Abstract is missing.
- Efficient caching in content-centric networks using OpenFlowXuan Nam Nguyen, Damien Saucez, Thierry Turletti. 1-2 [doi]
- Impact of a sleep schedule on the AODV convergence time in WSNsMathieu Michel, Bruno Quoitin. 3-4 [doi]
- Enhancing traffic sampling scope and efficiencyJoão Marco C. Silva, Paulo Carvalho, Solange Rito Lima. 5-6 [doi]
- Obsidian: A scalable and efficient framework for NetFlow obfuscationAntonio Villani, Daniele Riboni, Domenico Vitali, Claudio Bettini, Luigi V. Mancini. 7-8 [doi]
- Energy-harvesting WSNs for structural health monitoring of underground train tunnelsAlessandro Cammarano, Dora Spenza, Chiara Petrioli. 9-10 [doi]
- Distributed scheduling for scalable P2P video streaming with network codingAnooq Muzaffar Sheikh, Attilio Fiandrotti, Enrico Magli. 11-12 [doi]
- MAC-aware routing metrics for low power and lossy networksPiergiuseppe Di Marco, Carlo Fischione, George Athanasiou, Prodromos-Vasileios Mekikis. 13-14 [doi]
- Electricity cost efficient workload mappingMuhammad Saqib Ilyas, Zartash Afzal Uzmi. 15-16 [doi]
- On the impact of disorder on dynamic network navigationAnh Dung Nguyen, Patrick Sénac, Michel Diaz. 17-18 [doi]
- Efficient dynamic spectrum sharing through rate compensation and spectrum handoffAdisorn Lertsinsrubtavee, Naceur Malouch, Serge Fdida. 19-20 [doi]
- A simple approximate analysis of floating content for context-aware applicationsShahzad Ali, Gianluca Rizzo, Balaji Rengarajan, Marco Ajmone Marsan. 21-22 [doi]
- Data dissemination bounds in people-centric systemsKamini Garg. 23-24 [doi]
- Profit-maximizing virtual machine trading in a federation of selfish cloudsHongxing Li, Chuan Wu, Zongpeng Li, Francis C. M. Lau. 25-29 [doi]
- DPack: Disk scheduler for highly consolidated cloudOrathai Sukwong, Hyong S. Kim. 30-34 [doi]
- Dache: A data aware caching for big-data applications using the MapReduce frameworkYaxiong Zhao, Jie Wu 0001. 35-39 [doi]
- HBaseMQ: A distributed message queuing system on clouds with HBaseChen Zhang, Xue Liu. 40-44 [doi]
- Video sharing propagation in social networks: Measurement, modeling, and analysisXu Cheng, Haitao Li, Jiangchuan Liu. 45-49 [doi]
- Video requests from Online Social Networks: Characterization, analysis and generationHaitao Li, Haiyang Wang, Jiangchuan Liu, Ke Xu. 50-54 [doi]
- An adaptive approximation algorithm for community detection in dynamic scale-free networksThang N. Dinh, Nam P. Nguyen, My T. Thai. 55-59 [doi]
- Effect of constraints on superpeer topologiesJoydeep Chandra, Bivas Mitra, Niloy Ganguly. 60-64 [doi]
- ROOM: Rule Organized Optimal Matching for fine-grained traffic identificationHao Li, Chengchen Hu. 65-69 [doi]
- Toward composable network traffic measurementAndrea Di Pietro, Felipe Huici, Nicola Bonelli, Brian Trammell, Petr Kastovsky, Tristan Groleat, Sandrine Vaton, Maurizio Dusi. 70-74 [doi]
- Understanding geolocation accuracy using network geometryBrian Eriksson, Mark Crovella. 75-79 [doi]
- A technique for counting DNSSEC validatorsKensuke Fukuda, Shinta Sato, Takeshi Mitamura. 80-84 [doi]
- A network calculus for cache networksElisha J. Rosensweig, Jim Kurose. 85-89 [doi]
- αRoute: A name based routing scheme for Information Centric NetworksReaz Ahmed, Md. Faizul Bari, Shihabur Rahman Chowdhury, Md. Golam Rabbani, Raouf Boutaba, Bertrand Mathieu. 90-94 [doi]
- NameFilter: Achieving fast name lookup with low memory cost via applying two-stage Bloom filtersYi Wang, Tian Pan, Zhian Mi, Huichen Dai, Xiaoyu Guo, Ting Zhang, Bin Liu, Qunfeng Dong. 95-99 [doi]
- Cooperative caching through routing control in information-centric networksSumanta Saha, Andrey Lukyanenko, Antti Ylä-Jääski. 100-104 [doi]
- A-VIP: Anonymous verification and inference of positions in vehicular networksFrancesco Malandrino, Claudio Ettore Casetti, Carla-Fabiana Chiasserini, Marco Fiore, Roberto Sadao Yokoyama, Carlo Borgiattino. 105-109 [doi]
- How shadowing hurts vehicular communications and how dynamic beaconing can helpChristoph Sommer, Stefan Joerer, Michele Segata, Ozan K. Tonguz, Renato Lo Cigno, Falko Dressler. 110-114 [doi]
- Approaching reliable realtime communications? A novel system design and implementation for roadway safety oriented vehicular communicationsKai Xing, Tianbo Gu, Zhengang Zhao, Lei Shi, Yunhao Liu, Pengfei Hu, Yuepeng Wang, Yi Liang, Shuo Zhang, Yang Wang 0015, Liusheng Huang. 115-119 [doi]
- Achieving air-ground communications in 802.11 networks with three-dimensional aerial mobilityEvsen Yanmaz, Robert Kuschnig, Christian Bettstetter. 120-124 [doi]
- Multi-point to multi-point MIMO in wireless LANsSangki Yun, Lili Qiu, Apurv Bhartia. 125-129 [doi]
- Beam scheduling and relay assignment in wireless relay networks with smart antennasBrendan Mumey, Jian Tang, Ivan R. Judson, Richard S. Wolff. 130-134 [doi]
- Maximizing wireless network capacity with linear power: Breaking the logarithmic barrierPeng-Jun Wan, Lei Wang, Chao Ma, Zhu Wang, Boliu Xu, Minming Li. 135-139 [doi]
- Concurrent channel access and estimation for scalable multiuser MIMO networkingTsung-Han Lin, H. T. Kung. 140-144 [doi]
- LCS: Compressive sensing based device-free localization for multiple targets in sensor networksJu Wang, Dingyi Fang, XiaoJiang Chen, Zhe Yang, Tianzhang Xing, Lin Cai. 145-149 [doi]
- Medium access control protocol design for sensors powered by wireless energy transferPrusayon Nintanavongsa, M. Yousof Naderi, Kaushik R. Chowdhury. 150-154 [doi]
- DAMson: On distributed sensing scheduling to achieve high Quality of MonitoringShaoJie Tang, Jing Yuan. 155-159 [doi]
- Quick construction of data-driven models of the short-term behavior of wireless linksAnkur Kamthe, Miguel Á. Carreira-Perpiñán, Alberto Cerpa. 160-164 [doi]
- Utility-based cooperative spectrum sensing scheduling in cognitive radio networksHongjuan Li, Xiuzhen Cheng, Keqiu Li, Xiaoshuang Xing, Tao Jing. 165-169 [doi]
- Multicast throughput stability analysis for cognitive cooperative random accessClement Kam, Sastry Kompella, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides. 170-174 [doi]
- Cooperative relay selection in cognitive radio networksTao Jing, Shixiang Zhu, Hongjuan Li, Xiuzhen Cheng, Yan Huo. 175-179 [doi]
- TAMES: A Truthful Auction Mechanism for heterogeneous spectrum allocationYanjiao Chen, Jin Zhang, Kaishun Wu, Qian Zhang. 180-184 [doi]
- Joint design of Dynamic Scheduling and Pricing in wireless cloud computingShaolei Ren, Mihaela van der Schaar. 185-189 [doi]
- Energy-efficient scheduling policy for collaborative execution in mobile cloud computingWeiwen Zhang, Yonggang Wen, Dapeng Oliver Wu. 190-194 [doi]
- eTime: Energy-efficient transmission between cloud and mobile devicesPeng Shu, Fangming Liu, Hai Jin, Min Chen, Feng Wen, Yupeng Qu, Bo Li. 195-199 [doi]
- Is link signature dependable for wireless security?Xiaofan He, Huaiyu Dai, Wenbo Shen, Peng Ning. 200-204 [doi]
- Data confidentiality and availability via secret sharing and node mobility in UWSNRoberto Di Pietro, Stefano Guarino. 205-209 [doi]
- PASSAGES: Preserving Anonymity of Sources and Sinks against Global EavesdroppersHyungbae Park, Sejun Song, Baek-Young Choi, Chin-Tser Huang. 210-214 [doi]
- Video source identification in lossy wireless networksShaxun Chen, Amit Pande, Kai Zeng, Prasant Mohapatra. 215-219 [doi]
- Understanding user behavior in SpotifyBoxun Zhang, Gunnar Kreitz, Marcus Isaksson, Javier Ubillos, Guido Urdaneta, Johan A. Pouwelse, Dick H. J. Epema. 220-224 [doi]
- Mixture models of endhost network trafficJohn Mark Agosta, Jaideep Chandrashekar, Mark Crovella, Nina Taft, Daniel Ting. 225-229 [doi]
- Exploring the cloud from passive measurements: The Amazon AWS caseIgnacio Bermudez, Stefano Traverso, Marco Mellia, Maurizio M. Munafò. 230-234 [doi]
- Predicting user dissatisfaction with Internet application performance at end-hostsDiana Joumblatt, Jaideep Chandrashekar, Branislav Kveton, Nina Taft, Renata Teixeira. 235-239 [doi]
- Experimental evaluation of content distribution with NDN and HTTPHaowei Yuan, Patrick Crowley. 240-244 [doi]
- Dynamic in-network caching for energy efficient content deliveryJaime Llorca, Antonia Maria Tulino, Kyle Guan, Jairo O. Esteban, Matteo Varvello, Nakjung Choi, Daniel C. Kilper. 245-249 [doi]
- Effectively minimizing redundant Internet streaming traffic to iOS devicesYao Liu, Fei Li, Lei Guo, Bo Shen, Songqing Chen. 250-254 [doi]
- Content-aware network data compression using joint memorization and clusteringMohsen Sardari, Ahmad Beirami, Jun Zou, Faramarz Fekri. 255-259 [doi]
- Wireless network coding: Deciding when to flip the switchAhmed Osama Fathy Atya, Ioannis Broustis, Shailendra Singh, Dimitris Syrivelis, Srikanth V. Krishnamurthy, Thomas F. La Porta. 260-264 [doi]
- Rateless resilient network coding against byzantine adversariesWentao Huang, Tracey Ho, Hongyi Yao, Sidharth Jaggi. 265-269 [doi]
- Untraceability of mobile devices in wireless mesh networks using linear network codingJin Wang, Kejie Lu, Jianping Wang, Chunming Qiao. 270-274 [doi]
- Coding Opportunity Aware Backbone metrics for broadcast in wireless networksShuai Wang, Guang Tan, Yunhuai Liu, Hongbo Jiang, Tian He. 275-279 [doi]
- DARA: Estimating the behavior of data rate adaptation algorithms in WLAN hotspotsSven Wiethölter, Andreas Ruttor, Uwe Bergemann, Manfred Opper, Adam Wolisz. 280-284 [doi]
- Fairness and efficiency tradeoffs for user cooperation in distributed wireless networksYong Xiao, Jianwei Huang, Chau Yuen, Luiz A. DaSilva. 285-289 [doi]
- A quantitative framework for guaranteeing QoE of video delivery over wirelessHemant Kowshik, Partha Dutta, Malolan Chetlur, Shivkumar Kalyanaraman. 290-294 [doi]
- Differential estimation in dynamic RFID systemsQingjun Xiao, Bin Xiao, Shigang Chen. 295-299 [doi]
- Effective epidemic control and source tracing through mobile social sensing over WBANsZhaoyang Zhang 0001, Honggang Wang, Xiaodong Lin, Hua Fang, Dong Xuan. 300-304 [doi]
- Medial axis construction and applications in 3D wireless sensor networksSu-Xia, Ning Ding, Miao Jin, Hongyi Wu, Yang Yang. 305-309 [doi]
- Efficient data gathering using Compressed Sparse FunctionsLiwen Xu, Xiao Qi, Yuexuan Wang, Thomas Moscibroda. 310-314 [doi]
- R3: Optimizing relocatable code for efficient reprogramming in networked embedded systemsWei Dong, Biyuan Mo, Chao Huang, Yunhao Liu, Chun Chen. 315-319 [doi]
- Criticality of large delay tolerant networks via directed continuum percolation in space-timeEsa Hyytiä, Jörg Ott. 320-324 [doi]
- On the insensitivity of user distribution in multicell networks under general mobility and session patternsWei Bao, Ben Liang. 325-329 [doi]
- Call admission control for real-time applications in wireless networkSiddhant Agrawal, Prasanna Chaporkar, Rajan Udwani. 330-334 [doi]
- Distributed admission control without knowledge of the capacity regionJuan José Jaramillo, Lei Ying. 335-339 [doi]
- Data center energy cost minimization: A spatio-temporal scheduling approachJianying Luo, Lei Rao, Xue Liu. 340-344 [doi]
- Coordinated resource provisioning and maintenance scheduling in cloud data centersZeyu Zheng, Minming Li, Xun Xiao, Jianping Wang. 345-349 [doi]
- Multicast fat-tree data center networks with bounded link oversubscriptionZhiyang Guo, Yuanyuan Yang. 350-354 [doi]
- Almost optimal virtual machine placement for traffic intense data centersRami Cohen, Liane Lewin-Eytan, Joseph Naor, Danny Raz. 355-359 [doi]
- Disambiguation of residential wired and wireless access in a forensic settingSookhyun Yang, Jim Kurose, Brian Neil Levine. 360-364 [doi]
- OpenSesame: Unlocking smart phone through handshaking biometricsYi Guo, Lei Yang, Xuan Ding, Jinsong Han, Yunhao Liu. 365-369 [doi]
- Fast and secure rendezvous protocols for mitigating control channel DoS attacksMohammad Abdel-Rahman, Hanif Rahbari, Marwan Krunz, Philippe Nain. 370-374 [doi]
- Near field authentication for smart devicesLingjun Li, Xinxin Zhao, Guoliang Xue. 375-379 [doi]
- On achieving all-optical failure restoration via monitoring trailsJános Tapolcai, Pin-Han Ho, Péter Babarczi, Lajos Rónyai. 380-384 [doi]
- On routing and spectrum allocation in spectrum-sliced optical networksShahrzad Shirazipourazad, Chenyang Zhou, Zahra Derakhshandeh, Arunabha Sen. 385-389 [doi]
- Multipath de-fragmentation: Achieving better spectral efficiency in elastic optical path networksXiaomin Chen, Admela Jukan, Ashwin Gumaste. 390-394 [doi]
- A predictive and incremental grooming scheme for time-varying traffic in WDM networksZilong Ye, Xiaojun Cao, Xiujiao Gao, Chunming Qiao. 395-399 [doi]
- Exact cooperative regenerating codes with minimum-repair-bandwidth for distributed storageAnyu Wang, Zhifang Zhang. 400-404 [doi]
- Moving big data to the cloudLinquan Zhang, Chuan Wu, Zongpeng Li, Chuanxiong Guo, Minghua Chen, Francis C. M. Lau. 405-409 [doi]
- Resolve the virtual network embedding problem: A column generation approachQian Hu, Yang Wang 0016, Xiaojun Cao. 410-414 [doi]
- Adversarial VNet embeddings: A threat for ISPs?Yvonne Anne Pignolet, Stefan Schmid, Gilles Trédan. 415-419 [doi]
- DataSpotting: Exploiting naturally clustered mobile devices to offload cellular trafficXuan Bao, Yin Lin, Uichin Lee, Ivica Rimac, Romit Roy Choudhury. 420-424 [doi]
- Proactive call drop avoidance in UMTS networksShan Zhou, Jie Yang 0003, Dahai Xu, Guangzhi Li, Yu Jin, Zihui Ge, Mario Kosseifi, Robert D. Doverspike, Yingying Chen, Lei Ying. 425-429 [doi]
- A bandwidth trading marketplace for mobile data offloadingStefano Paris, Fabio Martignon, Ilario Filippini, Lin Clien. 430-434 [doi]
- AMUSE: Empowering users for cost-aware offloading with throughput-delay tradeoffsYoungbin Im, Carlee Joe-Wong, Sangtae Ha, Soumya Sen, Ted Taekyoung Kwon, Mung Chiang. 435-439 [doi]
- Cutting without pain: Mitigating 3G radio tail effect on smartphonesFei Yu, Guangtao Xue, Hongzi Zhu, Zhenxian Hu, Minglu Li, Gong Zhang. 440-444 [doi]
- IPAD: An incentive and privacy-aware data dissemination scheme in opportunistic networksRongxing Lu, Xiaodong Lin, Zhiguo Shi, Bin Cao, Xuemin (Sherman) Shen. 445-449 [doi]
- Beneficial cooperation ratio in multi-hop wireless ad hoc networksYong Zhou, Weihua Zhuang. 450-454 [doi]
- Low-latency multi-flow broadcasts in fading wireless networksChenxi Qiu, Lei Yu, Haiying Shen, Sohraab Soltani. 455-459 [doi]
- Beyond interference avoidance: Distributed sub-network scheduling in wireless networks with local viewsPedro E. Santacruz, Vaneet Aggarwal, Ashutosh Sabharwal. 460-464 [doi]
- Cut graph based information storage and retrieval in 3D sensor networks with general topologyYang Yang, Miao Jin, Yao Zhao, Hongyi Wu. 465-469 [doi]
- Barrier coverage in wireless sensor networks: From lined-based to curve-based deploymentShibo He, Xiaowen Gong, Junshan Zhang, Jiming Chen, Youxian Sun. 470-474 [doi]
- Reduction algorithm for simplicial complexesAnais Vergne, Laurent Decreusefond, Philippe Martins. 475-479 [doi]
- TriggerCas: Enabling wireless consrucive collisionsYin Wang, Yuan He, Dapeng Cheng, Yunhao Liu, Xiang-Yang Li. 480-484 [doi]
- Adaptive device-free passive localization coping with dynamic target speedXiuyuan Zheng, Jie Yang 0003, Yingying Chen, Yu Gan. 485-489 [doi]
- Footprints elicit the truth: Improving global positioning accuracy via local mobilityChenshu Wu, Zheng Yang, Yiyang Zhao, Yunhao Liu. 490-494 [doi]
- Towards accurate acoustic localization on a smartphoneKaikai Liu, Xinxin Liu, Lulu Xie, Xiaolin Li 0001. 495-499 [doi]
- EV-Human: Human localization via visual estimation of body electronic interferenceXinfeng Li, Jin Teng, Qiang Zhai, Junda Zhu, Dong Xuan, Yuan F. Zheng, Wei Zhao. 500-504 [doi]
- FREDI: Robust RSS-based ranging with multipath effect and radio interferenceYu Zhao, Yunhuai Liu, Tian He, Athanasios V. Vasilakos, Chuanping Hu. 505-509 [doi]
- Schedule first, manage later: Network-aware load balancingAmir Nahir, Ariel Orda, Danny Raz. 510-514 [doi]
- Characterizing the impact of the workload on the value of dynamic resizing in data centersKai Wang, Minghong Lin, Florin Ciucu, Adam Wierman, Chuang Lin. 515-519 [doi]
- The answer is blowing in the wind: Analysis of powering Internet data centers with wind energyYan Gao, Zheng Zeng, Xue Liu, P. R. Kumar. 520-524 [doi]
- SPECIAL: A strategy-proof and Efficient multi-channel Auction mechanism for wireless networksTianrong Zhang, Fan Wu, Chunming Qiao. 525-529 [doi]
- Load balance vs energy efficiency in traffic engineering: A game Theoretical PerspectiveYangming Zhao, Sheng Wang, Shizhong Xu, Xiong Wang, Xiujiao Gao, Chunming Qiao. 530-534 [doi]
- Evolutionary coalitional games for random access controlXin Luo, Hamidou Tembine. 535-539 [doi]
- Optimal pricing in stochastic scalable video coding multicasting systemChih-Yu Wang, Yan Chen, Hung-Yu Wei, K. J. Ray Liu. 540-544 [doi]
- Palette: Distributing tables in software-defined networksYossi Kanizo, David Hay, Isaac Keslassy. 545-549 [doi]
- NSFIB construction & aggregation with next hop of strict partial orderQing Li, Mingwei Xu, Meng Chen. 550-554 [doi]
- Modular architectures of optical multi-stage switching networksDario G. Garao, Guido Maier, Achille Pattavina. 555-559 [doi]
- Defeating heterogeneity in wireless multicast networksEugene Chai, Kang G. Shin, Sung-Ju Lee, Jeongkeun Lee, Raúl H. Etkin. 560-564 [doi]
- A spectrum-sharing rewarding framework for co-channel hybrid access femtocell networksChien-Han Chai, Yuan-Yao Shih, Ai-Chun Pang. 565-569 [doi]
- QoS satisfaction games for spectrum sharingRichard Southwell, Xu Chen, Jianwei Huang. 570-574 [doi]
- Polynomial-complexity, low-delay scheduling for SCFDMA-based wireless uplink networksShreeshankar Bodas, Bilal Sadiq. 575-579 [doi]
- When simplicity meets optimality: Efficient transmission power control with stochastic energy harvestingQingsi Wang, Mingyan Liu. 580-584 [doi]
- Prototyping energy harvesting active networked tags (EnHANTs)Maria Gorlatova, Robert Margolies, John Sarik, Gerald Stanje, Jianxun Zhu, Baradwaj Vigraham, Marcin Szczodrak, Luca P. Carloni, Peter R. Kinget, Ioannis Kymissis, Gil Zussman. 585-589 [doi]
- Impact of battery degradation on optimal management policies of harvesting-based wireless sensor devicesNicolò Michelusi, Leonardo Badia, Ruggero Carli, Luca Corradini, Michele Zorzi. 590-594 [doi]
- Bidirectional energy trading for residential load scheduling and electric vehiclesByung-Gook Kim, Shaolei Ren, Mihaela van der Schaar, Jang-Won Lee. 595-599 [doi]
- An upper bound on the convergence time for quantized consensusShang Shang, Paul W. Cuff, Pan Hui, Sanjeev R. Kulkarni. 600-604 [doi]
- Verifiable private multi-party computation: Ranging and rankingLan Zhang, Xiang-Yang Li, Yunhao Liu, Taeho Jung. 605-609 [doi]
- Proof-carrying cloud computation: The case of convex optimizationZhen Xu, Cong Wang, Qian Wang, Kui Ren, Lingyu Wang. 610-614 [doi]
- A contribution to analyzing and enhancing Darknet routingStefanie Roos, Thorsten Strufe. 615-619 [doi]
- Shadow-routing based dynamic algorithms for virtual machine placement in a network cloudYang Guo, Alexander L. Stolyar, Anwar Walid. 620-628 [doi]
- Dependable virtual machine allocationHiroki Yanagisawa, Takayuki Osogami, Rudy Raymond. 629-637 [doi]
- PACE: Policy-Aware Application Cloud EmbeddingLi Erran Li, Vahid Liaghat, Hongze Zhao, MohammadTaghi Hajiaghayi, Dan Li, Gordon T. Wilfong, Yang Richard Yang, Chuanxiong Guo. 638-646 [doi]
- Optimizing data access latencies in cloud systems by intelligent virtual machine placementMansoor Alicherry, T. V. Lakshman. 647-655 [doi]
- Reducing information gathering latency through Mobile Aerial Sensor NetworkZhaoquan Gu, Qiang-Sheng Hua, Yuexuan Wang, Francis C. M. Lau. 656-664 [doi]
- M-FAMA: A multi-session MAC protocol for reliable underwater acoustic streamsSeongwon Han, Youngtae Noh, Uichin Lee, Mario Gerla. 665-673 [doi]
- Environment aware connectivity for wireless underground sensor networksXin Dong, Mehmet Can Vuran. 674-682 [doi]
- Toward practical MAC design for underwater acoustic networksYibo Zhu, Zaihan Jiang, Zheng Peng, Michael Zuba, Jun-Hong Cui, Huifang Chen. 683-691 [doi]
- Network protection with guaranteed recovery times using recovery domainsGreg Kuperman, Eytan Modiano. 692-700 [doi]
- Bounded-reorder packet scheduling in optical cut-through switchZhemin Zhang, Zhiyang Guo, Yuanyuan Yang. 701-709 [doi]
- Shortest path versus multi-hub routing in networks with uncertain demandAlexandre Fréchette, F. Bruce Shepherd, Marina K. Thottan, Peter J. Winzer. 710-718 [doi]
- DISCERN: Cooperative whitespace scanning in practical environmentsTarun Bansal, Bo Chen, Prasun Sinha. 719-727 [doi]
- Understanding Blackholes in large-scale Cognitive Radio Networks under generic failuresLei Sun, Wenye Wang. 728-736 [doi]
- Scaling network-based spectrum analyzer with constant communication costYoungjune Gwon, H. T. Kung. 737-745 [doi]
- Alternate hop-and-wait channel rendezvous method for cognitive radio networksI-Hsun Chuang, Hsiao-Yun Wu, Kuan-Rong Lee, Yau-Hwang Kuo. 746-754 [doi]
- iDEAL: Incentivized dynamic cellular offloading via auctionsWei Dong, Swati Rallapalli, Rittwik Jana, Lili Qiu, K. K. Ramakrishnan, Leo Razoumov, Yin Zhang, Tae Won Cho. 755-763 [doi]
- Exploiting double opportunities for deadline based content propagation in wireless networksHan Cai, Irem Koprulu, Ness B. Shroff. 764-772 [doi]
- Using Poisson processes to model lattice cellular networksBartlomiej Blaszczyszyn, Mohamed Kadhem Karray, Holger Paul Keeler. 773-781 [doi]
- Cooperative cell outage detection in Self-Organizing femtocell networksWei Wang, Jin Zhang, Qian Zhang. 782-790 [doi]
- D2Taint: Differentiated and dynamic information flow tracking on smartphones for numerous data sourcesBoxuan Gu, Xinfeng Li, Gang Li, Adam C. Champion, Zhezhe Chen, Feng Qin, Dong Xuan. 791-799 [doi]
- Privacy-preserving spatiotemporal matchingJingchao Sun, Rui Zhang 0007, Yanchao Zhang. 800-808 [doi]
- NetworkProfiler: Towards automatic fingerprinting of Android appsShuaifu Dai, Alok Tongaonkar, Xiaoyin Wang, Antonio Nucci, Dawn Song. 809-817 [doi]
- An economic analysis of regulating security investments in the InternetM. H. R. Khouzani, Soumya Sen, Ness B. Shroff. 818-826 [doi]
- SPRING: A Strategy-proof and Privacy preserving spectrum auction mechanismQianyi Huang, Yixin Tao, Fan Wu. 827-835 [doi]
- Profit incentive in a secondary spectrum market: A contract design approachShang-Pin Sheng, Mingyan Liu. 836-844 [doi]
- On the nature of revenue-sharing contracts to incentivize spectrum-sharingRandall Berry, Michael L. Honig, Thanh Nguyen, Vijay G. Subramanian, Hang Zhou, Rakesh Vohra. 845-853 [doi]
- Joint request mapping and response routing for geo-distributed cloud servicesHong Xu, Baochun Li. 854-862 [doi]
- On the steady-state of cache networksElisha J. Rosensweig, Daniel Sadoc Menasché, Jim Kurose. 863-871 [doi]
- On arbitrating the power-performance tradeoff in SaaS cloudsZhi Zhou, Fangming Liu, Hai Jin, Bo Li 0001, Baochun Li, Hongbo Jiang. 872-880 [doi]
- Fast Mencius: Mencius with low commit latencyWei Wei, Harry Tian Gao, Fengyuan Xu, Qun Li. 881-889 [doi]
- An efficient protocol for RFID multigroup threshold-based classificationWen Luo, Yan Qiao, Shigang Chen. 890-898 [doi]
- An efficient tag search protocol in large-scale RFID systemsMin Chen, Wen Luo, Zhen Mo, Shigang Chen, Yuguang Fang. 899-907 [doi]
- ZOE: Fast cardinality estimation for large-scale RFID systemsYuanqing Zheng, Mo Li. 908-916 [doi]
- P-MTI: Physical-layer Missing Tag Identification via compressive sensingYuanqing Zheng, Mo Li. 917-925 [doi]
- Providing protection in multi-hop wireless networksGreg Kuperman, Eytan Modiano. 926-934 [doi]
- Router virtualization for improving IP-level resilienceJános Tapolcai, Gábor Rétvári. 935-943 [doi]
- Tunable QoS-aware network survivabilityJose Yallouz, Ariel Orda. 944-952 [doi]
- Maximizing social welfare in operator-based Cognitive Radio Networks under spectrum uncertainty and sensing inaccuracyShuang Li, Zizhan Zheng, Eylem Ekici, Ness B. Shroff. 953-961 [doi]
- Dynamic Chinese Restaurant Game in cognitive radio networksChunxiao Jiang, Yan Chen, Yu-Han Yang, Chih-Yu Wang, K. J. Ray Liu. 962-970 [doi]
- Cooperative multi-hop relaying via network formation games in cognitive radio networksWei Li, Xiuzhen Cheng, Tao Jing, Xiaoshuang Xing. 971-979 [doi]
- Energy-efficient cognitive heterogeneous networks powered by the smart gridShengrong Bu, F. Richard Yu, Yi Qian. 980-988 [doi]
- Optimization of HTTP adaptive streaming over mobile cellular networksDanny De Vleeschauwer, Harish Viswanathan, Andre Beck, Steven A. Benno, Gang Li, Raymond B. Miller. 989-997 [doi]
- RAT selection games in HetNetsEhsan Aryafar, Alireza Keshavarz-Haddad, Michael Wang, Mung Chiang. 998-1006 [doi]
- Location patterns of mobile users: A large-scale tudyAshwin Sridharan, Jean Bolot. 1007-1015 [doi]
- Network control without CSI using rateless codes for downlink cellular systemsYin Sun, Can Emre Koksal, Sung-Ju Lee, Ness B. Shroff. 1016-1024 [doi]
- Drifting Keys: Impersonation detection for constrained devicesKevin D. Bowers, Ari Juels, Ronald L. Rivest, Emily Shen. 1025-1033 [doi]
- SybilShield: An agent-aided social network-based Sybil defense among multiple communitiesLu Shi, Shucheng Yu, Wenjing Lou, Y. Thomas Hou. 1034-1042 [doi]
- Protocol-level hidden server discoveryZhen Ling, Junzhou Luo, Kui Wu, Xinwen Fu. 1043-1051 [doi]
- Cross-domain password-based authenticated key exchange revisitedLiqun Chen, Hoon Wei Lim, Guomin Yang. 1052-1060 [doi]
- Offering supplementary wireless technologies: Adoption behavior and offloading benefitsCarlee Joe-Wong, Soumya Sen, Sangtae Ha. 1061-1069 [doi]
- Economic analysis of 4G network upgradeLingjie Duan, Jianwei Huang, Jean C. Walrand. 1070-1078 [doi]
- Content-peering dynamics of autonomous caches in a content-centric networkValentino Pacifici, György Dán. 1079-1087 [doi]
- Optimal pricing for local and global WiFi marketsLingjie Duan, Jianwei Huang, Biying Shou. 1088-1096 [doi]
- Stochastic analysis of energy savings with sleep mode in OFDMA wireless networksDimitrios Tsilimantos, Jean-Marie Gorce, Eitan Altman. 1097-1105 [doi]
- Practical algorithm for power efficient DRX configuration in next generation mobilesR. M. Karthik, Arvind Chakrapani. 1106-1114 [doi]
- Competitive ratio analysis of online algorithms to minimize packet transmission time in energy harvesting communication systemRahul Vaze. 1115-1123 [doi]
- The case for re-configurable backhaul in cloud-RAN based small cell networksCheng Liu, Karthikeyan Sundaresan, Meilong Jiang, Sampath Rangarajan, Gee-Kung Chang. 1124-1132 [doi]
- Smoothing the energy consumption: Peak demand reduction in smart gridShaoJie Tang, Qiuyuan Huang, Xiang-Yang Li, Dapeng Wu. 1133-1141 [doi]
- Adaptive electricity scheduling in microgridsYingsong Huang, Shiwen Mao, R. M. Nelms. 1142-1150 [doi]
- A contract-based approach for ancillary services in V2G networks: Optimality and learningYang Gao 0006, Yan Chen, Chih-Yu Wang, K. J. Ray Liu. 1151-1159 [doi]
- Optimal budget deployment strategy against power grid interdictionXuan Liu, Kui Ren, Yanling Yuan, Zuyi Li, Qian Wang. 1160-1168 [doi]
- When target motion matters: Doppler coverage in radar sensor networksXiaowen Gong, Junshan Zhang, Douglas Cochran. 1169-1177 [doi]
- Adaptive approximation algorithms for hole healing in hybrid wireless sensor networksYilin Shen, Dung T. Nguyen, My T. Thai. 1178-1186 [doi]
- Approximations for Minimum Connected Sensor CoverLidong Wu, Hongwei Du, Weili Wu, Deying Li, Jing Lv, Wonjun Lee. 1187-1194 [doi]
- On wireless network coverage in bounded areasZuoming Yu, Jin Teng, Xinfeng Li, Dong Xuan. 1195-1203 [doi]
- A Benes packet networkLongbo Huang, Jean C. Walrand. 1204-1212 [doi]
- FIFA: Fast incremental FIB aggregationYaoqing Liu, Beichuan Zhang, Lan Wang. 1213-1221 [doi]
- A trie merging approach with incremental updates for virtual routersLayong Luo, Gaogang Xie, Kavé Salamatian, Steve Uhlig, Laurent Mathy, Yingke Xie. 1222-1230 [doi]
- Compressing forwarding tablesOri Rottenstreich, Marat Radan, Yuval Cassuto, Isaac Keslassy, Carmi Arad, Tal Mizrahi, Yoram Revah, Avinatan Hassidim. 1231-1239 [doi]
- Non-parametric passive traffic monitoring in cognitive radio networksQiben Yan, Ming Li, Feng Chen, Tingting Jiang, Wenjing Lou, Y. Thomas Hou, Chang-Tien Lu. 1240-1248 [doi]
- To stay or to switch: Multiuser dynamic channel accessYang Liu, Mingyan Liu. 1249-1257 [doi]
- Exploiting self-interference suppression for improved spectrum awareness/efficiency in cognitive radio systemsWessam Afifi, Marwan Krunz. 1258-1266 [doi]
- Leveraging load migration and basestaion consolidation for green communications in virtualized Cognitive Radio NetworksXiang-Sheng, Jian Tang, Chenfei Gao, Weiyi Zhang, Chonggang Wang. 1267-1275 [doi]
- An ensemble of replication and erasure codes for cloud file systemsYadi Ma, Thyaga Nandagopal, Krishna P. N. Puttaswamy, Suman Banerjee. 1276-1284 [doi]
- To offload or not to offload? The bandwidth and energy costs of mobile cloud computingMarco Valerio Barbera, Sokol Kosta, Alessandro Mei, Julinda Stefa. 1285-1293 [doi]
- RapidRAID: Pipelined erasure codes for fast data archival in distributed storage systemsLluis Pamies-Juarez, Anwitaman Datta, Frédérique E. Oggier. 1294-1302 [doi]
- NEST: Locality-aware approximate query service for cloud computingYu Hua, Bin Xiao, Xue Liu. 1303-1311 [doi]
- On the capacity of wireless CSMA/CA multihop networksRafael P. Laufer, Leonard Kleinrock. 1312-1320 [doi]
- On the throughput-delay trade-off in large-scale MANETs with a generalized i.i.d. mobility modelWang Liu, Kejie Lu, Jianping Wang, Yi Qian, Liusheng Huang, Jun Liu, Dapeng Oliver Wu. 1321-1329 [doi]
- On interference alignment for multi-hop MIMO networksHuacheng Zeng, Yi Shi, Y. Thomas Hou, Wenjing Lou, Sastry Kompella, Scott F. Midkiff. 1330-1338 [doi]
- Distributed approximation algorithms for maximum link scheduling and local broadcasting in the physical interference modelGuanhong Pei, Anil Kumar S. Vullikanti. 1339-1347 [doi]
- Cooperative packet recovery in enterprise WLANsMahanth Gowda, Souvik Sen, Romit Roy Choudhury, Sung-Ju Lee. 1348-1356 [doi]
- Selfish misbehavior detection in 802.11 based wireless networks: An adaptive approach based on Markov decision processJin Tang, Yu Cheng. 1357-1365 [doi]
- HoWiES: A holistic approach to ZigBee assisted WiFi energy savings in mobile devicesYifan Zhang, Qun Li. 1366-1374 [doi]
- WiFi-BA: Choosing arbitration over backoff in high speed multicarrier wireless networksPei Huang, Xi Yang, Li Xiao. 1375-1383 [doi]
- Fault tolerant complex event detection in WSNs: A case study in structural health monitoringXuefeng Liu, Jiannong Cao, ShaoJie Tang. 1384-1392 [doi]
- Dynamic switching-based reliable flooding in low-duty-cycle wireless sensor networksLong Cheng, Yu Gu 0001, Tian He, Jianwei Niu. 1393-1401 [doi]
- Optimal incentive-driven design of participatory sensing systemsIordanis Koutsopoulos. 1402-1410 [doi]
- Efficient 3G budget utilization in mobile participatory sensing applicationsHengchang Liu, Shaohan Hu, Wei Zheng, Zhiheng Xie, ShiGuang Wang, Pan Hui, Tarek F. Abdelzaher. 1411-1419 [doi]
- Pegasus: Precision hunting for icebergs and anomalies in network flowsSriharsha Gangam, Puneet Sharma, Sonia Fahmy. 1420-1428 [doi]
- Network utilization: The flow viewAvinatan Hassidim, Danny Raz, Michal Segalov, Ariel Shaqed. 1429-1437 [doi]
- nd order statisticsGerhard Haßlinger, Anne Schwahn, Franz Hartleb. 1438-1446 [doi]
- Near-optimal approximate membership query over time-decaying windowsYang Liu, Wenji Chen, Yong Guan. 1447-1455 [doi]
- Virtual backbone construction for cognitive radio networks without common control channelYing Dai, Jie Wu 0001, Chunsheng Xin. 1456-1464 [doi]
- Channel quality prediction based on Bayesian inference in cognitive radio networksXiaoshuang Xing, Tao Jing, Yan Huo, Hongjuan Li, Xiuzhen Cheng. 1465-1473 [doi]
- FMAC: A fair MAC protocol for coexisting cognitive radio networksYanxiao Zhao, Min Song, Chunsheng Xin. 1474-1482 [doi]
- Event-driven spectrum-aware clustering in cognitive radio sensor networksMustafa Ozger, Özgür B. Akan. 1483-1491 [doi]
- The constrained Ski-Rental problem and its application to online cloud cost optimizationAli Khanafer, Murali S. Kodialam, Krishna P. N. Puttaswamy. 1492-1500 [doi]
- An efficient distributed algorithm for resource allocation in large-scale coupled systemsDi Niu, Baochun Li. 1501-1509 [doi]
- A framework for truthful online auctions in cloud computing with heterogeneous user demandsHong Zhang, Bo Li, Hongbo Jiang, Fangming Liu, Athanasios V. Vasilakos, Jiangchuan Liu. 1510-1518 [doi]
- Resource pricing game in geo-distributed cloudsHeejun Roh, Cheoulhoon Jung, Wonjun Lee, Ding-Zhu Du. 1519-1527 [doi]
- Exploring the inefficiency and instability of Back-Pressure algorithmsBo Ji, Changhee Joo, Ness B. Shroff. 1528-1536 [doi]
- MaxWeight vs. BackPressure: Routing and scheduling in multi-channel relay networksSharayu Moharir, Sanjay Shakkottai. 1537-1545 [doi]
- An efficient DoF scheduling algorithm for multi-hop MIMO networksHuacheng Zeng, Yi Shi, Y. Thomas Hou, Wenjing Lou. 1546-1554 [doi]
- Diff-Max: Separation of routing and scheduling in backpressure-based wireless networksHulya Seferoglu, Eytan Modiano. 1555-1563 [doi]
- CUTS: Improving channel utilization in both time and spatial domains in WLANsHaochao Li, Kaishun Wu, Qian Zhang, Lionel M. Ni. 1564-1572 [doi]
- Distributed spectrum assignment for home WLANsJulien Herzen, Ruben Merz, Patrick Thiran. 1573-1581 [doi]
- Virtual MISO triggers in Wi-Fi-like networksOscar Bejarano, Edward W. Knightly. 1582-1590 [doi]
- Delay analysis and study of IEEE 802.11p based DSRC safety communication in a highway environmentYuan Yao, Lei Rao, Xue Liu, Xingshe Zhou. 1591-1599 [doi]
- A new analytical technique for designing provably efficient MapReduce schedulersYousi Zheng, Ness B. Shroff, Prasun Sinha. 1600-1608 [doi]
- Map task scheduling in MapReduce with data locality: Throughput and heavy-traffic optimalityWeina Wang, Kai Zhu, Lei Ying, Jian Tan, Li Zhang. 1609-1617 [doi]
- Coupling task progress for MapReduce resource-aware schedulingJian Tan, Xiaoqiao Meng, Li Zhang. 1618-1626 [doi]
- Improving ReduceTask data locality for sequential MapReduce jobsJian Tan, Shicong Meng, Xiaoqiao Meng, Li Zhang. 1627-1635 [doi]
- Bundling mobile base station and wireless energy transfer: Modeling and optimizationLiguang Xie, Yi Shi, Y. Thomas Hou, Wenjing Lou, Hanif D. Sherali, Scott F. Midkiff. 1636-1644 [doi]
- Application-aware data collection in Wireless Sensor NetworksXiaolin Fang, Hong Gao, Jianzhong Li, Yingshu Li. 1645-1653 [doi]
- Data loss and reconstruction in sensor networksLinghe Kong, Mingyuan Xia, Xiao-Yang Liu, Min-You Wu, Xue Liu. 1654-1662 [doi]
- ε-Approximation to data streams in sensor networksGuohua Li, Jianzhong Li, Hong Gao. 1663-1671 [doi]
- Inferring the periodicity in large-scale Internet measurementsOded Argon, Yuval Shavitt, Udi Weinsberg. 1672-1680 [doi]
- Evaluating anycast in the domain name systemXun Fan, John S. Heidemann, Ramesh Govindan. 1681-1689 [doi]
- Event detection using customer care callsYi-Chao Chen, Gene Moo Lee, Nick G. Duffield, Lili Qiu, Jia Wang. 1690-1698 [doi]
- Decentralizing network inference problems with Multiple-Description Fusion Estimation (MDFE)Mehdi Malboubi, Cuong Vu, Chen-Nee Chuah, Puneet Sharma. 1699-1707 [doi]
- Mobile Access of Wide-Spectrum Networks: Design, deployment and experimental evaluationAnastasios Giannoulis, Paul Patras, Edward W. Knightly. 1708-1716 [doi]
- Socially-optimal multi-hop secondary communication under arbitrary primary user mechanismsHongxing Li, Chuan Wu, Zongpeng Li, Francis C. M. Lau. 1717-1725 [doi]
- On optimal communication strategies for cooperative cognitive radio networkingBin Cao, Jon W. Mark, Qinyu Zhang, Rongxing Lu, Xiaodong Lin, Xuemin (Sherman) Shen. 1726-1734 [doi]
- Capacity scaling of cognitive networks: Beyond interference-limited communicationSang-Woon Jeon, Michael Gastpar. 1735-1743 [doi]
- Hybrid client-server and peer-to-peer caching systems with selfish peersYoungmi Jin, Yung Yi, George Kesidis, Fatih Kocak, Jinwoo Shin. 1744-1752 [doi]
- Can P2P networks be super-scalable?François Baccelli, Fabien Mathieu, Ilkka Norros, Rémi Varloot. 1753-1761 [doi]
- Unstructured P2P link lifetimes reduxZhongmei Yao, Daren B. H. Cline, Dmitri Loguinov. 1762-1770 [doi]
- Minimum-delay overlay multicastKianoosh Mokhtarian, Hans-Arno Jacobsen. 1771-1779 [doi]
- An optimized design of reconfigurable PSD accelerator for online shrew DDoS attacks detectionHao Chen, Yu Chen, Douglas H. Summerville, Zhou Su. 1780-1787 [doi]
- Cardinality change-based early detection of large-scale cyber-attacksWenji Chen, Yang Liu, Yong Guan. 1788-1796 [doi]
- A traceback attack on FreenetGuanyu Tian, Zhenhai Duan, Todd Baumeister, Yingfei Dong. 1797-1805 [doi]
- PPBD: A piracy preventing system for BT DHT networksHongli Zhang, Jiantao Shi, Lin Ye, Xiaojiang Du. 1806-1814 [doi]
- Content-centric wireless networks with limited buffers: When mobility hurtsGiuseppa Alfano, Michele Garetto, Emilio Leonardi. 1815-1823 [doi]
- Double Regression: Efficient spatially correlated path loss model for wireless network simulationSeon-Yeong Han, Nael B. Abu-Ghazaleh, Dongman Lee. 1824-1832 [doi]
- A (min, ×) network calculus for multi-hop fading channelsHussein Al-Zubaidy, Jörg Liebeherr, Almut Burchard. 1833-1841 [doi]
- Economic-robust transmission opportunity auction in multi-hop wireless networksMing Li, Pan Li, Miao Pan, Jinyuan Sun. 1842-1850 [doi]
- Capacity gain through power enhancement in multi-radio multi-channel wireless networksDevu Manikantan Shila, Yu Cheng. 1851-1859 [doi]
- GaS: A gateway scheduling-based handoff scheme in single-radio infrastructure wireless mesh networksHaopeng Li, Jiang Xie. 1860-1868 [doi]
- Comparison of routing metrics in 802.11n wireless mesh networksRamanujan K. Sheshadri, Dimitrios Koutsonikolas. 1869-1877 [doi]
- Trading off distortion for delay for video transmissions in wireless networksZi Feng, George Papageorgiou, Srikanth V. Krishnamurthy, Ramesh Govindan, Tom La Porta. 1878-1886 [doi]
- Scheduling jobs with unknown duration in cloudsSiva Theja Maguluri, R. Srikant. 1887-1895 [doi]
- FCD: Fast-concurrent-distributed load balancing under switching costs and imperfect observationsFurong Huang, Anima Anandkumar. 1896-1904 [doi]
- Optimal bounds for online page migration with generalized migration costsJohannes Schneider, Stefan Schmid. 1905-1913 [doi]
- Resource placement and assignment in distributed network topologiesYuval Rochman, Hanoch Levy, Eli Brosh. 1914-1922 [doi]
- Optimizing the collection of local decisions for time-constrained distributed detection in WSNsSeksan Laitrakun, Edward J. Coyle. 1923-1931 [doi]
- Mobile data gathering with Wireless Energy Replenishment in rechargeable sensor networksSongtao Guo, Cong Wang, Yuanyuan Yang. 1932-1940 [doi]
- Low-latency SINR-based data gathering in wireless sensor networksDawei Gong, Yuanyuan Yang. 1941-1949 [doi]
- A digital watermarking approach to secure and precise range query processing in sensor networksYeqing Yi, Rui Li, Fei Chen, Alex X. Liu, Yaping Lin. 1950-1958 [doi]
- Towards scalable network emulation: Channel accuracy versus implementation resourcesPengda Huang, Matthew Jordan Tonnemacher, Yongjiu Du, Dinesh Rajan, Joseph David Camp. 1959-1967 [doi]
- 2.5K-graphs: From sampling to generationMinas Gjoka, Maciej Kurant, Athina Markopoulou. 1968-1976 [doi]
- Maximizing submodular set function with connectivity constraint: Theory and application to networksTung-Wei Kuo, Kate Ching-Ju Lin, Ming-Jer Tsai. 1977-1985 [doi]
- Core-selecting combinatorial auction design for secondary spectrum marketsYuefei Zhu, Baochun Li, Zongpeng Li. 1986-1994 [doi]
- Hybrid pricing for TV white space databaseXiaojun Feng, Qian Zhang, Jin Zhang. 1995-2003 [doi]
- Balance of revenue and social welfare in FCC's spectrum allocationYanjiao Chen, Lingjie Duan, Jianwei Huang, Qian Zhang. 2004-2012 [doi]
- Groupon in the Air: A three-stage auction framework for Spectrum Group-buyingPeng Lin, Xiaojun Feng, Qian Zhang, Mounir Hamdi. 2013-2021 [doi]
- Combining supervised and unsupervised learning for zero-day malware detectionPrakash Mandayam Comar, Lei Liu, Sabyasachi Saha, Pang-Ning Tan, Antonio Nucci. 2022-2030 [doi]
- Turbo covert channel: An iterative framework for covert communication over data networksSeyed Ali Ahmadzadeh, Gordon B. Agnew. 2031-2039 [doi]
- A difference resolution approach to compressing Access Control ListsJames Daly, Alex X. Liu, Eric Torng. 2040-2048 [doi]
- On finding an optimal TCAM encoding scheme for packet classificationOri Rottenstreich, Isaac Keslassy, Avinatan Hassidim, Haim Kaplan, Ely Porat. 2049-2057 [doi]
- Wakeup scheduling for energy-efficient communication in opportunistic mobile networksWei Gao, Qinghua Li. 2058-2066 [doi]
- Providing probabilistic guarantees on the time of information spread in opportunistic networksYoora Kim, Kyunghan Lee, Ness B. Shroff, Injong Rhee. 2067-2075 [doi]
- Characterizing link connectivity for opportunistic mobile networking: Does mobility suffice?Chul-Ho Lee, Jaewook Kwak, Do Young Eun. 2076-2084 [doi]
- TOUR: Time-sensitive Opportunistic Utility-based Routing in delay tolerant networksMingjun Xiao, Jie Wu 0001, Cong Liu, Liusheng Huang. 2085-2091 [doi]
- Distributed CSMA with pairwise codingNathaniel M. Jones, Brooke Shrader, Eytan Modiano. 2094-2102 [doi]
- Distributed cross-layer optimization in wireless networks: A second-order approachJia Liu, Cathy H. Xia, Ness B. Shroff, Hanif D. Sherali. 2103-2111 [doi]
- Wireless scheduling for network utility maximization with optimal convergence speedBin Li, Atilla Eryilmaz, Ruogu Li. 2112-2120 [doi]
- Scalable algorithms for wireless link schedulings in multi-channel multi-radio wireless networksPeng-Jun Wan, Xiaohua Jia, Guojun Dai, Hongwei Du, Zhiguo Wan, Ophir Frieder. 2121-2129 [doi]
- On the impact of packet spraying in data center networksAdvait Abhay Dixit, Pawan Prakash, Y. Charlie Hu, Ramana Rao Kompella. 2130-2138 [doi]
- A cooperative game based allocation for sharing data center networksJian Guo, Fangming Liu, Dan Zeng, John C. S. Lui, Hai Jin. 2139-2147 [doi]
- Intra-data-center traffic engineering with ensemble routingZiyu Shao, Xin Jin, Wenjie Jiang, Minghua Chen, Mung Chiang. 2148-2156 [doi]
- Minimizing flow completion times in data centersAli Munir, Ihsan Ayyub Qazi, Zartash Afzal Uzmi, Aisha Mushtaq, Saad N. Ismail, M. Safdar Iqbal, Basma Khan. 2157-2165 [doi]
- Topology dependent space filling curves for sensor networks and applicationsXiaomeng Ban, Mayank Goswami, Wei Zeng, Xianfeng Gu, Jie Gao. 2166-2174 [doi]
- SINUS: A scalable and distributed routing algorithm with guaranteed delivery for WSNs on high genus 3D surfacesTianlong Yu, Hongbo Jiang, Guang Tan, Chonggang Wang, Chen Tian, Yu Wu. 2175-2183 [doi]
- A localized backbone renovating algorithm for wireless ad hoc and sensor networksKai Xing, Shuo Zhang, Lei Shi, Haojin Zhu, Yuepeng Wang. 2184-2192 [doi]
- Reactive planar spanner construction in wireless ad hoc and sensor networksMarkus Benter, Florentin Neumann, Hannes Frey. 2193-2201 [doi]
- Endhost-based shortest path routing in dynamic networks: An online learning approachTing He, Dennis Goeckel, Ramya Raghavendra, Don Towsley. 2202-2210 [doi]
- Traffic engineering in software defined networksSugam Agarwal, Murali S. Kodialam, T. V. Lakshman. 2211-2219 [doi]
- When the cure is worse than the disease: The impact of graceful IGP operations on BGPLaurent Vanbever, Stefano Vissicchio, Luca Cittadini, Olivier Bonaventure. 2220-2228 [doi]
- Did you also hear that? Spectrum sensing using Hermitian inner productJerry T. Chiang, Yih-Chun Hu. 2229-2237 [doi]
- Performance bounds of energy detection with signal uncertainty in cognitive radio networksShimin Gong, Ping Wang, Wei Liu, Weihua Zhuang. 2238-2246 [doi]
- QuickSense: Fast and energy-efficient channel sensing for dynamic spectrum access networksSungro Yoon, Li Erran Li, Soung Chang Liew, Romit Roy Choudhury, Injong Rhee, Kun Tan. 2247-2255 [doi]
- Scheduling of sequential periodic sensing for cognitive radiosQiang Liu, Xin Wang, Yong Cui. 2256-2264 [doi]
- Exchanging pairwise secrets efficientlyIris Safaka, Christina Fragouli, Katerina J. Argyraki, Suhas N. Diggavi. 2265-2273 [doi]
- OPFKA: Secure and efficient Ordered-Physiological-Feature-based key agreement for wireless Body Area NetworksChunqiang Hu, Xiuzhen Cheng, Fan Zhang, Dengyuan Wu, Xiaofeng Liao, Dechang Chen. 2274-2282 [doi]
- Extracting secret key from wireless link dynamics in vehicular environmentsXiaojun Zhu, Fengyuan Xu, Edmund Novak, Chiu Chiang Tan, Qun Li, Guihai Chen. 2283-2291 [doi]
- Fast secret key generation in static wireless networks: A virtual channel approachPengfei Huang, Xudong Wang. 2292-2300 [doi]
- A privacy-preserving social-assisted mobile content dissemination scheme in DTNsLinke Guo, Chi Zhang, Hao Yue, Yuguang Fang. 2301-2309 [doi]
- Self-Interest-Driven incentives for ad dissemination in autonomous mobile social networksTing Ning, Zhipeng Yang, Hongyi Wu, Zhu Han. 2310-2318 [doi]
- Homing spread: Community home-based multi-copy routing in mobile social networksJie Wu 0001, Mingjun Xiao, Liusheng Huang. 2319-2327 [doi]
- Wi-Fi sensing: Should mobiles sleep longer as they age?Jaeseong Jeong, Yung Yi, Jeong-woo Cho, Do Young Eun, Song Chong. 2328-2336 [doi]
- Wireless network coding with partial overhearing informationGeorgios S. Paschos, Constantinos Fragiadakis, Leonidas Georgiadis, Leandros Tassiulas. 2337-2345 [doi]
- Cooperative pipelined regeneration in distributed storage systemsJun Li 0017, Xin Wang, Baochun Li. 2346-2354 [doi]
- Analysis and construction of functional regenerating codes with uncoded repair for distributed storage systemsYuchong Hu, Patrick P. C. Lee, Kenneth W. Shum. 2355-2363 [doi]
- A graph minor perspective to network coding: Connecting algebraic coding with network topologiesXunrui Yin, Yan Wang, Xin Wang, Xiangyang Xue, Zongpeng Li. 2364-2372 [doi]
- How to Optimally allocate your budget of attention in social networksBo Jiang, Nidhi Hegde, Laurent Massoulié, Don Towsley. 2373-2381 [doi]
- Enterprise social network analysis and modeling: A tale of two graphsJin Cao, Hongyu Gao, Li Erran Li, Brian D. Friedman. 2382-2390 [doi]
- A genealogy of information spreading on microblogs: A Galton-Watson-based explicative modelDong Wang, Hosung Park, Gaogang Xie, Sue B. Moon, Mohamed Ali Kâafar, Kavé Salamatian. 2391-2399 [doi]
- VoteTrust: Leveraging friend invitation graph to defend against social network SybilsJilong Xue, Zhi Yang, Xiaoyong Yang, Xiao Wang, Lijiang Chen, Yafei Dai. 2400-2408 [doi]
- Compact conformal map for greedy routing in wireless mobile sensor networksSiMing Li, Wei Zeng, Dengpan Zhou, Xianfeng David Gu, Jie Gao. 2409-2417 [doi]
- On the security vulnerabilities of the virtual force approach to mobile sensor deploymentNovella Bartolini, Gian Carlo Bongiovanni, Tom La Porta, Simone Silvestri. 2418-2426 [doi]
- Efficient distributed multiple-message broadcasting in unstructured wireless networksDongxiao Yu, Qiang-Sheng Hua, Yuexuan Wang, Jiguo Yu, Francis C. M. Lau. 2427-2435 [doi]
- ERCD: An energy-efficient clone detection protocol in WSNsZhongming Zheng, Anfeng Liu, Lin X. Cai, Zhigang Chen, Xuemin (Sherman) Shen. 2436-2444 [doi]
- Capacity provisioning for schedulers with tiny buffersYashar Ghiassi-Farrokhfal, Jörg Liebeherr. 2445-2453 [doi]
- Delay optimal policies offer very little privacySachin Kadloor, Negar Kiyavash. 2454-2462 [doi]
- Online packet scheduling with hard deadlines in multihop communication networksZhoujia Mao, Can Emre Koksal, Ness B. Shroff. 2463-2471 [doi]
- To send or not to send: Reducing the cost of data transmissionLeana Golubchik, Samir Khuller, Koyel Mukherjee, Yuan Yao. 2472-2478 [doi]
- FreeLoc: Calibration-free crowdsourced indoor localizationSungwon Yang, Pralav Dessai, Mansi Verma, Mario Gerla. 2481-2489 [doi]
- Theory underlying measurement of AOA with a rotating directional antennaYinjie Chen, Zhongli Liu, Xinwen Fu, Benyuan Liu, Wei Zhao. 2490-2498 [doi]
- Beyond convex relaxation: A polynomial-time non-convex optimization approach to network localizationSenshan Ji, Kam-Fung Sze, Zirui Zhou, Anthony Man-Cho So, Yinyu Ye. 2499-2507 [doi]
- APT: Accurate outdoor pedestrian tracking with smartphonesXiaojun Zhu, Qun Li, Guihai Chen. 2508-2516 [doi]
- ARTSense: Anonymous reputation and trust in participatory sensingXinlei Oscar Wang, Wei Cheng, Prasant Mohapatra, Tarek F. Abdelzaher. 2517-2525 [doi]
- Secure crowdsourcing-based cooperative pectrum sensingRui Zhang 0007, Jinxue Zhang, Yanchao Zhang, Chi Zhang. 2526-2534 [doi]
- YouSense: Mitigating entropy selfishness in distributed collaborative spectrum sensingShuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan, Kai Xing. 2535-2543 [doi]
- Rejecting the attack: Source authentication for Wi-Fi management frames using CSI InformationZhiping Jiang, Jizhong Zhao, Xiang-Yang Li, Jinsong Han, Wei Xi. 2544-2552 [doi]
- Horizon on the move: Geocast in intermittently connected vehicular ad hoc networksYujin Li, Wenye Wang. 2553-2561 [doi]
- Integrity-oriented content transmission in highway vehicular ad hoc networksTom H. Luan, Xuemin (Sherman) Shen, Fan Bai. 2562-2570 [doi]
- On-road ads delivery scheduling and bandwidth allocation in vehicular CPSXu Li, Chunming Qiao, Yunfei Hou, Yunjie Zhao, Aditya Wagh, Adel W. Sadek, Liusheng Huang, Hongli Xu. 2571-2579 [doi]
- CCR: Capacity-constrained replication for data delivery in vehicular networksYuchen Wu, Yanmin Zhu, Hongzi Zhu, Bo Li 0001. 2580-2588 [doi]
- Performance of low-complexity greedy scheduling policies in multi-channel wireless networks: Optimal throughput and near-optimal delayBo Ji, Gagan Raj Gupta, Xiaojun Lin, Ness B. Shroff. 2589-2597 [doi]
- Improving the delay performance of CSMA algorithms: A Virtual Multi-Channel approachPo-Kai Huang, Xiaojun Lin. 2598-2606 [doi]
- Channel assignment in dense MC-MR wireless networks: Scaling laws and algorithmsRahul Urgaonkar, Ram Ramanathan, Jason Redi, William N. Tetteh. 2607-2615 [doi]
- Throughput-optimal wireless scheduling with regulated inter-service timesRuogu Li, Atilla Eryilmaz, Bin Li. 2616-2624 [doi]
- Privacy preserving cloud data access with multi-authoritiesTaeho Jung, Xiang-Yang Li, Zhiguo Wan, Meng Wan. 2625-2633 [doi]
- Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluationTaeho Jung, Xufei Mao, Xiang-Yang Li, ShaoJie Tang, Wei Gong, Lan Zhang. 2634-2642 [doi]
- Prometheus: Privacy-aware data retrieval on hybrid cloudZhigang Zhou, Hongli Zhang, Xiaojiang Du, Panpan Li, Xiang-Zhan Yu. 2643-2651 [doi]
- Efficient privacy-preserving biometric identification in cloud computingJiawei Yuan, Shucheng Yu. 2652-2660 [doi]
- PSR: Practical synchronous rendezvous in low-duty-cycle wireless networksHao Huang, Jihoon Yun, Ziguo Zhong, Song Min Kim, Tian He. 2661-2669 [doi]
- 2C: A holistic approach to prolong the sensor network lifetimeYang Peng, Zi Li, Daji Qiao, Wensheng Zhang. 2670-2678 [doi]
- Measurement and analysis on the packet delivery performance in a large scale sensor networkWei Dong, Yunhao Liu, Yuan He, Tong Zhu. 2679-2687 [doi]
- Link Scanner: Faulty link detection for wireless sensor networksQiang Ma, Kebin Liu, Xiangrong Xiao, Zhichao Cao, Yunhao Liu. 2688-2696 [doi]
- Capacity of P2P on-demand streaming with simple, robust and decentralized controlCan Zhao, Jian Zhao, Xiaojun Lin, Chuan Wu. 2697-2705 [doi]
- Optimizing stored video delivery for mobile networks: The value of knowing the futureZheng Lu, Gustavo de Veciana. 2706-2714 [doi]
- Impact of flow-level dynamics on QoE of video streaming in wireless networksYuedong Xu, Salah-Eddine Elayoubi, Eitan Altman, Rachid El Azouzi. 2715-2723 [doi]
- How much can large-scale Video-on-Demand benefit from users' cooperation?Delia Ciullo, Valentina Martina, Michele Garetto, Emilio Leonardi. 2724-2732 [doi]
- WheelLoc: Enabling continuous location service on mobile phone for outdoor scenariosHe Wang, Zhiyang Wang, Guobin Shen, Fan Li, Song Han, Feng Zhao. 2733-2741 [doi]
- Extend your journey: Introducing signal strength into location-based applicationsChih-Chuan Cheng, Pi-Cheng Hsiu. 2742-2750 [doi]
- Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasuresZhaoyu Gao, Haojin Zhu, Yao Liu, Muyuan Li, Zhenfu Cao. 2751-2759 [doi]
- Search me if you can: Privacy-preserving location query serviceXiang-Yang Li, Taeho Jung. 2760-2768 [doi]
- Characterizing privacy leakage of public WiFi networks for users on travelNingning Cheng, Xinlei Oscar Wang, Wei Cheng, Prasant Mohapatra, Aruna Seneviratne. 2769-2777 [doi]
- Analysis on perfect location spoofing attacks using beamformingTing Wang, Yaling Yang. 2778-2786 [doi]
- Countering selfish misbehavior in multi-channel MAC protocolsYan Zhang, Loukas Lazos. 2787-2795 [doi]
- Secrecy capacity maximization for secure cooperative ad-hoc networksBiao Han, Jie Li. 2796-2804 [doi]
- A performance analysis of CSMA based broadcast protocol in VANETsNguyen Tien Viet, François Baccelli, Kai Zhu, Sundar Subramanian, Xinzhou Wu. 2805-2813 [doi]
- Connectivity in two-dimensional lattice networksLei Zhang, Lin Cai, Jianping Pan. 2814-2822 [doi]
- Compressive sensing based monitoring with vehicular networksHongjian Wang, Yanmin Zhu, Qian Zhang. 2823-2831 [doi]
- ZOOM: Scaling the mobility for fast opportunistic forwarding in vehicular networksHongzi Zhu, Mianxiong Dong, Shan Chang, Yanmin Zhu, Minglu Li, Xuemin (Sherman) Shen. 2832-2840 [doi]
- Interference coordination in wireless networks: A flow-level perspectiveRichard Combes, Zwi Altman, Eitan Altman. 2841-2849 [doi]
- Streaming codes for channels with burst and isolated erasuresAhmed Badr, Ashish Khisti, Wai-tian Tan, John G. Apostolopoulos. 2850-2858 [doi]
- CEDAR: An optimal and distributed strategy for packet recovery in wireless networksChenxi Qiu, Haiying Shen, Sohraab Soltani, Karan Sapra, Hao Jiang, Jason O. Hallstrom. 2859-2867 [doi]
- Stability analyses of static greedy link schedulings in MC-MR wireless networksPeng-Jun Wan, Zhiguo Wan, Zhu Wang, XiaoHua Xu, ShaoJie Tang, Xiaohua Jia. 2868-2876 [doi]
- Protecting cloud data using dynamic inline fingerprint checksFang Hao, Murali S. Kodialam, T. V. Lakshman, Krishna P. N. Puttaswamy. 2877-2885 [doi]
- Outsourcing privacy-preserving social networks to a cloudGuojun Wang, Qin Liu, Feng Li, Shuhui Yang, Jie Wu 0001. 2886-2894 [doi]
- DAC-MACS: Effective data access control for multi-authority cloud storage systemsKan Yang, Xiaohua Jia, Kui Ren, Bo Zhang. 2895-2903 [doi]
- Public auditing for shared data with efficient user revocation in the cloudBoyang Wang, Baochun Li, Hui Li. 2904-2912 [doi]
- RaSMaLai: A Randomized Switching algorithm for Maximizing Lifetime in tree-based wireless sensor networksSk. Kajal Arefin Imon, Adnan Khan, Mario Di Francesco, Sajal K. Das. 2913-2921 [doi]
- Minimizing charging delay in wireless rechargeable sensor networksLingkun Fu, Peng Cheng, Yu Gu 0001, Jiming Chen, Tian He. 2922-2930 [doi]
- Energy efficient neighborhood maintenance and medium access with Wake on IdleMaria Isabel Vergara Gallego, Franck Rousseau. 2931-2939 [doi]
- ZiFind: Exploiting cross-technology interference signatures for energy-efficient indoor localizationYuhang Gao, Jianwei Niu, Ruogu Zhou, Guoliang Xing. 2940-2948 [doi]
- Receiver-based flow control for networks in overloadChih-Ping Li, Eytan Modiano. 2949-2957 [doi]
- Does it hurt when others prosper?: Exploring the impact of heterogeneous reordering robustness of TCPChengdi Lai, Ka-Cheong Leung, Victor O. K. Li. 2958-2966 [doi]
- Low-latency and high bandwidth TCP/IP protocol processing through an integrated HW/SW approachKen Inoue, Davide Pasetto, Karol Lynch, Massimiliano Meneghin, Kay Müller, John Sheehan. 2967-2975 [doi]
- When heavy-tailed and light-tailed flows compete: The response time tail under generalized max-weight schedulingJayakrishnan Nair, Krishna Jagannathan, Adam Wierman. 2976-2984 [doi]
- A game-theoretic approach for achieving k-anonymity in Location Based ServicesXinxin Liu, Kaikai Liu, Linke Guo, Xiaolin Li 0001, Yuguang Fang. 2985-2993 [doi]
- Truthful incentive mechanisms for k-anonymity location privacyDejun Yang, Xi Fang, Guoliang Xue. 2994-3002 [doi]
- Checking in without worries: Location privacy in location based social networksXinxin Zhao, Lingjun Li, Guoliang Xue. 3003-3011 [doi]
- n-CD: A geometric approach to preserving location privacy in location-based servicesMing Li, Sergio Salinas, Arun Thapa, Pan Li. 3012-3020 [doi]
- Is random walk truly memoryless - Traffic analysis and source location privacy under random walksRui Shi, Mayank Goswami, Jie Gao, Xianfeng Gu. 3021-3029 [doi]
- PIPAC: Patient infusion pattern based access control scheme for wireless insulin pump systemXiali Hei, Xiaojiang Du, Shan Lin, Insup Lee. 3030-3038 [doi]
- Mutual privacy-preserving regression modeling in participatory sensingKai Xing, Zhiguo Wan, Pengfei Hu, Haojin Zhu, Yuepeng Wang, Xi Chen, Yang Wang 0015, Liusheng Huang. 3039-3047 [doi]
- Fast and practical secret key extraction by exploiting channel responseHongbo Liu, Yang Wang, Jie Yang 0003, Yingying Chen. 3048-3056 [doi]
- Towards omnidirectional passive human detectionZimu Zhou, Zheng Yang, Chenshu Wu, Longfei Shangguan, Yunhao Liu. 3057-3065 [doi]
- OTrack: Order tracking for luggage in mobile RFID systemsLongfei Shangguan, Zhenjiang Li, Zheng Yang, Mo Li, Yunhao Liu. 3066-3074 [doi]
- RSS-Ratio for enhancing performance of RSS-based applicationsWei Cheng, Kefeng Tan, Victor Omwando, Jindan Zhu, Prasant Mohapatra. 3075-3083 [doi]
- O(ε)-Approximation to physical world by sensor networksSiyao Cheng, Jianzhong Li, Zhipeng Cai. 3084-3092 [doi]
- Gap Sense: Lightweight coordination of heterogeneous wireless devicesXinyu Zhang, Kang G. Shin. 3094-3101 [doi]
- Predicting length of stay at WiFi hotspotsJustin Manweiler, Naveen Santhapuri, Romit Roy Choudhury, Srihari Nelakuditi. 3102-3110 [doi]
- Approximate online learning for passive monitoring of multi-channel wireless networksRong Zheng, Thanh Le, Zhu Han. 3111-3119 [doi]
- Optimal dynamic power control for full-duplex bidirectional-channel based wireless networksWenchi Cheng, Xi Zhang, Hailin Zhang. 3120-3128 [doi]
- Modeling and characterization of vehicular density at scaleGautam S. Thakur, Pan Hui, Ahmed Helmy. 3129-3134 [doi]
- On the usage patterns of multimodal communication: Countries and evolutionYi Wang 0010, Michalis Faloutsos, Hui Zang. 3135-3140 [doi]
- DHT-based traffic localization in the wildMatteo Varvello, Moritz Steiner. 3141-3146 [doi]
- Check-Repeat: A new method of measuring DNSSEC validating resolversYingdi Yu, Duane Wessels, Matt Larson, Lixia Zhang 0001. 3147-3152 [doi]
- Modeling DNS agility with DNSMapAndreas Berger, Wilfried N. Gansterer. 3153-3158 [doi]
- Trapping botnets by DNS failure graphs: Validation, extension and application to a 3G networkArian Bär, Antonio Paciello, Peter Romirer-Maierhofer. 3159-3164 [doi]
- Robust QoS-guaranteed network engineering in interference-aware wireless networksAli Tizghadam, Ali Shariat, Alberto Leon-Garcia, Hassan Naser. 3165-3170 [doi]
- The twofold nature of autonomous systems: Evidence combining stock market data with topological propertiesSimone Mainardi, Enrico Gregori, Luciano Lenzini. 3171-3176 [doi]
- Sustainable energy consumption monitoring in residential settingsS. N. Akshay Uttama Nambi, Thanasis G. Papaioannou, Dipanjan Chakraborty 0001, Karl Aberer. 3177-3182 [doi]
- Real time market models and prosumer profilingUgo Montanari, Alain Tcheukam Siwe. 3183-3188 [doi]
- Pricing for demand shaping and proactive download in smart data networksJohn Tadrous, Atilla Eryilmaz, Hesham El Gamal. 3189-3194 [doi]
- SpeedGate: A smart data pricing testbed based on speed tiersYih-Farn Robin Chen, Rittwik Jana. 3195-3200 [doi]
- On the interaction between content-oriented traffic scheduling and revenue sharing among providersHyojung Lee, Hyeryung Jang, Yung Yi, Jeong-woo Cho. 3201-3206 [doi]
- On the CDN pricing gameYang Song, Arun Venkataramani, Lixin Gao. 3207-3212 [doi]
- Economic models of sponsored content in wireless networks with uncertain demandMatthew Andrews, Ulas Özen, Martin I. Reiman, Qiong Wang. 3213-3218 [doi]
- Real-time welfare-maximizing regulation allocation in aggregator-EVs systemsSun Sun, Min Dong, Ben Liang. 3219-3224 [doi]
- A cross-layer perspective on energy harvesting aided green communications over fading channelsTian Zhang, Wei Chen, Zhu Han, Zhigang Cao. 3225-3230 [doi]
- Cost-aware optimization models for communication networks with renewable energy sourcesGiulio Betti, Edoardo Amaldi, Antonio Capone, Giulia Ercolani. 3231-3236 [doi]
- DRAGO: Detecting, quantifying and locating hidden routers in Traceroute IP pathsPietro Marchetta, Antonio Pescapè. 3237-3242 [doi]
- The BGP visibility scannerAndra Lutu, Marcelo Bagnulo, Olaf Maennel. 3243-3248 [doi]
- Improving the discovery of IXP peering links through passive BGP measurementsVasileios Giotsas, Shi Zhou. 3249-3254 [doi]
- Emergence of equilibria from individual strategies in online content diffusionEitan Altman, Francesco De Pellegrini, Rachid El Azouzi, Daniele Miorandi, Tania Jiménez. 3255-3260 [doi]
- Information diffusion in heterogeneous networks: The configuration model approachPavlos Sermpezis, Thrasyvoulos Spyropoulos. 3261-3266 [doi]
- On the impact of global information on diffusion of innovations over social networksYoungmi Jin, Jungseul Ok, Yung Yi, Jinwoo Shin. 3267-3272 [doi]
- Surviving in a competitive market of information providersKonstantinos Poularakis, Leandros Tassiulas. 3273-3278 [doi]
- New generation satellite broadband Internet services: Should ADSL and 3G worry?Alessio Botta, Antonio Pescapè. 3279-3284 [doi]
- Troubleshooting slow webpage downloadsHeng Cui, Ernst Biersack. 3285-3290 [doi]
- Fighting the bufferbloat: On the coexistence of AQM and low priority congestion controlYiXi Gong, Dario Rossi, Claudio Testa, Silvio Valenti, M. Dave Taht. 3291-3296 [doi]
- To the Moon and back: Are Internet bufferbloat delays really that large?Chiara Chirichella, Dario Rossi. 3297-3302 [doi]
- Economics of mobile data offloadingLin Gao, George Iosifidis, Jianwei Huang, Leandros Tassiulas. 3303-3308 [doi]
- Economics of WiFi offloading: Trading delay for cellular capacityJoohyun Lee, Yung Yi, Song Chong, Youngmi Jin. 3309-3314 [doi]
- Tiered billing scheme for residential load scheduling with bidirectional energy tradingByung-Gook Kim, Shaolei Ren, Mihaela van der Schaar, Jang-Won Lee. 3315-3320 [doi]
- Pricing algorithms for the day-ahead electricity market with flexible consumer participationOzgur Dalkilic, Ozan Candogan, Atilla Eryilmaz. 3321-3326 [doi]
- Smart data pricing: Lessons from trial planningMing-Jye Sheng, Carlee Joe-Wong, Sangtae Ha, Felix Ming Fai Wong, Soumya Sen. 3327-3332 [doi]
- AliasCluster: A lightweight approach to interface disambiguationLarissa Spinelli, Mark Crovella, Brian Eriksson. 3333-3338 [doi]
- Applying software-defined networking to the telecom domainGeorg Hampel, Moritz Steiner, Tian Bu. 3339-3344 [doi]
- 1 - Hypergraph-based network layer indirectionYan Shvartzshnaider, Maximilian Ott, Olivier Mehani, Guillaume Jourjon, Thierry Rakotoarivelo, David Levy. 3345-3350 [doi]
- COBRA: A framework for the analysis of realistic mobility modelsGautam S. Thakur, Ahmed Helmy. 3351-3356 [doi]
- Exploring venue popularity in FoursquareYanhua Li, Moritz Steiner, Limin Wang, Zhi-Li Zhang, Jie Bao. 3357-3362 [doi]
- Inferring cellular user demographic information using homophily on call graphsYi Wang 0010, Hui Zang, Michalis Faloutsos. 3363-3368 [doi]
- The strength of vicinity annexation in opportunistic networkingTiphaine Phe-Neau, Marcelo Dias de Amorim, Vania Conan. 3369-3374 [doi]
- Finding critical regions in a networkStojan Trajanovski, Fernando A. Kuipers, Piet Van Mieghem. 3375-3380 [doi]
- Self-learning classifier for Internet trafficLuigi Grimaudo, Marco Mellia, Elena Baralis, Ram Keralapura. 3381-3386 [doi]
- Rogue femtocell owners: How Mallory can monitor my devicesDavid Malone, Darren F. Kavanagh, Niall Richard Murphy. 3387-3392 [doi]
- Botnet detection revisited: Theory and practice of finding malicious P2P networks via Internet connection graphsStefan Ruehrup, Pierfrancesco Urbano, Andreas Berger, Alessandro D'Alconzo. 3393-3398 [doi]
- 10 Gbit line rate packet-to-disk using n2diskLuca Deri, Alfredo Cardigliano, Francesco Fusco. 3399-3404 [doi]
- Advanced metering and demand response communication performance in Zigbee based HANsVelin Kounev, David Tipper. 3405-3410 [doi]
- Elderberry: A peer-to-peer, privacy-aware smart metering protocolSören Finster, Ingmar Baumgart. 3411-3416 [doi]
- Performance evaluation of time-critical communication networks for smart grids based on IEC 61850Hanno Georg, Nils Dorsch, Markus Putzke, Christian Wietfeld. 3417-3422 [doi]
- A novel method to detect bad data injection attack in smart gridTing Liu, Yun Gu, Dai Wang, Yuhong Gui, Xiaohong Guan. 3423-3428 [doi]
- Robust privacy-preserving authentication scheme for communication between electric vehicle as power energy storage and power stationsHasen Nicanfar, Seyedali Hosseininezhad, Peyman TalebiFard, Victor C. M. Leung. 3429-3434 [doi]
- A reverse transmission mechanism for surveillance network in smart gridLiang Tang, Yun Rui, Qian Wang, Husheng Li, Zhiyong Bu. 3435-3440 [doi]
- Network emulation testbed for DTN applications and protocolsRazvan Beuran, Shinsuke Miwa, Yoichi Shinoda. 3441-3446 [doi]
- Trade-off analysis of multi topology routing based IP fast reroute mechanismsSelcuk Cevher, Mustafa Ulutas, Ibrahim Hökelek. 3447-3452 [doi]
- Detecting encrypted botnet trafficHan Zhang, Christos Papadopoulos, Daniel Massey. 3453-1358 [doi]
- Ego networks in Twitter: An experimental analysisValerio Arnaboldi, Marco Conti, Andrea Passarella, Fabio Pezzoni. 3459-3464 [doi]
- Analysis and applications of smartphone user mobilitySwati Rallapalli, Wei Dong, Gene Moo Lee, Yi-Chao Chen, Lili Qiu. 3465-3470 [doi]
- Gaining insight into AS-level outages through analysis of Internet background radiationKaryn Benson, Alberto Dainotti, kc claffy, Emile Aben. 3471-3476 [doi]
- SpamTracer: How stealthy are spammers?Pierre-Antoine Vervier, Olivier Thonnard. 3477-3482 [doi]
- Improving AS relationship inference using PoPsLior Neudorfer, Yuval Shavitt, Noa Zilberman. 3483-3488 [doi]