Abstract is missing.
- Utilizing path dynamics for delay assurance in synchronized multihop schedulingJiapeng Zhang, Yingfei Dong. 1-6 [doi]
- Semi-controlled authorized information dissemination in content-based social networksChenguang Kong, Xiaojun Cao. 1-6 [doi]
- On simulation studies of cyber attacks against LTE networksSulabh Bhattarai, Stephen Rook, Linqiang Ge, Sixiao Wei, Wei Yu, Xinwen Fu. 1-8 [doi]
- Uplink delay variation compensation in queue length estimation over mobile data networksKe Liu, Jack Y. B. Lee. 1-8 [doi]
- Scheduling periodic real-time communication in multi-GPU systemsUri Verner, Avi Mendelson, Assaf Schuster. 1-8 [doi]
- A novel human mobility model for MANETs based on real dataAhmad Foroozani, Mohammed Gharib, Ali Mohammad Afshin Hemmatyar, Ali Movaghar. 1-7 [doi]
- Energy-efficient routing in IPv6 home networksArnaud Kaiser, Michael Boc. 1-8 [doi]
- An online mechanism for dynamic instance allocation in reserved instance marketplaceMin Yao, Chuang Lin. 1-8 [doi]
- Network capacity expansion methods based on efficient channel utilization for multi-channel wireless backbone networkMasaki Tagawa, Yutaro Wada, Yuzo Taenaka, Kazuya Tsukamoto. 1-6 [doi]
- A light-weight certificate-less public key cryptography scheme based on ECCXuanxia Yao, Xiaoguang Han, Xiaojiang Du. 1-8 [doi]
- Key technologies for SON in next generation radio access networksXin Su, Jie Zeng, Chiyang Xiao. 1-8 [doi]
- Evaluating the controller capacity in software defined networkingLong Yao, Peilin Hong, Wei Zhou. 1-6 [doi]
- CDRDN: Content Driven Routing in Datacenter NetworkMing Zhu, Dan Li, Ying Liu, Jianping Wu. 1-8 [doi]
- Attacks/faults detection and isolation in the Smart Grid using Kalman FilterKebina Manandhar, Xiaojun Cao. 1-6 [doi]
- Fast Markov Decision Process for data collection in sensor networksThai Duong, Thinh P. Nguyen. 1-8 [doi]
- Double-ruling-based location-free data replication and retrieval scheme in mobile ad hoc networksYao-Jen Tang, Jian-Jhih Kuo, Ming-Jer Tsai. 1-8 [doi]
- Leveraging tenant flexibility in resource allocation for virtual networksSheng Zhang, Zhuzhong Qian, Jie Wu, Sanglu Lu. 1-8 [doi]
- Multi-bit sensing based target localization (MSTL) algorithm in wireless sensor networksQuanlong Li, Qing Yang, Shaoen Wu. 1-7 [doi]
- A transport protocol for content-centric networking with explicit congestion controlFeixiong Zhang, Yanyong Zhang, Alex Reznik, Hang Liu, Chen Qian, Chenren Xu. 1-8 [doi]
- VNetMapper: A fast and scalable approach to virtual networks embeddingZoran Despotovic, Artur Hecker, Ahsan Naveed Malik, Riccardo Guerzoni, Ishan Vaishnavi, Riccardo Trivisonno, Sergio Beker. 1-6 [doi]
- Streaming videos over BitTorrent by balancing playback continuity and distribution of piece rarenessChow-Sing Lin, Jhe-Wei Lin. 1-5 [doi]
- A random switching traffic scheduling algorithm in wireless smart grid communication networkSujie Shao, Shao-yong Guo, Xuesong Qiu, Luoming Meng. 1-6 [doi]
- DMCTCP: Desynchronized Multi-Channel TCP for high speed access networks with tiny buffersCheng Cui, Lin Xue, Chui-Hui Chiu, Praveenkumar Kondikoppa, Seung-Jong Park. 1-8 [doi]
- Cache as a service: Leveraging SDN to efficiently and transparently support video-on-demand on the last milePanagiotis Georgopoulos, Matthew Broadbent, Bernhard Plattner, Nicholas J. P. Race. 1-9 [doi]
- An analysis of BitTorrent cross-swarm peer participation and geolocational distributionMark Scanlon, Huijie Shen. 1-6 [doi]
- Dandelion: A locally-high-performance and globally-high-scalability hierarchical data center networkBinzhang Fu, Sheng Xu, Wentao Bao, Guolong Jiang, Mingyu Chen, Lixin Zhang, Yidong Tao, Rui He, Junfeng Zhao. 1-8 [doi]
- Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomalyKun Wen, Jiahai Yang, Fengjuan Cheng, Chenxi Li, Ziyu Wang, Hui Yin. 1-6 [doi]
- A lifetime model of online video popularityLiang Chen, Yipeng Zhou, Dah-Ming Chiu. 1-8 [doi]
- Location aided energy balancing strategy in green cellular networksJianjun Yang, Zongming Fei, Bryson Payne, Le Li, Markus Hitz, Tongquan Wei. 1-6 [doi]
- e-Health PST (privacy, security and trust) mobile networking infrastructureWei Liu, E. K. Park, S. S. Zhu. 1-6 [doi]
- Achieving data K-Availability in intermittently connected sensor networksBin Tang, Neeraj Jaggi, Masaaki Takahashi. 1-8 [doi]
- Channel reservation based on contention and interference in wireless ad hoc networksXinming Zhang, Zhilong Dai, Haitao Zhu. 1-8 [doi]
- Investigating the fractal nature of individual user netflow dataLevi Malott, Sriram Chellappan. 1-6 [doi]
- NDI: Node-dependence-based Dynamic gaming Incentive algorithm in opportunistic networksRuiyun Yu, Pengfei Wang, Zhijie Zhao. 1-8 [doi]
- Utility based optimized cross-layer scheduling for real-time video over HSDPARui Deng, Guizhong Liu, Jian Yang. 1-6 [doi]
- Hybrid opportunistic routing in highly dynamic MANETCherry Ye Aung, Peter Han Joo Chong, Ruo Jun Cai. 1-6 [doi]
- Cost efficient survivable multicast virtual network designDan Liao, Gang Sun, Vishal Anand, Kexiang Xiao, Mao Gan. 1-7 [doi]
- An efficient outdoor localization method for smartphonesAnhua Lin, Jianzhong Zhang 0003, Kai Lu, Wen Zhang. 1-8 [doi]
- One-time symmetric key based cloud supported secure smart meter readingKewei Sha, Chenguang Xu, Zhiwei Wang. 1-6 [doi]
- Greedy-based distributed algorithms for green traffic routingYunlong Song, Min Liu. 1-8 [doi]
- An IEEE 802.11 quantum handshake using the three-stage protocolMayssaa El Rifai, Pramode K. Verma. 1-6 [doi]
- Malicious attacks in Mobile Device Clouds: A data driven risk assessmentAbderrahmen Mtibaa, Khaled A. Harras, Hussein M. Alnuweiri. 1-8 [doi]
- Efficient virtual network optimization across multiple domains without revealing private informationToru Mano, Takeru Inoue, Dai Ikarashi, Koki Hamada, Kimihiro Mizutani, Osamu Akashi. 1-8 [doi]
- A transparent spectrum co-access protocol for cognitive radio networksJonathan D. Backens, Min Song, Chunsheng Xin. 1-8 [doi]
- A wireless sensor network for monitoring smart grid transmission linesZheng Guo, Feng Ye, Jinghong Guo, Yun Liang, Guoliang Xu, Xuping Zhang, Yi Qian. 1-6 [doi]
- Maximizing charging throughput in rechargeable sensor networksXiaojiang Ren, Weifa Liang, Wenzheng Xu. 1-8 [doi]
- Scaling a broadcast domain of Ethernet: Extensible transparent filter using SDNKotaro Kataoka, Nitin Agarwal, Aditya V. Kamath. 1-8 [doi]
- A framework for large-scale modeling and simulation of attacks on an OpenFlow networkJoshua A. Alcorn, C. Edward Chow. 1-6 [doi]
- Preserving the Anonymity in MobilityFirst networksKebina Manandhar, Ben Adcock, Xiaojun Cao. 1-6 [doi]
- Localized routing optimization for multi-access Mobile Nodes in PMIPv6Yan Liu, Xin Xu, Xi Ding, Yong Cui. 1-5 [doi]
- A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based ServicesBen Niu, Qinghua Li, Xiaoyan Zhu, Hui Li. 1-8 [doi]
- A probabilistic approach towards modeling email network with realistic featuresQuangang Li, Jinqiao Shi, Tingwen Liu, Li Guo, Zhiguang Qin. 1-8 [doi]
- Is more P2P always bad for ISPs? An analysis of P2P and ISP business modelsQi Liao, Zhen Li, Aaron Striegel. 1-6 [doi]
- Improving the efficiency of entanglement based quantum key exchangeAbhishek Parakh, Pramode Verma. 1-6 [doi]
- LAS: An effective anti-spoofing method using existing informationBaobao Zhang, Jun Bi, Jianping Wu. 1-8 [doi]
- Topology and migration-aware energy efficient virtual network embedding for green data centersXinjie Guan, Baek-Young Choi, Sejun Song. 1-8 [doi]
- Tualatin: Towards network security service provision in cloud datacentersXiang Wang, Zhi Liu, Jun Li, Baohua Yang, Yaxuan Qi. 1-8 [doi]
- ZET: Zone and energy threshold based clustering routing protocol for Wireless Sensor NetworksZain ul Abidin Jaffri, Yueping Cai. 1-6 [doi]
- The store-and-flood distributed reflective denial of service attackBingshuang Liu, Skyler Berg, Jun Li, Tao Wei, Chao Zhang, Xinhui Han. 1-8 [doi]
- Using multiple unmanned aerial vehicles to maintain connectivity of MANETsMing Zhu, Zhiping Cai, Dong Zhao, Junhui Wang, Ming Xu. 1-7 [doi]
- An effective online scheme for detecting Android malwareShuang Liang, Xiaojiang Du, Chiu Chiang Tan, Wei Yu. 1-8 [doi]
- Software cybernetics to manage adaptation behavior of complex network systemsKaliappa Ravindran. 1-8 [doi]
- Pricing the Internet for congestion control and social welfareJason Richmond, Jinhua Guo. 1-6 [doi]
- Characterization of the Spatial False Alarm effect in Cognitive Radio NetworksAntónio Furtado, Luis Irio, Rodolfo Oliveira, Luis Bernardo, Rui Dinis. 1-8 [doi]
- PASA: Passive broadcast for smartphone ad-hoc networksYing Mao, Jiayin Wang, Joseph Paul Cohen, Bo Sheng. 1-8 [doi]
- Stable wireless link scheduling subject to physical interference with power controlXiaoHua Xu, Min Song. 1-8 [doi]
- QoE loss score value for service migration in context aware environmentAamir Saeed, Jens Myrup Pedersen, Rasmus Løvenstein Olsen. 1-5 [doi]
- A new optimization algorithm for power saving in backbone networksChi-Chung Cheung, Hon-Wai Chu, Sean Shensheng Xu. 1-6 [doi]
- ScalScheduling: A Scalable Scheduling Architecture for MPI-based interactive analysis programsJiangling Yin, Andrew Foran, Xuhong Zhang, Jun Wang. 1-8 [doi]
- An adaptive data aggregation technique for dynamic cluster based Wireless Sensor NetworksRabia Noor Enam, Rehan Qureshi. 1-7 [doi]
- TCAM-based classification using divide-and-conquer for range expansionHai Sun, Yan Lindsay Sun, Victor C. Valgenti, Min Sik Kim. 1-8 [doi]
- DYSWIS: Crowdsourcing a home network diagnosisKyung-Hwa Kim, Hyunwoo Nam, Vishal Kumar Singh, Daniel Song, Henning Schulzrinne. 1-10 [doi]
- Virtual network embedding: An optimal decomposition approachQian Hu, Yang Wang 0016, Xiaojun Cao. 1-6 [doi]
- HSR: Using hybrid source routing to achieve scalable Internet routingDan Wu, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu, Wenlong Chen. 1-8 [doi]
- BalancedBoost: A hybrid approach for real-time network traffic classificationHengyi Wei, Baocheng Sun, Mingming Jing. 1-6 [doi]
- The design and implementation of UAT mode ADS-B signal's RS decoderChaozhu Zhang, Nairui Li. 1-6 [doi]
- Privacy-preserving verifiable incentive mechanism for online crowdsourcing marketsJiajun Sun, Huadong Ma. 1-8 [doi]
- Fast incremental flow table aggregation in SDNShouxi Luo, Hongfang Yu, Lemin Li. 1-8 [doi]
- A measurement study on BGP AS path looping (BAPL) behaviorShenglin Zhang, Ying Liu, Dan Pei. 1-7 [doi]
- Performing software defined route-based IP spoofing filtering with SEFAGuang Yao, Jun Bi, Tao Feng, Peiyao Xiao, Duanqi Zhou. 1-8 [doi]
- Constructing belt-barrier providing β-quality of monitoring with minimum camera sensorsLing Guo, Donghyun Kim, Deying Li, Wenping Chen, Alade O. Tokuta. 1-8 [doi]
- Group key distribution with full-healing propertyYa-nan Liu, Lei Mao, Lein Harn, Yi Wang. 1-6 [doi]
- Context-aware distributed service provisioning based on anycast for information-centric networkSha Yuan, Ding Tang, YinLong Liu, Shuotian Bai, Tao Lin, Song Ci. 1-7 [doi]
- SLA evaluation in cloud-based data-centric distributed servicesKaliappa Ravindran, Michael Iannelli. 1-8 [doi]
- A privacy protection policy combined with privacy homomorphism in the Internet of ThingsGuozi Sun, Siqi Huang, Wan Bao, Yitao Yang, Zhiwei Wang. 1-6 [doi]
- MT-NCOR: A practical optimization method for network coded opportunistic routing in WMNXiang Lan, Sanfeng Zhang. 1-8 [doi]
- Link weights migration without congestion in IP networksXiong Wang, Mengchao Ran. 1-6 [doi]
- Benchmarking big data for trip recommendationKuien Liu, Yaguang Li, Zhiming Ding, Shuo Shang, Kai Zheng. 1-6 [doi]
- MIGDroid: Detecting APP-Repackaging Android malware via method invocation graphWenjun Hu, Jing Tao, Xiaobo Ma, Wenyu Zhou, Shuang Zhao, Ting Han. 1-7 [doi]
- A probabilistic broadcast algorithm based on the connectivity information of predictable rendezvous nodes in mobile ad hoc networksXinming Zhang, Kaiheng Chen, Yue Zhang, Dan Keun Sung. 1-6 [doi]
- Network aware load-balancing via parallel VM migration for data centersKun-Ting Chen, Chien Chen, Po-Hsiang Wang. 1-8 [doi]
- Rate-adaptive broadcast routing and scheduling for video streaming in wireless mesh networksYanan Chang, Xiaohua Jia. 1-8 [doi]
- A taxonomy and comparison of remote voting schemesHuian Li, Abhishek Reddy Kankanala, Xukai Zou. 1-8 [doi]
- Auto bit rate adaptation with transmission failure diagnosis for WLANsShaoen Wu, Saad Biaz. 1-8 [doi]
- TCP congestion control based on accurate bandwidth-delay product in wireless Ad hoc networksXinming Zhang, Bo Yang 0007, Yangyang Ma. 1-7 [doi]
- Characterizing user watching behavior and video quality in mobile devicesChenxi Zhou, Yuchun Guo, Yishuai Chen, Xiaofei Nie, Wei Zhu. 1-6 [doi]
- Scalable area-based hierarchical control plane for software defined information centric networkingShuai Gao, Yujing Zeng, Hongbin Luo, Hongke Zhang. 1-7 [doi]
- Using global research infrastructure with big (commercial) data: Modelling consumer behaviour in ChinaAshley D. Lloyd, P. H. W. Li, Mario Antonioletti, Terence M. Sloan. 1-6 [doi]
- Channel assignment based on conflict-area for reducing interference in large-scale WLANsWenqi Sun, Hewu Li, Jianping Wu. 1-5 [doi]
- Characterizing the utility of smartphone background trafficLei Meng, Shu Liu, Aaron D. Striegel. 1-5 [doi]
- MobiFish: A lightweight anti-phishing scheme for mobile phonesLongfei Wu, Xiaojiang Du, Jie Wu 0001. 1-8 [doi]
- An unknown tag identification protocol based on coded filtering vector in large scale RFID systemsXin Xie, Keqiu Li, Xiulong Liu. 1-8 [doi]
- On pricing schemes in data center network with game theoretic approachHao Wang, Yangming Zhao, Haibing Guan. 1-8 [doi]
- JCCA resource allocation for video transmission in OFDMA relay systemYimin Zhang, Guizhong Liu. 1-7 [doi]
- Cross-layer wireless information securityLixing Song, Shaoen Wu. 1-9 [doi]
- Virtual-topology adaptation for mixed-line-rate optical WDM networks under dynamic trafficDer-Rong Din, Chih Wei Chou. 1-6 [doi]
- Optimal physical carrier sensing to defend against exposed terminal problem in wireless ad hoc networksXinming Zhang, Haitao Zhu, Guoqing Qiu. 1-6 [doi]
- UPMAC: A localized load-adaptive MAC protocol for underwater acoustic networksWenzhe Zhang, Zhenquan Qin, Jiajun Xin, Lei Wang, Ming Zhu, Liang Sun, Lei Shu. 1-8 [doi]
- Hippo: An enhancement of pipeline-aware in-memory caching for HDFSLan Wei, Wenbo Lian, Kuien Liu, Yongji Wang. 1-5 [doi]
- Localization algorithms based on a mobile anchor in wireless sensor networksXinming Zhang, Zhigang Duan, Lei Tao, Dan Keun Sung. 1-6 [doi]
- Optical Wireless authentication for smart devices using an onboard ambient light sensorKaustubh Dhondge, Baek-Young Choi, Sejun Song, Hyungbae Park. 1-8 [doi]
- Intelligent grouping algorithms for regular expressions in deep inspectionZhe Fu, Kai Wang, Liangwei Cai, Jun Li. 1-8 [doi]
- Mobility Assisted Data Gathering in heterogeneous energy replenishable wireless sensor networksJi Li, Yuanyuan Yang, Cong Wang. 1-8 [doi]
- A multi-attribute routing protocol for opportunistic network environmentsSadaf Yasmin, Rao Naveed Bin Rais, Amir Qayyum. 1-6 [doi]
- Performance analysis of practical distributed backpressure protocolsScott T. Rager, Ertugrul Necdet Ciftcioglu, Thomas F. La Porta. 1-8 [doi]
- A new interference model for the IEEE 802.22 cognitive WRANYanxiao Zhao, Md Nashid Anjum, Min Song. 1-8 [doi]
- Sensor placement algorithms for confident information coverage in wireless sensor networksJiajun Zhu, Bang Wang. 1-7 [doi]
- A joint real grassmannian quantization strategy for MIMO interference alignment with limited feedbackWen Wu, Xu Li, Huarui Yin, Guo Wei. 1-6 [doi]
- An Intersection-based Delay sensitive routing for VANETs using ACO algorithmGuangyu Li, Lila Boukhatem. 1-8 [doi]
- Preserving privacy for sensitive values of individuals in data publishing based on a new additive noise approachHong Zhu, Shengli Tian, Meiyi Xie, Mengyuan Yang. 1-6 [doi]
- Adaptive hybrid digital-analog video transmission in wireless mobile networksXiao Zhao, Hancheng Lu. 1-7 [doi]
- Optimal candidate set for opportunistic routing in asynchronous wireless sensor networksXinming Zhang, Fan Yan, Lei Tao, Dan Keun Sung. 1-8 [doi]
- Inapproximability of power allocation with inelastic demands in AC electric systems and networksMajid Khonji, Chi-Kin Chau, Khaled M. Elbassioni. 1-6 [doi]
- An energy efficient algorithm based on multi-topology routing in IP networksLei Xie, Xiaoning Zhang, Sheng Wang. 1-8 [doi]
- An incentive protocol for distributed dynamic P2P video-on-demand streamingWenbin Tang, Xiaowei Wu, T.-H. Hubert Chan. 1-6 [doi]
- LOCON: A lookup-based content-oriented networking frameworkEunsang Cho, Jaeyoung Choi, Donghyun Kim, Jongsoon Yoon, Ted Taekyoung Kwon, Yanghee Choi. 1-8 [doi]
- On the applicability of software defined networking to large scale networksHongbin Luo, Jianbo Cui, Gong Chen, Zhe Chen, Hongke Zhang. 1-6 [doi]
- Lightweight construction of the information potential field in wireless sensor networksJunzhao Du, Sicong Liu, Chi Xu, Kai Wang, Hui Liu, Kewei Sha. 1-8 [doi]
- Dynamic embedding of virtual networks in hybrid optical-electrical datacentersSoumya Hegde, Raksha Srinivas, Dinil Mon Divakaran, Mohan Gurusamy. 1-8 [doi]
- Resource allocation for intercell device-to-device communication underlaying cellular network: A game-theoretic approachJun Huang, Yanxiao Zhao, Kazem Sohraby. 1-8 [doi]
- Estimation of the cost of VM migrationWaltenegus Dargie. 1-8 [doi]
- Supporting application-based route selectionXiongqi Wu, James Griffioen. 1-8 [doi]
- Feedback-based smartphone strategic sampling for BYOD securityFeng Li, Chin-Tser Huang, Jie Huang, Wei Peng. 1-8 [doi]
- Keynote speakers: Big data science and social networks - Accelerating insights and building valueAlok N. Choudhary, John C. S. Lui, Keith Ross. 1-3 [doi]
- Fine-grained Forward Prediction based Dynamic Packet Scheduling Mechanism for multipath TCP in lossy networksDan Ni, Kaiping Xue, Peilin Hong, Sean Shen. 1-7 [doi]
- Congestion exposure enabled TCP with network coding for hybrid wired-wireless networkHong Zhang, Kaiping Xue, Peilin Hong, Sean Shen. 1-8 [doi]
- SECOMPAX: A bitmap index compression algorithmYuhao Wen, Zhen Chen, Ge Ma, Junwei Cao, Wenxun Zheng, Guodong Peng, Shiwei Li, Wen-Liang Huang. 1-7 [doi]
- A solution for IP mobility support in software defined networksYou Wang, Jun Bi. 1-8 [doi]
- A security protocol for wireless sensor networks designed for monitoring smart grid transmission linesSucheng Fan, Feng Ye, Jinghong Guo, Yun Liang, Guoliang Xu, Xuping Zhang, Yi Qian. 1-7 [doi]
- Age-based cooperative caching in information-centric networkingZhongxing Ming, Mingwei Xu, Dan Wang. 1-8 [doi]
- MicroEye: Visual summary of microblogsphere from the eye of celebritiesQingsong Liu, Yifan Hu. 1-6 [doi]
- Placement of rechargeable routers based on proportional fairness in green mesh networksXiaoli Huan, Bang Wang, Yijun Mo. 1-8 [doi]
- E-DARWIN: Energy Aware Disaster Recovery Network using WiFi TetheringMayank Raj, Krishna Kant, Sajal K. Das. 1-8 [doi]
- Review of energy aware big data computing measurements, benchmark methods and performance analysisZane Wei, Da Qi Ren. 1-4 [doi]
- Transient magnetic field formulation for solid source conductors with axial symmetryGeorg Wimmer. 1-4 [doi]
- Smart error estimating coding: Using symbol error structure in wireless networksJia Lu, Biao Han, Wei Yang, Yuanming Gao, Wenhua Dou. 1-7 [doi]
- Centaur: Dynamic message dissemination over online social networksShen Li, Lu Su, Yerzhan Suleimenov, Hengchang Liu, Tarek F. Abdelzaher, Guihai Chen. 1-8 [doi]