Xia, Lakshminarayanan Subramanian, Ion Stoica, Shivkumar Kalyanaraman. One more bit is enough
1282 -- 1291Wei-Hua Wang, Marimuthu Palaniswami, Steven H. Low. Application-oriented flow control: fundamentals, algorithms and fairness
1292 -- 1301Anthony C. Boucouvalas, Pi Huang. OBEX over IrDA: performance analysis and optimization by considering multiple applications
1295 -- 1307Renata Teixeira, Aman Shaikh, Timothy G. Griffin, Jennifer Rexford. Impact of hot-potato routing changes in IP networks
1302 -- 1312Jacob Chakareski, Philip A. Chou. RaDiO edge: rate-distortion optimized proxy-driven streaming from the network edge
1308 -- 1320Fernando Solano, Thomas Stidsen, Ramón Fabregat, José-Luis Marzo. Label space reduction in MPLS networks: how much can a single stacked label do?
1313 -- 1322Xingzhe Fan, Kartikeya Chandrayana, Murat Arcak, Shivkumar Kalyanaraman, John Ting-Yung Wen. A two-time-scale design for edge-based detection and rectification of uncooperative flows
1321 -- 1330Randeep Bhatia, Murali S. Kodialam, T. V. Lakshman, Sudipta Sengupta. Bandwidth guaranteed routing with fast restoration against link and node failures
1323 -- 1335Feng Xie, Gang Feng, Chee Kheong Siew. The impact of loss recovery on congestion control for reliable multicast
1331 -- 1339Stamatis Stefanakos. Reliable routings in networks with generalized link failure events
1336 -- 1347Dean H. Lorenz, Ariel Orda, Danny Raz, Yuval Shavitt. Efficient QoS partition and routing of unicast and multicast
1340 -- 1351George F. Georgakopoulos. Buffered cross-bar switches, revisited: design steps, proofs and simulations towards optimal rate and minimum buffer memory
1348 -- 1361Xiaojun Lin, Ness B. Shroff. An optimization-based approach for QoS routing in high-bandwidth networks
1352 -- 1365Srinivasan Ramasubramanian. Supporting multiple protection strategies in optical networks
1362 -- 1373Sriram Ramabhadran, Joseph Pasquale. The Stratified Round Robin scheduler: design, analysis and implementation
1366 -- 1377Lei Song, Jing Zhang, Biswanath Mukherjee. A comprehensive study on backup-bandwidth reprovisioning after network-state updates in survivable telecom mesh networks
1374 -- 1387Michael Rosenblum, Constantine Caramanis, Michel X. Goemans, Vahid Tarokh. Approximating fluid schedules in crossbar packet-switches and Banyan networks
1378 -- 1391Qun Zhao, Mohan Gurusamy. Lifetime maximization for connected target coverage in wireless sensor networks
1388 -- 1399Maher Ali. Generalized sharing in survivable optical networks
1392 -- 1405John Papandriopoulos, Subhrakanti Dey, Jamie S. Evans. Optimal and distributed protocols for cross-layer design of physical and transport layers in MANETs
1406 -- 1419Andrew Brzezinski, Gil Zussman, Eytan Modiano. Distributed throughput maximization in wireless mesh networks via pre-partitioning
1420 -- 1433Prashanth Hande, Sundeep Rangan, Mung Chiang, Xinzhou Wu. Distributed uplink power control for optimal sir assignment in cellular data networks
1434 -- 1446Aaron Walters, David Zage, Cristina Nita-Rotaru. A framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks
1447 -- 1460Mohamed Hefeeda, Osama Saleh. Traffic modeling and proportional partial caching for peer-to-peer systems
1461 -- 1474Tao Wu, David Starobinski. A comparative analysis of server selection in content replication networks
1475 -- 1488Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri Loguinov. On static and dynamic partitioning behavior of large-scale P2P networks

Volume 16, Issue 5

1001 -- 1014Nan Jin, Scott Jordan. On the feasibility of dynamic congestion-based pricing in differentiated services networks
1015 -- 1024Miriam Allalouf, Yuval Shavitt. Centralized and distributed algorithms for routing and weighted max-min fair bandwidth allocation
1025 -- 1037Ishai Menache, Nahum Shimkin. Capacity management and equilibrium for proportional QoS
1038 -- 1051Tuna Güven, Richard J. La, Mark A. Shayman, Bobby Bhattacharjee. A unified framework for multipath routing for unicast and multicast traffic
1052 -- 1065Shu Tao, John G. Apostolopoulos, Roch Guérin. Real-time monitoring of video quality in IP networks
1066 -- 1079Milan Vojnovic, Ayalvadi J. Ganesh. On the race of worms, alerts, and patches
1080 -- 1093Venkatesh Ramaiyan, Anurag Kumar, Eitan Altman. Fixed point analysis of single cell IEEE 802.11e WLANs: uniqueness and multistability
1094 -- 1107Hazer Inaltekin, Stephen B. Wicker. The analysis of Nash equilibria of the one-shot random-access game for wireless networks and the behavior of selfish nodes
1108 -- 1120Wei Wang 0002, Vikram Srinivasan, Kee Chaing Chua. Extending the lifetime of wireless sensor networks through mobile relays
1121 -- 1132Gaurav Sharma, Ravi R. Mazumdar. A case for hybrid sensor networks
1133 -- 1146Sundar Subramanian, Sanjay Shakkottai, Ari Arapostathis. Broadcasting in sensor networks: the role of local information
1147 -- 1160Ahmed Bader, Eylem Ekici. Performance optimization of interference-limited multihop networks
1161 -- 1174Aditya Karnik, Aravind Iyer, Catherine Rosenberg. Throughput-optimal configuration of fixed wireless networks
1175 -- 1187Honghai Zhang, Jennifer C. Hou. On the asymptotic minimum transporting energy and its implication on the wireless network capacity
1188 -- 1199Michael J. Neely. Order optimal delay for opportunistic scheduling in multi-user wireless uplinks and downlinks
1200 -- 1211Salah-Eddine Elayoubi, Benoît Fourestié. Performance evaluation of admission control and adaptive modulation in OFDMA WiMax systems
1212 -- 1225Juan José Jaramillo, Fabio Milan, R. Srikant. Padded frames: a novel algorithm for stable scheduling in load-balanced switches
1226 -- 1238Bensong Chen, George N. Rouskas, Rudra Dutta. On hierarchical traffic grooming in WDM networks

Volume 16, Issue 4

749 -- 762Athina Markopoulou, Gianluca Iannaccone, Supratik Bhattacharyya, Chen-Nee Chuah, Yashar Ganjali, Christophe Diot. Characterization of failures in an operational IP backbone network
763 -- 776Min Sik Kim, Taekhyun Kim, YongJune Shin, Simon S. Lam, Edward J. Powers. A wavelet-based approach to detect shared congestion
777 -- 790Tao Ye, Hema Tahilramani Kaur, Shivkumar Kalyanaraman, Murat Yuksel. Large-scale network parameter configuration using an on-line simulation framework
791 -- 802Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly. Impact of denial of service attacks on ad hoc networks
803 -- 813Daniele Micciancio, Saurabh Panjwani. Optimal communication complexity of generic multicast key distribution
814 -- 825Supriya Krishnamurthy, Sameh El-Ansary, Erik Aurell, Seif Haridi. An analytical study of a structured overlay in the presence of dynamic membership
826 -- 839Loc Bui, Atilla Eryilmaz, R. Srikant, Xinzhou Wu. Asynchronous congestion control in multi-hop wireless networks with maximal matching-based scheduling
840 -- 851Rajiv Gandhi, Arunesh Mishra, Srinivasan Parthasarathy 0002. Minimizing broadcast latency and redundancy in ad hoc networks
852 -- 863Vincent Lenders, Martin May, Bernhard Plattner. Density-based anycast: a robust routing strategy for wireless ad hoc networks
864 -- 877Michele Garetto, Theodoros Salonidis, Edward W. Knightly. Modeling per-flow throughput and capturing starvation in CSMA multi-hop wireless networks
878 -- 891Omesh Tickoo, Biplab Sikdar. Modeling queueing and channel access delay in unsaturated IEEE 802.11 random access MAC based wireless networks
892 -- 903Cunqing Hua, Tak-Shing Peter Yum. Optimal routing and data aggregation for maximizing lifetime of wireless sensor networks
904 -- 917Xueyan Tang, Jianliang Xu. Optimizing lifetime for continuous data aggregation with precision guarantees in wireless sensor networks
918 -- 931Rami Langar, Nizar Bouabdallah, Raouf Boutaba. A comprehensive analysis of mobility management in MPLS-based wireless access networks
932 -- 944Yiping Xing, Rajarathnam Chandramouli. Stochastic learning solution for distributed discrete power control game in wireless data networks
945 -- 956Do Young Eun, Xinbing Wang. Achieving 100 throughput in TCP/AQM under aggressive packet marking with small buffer
957 -- 969Stephen L. Spitler, Daniel C. Lee. Integration of explicit effective-bandwidth-based QoS routing with best-effort routing
970 -- 983Andrew Brzezinski, Eytan Modiano. Achieving 100 throughput in reconfigurable optical networks
984 -- 997Karyn Benson, Benjamin Birnbaum, Esteban Molina-Estolano, Ran Libeskind-Hadas. Competitive analysis of online traffic grooming in WDM rings

Volume 16, Issue 3

497 -- 510Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Médard, Jon Crowcroft. XORs in the air: practical wireless network coding
511 -- 524Injong Rhee, Ajit Warrier, Mahesh Aia, Jeongki Min, Mihail L. Sichitiu. Z-MAC: a hybrid MAC for wireless sensor networks
525 -- 538Archan Misra, Abhishek Roy, Sajal K. Das. Information-theory based optimal location management schemes for integrated multi-system wireless networks
539 -- 548Behçet Sarikaya, Xiao Zheng. SIP paging and tracking of wireless LAN hosts for VoIP
549 -- 561Karthik Lakshminarayanan, Daniel Adkins, Adrian Perrig, Ion Stoica. Securing user-controlled routing infrastructures
562 -- 575Seong Soo Kim, A. L. Narasimha Reddy. Statistical techniques for detecting traffic anomalies through packet header data
576 -- 589Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham D. Flaxman. SybilGuard: defending against sybil attacks via social networks
590 -- 602Yung-Ming Li, Yong Tan, Yong-Pin Zhou. Analysis of scale effects in peer-to-peer networks
603 -- 616Laurent Massoulié, Milan Vojnovic. Coupon replication systems
617 -- 627Fabián E. Bustamante, Yi Qiao. Designing less-structured P2P systems for the expected high churn
628 -- 641Xunqi Yu, James W. Modestino, Ragip Kurceren, Yee Sin Chan. A model-based approach to evaluation of the efficacy of FEC coding in combating network packet losses
642 -- 655Weiyi Zhang, Guoliang Xue, Jian Tang, Krishnaiyan Thulasiraman. Faster algorithms for construction of recovery trees enhancing QoP and QoS
656 -- 669Guoliang Xue, Weiyi Zhang, Jian Tang, Krishnaiyan Thulasiraman. Polynomial time approximation algorithms for multi-constrained QoS routing
670 -- 679Jian Chu, Chin-Tau Lea. New architecture and algorithms for fast construction of hose-model VPNs
680 -- 690Chen-Shu Wang, Ching-Ter Chang. Integrated genetic algorithm and goal programming for network topology design problem with multiple objectives and multiple criteria
691 -- 704Reuven Cohen, Gabi Nakibly. On the computational complexity and effectiveness of N-hub shortest-path routing
705 -- 717Sundar Iyer, Ramana Rao Kompella, Nick McKeown. Designing packet buffers for router linecards
718 -- 731Simin He, Shutao Sun, Hong-Tao Guan, Qiang Zheng, Youjian Zhao, Wen Gao. On guaranteed smooth switching for buffered crossbar switches
732 -- 745Xiaohong Jiang, Achille Pattavina, Susumu Horiguchi. Strictly nonblocking f-cast photonic networks

Volume 16, Issue 2

253 -- 266Yuh-Ming Chiu, Do Young Eun. Minimizing file download time in stochastic peer-to-peer networks
267 -- 280Daniel Stutzbach, Reza Rejaie, Subhabrata Sen. Characterizing unstructured overlay topologies in modern P2P file-sharing systems
281 -- 292Kin Wah Kwong, Danny H. K. Tsang. Building heterogeneous peer-to-peer networks: protocol and analysis
293 -- 306Lukas Kencl, Jean-Yves Le Boudec. Adaptive load sharing for network processors
307 -- 320Joel Sommers, Paul Barford, Nick G. Duffield, Amos Ron. A geometric approach to improving active packet loss measurement
321 -- 334Yiwei Thomas Hou, Yi Shi, Hanif D. Sherali. Rate allocation and network lifetime problems for wireless sensor networks
335 -- 346Nima Sarshar, Behnam Attaran Rezaei, Vwani P. Roychowdhury. Low latency wireless ad hoc networking: power and bandwidth challenges and a solution
347 -- 358Honghai Zhang, Jennifer C. Hou. Asymptotic critical total power for k-connectivity of wireless networks
359 -- 370Vehbi C. Gungor, Özgür B. Akan, Ian F. Akyildiz. A real-time and reliable transport (RT) :::2::: protocol for wireless sensor and actor networks
371 -- 382Isabella Cerutti, Andrea Fumagalli, Puja Gupta. Delay models of single-source single-relay cooperative ARQ protocols in slotted radio networks with Poisson frame arrivals
383 -- 395Holger Boche, Martin Schubert. A superlinearly and globally convergent algorithm for power control and resource allocation with general interference functions
396 -- 409Michael J. Neely, Eytan Modiano, Chih-Ping Li. Fairness and optimal stochastic control for heterogeneous networks
410 -- 423Seung Yeob Nam, Sunggon Kim, Dan Keun Sung. Measurement-based admission control at edge routers
424 -- 434Zafar Ali, Waseem Sheikh, Edwin K. P. Chong, Arif Ghafoor. A scalable call admission control algorithm
435 -- 449Minsu Shin, Song Chong, Injong Rhee. Dual-resource TCP/AQM for processing-constrained networks
450 -- 463Christina Fragouli, Jörg Widmer, Jean-Yves Le Boudec. Efficient broadcasting using network coding
464 -- 472Violet R. Syrotiuk, Charles J. Colbourn, Sruthi Yellamraju. Rateless forward error correction for topology-transparent scheduling
473 -- 485Srinivasan Ramasubramanian, Arun K. Somani. MICRON: a framework for connection establishment in optical networks
486 -- 495Dongmei Wang, Guangzhi Li. Efficient distributed bandwidth management for MPLS fast reroute
496 -- 0Aditya Akella, Bruce M. Maggs, Srinivasan Seshan, Anees Shaikh, Ramesh K. Sitaraman. Corrections to on the performance benefits of multihoming route control

Volume 16, Issue 1

1 -- 14Ram Keralapura, Chen-Nee Chuah, Nina Taft, Gianluca Iannaccone. Race conditions in coexisting overlay networks
15 -- 24Michael T. Goodrich. Probabilistic packet marking for large-scale IP traceback
25 -- 36Yuval Shavitt, Tomer Tankel. Hyperbolic embedding of internet graph for distance estimation and overlay construction
37 -- 50Nick G. Duffield, Matthias Grossglauser. Trajectory sampling with unreliable reporting
51 -- 62Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger. An algorithmic approach to geographic routing in ad hoc and sensor networks
63 -- 76Thrasyvoulos Spyropoulos, Konstantinos Psounis, Cauligi S. Raghavendra. Efficient routing in intermittently connected mobile networks: the single-copy case
77 -- 90Thrasyvoulos Spyropoulos, Konstantinos Psounis, Cauligi S. Raghavendra. Efficient routing in intermittently connected mobile networks: the multiple-copy case
91 -- 104Aditya Akella, Bruce M. Maggs, Srinivasan Seshan, Anees Shaikh. On the performance benefits of multihoming route control
105 -- 115Shigang Chen, Meongchul Song, Sartaj Sahni. Two techniques for fast computation of constrained shortest paths
116 -- 129Venugopalan Ramasubramanian, Daniel Mossé. BRA: a bidirectional routing abstraction for asymmetric mobile ad hoc networks
130 -- 143Xiliang Liu, Kaliappa Nadar Ravindran, Dmitri Loguinov. A stochastic foundation of available bandwidth estimation: multi-hop analysis
144 -- 156Maulin Patel, Ramaswamy Chandrasekaran, Subbarayan Venkatesan. Improved quasi-path restoration in mesh networks
157 -- 169Srinivasan Ramasubramanian, Amit Chandak. Dual-link failure resiliency through backup link mutual exclusion
170 -- 181Aleksandra Smiljanic. Rate and delay guarantees provided by Clos packet switches with load balancing
182 -- 195Ilias Iliadis, Cyriel Minkenberg. Performance of a speculative transmission scheme for scheduling-latency reduction
196 -- 205Rene L. Cruz, Saleh Al-Harthi. A service-curve framework for packet scheduling with switch configuration delays
206 -- 217Saad Mneimneh. Matching from the first iteration: an iterative switching algorithm for an input queued switch
218 -- 231Adam Kirsch, Michael Mitzenmacher. Simple summaries for hashing with choices
232 -- 243Xin Wang, Henning Schulzrinne, Dilip D. Kandlur, Dinesh C. Verma. Measurement and analysis of LDAP performance
244 -- 245William Lau, Gustav Rosenbaum, Sanjay Jha. Comments on Dynamic routing of restorable bandwidth-guaranteed tunnels using aggregated network resource usage information