Abstract is missing.
- Ethernet on AIR : Scalable Routing in very Large Ethernet-Based NetworksDhananjay Sampath, Suchit Agarwal, J. J. Garcia-Luna-Aceves. 1-9 [doi]
- Deployment of a Reinforcement Backbone Network with Constraints of Connection and ResourcesPeng Wei, Shan Chu, Xin Wang, Yu Zhou. 10-19 [doi]
- Phase Plane Analysis of Congestion Control in Data Center Ethernet NetworksFengyuan Ren, Wanchun Jiang. 20-29 [doi]
- 3DLoc: Three Dimensional Wireless Localization ToolkitJizhi Wang, Yinjie Chen, Xinwen Fu, Jie Wang, Wei Yu, Nan Zhang 0004. 30-39 [doi]
- Design and Analysis of a New GPS AlgorithmWei Li, Deng Li, Shuhui Yang, Zhiwei Xu, Wei Zhao. 40-51 [doi]
- ASAP: Scalable Identification and Counting for Contactless RFID SystemsChen Qian, Yunhuai Liu, Hoilun Ngan, Lionel M. Ni. 52-61 [doi]
- Mistral: Dynamically Managing Power, Performance, and Adaptation Cost in Cloud InfrastructuresGueyoung Jung, Matti A. Hiltunen, Kaustubh R. Joshi, Richard D. Schlichting, Calton Pu. 62-73 [doi]
- Nefeli: Hint-Based Execution of Workloads in CloudsKonstantinos Tsakalozos, Mema Roussopoulos, Vangelis Floros, Alex Delis. 74-85 [doi]
- ARiA: A Protocol for Dynamic Fully Distributed Grid Meta-schedulingAmos Brocco, Apostolos Malatras, Ye Huang, Béat Hirsbrunner. 86-95 [doi]
- Stochastic Steepest-Descent Optimization of Multiple-Objective Mobile Sensor CoverageChris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Nageswara S. V. Rao, Jiming Chen. 96-105 [doi]
- Distributed Coverage in Wireless Ad Hoc and Sensor Networks by Topological Graph ApproachesDezun Dong, Yunhao Liu, Kebin Liu, Xiangke Liao. 106-115 [doi]
- Link-Centric Probabilistic Coverage Model for Transceiver-Free Object Detection in Wireless NetworksDian Zhang, Yunhuai Liu, Lionel M. Ni. 116-125 [doi]
- StreamCloud: A Large Scale Data Streaming SystemVincenzo Gulisano, Ricardo Jiménez-Peris, Marta Patiño-Martínez, Patrick Valduriez. 126-137 [doi]
- A Hybrid Approach to High Availability in Stream Processing SystemsZhe Zhang, Yu Gu, Fan Ye, Hao Yang, Minkyong Kim, Hui Lei, Zhen Liu. 138-148 [doi]
- Efficient and Progressive Algorithms for Distributed Skyline Queries over Uncertain DataXiaofeng Ding, Hai Jin. 149-158 [doi]
- Reliability Calculus: A Theoretical Framework to Analyze Communication ReliabilityWenbo He, Xue Liu, Long Zheng, Hao Yang. 159-168 [doi]
- Resource Allocation in Distributed Mixed-Criticality Cyber-Physical SystemsKarthik Lakshmanan, Dionisio de Niz, Ragunathan Rajkumar, Gabriel Moreno. 169-178 [doi]
- Optimizing the Spatio-temporal Distribution of Cyber-Physical Systems for Environment AbstractionLinghe Kong, Dawei Jiang, Min-You Wu. 179-188 [doi]
- CONTRACT: Incorporating Coordination into the IP Network Control PlaneZheng Cai, Florin Dinu, Jie Zheng, Alan L. Cox, T. S. Eugene Ng. 189-198 [doi]
- Does Link Scheduling Matter on Long Paths?Jörg Liebeherr, Yashar Ghiassi-Farrokhfal, Almut Burchard. 199-208 [doi]
- CacheCast: Eliminating Redundant Link Traffic for Single Source Multiple Destination TransfersPiotr Srebrny, Thomas Plagemann, Vera Goebel, Andreas Mauthe. 209-220 [doi]
- Guaranteeing BGP Stability with a Few Extra PathsRachit Agarwal, Virajith Jalaparti, Matthew Caesar, Brighten Godfrey. 221-230 [doi]
- ESCUDO: A Fine-Grained Protection Model for Web BrowsersKarthick Jayaraman, Wenliang Du, Balamurugan Rajagopalan, Steve J. Chapin. 231-240 [doi]
- Are Your Hosts Trading or Plotting? Telling P2P File-Sharing and Bots ApartTing-Fang Yen, Michael K. Reiter. 241-252 [doi]
- Secure Ranked Keyword Search over Encrypted Cloud DataCong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou. 253-262 [doi]
- Practical Robust Communication in DHTs Tolerating a Byzantine AdversaryMaxwell Young, Aniket Kate, Ian Goldberg, Martin Karsten. 263-272 [doi]
- A New Buffer Cache Design Exploiting Both Temporal and Content LocalitiesJin Ren, Qing Yang. 273-282 [doi]
- A Spinning Join That Does Not Get DizzyPhilip Werner Frey, Romulo Goncalves, Martin L. Kersten, Jens Teubner. 283-292 [doi]
- RoLo: A Rotated Logging Storage Architecture for Enterprise Data CentersYinliang Yue, Lei Tian, Hong Jiang, Fang Wang, Dan Feng, Quan Zhang, Pan Zeng. 293-304 [doi]
- New Algorithms for Planning Bulk Transfer via Internet and Shipping NetworksBrian Cho, Indranil Gupta. 305-314 [doi]
- Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in ChinaJong Chun Park, Jedidiah R. Crandall. 315-326 [doi]
- FLoc : Dependable Link Access for Legitimate Traffic in Flooding AttacksSoo Bum Lee, Virgil D. Gligor. 327-338 [doi]
- Analyzing Self-Defense Investments in Internet Security under Cyber-Insurance CoverageRanjan Pal, Leana Golubchik. 339-347 [doi]
- Existence Theorems and Approximation Algorithms for Generalized Network Security GamesV. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun, Ravi Sundaram. 348-357 [doi]
- Design of Non-orthogonal Multi-channel Sensor NetworksXing Xu, Ji Luo, Qian Zhang. 358-367 [doi]
- An Efficient Algorithm for Cut Vertex Detection in Wireless Sensor NetworksShuguang Xiong, Jianzhong Li. 368-377 [doi]
- Adaptive Sampling and Diversity Reception in Multi-hop Wireless Audio Sensor NetworksHong Luo, Jinge Wang, Yan Sun, Huadong Ma, Xiang-Yang Li. 378-387 [doi]
- Versatile Stack Management for Multitasking Sensor NetworksRui Chu, Lin Gu, Yunhao Liu, Mo Li, Xicheng Lu. 388-397 [doi]
- Complexity Analysis of Weak MultitoleranceJingshu Chen, Sandeep Kulkarni. 398-407 [doi]
- Message-Efficient Byzantine Fault-Tolerant Broadcast in a Multi-hop Wireless Sensor NetworkMarin Bertier, Anne-Marie Kermarrec, Guang Tan. 408-417 [doi]
- Fault-Containing Self-Stabilization in Asynchronous Systems with Constant Fault-GapSven Köhler, Volker Turau. 418-427 [doi]
- Adaptive Jamming-Resistant Broadcast Systems with Partial Channel SharingQi Dong, Donggang Liu. 428-437 [doi]
- How Wireless Power Charging Technology Affects Sensor Network Deployment and RoutingBin Tong, Zi Li, Guiling Wang, Wensheng Zhang. 438-447 [doi]
- Distributed Construction of Connected Dominating Sets with Minimum Routing Cost in Wireless NetworksLing Ding, Xiaofeng Gao, Weili Wu, Wonjun Lee, Xu Zhu, Ding-Zhu Du. 448-457 [doi]
- Opportunistic Routing for Interactive Traffic in Wireless NetworksTianji Li, Douglas J. Leith, Lili Qiu. 458-467 [doi]
- E-SmallTalker: A Distributed Mobile System for Social Networking in Physical ProximityZhimin Yang, Boying Zhang, Jiangpeng Dai, Adam C. Champion, Dong Xuan, Du Li. 468-477 [doi]
- Fingerprinting Mobile User Positions in Sensor NetworksMo Li, Xiaoye Jiang, Leonidas J. Guibas. 478-487 [doi]
- Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish IndividualsAlessandro Mei, Julinda Stefa. 488-497 [doi]
- Resource Allocation with Supply Adjustment in Distributed Computing SystemsAmir Danak, Shie Mannor. 498-506 [doi]
- Distributed Gateway Placement for Cost Minimization in Wireless Mesh NetworksXiaoHua Xu, ShaoJie Tang, Xufei Mao, Xiang-Yang Li. 507-515 [doi]
- Efficient Workstealing for Multicore Event-Driven SystemsFabien Gaud, Sylvain Geneves, Renaud Lachaize, Baptiste Lepers, Fabien Mottet, Gilles Muller, Vivien Quéma. 516-525 [doi]
- On Achieving Maximum Secure Throughput Using Network Coding against Wiretap AttackXiangmao Chang, Jin Wang, Jianping Wang, Victor Lee, Kejie Lu, Yixian Yang. 526-535 [doi]
- LT Network CodesMary-Luc Champel, Kévin Huguenin, Anne-Marie Kermarrec, Nicolas Le Scouarnec. 536-546 [doi]
- Using Analog Network Coding to Improve the RFID Reading ThroughputMing Zhang, Tao Li, Shigang Chen, Bo Li. 547-556 [doi]
- TSF: Trajectory-Based Statistical Forwarding for Infrastructure-to-Vehicle Data Delivery in Vehicular NetworksJaehoon Jeong, Shuo Guo, Yu Gu, Tian He, David H. C. Du. 557-566 [doi]
- When Transportation Meets Communication: V2P over VANETsNianbo Liu, Ming Liu, Jiannong Cao, Guihai Chen, Wei Lou. 567-576 [doi]
- Safe and Stabilizing Distributed Cellular FlowsTaylor Johnson, Sayan Mitra, Karthik Manamcheri. 577-586 [doi]
- P2P Streaming Capacity under Node Degree BoundShao Liu, Minghua Chen, Sudipta Sengupta, Mung Chiang, Jin Li, Philip A. Chou. 587-598 [doi]
- Replica Placement in P2P Storage: Complexity and Game Theoretic AnalysesKrzysztof Rzadca, Anwitaman Datta, Sonja Buchegger. 599-609 [doi]
- Understanding and Improving Ratio Incentives in Private CommunitiesZhengye Liu, Prithula Dhungel, Di Wu, Chao Zhang, Keith W. Ross. 610-621 [doi]
- Divide and Conquer Algorithms for Publish/Subscribe Overlay DesignChen Chen, Hans-Arno Jacobsen, Roman Vitenberg. 622-633 [doi]
- B-SUB: A Practical Bloom-Filter-Based Publish-Subscribe System for Human NetworksYaxiong Zhao, Jie Wu. 634-643 [doi]
- Parameterized Maximum and Average Degree Approximation in Topic-Based Publish-Subscribe Overlay Network DesignMelih Onus, Andréa W. Richa. 644-652 [doi]
- Publisher Placement Algorithms in Content-Based Publish/SubscribeAlex King Yeung Cheung, Hans-Arno Jacobsen. 653-664 [doi]
- DISCO: Memory Efficient and Accurate Flow Statistics for Network MeasurementChengchen Hu, Bin Liu, Hongbo Zhao, Kai Chen, Yan Chen, Chunming Wu, Yu Cheng. 665-674 [doi]
- Minimizing Probing Cost and Achieving Identifiability in Network Link MonitoringQiang Zheng, Guohong Cao. 675-684 [doi]
- Sifting through Network Data to Cull Activity Patterns with HEAPsEsam Sharafuddin, Yu Jin, Nan Jiang, Zhi-Li Zhang. 685-696 [doi]
- Adam2: Reliable Distribution Estimation in Decentralised EnvironmentsJan Sacha, Jeff Napper, Corina Stratan, Guillaume Pierre. 697-707 [doi]
- Distributed Node Coloring in the SINR ModelBilel Derbel, El-Ghazali Talbi. 708-717 [doi]
- Stabilizing Locally Maximizable Tasks in Unidirectional Networks Is HardToshimitsu Masuzawa, Sébastien Tixeuil. 718-727 [doi]
- Towards Power-Sensitive Communication on a Multiple-Access ChannelGianluca De Marco, Dariusz R. Kowalski. 728-735 [doi]
- Projection and Division: Linear-Space Verification of FirewallsHrishikesh B. Acharya, Mohamed G. Gouda. 736-743 [doi]
- Localized Algorithm for Precise Boundary Detection in 3D Wireless NetworksHongyu Zhou, Su-Xia, Miao Jin, Hongyi Wu. 744-753 [doi]
- Duty-Cycle-Aware Minimum Latency Broadcast Scheduling in Multi-hop Wireless NetworksXianlong Jiao, Wei Lou, Junchao Ma, Jiannong Cao, Xiaodong Wang, Xingming Zhou. 754-763 [doi]
- On the Impact of MIMO Diversity on Higher Layer PerformanceEce Gelal, Konstantinos Pelechrinis, Ioannis Broustis, Srikanth V. Krishnamurthy, Saif K. Mohammed, Ananthanarayanan Chockalingam, Sneha Kumar Kasera. 764-773 [doi]
- Multi-dimensional Conflict Graph Based Computing for Optimal Capacity in MR-MC Wireless NetworksHongkun Li, Yu Cheng, Chi Zhou, Peng-Jun Wan. 774-783 [doi]
- Sentomist: Unveiling Transient Sensor Network Bugs via Symptom MiningYangfan Zhou, Xinyu Chen, Michael R. Lyu, Jiangchuan Liu. 784-794 [doi]
- Visual, Log-Based Causal Tracing for Performance Debugging of MapReduce SystemsJiaqi Tan, Soila Kavulya, Rajeev Gandhi, Priya Narasimhan. 795-806 [doi]
- Sketch-Based Streaming PCA Algorithm for Network-Wide Traffic Anomaly DetectionYang Liu, Linfeng Zhang, Yong Guan. 807-816 [doi]
- Quantifying and Querying Network ReachabilityAmir R. Khakpour, Alex X. Liu. 817-826 [doi]
- An Energy-Efficient Distributed Algorithm for Minimum-Latency Aggregation Scheduling in Wireless Sensor NetworksYingshu Li, Longjiang Guo, Sushil K. Prasad. 827-836 [doi]
- Bounding Communication Delay in Energy Harvesting Sensor NetworksYu Gu, Tian He. 837-847 [doi]
- Capacity Scaling in Mobile Wireless Ad Hoc Network with Infrastructure SupportWentao Huang, Xinbing Wang, Qian Zhang. 848-857 [doi]
- Extracting More Capacity from Multi-channel Multi-radio Wireless Networks by Exploiting PowerDevu Manikantan Shila, Yu Cheng, Tricha Anjali, Peng-Jun Wan. 858-867 [doi]