Abstract is missing.
- REPLEX: dynamic traffic engineering based on wardrop routing policiesSimon Fischer, Nils Kammenhuber, Anja Feldmann. 1 [doi]
- Using forgetful routing to control BGP table sizeElliott Karpilovsky, Jennifer Rexford. 2 [doi]
- Maximizing transfer opportunities in bluetooth DTNsMarc Liberatore, Brian Neil Levine, Chadi Barakat. 3 [doi]
- Dynamic names and private address maps: complete self-configuration for MANETsChristophe Jelger, Christian F. Tschudin. 4 [doi]
- Reformulating the monitor placement problem: optimal network-wide samplingGion Reto Cantieni, Gianluca Iannaccone, Chadi Barakat, Christophe Diot, Patrick Thiran. 5 [doi]
- Early application identificationLaurent Bernaille, Renata Teixeira, Kavé Salamatian. 6 [doi]
- Processing top k queries from samplesEdith Cohen, Nadav Grossaug, Haim Kaplan. 7 [doi]
- Optimal design of high density 802.11 WLANsVivek P. Mhatre, Konstantina Papagiannaki. 8 [doi]
- SMARTA: a self-managing architecture for thin access pointsNabeel Ahmed, Srinivasan Keshav. 9 [doi]
- Migrating home agents towards internet-scale mobility deploymentsRyuji Wakikawa, Guillaume Valadon, Jun Murai. 10 [doi]
- Secure sensor network routing: a clean-slate approachBryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig. 11 [doi]
- Virtual networks under attack: disrupting internet coordinate systemsMohamed Ali Kâafar, Laurent Mathy, Thierry Turletti, Walid Dabbous. 12 [doi]
- Retouched bloom filters: allowing networked applications to trade off selected false positives against false negativesBenoit Donnet, Bruno Baynat, Timur Friedman. 13 [doi]
- Modeling ping times in first person shooter gamesNatalie Degrande, Danny De Vleeschauwer, Robert E. Kooij, M. R. H. Mandjes. 14 [doi]
- A study of end-to-end web access failuresVenkata N. Padmanabhan, Sriram Ramabhadran, Sharad Agarwal, Jitendra Padhye. 15 [doi]
- Modeling the AIADD paradigm in networks with variable delaysGennaro Boggia, Pietro Camarda, A. D Alconzo, Luigi Alfredo Grieco, Saverio Mascolo, Eitan Altman, Chadi Barakat. 16 [doi]
- Shortcuts in a virtual worldMoritz Steiner, Ernst W. Biersack. 17 [doi]
- Compositional control of IP mediaPamela Zave, Eric Cheung. 18 [doi]
- Stealth distributed hash table: a robust and flexible super-peered DHTAndrew Brampton, Andrew MacQuire, Idris A. Rai, Nicholas J. P. Race, Laurent Mathy. 19 [doi]
- HSDPA delivering MBMS video streamingLuísa Silva, Américo Correia. 20 [doi]
- Towards a versatile transport protocolGuillaume Jourjon, Emmanuel Lochin, Patrick Sénac. 21 [doi]
- Reconciling zero-conf with efficiency in enterprisesChang Kim, Jennifer Rexford. 22 [doi]
- An alternative QoS architecture for the IEEE 802.16 standardLuís Felipe M. de Moraes, Paulo Ditarso Maciel Jr.. 23 [doi]
- Resisting against aggregator compromises in sensor networksThomas Claveirole, Marcelo Dias de Amorim, Michel Abdalla, Yannis Viniotis. 24 [doi]
- Performance assessment of a distributed real-time control system utilizing RDM and RDM+ protocols for communicationMojtaba Sabeghi, Mahmoud Naghibzadeh. 25 [doi]
- Neighbor discovery analysis in wireless sensor networksElyes Ben Hamida, Guillaume Chelius, Eric Fleury. 26 [doi]
- Mobile agents based framework for routing and congestion control in mobile ad hoc networksH. M. P. Shekhar, K. S. Ramanatha. 27 [doi]
- Autonomic policy-based management using web servicesTorsten Klie, Lars Wolf. 28 [doi]
- SNARE: sensor node attached reputation evaluatorIsmat K. Maarouf, A. R. Naseer. 29 [doi]
- Non-repudiation mechanisms for peer-to-peer networks: enabling technology for peer-to-peer economic marketsMichael Conrad. 30 [doi]
- Wireless alternative best effort service: a case study of ALMCyrine Mrabet, Mohamed Ali Kâafar, Farouk Kamoun. 31 [doi]
- Anomaly detection by finding feature distribution outliersMarc Ph. Stoecklin. 32 [doi]
- Inferring groups of correlated failuresJean Lepropre, Guy Leduc. 33 [doi]
- How small labels create big improvementsPan Hui, Jon Crowcroft. 34 [doi]
- Quality of service routing in peer-to-peer overlaysMichael Gellman. 35 [doi]
- Learning for accurate classification of real-time trafficWei Li, Andrew W. Moore. 36 [doi]
- Eliminating channel scanning phase in handoff across IEEE 802.11 wireless LANsJaeouk Ok, Pedro Morales, Andreas Darmawan, Hiroyuki Morikawa. 37 [doi]
- A comparison of token-bucket based multi-color marking techniquesMiriam Allalouf, Yuval Shavitt. 38 [doi]
- Multiple-path layer-2 based routing and load balancing approach for wireless infrastructure mesh networksAlessandro Ordine, Fabio Feuli, Giuseppe Bianchi. 39 [doi]
- Network coding with traffic engineeringWenjun Hu, Miguel Castro, Jon Crowcroft, Greg O Shea, Antony I. T. Rowstron. 40 [doi]
- Synergy: blending heterogeneous measurement elements for effective network monitoringAwais Ahmed Awan, Andrew W. Moore. 41 [doi]
- Correlation-based data dissemination in traffic monitoring sensor networksAntonios Skordylis, Alexandre Guitton, Agathoniki Trigoni. 42 [doi]
- Searching for invariants in network games trafficAlberto Dainotti, Alessio Botta, Antonio Pescapè, Giorgio Ventre. 43 [doi]
- On the benefits of synchronized playout in peer-to-peer streamingConstantinos Vassilakis, Nikolaos Laoutaris, Ioannis Stavrakakis. 44 [doi]
- P2P IPTV measurement: a case study of TVantsThomas Silverston, Olivier Fourmaux. 45 [doi]
- Experience-based network resource usage on mobile hostsArjan J. H. Peddemors, Henk Eertink, Ignas G. Niemegeers. 46 [doi]
- Are 802.11 link quality broadcast measurements always reliable?Domenico Giustiniano, Giuseppe Bianchi. 47 [doi]
- Pricing residential broadband internetHumberto T. Marques Neto, Virgílio A. F. Almeida, Jussara M. Almeida. 48 [doi]
- Exhaustive path tracing with Paris tracerouteBrice Augustin, Timur Friedman, Renata Teixeira. 49 [doi]
- Proposition of a cross-layer architecture model for the support of QoS in ad-hoc networksWafa Berrayana, Habib Youssef, Stéphane Lohier, Guy Pujolle. 50 [doi]
- A WSN platform to support middleware developmentAndré Rodrigues. 51 [doi]
- Dynamic service discovery and composition for ubiquitous networks applicationsLuiz Olavo Bonino da Silva Santos, Marten van Sinderen, Luís Ferreira Pires. 52 [doi]
- Towards SLA and location-based nomadism managementBadis Tebbani, Issam Aib, Guy Pujolle. 53 [doi]
- Failure diagnosis with incomplete information in cable networksYun Mao, Hani Jamjoom, Shu Tao. 54 [doi]
- TinySA: a security architecture for wireless sensor networksJohann Großschädl. 55 [doi]
- A modular RCP for flexible interdomain route controlYi Wang, Jennifer Rexford. 56 [doi]
- Understanding the behavior of TCP for real-time CBR workloadsSalman Baset, Eli Brosh, Vishal Misra, Dan Rubenstein, Henning Schulzrinne. 57 [doi]
- Investigating the user mobility in wireless mobile networks through real measurementsCarlos Alberto V. Campos, Luís Felipe M. de Moraes. 58 [doi]
- Detail characterization of paths in pocket switched networksAbderrahmen Mtibaa, Augustin Chaintreau, Christophe Diot. 59 [doi]