Abstract is missing.
- Utilization of a wrist-mounted accelerometer to count movement repetitionsSriram Sanka, Prashanth G. Reddy, Amber Alt, Ann Reinthal, Nigamanth Sridhar. 1-6 [doi]
- How to detect causality effects on large dynamical communication networks: A case studyLionel Tabourier, Alina Stoica, Fernando Peruani. 1-7 [doi]
- Location based radio resource allocation (LBRRA) in WiMAX and WiMAX-WLAN interface networkRakesh Kumar Jha, Upena D. Dalal. 1-2 [doi]
- Cheleby: A subnet-level internet topology mapping systemHakan Kardes, Mehmet Hadi Gunes, Talha Oz. 1-10 [doi]
- Detecting and tracking abrupt changes in wireless multipath channelsV. Sashidharan, Arun Pachai Kannu. 1-10 [doi]
- Design of a molecular communication framework for nanomachinesAyush Dubey, Shretima Tandon, Aaditeshwar Seth. 1-2 [doi]
- SIR based interference modeling for wireless mesh networks: A detailed measurement studyVishal Sevani, Bhaskaran Raman. 1-10 [doi]
- Adaptive network intrusion detection system using a hybrid approachR. Rangadurai Karthick, Vipul P. Hattiwale, Balaraman Ravindran. 1-7 [doi]
- On the design of device-to-device autonomous discoveryFrançois Baccelli, Nilesh Khude, Rajiv Laroia, Junyi Li, Tom Richardson, Sanjay Shakkottai, Saurabha Tavildar, Xinzhou Wu. 1-9 [doi]
- Fine-grained resource (electricity) management in buildingsPandarasamy Arjunan. 1-2 [doi]
- Epidemic broadcasting in DTNs using directional antennaRajib Ranjan Maiti, Niloy Ganguly, Arobinda Gupta. 1-2 [doi]
- Opportunistic cooperation in cognitive radio networksRahul Urgaonkar, Michael J. Neely. 1-10 [doi]
- Split reservation protocols using multiple wavelengths (SRPM) in dense WDM optical networksMalabika Sengupta, Swapan Kumar Mondal, Debashis Saha. 1-10 [doi]
- Limitations of scanned human copresence encounters for modelling proximity-borne malwareJames Mitchell, Eamonn O'Neill, Gjergji Zyba, Geoffrey M. Voelker, Michael Liljenstam, András Méhes, Per Johansson. 1-10 [doi]
- Capacity of Byzantine consensus in capacity limited point-to-point networksGuanfeng Liang, Nitin H. Vaidya. 1-10 [doi]
- Experimental performance evaluation of location distinction for MIMO linksDustin Maas, Neal Patwari, Sneha Kumar Kasera, Daryl Wasden, Michael A. Jensen. 1-10 [doi]
- Approximation algorithms for deployment of sensors for line segment coverage in wireless sensor networksDinesh Dash, Arijit Bishnu, Arobinda Gupta, Subhas C. Nandy. 1-10 [doi]
- WiMAX Mesh Based Back-Haul For Tactical Military And Disaster Area NetworksRahul Kulkarni, Ramakrishna Padmanabhan, Krishna M. Sivalingam, Devendra Jalihal, Krishnamurthy Giridhar. 1-10 [doi]
- Wireless system for monitoring and real-time classification of functional activityPankil M. Butala, Yuting Zhang, Thomas D. C. Little, Robert C. Wagenaar. 1-5 [doi]
- Better Internet routing through intrinsic support for selfishnessHolly Esquivel, Chitra Muthukrishnan, Aditya Akella, Shuchi Chawla. 1-10 [doi]
- Reliability of mobile agent system in QoS mobile networkChandreyee Chowdhury, Sarmistha Neogy. 1-2 [doi]
- CHORUS: Collaborative and harmonized open radio ubiquitous systemsSheng Zhou, Zhisheng Niu, Shiro Tanabe. 1-9 [doi]
- Linear and Remainder Packet Marking for fast IP tracebackSamant Saurabh, Ashok Singh Sairam. 1-8 [doi]
- Power management in IEEE 802.11 WLAN using proxy-assisted WLAN controllerSumankumar D. Panchal, S. V. R. Anand, Malati Hegde. 1-6 [doi]
- Pairgram: Modeling frequency information of lookahead pairs for system call based anomaly detectionNeminath Hubballi. 1-10 [doi]
- Conference Inaugural SpeakerKris Gopalakrishnan. 1 [doi]
- Target tracking in a WSN with directional sensors using electronic beam steeringA. Anand Kumar, Krishna M. Sivalingam. 1-10 [doi]
- Access control mechanisms for outsourced data in cloudB. R. Purushothama, Bharat Amberker. 1-2 [doi]
- On energy-aware aggregation of dynamic temporal demand in cloud computingHaiyang Qian, Fu Li, Deep Medhi. 1-6 [doi]
- Identity: A data center network fabric to enable co-existence of identical addressesVijay Mann, Kalapriya Kannan, Anilkumar Vishnoi, Shivkumar Kalyanaraman. 1-10 [doi]
- A router primitive approach for building diverse network servicesJoel Sommers, Paul Barford, Ben Liblit. 1-10 [doi]
- TM: Digital inclusion for rural massKushal Gore, Sylvan Lobo, Pankaj Doke. 1-6 [doi]
- A novel location management technique for dualhomed UMTS cellular networksSamir K. Sadhukhan, Swarup Mandal, Kanika Orea, Debashis Saha. 1-2 [doi]
- Wolverine: Traffic and road condition estimation using smartphone sensorsRavi Bhoraskar, Nagamanoj Vankadhara, Bhaskaran Raman, Purushottam Kulkarni. 1-6 [doi]
- PUMA: Policy-based Unified Multi-radio Architecture for agile mesh networkingChangbin Liu, Ricardo Correa, Harjot Gill, Tanveer Gill, Xiaozhou Li, Shivkumar Muthukumar, Taher Saeed, Boon Thau Loo, Prithwish Basu. 1-10 [doi]
- Assessing the veracity of identity assertions via OSNsMichael Sirivianos, Kyungbaek Kim, Jian Wei Gan, Xiaowei Yang. 1-10 [doi]
- Effects of network trace sampling methods on privacy and utility metricsPhil Fazio, Keren Tan, David Kotz. 1-8 [doi]
- Scalable content distribution for social networking websitesAmit Ruhela. 1-2 [doi]
- Performance analysis of beacon-less IEEE 802.15.4 multi-hop networksRachit Srivastava, Anurag Kumar 0001. 1-10 [doi]
- Throughput schemes for energy harvesting sensor networksTamma V. Prabhakar, Madhuri Iyer, Prakruthi Keshavamurthy, R. Venkatesha Prasad, Ignas G. Niemegeers, Sakthi Priya Sathyanarayanan. 1-7 [doi]
- A robust gradient clock synchronization algorithm for wireless sensor networksAndré C. Pinho, Daniel R. Figueiredo, Felipe Maia Galvão França. 1-10 [doi]
- RODEO: Robust and rapidly deployable TDM mesh with QoS differentiationAniesh Chawla, Vinay Yadav, Vasu Dev Sharma, Jitin Bajaj, Eshan Nanda, Vinay Ribeiro, Huzur Saran. 1-6 [doi]
- Softgreen: Towards energy management of green office buildings with soft sensorsLakshmi V. Thanayankizil, Sunil Kumar Ghai, Dipanjan Chakraborty 0001, Deva P. Seetharam. 1-6 [doi]
- IDS alerts classification using knowledge-based evaluationDheeraj Gupta, P. S. Joshi, A. K. Bhattacharjee, R. S. Mundada. 1-8 [doi]
- Optimizing cloud resources for delivering IPTV services through virtualizationVaneet Aggarwal, Vijay Gopalakrishnan, Rittwik Jana, K. K. Ramakrishnan, Vinay A. Vaishampayan. 1-10 [doi]
- Optimal control of information epidemicsAditya Karnik, Pankaj Dayama. 1-7 [doi]
- Percolation phenomena in networks under random dynamicsPrithwish Basu, Saikat Guha, Ananthram Swami, Don Towsley. 1-10 [doi]
- Wearable networked sensing for human mobility and activity analytics: A systems studyBo Dong, Subir Biswas. 1-6 [doi]
- Virtual network embedding with border matchingXuzhou Chen, Yan Luo, Jie Wang. 1-8 [doi]
- Optimal control of service rate and reliability in scheduling over wireless channelsAditya Karnik, Catherine Rosenberg. 1-7 [doi]
- SuperNova: Super-peers based architecture for decentralized online social networksRajesh Sharma, Anwitaman Datta. 1-10 [doi]
- Optimal relay placement in Wireless Sensor networks using node cut inequalitiesAshutosh Nigam, Yogesh Kumar Agarwal. 1-8 [doi]
- Contour routing for peer-to-peer DTN delivery in cellular networksSun-Hyun Kim, Seung-Jae Han. 1-9 [doi]
- Spectrum sensing based on entropy estimation using cyclostationary features for Cognitive radioSamrat L. Sabat, Sesham Srinu, A. Raveendranadh, Siba K. Udgata. 1-6 [doi]
- Markov model based experiment comparisonSwati Sharma, Alefiya Hussain. 1-2 [doi]
- Networked healthcare technology (NetHealth) - keynote speechSameer Sawarkar. 1 [doi]
- ACComplice: Location inference using accelerometers on smartphonesJun Han, Emmanuel Owusu, Le T. Nguyen, Adrian Perrig, Joy Zhang. 1-9 [doi]
- Multiband wireless mesh networks: Frequency aware spectrum allocation and cross-layer optimizationAvhishek Chatterjee, Supratim Deb, Vikram Srinivasan. 1-9 [doi]
- Providing QoS in a Cognitive Radio NetworkM. Kartheek, Vinod Sharma. 1-9 [doi]
- Low cost computing using virtualization for Remote DesktopDhaval Manvar, Mayank Mishra, Anirudha Sahoo. 1-2 [doi]
- On detecting malicious behaviors in interactive networks: Algorithms and analysisYongkun Li, John C. S. Lui. 1-10 [doi]
- 3 monitor network measurement service on GENIEthan Blanton, Sarbajit Chatterjee, Sriharsha Gangam, Sumit Kala, Deepti Sharma, Sonia Fahmy, Puneet Sharma. 1-10 [doi]
- Demand-side load management in smart homesPrashant J. Shenoy. 1 [doi]
- Performance modeling of routing in delay-tolerant networks with node heterogeneityV. K. Chaithanya Manam, Veeramani Mahendran, C. Siva Ram Murthy. 1-10 [doi]
- Network-resource isolation for virtualization nodesYasusi Kanada, Kei Shiraishi, Akihiro Nakao. 1-2 [doi]
- Hierarchy-aware distributed overlays in data centers using DC2Karthik Nagaraj, Hitesh Khandelwal, Charles Edwin Killian, Ramana Rao Kompella. 1-10 [doi]
- RuralNet: Understanding the state of internet connectivity in rural IndiaZahir Koradia, Aaditeshwar Seth. 1-2 [doi]
- TrickleDNS: Bootstrapping DNS security using social trustSriram Sankararaman, Jay Chen, Lakshminarayanan Subramanian, Venugopalan Ramasubramanian. 1-10 [doi]
- Robustness of logical topology mapping algorithms for survivability against multiple failures in an IP-over-WDM optical networkKrishnaiyan Thulasiraman, Tachun Lin, Zhili Zhou, Guoliang Xue. 1-9 [doi]
- Steptacular: An incentive mechanism for promoting wellnessNaini Gomes, Deepak Merugu, Gearoid O'Brien, Chinmoy Mandayam, Jia Shuo Yue, Berk Atikoglu, Adrian Albert, Norihiro Fukumoto, Huan Liu, Balaji Prabhakar, Damon Wischik. 1-6 [doi]
- A study on server Sleep state transition to reduce power consumption in a virtualized server cluster environmentV. K. Mohan Raj, R. Shriram. 1-6 [doi]
- Exploring the design space of social network-based Sybil defensesBimal Viswanath, Mainack Mondal, Allen Clement, Peter Druschel, P. Krishna Gummadi, Alan Mislove, Ansley Post. 1-8 [doi]
- Asynchronous full-duplex wirelessAchaleshwar Sahai, Gaurav Patel, Ashutosh Sabharwal. 1-9 [doi]
- Beyond OFDM: Best-effort dynamic spectrum access using filterbank multicarrierSriram Nandha Premnath, Daryl Wasden, Sneha Kumar Kasera, Behrouz Farhang-Boroujeny, Neal Patwari. 1-10 [doi]
- Networking lessons: From computers to waterIyswarya Narayanan, Venkatesh Sarangan, Arunchandar Vasan, Aravind Srinivasan, Anand Sivasubramaniam. 1-6 [doi]
- TM - a business service platform for improving the livelihood of rural Women Self-Help GroupsM. R. Ramesh Kumar, Sridhar Varadharajan. 1-6 [doi]
- Delay and loss-based transport protocols: Buffer-sizing and stabilityPraveen Raja, Gaurav Raina. 1-10 [doi]
- OLSR and approximate distance routing: Loops, black holes, and path stretchCarlos Rodrigo Aponte, Stephan Bohacek. 1-10 [doi]
- Net neutrality debate: Impact of competition among ISPsFrancois Boussion, Patrick Maillé, Bruno Tuffin. 1-8 [doi]
- Varanus: More-with-less fault localization in data centersVaishali P. Sadaphal, Maitreya Natu, Harrick M. Vin, Prashant J. Shenoy. 1-10 [doi]
- Applications of wide-area network slicing for improving cloud platform access by OpenTagRyoji Furuhashi, Akihiro Nakao. 1-7 [doi]
- Selection of minimum transmit power for network connectivity in Vehicular Ad Hoc NetworksP. C. Neelakantan, A. V. Babu. 1-6 [doi]
- Wireless sensor node based smart mine designBharat Udai Seth, Krishna M. Sivalingam. 1-6 [doi]
- Characterizing latency in periodic P2P hypercube gossipingPhilipp Berndt, Matthias Hovestadt, Odej Kao. 1-8 [doi]
- Control and understanding: Owning your home networkRichard Mortier, Tom Rodden, Tom Lodge, Derek McAuley, Charalampos Rotsos, Andrew W. Moore, Alexandros Koliousis, Joe Sventek. 1-10 [doi]
- DRank: Decentralized ranking mechanism for semantic community overlaysRajesh Sharma, Anwitaman Datta. 1-7 [doi]