Journal: IEEE/ACM Trans. Netw.

Volume 23, Issue 6

1705 -- 1718Feng Yan, Anaïs Vergne, Philippe Martins, Laurent Decreusefond. Homology-Based Distributed Coverage Hole Detection in Wireless Sensor Networks
1719 -- 1728János Tapolcai, Pin-Han Ho, Péter Babarczi, Lajos Rónyai. Neighborhood Failure Localization in All-Optical Networks via Monitoring Trails
1729 -- 1741Sharon Goldberg, David Xiao, Eran Tromer, Boaz Barak, Jennifer Rexford. Path-Quality Monitoring in the Presence of Adversaries: The Secure Sketch Protocols
1742 -- 1754Hongyu Zhou, Su-Xia, Miao Jin, Hongyi Wu. Localized and Precise Boundary Detection in 3-D Wireless Sensor Networks
1755 -- 1764Matthew Andrews, Spyridon Antonakopoulos, Lisa Zhang. Rate-Adaptive Scheduling Policies for Network Stability and Energy Efficiency
1765 -- 1776Reuven Cohen, Guy Grebla. Multidimensional OFDMA Scheduling in a Wireless Network With Relay Nodes
1777 -- 1789Hiroshi Saito. Analysis of Geometric Disaster Evaluation Model for Physical Networks
1790 -- 1804Honggang Zhang, Sudarshan Vasudevan, Ran Li, Don Towsley. Coalitions Improve Performance in Data Swarming Systems
1805 -- 1817Jianhang Gao, Qing Zhao, Wei Ren, Ananthram Swami, Ram Ramanathan, Amotz Bar-Noy. Dynamic Shortest Path Algorithms for Hypergraphs
1818 -- 1831Youngmi Jin, George Kesidis, Jinwoo Shin, Fatih Kocak, Yung Yi. Impacts of Selfish Behaviors on the Scalability of Hybrid Client-Server and Peer-to-Peer Caching Systems
1832 -- 1845János Tapolcai, József Bíró, Péter Babarczi, András Gulyás, Zalán Heszberger, Dirk Trossen. Optimal False-Positive-Free Bloom Filter Design for Scalable Multicast Forwarding
1846 -- 1861Delia Ciullo, Valentina Martina, Michele Garetto, Emilio Leonardi. How Much Can Large-Scale Video-on-Demand Benefit From Users' Cooperation?
1862 -- 1875Nithin Michael, Ao Tang. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
1876 -- 1889Yu-Pin Hsu, Navid Abedini, Natarajan Gautam, Alex Sprintson, Srinivas Shakkottai. Opportunities for Network Coding: To Wait or Not to Wait
1890 -- 1902Zheng Dong, Son Hoang Dau, Chau Yuen, Yu Gu 0001, Xiumin Wang. Delay Minimization for Relay-Based Cooperative Data Exchange With Network Coding
1903 -- 1916Norbert Radics, Lajos Bajzik, Zsolt Lakatos. Survivable Mapping of Virtual Topologies for Double-Node Failure
1917 -- 1930John Tadrous, Atilla Eryilmaz, Hesham El Gamal. Proactive Content Download and User Demand Shaping for Data Networks
1931 -- 1943Alexandre Fréchette, F. Bruce Shepherd, Marina K. Thottan, Peter J. Winzer. Shortest Path Versus Multihub Routing in Networks With Uncertain Demand
1944 -- 1958Mario A. Sánchez, John S. Otto, Zachary S. Bischof, David R. Choffnes, Fabian E. Bustamante, Balachander Krishnamurthy, Walter Willinger. A Measurement Experimentation Platform at the Internet's Edge
1959 -- 1969Junjie Zhang, Kang Xi, H. Jonathan Chao. Load Balancing in IP Networks Using Generalized Destination-Based Multipath Routing
1970 -- 1983Shuai Wang, Song Min Kim, Yunhuai Liu, Guang Tan, Tian He. CorLayer: A Transparent Link Correlation Layer for Energy-Efficient Broadcast
1984 -- 1997Vijay Kumar Adhikari, Yang Guo, Fang Hao, Volker Hilt, Zhi-Li Zhang, Matteo Varvello, Moritz Steiner. Measurement Study of Netflix, Hulu, and a Tale of Three CDNs
1998 -- 2009Amir Nahir, Ariel Orda, Danny Raz. Workload Factoring: A Game-Theoretic Perspective
2010 -- 2023Jeffrey Erman, Vijay Gopalakrishnan, Rittwik Jana, Kadangode K. Ramakrishnan. Towards a SPDY'ier Mobile Web?

Volume 23, Issue 5

1373 -- 1386Francois Clad, Stefano Vissicchio, Pascal Mérindol, Pierre François, Jean-Jacques Pansiot. Computing Minimal Update Sequences for Graceful Router-Wide Reconfigurations
1387 -- 1400Anne Bouillard, Giovanni Stea. Exact Worst-Case Delay in FIFO-Multiplexing Feed-Forward Networks
1401 -- 1415Sk. Kajal Arefin Imon, Adnan Khan, Mario Di Francesco, Sajal K. Das. Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree-Based Wireless Sensor Networks
1416 -- 1429Yi-Sheng Su. Topology-Transparent Scheduling via the Chinese Remainder Theorem
1430 -- 1443Lei Yang, Yalin Evren Sagduyu, Junshan Zhang, Jason H. Li. Deadline-Aware Scheduling With Adaptive Network Coding for Real-Time Traffic
1444 -- 1456Barlas Oguz, Venkat Anantharam, Ilkka Norros. Stable Distributed P2P Protocols Based on Random Peer Sampling
1457 -- 1470Yunus Sarikaya, Özgür Erçetin, Can Emre Koksal. Confidentiality-Preserving Control of Uplink Cellular Wireless Networks Using Hybrid ARQ
1471 -- 1484Xu Chen, Brian Proulx, Xiaowen Gong, Junshan Zhang. Exploiting Social Ties for Cooperative D2D Communications: A Mobile Social Networking Case
1485 -- 1500Mina Yazdanpanah, Chadi Assi, Samir Sebbah, Yousef R. Shayan. Does Network Coding Combined With Interference Cancellation Bring Any Gain to a Wireless Network?
1501 -- 1513Sergi Abadal, Mario Iannazzo, Mario Nemirovsky, Albert Cabellos-Aparicio, Heekwan Lee, Eduard Alarcón. On the Area and Energy Scalability of Wireless Network-on-Chip: A Model-Based Benchmarked Design Space Exploration
1514 -- 1527Chenxi Qiu, Haiying Shen, Sohraab Soltani, Karan Sapra, Hao Jiang, Jason O. Hallstrom. CEDAR: A Low-Latency and Distributed Strategy for Packet Recovery in Wireless Networks
1528 -- 1541Ioannis Ch. Paschalidis, Fuzhuo Huang, Wei Lai. A Message-Passing Algorithm for Wireless Network Scheduling
1542 -- 1552Bin Li, Ruogu Li, Atilla Eryilmaz. Throughput-Optimal Scheduling Design With Regular Service Guarantees in Wireless Networks
1553 -- 1567Sameh Sorour, Shahrokh Valaee. Completion Delay Minimization for Instantly Decodable Network Codes
1568 -- 1583Timothy Wood, K. K. Ramakrishnan, Prashant J. Shenoy, Jacobus E. van der Merwe, Jinho Hwang, Guyue Liu, Lucas Chaufournier. CloudNet: Dynamic Pooling of Cloud Resources by Live WAN Migration of Virtual Machines
1584 -- 1598Sharayu Moharir, Sanjay Shakkottai. MaxWeight Versus BackPressure: Routing and Scheduling in Multichannel Relay Networks
1599 -- 1609Ferhat Dikbiyik, Massimo Tornatore, Biswanath Mukherjee. Exploiting Excess Capacity, Part II: Differentiated Services Under Traffic Growth
1610 -- 1618András Gulyás, Gábor Rétvári, Zalán Heszberger, Rachit Agarwal. On the Scalability of Routing With Policies
1619 -- 1633Enrique Mallada, Xiaoqiao Meng, Michel Hack, Li Zhang 0002, Ao Tang. Skewless Network Clock Synchronization Without Discontinuity: Convergence and Performance
1634 -- 1647George Iosifidis, Lin Gao, Jianwei Huang, Leandros Tassiulas. A Double-Auction Mechanism for Mobile Data-Offloading Markets
1648 -- 1660Dan Li, Jing Zhu, Jianping Wu, Junjie Guan, Ying Zhang. Guaranteeing Heterogeneous Bandwidth Demand in Multitenant Data Center Networks
1661 -- 1673Wei Du, Yongjun Liao, Narisu Tao, Pierre Geurts, Xiaoming Fu, Guy Leduc. Rating Network Paths for Locality-Aware Overlay Construction and Routing
1674 -- 1687Virag Shah, Gustavo de Veciana. High-Performance Centralized Content Delivery Infrastructure: Models and Asymptotics
1688 -- 1701Tao Shu, Yingying Chen, Jie Yang 0003. Protecting Multi-Lateral Localization Privacy in Pervasive Environments
1702 -- 1703Dahai Xu, Mung Chiang, Jennifer Rexford. Corrections to "Link-State Routing With Hop-By-Hop Forwarding Can Achieve Optimal Traffic Engineering"

Volume 23, Issue 4

1029 -- 1040Mohammad Ali Maddah-Ali, Urs Niesen. Decentralized Coded Caching Attains Order-Optimal Memory-Rate Tradeoff
1041 -- 1052Kai Han, Jun Luo, Liu Xiang, Mingjun Xiao, Liusheng Huang. Achieving Energy Efficiency and Reliability for Data Dissemination in Duty-Cycled WSNs
1053 -- 1066Qingkai Liang, Xinbing Wang, Xiaohua Tian, Fan Wu, Qian Zhang. Two-Dimensional Route Switching in Cognitive Radio Networks: A Game-Theoretical Framework
1067 -- 1077Ali Khanafer, Murali S. Kodialam, Krishna P. N. Puttaswamy. To Rent or to Buy in the Presence of Statistical Information: The Constrained Ski-Rental Problem
1078 -- 1091Majid Khabbazian, Stephane Durocher, Alireza Haghnegahdar, Fabian Kuhn. Bounding Interference in Wireless Ad Hoc Networks With Nodes in Random Position
1092 -- 1106Marcello Caleffi, Ian F. Akyildiz, Luigi Paura. On the Solution of the Steiner Tree NP-Hard Problem via Physarum BioNetwork
1107 -- 1120Joerg Widmer, Andrea Capalbo, Antonio Fernández Anta, Albert Banchs. Efficient Interlayer Network Codes for Fair Layered Multicast Streaming
1121 -- 1134Giuseppe Enrico Santagati, Tommaso Melodia, Laura Galluccio, Sergio Palazzo. Medium Access Control and Rate Adaptation for Ultrasonic Intrabody Sensor Networks
1135 -- 1148Yu-Sian Li, Trang Cao Minh, Shu-Ting Wang, Xin Huang, Cheng-Hsin Hsu, Po-Ching Lin. A Resource-Constrained Asymmetric Redundancy Elimination Algorithm
1149 -- 1162Yang Yang, Miao Jin, Yao Zhao, Hongyi Wu. Distributed Information Storage and Retrieval in 3-D Sensor Networks With General Topologies
1163 -- 1175Yipeng Zhou, Tom Z. J. Fu, Dah-Ming Chiu. A Unifying Model and Analysis of P2P VoD Replication and Scheduling
1176 -- 1189Jianhang Gao, Qing Zhao, Ananthram Swami. The Thinnest Path Problem
1190 -- 1201Hazem Gomaa, Geoffrey G. Messier, Robert J. Davies. Hierarchical Cache Performance Analysis Under TTL-Based Consistency
1202 -- 1215Andres Garcia-Saavedra, Balaji Rengarajan, Pablo Serrano, Daniel Camps-Mur, Xavier Costa-Pérez. SOLOR: Self-Optimizing WLANs With Legacy-Compatible Opportunistic Relays
1216 -- 1228Matthew Johnston, Hyang-Won Lee, Eytan Modiano. A Robust Optimization Approach to Backup Network Design With Random Failures
1229 -- 1242Spyridon Antonakopoulos, Yigal Bejerano, Pramod V. Koppol. Full Protection Made Easy: The DisPath IP Fast Reroute Scheme
1243 -- 1256Pablo Serrano, Andres Garcia-Saavedra, Giuseppe Bianchi, Albert Banchs, Arturo Azcorra. Per-Frame Energy Consumption in 802.11 Devices and Its Implication on Modeling and Design
1257 -- 1270Jun Zhang 0010, Xiao Chen, Yang Xiang, Wanlei Zhou, Jie Wu. Robust Network Traffic Classification
1271 -- 1285Fan Wu, Qianyi Huang, Yixin Tao, Guihai Chen. Towards Privacy Preservation in Strategy-Proof Spectrum Auction Mechanisms for Noncooperative Wireless Networks
1286 -- 1299Hisham M. Almasaeid, Ahmed E. Kamal. Receiver-Based Channel Allocation in Cognitive Radio Wireless Mesh Networks
1300 -- 1313Matteo Dell'Amico, Maurizio Filippone, Pietro Michiardi, Yves Roudier. On User Availability Prediction and Network Applications
1314 -- 1327Enrico Gregori, Alessandro Improta, Luciano Lenzini, Lorenzo Rossi, Luca Sani. A Novel Methodology to Address the Internet AS-Level Data Incompleteness
1328 -- 1341Chao Yang, Scott Jordan. A Novel Coordinated Connection Access Control and Resource Allocation Framework for 4G Wireless Networks
1342 -- 1355Yu Cheng, Hongkun Li, Devu Manikantan Shila, Xianghui Cao. A Systematic Study of Maximal Scheduling Algorithms in Multiradio Multichannel Wireless Networks
1356 -- 1366Yuanqing Zheng, Mo Li. P-MTI: Physical-Layer Missing Tag Identification via Compressive Sensing
1367 -- 1369Fan Zhang, Yewen Cao, Deqiang Wang. A Note on "Low-Complexity Distributed Scheduling Algorithms for Wireless Networks"

Volume 23, Issue 3

689 -- 702Yu Wu, Chuan Wu, Bo Li, Linquan Zhang, Zongpeng Li, Francis C. M. Lau. Scaling Social Media Applications Into Geo-Distributed Clouds
703 -- 716Ori Rottenstreich, Isaac Keslassy. The Bloom Paradox: When Not to Use a Bloom Filter
717 -- 727Christoph Lenzen, Philipp Sommer, Roger Wattenhofer. PulseSync: An Efficient and Scalable Clock Synchronization Protocol
728 -- 740I.-Hong Hou. Broadcasting Delay-Constrained Traffic Over Unreliable Wireless Links With Network Coding
741 -- 754Stefano Traverso, Luca Abeni, Robert Birke, Csaba Király, Emilio Leonardi, Renato Lo Cigno, Marco Mellia. Neighborhood Filtering Strategies for Overlay Construction in P2P-TV Systems: Design and Experimental Comparison
755 -- 767Zhongmei Yao, Daren B. H. Cline, Dmitri Loguinov. Unstructured P2P Link Lifetimes Redux
768 -- 781Zizhan Zheng, Zhixue Lu, Prasun Sinha, Santosh Kumar. Ensuring Predictable Contact Opportunity for Scalable Vehicular Internet Access on the Go
782 -- 795Jihwan Kim, Hyang-Won Lee, Song Chong. CSMA-Based Robust AP Throughput Guarantee Under User Distribution Uncertainty
796 -- 809Muhammad Shahzad, Alex X. Liu. Probabilistic Optimal Tree Hopping for RFID Identification
810 -- 823Yanjun Yao, Qing Cao, Athanasios V. Vasilakos. EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-Balancing Data Collection Protocol for Heterogeneous Wireless Sensor Networks
824 -- 835Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng. Practical Conflict Graphs in the Wild
836 -- 850George Athanasiou, Pradeep Chathuranga Weeraddana, Carlo Fischione, Leandros Tassiulas. Optimizing Client Association for Load Balancing and Fairness in Millimeter-Wave Wireless Networks
851 -- 865Corentin Briat, Emre Altug Yavuz, Håkan Hjalmarsson, Karl Henrik Johansson, Ulf T. Jönsson, Gunnar Karlsson, Henrik Sandberg. The Conservation of Information, Towards an Axiomatized Modular Modeling Approach to Congestion Control
866 -- 879Maricica Nistor, Daniel E. Lucani, João Barros. Hardware Abstraction and Protocol Optimization for Coded Sensor Networks
880 -- 893Bo Ji, Gagan Raj Gupta, Manu Sharma, Xiaojun Lin, Ness B. Shroff. Achieving Optimal Throughput and Near-Optimal Asymptotic Delay Performance in Multichannel Wireless Networks With Low Complexity: A Practical Greedy Scheduling Policy
894 -- 907Hu Jin, Bang Chul Jung, Victor C. M. Leung. Fundamental Limits of CDF-Based Scheduling: Throughput, Fairness, and Feedback Overhead
908 -- 921Stojan Trajanovski, Fernando A. Kuipers, Aleksandar Ilic, Jon Crowcroft, Piet Van Mieghem. Finding Critical Regions and Region-Disjoint Paths in a Network
922 -- 930Zhichao Cao, Yuan He, Qiang Ma, Yunhao Liu. 2: Lazy Forwarding in Low-Duty-Cycle Wireless Sensor Network
931 -- 945Leonidas Georgiadis, Georgios S. Paschos, Lavy Libman, Leandros Tassiulas. Minimal Evacuation Times and Stability
946 -- 958Fei Chen, Bruhadeshwar Bezawada, Alex X. Liu. Privacy-Preserving Quantification of Cross-Domain Network Reachability
959 -- 972Yunbae Kim, Ganguk Hwang. Design and Analysis of Medium Access Protocol: Throughput and Short-Term Fairness Perspective
973 -- 986Kianoosh Mokhtarian, Hans-Arno Jacobsen. Minimum-Delay Multicast Algorithms for Mesh Overlays
987 -- 1000Haiying Shen, Yuhua Lin, Jin Li 0001. A Social-Network-Aided Efficient Peer-to-Peer Live Streaming System
1001 -- 1011Thang N. Dinh, My T. Thai. Network Under Joint Node and Link Attacks: Vulnerability Assessment Methods and Analysis
1012 -- 1025Abdallah Jarray, Ahmed Karmouch. Decomposition Approaches for Virtual Network Embedding With One-Shot Node and Link Mapping

Volume 23, Issue 2

341 -- 354Alberto Dainotti, Alistair King, Kimberly C. Claffy, Ferdinando Papale, Antonio Pescapè. Analysis of a "/0" Stealth Scan From a Botnet
355 -- 368Carlee Joe-Wong, Soumya Sen, Sangtae Ha. Offering Supplementary Network Technologies: Adoption Behavior and Offloading Benefits
369 -- 382Lieven Tytgat, Opher Yaron, Sofie Pollin, Ingrid Moerman, Piet Demeester. Analysis and Experimental Verification of Frequency-Based Interference Avoidance Mechanisms in IEEE 802.15.4
383 -- 397Mukundan Madhavan, Harish Ganapathy, Malolan Chetlur, Shivkumar Kalyanaraman. Adapting Cellular Networks to Whitespaces Spectrum
398 -- 411Supratim Deb, Pantelis Monogioudis. Learning-Based Uplink Interference Management in 4G LTE Cellular Systems
412 -- 425George Papageorgiou, Shailendra Singh, Srikanth V. Krishnamurthy, Ramesh Govindan, Tom La Porta. A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks
426 -- 436Reuven Cohen, Guy Grebla. Efficient Allocation of Periodic Feedback Channels in Broadband Wireless Networks
437 -- 450Liguang Xie, Yi Shi, Yiwei Thomas Hou, Wenjing Lou, Hanif D. Sherali, Scott F. Midkiff. Multi-Node Wireless Energy Charging in Sensor Networks
451 -- 464Chih-Chuan Cheng, Pi-Cheng Hsiu. Extend Your Journey: Considering Signal Strength and Fluctuation in Location-Based Applications
465 -- 478Yong Cui, Lian Wang, Xin Wang, Hongyi Wang, Yining Wang. FMTCP: A Fountain Code-Based Multipath Transmission Control Protocol
479 -- 490Sanaz Barghi, Hamid Jafarkhani. Exploiting Asynchronous Amplify-and-Forward Relays to Enhance the Performance of IEEE 802.11 Networks
491 -- 504Tong Ye, Tony T. Lee, Weisheng Hu. AWG-Based Non-Blocking Clos Networks
505 -- 518Po-Kai Huang, Xiaojun Lin. Achieving Optimal Throughput Utility and Low Delay With CSMA-Like Algorithms: A Virtual Multichannel Approach
519 -- 532Dongyue Xue, Robert Murawski, Eylem Ekici. Capacity Achieving Distributed Scheduling With Finite Buffers
533 -- 546Tung-Wei Kuo, Kate Ching-Ju Lin, Ming-Jer Tsai. Maximizing Submodular Set Function With Connectivity Constraint: Theory and Application to Networks
547 -- 558Lorenzo Rossi, Jacob Chakareski, Pascal Frossard, Stefania Colonnese. A Poisson Hidden Markov Model for Multiview Video Traffic
559 -- 573Armin Banaei, Daren B. H. Cline, Costas N. Georghiades, Shuguang Cui. On Asymptotic Statistics for Geometric Routing Schemes in Wireless Ad Hoc Networks
574 -- 586Sucha Supittayapornpong, Michael J. Neely. Quality of Information Maximization for Wireless Networks via a Fully Separable Quadratic Policy
587 -- 602Andreea Picu, Thrasyvoulos Spyropoulos. DTN-Meteo: Forecasting the Performance of DTN Protocols Under Heterogeneous Mobility
603 -- 615Zhenyu Wu, Zhang Xu, Haining Wang. Whispers in the Hyper-Space: High-Bandwidth and Reliable Covert Channel Attacks Inside the Cloud
616 -- 630Chih-Ping Li, Eytan Modiano. Receiver-Based Flow Control for Networks in Overload
631 -- 643Bin Li, Ruogu Li, Atilla Eryilmaz. On the Optimal Convergence Speed of Wireless Scheduling for Fair Resource Allocation
644 -- 656Qiang Liu, Xin Wang, Nageswara S. V. Rao. Fusion of State Estimates Over Long-Haul Sensor Networks With Random Loss and Delay
657 -- 671Zhenhua Liu, Minghong Lin, Adam Wierman, Steven H. Low, Lachlan L. H. Andrew. Greening Geographical Load Balancing
672 -- 686Daniele Riboni, Antonio Villani, Domenico Vitali, Claudio Bettini, Luigi V. Mancini. Obfuscation of Sensitive Data for Incremental Release of Network Flows

Volume 23, Issue 1

1 -- 14Wanchun Jiang, Fengyuan Ren, Chuang Lin. Phase Plane Analysis of Quantized Congestion Notification for Data Center Ethernet
15 -- 27Hongbo Jiang, Tianlong Yu, Chen Tian, Guang Tan, Chonggang Wang. Connectivity-Based Segmentation in Large-Scale 2-D/3-D Sensor Networks: Algorithm and Applications
28 -- 41Cataldo Basile, Antonio Lioy. Analysis of Application-Layer Filtering Policies With Application to HTTP
42 -- 55Marco Leogrande, Fulvio Risso, Luigi Ciminiera. Modeling Complex Packet Filters With Finite State Automata
56 -- 69Alberto Rabbachin, Andrea Conti, Moe Z. Win. Wireless Network Intrinsic Secrecy
70 -- 84Haiying Shen, Ze Li. A Hierarchical Account-Aided Reputation Management System for MANETs
85 -- 98Richard T. B. Ma, John C. S. Lui, Vishal Misra. Evolution of the Internet Economic Ecosystem
99 -- 113Guner D. Celik, Eytan Modiano. Scheduling in Networks With Time-Varying Channels and Reconfiguration Delay
114 -- 125Reuven Cohen, Guy Grebla. Joint Scheduling and Fast Cell Selection in OFDMA Wireless Networks
126 -- 137Yang Yang, Ness B. Shroff. Throughput of Rateless Codes Over Broadcast Erasure Channels
138 -- 147Gabi Nakibly, Reuven Cohen, Liran Katzir 0001. Optimizing Data Plane Resources for Multipath Flows
148 -- 160Alessandro Checco, Douglas J. Leith. Fair Virtualization of 802.11 Networks
161 -- 174Fabio Martignon, Stefano Paris, Ilario Filippini, Lin Chen, Antonio Capone. Efficient and Truthful Bandwidth Allocation in Wireless Mesh Community Networks
175 -- 185Bahar Partov, Douglas J. Leith, Rouzbeh Razavi. Utility Fair Optimization of Antenna Tilt Angles in LTE Networks
186 -- 197Jiliang Wang, Wei Dong, Zhichao Cao, Yunhao Liu. On the Delay Performance in a Large-Scale Wireless Sensor Network: Measurement, Analysis, and Implications
198 -- 211Fragkiskos Papadopoulos, Constantinos Psomas, Dmitri V. Krioukov. Network Mapping by Replaying Hyperbolic Growth
212 -- 226Kang Chen, Haiying Shen. DTN-FLOW: Inter-Landmark Data Flow for High-Throughput Routing in DTNs
227 -- 240Stefano Vissicchio, Luca Cittadini, Giuseppe Di Battista. On iBGP Routing Policies
241 -- 254Muhammad Shahzad, Alex X. Liu. Fast and Accurate Estimation of RFID Tags
255 -- 268Yuan-Cheng Lai, Ling-Yen Hsiao, Bor-shen Lin. Optimal Slot Assignment for Binary Tracking Tree Protocol in RFID Tag Identification
269 -- 281Premkumar Karumbu, Xiaomin Chen, Douglas J. Leith. Proportional Fair Coding for Wireless Mesh Networks
282 -- 299Brighten Godfrey, Matthew Caesar, Ian Haken, Yaron Singer, Scott Shenker, Ion Stoica. Stabilizing Route Selection in BGP
300 -- 316Xinghua Sun, Lin Dai. Backoff Design for IEEE 802.11 DCF Networks: Fundamental Tradeoff and Design Criterion
317 -- 328Didem Gözüpek, Mordechai Shalom, Fatih Alagöz. A Graph-Theoretic Approach to Scheduling in Cognitive Radio Networks