Abstract is missing.
- A network-assisted system for energy efficiency in mobile devicesJoshua Hare, Dheeraj Agrawal, Arunesh Mishra, Suman Banerjee, Aditya Akella. 1-10 [doi]
- Exploring system parameters for viability of energy harvesting technologiesTamma V. Prabhakar, Prakruthi Keshavamurthy, Shruti Devasenapathy, H. S. Jamadagni, R. Venkatesha Prasad, Ignas G. Niemegeers. 1-6 [doi]
- Point-to-point scheduling over a wireless channel with costly channel state informationNitin Dileep Salodkar, Aditya Karnik. 1-6 [doi]
- Three metrics for stochastic networks: Capacity, queue-size and complexityDevavrat Shah. 1-4 [doi]
- Alpha-beta filter based target tracking in clustered wireless sensor networksSurendra Sharma, Sarang Deshpande, Krishna M. Sivalingam. 1-4 [doi]
- k-dense communities in the internet AS-level topologyEnrico Gregori, Luciano Lenzini, Chiara Orsini. 1-10 [doi]
- Interference planning for multicell OFDM downlinkNidhin K. Vaidhiyan, Renu Subramanian, Rajesh Sundaresan. 1-10 [doi]
- Scalability of a distributed virtual environment based on a structured peer-to-peer architectureJiehua Chen, Sven Grottke, Jan Sablatnig, Ruedi Seiler, Adam Wolisz. 1-8 [doi]
- A system approach to network modeling for DDoS detection using a Naìve Bayesian classifierRajagopalan Vijayasarathy, Serugudi Venkataraman Raghavan, B. Ravindran. 1-10 [doi]
- A modified SPIN for wireless sensor networksZeenat Rehena, Sarbani Roy, Nandini Mukherjee. 1-4 [doi]
- Optimizing power consumption of always-on applications based on timer alignmentVille Könönen, Pekka Pääkkönen. 1-8 [doi]
- The Dataware manifestoDerek McAuley, Richard Mortier, James Goulding. 1-6 [doi]
- Reaching approximate Wardrop equilibrium at reduced costs of link state updatesYong Oh Lee, Balaji Rengarajany, A. L. Narasimha Reddy. 1-10 [doi]
- Designing WANem : A Wide Area Network emulator toolHemanta Kumar Kalita, Manoj K. Nambiar. 1-4 [doi]
- Confidential Program update with dynamic key computation for clustered wireless sensor networksM. B. Nirmala, A. S. Manjunath. 1-8 [doi]
- Voice messaging for mobile delay-tolerant networksMd. Tarikul Islam, Anssi Turkulainen, Joerg Ott. 1-11 [doi]
- A threat taxonomy for mHealth privacyDavid Kotz. 1-6 [doi]
- The local and global effects of traffic shaping in the internetMassimiliano Marcon, Marcel Dischinger, P. Krishna Gummadi, Amin Vahdat. 1-10 [doi]
- Loss behavior analysis and its application in design of link quality metricsKameswari Chebrolu, Advait Mishra. 1-10 [doi]
- Efficient target tracking through binary-detection in sparsely deployed WSNDeepak Jeswani, Ankit Kesharwani, Sneha S. Chaudhari, Vaishali P. Sadaphal, Ratan K. Ghosh. 1-10 [doi]
- Vis-à-Vis: Privacy-preserving online social networking via Virtual Individual ServersAmre Shakimov, Harold Lim, Ramón Cáceres, Landon P. Cox, Kevin A. Li, Dongtao Liu, Alexander Varshavsky. 1-10 [doi]
- Study of combined effects of zero copy and pre-processing on Input/Output performance of multimedia on demand streaming serverVivek K. Singh, Suhas Hegde Ankadi, Debabrata Das. 1-4 [doi]
- An Empirical study of clock skew behavior in modern mobile and hand-held devicesSwati Sharma, Huzur Saran, Sorav Bansal. 1-4 [doi]
- MESA: Farsighted flow management for video delivery in broadband wireless networksRajesh Mahindra, Ravi Kokku, Honghai Zhang, Sampath Rangarajan. 1-10 [doi]
- Splitting HTTP requests on two serversBharat S. Rawal, Ramesh K. Karne, Alexander L. Wijesinha. 1-8 [doi]
- Defeating the insider threat via autonomic network capabilitiesFaisal M. Sibai, Daniel A. Menascé. 1-10 [doi]
- Multimedia communication in cognitive radio networks based on sample division multiplexingAnsuman Bhattacharya, Rabindranath Ghosh, Koushik Sinha, Bhabani P. Sinha. 1-8 [doi]
- Security and privacy of future aircraft wireless communications with offboard systemsKrishna Sampigethaya, Radha Poovendran. 1-6 [doi]
- Genetic Algorithm techniques to solve Routing and Wavelength Assignment problem in Wavelength Division Multiplexing all-optical networksRavi Sankar Barpanda, Ashok Kumar Turuk, Bibhudatta Sahoo, Banshidhar Majhi. 1-8 [doi]
- A new code allocation algorithm for multirate CI/MC-CDMA systemMithun Mukherjee, Preetam Kumar. 1-6 [doi]
- Study of enhanced VoIP performance under congested wireless network scenariosAtri Mukhopadhyay, Tamal Chakraborty, Suman Bhunia, Iti Saha Misra, Salil Kumar Sanyal. 1-7 [doi]
- Error-resilient image transmission over multihop wireless networksPradipta De, Nilanjan Banerjee, Swades De. 1-10 [doi]
- An electronic travel aid for navigation of visually impaired personsAmit Kumar, Rusha Patra, M. Manjunatha, Jayanta Mukhopadhyay, Arun K. Majumdar. 1-5 [doi]
- CPS-Net: In-network aggregation for synchrophasor applicationsVijay Arya, Jagabondhu Hazra, P. Kodeswaran, Deva P. Seetharam, N. Banerjee, Shivkumar Kalyanaraman. 1-8 [doi]
- Downlink transmission mode selection and switching algorithm for LTEShubhodeep Adhikari. 1-10 [doi]
- Augmenting topic models with user relations in context based communication servicesVikranth T. Babu, Krishna Kishore Dhara, Venkatesh Krishnaswamy. 1-10 [doi]
- Modelling and analysis of network resilienceJames P. G. Sterbenz, Egemen K. Çetinkaya, Mahmood A. Hameed, Abdul Jabbar, Justin P. Rohrer. 1-10 [doi]
- A distributed scheduler for airborne backbone networks with directional antennasWilliam Huba, Nicholas Martin, Yamin Al-Mousa, Chukwuchebem Orakwue, Nirmala Shenoy. 1-4 [doi]
- Planning rules for split ratio selection in building GPON-based access networksHamada Alshaer, Mohamed Alyafei. 1-10 [doi]
- Separating event points by Binary Proximity Sensors: An asymptotic analysisB. Santhana Krishnan. 1-8 [doi]
- Hulu in the neighborhoodDongsu Han, David G. Andersen, Michael Kaminsky, Konstantina Papagiannaki, Srinivasan Seshan. 1-10 [doi]
- Distributed detection with censoring of sensors in Rayleigh faded channelChinmoy Kundu, Sumit Kundu, GianLuigi Ferrari, Riccardo Raheli. 1-4 [doi]
- On the game server network selection with delay and delay variation constraintsYuh-Rong Chen, Sridhar Radhakrishnan, Sudarshan K. Dhall, Suleyman Karabuk. 1-10 [doi]
- An efficient on-demand routing protocol for MANETs using Bayesian approachRusheel Jain, Murali Parameswaran, Chittaranjan Hota. 1-4 [doi]
- Data hiding scheme for medical images using lossless code for mobile HIMSV. Naveen Kumar, Mrigank Rochan, Santosh Hariharan, Kumar Rajamani. 1-4 [doi]
- Minimizing content provisioning cost in heterogeneous Social Wireless NetworksMahmoud Taghizadeh, Subir Biswas. 1-10 [doi]
- Energy-efficient transmission of DWT image over OFDM fading channelA. Sharma, S. De, H. M. Gupta. 1-7 [doi]
- SRLG identification from time series analysis of link state dataGoutam Das, Dimitri Papadimitriou, Bart Puype, Didier Colle, Mario Pickavet, Piet Demeester. 1-10 [doi]
- Application architecture considerations for cloud platformsBalwinder Sodhi, T. V. Prabhakar. 1-4 [doi]
- Multi-state power management of communication linksKrishna Kant. 1-10 [doi]
- Optimal contention-free multiplexing for wireless accessG. R. Dattatreya, Ajay A. Kulkarni. 1-6 [doi]
- HySecNJoining: A hybrid secure node joining algorithm for wireless sensor networkHemanta Kumar Kalita, Abhijit Kar. 1-6 [doi]
- FREEZE: Rate adaptation in wireless LANs using channel contention estimatesAjay A. Kulkarni, S. Menezes, R. Prakash. 1-6 [doi]
- Models of 802.11 multi-hop networks: Theoretical insights and experimental validationAdel Aziz, Mathilde Durvy, Olivier Dousse, Patrick Thiran. 1-10 [doi]
- Guiding P2P control traffic using DHTSJaroslaw Adam Gralak, Adam Wierzbicki. 1-6 [doi]
- Group key management scheme for simultaneous multiple groups with overlapped membershipB. R. Purushothama, Bharat Amberker. 1-10 [doi]
- Service-level control and management for future network applicationsK. Ravindran, S. Mukhopadhyay. 1-7 [doi]
- An instantaneous call admission control using information dissemination for WiMAX mesh networksR. Saravana Manickam, C. Siva Ram Murthy. 1-8 [doi]
- Processing interference at the physical layer to enhance information flow in wireless networksBama Muthuramalingam, Srikrishna Bhashyam, Andrew Thangaraj. 1-6 [doi]
- Message efficient leader finding algorithm for mobile ad hoc networksA. K. Singh, S. Sharma. 1-6 [doi]
- Modification of superframe structure of 802.15.4 MAC for body area networksPradnya H. Ghare, A. G. Kothari, Avinash G. Keskar. 1-4 [doi]
- Distributed fault tolerance for WSNs with routing tree overlaysShanti Chilukuri, Anirudha Sahoo. 1-4 [doi]
- Joint optimization of 2-tier dual-homing for NodeBs and RNCs in UMTS networks using meta-heuristic techniquesSamir K. Sadhukhan, Swarup Mandal, S. Shaw, Debashis Saha. 1-8 [doi]
- Sequencegram: n-gram modeling of system calls for program based anomaly detectionNeminath Hubballi, Santosh Biswas, Sukumar Nandi. 1-10 [doi]
- DelayCheck: Scheduling voice over multi-hop multi-channel wireless mesh networksVijay Gabale, Ashish Chiplunkar, Bhaskaran Raman, Partha Dutta. 1-10 [doi]
- A formal approach to mobility modelingAshutosh Dutta, Bryan Lyles, Henning Schulzrinne. 1-10 [doi]
- Mirage: Mitigating illicit inventorying in a RFID enabled retail environmentJonathan White, Nilanjan Banerjee. 1-9 [doi]
- Research and application of One-class small hypersphere support vector machine for network anomaly detectionSantosh Kumar, Sukumar Nandi, Santosh Biswas. 1-4 [doi]
- Energy efficient resource allocation in mobile ad hoc computational gridsSayed Chhattan Shah, Myong-Soon Park. 1-10 [doi]
- Flexible playout adaptation for low delay AAC RTP communicationJochen Issing, Stefan Reuschl, Falko Dressler, Nikolaus Färber. 1-9 [doi]
- Wireless across road: RF based road traffic congestion detectionSwaroop Roy, Rijurekha Sen, Swanand Kulkarni, Purushottam Kulkarni, Bhaskaran Raman, Lokendra K. Singh. 1-6 [doi]
- Capacity requirements for on-demand IPTV servicesPat Diminico, Vijay Gopalakrishnan, Rittwik Jana, K. K. Ramakrishnan, Deborah F. Swayne, Vinay A. Vaishampayan. 1-10 [doi]
- Signed graph based approach for on-line optimization in cognitive networksP. Balamuralidhar, Rajan Mindigal Alasigara Bhattachar. 1-4 [doi]
- Hierarchical networks with Byzantine RobustnessRadia J. Perlman, Charlie Kaufman. 1-11 [doi]
- A system for audio signalling based NAT TraversalAshish Patro, Yadi Ma, Fatemeh Panahi, Jordan Walker, Suman Banerjee. 1-10 [doi]
- A parameter-influencer based model of a Self-healing networkH. P. Raghunandan, S. Bedekar. 1-8 [doi]
- Data integrity proofs in cloud storageR. Sravan Kumar, Ashutosh Saxena. 1-4 [doi]
- A petri nets based model for multipoint synchronization in audio conferencingK. Pal, P. D. Upadhyay, A. Dutta. 1-8 [doi]
- New strategies for static routing and wavelength assignment in de Bruijn WDM networksMonish Chatterjee, Subhendu Barat, Debojyoti Majumder, Uma Bhattacharya. 1-4 [doi]
- 'Control plane' properties for signaling in loss-feedback based video rate adaptation over shared multicast pathsMohammad Rabby, Kaliappa Ravindran, Supratik Mukhopadhyay, Ramesh Bharadwaj, Gaurav Mangukiya. 1-10 [doi]
- TraceGray: An application-layer scheme for intrusion detection in MANET using mobile agentsAmar Taggu, Ani Taggu. 1-4 [doi]
- Impact of prefix hijacking on payments of providersPradeep Bangera, Sergey Gorinsky. 1-10 [doi]
- Improving the efficiency of healthcare delivery system in underdeveloped rural areasAmarjeet Singh, Vinayak S. Naik, Sangeeta Lal, R. Sengupta, D. Saxena, Pushpendra Singh, A. Puri. 1-6 [doi]
- Towards truly heterogeneous internets: Bridging infrastructure-based and infrastructure-less networksRao Naveed Bin Rais, Marc Mendonca, Thierry Turletti, Katia Obraczka. 1-10 [doi]
- Survivable network design using polyhedral approachesYogesh K. Agarwal. 1-6 [doi]
- CrowdLab: An architecture for volunteer mobile testbedsEduardo Cuervo, Peter Gilbert, Bi-Wu, Landon P. Cox. 1-10 [doi]