Abstract is missing.
- On Exploiting Dynamic Execution Patterns for Workload Offloading in Mobile Cloud ApplicationsWei Gao, Yong Li, Haoyang Lu, Ting Wang, Cong Liu. 1-12 [doi]
- Space Shuffle: A Scalable, Flexible, and High-Bandwidth Data Center NetworkYe Yu, Chen Qian. 13-24 [doi]
- Cross-VM Covert Channel Risk Assessment for Cloud Computing: An Automated Capacity ProfilerRui Zhang 0010, Wen Qi, Jianping Wang. 25-36 [doi]
- On Design and Performance of Cloud-Based Distributed Interactive ApplicationsHaiyang Wang, Ryan Shea, Xiaoqiang Ma, Feng Wang, Jiangchuan Liu. 37-46 [doi]
- CBID: A Customer Behavior Identification System Using Passive TagsJinsong Han, Han Ding, Chen Qian, Dan Ma, Wei Xi, Zhi Wang, Zhiping Jiang, Longfei Shangguan. 47-58 [doi]
- Fast Counting the Key Tags in Anonymous RFID SystemsXiulong Liu, Keqiu Li, Heng Qi, Bin Xiao, Xin Xie. 59-70 [doi]
- Scalable Data Access Control in RFID-Enabled Supply ChainSaiyu Qi, Yuanqing Zheng, Mo Li, Yunhao Liu, Jinli Qiu. 71-82 [doi]
- Cost-Minimizing Mobile Access Point Deployment in Workflow-Based Mobile Sensor NetworksHaiming Jin, He Huang, Lu Su, Klara Nahrstedt. 83-94 [doi]
- Every Packet Counts: Fine-Grained Delay and Loss Measurement with ReorderingJiliang Wang, Shuo Lian, Wei Dong, Yunhao Liu, Xiang-Yang Li. 95-106 [doi]
- Can Bandwidth Estimation Tackle Noise at Ultra-high Speeds?Qianwen Yin, Jasleen Kaur, F. Donelson Smith. 107-118 [doi]
- Network Path Capacity Comparison without Accurate Packet Time InformationErtong Zhang, Lisong Xu. 119-130 [doi]
- Estimating the Persistent Spreads in High-Speed NetworksQingjun Xiao, Yan Qiao, Zhen Mo, Shigang Chen. 131-142 [doi]
- Multipath Routing from a Traffic Engineering Perspective: How Beneficial Is It?Xuan Liu, Sudhir Mohanraj, Michal Pióro, Deep Medhi. 143-154 [doi]
- Routing to Multi-instantiated Destinations: Principles and ApplicationsJ. J. Garcia-Luna-Aceves. 155-166 [doi]
- Preferential Link Tomography: Monitor Assignment for Inferring Interesting Link MetricsYi Gao, Wenbin Wu, Wei Dong, Chun Chen, Xiang-Yang Li, Jiajun Bu. 167-178 [doi]
- Formal Modeling and Systematic Black-Box Testing of SDN Data PlaneJiangyuan Yao, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu. 179-190 [doi]
- SensCrypt: A Secure Protocol for Managing Low Power Fitness TrackersMahmudur Rahman, Bogdan Carbunar, Umut Topkara. 191-196 [doi]
- Polylogarithmic Competitive Algorithm for Energy Minimization in Optical WDM NetworksYangguang Shi, Fa Zhang, Zhiyong Liu. 197-202 [doi]
- On Measuring One-Way Path Metrics from a Web ServerXiapu Luo, Lei Xue, Cong Shi, Yuru Shao, Chenxiong Qian, Edmond W. W. Chan. 203-208 [doi]
- Semi-synchronous Channel Access for Full-Duplex Wireless NetworksXiufeng Xie, Xinyu Zhang. 209-214 [doi]
- Secgras: Security Group Analysis as a Cloud ServiceCheng Jin, Abhinav Srivastava, Yu Jin 0001, Zhi-Li Zhang. 215-220 [doi]
- You Are How You Touch: User Verification on Smartphones via Tapping BehaviorsNan Zheng, Kun Bai, Hai Huang, Haining Wang. 221-232 [doi]
- OrthCredential: A New Network Capability Design for High-Performance Access ControlHao Cai, Xinming Chen, Tilman Wolf. 233-244 [doi]
- Fair Pricing in the Sky: Truthful Frequency Allocation with Dynamic Spectrum SupplyQihang Sun, Qian Wang, Kui Ren, Xiaohua Jia. 245-256 [doi]
- Pay-as-You-Go Pricing and Competition in Congested Network Service MarketsRichard T. B. Ma. 257-268 [doi]
- Deconstructing MPTCP PerformanceBehnaz Arzani, Alexander J. T. Gurney, Sitian Cheng, Roch Guérin, Boon Thau Loo. 269-274 [doi]
- Multi-path TCP: Boosting Fairness in Cellular NetworksAshwin Sridharan, Rakesh K. Sinha, Rittwik Jana, Bo Han, K. K. Ramakrishnan, N. K. Shankaranarayanan, Ioannis Broustis. 275-280 [doi]
- TCP Performance over Mobile Networks in High-Speed Mobility ScenariosQingyang Xiao, Ke Xu, Dan Wang, Li Li, Yifeng Zhong. 281-286 [doi]
- Composing Heterogeneous SDN Controllers with FlowbricksAdvait Dixit, Kirill Kogan, Patrick Eugster. 287-292 [doi]
- Optimizing Mobile Prefetching by Leveraging Usage Patterns and Social InformationChristian Koch, David Hausheer. 293-295 [doi]
- Rethinking Packet Classification for Global Network View of Software-Defined NetworkingTakeru Inoue, Toru Mano, Kimihiro Mizutani, Shin-ichi Minato, Osamu Akashi. 296-307 [doi]
- Meta-algorithms for Software-Based Packet ClassificationPeng He, Gaogang Xie, Kavé Salamatian, Laurent Mathy. 308-319 [doi]
- Collaborative Verification of Forward and Reverse Reachability in the Internet Data PlaneHongkun Yang, Simon S. Lam. 320-331 [doi]
- Compressing IP Forwarding Tables: Realizing Information-Theoretical Space Bounds and Fast Lookups SimultaneouslyAttila Korösi, János Tapolcai, Bence Mihalka, Gábor Mészáros, Gábor Rétvári. 332-343 [doi]
- Stochastic Planning for Content Delivery: Unveiling the Benefits of Network Functions VirtualizationMichele Mangili, Fabio Martignon, Antonio Capone. 344-349 [doi]
- LAAR: Long-Range Radio Assisted Ad-Hoc Routing in MANETsYing Mao, Jiayin Wang, Bo Sheng, Mooi Choo Chuah. 350-355 [doi]
- In-Band Update for Network Routing Policy MigrationShuyuan Zhang, Sharad Malik, Sanjai Narain, Laurent Vanbever. 356-361 [doi]
- Freeway: Adaptively Isolating the Elephant and Mice Flows on Different Transmission PathsWei Wang, Yi Sun, Kai Zheng, Mohamed Ali Kâafar, Dan Li, Zhongcheng Li. 362-367 [doi]
- Analysis of Topology Algorithms for Commercial Airborne NetworksBen Newton, Jay Aikat, Kevin Jeffay. 368-373 [doi]
- Regulating Monopolistic ISPS without NeutralityJing Tang, Richard T. B. Ma. 374-384 [doi]
- PAC: Taming TCP Incast Congestion Using Proactive ACK ControlWei Bai, Kai Chen, Haitao Wu, Wuwei Lan, Yangming Zhao. 385-396 [doi]
- Constrained Maximum Flow in Stochastic NetworksFernando A. Kuipers, Song Yang, Stojan Trajanovski, Ariel Orda. 397-408 [doi]
- Wireless Rate Adaptation via Smart PilotLu Wang, Xiaoke Qi, Jiang Xiao, Kaishun Wu, Mounir Hamdi, Qian Zhang. 409-420 [doi]
- Circular Pipelining: Minimizing Round-Trip Delay in Low-Duty-Cycle Wireless NetworksJia Li, Song Min Kim, Tian He. 421-432 [doi]
- Correlated Coding: Efficient Network Coding under Correlated Unreliable Wireless LinksShuai Wang, Song Min Kim, Zhimeng Yin, Tian He. 433-444 [doi]
- Exploiting Sender-Based Link Correlation in Wireless Sensor NetworksJung-Hyun Jun, Long Cheng, Liang He, Yu Gu 0001, Ting Zhu. 445-455 [doi]
- On the MAC for Power-Line Communications: Modeling Assumptions and Performance TradeoffsChristina Vlachou, Albert Banchs, Julien Herzen, Patrick Thiran. 456-467 [doi]
- Software Switch Performance Factors in Network Virtualization EnvironmentYimeng Zhao, Luigi Iannone, Michel Riguidel. 468-470 [doi]
- Optimization Models for Congestion Mitigation in Virtual NetworksJocelyne Elias, Fabio Martignon, Stefano Paris, Jianping Wang. 471-476 [doi]
- Multi-path Solutions to Improve Network PerformanceBehnaz Arzani. 477-479 [doi]
- Obstacle Shadowing Influences in VANET SafetyScott E. Carpenter. 480-482 [doi]
- Towards Resource-Efficient Application-Controlled Software Defined NetworksJeremias Blendin, David Hausheer. 483-485 [doi]
- A Decentralized System for Privacy-Preserving Context Exchange: Facilitating a Better Work-Life BalanceRahul Chini Dwarakanath, Ralf Steinmetz. 489-491 [doi]
- IP45: Architecture, Design, and ImplementationTomas Podermanski, Miroslav Svéda. 492-494 [doi]
- On the Variation in Web Page Download Traffic across Different Client TypesSean Sanders, Jasleen Kaur. 495-497 [doi]
- A Study on a Routing-Based Mobility Management Architecture for IoT DevicesMasanori Ishino, Yuki Koizumi, Toru Hasegawa. 498-500 [doi]
- Challenges with Transition and User Accounting in Next Generation NetworksMatej Grégr, Miroslav Svéda. 501-503 [doi]
- Programming Routing Policies for Video TrafficYuefeng Wang, Nabeel Akhtar, Ibrahim Matta. 504-510 [doi]
- In-Network Compute Extensions for Rate-Adaptive Content Delivery in Mobile NetworksFrancesco Bronzino, Chao Han, Yang Chen, Kiran Nagaraja, Xiaowei Yang, Ivan Seskar, Dipankar Raychaudhuri. 511-517 [doi]
- Experimentation of Geometric Information Routing on Content LocatorsSahel Sahhaf, Dimitri Papadimitriou, Wouter Tavernier, Didier Colle, Mario Pickavet. 518-524 [doi]
- An OpenFlow-Based Prototype of SDN-Oriented Stateful Hardware FirewallsJake Collings, Jun Liu. 525-528 [doi]
- GENI Cinema: An SDN-Assisted Scalable Live Video Streaming ServiceQing Wang, Ke Xu, Ryan Izard, Benton Kribbs, Joseph Porter, Kuang-Ching Wang, Aditya Prakash, Parmesh Ramanathan. 529-532 [doi]
- Experience in Implementing & Deploying a Non-IP Routing Protocol VIRO in GENIBraulio Dumba, Guobao Sun, Hesham Mekky, Zhi-Li Zhang. 533-539 [doi]
- Domain Science Applications on GENI: Presentation and DemoPaul Ruth, Anirban Mandal. 540-543 [doi]
- Experiments on Networking of HadoopAbdul Navaz, Gandhimathi Velusam, Deniz Gurkan. 544-547 [doi]
- Designing a GENI Experimenter Tool to Support the Choice Net Internet ArchitectureD. Brown, Onur Ascigil, Hussamuddin Nasir, Charles Carpenter, Jim Griffioen, Kenneth L. Calvert. 548-554 [doi]
- SDN Management Layer: Design Requirements and Future DirectionYuefeng Wang, Ibrahim Matta. 555-562 [doi]
- Traffic Engineering in SDN/OSPF Hybrid NetworkYingya Guo, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu. 563-568 [doi]
- Orion: A Hybrid Hierarchical Control Plane of Software-Defined Networking for Large-Scale NetworksYonghong Fu, Jun Bi, Kai Gao, Ze Chen, Jianping Wu, Bin Hao. 569-576 [doi]
- Forwarding Programming in Protocol-Oblivious Instruction SetJingzhou Yu, Xiaozhong Wang, Jian Song, Yuanming Zheng, Haoyu Song. 577-582 [doi]
- Data Plane Programmability in SDNHamid Farhadi, HyunYong Lee, Akihiro Nakao. 583-588 [doi]
- Extending Openflow for Service Insertion and Payload InspectionRobinson Udechukwu, Rudra Dutta. 589-595 [doi]
- Stochastic Pre-classification for SDN Data Plane MatchingLuke McHale, Jasson Case, Paul V. Gratz, Alex Sprintson. 596-602 [doi]
- Virtual Duplex: Scaling Dense WLANS and Eliminating Contention AsymmetryAdriana B. Flores, Edward W. Knightly. 603-611 [doi]
- OperationCheckpoint: SDN Application ControlSandra Scott-Hayward, Christopher Kane, Sakir Sezer. 618-623 [doi]
- DDoS Attack Protection in the Era of Cloud Computing and Software-Defined NetworkingBing Wang, Yao Zheng, Wenjing Lou, Y. Thomas Hou. 624-629 [doi]
- Disincentivizing/Incentivizing Malicious/Honest Behavior on the Internet via Privacy-Preserving AppcoinsKarim El Defrawy, Joshua Lampkins. 630-635 [doi]
- The Shape and Size of Threats: Defining a Networked System's Attack SurfaceEric Osterweil, Danny McPherson, Lixia Zhang 0001. 636-641 [doi]
- Reflections on Security Options for the Real-Time Transport Protocol FrameworkColin Perkins. 642-647 [doi]
- Vulnerabilities of RFID Security Protocol Based on Chaotic MapsMete Akgün, Tubitak Uekae, M. Ufuk Çaglayan. 648-653 [doi]
- Delegated Authenticated Authorization for Constrained EnvironmentsStefanie Gerdes, Olaf Bergmann, Carsten Bormann. 654-659 [doi]
- Heisenberg Groups as Platform for the AAG Key-Exchange ProtocolDelaram Kahrobaei, Ha T. Lam. 660-664 [doi]
- MetaCAPTCHA: A Metamorphic Throttling Service for the WebAkshay Dua, Thai Bui, Tien Le, Nhan Huynh, Wu-chang Feng. 665-670 [doi]