Abstract is missing.
- RAPID: Shrinking the Congestion-Control TimescaleVishnu Vardhan Reddy Konda, Jasleen Kaur. 1-9 [doi]
- Congestion Control using Efficient Explicit FeedbackIhsan A. Qazi, Taieb Znati, Lachlan L. H. Andrew. 10-18 [doi]
- Stochastic Analysis of Scalable TCPFrançois Baccelli, Giovanna Carofiglio, Marta Piancino. 19-27 [doi]
- Is the Law of the Jungle Sustainable for the Internet?Thomas Bonald, Mathieu Feuillet, Alexandre Proutiére. 28-36 [doi]
- Multirate Anypath Routing in Wireless Mesh NetworksRafael P. Laufer, Henri Dubois-Ferrière, Leonard Kleinrock. 37-45 [doi]
- Minimizing End-to-End Delay: A Novel Routing Metric for Multi-Radio Wireless Mesh NetworksHongkun Li, Yu Cheng, Chi Zhou, Weihua Zhuang. 46-54 [doi]
- On Leveraging Partial Paths in Partially-Connected NetworksSimon Heimlicher, Merkourios Karaliopoulos, Hanoch Levy, Thrasyvoulos Spyropoulos. 55-63 [doi]
- Routing Metric Designs for Greedy, Face and Combined-Greedy-Face RoutingYujun Li, Yaling Yang, Xianliang Lu. 64-72 [doi]
- Queuing Network Models for Multi-Channel P2P Live Streaming SystemsDi Wu, Yong Liu, Keith W. Ross. 73-81 [doi]
- Distilling Superior Peers in Large-Scale P2P Streaming SystemsZimu Liu, Chuan Wu, Baochun Li, Shuqiao Zhao. 82-90 [doi]
- CPM: Adaptive Video-on-Demand with Cooperative Peer Assists and MulticastVijay Gopalakrishnan, Samrat Bhattacharjee, K. K. Ramakrishnan, Rittwik Jana, Divesh Srivastava. 91-99 [doi]
- P2P-TV Systems under Adverse Network Conditions: A Measurement StudyEugenio Alessandria, Massimo Gallo, Emilio Leonardi, Marco Mellia, Michela Meo. 100-108 [doi]
- Surface Coverage in Wireless Sensor NetworksMing-Chen Zhao, Jiayin Lei, Min-You Wu, Yunhuai Liu, Wei Shu. 109-117 [doi]
- Double Mobility: Coverage of the Sea Surface with Mobile Sensor NetworksJi Luo, Dan Wang, Qian Zhang. 118-126 [doi]
- Barrier Coverage of Line-Based Deployed Wireless Sensor NetworksAnwar Saipulla, Cédric Westphal, Benyuan Liu, Jie Wang. 127-135 [doi]
- Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor NetworksPaul Balister, Zizhan Zheng, Santosh Kumar, Prasun Sinha. 136-144 [doi]
- Dynamic Power Allocation Under Arbitrary Varying Channels - An Online ApproachNiv Buchbinder, Liane Lewin-Eytan, Ishai Menache, Joseph Naor, Ariel Orda. 145-153 [doi]
- An Adaptive Link Layer for Range Diversity in Multi-Radio Mobile Sensor NetworksJeremy Gummeson, Deepak Ganesan, Mark D. Corner, Prashant J. Shenoy. 154-162 [doi]
- Near Optimal Multicriteria Spanner Constructions in Wireless Ad-Hoc NetworksHanan Shpungin, Michael Segal. 163-171 [doi]
- Monotonic Optimization for Non-Concave Power Control in Multiuser Multicarrier Network SystemsLi Ping Qian, Ying Jun. 172-180 [doi]
- Cooperative Network Coding-Aware Routing for Multi-Rate Wireless NetworksJin Zhang, Qian Zhang. 181-189 [doi]
- Minimizing Delay for Multicast-Streaming in Wireless Networks with Network CodingWai-Leong Yeow, Anh Tuan Hoang, Chen-Khong Tham. 190-198 [doi]
- Throughput-Delay Tradeoffs in Large-Scale MANETs with Network CodingChi Zhang, Yuguang Fang, Xiaoyan Zhu. 199-207 [doi]
- Effective Delay Control in Online Network CodingJoão Barros, Rui A. Costa, Daniele Munaretto, Jörg Widmer. 208-216 [doi]
- SEER: Metropolitan-Scale Traffic Perception Based on Lossy Sensory DataHongzi Zhu, Yuanchen Zhu, Multicast Li, Lionel M. Ni. 217-225 [doi]
- Reliable Broadcast of Safety Messages in Vehicular Ad Hoc NetworksFarzad Farnoud, Shahrokh Valaee. 226-234 [doi]
- To Cache or Not To Cache?Marco Fiore, Francesco Mininni, Claudio Casetti, Carla-Fabiana Chiasserini. 235-243 [doi]
- Information Propagation Speed in Mobile and Delay Tolerant NetworksPhilippe Jacquet, Bernard Mans, Georgios Rodolakis. 244-252 [doi]
- A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous FlowsRuogu Li, Lei Ying, Atilla Eryilmaz, Ness B. Shroff. 253-261 [doi]
- DiffQ: Practical Differential Backlog Congestion Control for Wireless NetworksAjit Warrier, Sankararaman Janakiraman, Sangtae Ha, Injong Rhee. 262-270 [doi]
- On the Trade-Off Between Control Rate and Congestion in Single Server SystemsKrishna Prasanna Jagannathan, Eytan Modiano, Lizhong Zheng. 271-279 [doi]
- Network Coding Meets TCPJay Kumar Sundararajan, Devavrat Shah, Muriel Médard, Michael Mitzenmacher, João Barros. 280-288 [doi]
- Graceful Network OperationsSaqib Raza, Yuanchen Zhu, Chen-Nee Chuah. 289-297 [doi]
- MARA: Maximum Alternative Routing AlgorithmYasuhiro Ohara, Shinji Imahori, Rodney Van Meter. 298-306 [doi]
- Path Diversity Aware Interdomain RoutingFeng Wang, Lixin Gao. 307-315 [doi]
- BGP-Aware IGP Link Weight Optimization in Presence of Route ReflectorsSimon Balon, Guy Leduc. 316-324 [doi]
- Analysis of Adaptive Incentive Protocols for P2P NetworksBen Q. Zhao, John C. S. Lui, Dah-Ming Chiu. 325-333 [doi]
- On the Market Power of Network Coding in P2P Content Distribution SystemsXinyu Zhang, Baochun Li. 334-342 [doi]
- A Sybilproof Indirect Reciprocity Mechanism for Peer-to-Peer NetworksRaul Landa, David Griffin, Richard G. Clegg, Eleni Mykoniati, Miguel Rio. 343-351 [doi]
- Budget-Based Self-Optimized Incentive Search in Unstructured P2P NetworksYi Hu, Min Feng, Laxmi N. Bhuyan, Vana Kalogeraki. 352-360 [doi]
- A New Distributed Algorithm for Even Coverage and Improved Lifetime in a Sensor NetworkXiaoyu Chu, Harish Sethu. 361-369 [doi]
- Bi-Criteria Approximation Algorithms for Power-Efficient and Low-Interference Topology Control in Unreliable Ad Hoc NetworksMaleq Khan, V. S. Anil Kumar, Madhav V. Marathe, Gopal Pandurangan, S. S. Ravi. 370-378 [doi]
- More is More: The Benefits of Denser Sensor DeploymentMatthew P. Johnson, Deniz Sarioz, Amotz Bar-Noy, Theodore Brown, Dinesh Verma, Chai Wah Wu. 379-387 [doi]
- Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional NetworksXiaole Bai, Chuanlin Zhang, Dong Xuan, Weijia Jia. 388-396 [doi]
- Accelerating Multi-Patterns Matching on Compressed HTTP TrafficAnat Bremler-Barr, Yaron Koral. 397-405 [doi]
- An Efficient Scheme for Securing XOR Network Coding against Pollution AttacksZhen Yu, Yawen Wei, Bhuvaneswari Ramkumar, Yong Guan. 406-414 [doi]
- Variable-Stride Multi-Pattern Matching For Scalable Deep Packet InspectionNan Hua, Haoyu Song, T. V. Lakshman. 415-423 [doi]
- Rule-Based Anomaly Detection on IP FlowsNick G. Duffield, Patrick Haffner, Balachander Krishnamurthy, Haakon Ringberg. 424-432 [doi]
- On Effectiveness of Application-Layer CodingYoojin Choi, Petar Momcilovic. 433-441 [doi]
- Layered Multicast with Inter-Layer Network CodingSorina Dumitrescu, Mingkai Shao, Xiaolin Wu. 442-449 [doi]
- An Evolutionary Approach To Inter-Session Network CodingMinkyu Kim, Muriel Médard, Una-May O Reilly, Danail Traskov. 450-458 [doi]
- Nuclei: GPU-Accelerated Many-Core Network CodingHassan Shojania, Baochun Li, Xin Wang. 459-467 [doi]
- Duty-Cycle-Aware Broadcast in Wireless Sensor NetworksFeng Wang, Jiangchuan Liu. 468-476 [doi]
- Statistical QoS Provisionings for Wireless Unicast/Multicast of Layered Video StreamsQinghe Du, Xi Zhang. 477-485 [doi]
- A Theory of QoS for WirelessI-Hong Hou, Vivek Borkar, P. R. Kumar. 486-494 [doi]
- Structured Admission Control Policy in Heterogeneous Wireless Networks with Mesh UnderlayAmin Farbod, Ben Liang. 495-503 [doi]
- Fit a Spread Estimator in Small MemoryMyungKeun Yoon, Tao Li, Shigang Chen, Jih-Kwon Peir. 504-512 [doi]
- Fast Multiset Membership Testing Using Combinatorial Bloom FiltersFang Hao, Murali S. Kodialam, T. V. Lakshman, Haoyu Song. 513-521 [doi]
- Robust Counting Via Counter Braids: An Error-Resilient Network Measurement ArchitectureYi Lu, Balaji Prabhakar. 522-530 [doi]
- Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational ConstraintsYao Zhao, Zhaosheng Zhu, Yan Chen, Dan Pei, Jia Wang. 531-539 [doi]
- Traffic Engineering vs. Content Distribution: A Game Theoretic PerspectiveDominic DiPalantino, Ramesh Johari. 540-548 [doi]
- Searching for Stability in Interdomain RoutingRahul Sami, Michael Schapira, Aviv Zohar. 549-557 [doi]
- Polynomial Time Approximations for Multi-Path Routing with Bandwidth and Delay ConstraintsSatyajayant Misra, Guoliang Xue, Dejun Yang. 558-566 [doi]
- Scalable Content-Based Routing in Pub/Sub SystemsAnirban Majumder, Nisheeth Shrivastava, Rajeev Rastogi, Anand Srinivasan. 567-575 [doi]
- Absence of Evidence as Evidence of Absence: A Simple Mechanism for Scalable P2P SearchStratis Ioannidis, Peter Marbach. 576-584 [doi]
- BitTorrent: An Extensible Heterogeneous ModelAlix L. H. Chow, Leana Golubchik, Vishal Misra. 585-593 [doi]
- Minimizing Average Finish Time in P2P NetworksG. Matthew Ezovski, Ao Tang, Lachlan L. H. Andrew. 594-602 [doi]
- LayerP2P: A New Data Scheduling Approach for Layered Streaming in Heterogeneous NetworksXin Xiao, Yuanchun Shi, Yuan Gao, Qian Zhang. 603-611 [doi]
- Optimal Anycast Technique for Delay-Sensitive Energy-Constrained Asynchronous Sensor NetworksJoohwan Kim, Xiaojun Lin, Ness B. Shroff. 612-620 [doi]
- Energy-Efficient Clustering/Routing for Cooperative MIMO Operation in Sensor NetworksMohammad Z. Siam, Marwan Krunz, Ossama Younis. 621-629 [doi]
- Energy Efficient TDMA Sleep Scheduling in Wireless Sensor NetworksJunchao Ma, Wei Lou, Yanwei Wu, Xiang-Yang Li, Guihai Chen. 630-638 [doi]
- Hermes: Fast and Energy Efficient Incremental Code Updates for Wireless Sensor NetworksRajesh Krishna Panta, Saurabh Bagchi. 639-647 [doi]
- Packet Classification Algorithms: From Theory to PracticeYaxuan Qi, Lianghong Xu, Baohua Yang, Yibo Xue, Jun Li. 648-656 [doi]
- Detecting Selfish Exploitation of Carrier Sensing in 802.11 NetworksKonstantinos Pelechrinis, Guanhua Yan, Stephan Eidenbenz, Srikanth V. Krishnamurthy. 657-665 [doi]
- Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing AttacksJie Yang, Yingying Chen, Wade Trappe, Jay Cheng. 666-674 [doi]
- ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access NetworksSong Liu, Yingying Chen, Wade Trappe, Larry J. Greenstein. 675-683 [doi]
- Controlling False Alarm/Discovery Rates in Online Internet Traffic Flow ClassificationDaniel Nechay, Yvan Pointurier, Mark Coates. 684-692 [doi]
- On the Effectiveness of Measurement Reuse for Performance-Based DetouringDavid R. Choffnes, Fabian E. Bustamante. 693-701 [doi]
- OneClick: A Framework for Measuring Network Quality of ExperienceKuan-Ta Chen, Cheng-Chun Tu, Wei-Cheng Xiao. 702-710 [doi]
- Seven Years and One Day: Sketching the Evolution of Internet TrafficPierre Borgnat, Guillaume Dewaele, Kensuke Fukuda, Patrice Abry, Kenjiro Cho. 711-719 [doi]
- Emulation and Approximation of a Flexible Delay Line by Parallel Non-Overtaking Delay LinesDuan-Shin Lee, Kai-Jie Hsu, Cheng-Shang Chang, Jay Cheng. 720-728 [doi]
- The Crosspoint-Queued SwitchJosef Kanizo, David Hay, Isaac Keslassy. 729-737 [doi]
- SDL Constructions of FIFO, LIFO and Absolute ContractorsCheng-Shang Chang, Jay Cheng, Duan-Shin Lee. 738-746 [doi]
- A Dynamic Frame Sizing Algorithm for CICQ Switches with 100 ThroughputCheng-Shang Chang, Yu-Hao Hsu, Jay Cheng, Duan-Shin Lee. 747-755 [doi]
- On Efficient Content Matching in Distributed Pub/Sub SystemsWeixiong Rao, Lei Chen 0002, Ada Wai-Chee Fu, Hanhua Chen, Futai Zou. 756-764 [doi]
- Fault Management Using the CONMan AbstractionHitesh Ballani, Paul Francis. 765-773 [doi]
- Hardness and Approximation of the Survivable Multi-Level Fat Tree ProblemHung Q. Ngo, Thanh-Nhan Nguyen, Dahai Xu. 774-782 [doi]
- Virtual Network Embedding with Coordinated Node and Link MappingN. M. M. K. Chowdhury, Muntasir Raihan Rahman, Raouf Boutaba. 783-791 [doi]
- Quantifying the Importance of Vantage Points Distribution in Internet Topology MeasurementsYuval Shavitt, Udi Weinsberg. 792-800 [doi]
- Estimating Hop Distance Between Arbitrary Host PairsBrian Eriksson, Paul Barford, Robert D. Nowak. 801-809 [doi]
- Identifying High Cardinality Internet HostsJing Cao, Yu Jin, Aiyou Chen, Tian Bu, Zhi-Li Zhang. 810-818 [doi]
- Tracking Cardinality Distributions in Network TrafficAiyou Chen, Li (Erran) Li, Jin Cao. 819-827 [doi]
- Exact Analysis of Latency of Stateless Opportunistic ForwardingChi-Kin Chau, Prithwish Basu. 828-836 [doi]
- Fair Routing in Delay Tolerant NetworksJosep M. Pujol, Alberto Lopez Toledo, Pablo Rodriguez. 837-845 [doi]
- Encounter-Based Routing in DTNsSamuel C. Nelson, Mehedi Bakht, Robin Kravets. 846-854 [doi]
- SLAW: A New Mobility Model for Human WalksKyunghan Lee, Seongik Hong, Seong Joon Kim, Injong Rhee, Song Chong. 855-863 [doi]
- apt-p2p: A Peer-to-Peer Distribution System for Software Package Releases and UpdatesCameron Dale, Jiangchuan Liu. 864-872 [doi]
- FS2You: Peer-Assisted Semi-Persistent Online Storage at a Large ScaleYe Sun, Fangming Liu, Bo Li, Baochun Li, Xinyan Zhang. 873-881 [doi]
- Minimum Maximum Degree Publish-Subscribe Overlay Network DesignMelih Onus, Andréa W. Richa. 882-890 [doi]
- Understanding the Performance Gap Between Pull-Based Mesh Streaming Protocols and Fundamental LimitsChen Feng, Baochun Li, Bo Li. 891-899 [doi]
- Event Recognition in Sensor Networks by Means of Grammatical InferenceSahin Cem Geyik, Boleslaw K. Szymanski. 900-908 [doi]
- Obstacle Discovery in Distributed Active Sensor NetworksRong Zheng, Amit Pendharkar. 909-917 [doi]
- Barrier Information Coverage with Wireless SensorsGuanqun Yang, Daji Qiao. 918-926 [doi]
- VISA: Virtual Scanning Algorithm for Dynamic Protection of Road NetworksJaehoon Jeong, Yu Gu, Tian He, David Du. 927-935 [doi]
- ElliPS: A Privacy Preserving Scheme for Sensor Data Storage and QueryNalin Subramanian, Ka Yang, Wensheng Zhang, Daji Qiao. 936-944 [doi]
- Secure Range Queries in Tiered Sensor NetworksJing Shi, Rui Zhang, Yanchao Zhang. 945-953 [doi]
- Dependable and Secure Sensor Data Storage with Dynamic Integrity AssuranceQian Wang, Kui Ren, Wenjing Lou, Yanchao Zhang. 954-962 [doi]
- FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor NetworksShucheng Yu, Kui Ren, Wenjing Lou. 963-971 [doi]
- On Mechanism Design without Payments for Throughput MaximizationThomas Moscibroda, Stefan Schmid. 972-980 [doi]
- Distributed Power Allocation Algorithm for Spectrum Sharing Cognitive Radio Networks with QoS GuaranteeYuan Wu, Danny H. K. Tsang. 981-989 [doi]
- Network Pricing and Rate Allocation with Content Provider ParticipationPrashanth Hande, Mung Chiang, A. Robert Calderbank, Sundeep Rangan. 990-998 [doi]
- TRUST: A General Framework for Truthful Double Spectrum AuctionsXia Zhou, Haitao Zheng. 999-1007 [doi]
- On Monitoring and Failure Localization in Mesh All-Optical NetworksJános Tapolcai, Bin Wu, Pin-Han Ho. 1008-1016 [doi]
- Cross-Layer Survivability in WDM-Based NetworksKyunghan Lee, Eytan Modiano. 1017-1025 [doi]
- Circuits/Cutsets Duality and a Unified Algorithmic Framework for Survivable Logical Topology Design in IP-over-WDM Optical NetworksKrishnaiyan Thulasiraman, Muhammad S. Javed, Guoliang Xue. 1026-1034 [doi]
- Diverse Routing in Networks with Probabilistic FailuresHyang-Won Lee, Eytan Modiano. 1035-1043 [doi]
- Online Bipartite Perfect Matching With AugmentationsKamalika Chaudhuri, Constantinos Daskalakis, Robert D. Kleinberg, Henry Lin. 1044-1052 [doi]
- An Information-Theoretic Characterization of Weighted alpha-Proportional FairnessMasato Uchida, Jim Kurose. 1053-1061 [doi]
- Competitive Scheduling of Packets with Hard Deadlines in a Finite Capacity QueueFei Li. 1062-1070 [doi]
- A Case for Decomposition of FIFO NetworksFlorin Ciucu, Jörg Liebeherr. 1071-1079 [doi]
- Isolating Physical PER for Smart Rate Selection in 802.11Malik Ahmad Yar Khan, Darryl Veitch. 1080-1088 [doi]
- Assessing the Fidelity of COTS 802.11 SniffersPablo Serrano, Michael Zink, Jim Kurose. 1089-1097 [doi]
- Understanding Fairness and its Impact on Quality of Service in IEEE 802.11Michael Bredel, Markus Fidler. 1098-1106 [doi]
- Measuring Complexity and Predictability in Networks with Multiscale Entropy AnalysisJanne Riihijärvi, Matthias Wellens, Petri Mähönen. 1107-1115 [doi]
- The Accordion Phenomenon: Analysis, Characterization, and Impact on DTN RoutingPierre-Ugo Tournoux, Jeremie Leguay, Farid Benbadis, Vania Conan, Marcelo Dias de Amorim, John Whitbeck. 1116-1124 [doi]
- An Evaluation of Weak State Mechanism Design for Indirection in Dynamic NetworksUtku Gunay Acer, Alhussein A. Abouzeid, Shivkumar Kalyanaraman. 1125-1133 [doi]
- Decentralized Stochastic Control of Delay Tolerant NetworksEitan Altman, Giovanni Neglia, Francesco De Pellegrini, Daniele Miorandi. 1134-1142 [doi]
- Performance Comparison of Weather Disruption-Tolerant Cross-Layer Routing AlgorithmsAbdul Jabbar, Justin P. Rohrer, Andrew Oberthaler, Egemen K. Cetinkaya, Victor Frost, James P. G. Sterbenz. 1143-1151 [doi]
- NetTube: Exploring Social Networks for Peer-to-Peer Short Video SharingXu Cheng, Jiangchuan Liu. 1152-1160 [doi]
- P2P Second Life: Experimental Validation Using KadMatteo Varvello, C. Diout, Ernst W. Biersack. 1161-1169 [doi]
- MIX-Crowds, an Anonymity Scheme for File Retrieval SystemsWai Hung Tang, H. W. Chan. 1170-1178 [doi]
- Tuning Skype s Redundancy Control Algorithm for User SatisfactionTe-Yuan Huang, Kuan-Ta Chen, Polly Huang. 1179-1187 [doi]
- Dynamic Node Collaboration for Mobile Target Tracking in Wireless Camera Sensor NetworksLiang Liu, Xi Zhang, Huadong Ma. 1188-1196 [doi]
- Opportunistic Processing and Query of Motion Trajectories in Wireless Sensor NetworksDengpan Zhou, Jie Gao. 1197-1205 [doi]
- Sensor Placement for Detecting Propagative Sources in Populated EnvironmentsYong Yang, I-Hong Hou, Jennifer C. Hou, Mallikarjun Shankar, Nageswara S. V. Rao. 1206-1214 [doi]
- Tracking with Unreliable Node SequencesZiguo Zhong, Ting Zhu, Dan Wang, Tian He. 1215-1223 [doi]
- Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network CodingElias Kehdi, Baochun Li. 1224-1232 [doi]
- Time Valid One-Time Signature for Time-Critical Multicast Data AuthenticationQiyan Wang, Himanshu Khurana, Ying Huang, Klara Nahrstedt. 1233-1241 [doi]
- Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor NetworksAn Liu, Peng Ning, Chun Wang. 1242-1250 [doi]
- DP:::2:::AC: Distributed Privacy-Preserving Access Control in Sensor NetworksRui Zhang, Yanchao Zhang, Kui Ren. 1251-1259 [doi]
- Mobility-Driven Scheduling in Wireless NetworksSem C. Borst, Nidhi Hegde, Alexandre Proutiere. 1260-1268 [doi]
- Downlink MIMO with Frequency-Domain Packet Scheduling for 3GPP LTESuk-Bok Lee, Sayantan Choudhury, Ahmad Khoshnevis, Shugong Xu, Songwu Lu. 1269-1277 [doi]
- Multiserver Scheduling with Contiguity ConstraintsMatthew Andrews, Li Zhang. 1278-1286 [doi]
- Self-Organizing Dynamic Fractional Frequency Reuse for Best-Effort Traffic through Distributed Inter-Cell CoordinationAlexander L. Stolyar, Harish Viswanathan. 1287-1295 [doi]
- PEDS: A Parallel Error Detection Scheme for TCAM DevicesAnat Bremler-Barr, David Hay, Danny Hendler, Ron M. Roth. 1296-1304 [doi]
- Layered Interval Codes for TCAM-Based ClassificationAnat Bremler-Barr, David Hay, Danny Hendler. 1305-1313 [doi]
- Minimizing Rulesets for TCAM ImplementationRick McGeer, Praveen Yalagandula. 1314-1322 [doi]
- Considerations for Sizing Buffers in Optical Packet Switched NetworksArun Vishwanath, Vijay Sivaraman, George N. Rouskas. 1323-1331 [doi]
- Maximizing Capacity in Arbitrary Wireless Networks in the SINR Model: Complexity and Game TheoryMatthew Andrews, Michael Dinitz. 1332-1340 [doi]
- Computing the Capacity Region of a Wireless NetworkRamakrishna Gummadi, Kyomin Jung, Devavrat Shah, Ramavarapu Sreenivas. 1341-1349 [doi]
- Fast Algorithms and Performance Bounds for Sum Rate Maximization in Wireless NetworksChee-Wei Tan, Mung Chiang, R. Srikant. 1350-1358 [doi]
- The Capacity Allocation ParadoxAsaf Baron, Ran Ginosar, Isaac Keslassy. 1359-1367 [doi]
- Fast Recovery from Dual Link Failures in IP NetworksShrinivasa Kini, Srinivasan Ramasubramanian, Amund Kvalbein, Audun Fosselie Hansen. 1368-1376 [doi]
- Network Performance Anomaly Detection and LocalizationPaul Barford, Nick Duffield, Amos Ron, Joel Sommers. 1377-1385 [doi]
- Minimizing Probing Cost for Detecting Interface Failures: Algorithms and Scalability AnalysisHung Xuan Nguyen, Renata Teixeira, Patrick Thiran, Christophe Diot. 1386-1394 [doi]
- Failure Control in Multipath Route TracingDarryl Veitch, Brice Augustin, Renata Teixeira, Timur Friedman. 1395-1403 [doi]
- MobTorrent: A Framework for Mobile Internet Access from VehiclesBin Bin Chen, Mun Choon Chan. 1404-1412 [doi]
- SPARK: A New VANET-Based Smart Parking Scheme for Large Parking LotsRongxing Lu, Xiaodong Lin, Haojin Zhu, Xuemin Shen. 1413-1421 [doi]
- Optimal and Scalable Distribution of Content Updates over a Mobile Social NetworkStratis Ioannidis, Augustin Chaintreau, Laurent Massoulié. 1422-1430 [doi]
- Distributed Storage Management of Evolving Files in Delay Tolerant Ad Hoc NetworksEitan Altaian, Philippe Nain, Jean-Claude Bermond. 1431-1439 [doi]
- The Stable Configuration of Acyclic Preference-Based SystemsFabien Mathieu, Gheorghe Postelnicu, Julien Reynier. 1440-1448 [doi]
- Routing Fairness in Chord: Analysis and EnhancementRubén Cuevas RumÃn, Manuel Urueña, Albert Banchs. 1449-1457 [doi]
- Distributed Arrays: A P2P Data Structure for Efficient Logical ArraysDaisuke Fukuchi, Christian Sommer 0002, Yuichi Sei, Shinichi Honiden. 1458-1466 [doi]
- Exploiting Internet Delay Space Properties for Selecting Distinct Network LocationsBo Zhang, T. S. Eugene Ng. 1467-1475 [doi]
- A Social Network Based Patching Scheme for Worm Containment in Cellular NetworksZhichao Zhu, Guohong Cao, Sencun Zhu, Supranamaya Ranjan, Antonio Nucci. 1476-1484 [doi]
- Protecting Against Network Infections: A Game Theoretic PerspectiveJasmina Omic, Ariel Orda, Piet Van Mieghem. 1485-1493 [doi]
- Economic Incentives to Increase Security in the Internet: The Case for InsuranceMarc Lelarge, Jean Bolot. 1494-1502 [doi]
- Defending Mobile Phones from Proximity MalwareGjergji Zyba, Geoffrey M. Voelker, Michael Liljenstam, András Méhes, Per Johansson. 1503-1511 [doi]
- The Complexity of Channel Scheduling in Multi-Radio Multi-Channel Wireless NetworksWei Cheng, Xiuzhen Cheng, Taieb Znati, Xicheng Lu, Zexin Lu. 1512-1520 [doi]
- Distributed Strategies for Channel Allocation and Scheduling in Software-Defined Radio NetworksBo Han, V. S. Anil Kumar, Madhav V. Marathe, Srinivasan Parthasarathy 0002, Anand Srinivasan. 1521-1529 [doi]
- Power Controlled Scheduling with Consecutive Transmission Constraints: Complexity Analysis and Algorithm DesignLiqun Fu, Soung Chang Liew, Jianwei Huang. 1530-1538 [doi]
- Efficient Algorithms for Leveraging Spatial Reuse in OFDMA Relay NetworksKarthikeyan Sundaresan, Sampath Rangarajan. 1539-1547 [doi]
- Approximation Algorithms for Grooming in Optical Network DesignSpyridon Antonakopoulos, Li Zhang. 1548-1556 [doi]
- Impairment-Aware Offline RWA for Transparent Optical NetworksKonstantinos Manousakis, Kostas Christodoulopoulos, Emmanouel A. Varvarigos. 1557-1565 [doi]
- Assessing the Vulnerability of the Fiber Infrastructure to DisastersSebastian Neumayer, Gil Zussman, Reuven Cohen, Eytan Modiano. 1566-1574 [doi]
- Analysis of Blocking Probability for First-Fit RWA in Transmission Impaired Optical NetworksJun He, Maïté Brandt-Pearce, Suresh Subramaniam. 1575-1583 [doi]
- EtherProxy: Scaling Ethernet By Suppressing Broadcast TrafficKhaled Elmeleegy, Alan L. Cox. 1584-1592 [doi]
- A Measurement Based Rogue AP Detection SchemeHao Han, Bo Sheng, Chee-Wei Tan, Qun Li, Sanglu Lu. 1593-1601 [doi]
- All Bits Are Not Equal - A Study of IEEE 802.11 Communication Bit ErrorsBo Han, Lusheng Ji, Seungjoon Lee, Bishwaranjan Bhattacharjee, Robert R. Miller. 1602-1610 [doi]
- Team and Noncooperative Solutions to Access Control with PrioritiesEitan Altman, Ishai Menache, Alberto Suarez. 1611-1619 [doi]
- Topology Design and Control: A Game-Theoretic PerspectiveAmir Nahir, Ariel Orda, A. Freund. 1620-1628 [doi]
- Spatial SINR Games Combining Base Station Placement and Mobile AssociationEitan Altman, Anurag Kumar, Chandramani Kishore Singh, Rajesh Sundaresan. 1629-1637 [doi]
- Wi-Sh: A Simple, Robust Credit Based Wi-Fi Community NetworkXin Ai, Vikram Srinivasan, Chen-Khong Tham. 1638-1646 [doi]
- Hyperbolic Embedding and Routing for Dynamic GraphsAndrej Cvetkovski, Mark Crovella. 1647-1655 [doi]
- Load Balancing in Wireless Sensor Networks using Kirchhoff s Voltage LawStavros Toumpis, Savvas Gitzenis. 1656-1664 [doi]
- Joint Transport, Routing and Spectrum Sharing Optimization for Wireless Networks with Frequency-Agile RadiosZhenhua Feng, Yaling Yang. 1665-1673 [doi]
- On Combining Shortest-Path and Back-Pressure Routing Over Multihop Wireless NetworksLei Ying, Sanjay Shakkottai, Aneesh Reddy. 1674-1682 [doi]
- Distributed Opportunistic Scheduling With Two-Level Channel ProbingP. S. Chandrashekhar Thejaswi, Junshan Zhang, Man-On Pun, H. Vincent Poor. 1683-1691 [doi]
- Delay-Optimal Opportunistic Scheduling and Approximations: The Log RuleBilal Sadiq, Seung Jun Baek, Gustavo de Veciana. 1692-1700 [doi]
- Instability of MaxWeight Scheduling AlgorithmsPeter van de Ven, Sem Borst, S. Shneer. 1701-1709 [doi]
- On Fast Optimal STDMA Scheduling over Fading Wireless ChannelsJialiang Zhang, Soung Chang Liew, Liqun Fu. 1710-1718 [doi]
- Visibility-Graph-Based Shortest-Path Geographic Routing in Sensor NetworksGuang Tan, Marin Bertier, Anne-Marie Kermarrec. 1719-1727 [doi]
- VirtualFace: An Algorithm to Guarantee Packet Delivery of Virtual-Coordinate-Based Routing Protocols in Wireless Sensor NetworksMing-Jer Tsai, Fang-Ru Wang, Hong-Yen Yang, Yuan-Po Cheng. 1728-1736 [doi]
- Greedy Routing with Bounded StretchRoland Flury, Sriram V. Pemmaraju, Roger Wattenhofer. 1737-1745 [doi]
- Convex Partition of Sensor Networks and Its Use in Virtual Coordinate Geographic RoutingGuang Tan, Marin Bertier, Anne-Marie Kermarrec. 1746-1754 [doi]
- Fighting Spam with the NeighborhoodWatch DHTAdam Bender, Rob Sherwood, Derek Monner, Nathan Goergen, Neil Spring, Bobby Bhattacharjee. 1755-1763 [doi]
- Detecting Spam Zombies by Monitoring Outgoing MessagesZhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei Dong, M. Stephenson, J. Barker. 1764-1772 [doi]
- Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential AnalysisJun-Won Ho, Matthew Wright, Samir K. Das. 1773-1781 [doi]
- Grouping-Based Resilient Statistical En-Route Filtering for Sensor NetworksLei Yu, Jianzhong Li. 1782-1790 [doi]
- Rateless Coding with FeedbackAndrew Hagedorn, Sachin Agarwal, David Starobinski, Ari Trachtenberg. 1791-1799 [doi]
- Random Linear Network Coding For Time Division Duplexing: When To Stop Talking And Start ListeningDaniel Enrique Lucani, Milica Stojanovic, Muriel Médard. 1800-1808 [doi]
- Passive Loss Inference in Wireless Sensor Networks Based on Network CodingYunfeng Lin, Ben Liang, Baochun Li. 1809-1817 [doi]
- Reducing Packet Losses in Networks of Commodity IEEE 802.15.4 Sensor Motes Using Cooperative Communication and Diversity CombinationMuhammad Usman Ilyas, Moonseong Kim, Hayder Radha. 1818-1826 [doi]
- ST-MAC: Spatial-Temporal MAC Scheduling for Underwater Sensor NetworksChih-Cheng Hsu, Kuang-Fu Lai, Cheng-Fu Chou, Kate Ching-Ju Lin. 1827-1835 [doi]
- Soft-TDMAC: A Software TDMA-Based MAC over Commodity 802.11 HardwarePetar Djukic, Prasant Mohapatra. 1836-1844 [doi]
- C-MAC: Model-Driven Concurrent Medium Access Control for Wireless Sensor NetworksMo Sha, Guoliang Xing, Gang Zhou, Shucheng Liu, Xiaorui Wang. 1845-1853 [doi]
- Interference-Aware MAC Protocol for Wireless Networks by a Game-Theoretic ApproachHyungJune Lee, Hyukjoon Kwon, Arik Motskin, Leonidas J. Guibas. 1854-1862 [doi]
- Scaling Laws on Multicast Capacity of Large Scale Wireless NetworksCheng Wang, Xiang-Yang Li, Changjun Jiang, ShaoJie Tang, Yunhao Liu, Jizhong Zhao. 1863-1871 [doi]
- Capacity of Arbitrary Wireless NetworksOlga Goussevskaia, Roger Wattenhofer, Magnús M. Halldórsson, Emo Welzl. 1872-1880 [doi]
- The Multicast Capacity Region of Large Wireless NetworksUrs Niesen, Piyush Gupta, Devavrat Shah. 1881-1889 [doi]
- Capacity Scaling of Wireless Networks with Inhomogeneous Node Density: Lower BoundsGiuseppa Alfano, Michele Garetto, Emilio Leonardi. 1890-1898 [doi]
- Forward Correction and Fountain codes in Delay Tolerant NetworksEitan Altman, Francesco De Pellegrini. 1899-1907 [doi]
- Extreme Value FEC for Wireless Data BroadcastingWeiyao Xiao, David Starobinski. 1908-1916 [doi]
- Cross-Layer Hybrid FEC/ARQ Reliable Multicast with Adaptive Modulation and Coding in Broadband Wireless NetworksReuven Cohen, Guy Grebla, Liran Katzir. 1917-1925 [doi]
- On Optimal Control of Wireless Networks with Multiuser Detection, Hybrid ARQ and Distortion ConstraintsMarco Levorato, Urbashi Mitra, Michele Zorzi. 1926-1934 [doi]
- On Cooperative Wireless Network SecrecyEtienne Perron, Suhas N. Diggavi, Emre Telatar. 1935-1943 [doi]
- Location Cloaking for Safety Protection of Ad Hoc NetworksToby Xu, Ying Cai. 1944-1952 [doi]
- ACTION: Breaking the Privacy Barrier for RFID SystemsLi Lu, Jinsong Han, Renyi Xiao, Yunhao Liu. 1953-1961 [doi]
- Fundamental Limits on Secure Clock Synchronization and Man-In-The-Middle Detection in Fixed Wireless NetworksJerry T. Chiang, Jason J. Haas, Yih-Chun Hu, P. R. Kumar, Jihyuk Choi. 1962-1970 [doi]
- Improving Zap Response Time for IPTVYigal Bejerano, Pramod V. Koppol. 1971-1979 [doi]
- Enabling Content Dissemination Using Efficient and Scalable MulticastTae Won Cho, Michael Rabinovich, K. K. Ramakrishnan, Divesh Srivastava, Yin Zhang. 1980-1988 [doi]
- Towards Economically Viable Infrastructure-Based Overlay Multicast NetworksVarun Khare, Bo Zhang. 1989-1997 [doi]
- RADcast: Enabling Reliability Guarantees for Content Dissemination in Ad Hoc NetworksBo Xing, Sharad Mehrotra, Nalini Venkatasubramanian. 1998-2006 [doi]
- Power-Aware Speed Scaling in Processor Sharing SystemsAdam Wierman, Lachlan L. H. Andrew, Ao Tang. 2007-2015 [doi]
- Admissible Traces, Stability and Rate Management of Queueing / Switching Service StructuresLykomidis Mastroleon. 2016-2024 [doi]
- Exploiting the Path Propagation Time Differences in Multipath Transmission with FECMaciej Kurant. 2025-2033 [doi]
- UNAP: User-Centric Network-Aware Push for Mobile Content DeliveryRandeep Bhatia, Girija J. Narlikar, Ivica Rimac, Andre Beck. 2034-2042 [doi]
- Analysis of Spatial Unfairness in Wireless LANsSeung-Jae Han, Thyaga Nandagopal, Yigal Bejerano, Hyoung-Gyu Choi. 2043-2051 [doi]
- Synchronized CSMA Contention: Model, Implementation and EvaluationJing Shi, Ehsan Aryafar, Theodoros Salonidis, Edward W. Knightly. 2052-2060 [doi]
- Toward Optimal Utilization of Shared Random Access ChannelsJoseph Naor, Danny Raz, Gabriel Scalosub. 2061-2069 [doi]
- A Protocol-Independent Approach for Analyzing the Optimal Operation Point of CSMA/CA ProtocolsYu Cheng, Xinhua Ling, Weihua Zhuang. 2070-2078 [doi]
- Routing Over Multi-Hop Wireless Networks with Non-Ergodic MobilityChris Milling, Sundar Subramanian, Sanjay Shakkottai, Randall Berry. 2079-2087 [doi]
- The Impact of Mobility on Gossip AlgorithmsAnand D. Sarwate, Alexandros G. Dimakis. 2088-2096 [doi]
- Using NEMO to Support the Global Reachability of MANET NodesBen McCarthy, Christopher Edwards, Martin Dunmore. 2097-2105 [doi]
- SWIM: A Simple Model to Generate Small Mobile WorldsAlessandro Mei, Julinda Stefa. 2106-2113 [doi]
- Coalitional Games for Distributed Collaborative Spectrum Sensing in Cognitive Radio NetworksWalid Saad, Zhu Han, Mérouane Debbah, Are Hjørungnes, Tamer Basar. 2114-2122 [doi]
- Cooperative Profit Sharing in Coalition Based Resource Allocation in Wireless NetworksAlireza Aram, Chandramani Kishore Singh, Saswati Sarkar, Anurag Kumar. 2123-2131 [doi]
- On the Convergence of Perturbed Non-Stationary Consensus AlgorithmsTuncer C. Aysal, Kenneth E. Barner. 2132-2140 [doi]
- XOR-Assisted Cooperative Diversity in OFDMA Wireless Networks: Optimization Framework and Approximation AlgorithmsHong Xu, Baochun Li. 2141-2149 [doi]
- Prize-Collecting Data Fusion for Cost-Performance Tradeoff in Distributed InferenceAnimashree Anandkumar, Meng Wang, Lang Tong, Ananthram Swami. 2150-2158 [doi]
- Distributed Data Aggregation Scheduling in Wireless Sensor NetworksBo Yu, Jiangchuan Li, Yong Li. 2159-2167 [doi]
- Minimizing the Cost of Mine Selection Via Sensor NetworksChanglei Liu, Guohong Cao. 2168-2176 [doi]
- Identity Aware Sensor NetworksLorenzo Keller, Mahdi Jafari Siavoshani, Christina Fragouli, Katerina J. Argyraki, Suhas N. Diggavi. 2177-2185 [doi]
- Building Covert Channels over the Packet Reordering PhenomenonAdel El-Atawy, Ehab Al-Shaer. 2186-2194 [doi]
- Blind Detection of Spread Spectrum Flow WatermarksWeijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan, Wei Yu. 2195-2203 [doi]
- TCP/IP Timing Channels: Theory to ImplementationSarah H. Sellke, Chih-Chun Wang, Saurabh Bagchi, Ness B. Shroff. 2204-2212 [doi]
- An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network CodingYanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen. 2213-2221 [doi]
- On Video Multicast in Cognitive Radio NetworksDonglin Hu, Shiwen Mao, Jeffrey H. Reed. 2222-2230 [doi]
- Time Slicing in Mobile TV Broadcast Networks with Arbitrary Channel Bit RatesCheng-Hsin Hsu, Mohamed Hefeeda. 2231-2239 [doi]
- Locally vs. Globally Optimized Flow-Based Content Distribution to Mobile NodesMhameed Aezladen, Reuven Cohen, Danny Raz. 2240-2248 [doi]
- Interference-Resilient Information ExchangeSeth Gilbert, Rachid Guerraoui, Dariusz R. Kowalski, Calvin C. Newport. 2249-2257 [doi]
- Link Gradients: Predicting the Impact of Network Latency on Multitier ApplicationsShuyi Chen, Kaustubh R. Joshi, Matti A. Hiltunen, William H. Sanders, Richard D. Schlichting. 2258-2266 [doi]
- On the Impact of Heterogeneity and Back-End Scheduling in Load Balancing DesignsHo-Lin Chen, Jason R. Marden, Adam Wierman. 2267-2275 [doi]
- FiConn: Using Backup Port for Server Interconnection in Data CentersDan Li, Chuanxiong Guo, Haitao Wu, Kun Tan, Songwu Lu. 2276-2285 [doi]
- Load Balancing for SIP Server ClustersHongbo Jiang, Arun Iyengar, Erich M. Nahum, Wolfgang Segmuller, Asser N. Tantawi, Charles P. Wright. 2286-2294 [doi]
- Optimal Sensing-Transmission Structure for Dynamic Spectrum AccessSenhua Huang, Xin Liu, Zhi Ding. 2295-2303 [doi]
- Cooperative Relay for Cognitive Radio NetworksJuncheng Jia, J. Jun Jun Zhang, Qian Zhang. 2304-2312 [doi]
- An Experimental Evaluation of Rate Adaptation for Multi-Antenna SystemsWonsoo Kim, O. Khan, Kien T. Truong, Soon-Hyeok Choi, Robert Grant, Hyrum K. Wright, Ketan Mandke, Robert C. Daniels, Robert W. Heath Jr., Scott Nettles. 2313-2321 [doi]
- Dynamic Spectrum Access Protocol Without Power Mask ConstraintsHaythem Bany Salameh, Marwan Krunz, Ossama Younis. 2322-2330 [doi]
- Delay Guarantees for Throughput-Optimal Wireless Link SchedulingKoushik Kar, Xiang Luo, Saswati Sarkar. 2331-2339 [doi]
- Minimum-Latency Beaconing Schedule in Multihop Wireless NetworksPeng-Jun Wan, Xiao-hua Xu, Lixin Wang, Xiaohua Jia, E. K. Park. 2340-2346 [doi]
- Scheduling in Mobile Ad Hoc Networks with Topology and Channel-State UncertaintyLei Ying, Sanjay Shakkottai. 2347-2355 [doi]
- Delay Analysis for Multi-Hop Wireless NetworksGagan Rajesh Gupta, Ness B. Shroff. 2356-2364 [doi]
- Drowsy Transmission: Physical Layer Energy Optimization for Transmitting Random Packet TrafficHusheng Li, Lin Zhong, Kun Zheng. 2365-2373 [doi]
- Opportunistic Routing Algebra and its ApplicationsMingming Lu, Jie Wu. 2374-2382 [doi]
- Lightweight Coloring and Desynchronization for NetworksArik Motskin, Tim Roughgarden, Primoz Skraba, Leonidas J. Guibas. 2383-2391 [doi]
- Beyond Trilateration: On the Localizability of Wireless Ad-Hoc NetworksZheng Yang, Yunhao Liu, Xiang-Yang Li. 2392-2400 [doi]
- Connectivity-Based Sensor Network Localization with Incremental Delaunay Refinement MethodYue Wang, Sol Lederer, Jie Gao. 2401-2409 [doi]
- Distributed Progressive Algorithm for Maximizing Lifetime Vector in Wireless Sensor NetworksLiang Zhang, Shigang Chen, Ying Jian, Yuguang Fang. 2410-2418 [doi]
- Sensor Network Navigation without LocationsMo Li, Yunhao Liu, Jiliang Wang, Zheng Yang. 2419-2427 [doi]
- Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter TicketsFeng Li, Jie Wu, Anand Srinivasan. 2428-2436 [doi]
- Adaptive Early Packet Filtering for Defending Firewalls Against DoS AttacksAdel El-Atawy, Ehab Al-Shaer, Tung Tran, Raouf Boutaba. 2437-2445 [doi]
- Optimal Filtering of Source Address Prefixes: Models and AlgorithmsFabio Soldo, Athina Markopoulou, Katerina J. Argyraki. 2446-2454 [doi]
- A Chain Reaction DoS Attack on 3G Networks: Analysis and DefensesBo Zhao, Caixia Chi, Wei Gao, Sencun Zhu, Guohong Cao. 2455-2463 [doi]
- An Efficient Filter-based Addressing Protocol for Autoconfiguration of Mobile Ad Hoc NetworksNatalia Castro Fernandes, Marcelo D. D. Moreira, Otto Carlos Muniz Bandeira Duarte. 2464-2472 [doi]
- Pacifier: High-Throughput, Reliable Multicast without Crying Babies in Wireless Mesh NetworksDimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun Wang. 2473-2481 [doi]
- TP-CRAHN: a Transport Protocol for Cognitive Radio Ad-Hoc NetworksKaushik R. Chowdhury, Marco Di Felice, Ian F. Akyildiz. 2482-2490 [doi]
- Flash Flooding: Exploiting the Capture Effect for Rapid Flooding in Wireless Sensor NetworksJiakang Lu, Kamin Whitehouse. 2491-2499 [doi]
- Optimal Fast HashingJosef Kanizo, David Hay, Isaac Keslassy. 2500-2508 [doi]
- Scalar Prefix Search: A New Route Lookup Algorithm for Next Generation InternetMohammad Behdadfar, Hossein Saidi, Hamid Alaei, Babak Samari. 2509-2517 [doi]
- IPv6 Lookups using Distributed and Load Balanced Bloom Filters for 100Gbps Core Router Line CardsHaoyu Song, Fang Hao, Murali S. Kodialam, T. V. Lakshman. 2518-2526 [doi]
- Using Three States for Binary Consensus on Complete GraphsEtienne Perron, Dinkar Vasudevan, Milan Vojnovic. 2527-2535 [doi]
- Capacity of Multi-Hop Wireless Networks with Incomplete Traffic SpecificationMurali S. Kodialam, T. V. Lakshman, Sudipta Sengupta. 2536-2540 [doi]
- AAA: Asynchronous, Adaptive, and Asymmetric Power Management for Mobile Ad Hoc NetworksShan-Hung Wu, Chung-Min Chen, Ming-Syan Chen. 2541-2545 [doi]
- A Cooperative Spectrum Sensing Consensus Scheme in Cognitive RadiosZhiqiang Li, F. Richard Yu, Minyi Huang. 2546-2550 [doi]
- Capabilities of Low-Power Wireless JammersLifeng Sang, Anish Arora. 2551-2555 [doi]
- On the Properties of Giant Component in Wireless Multi-Hop NetworksXiaoyuan Ta, Guoqiang Mao, Brian D. O. Anderson. 2556-2560 [doi]
- Delay-Limited Cooperative Communication with Reliability Constraints in Wireless NetworksRahul Urgaonkar, Michael J. Neely. 2561-2565 [doi]
- Optimizing Energy-Latency Trade-Off in Sensor Networks with Controlled MobilityRyo Sugihara, Rajesh K. Gupta. 2566-2570 [doi]
- Smart Trend-Traversal: A Low Delay and Energy Tag Arbitration Protocol for Large RFID SystemsLei Pan, Hongyi Wu. 2571-2575 [doi]
- Optimum Network Coding for Delay Sensitive Applications in WiMAX UnicastAmin Alamdar Yazdi, Sameh Sorour, Shahrokh Valaee, Ronny Yongho Kim. 2576-2580 [doi]
- Towards an Efficient Service Level Agreement AssessmentRené Serral-Gracià , Yann Labit, Jordi Domingo-Pascual, Philippe Owezarski. 2581-2585 [doi]
- Delivery Properties of Human Social NetworksNishanth Sastry, Karen R. Sollins, Jon Crowcroft. 2586-2590 [doi]
- Keep Cache Replacement Simple in Peer-Assisted VoD SystemsJiahua Wu, Baochun Li. 2591-2595 [doi]
- Overlay Fault Diagnosis Based on Evidential ReasoningYongning Tang, Ehab Al-Shaer. 2596-2600 [doi]
- Impact of Network Topology Knowledge on Fairness: A Geometric ApproachDavid T.-H. Kao, Ashutosh Sabharwal. 2601-2605 [doi]
- CFP: Cooperative Fast ProtectionBin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai, Hussein T. Mouftah. 2606-2610 [doi]
- Proportional Fair Frequency-Domain Packet Scheduling for 3GPP LTE UplinkSuk-Bok Lee, Ioannis Pefkianakis, Adam Meyerson, Shugong Xu, Songwu Lu. 2611-2615 [doi]
- D-Scan: Enabling Fast and Smooth Handoffs in AP-Dense 802.11 Wireless NetworksJin Teng, Changqing Xu, Weijia Jia, Dong Xuan. 2616-2620 [doi]
- Towards Adaptive Beamforming in Indoor Wireless Networks: An Experimental ApproachSriram Lakshmanan, Karthikeyan Sundaresan, Ravi Kokku, A. Khojestepour, Sampath Rangarajan. 2621-2625 [doi]
- Enhanced Spatial Reuse in Multi-Cell WLANsThomas Bonald, Ali Ibrahim, James Roberts. 2626-2630 [doi]
- Breadcrumbs: Efficient, Best-Effort Content Location in Cache NetworksElisha J. Rosensweig, Jim Kurose. 2631-2635 [doi]
- Noncooperative Load Balancing in the Continuum Limit of a Dense NetworkEitan Altman, Ishai Menache, Asuman E. Ozdaglar. 2636-2640 [doi]
- Not All At Once! - A Generic Scheme for Estimating the Number of Affected Nodes While Avoiding Feedback ImplosionReuven Cohen, Alexander Landau. 2641-2645 [doi]
- Distributed Construction of Fault Resilient High Capacity Wireless Networks with Bounded Node DegreeYigal Bejerano, Qunfeng Dong. 2646-2650 [doi]
- Dimensioning an OBS Switch with Partial Wavelength Conversion and Fiber Delay Lines via a Mean Field ModelJuan F. Pérez, Benny Van Houdt. 2651-2655 [doi]
- Application-Specific, Agile and Private (ASAP) Platforms for Federated Computing Services over WDM NetworksXin Liu, Chunming Qiao, Ting Wang. 2656-2660 [doi]
- Physical Interference Modeling for Transmission Scheduling on Commodity WiFi HardwareRitesh Maheshwari, Jing Cao, Samir R. Das. 2661-2665 [doi]
- A Queueing Model Framework of PCE-Based Inter-Area Path ComputationJuanjuan Yu, Yue He, Kai Wu, Marco Tacca, Andrea Fumagalli, Jean-Philippe Vasseur. 2666-2670 [doi]
- Topology Formation for Wireless Mesh Network PlanningChun-Cheng Chen, Chandra Chekuri, D. Klabjan. 2671-2675 [doi]
- A Multi-Burst Sliding Encoding for Mobile Satellite TV BroadcastingMohamed A. Ismail, Walid Dabbous, Antoine Clerget. 2676-2680 [doi]
- Approximation Algorithms for Data Broadcast in Wireless NetworksRajiv Gandhi, Yoo Ah Kim, Seungjoon Lee, Jiho Ryu, Peng-Jun Wan. 2681-2685 [doi]
- Exploring the Multicast Lifetime Capacity of WANETs with Directional Multibeam AntennasSong Guo, Minyi Guo, Victor Leung. 2686-2690 [doi]
- Guaranteed Delivery for Geographical Anycasting in Wireless Multi-Sink Sensor and Sensor-Actor NetworksNathalie Mitton, David Simplot-Ryl, Ivan Stojmenovic. 2691-2695 [doi]
- Optimal Construction of Redundant Multicast Trees in Directed GraphsYigal Bejerano, Pramod V. Koppol. 2696-2700 [doi]
- Respondent-Driven Sampling for Characterizing Unstructured OverlaysAmir Hassan Rasti, Mojtaba Torkjazi, Reza Rejaie, Nick G. Duffield, Walter Willinger, Daniel Stutzbach. 2701-2705 [doi]
- A Framework for Efficient Class-Based SchedulingMohit Saxena, Ramana Rao Kompella. 2706-2710 [doi]
- An Efficient Algorithm for Measuring Medium- to Large-Sized Flows in Network TrafficAshwin Lall, Mitsunori Ogihara, Jun Jun Xu. 2711-2715 [doi]
- EnLoc: Energy-Efficient Localization for Mobile PhonesIonut Constandache, Shravan Gaonkar, Matt Sayler, Romit Roy Choudhury, Landon P. Cox. 2716-2720 [doi]
- Monitoring Time-Varying Network Streams Using State-Space ModelsJin Cao, Aiyou Chen, Tian Bu, Arumugam Buvaneswari. 2721-2725 [doi]
- View-Upload Decoupling: A Redesign of Multi-Channel P2P Video SystemsDi Wu, Chao Liang, Yong Liu, Keith Ross. 2726-2730 [doi]
- Diagnosing Network-Wide P2P Live Streaming InefficienciesChuan Wu, Baochun Li, Shuqiao Zhao. 2731-2735 [doi]
- Impacts of Peer Characteristics on P2PTV Networks ScalabilityKhaldoon Shami, Damien Magoni, Hyunseok Chang, Wenjie Wang, Sugih Jamin. 2736-2740 [doi]
- iPASS: Incentivized Peer-Assisted System for Asynchronous StreamingChao Liang, Zhenghua Fu, Yong Liu, Chai Wah Wu. 2741-2745 [doi]
- Large Scale Analysis of the eDonkey P2P File Sharing SystemSanja Petrovic, Patrick Brown. 2746-2750 [doi]
- Efficient Geometric Routing in Three Dimensional Ad Hoc NetworksCong Liu, Jie Wu. 2751-2755 [doi]
- Multi-VPN Optimization for Scalable Routing via RelayingMohammadHossein Bateni, Alexandre Gerber, Mohammad Taghi Hajiaghayi, Subhabrata Sen. 2756-2760 [doi]
- On the Quality of Triangle Inequality Violation Aware Routing Overlay ArchitectureRyoichi Kawahara, Eng Keong Lua, Masato Uchida, Satoshi Kamei, Hideaki Yoshino. 2761-2765 [doi]
- Spatial Distribution in Routing Table Design for Sensor NetworksRik Sarkar, Xianjin Zhu, Jie Gao. 2766-2770 [doi]
- IP Fast ReRoute: Lightweight Not-Via without Additional AddressesGábor Enyedi, Péter Szilágyi, Gábor Rétvári, András Császár. 2771-2775 [doi]
- A Generalized Probabilistic Topology Control for Wireless Sensor NetworksYunhuai Liu, Lionel M. Ni. 2776-2780 [doi]
- A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor NetworksChanglei Liu, Guohong Cao. 2781-2785 [doi]
- Using Failure Models for Controlling Data Availability in Wireless Sensor NetworksRiccardo Crepaldi, Mirko Montanari, Indranil Gupta, Robin Kravets. 2786-2790 [doi]
- A Coverage-Enhancing Method for 3D Directional Sensor NetworksHuadong Ma, Xi Zhang, Anlong Ming. 2791-2795 [doi]
- Sensor Network Localization Using Sensor PerturbationYuanchen Zhu, Steven J. Gortler, Dylan Thurston. 2796-2800 [doi]
- Fast Resource Allocation for Network-Coded Traffic - A Coded-Feedback ApproachChih-Chun Wang, Xiaojun Lin. 2801-2805 [doi]
- Link Scheduling with QoS Guarantee for Wireless Relay NetworksChi-Yao Hong, Ai-Chun Pang. 2806-2810 [doi]
- Fair and Efficient User-Network Association Algorithm for Multi-Technology Wireless NetworksPierre Coucheney, Corinne Touati, Bruno Gaujal. 2811-2815 [doi]
- Network Bandwidth Allocation via Distributed Auctions with Time ReservationsPablo Belzarena, Andrés Ferragut, Fernando Paganini. 2816-2820 [doi]
- On the Exploitation of CDF Based Wireless SchedulingUdi Ben-Porat, Anat Bremler-Barr, Hanoch Levy. 2821-2825 [doi]
- Scalable Routing Via Greedy EmbeddingCédric Westphal, Guanhong Pei. 2826-2830 [doi]
- Alpha Coverage: Bounding the Interconnection Gap for Vehicular Internet AccessZizhan Zheng, Prasun Sinha, Santosh Kumar. 2831-2835 [doi]
- A Fluid Limit for Cache Algorithms with General Request ProcessesTakayuki Osogami. 2836-2840 [doi]
- Mining the Web and the Internet for Accurate IP Address GeolocationsChuanxiong Guo, Yunxin Liu, Wenchao Shen, Helen J. Wang, Qing Yu, Yongguang Zhang. 2841-2845 [doi]
- Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive RoutesTao Shu, Sisi Liu, Marwan Krunz. 2846-2850 [doi]
- Faster DFAs through Simple and Efficient Inverse HomomorphismsDomenico Ficara, Stefano Giordano, Gregorio Procissi, Fabio Vitucci, Gianni Antichi, Andrea Di Pietro. 2851-2855 [doi]
- Privacy in VoIP Networks: A k-Anonymity ApproachMudhakar Srivatsa, Arun Iyengar, Ling Liu. 2856-2860 [doi]
- Rome: Performance and Anonymity using Route MeshesKrishna Puttaswamy, Alessandra Sala, Ömer Egecioglu, Ben Y. Zhao. 2861-2865 [doi]
- Applying PCA for Traffic Anomaly Detection: Problems and SolutionsDaniela Brauckhoff, Kavé Salamatian, Martin May. 2866-2870 [doi]
- Medium Access Control for 60 GHz Outdoor Mesh Networks with Highly Directional LinksRaghuraman Mudumbai, Sumit Singh, Upamanyu Madhow. 2871-2875 [doi]
- muNet: Harnessing Multiuser Capacity in Wireless Mesh NetworksLi Li, Richard Alimi, Ramachandran Ramjee, Harish Viswanathan, Yang Richard Yang. 2876-2880 [doi]
- Capacity Analysis of Wireless Mesh Networks with Omni or Directional AntennasJun Zhang, Xiaohua Jia. 2881-2885 [doi]
- Opportunistic Routing with Directional Antennas in Wireless Mesh NetworksChun-Pong Luk, Wing Cheong Lau, On-Ching Yue. 2886-2890 [doi]
- Experimental Comparison of Bandwidth Estimation Tools for Wireless Mesh NetworksDhruv Gupta, Di Wu, Prasant Mohapatra, Chen-Nee Chuah. 2891-2895 [doi]
- Random vs. Deterministic Deployment of Sensors in the Presence of Failures and Placement ErrorsPaul Balister, Santosh Kumar. 2896-2900 [doi]
- Shape Estimation Using Networked Binary SensorsHiroshi Saito, Shinsuke Shimogawa, Shigeo Shioda, Junko Harada. 2901-2905 [doi]
- A Localized Multi-Hop Desynchronization Algorithm for Wireless Sensor NetworksHui Kang, Jennifer L. Wong. 2906-2910 [doi]
- Topological Data Processing for Distributed Sensor Networks with Morse-Smale DecompositionXianjin Zhu, Rik Sarkar, Jie Gao. 2911-2915 [doi]
- CASE: Connectivity-Based Skeleton Extraction in Wireless Sensor NetworksHongbo Jiang, WenPing Liu, Dan Wang, Chen Tian, Xiang Bai, Xue Liu, Ying Wu, Wenyu Liu. 2916-2920 [doi]
- Optimal Scheduling Policies in Small Generalized SwitchesTianxiong Ji, Eleftheria Athanasopoulou, R. Srikant. 2921-2925 [doi]
- Scheduling in Multi-Hop Wireless Networks with PrioritiesQiao Li, Rohit Negi. 2926-2930 [doi]
- TDMA Scheduling in Long-Distance WiFi NetworksDebmalya Panigrahi, Bhaskaran Raman. 2931-2935 [doi]
- Novel Architectures and Algorithms for Delay Reduction in Back-Pressure Scheduling and RoutingLoc Bui, R. Srikant, Alexander L. Stolyar. 2936-2940 [doi]
- An Economically-Principled Generative Model of AS Graph ConnectivityJacomo Corbo, Shaili Jain, Michael Mitzenmacher, David C. Parkes. 2941-2945 [doi]
- On Passive One-Way Loss Measurements Using Sampled Flow StatisticsYu Gu, Lee Breslau, Nick G. Duffield, Subhabrata Sen. 2946-2950 [doi]
- Server Frequency Control Using Markov Decision ProcessesLydia (Yiyu) Chen, Natarajan Gautam. 2951-2955 [doi]
- Shadow Prices vs. Vickrey Prices in Multipath RoutingParthasarathy Ramanujam, Zongpeng Li, Lisa Higham. 2956-2960 [doi]
- STUMP: Exploiting Position Diversity in the Staggered TDMA Underwater MAC ProtocolKurtis B. Kredo II, Petar Djukic, Prasant Mohapatra. 2961-2965 [doi]
- A Learning-based Multiuser Opportunistic Spectrum Access Approach in Unslotted Primary NetworksSachin Shetty, Min Song, Chunsheng Xin, E. K. Park. 2966-2970 [doi]
- Throughput of Slotted ALOHA with Encoding Rate Optimization and Multipacket ReceptionPaolo Minero, Massimo Franceschetti. 2971-2975 [doi]
- Coordinated Channel Access in Cognitive Radio Networks: A Multi-Level Spectrum Opportunity PerspectiveTao Shu, Marwan Krunz. 2976-2980 [doi]
- An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless NetworksDimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun Wang. 2981-2985 [doi]
- PHY Aided MAC - A New ParadigmDola Saha, Aveek Dutta, Dirk Grunwald, Douglas C. Sicker. 2986-2990 [doi]
- Robust Event Boundary Detection in Sensor Networks - A Mixture Model Based ApproachMin Ding, Xiuzhen Cheng. 2991-2995 [doi]
- A Threshold Based MAC Protocol for Cooperative MIMO TransmissionsHaiming Yang, Hsin-Yi Shen, Biplab Sikdar, Shivkumar Kalyanaraman. 2996-3000 [doi]
- Distributed Non-Autonomous Power Control through Distributed Convex OptimizationSundhar Srinivasan Ram, Venugopal V. Veeravalli, Angelia Nedic. 3001-3005 [doi]
- Capacity Provisioning a Valiant Load-Balanced NetworkAndrew R. Curtis, Alejandro López-Ortiz. 3006-3010 [doi]
- Selfish Distributed Compression over NetworksAditya Ramamoorthy, Vwani P. Roychowdhury, Sumit K. Singh. 3011-3015 [doi]