Abstract is missing.
- A hybrid finite automaton for practical deep packet inspectionMichela Becchi, Patrick Crowley. 1 [doi]
- Detecting worm variants using machine learningOliver Sharma, Mark Girolami, Joseph S. Sventek. 2 [doi]
- Practical defenses against BGP prefix hijackingZheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing Morley Mao. 3 [doi]
- Identifying dynamic IP address blocks serendipitously through background scanning trafficYu Jin, Esam Sharafuddin, Zhi-Li Zhang. 4 [doi]
- Modeling the adoption of new network architecturesDilip Antony Joseph, Nikhil Shetty, John Chuang, Ion Stoica. 5 [doi]
- Internet economics: the use of Shapley value for ISP settlementRichard T. B. Ma, Dah-Ming Chiu, John C. S. Lui, Vishal Misra, Dan Rubenstein. 6 [doi]
- On the cost of caching locator/ID mappingsLuigi Iannone, Olivier Bonaventure. 7 [doi]
- ER: efficient retransmission scheme for wireless LANsEric Rozner, Anand Padmanabha Iyer, Yogita Mehta, Lili Qiu, Mansoor Jafry. 8 [doi]
- Near-optimal co-ordinated coding in wireless multihop networksBjörn Scheuermann, Wenjun Hu, Jon Crowcroft. 9 [doi]
- Multipath code casting for wireless mesh networksChristos Gkantsidis, Wenjun Hu, Peter B. Key, Bozidar Radunovic, Pablo Rodriguez, Steluta Gheorghiu. 10 [doi]
- Multipath live streaming via TCP: scheme, performance and benefitsBing Wang, Wei Wei, Zheng Guo, Donald F. Towsley. 11 [doi]
- The diameter of opportunistic mobile networksAugustin Chaintreau, Abderrahmen Mtibaa, Laurent Massoulié, Christophe Diot. 12 [doi]
- Fair and efficient scheduling in data ferrying networksShimin Guo, Srinivasan Keshav. 13 [doi]
- Otiy: locators tracking nodesMathias Boc, Anne Fladenmuller, Marcelo Dias de Amorim. 14 [doi]
- Router buffer sizing revisited: the role of the output/input capacity ratioRavi S. Prasad, Constantine Dovrolis, Marina Thottan. 15 [doi]
- Improving service differentiation in IP networks through dual topology routingKin Wah Kwong, Roch Guérin, Anees Shaikh, Shu Tao. 16 [doi]
- Rethinking internet traffic management: from multiple decompositions to a practical protocolJiayue He, Martin Suchara, Ma ayan Bresler, Jennifer Rexford, Mung Chiang. 17 [doi]
- NetDiagnoser: troubleshooting network unreachabilities using end-to-end probes and routing dataAmogh Dhamdhere, Renata Teixeira, Constantine Dovrolis, Christophe Diot. 18 [doi]
- Joint MAC-aware routing and load balancing in mesh networksVivek Mhatre, Henrik Lundgren, François Baccelli, Christophe Diot. 19 [doi]
- Scalable real-time gateway assignment in mobile mesh networksEdward Bortnikov, Israel Cidon, Idit Keidar. 20 [doi]
- Practical service provisioning for wireless meshesSaumitra M. Das, Dimitrios Koutsonikolas, Y. Charlie Hu. 21 [doi]
- An energy-conscious transport protocol for multi-hop wireless networksNiky Riga, Ibrahim Matta, Alberto Medina, Craig Partridge, J. Redi. 22 [doi]
- Backpressure multicast congestion control in mobile ad-hoc networksBjörn Scheuermann, Matthias Transier, Christian Lochert, Martin Mauve, Wolfgang Effelsberg. 23 [doi]
- Experience with an implementation of the ::::Idle Sense:::: wireless access methodYan Grunenberger, Martin Heusse, Franck Rousseau, Andrzej Duda. 24 [doi]
- Internet routing resilience to failures: analysis and implicationsJian Wu, Ying Zhang, Zhuoqing Morley Mao, Kang G. Shin. 25 [doi]
- On improving the efficiency and manageability of NotViaAng Li, Pierre Francois, Xiaowei Yang. 26 [doi]
- Proactive replication in distributed storage systems using machine availability estimationAlessandro Duminuco, Ernst Biersack, Taoufik En-Najjary. 27 [doi]
- Building a reliable P2P system out of unreliable P2P clients: the case of KADDamiano Carra, Ernst W. Biersack. 28 [doi]
- Promoting fluidity in the flow of packets of 802.11 wireless mesh networksAdel Aziz, Roger Karrer, Patrick Thiran. 29 [doi]
- Fairness enhancement in wireless mesh networksSalim Nahle, Naceur Malouch. 30 [doi]
- Towards the realization of a mobile gridKonstantinos V. Katsaros, George C. Polyzos. 31 [doi]
- Do you know what you are generating?Alberto Dainotti, Alessio Botta, Antonio Pescapè. 32 [doi]
- The BlueGame project: ad-hoc multilayer mobile game with social dimensionRoman Spanek, Premysl Kovar, Pavel Pirkl. 33 [doi]
- Reproducing opportunistic connectivity traces using connectivity modelsThabotharan Kathiravelu, Arnold Pears. 34 [doi]
- An AS-level IP traceback systemAndré O. Castelucio, Ronaldo M. Salles, Artur Ziviani. 35 [doi]
- BonSwing: A GUI framework for ad-hoc applications using service discoverySuman Srinivasan, Henning Schulzrinne. 36 [doi]
- A quicker way to discover nearby peersGwendal Simon, Yiping Chen, Ali Boudani. 37 [doi]
- Molecular architecture for autonomic wireless mesh networksMohammad Nassiri, Fabrice Theoleyre, Martin Heusse, Andrzej Duda. 38 [doi]
- Measuring P2P IPTV traffic on both sides of the worldThomas Silverston, Olivier Fourmaux, Kavé Salamatian, Kenjiro Cho. 39 [doi]
- Replacing channel scanning with multiple authentication for fast handoff in IEEE 802.11 wireless networksJaeouk Ok, Pedro Morales, Hiroyuki Morikawa. 40 [doi]
- Automating the iBGP organization in large IP networksVirginie Van den Schrieck. 41 [doi]
- Can active tracking of inroamer location optimise a live GSM network?Katerina Dufková, Jirí Danihelka, Michal Ficek, Ivan Gregor, Jan Kouba. 42 [doi]
- Towards next generation network requirements for next generation gamingAlberto Hernandez, Enrique Vázquez, Carolina Garcia. 43 [doi]
- Multiplexing BGP sessions with BGP-MuxVytautas Valancius, Nick Feamster. 44 [doi]
- Implementation and preliminary evaluation of an ISP-driven informed path selectionDamien Saucez, Benoit Donnet, Olivier Bonaventure. 45 [doi]
- Resource-efficient software delivery using volunteer assistancePurvi Shah, Jehan-François Pâris, Jeff Morgan, John Schettino, Chandrasekar Venkatraman, Miranda Mowbray. 46 [doi]
- Can we reduce Wi-Fi energy consumption during VoIP calls?Vinod Namboodiri, Lixin Gao. 47 [doi]
- Probabilistic inference of lossy links using end-to-end data in sensor networksWei Zeng, Bing Wang, Krishna R. Pattipati. 48 [doi]
- Folksonomy-based reasoning in opportunistic networksNishanth R. Sastry. 49 [doi]
- Capture-aware staggering for concurrent transmissionsNaveen Santhapuri, Srihari Nelakuditi, Romit Roy Choudhury. 50 [doi]
- Extending web browsers architectures to support HTTP session mobilityMichael O. Adeyeye, Neco Ventura. 51 [doi]
- Securing BGP incrementallyMartin Suchara, Ioannis C. Avramopoulos, Jennifer Rexford. 52 [doi]
- SWARM: self-organization of community wireless mesh networksSaumitra M. Das, Konstantina Papagiannaki, Suman Banerjee, Y. C. Tay. 53 [doi]
- Fairer TCP-friendly congestion control protocol for multimedia streaming applicationsSoo Hyun Choi, Mark Handley. 54 [doi]
- A secure role-based address allocation and distribution mechanismDamien Leroy, Olivier Bonaventure. 55 [doi]
- Characterizing quality of content distribution from YouTube like portalsAnirban Banerjee, Dhiman Barman. 56 [doi]
- Towards a clustering based data diffusion protocol in delay tolerant networksSana Tmar, Eric Fleury. 57 [doi]
- Origin of route explosion in virtual private networksZied Ben-Houidi, Renata Teixeira, Marc Capelle. 58 [doi]
- Characterizing network events and their impact on routingAmelie Medem Kuatse, Renata Teixeira, Michael Meulle. 59 [doi]
- A gateway for wireless broadcastingKristjan V. Jonsson, Ólafur Ragnar Helgason, Gunnar Karlsson. 60 [doi]
- A next generation internet architecture for mobility and multi-homing supportWalter Wong, Fábio Luciano Verdi, Maurício F. Magalhães. 61 [doi]
- A novel approach for creating trust to reduce malicious behavior in MANETSyed Sajjad Rizvi, Saroj Poudyal, Varsha Edla, Ravi Nepal. 62 [doi]
- Daily walks in Paris: a practical analysis of wi-fi access pointsGuillaume Valadon, Florian Le Goff, Christophe Berger. 63 [doi]
- Exploring the routing complexity of mobile multicast: a semi-empirical studyMatthias Wählisch, Thomas C. Schmidt. 64 [doi]
- Experimenting with real-life opportunistic communications using windows mobile devicesAnna Kaisa Pietilainen, Christophe Diot. 65 [doi]
- A networked virtual environment over KADMatteo Varvello, Ernst Biersack, Christophe Diot. 66 [doi]
- Identifying statistically anomalous regions in time series of network trafficFernando Silveira, Christophe Diot. 67 [doi]
- Bootstrapping large-scale DHT networksJae-Woo Lee, Henning Schulzrinne, Wolfgang Kellerer, Zoran Despotovic. 68 [doi]
- Is your IP address prefix well-served by internet routing?Yibo Wang, Jun Li. 69 [doi]
- Energy-efficient MAC and routing design in distributed beamforming sensor networksDimitrios Koutsonikolas, Syed Ali Raza Jafri, Y. Charlie Hu. 70 [doi]
- Robust routing in networks with time-varying linksVictoria Manfredi. 71 [doi]
- A cross-layer load-independent link cost metric for wireless mesh networksMarianna Carrera, Henrik Lundgren, Theodoros Salonidis, Christophe Diot. 72 [doi]
- Enabling seamless internet mobilityGregor Maier, Wolfgang Mühlbauer, Yevgen Rogoza, Anja Feldmann. 73 [doi]
- mod_kaPoW: mitigating DoS with transparent proof-of-workEdward C. Kaiser, Wu-chang Feng. 74 [doi]
- Application and desktop sharingOmer Boyaci, Henning Schulzrinne. 75 [doi]
- Enabling session initiation in the presence of middleboxesSergio Lembo, Jani Heikkinen. 76 [doi]
- A next generation internet state management frameworkXin Huang, Tilman Wolf. 77 [doi]
- Understanding the effect of P2P overlay on the AS-level underlayAmir H. Rasti, Reza Rejaie, Walter Willinger. 78 [doi]