Abstract is missing.
- Routing in max-min fair networks: A game theoretic approachDejun Yang, Guoliang Xue, Xi Fang, Satyajayant Misra, Jin Zhang. 1-10 [doi]
- Message from the technical program committee chairsSonia Fahmy, Toru Hasegawa. 1-2 [doi]
- Message from the General Co-ChairsTeruo Higashino, Kenji Suzuki. 1-2 [doi]
- Impairment-aware path selection and regenerator placement in translucent optical networksFernando A. Kuipers, Anteneh Beshir, Ariel Orda, Piet Van Mieghem. 11-20 [doi]
- GreenTE: Power-aware traffic engineeringMingui Zhang, Cheng Yi, Bin Liu, Beichuan Zhang. 21-30 [doi]
- Fast routing table lookup based on deterministic multi-hashingZhuo Huang, David Lin, Jih-Kwon Peir, Shigang Chen, S. M. Iftekharul Alam. 31-40 [doi]
- Practical Virtual Coordinates for large wireless sensor networksJiangwei Zhou, Yu Chen, Ben Leong, Boqin Feng. 41-51 [doi]
- Passive interference measurement in Wireless Sensor NetworksShucheng Liu, Guoliang Xing, Hongwei Zhang, Jianping Wang, Jun Huang, Mo Sha, Liusheng Huang. 52-61 [doi]
- ETOC: Obtaining robustness in component-based localizationXiaoping Wang, Yunhao Liu, Zheng Yang, Junliang Liu, Jun Luo. 62-71 [doi]
- UVOC-MAC: A MAC protocol for outdoor ultraviolet networksYiyang Li, Jianxia Ning, Zhengyuan Xu, Srikanth V. Krishnamurthy, Gang Chen. 72-81 [doi]
- Granting silence to avoid wireless collisionsJung Il Choi, Mayank Jain, Maria A. Kazandjieva, Philip Levis. 82-91 [doi]
- Network Coding aware Rate Selection in multi-rate IEEE 802.11Raju Kumar, Srikar Tati, Felipe de Mello, Srikanth V. Krishnamurthy, Thomas F. La Porta. 92-102 [doi]
- Neighbor-specific BGP: An algebraic explorationAlexander J. T. Gurney, Timothy G. Griffin. 103-112 [doi]
- Assigning AS relationships to satisfy the Gao-Rexford conditionsLuca Cittadini, Giuseppe Di Battista, Thomas Erlebach, Maurizio Patrignani, Massimo Rimondini. 113-123 [doi]
- A new VPN routing approach for large scale networksZied Ben-Houidi, Mickael Meulle. 124-133 [doi]
- TowerDefense: Deployment strategies for battling against IP prefix hijackingTongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun Xu. 134-143 [doi]
- Identifying suspicious activities through DNS failure graph analysisNan Jiang, Jin Cao, Yu Jin, Erran L. Li, Zhi-Li Zhang. 144-153 [doi]
- Identification-free batch authentication for RFID tagsLei Yang, Jinsong Han, Yong Qi, Yunhao Liu. 154-163 [doi]
- Authentication and authorization protocol security property analysis with trace inclusion transformation and online minimizationYating Hsu, David Lee. 164-173 [doi]
- Firewall modules and modular firewallsHrishikesh B. Acharya, Aditya Joshi, Mohamed G. Gouda. 174-182 [doi]
- DOTS: A propagation Delay-aware Opportunistic MAC protocol for underwater sensor networksYoungtae Noh, Paul Wang, Uichin Lee, Dustin Torres, Mario Gerla. 183-192 [doi]
- On exploiting transient contact patterns for data forwarding in Delay Tolerant NetworksWei Gao, Guohong Cao. 193-202 [doi]
- RELICS: In-network realization of incentives to combat selfishness in DTNsMd. Yusuf Sarwar Uddin, Brighten Godfrey, Tarek F. Abdelzaher. 203-212 [doi]
- Optimal cache-based route repair for real-time trafficChuan Han, Yaling Yang, Yongxiang Peng. 213-222 [doi]
- CodePlay: Live multimedia streaming in VANETs using symbol-level network codingZhenyu Yang, Ming Li, Wenjing Lou. 223-232 [doi]
- An opportunistic relay protocol for vehicular road-side access with fading channelsJoon Yoo, Brian Sung Chul Choi, Mario Gerla. 233-242 [doi]
- Exploring the hidden connectivity in urban vehicular networksKebin Liu, Mo Li, Yunhao Liu, Xiang-Yang Li, Minglu Li, Huadong Ma. 243-252 [doi]
- Optimal distributed P2P streaming under node degree boundsShaoquan Zhang, Ziyu Shao, Minghua Chen. 253-262 [doi]
- SocialSwarm: Exploiting distance in social networks for collaborative flash file distributionMatthew J. Probst, Jun-Cheol Park, Ravin Abraham, Sneha Kumar Kasera. 263-274 [doi]
- Peer-assisted VoD prefetching in double auction marketsYuan Feng, Baochun Li, Bo Li. 275-284 [doi]
- TOP: Tail Optimization Protocol For Cellular Radio Resource AllocationFeng Qian, Zhaoguang Wang, Alexandre Gerber, Zhuoqing Morley Mao, Subhabrata Sen, Oliver Spatscheck. 285-294 [doi]
- Scalable video multicast with joint layer resource allocation in broadband wireless networksPeilong Li, Honghai Zhang, Baohua Zhao, Sampath Rangarajan. 295-304 [doi]
- Beyond co-existence: Exploiting WiFi white space for Zigbee performance assuranceJun Huang, Guoliang Xing, Gang Zhou, Ruogu Zhou. 305-314 [doi]