Abstract is missing.
- AFCD: An Approximated-Fair and Controlled-Delay Queuing for High Speed NetworksLin Xue, Suman Kumar, Cheng Cui, Praveenkumar Kondikoppa, Chui-Hui Chiu, Seung-Jong Park. 1-7 [doi]
- A Virtual Network Allocation Algorithm for Reliability NegotiationRafael L. Gomes, Luiz F. Bittencourt, Edmundo R. M. Madeira. 1-7 [doi]
- Congestion Control with QoS and Delays Utility FunctionHengky Susanto, Byung-Guk Kim. 1-5 [doi]
- Energy and Accuracy Trade-Offs in Accelerometry-Based Activity RecognitionNing Wang, Geoff V. Merrett, Robert G. Maunder, Alex Rogers. 1-6 [doi]
- A Study of SNR Wall Phenomenon under Cooperative Energy Spectrum SensingZejiao Li, Xin Su, Jie Zeng, Yujun Kuang, Haijun Wang. 1-5 [doi]
- Energy-Efficient QoS Provisioning in Random Access Satellite NDMA SchemesJosé Vieira, Francisco Ganhão, Luis Bernardo, Rui Dinis, Marko Beko, Rodolfo Oliveira, Paulo Pinto. 1-9 [doi]
- Resource Allocation in OFDMA Femto NetworksDebalina Ghosh, Prasant Mohapatra. 1-5 [doi]
- Performance Model for a Cache Enabled Content Distribution Framework over MANETYang Guo, Lloyd Greenwald, Mary R. Schurgot, Matteo Varvello. 1-8 [doi]
- Distributed Interference Alignment in Cognitive Radio NetworksYi Xu, Shiwen Mao. 1-7 [doi]
- Profiling and Improving I/O Performance of a Large-Scale Climate Scientific ApplicationZhuo Liu, Bin Wang, Teng Wang, Yuan Tian, Cong Xu, Yandong Wang, Weikuan Yu, Carlos A. Cruz, Shujia Zhou, Tom Clune, Scott Klasky. 1-7 [doi]
- EMC: The Effective Multi-Path Caching Scheme for Named Data NetworkingHao Wu, Jun Li, Yi Wang, Bin Liu. 1-7 [doi]
- Network Characterization and Perceptual Evaluation of Skype Mobile VideosShraboni Jana, Amit Pande, An (Jack) Chan, Prasant Mohapatra. 1-7 [doi]
- A Reserve Price Auction for Spectrum Sharing with Heterogeneous ChannelsMehrdad Khaledi, Alhussein A. Abouzeid. 1-7 [doi]
- VSS: The Virtual Sensor SystemM. Pandit, D. Yoon, J. Shen. 1-6 [doi]
- Range Queries in MANET: Can Information-Centric Networking Help?Matteo Varvello, Jairo O. Esteban, Mark Smith, Lloyd Greenwald, Yang Guo, Mary R. Schurgot. 1-6 [doi]
- Fast Queuing Policies for Multimedia ApplicationsDuong Nguyen-Huu, Thai Duong, Thinh P. Nguyen. 1-6 [doi]
- Energy-Efficient Contact Probing in Opportunistic Mobile NetworksHuan Zhou, Huanyang Zheng, Jie Wu, Jiming Chen. 1-7 [doi]
- VeloZ: A Charging Policy Specification Language for Infrastructure CloudsFrancisco Airton Pereira da Silva, Paulo Anselmo da Mota Silveira Neto, Vinicius Cardoso Garcia, Fernando Antonio Mota Trinta, Rodrigo Elia Assad. 1-7 [doi]
- Supporting Voice over LTE: Solutions, Architectures, and ProtocolsC. Jasson Casey, Srivatsan Rajagopalan, Muxi Yan, Graham Booker, Alex Sprintson, Walt Magnussen. 1-7 [doi]
- Network Coding Based Encryption System for Advanced Metering InfrastructureHasen Nicanfar, Amr Alasaad, Peyman TalebiFard, Victor C. M. Leung. 1-7 [doi]
- OCNI - Open Cloud Networking InterfaceHoussem Medhioub, Bilel Msekni, Djamal Zeghlache. 1-8 [doi]
- Accelerating Allreduce Operation: A Switch-Based SolutionNongda Hu, Dawei Wang, Zheng Cao, Xuejun An, Ninghui Sun. 1-8 [doi]
- Providing Near-Optimal Fair-Queueing Guarantees at Round-Robin Amortized CostPaolo Valente. 1-7 [doi]
- Stochastic Pre-Classification for Software Defined FirewallsPritha Ghoshal, C. Jasson Casey, Paul V. Gratz, Alex Sprintson. 1-8 [doi]
- A Fast Approach to Unknown Tag Identification in Large Scale RFID SystemsXiulong Liu, Keqiu Li, Yanming Shen, Geyong Min, Bin Xiao, Wenyu Qu, Hongjuan Li. 1-7 [doi]
- An Elitist Polynomial Mutation Operator for Improved Performance of MOEAs in Computer NetworksKonstantinos Liagkouras, Konstantinos Metaxiotis. 1-5 [doi]
- Achieving Privacy of Data Requests in MANETs by Means of Piggybacking and Hop ModificationNoor Abbani, Hassan Artail. 1-9 [doi]
- e-Health AON (Application-Oriented Networks)Wei Liu, E. K. Park. 1-7 [doi]
- Continuous Gossip-Based Aggregation through Dynamic Information AgingVitaliy Rapp, Kalman Graffi. 1-7 [doi]
- Machine-to-Machine Communication over TV White Spaces for Smart Metering ApplicationsLuca Bedogni, Angelo Trotta, Marco Di Felice, Luciano Bononi. 1-7 [doi]
- A Software-Defined Networking Approach for Disaster-Resilient WANsKien Nguyen, Quang Tran Minh, Shigeki Yamada. 1-5 [doi]
- Throughput Enhancement for WDS-Based WLANsJae-Pil Jeong, Wan-Seon Lim, Young-Joo Suh. 1-6 [doi]
- ST-XCP: A Stable XCP ProtocolZhiqiang Shi, Dan Ionescu, Dongli Zhang. 1-7 [doi]
- A Verification Service Architecture for the Future InternetAhmet Can Babaoglu, Rudra Dutta. 1-9 [doi]
- Channel Requirements for Interference-Free Wireless Mesh Networks to Achieve Maximum ThroughputAizaz U. Chaudhry, John W. Chinneck, Roshdy H. M. Hafez. 1-7 [doi]
- Social-Aware Relay Node Selection in Delay Tolerant NetworksKaimin Wei, Deze Zeng, Song Guo, Ke Xu. 1-7 [doi]
- ROVER: Route Origin Verification Using DNSJoseph Gersch, Dan Massey. 1-9 [doi]
- Diverse Infrastructure and Architecture for Datacenter and Cloud ResilienceJames P. G. Sterbenz, Prasad Kulkarni. 1-7 [doi]
- Decoupling Policy from Routing with Software Defined Interdomain Management: Interdomain Routing for SDN-Based NetworksPeter Thai, Jaudelice Cavalcante de Oliveira. 1-6 [doi]
- A Mediation Layer for Connecting Data-Intensive Applications to Reconfigurable Data NodesMohamad Jomaa, Khaleel W. Mershad, Noor Abbani, Yaman Sharaf-Dabbagh, Bashar Romanous, Hassan Artail, Mazen A. R. Saghir, Hazem M. Hajj, Haitham Akkary, Mariette Awad. 1-9 [doi]
- Fast Near-Optimal Algorithm for Delivering Multiple Live Video Channels in CDNsJiayi Liu, Gwendal Simon. 1-7 [doi]
- A New Efficient Secure Coding Scheme for Random Linear Network CodingHassan Noura, Steven Martin, Khaldoun Al Agha. 1-7 [doi]
- QoS-Aware Service Selection in Geographically Distributed CloudsXin Li, Jie Wu 0001, Sanglu Lu. 1-5 [doi]
- Transparent Network Protocol Testing and EvaluationXiaoshuang Wang, Sunil Agham, Vikram P. Munishwar, Vaibhav Nipunage, Shailendra Singh 0003, Kartik Gopalan. 1-7 [doi]
- Secure Verification of Location Claims on a Vehicular Safety ApplicationWafa Ben Jaballah, Mauro Conti, Mohamed Mosbah, Claudio E. Palazzi. 1-7 [doi]
- Hybrid Multicast Traffic Grooming in Transparent Optical Networks with Physical Layer ImpairmentsTania Panayiotou, Georgios Ellinas, Neophytos Antoniades. 1-6 [doi]
- Modeling Hierarchical Caches in Content-Centric NetworksZixiao Jia, Peng Zhang, Jiwei Huang, Chuang Lin, John C. S. Lui. 1-7 [doi]
- Using Minimum Mobile Chargers to Keep Large-Scale Wireless Rechargeable Sensor Networks Running ForeverHaipeng Dai, Xiaobing Wu, Lijie Xu, Guihai Chen, Shan Lin. 1-7 [doi]
- Preserving Data Query Privacy in Mobile Mashups through Mobile Cloud ComputingRodney Owens, Weichao Wang. 1-5 [doi]
- Architectural Blueprints of a Unified Sensing Platform for the Internet of ThingsVangelis Gazis, Konstantinos Sasloglou, Nikolaos Frangiadakis, Panayotis Kikiras, Andreas Merentitis, Kostas Mathioudakis, Giorgos Mazarakis. 1-5 [doi]
- Integration of Quantitative Methods for Risk Evaluation within Usage Control PoliciesLeanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori, Artsiom Yautsiukhin. 1-8 [doi]
- Performance Comparison of ENUM Name ServersSaulo H. da Mata, Johann M. H. Magalhaes, Alexandre Cardoso, Paulo Roberto Guardieiro, Helio A. Carvalho. 1-5 [doi]
- Reachability Graph Based Hierarchical Test Generation for Network Protocols Modeled as Parallel Finite State MachinesJiangyuan Yao, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu. 1-9 [doi]
- Refining IP-to-AS Mappings for AS-Level TracerouteBaobao Zhang, Jun Bi, Yangyang Wang, Yu Zhang, Jianping Wu. 1-7 [doi]
- Dynamic Link Classification Based on Neuronal Networks for QoS Enabled Access to Limited ResourcesSebastian Subik, Dennis Kaulbars, Patrick-Benjamin Bok, Christian Wietfeld. 1-5 [doi]
- Secure Name Resolution for Identifier-to-Locator Mappings in the Global InternetXiruo Liu, Wade Trappe, Yanyong Zhang. 1-7 [doi]
- An Approach for Privacy Enhanced Pixel-Level Image Processing in Hybrid CloudsArash Nourian, Muthucumaru Maheswaran. 1-8 [doi]
- Evaluation of Cloud-RAID: A Secure and Reliable Storage above the CloudsMaxim Schnjakin, Christoph Meinel. 1-9 [doi]
- Spreading the Load in a Tree Type Routing StructureDeclan T. Delaney, Lina Xu, Gregory M. P. O'Hare. 1-7 [doi]
- Efficient Protocols for Rule Checking in RFID SystemsYafeng Yin, Lei Xie, Sanglu Lu, Daoxu Chen. 1-7 [doi]
- DHTs for Cluster-Based Ad-Hoc Networks Employing Multi-Hop RelayingBilal Zafar, Roman Alieiev, Liz Ribe-Baumann, Martin Haardt. 1-6 [doi]
- SCAPACH: Scalable Password-Changing Protocol for Smart Grid Device AuthenticationRehana Tabassum, Klara Nahrstedt, Edmond Rogers, King-Shan Lui. 1-5 [doi]
- Games of Timing Theoretical Protocol Development and Performance Analysis for Missile DefenseCarol A. Niznik. 1-6 [doi]
- On the Performance of the IEEE 802.11 in a Multi-Channel EnvironmentMarcos F. Caetano, Bruno F. Lourenco, Jacir Luiz Bordim. 1-7 [doi]
- Adaptive Wireless Mesh Networks: Surviving Weather without Sensing ItNauman Javed, Eric Lyons, Michael Zink, Tilman Wolf. 1-7 [doi]
- Upper Bounds on Unsuccessful Transmission Rate in Persistent and Non-Persistent CSMA ProtocolsDariusz Koscielnik, Marek Miskowicz, Jakub Szyduczynski. 1-5 [doi]
- Reliability Analysis of Wireless Real-Time Control NetworksPéter Horváth, Mark Yampolskiy, Yuan Xue, Xenofon D. Koutsoukos, Janos Sztipanovits. 1-7 [doi]
- Controlled Path Traversal for a Mobile Element in Wireless Sensor NetworksBaris Tas, Ali Saman Tosun. 1-9 [doi]
- MOTAG: Moving Target Defense against Internet Denial of Service AttacksQuan Jia, Kun Sun, Angelos Stavrou. 1-9 [doi]
- Modular EGS Architectures for Optical InterconnectionsDario G. Garao, Guido Maier, Achille Pattavina. 1-7 [doi]
- A Social Network Integrated Reputation System for Cooperative P2P File SharingKang Chen, Haiying Shen, Karan Sapra, Guoxin Liu. 1-7 [doi]
- Towards a Cooperative Mechanism Based Distributed Source Address FilteringJie Li, Jun Bi, Jianping Wu. 1-7 [doi]
- Save for Later: A Technique for Improving End-to-End Mesh Network PerformanceYingxin Jiang, Shu Liu, Aaron Striegel. 1-6 [doi]
- Network Coding for Multicasting over Rayleigh Fading Multi Access ChannelsAvi Zanko, Amir Leshem, Ephraim Zehavi. 1-7 [doi]
- Channel Detecting Jamming Attacks against Jump-Stay Based Channel Hopping Rendezvous Algorithms for Cognitive Radio NetworksYoung-Hyun Oh, David J. Thuente. 1-9 [doi]
- Opportunistic Direct Interconnection between Co-Located Wireless Sensor NetworksTeng Jiang, Geoff V. Merrett, Nick R. Harris. 1-5 [doi]
- MINERVA: Information-Centric Programming for Social SensingShiGuang Wang, Shaohan Hu, Shen Li, Hengchang Liu, Md. Yusuf Sarwar Uddin, Tarek F. Abdelzaher. 1-9 [doi]
- Improving the Network Energy Efficiency in MapReduce SystemsLin Wang, Fa Zhang, Zhiyong Liu. 1-7 [doi]
- Re-Thinking 802.11 Rate Selection in the Face of Non-Altruistic BehaviorAndrew Blaich, Shu Liu, Aaron Striegel. 1-6 [doi]
- Probabilistic Analysis of Message ForwardingLouise E. Moser, P. M. Melliar-Smith. 1-8 [doi]
- DORA: Distributed Cognitive Random Access of Unslotted Markovian Channels under Tight Collision ConstraintsLiqiang Zhang. 1-9 [doi]
- On the Use of Distributed Beamforming to Increase Base Station Anonymity in Wireless Sensor NetworksJon R. Ward, Mohamed Younis. 1-7 [doi]
- Seamless Migration of Virtual Machines across NetworksUmar Kalim, Mark K. Gardner, Eric J. Brown, Wu-chun Feng. 1-7 [doi]
- Secure RFID Authentication Protocol with Key Updating TechniqueGul N. Khan, Guangyu Zhu. 1-5 [doi]
- Making Nodes Cooperative: A Secure Incentive Mechanism for Message Forwarding in DTNsHonglong Chen, Wei Lou. 1-7 [doi]
- Routing and Name Resolution in Information-Centric NetworksDan Zhang, Hang Liu. 1-7 [doi]
- Budget-Minimized Resource Allocation and Task Scheduling in Distributed Grid/CloudsPan Yi, Hui Ding, Byrav Ramamurthy. 1-8 [doi]
- Resource Allocation for Energy Efficient k-out-of-n System in Mobile Ad Hoc NetworksChien-An Chen, Myounggyu Won, Radu Stoleru, Geoffrey G. Xie. 1-9 [doi]
- Elastic Network Design and Adaptive Flow Placement in Software Defined NetworksJulius Müller, Andreas Wierz, Dragos Vingarzan, Thomas Magedanz. 1-6 [doi]
- A Scheduler for Multipath TCPFan Yang, Paul D. Amer, Nasif Ekiz. 1-7 [doi]
- Service Instantiation in an Internet with ChoicesAbhishek Dwaraki, Tilman Wolf. 1-7 [doi]
- Measuring the Relationships between Internet Geography and RTTRaul Landa, Richard G. Clegg, João Taveira Araújo, Eleni Mykoniati, David Griffin, Miguel Rio. 1-7 [doi]
- Privacy Preserving Computations Using Implicit SecurityAbhishek Parakh, William Mahoney. 1-6 [doi]
- Generic Real-Time Traffic Distribution Framework: Black RiderSandra Frei, Woldemar F. Fuhrmann, Bogdan V. Ghita. 1-8 [doi]
- Video Browsing - A Study of User Behavior in Online VoD ServicesLiang Chen, Yipeng Zhou, Dah-Ming Chiu. 1-7 [doi]
- Reciprocity and Fairness in Medium Access Control GamesMahdi Azarafrooz, Ramamurti Chandramouli, Koduvayur P. Subbalakshmi. 1-5 [doi]
- Multi Path PERTAnkit Singh, A. L. Narasimha Reddy. 1-9 [doi]
- Intra-Domain Pathlet RoutingMarco Chiesa, Gabriele Lospoto, Massimo Rimondini, Giuseppe Di Battista. 1-9 [doi]
- DoS and DDoS in Named Data NetworkingPaolo Gasti, Gene Tsudik, Ersin Uzun, Lixia Zhang 0001. 1-7 [doi]
- Analyzing and Modeling Temporal Patterns of Human Contacts in Cellular NetworksHayang Kim, Hui Zang, Xiaoli Ma. 1-7 [doi]
- Steady Status Study of Distributed Data Caching in Ad Hoc NetworksJulinda Taylor, Bin Tang, Mehmet Bayram Yildirim. 1-6 [doi]
- An Optimal Algorithm for Time-Slot Assignment in SS/TDMA Satellite SystemsXili Wan, Feng Shan, Xiaojun Shen. 1-6 [doi]
- DECIMA: Virtualized I/O Management in 3D Teleimmersive NetworksRaoul Rivas, Ahsan Arefin, Klara Nahrstedt. 1-7 [doi]
- OpenADN: A Case for Open Application Delivery NetworkingSubharthi Paul, Raj Jain, Jianli Pan, Jay Iyer, David Oran. 1-7 [doi]
- Network Hypervisors: Managing the Emerging SDN ChaosShufeng Huang, James Griffioen. 1-7 [doi]
- On Scaling Perturbation Based Privacy-Preserving Schemes in Smart Metering SystemsXuebin Ren, Xinyu Yang, Jie Lin, Qingyu Yang, Wei Yu. 1-7 [doi]
- CogWnet: A Resource Management Architecture for Cognitive Wireless NetworksIsmail AlQerm, Basem Shihada, Kang G. Shin. 1-7 [doi]
- Target-Temporal Effective-Sensing Coverage in Mission-Driven Camera Sensor NetworksYi Hong, Donghyun Kim, Deying Li, Wenping Chen, Alade O. Tokuta, Zhiming Ding. 1-9 [doi]
- An Empirical Study of Receiver-Based AIMD Flow-Control Strategies for CCNStefan Braun, Massimo Monti, Manolis Sifalakis, Christian F. Tschudin. 1-8 [doi]
- Preserving Smartphone Users' Anonymity in Cloudy DaysClaudio Agostino Ardagna, Mauro Conti, Mario Leone, Julinda Stefa. 1-5 [doi]