Abstract is missing.
- Sustainable energy consumption monitoring in residential settingsS. N. Akshay Uttama Nambi, Thanasis G. Papaioannou, Dipanjan Chakraborty 0001, Karl Aberer. 1-6 [doi]
- Real time market models and prosumer profilingUgo Montanari, Alain Tcheukam Siwe. 7-12 [doi]
- Real-time welfare-maximizing regulation allocation in aggregator-EVs systemsSun Sun, Min Dong, Ben Liang. 13-18 [doi]
- A cross-layer perspective on energy harvesting aided green communications over fading channelsTian Zhang, Wei Chen, Zhu Han, Zhigang Cao. 19-24 [doi]
- Cost-aware optimization models for communication networks with renewable energy sourcesGiulio Betti, Edoardo Amaldi, Antonio Capone, Giulia Ercolani. 25-30 [doi]
- Advanced Metering and Demand Response communication performance in Zigbee based HANsVelin Kounev, David Tipper. 31-36 [doi]
- Elderberry: A peer-to-peer, privacy-aware smart metering protocolSören Finster, Ingmar Baumgart. 37-42 [doi]
- Performance evaluation of time-critical communication networks for Smart Grids based on IEC 61850Hanno Georg, Nils Dorsch, Markus Putzke, Christian Wietfeld. 43-48 [doi]
- A novel method to detect bad data injection attack in smart gridTing Liu, Yun Gu, Dai Wang, Yuhong Gui, Xiaohong Guan. 49-54 [doi]
- Robust privacy-preserving authentication scheme for communication between Electric Vehicle as Power Energy Storage and power stationsHasen Nicanfar, Seyedali Hosseininezhad, Peyman TalebiFard, Victor C. M. Leung. 55-60 [doi]
- A reverse transmission mechanism for surveillance network in smart gridLiang Tang, Yun Rui, Qian Wang, Husheng Li, Zhiyong Bu. 61-66 [doi]
- Efficient caching in Content-Centric Networks using OpenFlowXuan Nam Nguyen, Damien Saucez, Thierry Turletti. 67-68 [doi]
- Impact of a sleep schedule on the AODV convergence time in WSNsMathieu Michel, Bruno Quoitin. 69-70 [doi]
- Enhancing Traffic Sampling scope and efficiencyJoão Marco C. Silva, Paulo Carvalho, Solange Rito Lima. 71-72 [doi]
- Obsidian: A scalable and efficient framework for NetFlow obfuscationAntonio Villani, Daniele Riboni, Domenico Vitali, Claudio Bettini, Luigi V. Mancini. 73-74 [doi]
- Energy-harvesting WSNs for structural health monitoring of underground train tunnelsAlessandro Cammarano, Dora Spenza, Chiara Petrioli. 75-76 [doi]
- Distributed scheduling for scalable P2P video streaming with Network CodingAnooq Muzaffar Sheikh, Attilio Fiandrotti, Enrico Magli. 77-78 [doi]
- MAC-aware routing metrics for low power and lossy networksPiergiuseppe Di Marco, Carlo Fischione, George Athanasiou, Prodromos-Vasileios Mekikis. 79-80 [doi]
- Electricity cost efficient workload mappingMuhammad Saqib Ilyas, Zartash Afzal Uzmi. 81-82 [doi]
- On the impact of disorder on dynamic network navigationAnh Dung Nguyen, Patrick Sénac, Michel Diaz. 83-84 [doi]
- Efficient dynamic spectrum sharing through rate compensation and spectrum handoffAdisorn Lertsinsrubtavee, Naceur Malouch, Serge Fdida. 85-86 [doi]
- A simple approximate analysis of floating content for context-aware applicationsS. Ali, G. Rizzo, Balaji Rengarajan, M. Ajmone Marsan. 87-88 [doi]
- Data dissemination bounds in people-centric systemsKamini Garg. 89-90 [doi]
- Modeling and characterization of vehicular density at scaleGautam S. Thakur, Pan Hui, Ahmed Helmy. 91-96 [doi]
- On the usage patterns of multi-modal communication: Countries and evolutionYi Wang 0010, Michalis Faloutsos, Hui Zang. 97-102 [doi]
- DHT-based traffic localization in the wildMatteo Varvello, Moritz Steiner. 103-108 [doi]
- DRAGO: Detecting, quantifying and locating hidden routers in Traceroute IP pathsPietro Marchetta, Antonio Pescapè. 109-114 [doi]
- The BGP Visibility ScannerAndra Lutu, Marcelo Bagnulo, Olaf Maennel. 115-120 [doi]
- Improving the discovery of IXP peering links through passive BGP measurementsVasileios Giotsas, Shi Zhou. 121-126 [doi]
- AliasCluster: A lightweight approach to interface disambiguationLarissa Spinelli, Mark Crovella, Brian Eriksson. 127-132 [doi]
- Applying Software-Defined Networking to the telecom domainGeorg Hampel, Moritz Steiner, Tian Bu. 133-138 [doi]
- 1 - Hypergraph-based network layer indirectionYan Shvartzshnaider, Max Ott, Olivier Mehani, D. Levy. 139-144 [doi]
- COBRA: A framework for the analysis of realistic mobility modelsGautam S. Thakur, Ahmed Helmy. 145-150 [doi]
- Network emulation testbed for DTN applications and protocolsRazvan Beuran, Shinsuke Miwa, Yoichi Shinoda. 151-156 [doi]
- Trade-off analysis of Multi Topology Routing based IP fast reroute mechanismsSelcuk Cevher, Mustafa Ulutas, Ibrahim Hökelek. 157-162 [doi]
- Detecting encrypted botnet trafficHan Zhang, Christos Papadopoulos, Daniel Massey. 163-168 [doi]
- Robust QoS-guaranteed network engineering in interference-aware wireless networksAli Tizghadam, Ali Shariat, Alberto Leon-Garcia, Hassan Naser. 169-174 [doi]
- The twofold nature of Autonomous Systems: evidence combining stock market data with topological propertiesSimone Mainardi, Enrico Gregori, Luciano Lenzini. 175-180 [doi]
- Emergence of equilibria from individual strategies in online content diffusionEitan Altman, Francesco De Pellegrini, Rachid El Azouzi, Daniele Miorandi, Tania Jiménez. 181-186 [doi]
- Information diffusion in heterogeneous networks: The configuration model approachPavlos Sermpezis, Thrasyvoulos Spyropoulos. 187-192 [doi]
- On the impact of global information on diffusion of innovations over social networksYoungmi Jin, Jungseul Ok, Yung Yi, Jinwoo Shin. 193-198 [doi]
- Surviving in a competitive market of information providersKonstantinos Poularakis, Leandros Tassiulas. 199-204 [doi]
- Exploring venue popularity in foursquareYanhua Li, Moritz Steiner, Limin Wang, Zhi-Li Zhang, Jie Bao. 205-210 [doi]
- Inferring cellular user demographic information using homophily on call graphsYi Wang 0010, Hui Zang, Michalis Faloutsos. 211-216 [doi]
- The strength of vicinity annexation in opportunistic networkingTiphaine Phe-Neau, Marcelo Dias de Amorim, Vania Conan. 217-222 [doi]
- Finding critical regions in a networkStojan Trajanovski, Fernando A. Kuipers, Piet Van Mieghem. 223-228 [doi]
- Ego networks in Twitter: An experimental analysisValerio Arnaboldi, Marco Conti, Andrea Passarella, Fabio Pezzoni. 229-234 [doi]
- Analysis and applications of smartphone user mobilitySwati Rallapalli, Wei Dong, Gene Moo Lee, Yi-Chao Chen, Lili Qiu. 235-240 [doi]
- Pricing for demand shaping and proactive download in smart data networksJohn Tadrous, Atilla Eryilmaz, Hesham El Gamal. 321-326 [doi]
- SpeedGate: A smart data pricing testbed based on speed tiersY.-F. R. Chen, R. Jana. 327-332 [doi]
- On the interaction between content-oriented traffic scheduling and revenue sharing among providersHyojung Lee, Hyeryung Jang, Yung Yi, Jeong-woo Cho. 333-338 [doi]
- On the CDN pricing gameYang Song, Arun Venkataramani, Lixin Gao. 339-344 [doi]
- Economic models of sponsored content in wireless networks with uncertain demandMatthew Andrews, Ulas Özen, Martin I. Reiman, Qiong Wang. 345-350 [doi]
- Economics of mobile data offloadingLin Gao, George Iosifidis, Jianwei Huang, Leandros Tassiulas. 351-356 [doi]
- Economics of WiFi offloading: Trading delay for cellular capacityJoohyun Lee, Yung Yi, Song Chong, Youngmi Jin. 357-362 [doi]
- Tiered billing scheme for residential load scheduling with bidirectional energy tradingByung-Gook Kim, Shaolei Ren, Mihaela van der Schaar, Jang-Won Lee. 363-368 [doi]
- Pricing algorithms for the day-ahead electricity market with flexible consumer participationOzgur Dalkilic, Ozan Candogan, Atilla Eryilmaz. 369-374 [doi]
- Smart Data Pricing: Lessons from trial planningMing-Jye Sheng, Carlee Joe-Wong, Sangtae Ha, Felix Ming Fai Wong, Soumya Sen. 375-380 [doi]
- Check-Repeat: A new method of measuring DNSSEC validating resolversYingdi Yu, Duane Wessels, Matt Larson, Lixia Zhang 0001. 381-386 [doi]
- Modeling DNS agility with DNSMapAndreas Berger, Wilfried N. Gansterer. 387-392 [doi]
- Trapping botnets by DNS failure graphs: Validation, extension and application to a 3G networkArian Bär, Antonio Paciello, Peter Romirer-Maierhofer. 393-398 [doi]
- New generation satellite broadband Internet services: Should ADSL and 3G worry?Alessio Botta, Antonio Pescapè. 399-404 [doi]
- Troubleshooting slow webpage downloadsHeng Cui, Ernst W. Biersack. 405-410 [doi]
- Fighting the bufferbloat: On the coexistence of AQM and low priority congestion controlY. Gong, Dario Rossi, Claudio Testa, Silvio Valenti, M. Dave Taht. 411-416 [doi]
- To the Moon and back: Are Internet bufferbloat delays really that large?Chiara Chirichella, Dario Rossi. 417-422 [doi]
- Self-Learning Classifier for Internet trafficLuigi Grimaudo, Marco Mellia, Elena Baralis, Ram Keralapura. 423-428 [doi]
- Rogue femtocell owners: How mallory can monitor my devicesDavid Malone, Darren F. Kavanagh, Niall Richard Murphy. 429-434 [doi]
- Botnet detection revisited: Theory and practice of finding malicious P2P networks via Internet connection graphsStefan Ruehrup, Pierfrancesco Urbano, Andreas Berger, Alessandro D'Alconzo. 435-440 [doi]
- 10 Gbit line rate packet-to-disk using n2diskLuca Deri, Alfredo Cardigliano, Francesco Fusco. 441-446 [doi]
- Gaining insight into AS-level outages through analysis of Internet Background RadiationKaryn Benson, Alberto Dainotti, Kimberly C. Claffy, Emile Aben. 447-452 [doi]
- SpamTracer: How stealthy are spammers?Pierre-Antoine Vervier, Olivier Thonnard. 453-458 [doi]
- Improving AS relationship inference using PoPsLior Neudorfer, Yuval Shavitt, Noa Zilberman. 459-464 [doi]