Abstract is missing.
- Multicast Algorithms for Multi-Channel Wireless Mesh NetworksGuo-Kai Zeng, Bo Wang, Yong Ding, Li Xiao, Matt W. Mutka. 1-10 [doi]
- Throughput Maximization in Multi-channel Wireless Mesh Access NetworksYang Song, Chi Zhang, Yuguang Fang. 11-20 [doi]
- Identifying High Throughput Paths in 802.11 Mesh Networks: a Model-based ApproachTheodoros Salonidis, Michele Garetto, A. Saha, Edward W. Knightly. 21-30 [doi]
- Cooperation Between Stations in Wireless NetworksAndrea G. Forte, Henning Schulzrinne. 31-40 [doi]
- A Probabilistic Coverage Protocol for Wireless Sensor NetworksMohamed Hefeeda, H. Ahmadi. 41-50 [doi]
- Coverage Without Location InformationOssama Younis, Marwan Krunz, Srinivasan Ramasubramanian. 51-60 [doi]
- Slotted Scheduled Tag Access in Multi-Reader RFID SystemsZongheng Zhou, Himanshu Gupta, Samir R. Das, Xianjin Zhu. 61-70 [doi]
- Greedy Virtual Coordinates for Geographic RoutingBen Leong, Barbara Liskov, Robert Morris. 71-80 [doi]
- Understanding Route RedistributionFranck Le, Geoffrey G. Xie, Hui Zhang. 81-92 [doi]
- Inferring the Origin of Routing Changes using Link WeightsMohit Lad, Ricardo V. Oliveira, Daniel Massey, Lixia Zhang. 93-102 [doi]
- Geographically Informed Inter-Domain RoutingRicardo V. Oliveira, Mohit Lad, Beichuan Zhang, Lixia Zhang. 103-112 [doi]
- Lexicographic products in metaroutingAlexander J. T. Gurney, Timothy G. Griffin. 113-122 [doi]
- PSM-throttling: Minimizing Energy Consumption for Bulk Data Communications in WLANsEnhua Tan, Lei Guo, Songqing Chen, Xiaodong Zhang. 123-132 [doi]
- Traffic-Aware Channel Assignment in Enterprise Wireless LANsEric Rozner, Yogita Mehta, Aditya Akella, Lili Qiu. 133-143 [doi]
- Adaptive Optimization of Rate Adaptation Algorithms in Multi-Rate WLANsJaehyuk Choi, Jongkeun Na, Kihong Park, Chong-kwon Kim. 144-153 [doi]
- Scheduled PSM for Minimizing Energy in Wireless LANsYong He, Ruixi Yuan, Xiaojun Ma, Jun Li, C. Wang. 154-163 [doi]
- Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic WormsZhichun Li, Lanjia Wang, Yan Chen, Zhi Fu. 164-173 [doi]
- A Poisoning-Resilient TCP StackAmit Mondal, Aleksandar Kuzmanovic. 174-183 [doi]
- Routing amid Colluding AttackersJakob Eriksson, Michalis Faloutsos, Srikanth V. Krishnamurthy. 184-193 [doi]
- Loss and Delay Accountability for the InternetKaterina J. Argyraki, Petros Maniatis, O. Irzak, S. Ashish, Scott Shenker. 194-205 [doi]
- Improving the Convergence and Stability of Congestion Control AlgorithmXiaomeng Huang, Chuang Lin, Fengyuan Ren, Guangwen Yang, Peter D. Ungsunan, Yuanzhuo Wang. 206-215 [doi]
- TFRC Veno: An Enhancement of TCP Friendly Rate Control over Wired/Wireless NetworksBin Zhou, Cheng Peng Fu, Victor O. K. Li. 216-225 [doi]
- A Simple Model for Analyzing P2P Streaming ProtocolsYipeng Zhou, Dah-Ming Chiu, John C. S. Lui. 226-235 [doi]
- Best Effort Session-Level Congestion ControlS. Ramesh, Sneha Kumar Kasera. 236-245 [doi]
- HEXA: Compact Data Structures for Faster Packet ProcessingSailesh Kumar, Jonathan S. Turner, Patrick Crowley, Michael Mitzenmacher. 246-255 [doi]
- A Performance Study of Loss Detection/Recovery in Real-world TCP ImplementationsSushant Rewaskar, Jasleen Kaur, F. Donelson Smith. 256-265 [doi]
- TCAM Razor: A Systematic Approach Towards Minimizing Packet Classifiers in TCAMsChad R. Meiners, Alex X. Liu, Eric Torng. 266-275 [doi]
- Source Address Validation: Architecture and Protocol DesignJianping Wu, Gang Ren, Xing Li. 276-283 [doi]
- Design and Implementation of Cross-Domain Cooperative FirewallJerry Cheng, Hao Yang, Starsky H. Y. Wong, Petros Zerfos, Songwu Lu. 284-293 [doi]
- FireCracker: A Framework for Inferring Firewall Policies using Smart ProbingTaghrid Samak, Adel El-Atawy, Ehab Al-Shaer. 294-303 [doi]
- ALARM: Anonymous Location-Aided Routing in Suspicious MANETsKarim M. El Defrawy, Gene Tsudik. 304-313 [doi]
- Location Privacy in Sensor Networks Against a Global EavesdropperK. Mehta, Donggang Liu, M. Wright. 314-323 [doi]
- PL-Gossip: Area Hierarchy Maintenance in Large-Scale Wireless Sensor NetworksKonrad Iwanicki, Maarten van Steen. 324-325 [doi]
- Towards Coding-Efficient Link-Scheduling and Coding-Aware Routing in Wireless NetworksJilin Le, John C. S. Lui, Dah-Ming Chiu. 326-327 [doi]
- Supporting VCR in Peer-to-Peer Video-On-DemandYuan He, Yunhao Liu. 328-329 [doi]
- FRASA: Feedback Retransmission Approximation for the Stability Region of Finite-User Slotted ALOHAKa-Hung Hui, On-Ching Yue, Wing Cheong Lau. 330-331 [doi]
- Price of Asynchrony: Queuing under Ideally Smooth Congestion ControlMaxim Podlesny, Sergey Gorinsky. 332-333 [doi]
- Distributed Delay Estimation and Call Admission Control in IEEE 802.11 WLANsK. Yasukawa, Andrea G. Forte, Henning Schulzrinne. 334-335 [doi]
- Network Court Protocol and Malicious Node ConvictionNa Li, David Lee. 336-337 [doi]
- A Game Theoretic Framework of Distributed Power and Rate Control in IEEE 802.11 WLANsLin Chen, Jean Leneutre. 338-339 [doi]
- A Lightweight Online Network Anomaly Detection Scheme Based on Data Mining MethodsYang Li, Binxing Fang. 340-341 [doi]
- An Entropy-Based Throughput Metric for Fairly Evaluating WSN Routing ProtocolsT. Al-khdour, Uthman A. Baroudi. 342-343 [doi]