Abstract is missing.
- Understanding robustness of mobile networks through temporal network measuresSalvatore Scellato, Ilias Leontiadis, Cecilia Mascolo, Prithwish Basu, Murtaza Zafer. 1-5 [doi]
- Decentralized, accurate, and low-cost network bandwidth predictionSukhyun Song, Peter J. Keleher, Bobby Bhattacharjee, Alan Sussman. 6-10 [doi]
- Space-efficient tracking of network-wide flow correlationsXingang Shi, Chi-Kin Chau, Dah-Ming Chiu. 11-15 [doi]
- Describing and forecasting video access patternsGonca Gürsun, Mark Crovella, Ibrahim Matta. 16-20 [doi]
- Exploiting Tag-based Path Diversity in the DLG-Kautz networkYiming Zhang. 21-25 [doi]
- Truthful online spectrum allocation and auction in multi-channel wireless networksPing Xu, XiaoHua Xu, ShaoJie Tang, Xiang-Yang Li. 26-30 [doi]
- Privacy analysis of user association logs in a large-scale wireless LANKeren Tan, Guanhua Yan, Jihwang Yeo, David Kotz. 31-35 [doi]
- Hearing is believing: Detecting mobile primary user emulation attack in white spaceShaxun Chen, Kai Zeng, Prasant Mohapatra. 36-40 [doi]
- You can SPIT, but you can t hide: Spammer identification in telephony networksHossein Kaffash Bokharaei, Alireza Sahraei, Yashar Ganjali, Ram Keralapura, Antonio Nucci. 41-45 [doi]
- Collaborative firewalling in wireless networksMahmoud Taghizadeh, Amir R. Khakpour, Alex X. Liu, Subir Biswas. 46-50 [doi]
- On mitigating TCP Incast in Data Center NetworksYan Zhang, Nirwan Ansari. 51-55 [doi]
- RDCM: Reliable data center multicastDan Li, Mingwei Xu, Ming-Chen Zhao, Chuanxiong Guo, Yongguang Zhang, Min-You Wu. 56-60 [doi]
- BCN: Expansible network structures for data centers using hierarchical compound graphsDeke Guo, Tao Chen, Dan Li, Yunhao Liu, Xue Liu, Guihai Chen. 61-65 [doi]
- Application-aware virtual machine migration in data centersVivek Shrivastava, Petros Zerfos, Kang-Won Lee, Hani Jamjoom, Yew-Huey Liu, Suman Banerjee. 66-70 [doi]
- Consolidating virtual machines with dynamic bandwidth demand in data centersMeng Wang, Xiaoqiao Meng, Li Zhang 0002. 71-75 [doi]
- Optimal channel assignment and power allocation for dual-hop multi-channel multi-user relayingMahdi Hajiaghayi, Min Dong, Ben Liang. 76-80 [doi]
- SMALL: A Strategy-proof Mechanism for radio spectrum allocationFan Wu, Nitin H. Vaidya. 81-85 [doi]
- A prior-free revenue maximizing auction for secondary spectrum accessAjay Gopinathan, Zongpeng Li. 86-90 [doi]
- Towards robust and efficient routing in multi-radio, multi-channel wireless mesh networksJonathan Wellons, Yuan Xue. 91-95 [doi]
- Efficient allocation of CQI channels in broadband wireless networksReuven Cohen, Guy Grebla. 96-100 [doi]
- Making sense of customer tickets in cellular networksYu Jin, Nick G. Duffield, Alexandre Gerber, Patrick Haffner, Wen-Ling Hsu, Guy Jacobson, Subhabrata Sen, Shobha Venkataraman, Zhi-Li Zhang. 101-105 [doi]
- Optimal control for base station sleep mode in energy efficient radio access networksSalah-Eddine Elayoubi, Louai Saker, Tijani Chahed. 106-110 [doi]
- Optimization method for the joint allocation of modulation schemes, coding rates, resource blocks and power in self-organizing LTE networksDavid López-Pérez, Ákos Ladányi, Alpár Jüttner, Hervé Rivano, Jie Zhang. 111-115 [doi]
- Open or close: On the sharing of femtocellsSeYoung Yun, Yung Yi, Dong-Ho Cho, Jeonghoon Mo. 116-120 [doi]
- Un-zipping cellular infrastructure locations via user geo-intentGyan Ranjan, Zhi-Li Zhang, Supranamaya Ranjan, Ram Keralapura, Joshua Robinson. 121-125 [doi]
- On the network geography of the InternetPeter Matray, Péter Hága, Sándor Laki, István Csabai, Gábor Vattay. 126-130 [doi]
- Geography-based analysis of the Internet infrastructureShiva Prasad Kasiviswanathan, Stephan Eidenbenz, Guanhua Yan. 131-135 [doi]
- A comparative performance analysis of IP traffic offloading schemes over Dynamic CircuitsMohit Chamania, Marcel Caria, Admela Jukan. 136-140 [doi]
- Efficient multicasting approaches using collection-distribution networksOnur Turkcu, Arun K. Somani. 141-145 [doi]
- BGP molecules: Understanding and predicting prefix failuresRavish Khosla, Sonia Fahmy, Y. Charlie Hu. 146-150 [doi]
- Inferring traffic shaping and policy parameters using end host measurementsUdi Weinsberg, Augustin Soule, Laurent Massoulié. 151-155 [doi]
- A new virtual indexing method for measuring host connection degreesPinghui Wang, Xiaohong Guan, Weibo Gong, Donald F. Towsley. 156-160 [doi]
- Analysis on the fluctuation magnitude in probe interval for active measurementKohei Watabe, Masaki Aida. 161-165 [doi]
- DomainImpute: Inferring unseen components in the InternetBrian Eriksson, Paul Barford, Joel Sommers, Robert Nowak. 171-175 [doi]
- A comparative study of two network-based anomaly detection methodsKaustubh Nyalkalkar, Sushant Sinha, Michael Bailey, Farnam Jahanian. 176-180 [doi]
- Consensus extraction from heterogeneous detectors to improve performance over network traffic anomaly detectionJing Gao, Wei Fan, Deepak S. Turaga, Olivier Verscheure, Xiaoqiao Meng, Lu Su, Jiawei Han. 181-185 [doi]
- A novel packet size based covert channel attack against anonymizerZhen Ling, Xinwen Fu, Weijia Jia, Wei Yu, Dong Xuan. 186-190 [doi]
- PhishDef: URL names say it allAnh Le, Athina Markopoulou, Michalis Faloutsos. 191-195 [doi]
- Multi-field range encoding for packet classification in TCAMYeim-Kuan Chang, Chun-I. Lee, Cheng-Chien Su. 196-200 [doi]
- CloudStream: Delivering high-quality streaming videos through a cloud-based SVC proxyZixia Huang, Chao Mei, Li Erran Li, Thomas Woo. 201-205 [doi]
- Kingfisher: Cost-aware elasticity in the cloudUpendra Sharma, Prashant J. Shenoy, Sambit Sahu, Anees Shaikh. 206-210 [doi]
- CloudFlex: Seamless scaling of enterprise applications into the cloudYousuk Seung, Terry Lam, Li Erran Li, Thomas Woo. 211-215 [doi]
- Limits of energy saving for the allocation of data center resources to networked applicationsXavier León, Leandro Navarro. 216-220 [doi]
- A cost-benefit framework for judicious enterprise network redesignXin Sun, Sanjay G. Rao. 221-225 [doi]
- Information propagation speed study in multihop cognitive radio networksChuan Han, Yaling Yang. 226-230 [doi]
- Cooperative energy spanners: Energy-efficient topology control in cooperative ad hoc networksYing Zhu, Minsu Huang, Siyuan Chen, Yu Wang. 231-235 [doi]
- Asynchronous channel hopping for establishing rendezvous in cognitive radio networksKaigui Bian, Jung-Min Park 0001. 236-240 [doi]
- On the throughput scaling of Cognitive Radio ad hoc networksChengzhi Li, Huaiyu Dai. 241-245 [doi]
- On distribution and limits of information dissemination latency and speed in mobile cognitive radio networksLei Sun, Wenye Wang. 246-250 [doi]
- Social-aware stateless forwarding in pocket switched networksAlessandro Mei, Giacomo Morabito, Paolo Santi, Julinda Stefa. 251-255 [doi]
- A dynamic relay selection scheme for mobile users in wireless relay networksYifan Li, Ping Wang, Dusit Niyato, Weihua Zhuang. 256-260 [doi]
- Distributed subgradient methods for Delay Tolerant NetworksRiccardo Masiero, Giovanni Neglia. 261-265 [doi]
- Content management in a mobile ad hoc network: Beyond opportunistic strategySuk-Bok Lee, Starsky H. Y. Wong, Kang-Won Lee, Songwu Lu. 266-270 [doi]
- Robust multipath routing in large wireless networksChi-Kin Chau, Richard J. Gibbens, Robert E. Hancock, Donald F. Towsley. 271-275 [doi]
- Localization in non-localizable sensor and ad-hoc networks: A Localizability-aided approachTao Chen, Zheng Yang, Yunhao Liu, Deke Guo, Xueshan Luo. 276-280 [doi]
- iLight: Indoor device-free passive tracking using wireless sensor networksXufei Mao, ShaoJie Tang, XiaoHua Xu, Xiang-Yang Li, Huadong Ma. 281-285 [doi]
- Scheduling data collection with dynamic traffic patterns in wireless sensor networksWenbo Zhao, Xueyan Tang. 286-290 [doi]
- The last minute: Efficient Data Evacuation strategy for sensor networks in post-disaster applicationsMing Liu, Haigang Gong, Yonggang Wen, Guihai Chen, Jiannong Cao. 291-295 [doi]
- SelectCast: Scalable data aggregation scheme in wireless sensor networksCheng Wang, ShaoJie Tang, Xiang-Yang Li, Changjun Jiang. 296-300 [doi]
- Exploiting graphics processors for high-performance IP lookup in software routersJin Zhao, Xinya Zhang, Xin Wang, Yangdong Deng, Xiaoming Fu. 301-305 [doi]
- Offset addressing approach to memory-efficient IP address lookupKun Huang, Gaogang Xie, Yanbiao Li, Alex X. Liu. 306-310 [doi]
- Approximately-perfect hashing: Improving network throughput through efficient off-chip routing table lookupZhuo Huang, Jih-Kwon Peir, Shigang Chen. 311-315 [doi]
- Scheduling in parallel queues with randomly varying connectivity and switchover delayGuner D. Celik, Long Bao Le, Eytan Modiano. 316-320 [doi]
- On the scalability of router forwarding tables: Nexthop-Selectable FIB aggregationQing Li, Dan Wang, Mingwei Xu, Jiahai Yang. 321-325 [doi]
- Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designsSushmita Ruj, Amiya Nayak, Ivan Stojmenovic. 326-330 [doi]
- Distributed privacy-preserving access control in a single-owner multi-user sensor networkDaojing He, Jiajun Bu, Sencun Zhu, Mingjian Yin, Yi Gao, Haodong Wang, Sammy Chan, Chun Chen. 331-335 [doi]
- Reconciling privacy preservation and intrusion detection in sensory data aggregationChuang Wang, Guiling Wang, Wensheng Zhang 0001, Taiming Feng. 336-340 [doi]
- Designing localization algorithms robust to signal strength attacksXiaoyan Li, Yingying Chen, Jie Yang, Xiuyuan Zheng. 341-345 [doi]
- Biometric-based two-level secure access control for Implantable Medical Devices during emergenciesXiali Hei, Xiaojiang Du. 346-350 [doi]
- Decoding the collisions in RFID systemsLei Kang, Kaishun Wu, Jin Zhang, Haoyu Tan. 351-355 [doi]
- Efficient missing tag detection in RFID systemsWen Luo, Shigang Chen, Tao Li, Shiping Chen. 356-360 [doi]
- Partially overlapping channel assignment based on node orthogonality for 802.11 wireless networksYong Cui, Wei Li, Xiuzhen Cheng. 361-365 [doi]
- On link rate adaptation in 802.11n WLANsSriram Lakshmanan, Shruti Sanadhya, Raghupathy Sivakumar. 366-370 [doi]
- Fast mixing of parallel Glauber dynamics and low-delay CSMA schedulingLibin Jiang, Mathieu Leconte, Jian Ni, R. Srikant, Jean C. Walrand. 371-375 [doi]
- ℛ:::2:::: Incremental ℛeprogramming using ℛelocatable code in networked embedded systemsWei Dong, Yunhao Liu, Chun Chen, Jiajun Bu, Chao Huang. 376-380 [doi]
- On file-based content distribution over wireless networks via multiple paths: Coding and delay trade-offJun Sun 0007, Yonggang Wen, Lizhong Zheng. 381-385 [doi]
- Highly available virtual machines with network codingWai-Leong Yeow, Cédric Westphal, Ulas C. Kozat. 386-390 [doi]
- Spectrum shaping via network coding in cognitive radio networksShanshan Wang, Yalin Evren Sagduyu, Junshan Zhang, Jason H. Li. 396-400 [doi]
- Quantifying paedophile queries in a large P2P systemMatthieu Latapy, Clémence Magnien, Raphael Fournier. 401-405 [doi]
- Reinforcement learning in BitTorrent systemsRafit Izhak-Ratzin, Hyunggon Park, Mihaela van der Schaar. 406-410 [doi]
- Peering through the iframeBrett Stone-Gross, Marco Cova, Christopher Kruegel, Giovanni Vigna. 411-415 [doi]
- The digital rights management game in peer-to-peer streaming systemsJin Zhang, Wei Lou. 416-420 [doi]
- Demand forecast and performance prediction in peer-assisted on-demand streaming systemsDi Niu, Zimu Liu, Baochun Li, Shuqiao Zhao. 421-425 [doi]
- Content downloading in vehicular networks: What really mattersFrancesco Malandrino, Claudio Casetti, Carla-Fabiana Chiasserini, Marco Fiore. 426-430 [doi]
- PVA in VANETs: Stopped cars are not silentNianbo Liu, Ming Liu, Wei Lou, Guihai Chen, Jiannong Cao. 431-435 [doi]
- Information propagation speed in bidirectional vehicular delay tolerant networksEmmanuel Baccelli, Philippe Jacquet, Bernard Mans, Georgios Rodolakis. 436-440 [doi]
- Utilizing shared vehicle trajectories for data forwarding in vehicular networksFulong Xu, Shuo Guo, Jaehoon Jeong, Yu Gu, Qing Cao, Ming Liu, Tian He. 441-445 [doi]
- Timely data delivery in a realistic bus networkUtku Acer, Paolo Giaccone, David Hay, Giovanni Neglia, Saed Tarapiah. 446-450 [doi]
- Energy-efficient design and optimization of wireline access networksSourjya Bhaumik, David Chuck, Girija J. Narlikar, Gordon T. Wilfong. 451-455 [doi]
- Resource management for fading wireless channels with energy harvesting nodesOmur Ozel, Kaya Tutuncuoglu, Jing Yang, Sennur Ulukus, Aylin Yener. 456-460 [doi]
- Multiple timescale dispatch and scheduling for stochastic reliability in smart grids with wind generation integrationMiao He, Sugumar Murugesan, Junshan Zhang. 461-465 [doi]
- Structural properties of optimal coordinate-convex policies for CAC with nonlinearly-constrained feasibility regionsMario Marchese, Marco Cello, Giorgio Gnecco, Marcello Sanguineti. 466-470 [doi]
- Effect of buffers on stability of Internet congestion controllersSomayeh Sojoudi, Steven H. Low, John C. Doyle. 471-475 [doi]
- OpenFlow based flow level bandwidth provisioning for CICQ switchesHao Jin, Deng Pan, Jason Liu, Niki Pissinou. 476-480 [doi]
- Equilibriums in slow fading interfering channels with partial knowledge of the channelsXiao Lei, Laura Cottatellucci, Konstantin Avrachenkov. 481-485 [doi]
- Clustering in cooperative networksBoulat A. Bash, Dennis Goeckel, Donald F. Towsley. 486-490 [doi]
- A state action frequency approach to throughput maximization over uncertain wireless channelsKrishna P. Jagannathan, Shie Mannor, Ishai Menache, Eytan Modiano. 491-495 [doi]
- Spatio-temporal modeling of wireless users internet access patterns using self-organizing mapsSaeed Moghaddam, Ahmed Helmy. 496-500 [doi]
- Zoom: A multi-resolution tasking framework for crowdsourced geo-spatial sensingThanh Dang, Wu-chi Feng, Nirupama Bulusu. 501-505 [doi]
- Information capacity of diffusion-based molecular communication in nanonetworksMassimiliano Pierobon, Ian F. Akyildiz. 506-510 [doi]
- Local pooling factor of multihop wireless networksPeng-Jun Wan, Minming Li, Lixin Wang, Zhu Wang, Ophir Frieder. 511-515 [doi]
- Analysis and algorithms for partial protection in mesh networksGreg Kuperman, Eytan Modiano, Aradhana Narula-Tam. 516-520 [doi]
- Achieving congestion diversity in wireless ad-hoc networksAbhijeet Bhorkar, Tara Javidi, A. C. Snoereny. 521-525 [doi]
- Wireless data multicasting with switched beamforming antennasHonghai Zhang, Yuanxi Jiang, Karthik Sundaresan, Sampath Rangarajan, Baohua Zhao. 526-530 [doi]
- On cooperative strategies in wireless relay networksHsiao-Chen Lu, Wanjiun Liao. 531-535 [doi]
- Optimized asynchronous multi-channel neighbor discoveryNiels Karowski, Aline Carneiro Viana, Adam Wolisz. 536-540 [doi]
- Bring order to online social networksRuichuan Chen, Eng Keong Lua, Zhuhua Cai. 541-545 [doi]
- Statistical behavior of embeddedness and communities of overlapping cliques in online social networksAjay Sridharan, Yong Gao, Kui Wu, James Nastos. 546-550 [doi]
- Bayesian-inference based recommendation in online social networksXiwang Yang, Yang Guo, Yong Liu. 551-555 [doi]
- Optimizing information credibility in social swarming applicationsBin Liu 0004, Peter Terlecky, Amotz Bar-Noy, Ramesh Govindan, Michael J. Neely. 556-560 [doi]
- A distributed and privacy preserving algorithm for identifying information hubs in social networksMuhammad Usman Ilyas, Muhammad Zubair Shafiq, Alex X. Liu, Hayder Radha. 561-565 [doi]
- Who Are Your Friends? - A Simple Mechanism that achieves perfect network formationFelix Ming, Fai Wong, Peter Marbach. 566-570 [doi]
- EFW: A cross-layer metric for reliable routing in wireless mesh networks with selfish participantsStefano Paris, Cristina Nita-Rotaru, Fabio Martignon, Antonio Capone. 576-580 [doi]
- Towards an efficient algorithmic framework for pricing cellular data serviceMohammadHossein Bateni, Mohammad Taghi Hajiaghayi, Sina Jafarpour, Dan Pei. 581-585 [doi]
- Seen as stable marriagesHong Xu, Baochun Li. 586-590 [doi]
- Stackelberg games for energy-efficient power control in wireless networksGaoning He, Samson Lasaulce, Yezekael Hayel. 591-595 [doi]
- Revenue sharing among ISPs in two-sided marketsYuan Wu, Hongseok Kim, Prashanth Hande, Mung Chiang, Danny H. K. Tsang. 596-600 [doi]
- Global weighted fairness guaranteed congestion avoidance protocol for wireless sensor networksGuohua Li, Jianzhong Li. 601-605 [doi]
- Safeguarding schedule updates in wireless sensor networksYongle Cao, Ziguo Zhong, Yu Gu, Tian He. 606-610 [doi]
- Smart sleep: Sleep more to reduce delay in duty-cycled wireless sensor networksChul-Ho Lee, Do Young Eun. 611-615 [doi]
- GeoQuorum: Load balancing and energy efficient data access in wireless sensor networksJun Luo, Ying He. 616-620 [doi]
- Spherical representation and polyhedron routing for load balancing in wireless sensor networksXiaokang Yu, Xiaomeng Ban, Wei Zeng, Rik Sarkar, Xianfeng Gu, Jie Gao. 621-625 [doi]
- One-way barrier coverage with wireless sensorsAi Chen, Zhizhou Li, Ten-Hwang Lai, Cong Liu. 626-630 [doi]
- On the asymptotic connectivity of random networks under the random connection modelGuoqiang Mao, Brian D. O. Anderson. 631-639 [doi]
- Optimal multicast capacity and delay tradeoffs in MANETs: A global perspectiveYun Wang, Xiaoyu Chu, Xinbing Wang, Yu Cheng. 640-648 [doi]
- Converge-cast with MIMOLuoyi Fu, Yi Qin, Xinbing Wang, Xue Liu. 649-657 [doi]
- Sharing multiple messages over mobile networksYuxin Chen, Sanjay Shakkottai, Jeffrey G. Andrews. 658-666 [doi]
- Toward P2P-based multimedia sharing in user generated contentsHaiying Shen, Lianyu Zhao, Harrison Chandler, Jared Stokes, Jin Li. 667-675 [doi]
- A model approach to estimate Peer-to-Peer traffic matricesKe Xu, Meng Shen, Mingjiang Ye. 676-684 [doi]
- Hop limited flooding over dynamic networksMilan Vojnovic, Alexandre Proutiere. 685-693 [doi]
- Optimal content placement for peer-to-peer video-on-demand systemsBo Tan, Laurent Massoulié. 694-702 [doi]
- Heterogeneity increases multicast capacity in clustered networkQiuyu Peng, Xinbing Wang, Huan Tang. 703-711 [doi]
- General capacity scaling of wireless networksCheng Wang, Changjun Jiang, Xiang-Yang Li, ShaoJie Tang, Panlong Yang. 712-720 [doi]
- Beyond MLU: An application-centric comparison of traffic engineering schemesAbhigyan Sharma, Aditya Mishra, Vikas Kumar, Arun Venkataramani. 721-729 [doi]
- A general probabilistic framework for detecting community structure in networksCheng-Shang Chang, Chin-Yi Hsu, Jay Cheng, Duan-Shin Lee. 730-738 [doi]
- Capacity of byzantine agreement with finite link capacityGuanfeng Liang, Nitin H. Vaidya. 739-747 [doi]
- GestureFlow: Streaming gestures to an audienceYuan Feng, Zimu Liu, Baochun Li. 748-756 [doi]
- Optimal Design of Linear Network Coding for information theoretically secure unicastJin Wang, Jianping Wang, Kejie Lu, Yi Qian, Bin Xiao, Naijie Gu. 757-765 [doi]
- Universal and robust distributed network codesTracey Ho, Sidharth Jaggi, Svitlana Vyetrenko, Lingxiao Xia. 766-774 [doi]
- QoF: Towards comprehensive path quality measurement in wireless sensor networksJiliang Wang, Yunhao Liu, Mo Li, Wei Dong, Yuan He. 775-783 [doi]
- CABET: Connectivity-based boundary extraction of large-scale 3D sensor networksHongbo Jiang, Shengkai Zhang, Guang Tan, Chonggang Wang. 784-792 [doi]
- Continuous multi-dimensional top-k query processing in sensor networksHongbo Jiang, Jie Cheng, Dan Wang, Chonggang Wang, Guang Tan. 793-801 [doi]
- Twinkle: A fast resource provisioning mechanism for internet servicesJun Zhu, Zhefu Jiang, Zhen Xiao. 802-810 [doi]
- Agnostic topology-based spam avoidance in large-scale web crawlsClint Sparkman, Hsin-Tsang Lee, Dmitri Loguinov. 811-819 [doi]
- Secure and practical outsourcing of linear programming in cloud computingCong Wang, Kui Ren, Jia Wang. 820-828 [doi]
- Privacy-preserving multi-keyword ranked search over encrypted cloud dataNing Cao, Cong Wang, Ming Li, Kui Ren, Wenjing Lou. 829-837 [doi]
- Wireless link scheduling under physical interference modelPeng-Jun Wan, Ophir Frieder, Xiaohua Jia, F. Frances Yao, XiaoHua Xu, ShaoJie Tang. 838-845 [doi]
- Multiflows in multi-channel multi-radio multihop wireless networksPeng-Jun Wan, Yu Cheng, Zhu Wang, F. Frances Yao. 846-854 [doi]
- DragonNet: A robust mobile Internet service system for long distance trainsFung Po Tso, Lin Cui, Lizhuo Zhang, Weijia Jia, Di Yao, Jin Teng, Dong Xuan. 855-863 [doi]
- Delay constrained minimum energy broadcast in cooperative wireless networksMarjan A. Baghaie, Bhaskar Krishnamachari. 864-872 [doi]
- Does wireless sensor network scale? A measurement study on GreenOrbsYunhao Liu, Yuan He, Mo Li, Jiliang Wang, Kebin Liu, Lufeng Mo, Wei Dong, Zheng Yang, Min Xi, Jizhong Zhao, Xiang-Yang Li. 873-881 [doi]
- Understanding traffic dynamics in cellular data networksUtpal Paul, Anand Prabhu Subramanian, Milind M. Buddhikot, Samir R. Das. 882-890 [doi]
- Self-supported congestion-aware networking for emergency services in WANETsBiao Han, Jie Li, Jinshu Su. 891-899 [doi]
- On power and throughput tradeoffs of WiFi and Bluetooth in smartphonesRoy Friedman, Alex Kogan, Yevgeny Krivolapov. 900-908 [doi]
- A hierarchical account-aided Reputation Management system for large-scale MANETsZe Li, Haiying Shen. 909-917 [doi]
- C4: A new paradigm for providing incentives in multi-hop wireless networksChi Zhang, Xiaoyan Zhu, Yang Song, Yuguang Fang. 918-926 [doi]
- Connectivity maintenance in mobile wireless networks via constrained mobilityJoshua Reich, Vishal Misra, Dan Rubenstein, Gil Zussman. 927-935 [doi]
- Novasky: Cinematic-quality VoD in a P2P storage cloudFangming Liu, Shijun Shen, Bo Li, Baochun Li, Hao Yin, Sanli Li. 936-944 [doi]
- Statistical modeling and analysis of P2P replication to support VoD serviceYipeng Zhou, Tom Z. J. Fu, Dah-Ming Chiu. 945-953 [doi]
- Hidden communication in P2P networks Steganographic handshake and broadcastRaphael Eidenbenz, Thomas Locher, Roger Wattenhofer. 954-962 [doi]
- Deep diving into BitTorrent localityRubén Cuevas Rumín, Nikolaos Laoutaris, Xiaoyuan Yang, Georgos Siganos, Pablo Rodriguez. 963-971 [doi]
- Fundamental lower bound for node buffer size in intermittently connected wireless networksYuanzhong Xu, Xinbing Wang. 972-980 [doi]
- Asymptotic distribution of critical transmission radius for greedy forward routingPeng-Jun Wan, Lixin Wang. 981-989 [doi]
- Local sufficient rate constraints for guaranteed capacity region in multi-radio multi-channel wireless networksHongkun Li, Yu Cheng, Peng-Jun Wan, Jiannong Cao. 990-998 [doi]
- Random mobility and the spread of infectionAditya Gopalan, Siddhartha Banerjee, Abhik K. Das, Sanjay Shakkottai. 999-1007 [doi]
- Anonymous communication with network coding against traffic analysis attackJin Wang, Jianping Wang, Chuan Wu, Kejie Lu, Naijie Gu. 1008-1016 [doi]
- SigSag: Iterative detection through soft message-passingArash Saber Tehrani, Alexandros G. Dimakis, Michael J. Neely. 1017-1025 [doi]
- Padding for orthogonality: Efficient subspace authentication for network codingPeng Zhang, Yixin Jiang, Chuang Lin, Hongyi Yao, Albert Wasef, Xuemin Shen. 1026-1034 [doi]
- I:::2:::NC: Intra- and inter-session network coding for unicast flows in wireless networksHulya Seferoglu, Athina Markopoulou, K. K. Ramakrishnan. 1035-1043 [doi]
- Fine-grained location-free planarization in wireless sensor networksDezun Dong, Yunhao Liu, Xiangke Liao, Xiang-Yang Li. 1044-1052 [doi]
- A distributed triangulation algorithm for wireless sensor networks on 2D and 3D surfaceHongyu Zhou, Hongyi Wu, Su-Xia, Miao Jin, Ning Ding. 1053-1061 [doi]
- Capacity of dual-radio multi-channel wireless sensor networks for continuous data collectionShouling Ji, Yingshu Li, Xiaohua Jia. 1062-1070 [doi]
- Pan and scan: Configuring cameras for coverageMatthew P. Johnson, Amotz Bar-Noy. 1071-1079 [doi]
- Minimizing retrieval latency for content cloudMathias Björkqvist, Lydia Y. Chen, Marko Vukolic, Xi Zhang. 1080-1088 [doi]
- A QoS aware multicore hash scheduler for network applicationsDanhua Guo, Laxmi N. Bhuyan. 1089-1097 [doi]
- Dynamic right-sizing for power-proportional data centersMinghong Lin, Adam Wierman, Lachlan L. H. Andrew, Eno Thereska. 1098-1106 [doi]
- Multicast video delivery with switched beamforming antennas in indoor wireless networksHonghai Zhang, Yuanxi Jiang, Sampath Rangarajan, Baohua Zhao. 1107-1115 [doi]
- Approximation algorithms for throughput maximization in wireless networks with delay constraintsGuanhong Pei, V. S. Anil Kumar, Srinivasan Parthasarathy 0002, Aravind Srinivasan. 1116-1124 [doi]
- Physical layer wireless security made fast and channel independentShyamnath Gollakota, Dina Katabi. 1125-1133 [doi]
- Contrabass: Concurrent transmissions without coordination for ad hoc networksSungro Yoon, Injong Rhee, Bang Chul Jung, Babak Daneshrad, Jae H. Kim. 1134-1142 [doi]
- A highly scalable bandwidth estimation of commercial hotspot access pointsXinyu Xing, Jianxun Dang, Shivakant Mishra, Xue Liu. 1143-1151 [doi]
- Sequential learning for optimal monitoring of multi-channel wireless networksPallavi Arora, Csaba Szepesvári, Rong Zheng. 1152-1160 [doi]
- Fingerprinting 802.11 rate adaption algorithmsMariyam Mirza, Paul Barford, Xiaojin Zhu, Suman Banerjee, Michael Blodgett. 1161-1169 [doi]
- TurboSync: Clock synchronization for shared media networks via principal component analysis with missing dataRyad Ben-El-Kezadri, Giovanni Pau, Thomas Claveirole. 1170-1178 [doi]
- Dissemination in opportunistic mobile ad-hoc networks: The power of the crowdGjergji Zyba, Geoffrey M. Voelker, Stratis Ioannidis, Christophe Diot. 1179-1187 [doi]
- Experimental evaluation of optimal CSMABruno Nardelli, Jinsung Lee, Kangwook Lee, Yung Yi, Song Chong, Edward W. Knightly, Mung Chiang. 1188-1196 [doi]
- Asymptotic optimality of randomized peer-to-peer broadcast with network codingDi Niu, Baochun Li. 1197-1205 [doi]
- Exploring the optimal replication strategy in P2P-VoD systems: Characterization and evaluationWeijie Wu, John C. S. Lui. 1206-1214 [doi]
- Self-repairing homomorphic codes for distributed storage systemsFrédérique E. Oggier, Anwitaman Datta. 1215-1223 [doi]
- On the efficiency of collaborative caching in ISP-aware P2P networksJie Dai, Bo Li, Fangming Liu, Baochun Li, Hai Jin. 1224-1232 [doi]
- Index-based sampling policies for tracking dynamic networks under sampling constraintsTing He, Animashree Anandkumar, Dakshi Agrawal. 1233-1241 [doi]
- The impact of link scheduling on long paths: Statistical analysis and optimal boundsYashar Ghiassi-Farrokhfal, Jörg Liebeherr, Almut Burchard. 1242-1250 [doi]
- Scheduling for small delay in multi-rate multi-channel wireless networksShreeshankar Bodas, Sanjay Shakkottai, Lei Ying, R. Srikant. 1251-1259 [doi]
- Delay asymptotics with retransmissions and fixed rate codes over erasure channelsJian Tan, Yang Yang, Ness B. Shroff, Hesham El Gamal. 1260-1268 [doi]
- ESPN: Efficient server placement in probabilistic networks with budget constraintDejun Yang, Xi Fang, Guoliang Xue. 1269-1277 [doi]
- QoSoDoS: If you can t beat them, join them!Moti Geva, Amir Herzberg. 1278-1286 [doi]
- Scheduling in wireless ad hoc networks with successive interference cancellationShaohe Lv, Weihua Zhuang, Xiaodong Wang, Xingming Zhou. 1287-1295 [doi]
- Analysis of event detection delay in wireless sensor networksYunbo Wang, Mehmet C. Vuran, Steve Goddard. 1296-1304 [doi]
- PW-MAC: An energy-efficient predictive-wakeup MAC protocol for wireless sensor networksLei Tang, Yanjun Sun, Omer Gurewitz, David B. Johnson. 1305-1313 [doi]
- Delay-bounded MAC with minimal idle listening for sensor networksYang Peng, Zi Li, Daji Qiao, Wensheng Zhang. 1314-1322 [doi]
- Multiple task scheduling for low-duty-cycled wireless sensor networksShuguang Xiong, Jianzhong Li, Mo Li, Jiliang Wang, Yunhao Liu. 1323-1331 [doi]
- Managing cost, performance, and reliability tradeoffs for energy-aware server provisioningBrian Guenter, Navendu Jain, Charles Williams. 1332-1340 [doi]
- On optimal throughput-energy curve for multi-hop wireless networksCanming Jiang, Yi Shi, Y. Thomas Hou, Sastry Kompella. 1341-1349 [doi]
- On renewable sensor networks with wireless energy transferYi Shi, Liguang Xie, Y. Thomas Hou, Hanif D. Sherali. 1350-1358 [doi]
- Energy-aware scheduling algorithms for network stabilityMatthew Andrews, Spyridon Antonakopoulos, Lisa Zhang. 1359-1367 [doi]
- Exploring efficient and scalable multicast routing in future data center networksDan Li, Jiangwei Yu, Junbiao Yu, Jianping Wu. 1368-1376 [doi]
- Modeling and understanding TCP incast in data center networksJiao Zhang, Fengyuan Ren, Chuang Lin. 1377-1385 [doi]
- Routing-as-a-Service (RaaS): A framework For tenant-directed route control in data centerChao-Chih Chen, Lihua Yuan, Albert G. Greenberg, Chen-Nee Chuah, Prasant Mohapatra. 1386-1394 [doi]
- Channel allocation in wireless data center networksYong Cui, Hongyi Wang, Xiuzhen Cheng. 1395-1403 [doi]
- Device fingerprinting to enhance wireless security using nonparametric Bayesian methodNam Tuan Nguyen, Guanbo Zheng, Zhu Han, Rong Zheng. 1404-1412 [doi]
- Delay-bounded adaptive UFH-based anti-jamming wireless communicationQian Wang, Ping Xu, Kui Ren, Xiang-Yang Li. 1413-1421 [doi]
- Fast and scalable secret key generation exploiting channel phase randomness in wireless networksQian Wang, Hai Su, Kui Ren, Kwangjo Kim. 1422-1430 [doi]
- On the vulnerability of the proportional fairness scheduler to retransmission attacksUdi Ben-Porat, Anat Bremler-Barr, Hanoch Levy, Bernhard Plattner. 1431-1439 [doi]
- Predicting the impact of measures against P2P networks on the transient behaviorsEitan Altman, Philippe Nain, Adam Shwartz, Yuedong Xu. 1440-1448 [doi]
- The streaming capacity of sparsely-connected P2P systems with distributed controlCan Zhao, Xiaojun Lin, Chuan Wu. 1449-1457 [doi]
- Utility optimization for dynamic peer-to-peer networks with tit-for-tat constraintsMichael J. Neely, Leana Golubchik. 1458-1466 [doi]
- Modeling the economic value of the location data of mobile usersFrançois Baccelli, Jean Bolot. 1467-1475 [doi]
- Throughput and delay analysis of hybrid wireless networks with multi-hop uplinksDevu Manikantan Shila, Yu Cheng, Tricha Anjali. 1476-1484 [doi]
- The capacity of three-dimensional wireless ad hoc networksPan Li, Miao Pan, Yuguang Fang. 1485-1493 [doi]
- The impact of storage capacity on end-to-end delay in time varying networksGeorge Iosifidis, Iordanis Koutsopoulos, Georgios Smaragdakis. 1494-1502 [doi]
- A study of the routing and spectrum allocation in spectrum-sliced Elastic Optical Path networksYang Wang, Xiaojun Cao, Yi Pan. 1503-1511 [doi]
- A robust optimization approach to backup network design with random failuresMatthew Johnston, Hyang-Won Lee, Eytan Modiano. 1512-1520 [doi]
- The resilience of WDM networks to probabilistic geographical failuresPankaj K. Agarwal, Alon Efrat, Shashidhara K. Ganjugunte, David Hay, Swaminathan Sankararaman, Gil Zussman. 1521-1529 [doi]
- Packet scheduling in a low-latency optical switch with wavelength division multiplexing and electronic bufferLin Liu, Zhenghao Zhang, Yuanyuan Yang. 1530-1538 [doi]
- Self-diagnosis for large scale wireless sensor networksKebin Liu, Qiang Ma, Xibin Zhao, Yunhao Liu. 1539-1547 [doi]
- Agnostic diagnosis: Discovering silent failures in wireless sensor networksXin Miao, Kebin Liu, Yuan He, Yunhao Liu, Dimitris Papadias. 1548-1556 [doi]
- Construction of directional virtual backbones with minimum routing cost in wireless networksLing Ding, Weili Wu, James Willson, Hongjie Du, Wonjun Lee. 1557-1565 [doi]
- Maximizing lifetime for the shortest path aggregation tree in wireless sensor networksDijun Luo, Xiaojun Zhu, Xiaobing Wu, Guihai Chen. 1566-1574 [doi]
- Energy-latency tradeoff for in-network function computation in random networksPaul Balister, Béla Bollobás, Animashree Anandkumar, Alan S. Willsky. 1575-1583 [doi]
- Information delivery in large wireless networks with minimum energy expenseYi Xu, Wenye Wang. 1584-1592 [doi]
- WiZi-Cloud: Application-transparent dual ZigBee-WiFi radios for low power internet accessTao Jin, Guevara Noubir, Bo Sheng. 1593-1601 [doi]
- Networking low-power energy harvesting devices: Measurements and algorithmsMaria Gorlatova, Aya Wallwater, Gil Zussman. 1602-1610 [doi]
- SMITE: A stochastic compressive data collection protocol for Mobile Wireless Sensor NetworksLongjiang Guo, Raheem A. Beyah, Yingshu Li. 1611-1619 [doi]
- A first look at inter-data center traffic characteristics via Yahoo! datasetsYingying Chen, Sourabh Jain, Vijay Kumar Adhikari, Zhi-Li Zhang, Kuai Xu. 1620-1628 [doi]
- Mahout: Low-overhead datacenter traffic management using end-host-based elephant detectionAndrew R. Curtis, Wonho Kim, Praveen Yalagandula. 1629-1637 [doi]
- An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networksJin Tang, Yu Cheng, Weihua Zhuang. 1638-1646 [doi]
- Secure friend discovery in mobile social networksWei Dong, Vacha Dave, Lili Qiu, Yin Zhang. 1647-1655 [doi]
- Maintaining source privacy under eavesdropping and node compromise attacksKanthakumar Pongaliur, Li Xiao. 1656-1664 [doi]
- Defending against vehicular rogue APsHao Han, Fengyuan Xu, Chiu Chiang Tan, Yifan Zhang, Qun Li. 1665-1673 [doi]
- On the achievable throughput of CSMA under imperfect carrier sensingTae Hyun Kim 0001, Jian Ni, R. Srikant, Nitin H. Vaidya. 1674-1682 [doi]
- Optimal control of epidemic evolutionM. H. R. Khouzani, Saswati Sarkar, Eitan Altman. 1683-1691 [doi]
- Performance modeling of hybrid optical packet switches with shared bufferZhiyang Guo, Zhemin Zhang, Yuanyuan Yang. 1692-1700 [doi]
- Aggregation capacity of wireless sensor networks: Extended network caseCheng Wang, Changjun Jiang, Yunhao Liu, Xiang-Yang Li, ShaoJie Tang, Huadong Ma. 1701-1709 [doi]
- Protection of query privacy for continuous location based servicesAniket Pingley, Nan Zhang, Xinwen Fu, Hyeong-Ah Choi, Suresh Subramaniam, Wei Zhao. 1710-1718 [doi]
- Exploiting sensing diversity for confident sensing in wireless sensor networksMatthew Keally, Gang Zhou, Guoliang Xing, Jianxin Wu. 1719-1727 [doi]
- Opportunistic scheduling with worst case delay guarantees in single and multi-hop networksMichael J. Neely. 1728-1736 [doi]
- Constant approximation for virtual backbone construction with Guaranteed Routing Cost in wireless sensor networksHongwei Du, Qiang Ye, Weili Wu, Wonjun Lee, Deying Li, Ding-Zhu Du, Stephen Howard. 1737-1744 [doi]
- One memory access bloom filters and their generalizationYan Qiao, Tao Li, Shigang Chen. 1745-1753 [doi]
- Approximate distance queries and compact routing in sparse graphsRachit Agarwal, Philip Brighten Godfrey, Sariel Har-Peled. 1754-1762 [doi]
- Secure continuous aggregation via sampling-based verification in wireless sensor networksLei Yu, Jianzhong Li, Siyao Cheng, Shuguang Xiong. 1763-1771 [doi]
- Sensor localization with deterministic accuracy guaranteeRyo Sugihara, Rajesh K. Gupta. 1772-1780 [doi]
- On full-view coverage in camera sensor networksYi Wang, Guohong Cao. 1781-1789 [doi]
- Minimizing service delay in directional sensor networksYi Wang, Guohong Cao. 1790-1798 [doi]
- Fast and compact per-flow traffic measurement through randomized counter sharingTao Li, Shigang Chen, Yibei Ling. 1799-1807 [doi]
- Modeling residual-geometric flow samplingXiaoming Wang, Xiaoyong Li, Dmitri Loguinov. 1808-1816 [doi]
- A foundation for stochastic bandwidth estimation of networks with random serviceRalf Lübben, Markus Fidler, Jörg Liebeherr. 1817-1825 [doi]
- Network-wide monitoring through self-configuring adaptive systemImed Lassoued, Amir Krifa, Chadi Barakat, Konstantin Avrachenkov. 1826-1834 [doi]
- SOAP: A Social network Aided Personalized and effective spam filter to clean your e-mail boxZe Li, Haiying Shen. 1835-1843 [doi]
- Good guys vs. Bot Guise: Mimicry attacks against fast-flux detection systemsMatthew Knysz, Xin Hu, Kang G. Shin. 1844-1852 [doi]
- Space-time tradeoff in regular expression matching with semi-deterministic finite automataYi-Hua E. Yang, Viktor K. Prasanna. 1853-1861 [doi]
- IMDGuard: Securing implantable medical devices with the external wearable guardianFengyuan Xu, Zhengrui Qin, Chiu Chiang Tan, Baosheng Wang, Qun Li. 1862-1870 [doi]
- From jammer to gambler: Modeling and detection of jamming attacks against time-critical trafficZhuo Lu, Wenye Wang, Cliff Wang. 1871-1879 [doi]
- Identity-based attack detection in mobile wireless networksKai Zeng, Kannan Govindan, Daniel Wu, Prasant Mohapatra. 1880-1888 [doi]
- APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based servicesZhichao Zhu, Guohong Cao. 1889-1897 [doi]
- Optimizing network-coded cooperative communications via joint session grouping and relay node selectionSushant Sharma, Yi Shi, Y. Thomas Hou, Hanif D. Sherali, Sastry Kompella. 1898-1906 [doi]
- Consort: Node-Constrained Opportunistic Routing in wireless mesh networksXi Fang, Dejun Yang, Guoliang Xue. 1907-1915 [doi]
- An optimal link layer model for multi-hop MIMO networksYi Shi, Jia Liu, Canming Jiang, Cunhao Gao, Y. Thomas Hou. 1916-1924 [doi]
- On progressive network recovery after a major disruptionJianping Wang, Chunming Qiao, Hongfang Yu. 1925-1933 [doi]
- A novel family of geometric planar graphs for wireless ad hoc networksXu Li, Nathalie Mitton, Isabelle Simplot-Ryl, David Simplot-Ryl. 1934-1942 [doi]
- Keep your friends close: Incorporating trust into social network-based Sybil defensesAbedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim. 1943-1951 [doi]
- Secure group key management using uni-directional proxy re-encryption schemesYi-Ruei Chen, J. D. Tygar, Wen-Guey Tzeng. 1952-1960 [doi]
- Stable throughput tradeoffs in cognitive shared channels with cooperative relayingSastry Kompella, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides. 1961-1969 [doi]
- Pay bursts only once holds for (some) non-FIFO systemsJens B. Schmitt, Nicos Gollan, Steffen Bondorf, Ivan Martinovic. 1970-1978 [doi]
- On expressing networks with flow transformations in convolution-formFlorin Ciucu, Jens Schmitt, Hao Wang. 1979-1987 [doi]
- On the convergence to fairness in overloaded FIFO systemsFlorin Ciucu, Oliver Hohlfeld, Lydia Y. Chen. 1988-1996 [doi]
- Optimal sampling algorithms for frequency estimation in distributed dataZengfeng Huang, Ke Yi, Yunhao Liu, Guihai Chen. 1997-2005 [doi]
- Energy provisioning in wireless rechargeable sensor networksShibo He, Jiming Chen, Fachang Jiang, David K. Y. Yau, Guoliang Xing, Youxian Sun. 2006-2014 [doi]
- Robust coverage under uncertainty in wireless sensor networksKhuong Vu, Rong Zheng. 2015-2023 [doi]
- KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networksMichael M. Groat, Wenbo Hey, Stephanie Forrest. 2024-2032 [doi]
- TinyLTS: Efficient network-wide Logging and Tracing System for TinyOSRobert Sauter, Olga Saukh, Oliver Frietsch, Pedro José Marrón. 2033-2041 [doi]
- A high-throughput routing metric for reliable multicast in multi-rate wireless mesh networksXin Zhao, Jun Guo, Chun Tung Chou, Archan Misra, Sanjay Jha. 2042-2050 [doi]
- Multi-path routing and rate allocation for multi-source video on-demand streaming in wireless mesh networksYong Ding, Yang Yang, Li Xiao. 2051-2059 [doi]
- DARP: Distance-aware relay placement in WiMAX mesh networksWeiyi Zhang, Shi Bai, Guoliang Xue, Jian Tang, Chonggang Wang. 2060-2068 [doi]
- Network warehouses: Efficient information distribution to mobile usersArik Motskin, Ian Downes, Branislav Kusy, Omprakash Gnawali, Leonidas J. Guibas. 2069-2077 [doi]
- Network-aware behavior clustering of Internet end hostsKuai Xu, Feng Wang 0002, Lin Gu. 2078-2086 [doi]
- Compressive sensing over graphsWeiyu Xu, Enrique Mallada, Ao Tang. 2087-2095 [doi]
- On the growth of Internet application flows: A complex network perspectiveXiaofei Wu, Ke Yu, Xin Wang. 2096-2104 [doi]
- Sampling vs sketching: An information theoretic comparisonPaul Tune, Darryl Veitch. 2105-2113 [doi]
- FEACAN: Front-end acceleration for content-aware network processingYaxuan Qi, Kai Wang, Jeffrey Fong, Yibo Xue, Jun Li, Weirong Jiang, Viktor K. Prasanna. 2114-2122 [doi]
- Firewall verification and redundancy checking are equivalentHrishikesh B. Acharya, Mohamed G. Gouda. 2123-2128 [doi]
- An efficient regular expressions compression algorithm from a new perspectiveTingwen Liu, Yifu Yang, Yanbing Liu, Yong Sun, Li Guo. 2129-2137 [doi]
- A dynamic game solution to malware attackM. H. R. Khouzani, Saswati Sarkar, Eitan Altman. 2138-2146 [doi]
- STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETsXiaodong Lin, Rongxing Lu, Xiaohui Liang, Xuemin Shen. 2147-2155 [doi]
- Towards wireless security without computational assumptions - An oblivious transfer protocol based on an unauthenticated wireless channelZhuo Hao, Sheng Zhong, Erran L. Li. 2156-2164 [doi]
- Adaptive wireless channel probing for shared key generationYunchuan Wei, Kai Zeng, Prasant Mohapatra. 2165-2173 [doi]
- Human factors-aware service scheduling in Vehicular Cyber-Physical systemsXu Li, Xuegang Yu, Aditya Wagh, Chunming Qiao. 2174-2182 [doi]
- Trajectory improves data delivery in vehicular networksYuchen Wu, Yanmin Zhu, Bo Li. 2183-2191 [doi]
- Exploiting temporal dependency for opportunistic forwarding in urban vehicular networksHongzi Zhu, Shan Chang, Minglu Li, Kshirasagar Naik, Sherman Shen. 2192-2200 [doi]
- ETP: Encounter Transfer Protocol for opportunistic vehicle communicationBo Yu, Fan Bai. 2201-2209 [doi]
- Throughput and delay scaling of general cognitive networksWentao Huang, Xinbing Wang. 2210-2218 [doi]
- To preempt or not: Tackling bid and time-based cheating in online spectrum auctionsLara B. Deek, Xia Zhou, Kevin C. Almeroth, Haitao Zheng. 2219-2227 [doi]
- Pricing-based spectrum access control in cognitive radio networks with random accessLei Yang, Hongseok Kim, Junshan Zhang, Mung Chiang, Chee-Wei Tan. 2228-2236 [doi]
- Joint routing and link scheduling for cognitive radio networks under uncertain spectrum supplyMiao Pan, Chi Zhang, Pan Li, Yuguang Fang. 2237-2245 [doi]
- Ubiquitous data collection for mobile users in wireless sensor networksZhenjiang Li, Mo Li, Jiliang Wang, Zhichao Cao. 2246-2254 [doi]
- Sparse target counting and localization in sensor networks based on compressive sensingBowu Zhang, Xiuzhen Cheng, Nan Zhang, Yong Cui, Yingshu Li, Qilian Liang. 2255-2263 [doi]
- Connected coverage in wireless networks with directional antennasZuoming Yu, Jin Teng, Xiaole Bai, Dong Xuan, Weijia Jia. 2264-2272 [doi]
- Finite-horizon energy allocation and routing scheme in rechargeable sensor networksShengbo Chen, Prasun Sinha, Ness B. Shroff, Changhee Joo. 2273-2281 [doi]
- Adaptive algorithms for detecting community structure in dynamic social networksNam P. Nguyen, Thang N. Dinh, Ying Xuan, My T. Thai. 2282-2290 [doi]
- Relationship classification in large scale online social networks and its impact on information propagationShaoJie Tang, Jing Yuan, Xufei Mao, Xiang-Yang Li, Wei Chen, Guojun Dai. 2291-2299 [doi]
- SocialFilter: Introducing social trust to collaborative spam mitigationMichael Sirivianos, Kyungbaek Kim, Xiaowei Yang. 2300-2308 [doi]
- Prevalence and mitigation of forum spammingYoungsang Shin, Minaxi Gupta, Steven A. Myers. 2309-2317 [doi]
- Queue length asymptotics for generalized max-weight scheduling in the presence of heavy-tailed trafficKrishna P. Jagannathan, Mihalis Markakis, Eytan Modiano, John N. Tsitsiklis. 2318-2326 [doi]
- Weighted wireless link scheduling without information of positions and interference/communication radiiPeng-Jun Wan, Chao Ma, Zhu Wang, Boliu Xu, Minming Li, Xiaohua Jia. 2327-2335 [doi]
- Low-complexity scheduling algorithm for sum-queue minimization in wireless convergecastV. J. Venkataramanan, Xiaojun Lin. 2336-2344 [doi]
- Maximizing throughput in wireless networks with finite internal buffersChing-Ming Lien, Cheng-Shang Chang, Jay Cheng, Duan-Shin Lee. 2345-2353 [doi]
- RelSamp: Preserving application structure in sampled flow measurementsMyungjin Lee, Mohammad Y. Hajjat, Ramana Rao Kompella, Sanjay G. Rao. 2354-2362 [doi]
- Efficient network-wide flow record generationJoel Sommers, Rhys Alistair Bowden, Brian Eriksson, Paul Barford, Matthew Roughan, Nick G. Duffield. 2363-2371 [doi]
- Estimating the performance of hypothetical cloud service deployments: A measurement-based approachAngela Wang, Cheng Huang, Jin Li, Keith W. Ross. 2372-2380 [doi]
- VIRO: A scalable, robust and namespace independent virtual Id routing for future networksSourabh Jain, Yingying Chen, Zhi-Li Zhang. 2381-2389 [doi]
- Handling network uncertainty in heterogeneous wireless networksTalmai Oliveira, Srisudha Mahadevan, Dharma P. Agrawal. 2390-2398 [doi]
- Forwarding anomalies in Bloom filter-based multicastMikko Särelä, Christian Esteve Rothenberg, Tuomas Aura, András Zahemszky, Pekka Nikander, Jörg Ott. 2399-2407 [doi]
- Location privacy protection from RSS localization system using antenna pattern synthesisTing Wang, Yaling Yang. 2408-2416 [doi]
- Scheduling design and analysis for end-to-end heterogeneous flows in an avionics networkYu Hua, Xue Liu. 2417-2425 [doi]
- Long PN code based DSSS watermarkingJunwei Huang, Xian Pan, Xinwen Fu, Jie Wang. 2426-2434 [doi]
- FindU: Privacy-preserving personal profile matching in mobile social networksMing Li, Ning Cao, Shucheng Yu, Wenjing Lou. 2435-2443 [doi]
- Jump-stay based channel-hopping algorithm with guaranteed rendezvous for cognitive radio networksZhiyong Lin, Hai Liu, Xiaowen Chu, Yiu-Wing Leung. 2444-2452 [doi]
- Wi-Fi 2.0: Price and quality competitions of duopoly cognitive radio wireless service providers with time-varying spectrum availabilityHyoil Kim, Jaehyuk Choi, Kang G. Shin. 2453-2461 [doi]
- ETCH: Efficient Channel Hopping for communication rendezvous in dynamic spectrum access networksYifan Zhang, Qun Li, Gexin Yu, Baosheng Wang. 2471-2479 [doi]
- On-demand time synchronization with predictable accuracyZiguo Zhong, Pengpeng Chen, Tian He. 2480-2488 [doi]
- Visual correlation-based image gathering for wireless multimedia sensor networksPu Wang, Rui Dai, Ian F. Akyildiz. 2489-2497 [doi]
- Optimal multiple-coverage of sensor networksXiaole Bai, Ziqiu Yun, Dong Xuan, Biao Chen, Wei Zhao. 2498-2506 [doi]
- r-Kernel: An operating system foundation for highly reliable networked embedded systemsQing Cao, Xiaorui Wang, Hairong Qi, Tian He. 2507-2515 [doi]
- Joint distributed access point selection and power allocation in cognitive radio networksMingyi Hong, Alfredo Garcia, Jorge Barrera. 2516-2524 [doi]
- Distributed power control in the SINR modelZvi Lotker, Merav Parter, David Peleg, Yvonne Anne Pignolet. 2525-2533 [doi]
- Traffic-tracing gateway (TTG)Haiping Liu, Xiaoling Qiu, Dipak Ghosal, Chen-Nee Chuah, Xin Liu, Yueyue Fan. 2534-2542 [doi]
- Belief propagation methods for intercell interference coordinationSundeep Rangan, Ritesh Madan. 2543-2551 [doi]
- Downlink power control for variable bit rate videos over multicell wireless networksYingsong Huang, Shiwen Mao. 2561-2569 [doi]
- Multicell coordination via joint scheduling, beamforming and power spectrum adaptationWei Yu, Taesoo Kwon, Changyong Shin. 2570-2578 [doi]
- Delay-based Back-Pressure scheduling in multi-hop wireless networksBo Ji, Changhee Joo, Ness B. Shroff. 2579-2587 [doi]
- A low-complexity congestion control and scheduling algorithm for multihop wireless networks with order-optimal per-flow delayPo-Kai Huang, Xiaojun Lin, Chih-Chun Wang. 2588-2596 [doi]
- On the limitations of randomization for Queue-Length-Based Scheduling in wireless networksBin Li, Atilla Eryilmaz. 2597-2605 [doi]
- Overflow management with multipart packetsYishay Mansour, Boaz Patt-Shamir, Dror Rawitz. 2606-2614 [doi]
- Public DNS system and Global Traffic ManagementCheng Huang, David A. Maltz, Jin Li, Albert G. Greenberg. 2615-2623 [doi]
- I-seismograph: Observing and measuring Internet earthquakesJun Li, Scott Brooks. 2624-2632 [doi]
- Measurement and analysis of global IP-usage patterns of fast-flux botnetsXin Hu, Matthew Knysz, Kang G. Shin. 2633-2641 [doi]
- New insights into the stochastic geometry analysis of dense CSMA networksGiusi Alfano, Michele Garetto, Emilio Leonardi. 2642-2650 [doi]
- Identifying mobiles hiding behind wireless routersYinjie Chen, Zhongli Liu, Benyuan Liu, Xinwen Fu, Wei Zhao. 2651-2659 [doi]
- Feasibility and optimization of delay guarantees for non-homogeneous flows in IEEE 802.11 WLANsYan Gao, Chee-Wei Tan, Ying Huang, Zheng Zeng, P. R. Kumar. 2660-2668 [doi]
- CHAIN: Introducing minimum controlled coordination into random access MACZheng Zeng, Yan Gao, Kun Tan, P. R. Kumar. 2669-2677 [doi]
- Multi-hop access pricing in public area WLANsYong Cui, Tianze Ma, Xiuzhen Cheng. 2678-2686 [doi]
- A packet dropping-based incentive mechanism for M/M/1 queues with selfish usersYi Gai, Hua Liu, Bhaskar Krishnamachari. 2687-2695 [doi]
- User subscription dynamics and revenue maximization in communications marketsShaolei Ren, Jaeok Park, Mihaela van der Schaar. 2696-2704 [doi]
- The wireless multicast coalition game and the non-cooperative association problemChandramani Kishore Singh, Eitan Altman. 2705-2713 [doi]
- Exploiting MIMO antennas in cooperative cognitive radio networksSha Hua, Hang Liu, Mingquan Wu, Shivendra S. Panwar. 2714-2722 [doi]
- Optimal Cooperative Sensing Scheduling for energy-efficient Cognitive Radio NetworksTengyi Zhang, Danny H. K. Tsang. 2723-2731 [doi]
- Transport throughput of secondary networks in spectrum sharing systemsChengzhi Li, Huaiyu Dai. 2732-2740 [doi]
- Network selection for secondary users in cognitive radio systemsChonggang Wang, Kazem Sohraby, Rittwik Jana, Lusheng Ji, Mahmoud Daneshmand. 2741-2749 [doi]
- BodyT2: Throughput and time delay performance assurance for heterogeneous BSNsZhen Ren, Gang Zhou, Andrew Pyles, Matthew Keally, Weizhen Mao, Haining Wang. 2750-2758 [doi]
- A framework for mobile data gathering with load balanced clustering and MIMO uploadingMiao Zhao, Yuanyuan Yang. 2759-2767 [doi]
- Energy efficient clustering for WSN-based structural health monitoringXuefeng Liu, Jiannong Cao, Steven Lai, Chao Yang, Hejun Wu, Youlin Xu. 2768-2776 [doi]
- Many-to-one deliverability of greedy routing in 2-D wireless sensor networksYaling Yang, Yujun Li, Mengshu Hou. 2777-2785 [doi]
- Network modulation: A new dimension to enhance wireless network performanceZhe Yang, Yuanqian Luo, Lin Cai. 2786-2794 [doi]
- Dynamic Channel Allocation for wireless zone-based Multicast and Broadcast ServiceZih-Ci Lin, Huai-Lei Fu, Phone Lin. 2795-2803 [doi]
- On adaptive-width channel allocation in non-cooperative, multi-radio wireless networksFan Wu, Nikhil Singh, Nitin H. Vaidya, Guihai Chen. 2804-2812 [doi]
- Truthful spectrum auctions with approximate revenueMahmoud Al-Ayyoub, Himanshu Gupta. 2813-2821 [doi]
- Optimal relay location and power allocation for low SNR broadcast relay channelsMohit Thakur, Nadia Fawaz, Muriel Médard. 2822-2830 [doi]
- Capacity scaling of multihop cellular networksPan Li, Xiaoxia Huang, Yuguang Fang. 2831-2839 [doi]
- Taming user-generated content in mobile networks via Drop ZonesIonut Trestian, Supranamaya Ranjan, Aleksandar Kuzmanovic, Antonio Nucci. 2840-2848 [doi]
- A nearly-optimal index rule for scheduling of users with abandonmentUrtzi Ayesta, Peter Jacko, Vladimir Novak. 2849-2857 [doi]
- Content-aware caching and traffic management in content distribution networksMeghana M. Amble, Parimal Parag, Srinivas Shakkottai, Lei Ying. 2858-2866 [doi]
- Throughput-optimal random access with order-optimal delayMahdi Lotfinezhad, Peter Marbach. 2867-2875 [doi]
- Which protocol? Mutual interaction of heterogeneous congestion controllersVinod Ramaswamy, Diganto Choudhury, Srinivas Shakkottai. 2876-2884 [doi]
- Adaptive delay-based congestion control for high bandwidth-delay product networksHyungsoo Jung, Shin Gyu Kim, Heon Young Yeom, Sooyong Kang, Lavy Libman. 2885-2893 [doi]
- TCP-FIT: An improved TCP congestion control algorithm and its performanceJingyuan Wang, Jiangtao Wen, Jun Zhang, Yuxing Han. 2894-2902 [doi]
- A cross-domain privacy-preserving protocol for cooperative firewall optimizationFei Chen, Bezawada Bruhadeshwar, Alex X. Liu. 2903-2911 [doi]
- Adaptive flow control for TCP on mobile phonesShruti Sanadhya, Raghupathy Sivakumar. 2912-2920 [doi]
- Modeling and characterization of large-scale Wi-Fi traffic in public hot-spotsAmitabha Ghosh, Rittwik Jana, V. Ramaswami, Jim Rowland, N. K. Shankaranarayanan. 2921-2929 [doi]
- Improving energy efficiency of Wi-Fi sensing on smartphonesKyu-Han Kim, Alexander W. Min, Dhruv Gupta, Prasant Mohapatra, Jatinder Pal Singh. 2930-2938 [doi]
- PeerCast: Improving link layer multicast through cooperative relayingJie Xiong, Romit Roy Choudhury. 2939-2947 [doi]
- IP fast ReRoute: Loop Free Alternates revisitedGábor Rétvári, János Tapolcai, Gábor Enyedi, András Császár. 2948-2956 [doi]
- Local transit policies and the complexity of BGP Stability TestingMarco Chiesa, Luca Cittadini, Giuseppe Di Battista, Stefano Vissicchio. 2957-2965 [doi]
- BGP safety with spurious updatesMartin Suchara, Alex Fabrikant, Jennifer Rexford. 2966-2974 [doi]
- There s something about MRAI: Timing diversity can exponentially worsen BGP convergenceAlex Fabrikant, Umar Syed, Jennifer Rexford. 2975-2983 [doi]
- Guaranteed opportunistic scheduling in multi-hop cognitive radio networksDongyue Xue, Eylem Ekici. 2984-2992 [doi]
- Opportunistic spectrum access for mobile cognitive radiosAlexander W. Min, Kyu-Han Kim, Jatinder Pal Singh, Kang G. Shin. 2993-3001 [doi]
- Optimal scheduling in cooperate-to-join Cognitive Radio NetworksKarim Khalil, Mehmet Karaca, Özgür Erçetin, Eylem Ekici. 3002-3010 [doi]
- Performance analysis of spectrum handoff for cognitive radio ad hoc networks without common control channel under homogeneous primary trafficYi Song, Jiang Xie. 3011-3019 [doi]
- Strategyproof auctions for balancing social welfare and fairness in secondary spectrum marketsAjay Gopinathan, Zongpeng Li, Chuan Wu. 3020-3028 [doi]
- On a game theoretic approach to capacity maximization in wireless networksEyjolfur Ingi Asgeirsson, Pradipta Mitra. 3029-3037 [doi]
- Base-station selections for qos provisioning over distributed multi-user MIMO links in wireless networksQinghe Du, Xi Zhang. 3038-3046 [doi]
- When compressive sampling meets multicast: Outage analysis and subblock network codingChandrashekhar Thejaswi P. S., Tuan Tran, Junshan Zhang. 3047-3055 [doi]
- Exploiting channel memory for joint estimation and scheduling in downlink networksWenzhuo Ouyang, Sugumar Murugesan, Atilla Eryilmaz, Ness B. Shroff. 3056-3064 [doi]
- Scheduling for end-to-end deadline-constrained traffic with reliability requirements in multi-hop networksRuogu Li, Atilla Eryilmaz. 3065-3073 [doi]
- Scheduling in mapreduce-like systems for fast completion timeHyunseok Chang, Murali S. Kodialam, Ramana Rao Kompella, T. V. Lakshman, Myungjin Lee, Sarit Mukherjee. 3074-3082 [doi]
- Pipelining packet scheduling in a low latency optical packet switchLin Liu, Zhenghao Zhang, Yuanyuan Yang. 3083-3091 [doi]
- Season: Shelving interference and joint identification in large-scale RFID systemsLei Yang, Jinsong Han, Yong Qi, Cheng Wang, Tao Gu, Yunhao Liu. 3092-3100 [doi]
- Efficient information collection protocols for sensor-augmented RFID networksShigang Chen, Ming Zhang, Bin Xiao. 3101-3109 [doi]
- Making wireless networks MORALNazif C. Tas, Tamer Nadeem, Ashok K. Agrawala. 3110-3118 [doi]
- User-centric data dissemination in disruption tolerant networksWei Gao, Guohong Cao. 3119-3127 [doi]
- Delay-capacity tradeoffs for mobile networks with Lévy walks and Lévy flightsKyunghan Lee, Yoora Kim, Song Chong, Injong Rhee, Yung Yi. 3128-3136 [doi]
- When does content float? Characterizing availability of anchored information in opportunistic content sharingEsa Hyytiä, Jorma T. Virtamo, Pasi E. Lassila, Jussi Kangasharju, Jörg Ott. 3137-3145 [doi]
- Risk sensitive optimal control framework applied to delay tolerant networksEitan Altman, Veeraruna Kavitha, Francesco De Pellegrini, Vijay Kamble, Vivek S. Borkar. 3146-3154 [doi]
- Distinguishing locations across perimeters using wireless link measurementsJunxing Zhang, Sneha Kumar Kasera, Neal Patwari, Piyush Rai. 3155-3163 [doi]
- Scalable and fully distributed localization with mere connectivityMiao Jin, Su-Xia, Hongyi Wu, Xianfeng Gu. 3164-3172 [doi]
- Spotter: A model based active geolocation serviceSándor Laki, Peter Matray, Péter Hága, Tamas Sebok, István Csabai, Gábor Vattay. 3173-3181 [doi]
- Implications of device diversity for organic localizationJun-geun Park, Dorothy Curtis, Seth J. Teller, Jonathan Ledlie. 3182-3190 [doi]
- Providing performance guarantees in multipass network processorsIsaac Keslassy, Kirill Kogan, Gabriel Scalosub, Michael Segal. 3191-3199 [doi]
- Scan detection in high-speed networks based on optimal dynamic bit sharingTao Li, Shigang Chen, Wen Luo, Ming Zhang. 3200-3208 [doi]
- A real-time multicast routing scheme for multi-hop switched fieldbusesLixiong Chen, Xue Liu, Qixin Wang, Yufei Wang. 3209-3217 [doi]
- Optimal Sybil-resilient node admission controlNguyen Tran, Jinyang Li, Lakshminarayanan Subramanian, Sherman S. M. Chow. 3218-3226 [doi]
- Client assignment for improving interactivity in distributed interactive applicationsLu Zhang, Xueyan Tang. 3227-3235 [doi]
- Cost effective resource allocation of overlay routing relay nodesRami Cohen, Danny Raz. 3236-3244 [doi]