Abstract is missing.
- Energy balanced data collection in Wireless Sensor NetworksNing Jin, Kaiji Chen, Tao Gu. 1-10 [doi]
- Evaluating sinkhole defense techniques in RPL networksKevin Weekly, Kristofer S. J. Pister. 1-6 [doi]
- Dynamic regulation of mobile 3G/HSPA uplink buffer with Receiver-side Flow ControlYin Xu, Wai Kay Leong, Ben Leong, Ali Razeen. 1-10 [doi]
- Airlift: Video conferencing as a cloud service using inter-datacenter networksYuan Feng, Baochun Li, Bo Li 0001. 1-11 [doi]
- A diversified and correct-by-construction broadcast serviceVincent Rahli, Nicolas Schiper, Robbert van Renesse, Mark Bickford, Robert L. Constable. 1-6 [doi]
- Distortion-Resilient Routing for Video Flows in Wireless Multi-hop NetworksGeorge Papageorgiou, Shailendra Singh, Srikanth V. Krishnamurthy, Ramesh Govindan, Tom La Porta. 1-10 [doi]
- An ultra-fast universal incremental update algorithm for trie-based routing lookupTong Yang, Zhian Mi, Ruian Duan, Xiaoyu Guo, Jianyuan Lu, Shenjiang Zhang, Xianda Sun, Bin Liu. 1-10 [doi]
- A distributed routing protocol for predictable rates in wireless mesh networksyBehnaz Arzani, Roch Guérin, Alejandro Ribeiro. 1-10 [doi]
- An architecture for collaborative driving systemsShou-pon Lin, Nicholas F. Maxemchuk. 1-2 [doi]
- A content provider mobility solution of named data networkingXiaoke Jiang, Jun Bi, You Wang, Pingping Lin, Zhaogeng Li. 1-2 [doi]
- D-Fi: A diversity-aware Wi-Fi using an OFDM-based Bloom filterSuchul Lee, Chong-kwon Kim. 1-10 [doi]
- FAST: A channel access protocol for wireless video (and non-video) trafficSohraab Soltani, Hassan Aqeel Khan, Hayder Radha. 1-10 [doi]
- Social-P2P: Social network-based P2P file sharing systemZe Li, Haiying Shen. 1-10 [doi]
- Cost optimization for Online Social Networks on geo-distributed cloudsLei Jiao, Jun Li, Tianyin Xu, Xiaoming Fu. 1-10 [doi]
- Detecting the unintended in BGP policiesDebbie Perouli, Timothy G. Griffin, Olaf Maennel, Sonia Fahmy, Iain Phillips, Cristel Pelsser. 1-2 [doi]
- VCP: A virtualization cloud platform for SDN intra-domain production networkPingping Lin, Jun Bi, Hongyu Hu. 1-2 [doi]
- eDiscovery: Energy efficient device discovery for mobile opportunistic communicationsBo Han, Aravind Srinivasan. 1-10 [doi]
- Virtual routing tables polymerization for lookup and updateTong Yang, Shenjiang Zhang, Xianda Sun, Huichen Dai, Ruian Duan, Jianyuan Lu, Zhian Mi, Bin Liu. 1-2 [doi]
- Minimizing inter-server communications by exploiting self-similarity in online social networksHanhua Chen, Hai Jin, Ning Jin, Tao Gu. 1-10 [doi]
- Buddyguard: A buddy system for fast and reliable detection of IP prefix anomaliesJun Li 0001, Toby Ehrenkranz, Paul Elliott. 1-10 [doi]
- Marooned magic numbers - An adaptive congestion control architectureSomaya Arianfar, Pasi Sarolahti, Jörg Ott. 1-11 [doi]
- ROME: Routing on metropolitan-scale EthernetChen Qian, Simon S. Lam. 1-10 [doi]
- Practical control of transmission power for Wireless Sensor NetworksYong Fu, Mo Sha, Gregory Hackmann, Chenyang Lu. 1-10 [doi]
- SMART: Lightweight distributed Social Map based Routing in Delay Tolerant NetworksKang Chen, Haiying Shen. 1-10 [doi]
- TUNOS: A novel SDN-oriented networking operating systemTao Feng, Jun Bi, Hongyu Hu. 1-2 [doi]
- Optimal vehicles and coding decision for mobile data sharing in Vehicular Delay Tolerant NetworksWenyu Ren, Yong Li, Depeng Jin, Li Su, Lieguang Zeng. 1-2 [doi]
- Assessing the security of a clean-slate Internet architectureGowtham Boddapati, John Day, Ibrahim Matta, Lubomir T. Chitkushev. 1-6 [doi]
- Towards the optimal caching strategies of peer-assisted VoD systems with HD channelsLe Chang, Jianping Pan. 1-10 [doi]
- Cooperative end-to-end traffic redundancy elimination for reducing cloud bandwidth costLei Yu, Karan Sapra, Haiying Shen, Lin Ye. 1-10 [doi]
- Integration testing of protocol implementations using symbolic distributed executionRaimondas Sasnauskas, Philipp Kaiser, Russ Lucas Jukic, Klaus Wehrle. 1-6 [doi]
- On minimum delay duty-cycling protocol in sustainable sensor networkShaoJie Tang, Jie Wu 0001, Guihai Chen, Cheng Wang, Xuefeng Liu, Tao Li, Xiang-Yang Li. 1-9 [doi]
- Reduction-based security analysis of Internet routing protocolsChen Chen, Limin Jia, Boon Thau Loo, Wenchao Zhou. 1-6 [doi]
- A semantics aware approach to automated reverse engineering unknown protocolsYipeng Wang, Xiao-chun Yun, Muhammad Zubair Shafiq, Liyan Wang, Alex X. Liu, Zhibin Zhang, Danfeng Yao, Yongzheng Zhang 0002, Li Guo. 1-10 [doi]
- Detecting unsafe BGP policies in a flexible worldDebbie Perouli, Timothy G. Griffin, Olaf Maennel, Sonia Fahmy, Cristel Pelsser, Alexander J. T. Gurney, Iain Phillips. 1-10 [doi]
- Key splitting for random key distribution schemesMohammad Ehdaie, Nikolaos Alexiou, Mahmoud Ahmadian-Attari, Mohammad Reza Aref, Panos Papadimitratos. 1-6 [doi]
- Verification and synthesis of firewalls using SAT and QBFShuyuan Zhang, Abdulrahman Mahmoud, Sharad Malik, Sanjai Narain. 1-6 [doi]
- A proactive scheme for securing ID/locator split architectureRuidong Li, Ved P. Kafle, Hiroaki Harai. 1-6 [doi]
- Towards bandwidth guarantee in multi-tenancy cloud computing networksJing Zhu, Dan Li, Jianping Wu, Hongnan Liu, Ying Zhang, Jingcheng Zhang. 1-10 [doi]
- CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)Seungwon Shin, Guofei Gu. 1-6 [doi]
- Using DCCP: Issues and improvementsMichael Schier, Michael Welzl. 1-9 [doi]
- AFEC: A method of aggregating forwarding equivalence classes based on overlapped pathsBaobao Zhang, Jun Bi, Jianping Wu. 1-2 [doi]
- Forensic analysis of packet losses in wireless networksJianxia Ning, Shailendra Singh, Konstantinos Pelechrinis, Bin Liu 0004, Srikanth V. Krishnamurthy, Ramesh Govindan. 1-10 [doi]
- Umbrella: A routing choice feedback based distributed inter-domain anti-spoofing solutionJie Li, Jun Bi, Jianping Wu. 1-2 [doi]
- Towards a rigorous analysis of AODVv2 (DYMO)Sarah Edenhofer, Peter Höfner. 1-6 [doi]
- Efficient and privacy-preserving data aggregation in mobile sensingQinghua Li, Guohong Cao. 1-10 [doi]
- To cloud or not to cloud: A study of trade-offs between in-house and outsourced virtual private networkFahad A. Arshad, Gaspar Modelo-Howard, Saurabh Bagchi. 1-6 [doi]
- CORONET: Fault tolerance for Software Defined NetworksHyoJoon Kim, Mike Schlansker, Jose Renato Santos, Jean Tourrilhes, Yoshio Turner, Nick Feamster. 1-2 [doi]
- Symbol-level detection: A new approach to silencing hidden terminalsTao Xiong, Jin Zhang, Junmei Yao, Wei Lou. 1-10 [doi]
- A formally-verified migration protocol for mobile, multi-homed hostsMatvey Arye, Erik Nordström, Robert Kiefer, Jennifer Rexford, Michael J. Freedman. 1-12 [doi]
- Range-free localization using grid graph extractionTakeshi Kubo, Atsushi Tagami, Teruyuki Hasegawa, Toru Hasegawa, Jean C. Walrand. 1-11 [doi]
- Reducing the complexity of BGP stability analysis with hybrid combinatorial-algebraic modelsDebbie Perouli, Stefano Vissicchio, Alexander J. T. Gurney, Olaf Maennel, Timothy G. Griffin, Iain Phillips, Sonia Fahmy, Cristel Pelsser. 1-6 [doi]
- Delay-based congestion control for multipath TCPYu Cao, Mingwei Xu, Xiaoming Fu. 1-10 [doi]
- Global Resolution Service for mobility support in the internetYou Wang, Jun Bi, Chenghui Peng. 1-2 [doi]