Abstract is missing.
- Message from the general chairTaieb Znati. [doi]
- Reviewers List [doi]
- Reviewers List [doi]
- Reviewers List [doi]
- Message from the technical program co-chairsEdward W. Knightly, Kia Makki. [doi]
- The 802.11 MAC protocol leads to inefficient equilibriaGodfrey Tan, John V. Guttag. 1-11 [doi]
- rDCF: a relay-enabled medium access control protocol for wireless ad hoc networksHao Zhu, Guohong Cao. 12-22 [doi]
- Throughput modelling and fairness issues in CSMA/CA based ad-hoc networksXin Wang, Koushik Kar. 23-34 [doi]
- Distributed optimal contention window control for elastic traffic in wireless LANsYaling Yang, Jun Wang, Robin Kravets. 35-46 [doi]
- Downlink beamforming algorithms with inter-cell interference in cellular networksTianmin Ren, Richard J. La. 47-57 [doi]
- Blocking rates in large CDMA networks via a spatial Erlang formulaFrançois Baccelli, Bartlomiej Blaszczyszyn, Mohamed Kadhem Karray. 58-67 [doi]
- Designing wireless radio access networks for third generation cellular networksTian Bu, Mun Choon Chan, Ramachandran Ramjee. 68-78 [doi]
- Asymptotically optimal transmission power and rate control for CDMA channels with multiple user classesZvi Rosberg. 79-89 [doi]
- Exchange power management for mobile ad hoc networksJohn G. Dorsey, Daniel P. Siewiorek. 90-101 [doi]
- Impact of power control on the performance of ad hoc wireless networksArash Behzad, Izhak Rubin. 102-113 [doi]
- Optimal fixed and scalable energy management for wireless networksRahul Mangharam, Ragunathan Rajkumar, Sofie Pollin, Francky Catthoor, Bruno Bougard, Liesbet Van der Perre, Ingrid Moerman. 114-125 [doi]
- Spatial energy balancing in large-scale wireless multihop networksSeung Jun Baek, Gustavo de Veciana. 126-137 [doi]
- Localization for anisotropic sensor networksHyuk Lim, Jennifer C. Hou. 138-149 [doi]
- GPS free coordinate assignment and routing in wireless sensor networksAntonio Caruso, Stefano Chessa, Swades De, A. Urpi. 150-160 [doi]
- A beacon-less location discovery scheme for wireless sensor networksLei Fang, Wenliang Du, Peng Ning. 161-171 [doi]
- Mobile-assisted localization in wireless sensor networksNissanka B. Priyantha, Hari Balakrishnan, Erik D. Demaine, Seth J. Teller. 172-183 [doi]
- Economics of network pricing with multiple ISPsSanjay Shakkottai, R. Srikant. 184-194 [doi]
- Pricing differentiated Internet servicesLinhai He, Jean C. Walrand. 195-204 [doi]
- Pricing and revenue sharing strategies for Internet service providersLinhai He, Jean C. Walrand. 205-216 [doi]
- Maximizing profit in overloaded networksMatthew Andrews. 217-224 [doi]
- A performance vs. cost framework for evaluating DHT design tradeoffs under churnJinyang Li, Jeremy Stribling, Robert Morris, M. Frans Kaashoek, Thomer M. Gil. 225-236 [doi]
- Avoiding transient loops during IGP convergence in IP networksPierre Francois, Olivier Bonaventure. 237-247 [doi]
- Practical routing-layer support for scalable multihomingRamakrishna Gummadi, Ramesh Govindan. 248-259 [doi]
- A precomputation scheme for minimum interference routing: the least-critical-path-first algorithmGábor Rétvári, József Bíró, Tibor Cinkler, Tamás Henk. 260-268 [doi]
- Scalable packet classification using distributed crossproducing of field labelsDavid E. Taylor, Jonathan S. Turner. 269-280 [doi]
- What signals do packet-pair dispersions carry?Xiliang Liu, Kaliappa Nadar Ravindran, Dmitri Loguinov. 281-292 [doi]
- TCAM-based distributed parallel packet classification algorithm with range-matching solutionKai Zheng, Hao Che, Zhijun Wang, Bin Liu. 293-303 [doi]
- Packet classification via improved space decomposition techniquesFilippo Geraci, Marco Pellegrini, Paolo Pisati, Luigi Rizzo. 304-312 [doi]
- Network localization in partially localizable networksDavid Kiyoshi Goldenberg, Arvind Krishnamurthy, W. C. Maness, Yang Richard Yang, Anthony Young, A. Stephen Morse, A. Savvides. 313-326 [doi]
- Monotone percolation and the topology control of wireless networksAnxiao Jiang, Jehoshua Bruck. 327-338 [doi]
- GLIDER: gradient landmark-based distributed routing for sensor networksQing Fang, Jie Gao, Leonidas J. Guibas, V. de Silva, Li Zhang. 339-350 [doi]
- Locating network monitors: complexity, heuristics, and coverageKyoungwon Suh, Yang Guo, James F. Kurose, Donald F. Towsley. 351-361 [doi]
- Analysis of the competition between wired, DSL and wireless users in an access networkFrançois Baccelli, Ki Baek Kim, Danny De Vleeschauwer. 362-373 [doi]
- Designing incentives for peer-to-peer routingAlberto Blanc, Yi-Kai Liu, Amin Vahdat. 374-385 [doi]
- Cooperation and decision-making in a wireless multi-provider settingAlex Zemlianov, Gustavo de Veciana. 386-397 [doi]
- MV routing and capacity building in disruption tolerant networksBrendan Burns, Oliver Brock, Brian Neil Levine. 398-408 [doi]
- Bounds on fiber minimization in optical networks with fixed fiber capacityMatthew Andrews, Lisa Zhang. 409-419 [doi]
- A novel analytical model for electronic and optical switches with shared bufferZhenghao Zhang, Yuanyuan Yang. 420-431 [doi]
- Dynamic reconfiguration and routing algorithms for IP-over-WDM networks with stochastic trafficAndrew Brzezinski, Eytan Modiano. 432-443 [doi]
- An efficient reservation MAC protocol with preallocation for high-speed WDM passive optical networksChunpeng Xiao, Benny Bing, Gee-Kung Chang. 444-454 [doi]
- Capacity of wireless ad-hoc networks under ultra wide band with power constraintHonghai Zhang, Jennifer C. Hou. 455-465 [doi]
- On the critical total power for asymptotic k-connectivity in wireless networksHonghai Zhang, Jennifer C. Hou. 466-476 [doi]
- Non-pipelined relay improves throughput performance of wireless ad-hoc networksAravind Velayutham, Karthikeyan Sundaresan, Raghupathy Sivakumar. 477-490 [doi]
- Coverage and connectivity of ad hoc networks presence of channel randomnessDaniele Miorandi, Eitan Altman. 491-502 [doi]
- Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approachWensheng Zhang, Guohong Cao. 503-514 [doi]
- New constructions on broadcast encryption key pre-distribution schemesScott C.-H. Huang, Ding-Zhu Du. 515-523 [doi]
- PIKE: peer intermediaries for key establishment in sensor networksHaowen Chan, Adrian Perrig. 524-535 [doi]
- Spoofing prevention methodAnat Bremler-Barr, Hanoch Levy. 536-547 [doi]
- A calculus approach to minimum energy transmission policies with quality of service guaranteesMurtaza Zafer, Eytan Modiano. 548-559 [doi]
- Quasi-optimal bandwidth allocation for multi-spot MFTDMA satellitesSara Alouf, Eitan Altman, Jérôme Galtier, Jean-François Lalande, Corinne Touati. 560-571 [doi]
- Energy optimal control for time varying wireless networksMichael J. Neely. 572-583 [doi]
- Bounding the power rate function of wireless ad hoc networksYunnan Wu, Qian Zhang, Wenwu Zhu, Sun-Yuan Kung. 584-595 [doi]
- Heterogeneity and load balance in distributed hash tablesBrighten Godfrey, Ion Stoica. 596-606 [doi]
- On optimal routing with multiple traffic matricesChun Zhang, Yong Liu, Weibo Gong, James F. Kurose, R. Moll, Donald F. Towsley. 607-618 [doi]
- Relating two formal models of path-vector routingAaron D. Jaggard, Vijay Ramachandran. 619-630 [doi]
- Provably competitive adaptive routingBaruch Awerbuch, David Holmer, Herbert Rubens, Robert D. Kleinberg. 631-641 [doi]
- On the accuracy of signal strength-based estimation techniquesA. S. Krishnakumar, P. Krishnan. 642-650 [doi]
- Location enhancement to IEEE 802.11 DCFTamer Nadeem, Lusheng Ji, Ashok K. Agrawala, Jonathan R. Agre. 651-663 [doi]
- A mobility model based on WLAN traces and its validationCristian Tuduce, Thomas R. Gross. 664-674 [doi]
- SyncScan: practical fast handoff for 802.11 infrastructure networksIshwar Ramani, Stefan Savage. 675-684 [doi]
- Dual-header optical burst switching: a new architecture for WDM burst-switched networksNeil Barakat, Edward H. Sargent. 685-693 [doi]
- On-line optimal wavelength assignment in WDM networks with shared wavelength converter poolZhenghao Zhang, Yuanyuan Yang. 694-705 [doi]
- Multicast capacity of packet-switched ring WDM networksMichael Scheutzow, Patrick Seeling, Martin Maier, Martin Reisslein. 706-717 [doi]
- Traffic grooming in WDM SONET UPSR rings with multiple line speedsHuan Liu, Fouad A. Tobagi. 718-729 [doi]
- A distributed adaptive cache update algorithm for the dynamic source routing protocolXin Yu, Zvi M. Kedem. 730-739 [doi]
- Multipath routing for multiple description video in wireless ad hoc networksShiwen Mao, Yiwei Thomas Hou, Xiaolin Cheng, Hanif D. Sherali, Scott F. Midkiff. 740-750 [doi]
- Interference-aware routing in multihop wireless networks using directional antennasJian Tang, Guoliang Xue, Christopher Chandler, Weiyi Zhang. 751-760 [doi]
- Online lifetime-centric multicast routing for ad hoc networks with directional antennasYiwei Thomas Hou, Yi Shi, Hanif D. Sherali, Jeffrey E. Wieselthier. 761-772 [doi]
- Threshold and reservation based call admission control policies for multiservice resource-sharing systemsJian Ni, Danny H. K. Tsang, Sekhar Tatikonda, Brahim Bensaou. 773-783 [doi]
- Discriminatory processor sharing revisitedKonstantin Avrachenkov, Urtzi Ayesta, Patrick Brown, R. Núñez Queija. 784-795 [doi]
- Dependency isolation for thread-based multi-tier Internet servicesLingkun Chu, Kai Shen, Hong Tang, Tao Yang, Jingyu Zhou. 796-806 [doi]
- An efficient packet scheduling algorithm in network processorsJiani Guo, Jingnan Yao, Laxmi N. Bhuyan. 807-818 [doi]
- Joint optimal scheduling and routing for maximum network throughputEmilio Leonardi, Marco Mellia, Marco Ajmone Marsan, Fabio Neri. 819-830 [doi]
- FRR: a proportional and worst-case fair round robin schedulerX. Yuan, Z. Duan. 831-842 [doi]
- Credit based fair scheduling for packet switched networksDeng Pan, Yuanyuan Yang. 843-854 [doi]
- Online time-constrained scheduling in linear networksJoseph Naor, Adi Rosén, Gabriel Scalosub. 855-865 [doi]
- BARD: Bayesian-assisted resource discovery in sensor networksFred Stann, John S. Heidemann. 866-877 [doi]
- Exploiting heterogeneity in sensor networksMark D. Yarvis, Nandakishore Kushalnagar, Harkirat Singh, Anand Rangarajan, York Liu, Suresh Singh. 878-890 [doi]
- RID: radio interference detection in wireless sensor networksGang Zhou, Tian He, John A. Stankovic, Tarek F. Abdelzaher. 891-901 [doi]
- Localized fault-tolerant event boundary detection in sensor networksM. Ding, D. Chen, K. Xing, X. Cheng. 902-913 [doi]
- TCP congestion avoidance: a network calculus interpretation and performance improvementsMingyu Chen, Jinsong Zhang, Manohar N. Murthi, Kamal Premaratne. 914-925 [doi]
- TCP vs. TCP: a systematic study of adverse impact of short-lived TCP flows on long-lived TCP flowsS. Ebrahimi-Taghizadeh, Ahmed Helmy, Sandeep K. S. Gupta. 926-937 [doi]
- Modelling and stability of FAST TCPJiantao Wang, David X. Wei, Steven H. Low. 938-948 [doi]
- Spatial-temporal analysis of passive TCP measurementsEli Brosh, G. Lubetzky-Sharon, Yuval Shavitt. 949-959 [doi]
- Generalization of the Pollaczek-Khinchin formula for throughput analysis of input-buffered switchesCheng-Shang Chang, Duan-Shin Lee, Chao-Lin Yu. 960-970 [doi]
- On the maximal throughput of networks with finite buffers and its application to buffered crossbarsPaolo Giaccone, Emilio Leonardi, Devavrat Shah. 971-980 [doi]
- Practical algorithms for performance guarantees in buffered crossbarsShang-Tse Chuang, Sundar Iyer, Nick McKeown. 981-991 [doi]
- IPStash: a set-associative memory approach for efficient IP-lookupStefanos Kaxiras, Georgios Keramidas. 992-1001 [doi]
- Pitfalls in the fluid modeling of RTT variations in window-based congestion controlShao Liu, Tamer Basar, R. Srikant. 1002-1012 [doi]
- A class of reliable UDP-based transport protocols based on stochastic approximationQishi Wu, Nageswara S. V. Rao. 1013-1024 [doi]
- Understanding XCP: equilibrium and fairnessSteven H. Low, Lachlan L. H. Andrew, Bartek P. Wydrowski. 1025-1036 [doi]
- An implementation and experimental study of the explicit control protocol (XCP)Y. Zhang, T. R. Henderson. 1037-1048 [doi]
- The BEST challenge for next-generation Ethernet servicesPankaj Risbood, Swarup Acharya, Bhawna Gupta. 1049-1059 [doi]
- Classification of access network types: Ethernet wireless LAN, ADSL, cable modem or dialup?Wei Wei, Bing Wang, Chun Zhang, James F. Kurose, Donald F. Towsley. 1060-1071 [doi]
- Buffer sizing for congested Internet linksAmogh Dhamdhere, Hao Jiang, Constantinos Dovrolis. 1072-1083 [doi]
- Relevance of massively distributed explorations of the Internet topology: simulation resultsJean-Loup Guillaume, Matthieu Latapy. 1084-1094 [doi]
- Power control for OSNR optimization in optical networks: a distributed algorithm via a central cost approachL. Pavel. 1095-1105 [doi]
- On survivable routing of mesh topologies in IP-over-WDM networksMaciej Kurant, Patrick Thiran. 1106-1116 [doi]
- Differential delay aware routing for Ethernet over SONET/SDHAnurag Srivastava, Swarup Acharya, Mansoor Alicherry, Bhawna Gupta, Pankaj Risbood. 1117-1127 [doi]
- Optical switching networks with minimum number of limited range wavelength convertersHung Q. Ngo, Dazhen Pan, Yuanyuan Yang. 1128-1138 [doi]
- dPAM: a distributed prefetching protocol for scalable asynchronous multicast in P2P systemsAbhishek Sharma, Azer Bestavros, Ibrahim Matta. 1139-1150 [doi]
- Non-uniform random membership management in peer-to-peer networksMing Zhong, Kai Shen, Joel I. Seiferas. 1151-1161 [doi]
- Efficient and scalable query routing for unstructured peer-to-peer networksAbhishek Kumar, Jun Xu, Ellen W. Zegura. 1162-1173 [doi]
- Pollution in P2P file sharing systemsJian Liang, Rakesh Kumar, Y. Xi, Keith W. Ross. 1174-1185 [doi]
- On-line search for mobile usersZohar Naor. 1186-1195 [doi]
- DHARMA: distributed home agent for robust mobile accessYun Mao, Björn Knutsson, Honghui Lu, Jonathan M. Smith. 1196-1206 [doi]
- Location management for PCS networks with consideration of mobility patternsJie Li, Atushi Kubota, Hisao Kameda. 1207-1216 [doi]
- Bayesian indoor positioning systemsDavid Madigan, E. Einahrawy, R. P. Martin, Wen-Hua Ju, P. Krishnan, A. S. Krishnakumar. 1217-1227 [doi]
- Performance comparison of scalable location services for geographic ad hoc routingSaumitra M. Das, Himabindu Pucha, Y. Charlie Hu. 1228-1239 [doi]
- Routing in ad hoc networks: a theoretical framework with practical implicationsNianjun Zhou, Alhussein A. Abouzeid. 1240-1251 [doi]
- HADOF: defense against routing disruptions in mobile ad hoc networksWei Yu, Yan Sun, K. J. Ray Liu. 1252-1261 [doi]
- Asymptotically optimal power-aware routing for multihop wireless networks with renewable energy sourcesXiaojun Lin, Ness B. Shroff, R. Srikant. 1262-1272 [doi]
- Connection admission control for flow level QoS in bufferless modelsSándor Rácz, Tamás Jakabfy, J. Farkas, Csaba Antal. 1273-1282 [doi]
- A new admission control scheme under energy and QoS constraints for wireless networksWenye Wang, Xinbing Wang, Arne A. Nilsson. 1283-1294 [doi]
- On stochastic recursive equations and infinite server queuesEitan Altman. 1295-1302 [doi]
- Q-Composer and CpR: a probabilistic synthesizer and regulator of traffic (a probabilistic control of buffer occupancy)Sami Ayyorgun, Sarut Vanichpun, Wu-chun Feng. 1303-1315 [doi]
- Performance analysis and stochastic stability of congestion control protocolsEitan Altman, Konstantin Avrachenkov, Arzad Alam Kherani, B. J. Prabhu. 1316-1327 [doi]
- Flow control as stochastic optimal control problem with incomplete informationB. Miller, Konstantin Avrachenkov, K. Stepanyan, Gregory Miller. 1328-1337 [doi]
- Network equilibrium of heterogeneous congestion control protocolsAo Tang, Jiantao Wang, Steven H. Low, Mung Chiang. 1338-1349 [doi]
- Fairness in MIMD congestion control algorithmsEitan Altman, Konstantin Avrachenkov, B. J. Prabhu. 1350-1361 [doi]
- Reduction of quality (RoQ) attacks on Internet end-systemsMina Guirguis, Azer Bestavros, Ibrahim Matta, Yuting Zhang. 1362-1372 [doi]
- On the effectiveness of DDoS attacks on statistical filteringQiming Li, Ee-Chien Chang, Mun Choon Chan. 1373-1383 [doi]
- Defending against Internet worms: a signature-based approachYong Tang, Shigang Chen. 1384-1394 [doi]
- FIT: fast Internet tracebackAbraham Yaar, Adrian Perrig, Dawn Xiaodong Song. 1395-1406 [doi]
- Controlling the mobility of multiple data transport ferries in a delay-tolerant networkWenrui Zhao, Mostafa H. Ammar, Ellen W. Zegura. 1407-1418 [doi]
- Distributed, secure load balancing with skew, heterogeneity and churnJonathan Ledlie, Margo I. Seltzer. 1419-1430 [doi]
- Optimizing cost-sensitive trust-negotiation protocolsWeifeng Chen, L. Clarke, James F. Kurose, Donald F. Towsley. 1431-1442 [doi]
- Delayed-dictionary compression for packet networksYossi Matias, R. Refua. 1443-1454 [doi]
- The effect of network topology on the spread of epidemicsAyalvadi J. Ganesh, Laurent Massoulié, Donald F. Towsley. 1455-1466 [doi]
- Trade-offs in resource management for virtual private networksSatish Raghunath, Shivkumar Kalyanaraman, K. K. Ramakrishnan. 1467-1477 [doi]
- A quantitative study of authentication and QoS in wireless IP networksWei Liang, Wenye Wang. 1478-1489 [doi]
- On efficiency in searching networksHsinping Wang, Tsungnan Lin. 1490-1501 [doi]
- SCOPE: scalable consistency maintenance in structured P2P systemsXin Chen, Shansi Ren, Haining Wang, Xiaodong Zhang. 1502-1513 [doi]
- Assisted peer-to-peer search with partial indexingRongmei Zhang, Y. Charlie Hu. 1514-1525 [doi]
- Hybrid search schemes for unstructured peer-to-peer networksChristos Gkantsidis, Milena Mihail, Amin Saberi. 1526-1537 [doi]
- Optimal peer selection for P2P downloading and streamingMicah Adler, Rakesh Kumar, Keith W. Ross, Dan Rubenstein, Torsten Suel, David D. Yao. 1538-1549 [doi]
- New insights from a fixed point analysis of single cell IEEE 802.11 WLANsAnurag Kumar, Eitan Altman, Daniele Miorandi, Munish Goyal. 1550-1561 [doi]
- ECHOS - enhanced capacity 802.11 hotspotsArunchandar Vasan, Ramachandran Ramjee, Thomas Y. C. Woo. 1562-1572 [doi]
- Smart power-saving mode for IEEE 802.11 wireless LANsDaji Qiao, Kang G. Shin. 1573-1583 [doi]
- Achieving per-stream QoS with distributed airtime allocation and admission control in IEEE 802.11e wireless LANsChun-Ting Chou, S. N. Shankar, Kang G. Shin. 1584-1595 [doi]
- Design multicast protocols for non-cooperative networksWeizhao Wang, Xiang-Yang Li, Zheng Sun, Yu Wang. 1596-1607 [doi]
- Achieving minimum-cost multicast: a decentralized approach based on network codingDesmond S. Lun, Niranjan Ratnakar, Ralf Koetter, Muriel Médard, Ebad Ahmed, Hyunjoo Lee. 1607-1617 [doi]
- Efficient and distributed computation of maximum multicast ratesZongpeng Li, Baochun Li. 1618-1628 [doi]
- The one-to-many TCP overlay: a scalable and reliable multicast architectureFrançois Baccelli, Augustin Chaintreau, Zhen Liu, Anton Riabov. 1629-1640 [doi]
- High-performance longest prefix matching supporting high-speed incremental updates and guaranteed compressionM. Sundstron, Lars-Åke Larzon. 1641-1652 [doi]
- Gossip algorithms: design, analysis and applicationsStephen P. Boyd, Arpita Ghosh, Balaji Prabhakar, Devavrat Shah. 1653-1664 [doi]
- Improved single-round protocols for remote file synchronizationUtku Irmak, Svilen Mihaylov, Torsten Suel. 1665-1676 [doi]
- FISSIONE: a scalable constant degree and low congestion DHT scheme based on Kautz graphsDongsheng Li, Xicheng Lu, Jie Wu. 1677-1688 [doi]
- A measurement study of Internet bottlenecksNingning Hu, Li Li 0002, Zhuoqing Morley Mao, Peter Steenkiste, Jia Wang. 1689-1700 [doi]
- Efficient monitoring of end-to-end network propertiesDavid B. Chua, Eric D. Kolaczyk, Mark Crovella. 1701-1711 [doi]
- Optimal load-balancingIsaac Keslassy, Cheng-Shang Chang, Nick McKeown, Duan-Shin Lee. 1712-1722 [doi]
- Fairness and optimal stochastic control for heterogeneous networksMichael J. Neely, Eytan Modiano, Chih-Ping Li. 1723-1734 [doi]
- Joint mobility and routing for lifetime elongation in wireless sensor networksJun Luo, Jean-Pierre Hubaux. 1735-1746 [doi]
- Power aware routing for sensor databasesChiranjeeb Buragohain, Divyakant Agrawal, Subhash Suri. 1747-1757 [doi]
- XVR: X visiting-pattern routing for sensor networksYu He, Cauligi S. Raghavendra. 1758-1769 [doi]
- MACRO: an integrated MAC/routing protocol for geographic forwarding in wireless sensor networksD. Ferrara, Laura Galluccio, Alessandro Leonardi, Giacomo Morabito, Sergio Palazzo. 1770-1781 [doi]
- Power controlled minimum frame length scheduling in TDMA wireless networks with sectored antennasArindam Kumar Das, Robert J. Marks II, Payman Arabshahi, Andrew Gray. 1782-1793 [doi]
- Fair resource allocation in wireless networks using queue-length-based scheduling and congestion controlAtilla Eryilmaz, R. Srikant. 1794-1803 [doi]
- The impact of imperfect scheduling on cross-layer rate control in wireless networksXiaojun Lin, Ness B. Shroff. 1804-1814 [doi]
- Random-access scheduling with service differentiation in wireless networksPiyush Gupta, Yogesh Sankarasubramaniam, Alexander L. Stolyar. 1815-1825 [doi]
- Bayesian packet loss detection for TCPNahur Fonseca, Mark Crovella. 1826-1837 [doi]
- TCP-Africa: an adaptive and fair rapid increase rule for scalable TCPR. King, Richard G. Baraniuk, Rudolf H. Riedi. 1838-1848 [doi]
- A disconnection-tolerant transport for drive-thru Internet environmentsJörg Ott, Dirk Kutscher. 1849-1862 [doi]
- A dynamic adaptive acknowledgment strategy for TCP over multihop wireless networksRuy de Oliveira, Torsten Braun. 1863-1874 [doi]
- Minimum energy accumulative routing in wireless networksJiangzhuo Chen, Lujun Jia, Xin Liu, Guevara Noubir, Ravi Sundaram. 1875-1886 [doi]
- PEER: a progressive energy efficient routing protocol for wireless ad hoc networksJinhua Zhu, Xin Wang. 1887-1896 [doi]
- Properties of random direction modelsPhilippe Nain, Donald F. Towsley, Benyuan Liu, Zhen Liu. 1897-1907 [doi]
- SICTA: a 0.693 contention tree algorithm using successive interference cancellationYingqun Yu, Georgios B. Giannakis. 1908-1916 [doi]
- Secure positioning of wireless devices with application to sensor networksSrdjan Capkun, Jean-Pierre Hubaux. 1917-1928 [doi]
- Mobile multi-layered IPsecHeesook Choi, Hui Song, Guohong Cao, Thomas F. La Porta. 1929-1939 [doi]
- Anonymous communications in mobile ad hoc networksYanchao Zhang, Wei Liu, Wenjing Lou. 1940-1951 [doi]
- Distributed algorithms for secure multipath routingPatrick P. C. Lee, Vishal Misra, Dan Rubenstein. 1952-1963 [doi]
- Cross-layer design for lifetime maximization in interference-limited wireless sensor networksRitesh Madan, Shuguang Cui, Sanjay Lall, Andrea J. Goldsmith. 1964-1975 [doi]
- Energy-efficient target coverage in wireless sensor networksMihaela Cardei, My T. Thai, Yingshu Li, Weili Wu. 1976-1984 [doi]
- A novel framework for energy - conserving data gathering in wireless sensor networksWook Choi, Sajal K. Das. 1985-1996 [doi]
- Dynamic node activation in networks of rechargeable sensorsKoushik Kar, Ananth Krishnamurthy, Neeraj Jaggi. 1997-2007 [doi]
- A QoS-aware AIMD protocol for time-sensitive applications in wired/wireless networksLin Cai, Xuemin Shen, Jon W. Mark, Jianping Pan. 2008-2019 [doi]
- Exploiting diversity to enhance multimedia streaming over cellular linksJulian Chesterfield, Rajiv Chakravorty, Ian Pratt, Suman Banerjee, Pablo Rodriguez. 2020-2031 [doi]
- Capacity of packetized voice services over time-shared wireless packet data channelsPatrick Hosein. 2032-2043 [doi]
- GSM: a game scalability model for multiplayer real-time gamesJens Müller, Sergei Gorlatch. 2044-2045 [doi]
- A study of analyzing network traffic as images in real-timeSeong Soo Kim, A. L. Narasimha Reddy. 2056-2067 [doi]
- ClassBench: a packet classification benchmarkDavid E. Taylor, Jonathan S. Turner. 2068-2079 [doi]
- Fast, memory-efficient traffic estimation by coincidence countingFang Hao, Murali S. Kodialam, T. V. Lakshman, Hui Zhang 0002. 2080-2090 [doi]
- The Netnice packet filter: bridging the structural mismatches in end-host network controlTakashi Okumura, Daniel Mossé. 2091-2101 [doi]
- CoolStreaming/DONet: a data-driven overlay network for peer-to-peer live media streamingXinyan Zhang, Jiangchuan Liu, Bo Li, Tak-Shing Peter Yum. 2102-2111 [doi]
- On failure detection algorithms in overlay networksShelley Zhuang, Dennis Geels, Ion Stoica, Randy H. Katz. 2112-2123 [doi]
- Network overlay construction under limited end-to-end reachabilityWenjie Wang, Cheng Jin, Sugih Jamin. 2124-2134 [doi]
- Strategyproof mechanisms for dynamic tree formation in overlay networksSelwyn Yuen, Baochun Li. 2135-2146 [doi]
- Exploiting anarchy in networks: a game-theoretic approach to combining fairness and throughputSreenivas Gollapudi, D. Sivakumar, Aidong Zhang. 2147-2158 [doi]
- An analytic framework for modeling peer to peer networksKrishna K. Ramachandran, Biplab Sikdar. 2159-2169 [doi]
- On static reachability analysis of IP networksGeoffrey G. Xie, Jibin Zhan, David A. Maltz, Hui Zhang, Albert G. Greenberg, Gísli Hjálmtýsson, Jennifer Rexford. 2170-2183 [doi]
- On achieving optimal throughput with network codingZongpeng Li, Baochun Li, Dan Jiang, Lap Chi Lau. 2184-2194 [doi]
- Reaction-diffusion based transmission patterns for ad hoc networksMathilde Durvy, Patrick Thiran. 2195-2205 [doi]
- Power assignment for k-connectivity in wireless ad hoc networksXiaohua Jia, Dongsoo Kim, Sam Makki, Peng-Jun Wan, Chih-Wei Yi. 2206-2211 [doi]
- Joint congestion control and media access control design for ad hoc wireless networksLijun Chen, Steven H. Low, John C. Doyle. 2212-2222 [doi]
- Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh networkAshish Raniwala, Tzi-cker Chiueh. 2223-2234 [doi]
- Network coding for large scale content distributionChristos Gkantsidis, Pablo Rodriguez. 2235-2245 [doi]
- Fast replication in content distribution overlaysSamrat Ganguly, Akhilesh Saxena, Sudeept Bhatnagar, Rauf Izmailov, Suman Banerjee. 2246-2256 [doi]
- Analysis and modeling of MPEG-4 and H.264 multi-layer video trafficMin Dai, Dmitri Loguinov. 2257-2267 [doi]
- Improving VoIP quality through path switchingShu Tao, Kuai Xu, Antonio Estepa, Teng Fei, Lixin Gao, Roch Guérin, James F. Kurose, Donald F. Towsley, Zhi-Li Zhang. 2268-2278 [doi]
- Deployment optimization of sensornet-based stochastic location-detection systemsSaikat Ray, Wei Lai, Ioannis Ch. Paschalidis. 2279-2289 [doi]
- Packetostatics: deployment of massively dense sensor networks as an electrostatics problemStavros Toumpis, Leandros Tassiulas. 2290-2301 [doi]
- Sensor relocation in mobile sensor networksGuiling Wang, Guohong Cao, Thomas F. La Porta, Wensheng Zhang. 2302-2312 [doi]
- SMART: a scan-based movement-assisted sensor deployment method in wireless sensor networksJie Wu, Shuhui Yang. 2313-2324 [doi]
- On optimal partitioning of realtime traffic over multiple pathsShiwen Mao, Shivendra S. Panwar, Yiwei Thomas Hou. 2325-2336 [doi]
- Limiting path exploration in BGPJaideep Chandrashekar, Zhenhai Duan, Zhi-Li Zhang, J. Krasky. 2337-2348 [doi]
- Differentiated traffic engineering for QoS provisioningVahid Tabatabaee, Bobby Bhattacharjee, Richard J. La, Mark A. Shayman. 2349-2359 [doi]
- Optimal ISP subscription for Internet multihoming: algorithm design and implication analysisHao Wang, Haiyong Xie 0002, Lili Qiu, Abraham Silberschatz, Yang Richard Yang. 2360-2371 [doi]
- Design and implementation of network puzzlesWu-chi Feng, Edward C. Kaiser, A. Luu. 2372-2382 [doi]
- Farsighted users harness network time-diversityPeter B. Key, Laurent Massoulié, Milan Vojnovic. 2383-2394 [doi]
- Configuring networks with content filtering nodes with applications to network securityMurali S. Kodialam, T. V. Lakshman, Sudipta Sengupta. 2395-2404 [doi]
- The effect of DNS delays on worm propagation in an IPv6 InternetAbhinav Kamra, Hanhua Feng, Vishal Misra, Angelos D. Keromytis. 2405-2414 [doi]
- Optimal utility based multi-user throughput allocation subject to throughput constraintsMatthew Andrews, Lijun Qian, Alexander L. Stolyar. 2415-2424 [doi]
- Differentiated bandwidth sharing with disparate flow sizesGijs van Kessel, R. Núñez Queija, Sem C. Borst. 2425-2435 [doi]
- Low-state fairness: lower bounds and practical enforcementAbhimanyu Das, Debojyoti Dutta, Ahmed Helmy, Ashish Goel, John S. Heidemann. 2436-2446 [doi]
- RSVP performance evaluation using multi-objective evolutionary optimisationOlufemi Komolafe, Joseph S. Sventek. 2447-2457 [doi]
- Asymptotically optimal transmission policies for low-power wireless sensor networksIoannis Ch. Paschalidis, Wei Lai, David Starobinski. 2458-2469 [doi]
- Delay efficient sleep scheduling in wireless sensor networksGang Lu, Narayanan Sadagopan, Bhaskar Krishnamachari, Ashish Goel. 2470-2481 [doi]
- Maximal lifetime scheduling in sensor surveillance networksHai Liu, Peng-Jun Wan, Chih-Wei Yi, Xiaohua Jia, S. A. M. Makki, Niki Pissinou. 2482-2491 [doi]
- Link scheduling in sensor networks: distributed edge coloring revisitedShashidhar Gandham, Milind Dawande, Ravi Prakash. 2492-2501 [doi]
- On neighbor discovery in wireless networks with directional antennasSudarshan Vasudevan, James F. Kurose, Donald F. Towsley. 2502-2512 [doi]
- On selfish behavior in CSMA/CA networksMario Cagalj, Saurabh Ganeriwal, Imad Aad, Jean-Pierre Hubaux. 2513-2524 [doi]
- On physical carrier sensing in wireless ad hoc networksXue Yang, Nitin H. Vaidya. 2525-2535 [doi]
- Throughput-storage tradeoff in ad hoc networksJ. D. Herdtner, Edwin K. P. Chong. 2536-2542 [doi]
- On the interaction between overlay routing and underlay routingYong Liu, Honggang Zhang, Weibo Gong, Donald F. Towsley. 2543-2553 [doi]
- Topology aware overlay networksJunghee Han, David Watson, Farnam Jahanian. 2554-2565 [doi]
- A cost-based analysis of overlay routing geometriesNicolas Christin, John Chuang. 2566-2577 [doi]
- Market-driven bandwidth allocation in selfish overlay networksW. Wang, B. Li. 2578-2589 [doi]
- Delay bounds for packetizing time-varying fluid policies with speedup and lookahead in single server systemsRaymond Yim, Michael Rosenblum, Vahid Tarokh. 2590-2601 [doi]
- The accuracy of Gilbert models in predicting packet-loss statistics for a single-multiplexer network modelXunqi Yu, James W. Modestino, Xusheng Tian. 2602-2612 [doi]
- Analysis of alternating-priority queueing models with (cross) correlated switchover timesRobin Groenevelt, Eitan Altman. 2613-2624 [doi]
- Time and energy complexity of distributed computation in wireless sensor networksNilesh Khude, Anurag Kumar, Aditya Karnik. 2625-2637 [doi]
- Achieving minimum coverage breach under bandwidth constraints in wireless sensor networksMaggie Xiaoyan Cheng, Lu Ruan, Weili Wu. 2638-2645 [doi]
- Probabilistic QoS guarantee in reliability and timeliness domains in wireless sensor networksEmad Felemban, Chang-Gun Lee, Eylem Ekici, Ryan Boder, Serdar Vural. 2646-2657 [doi]
- Minimum-color path problems for reliability in mesh networksShengli Yuan, S. Varma, Jason P. Jue. 2658-2669 [doi]
- Information theoretic bounds on the throughput scaling of wireless relay networksOlivier Dousse, Massimo Franceschetti, Patrick Thiran. 2670-2678 [doi]
- Distributed rate allocation for inelastic flows: optimization frameworks, optimality conditions, and optimal algorithmsMung Chiang, Shengyu Zhang, Prashanth Hande. 2679-2690 [doi]
- Capacity allocation and routing of locally restorable bandwidth guaranteed connectionsRandeep Bhatia, Murali S. Kodialam, T. V. Lakshman, Sudipta Sengupta. 2691-2701 [doi]
- Linear time construction of redundant trees for recovery schemes enhancing QoP and QoSWeiyi Zhang, Guoliang Xue, Jian Tang, Krishnaiyan Thulasiraman. 2702-2710 [doi]
- Compact neighbor discovery: a bandwidth defense through bandwidth optimizationPars Mutaf, Claude Castelluccia. 2711-2719 [doi]
- A delay analysis for opportunistic transmission in fading broadcast channelsMasoud Sharif, Babak Hassibi. 2720-2730 [doi]
- MiNT: a miniaturized network testbed for mobile wireless researchPradipta De, Ashish Raniwala, Srikant Sharma, Tzi-cker Chiueh. 2731-2742 [doi]
- Perfect simulation and stationarity of a class of mobility modelsJean-Yves Le Boudec, Milan Vojnovic. 2743-2754 [doi]
- A continuum approach to dense wireless networks with cooperationBirsen Sirkeci Mergen, Anna Scaglione. 2755-2763 [doi]
- Traffic sensitive active queue managementMark Claypool, Robert E. Kinicki, A. Kumar. 2764-2769 [doi]
- The impact of network variabilities on TCP clocking schemesKuan-Ta Chen, Polly Huang, Chun-Ying Huang, Chin-Laung Lei. 2770-2775 [doi]
- An efficient mechanism of TCP-Vegas on mobile IP networksCheng-Yuan Ho, Yi-Cheng Chan, Yaw-Chung Chen. 2776-2780 [doi]
- Identifying high-rate flows with less memoryN. Kamiyama. 2781-2785 [doi]
- Utility fair congestion control for real-time trafficTobias Harks, Tobias Poschwatta. 2786-2791 [doi]
- Virtual mobility control domain for enhancements of mobility protocolsRyuji Wakikawa, Yasuhiro Ohara, Jun Murai. 2792-2797 [doi]
- A rational model for service rate allocation in peer-to-peer networksM. Meo, F. Milan. 2798-2802 [doi]
- Measurement-based multipath multicastTuna Güven, Richard J. La, Mark A. Shayman, Bobby Bhattacharjee. 2803-2808 [doi]
- A comparative study of multicast protocols: top, bottom, or in the middle?Li Lao, Jun-Hong Cui, Mario Gerla, Dario Maggiorini. 2809-2814 [doi]
- Predicting Internet end-to-end delay: a multiple-model approachMing Yang, Jifeng Ru, X. Rong Li, Huimin Chen, Anwer Bashi. 2815-2819 [doi]
- Intentional dropping: a novel scheme for SYN flooding mitigationBasheer Al-Duwairi, G. Manimaran. 2820-2824 [doi]
- Capturing accurate snapshots of the Gnutella networkDaniel Stutzbach, Reza Rejaie. 2825-2830 [doi]
- A control theoretic analysis of XCPY. Zhang, M. Ahmed. 2831-2835 [doi]
- DotSlash: handling Web hotspots at dynamic content Web sitesWeibin Zhao, Henning Schulzrinne. 2836-2840 [doi]
- A new scheduler for real-time applications in differentiated services networksD.-L. Pham, Shinji Sugawara, Tetsuya Miki. 2841-2846 [doi]
- Towards autonomous network domainsStefan Schmid, Lars Eggert, Marcus Brunner, Jürgen Quittek. 2847-2852 [doi]
- A fair resource allocation algorithm for peer-to-peer overlaysYannis Drougas, Vana Kalogeraki. 2853-2858 [doi]
- Failure inferencing based fast rerouting for handling transient link and node failuresZifei Zhong, Srihari Nelakuditi, Yinzhe Yu, Sanghwan Lee, Junling Wang, Chen-Nee Chuah. 2859-2863 [doi]
- Efficient distributed admission control for core-stateless networksAvadora Dumitrescu. 2864-2869 [doi]
- Achieving faster access to satellite link bandwidthA. Kapoor, Aaron Falk, Theodore Faber, Y. Pryadkin. 2870-2875 [doi]
- Distributed querying of Internet distance informationRodrigo Fonseca, Puneet Sharma, Sujata Banerjee, Sung-Ju Lee, Sujoy Basu. 2876-2881 [doi]