Abstract is missing.
- An Intelligent IT Infrastructure for the FuturePrith Banerjee. 1 [doi]
- Heavy Tails and Models for the Web and Social NetworksPrabhakar Raghavan. 2 [doi]
- Data Structures and Algorithms for Packet Forwarding and Classification: Prof. A.K. Choudhury Memorial LectureSartaj Sahni. 3 [doi]
- Spoken Web: A Parallel Web for the Masses: Industry KeynoteManish Gupta. 4 [doi]
- India s Mobile Revolution and the Unfinished Tasks: Invited LectureAshok Jhunjhunwala. 5 [doi]
- Scheduling in Multi-Channel Wireless NetworksVartika Bhandari, Nitin H. Vaidya. 6-17 [doi]
- Email Shape AnalysisPaul Sroufe, Santi Phithakkitnukoon, Ram Dantu, João W. Cangussu. 18-29 [doi]
- Maintaining Safety in Interdomain Routing with Hierarchical Path-CategoriesJorge Arturo Cobb. 30-41 [doi]
- On Communication Complexity of Secure Message Transmission in Directed NetworksArpita Patra, Ashish Choudhary, C. Pandu Rangan. 42-53 [doi]
- On Composability of Reliable Unicast and BroadcastAnuj Gupta, Sandeep Hans, Kannan Srinathan, C. Pandu Rangan. 54-66 [doi]
- A Leader-Free Byzantine Consensus AlgorithmFatemeh Borran, André Schiper. 67-78 [doi]
- Authenticated Byzantine Generals in Dual Failure ModelAnuj Gupta, Prasant Gopal, Piyush Bansal, Kannan Srinathan. 79-91 [doi]
- Mission-Oriented ::::k::::-Coverage in Mobile Wireless Sensor NetworksHabib M. Ammari, Sajal K. Das. 92-103 [doi]
- Lessons from the Sparse Sensor Network Deployment in Rural IndiaTamma V. Prabhakar, H. S. Jamadagni, Amar Sahu, R. Venkatesha Prasad. 104-115 [doi]
- A New Architecture for Hierarchical Sensor Networks with Mobile Data CollectorsAtaul Bari, Ying Chen, Arunita Jaekel, Subir Bandyopadhyay. 116-127 [doi]
- Stability Analysis of Multi-hop Routing in Sensor Networks with Mobile SinksJayanthi Rao, Subir K. Biswas. 128-141 [doi]
- Optimizing Distributed Computing Workflows in Heterogeneous Network EnvironmentsYi Gu, Qishi Wu. 142-154 [doi]
- Radio Network Distributed Algorithms in the Unknown Neighborhood ModelBilel Derbel, El-Ghazali Talbi. 155-166 [doi]
- Probabilistic Self-stabilizing Vertex Coloring in Unidirectional Anonymous NetworksSamuel Bernard, Stéphane Devismes, Katy Paroux, Maria Potop-Butucaru, Sébastien Tixeuil. 167-177 [doi]
- A Token-Based Solution to the Group Mutual l-Exclusion Problem in Message Passing Distributed SystemsAbhishek Swaroop, Awadhesh Kumar Singh. 178-183 [doi]
- The Weak Network Tracing ProblemHrishikesh B. Acharya, Mohamed G. Gouda. 184-194 [doi]
- Poisoning the Kad NetworkThomas Locher, David Mysicka, Stefan Schmid, Roger Wattenhofer. 195-206 [doi]
- Credit Reputation Propagation: A Strategy to Curb Free-Riding in a Large BitTorrent SwarmSuman Paul, Subrata Nandi, Ajit Pal. 207-218 [doi]
- Formal Understanding of the Emergence of Superpeer Networks: A Complex Network ApproachBivas Mitra, Abhishek Kumar Dubey, Sujoy Ghose, Niloy Ganguly. 219-230 [doi]
- Parallelization of the Lanczos Algorithm on Multi-core PlatformsSouvik Bhattacherjee, Abhijit Das. 231-241 [doi]
- Supporting Malleability in Parallel Architectures with Dynamic CPUSETsMapping and Dynamic MPIMárcia C. Cera, Yiannis Georgiou, Olivier Richard, Nicolas Maillard, Philippe Olivier Alexandre Navaux. 242-257 [doi]
- Impact of Object Operations and Relationships on Concurrency Control in DOOSV. Geetha, Niladhuri Sreenath. 258-264 [doi]
- Causal Cycle Based Communication Pattern MatchingHimadri Sekhar Paul. 265-270 [doi]
- Channel Assignment in Virtual Cut-through Switching Based Wireless Mesh NetworksDola Saha, Aveek Dutta, Dirk Grunwald, Douglas C. Sicker. 271-282 [doi]
- Efficient Multi-hop Broadcasting in Wireless Networks Using ::::k::::-Shortest Path PruningMichael Q. Rieck, Subhankar Dhar. 283-294 [doi]
- Bandwidth Provisioning in Infrastructure-Based Wireless Networks Employing Directional AntennasShiva Prasad Kasiviswanathan, Bo Zhao, Sudarshan Vasudevan, Bhuvan Urgaonkar. 295-306 [doi]
- ROTIO+: A Modified ROTIO for Nested Network MobilityAnsuman Sircar, Bhaskar Sardar, Debashis Saha. 307-322 [doi]
- VirtualConnection: Opportunistic Networking for Web on DemandLateef Yusuf, Umakishore Ramachandran. 323-340 [doi]
- Video Surveillance with PTZ Cameras: The Problem of Maximizing Effective Monitoring TimeSatyajit Banerjee, Atish Datta Chowdhury, Subhas Kumar Ghosh. 341-352 [doi]
- DisClus: A Distributed Clustering Technique over High Resolution Satellite DataSauravjyoti Sarmah, Dhruba Kumar Bhattacharyya. 353-364 [doi]
- Performance Evaluation of a Wormhole-Routed Algorithm for Irregular Mesh NoC InterconnectArshin Rezazadeh, Ladan Momeni, Mahmood Fathy. 365-375 [doi]
- Dynamic Multipath Bandwidth Provisioning with Jitter, Throughput, SLA Constraints in MPLS over WDM NetworkPalash Dey, Arkadeep Kundu, Mrinal K. Naskar, Amitava Mukherjee, Mita Nasipuri. 376-391 [doi]
- Path Protection in Translucent WDM Optical NetworksQuazi Rahman, Subir Bandyopadhyay, Ataul Bari, Arunita Jaekel, Yash P. Aneja. 392-403 [doi]
- Post Deployment Planning of 3G Cellular Networks through Dual Homing of NodeBsSamir K. Sadhukhan, Swarup Mandal, Partha Bhaumik, Debashis Saha. 404-419 [doi]
- K-Directory Community: Reliable Service Discovery in MANETVaskar Raychoudhury, Jiannong Cao, Weigang Wu, Yi Lai, Canfeng Chen, Jian Ma. 420-433 [doi]
- An Online, Derivative-Free Optimization Approach to Auto-tuning of Computing SystemsSudheer Poojary, Ramya Raghavendra, D. Manjunath. 434-445 [doi]
- Consistency-Driven Probabilistic Quorum System Construction for Improving Operation AvailabilityKinga Kiss Iakab, Christian Storm, Oliver E. Theel. 446-458 [doi]
- Hamiltonicity of a General OTIS NetworkNagendra Kumar, Rajeev Kumar, Dheeresh K. Mallick, Prasanta K. Jana. 459-465 [doi]
- Specifying Fault-Tolerance Using Split Precondition LogicAwadhesh Kumar Singh, Anup Kumar Bandyopadhyay. 466-472 [doi]
- Fast BGP Convergence Following Link/Router FailureSwapan Kumar Ray, Susmit Shannigrahi. 473-484 [doi]
- On Using Network Tomography for Overlay AvailabilityUmesh Bellur, Mahak Patidar. 485-496 [doi]
- QoSBR: A Quality Based Routing Protocol for Wireless Mesh NetworksAmitangshu Pal, Sandeep Adimadhyam, Asis Nasipuri. 497-508 [doi]
- An ACO Based Approach for Detection of an Optimal Attack Path in a Dynamic EnvironmentNirnay Ghosh, Saurav Nanda, S. K. Ghosh. 509-520 [doi]