Abstract is missing.
- Towards Multi-Clouds engineeringDana Petcu, Elisabetta Di Nitto, Danilo Ardagna, Amor Solberg, Giuliano Casale. 1-6 [doi]
- Towards portability and interoperability support in middleware for hybrid cloudsAnsar Rafique, Stefan Walraven, Bert Lagaisse, Tom Desair, Wouter Joosen. 7-12 [doi]
- Access control delegation for the cloudNikos Fotiou, Apostolis Machas, George C. Polyzos, George Xylomenos. 13-18 [doi]
- Research challenges for cross-cloud applicationsFélix Cuadrado, Álvaro Navas, Juan C. Dueñas, Luis M. Vaquero. 19-24 [doi]
- Multiple virtual machine live migration in federated cloud systemsWalter Cerroni. 25-30 [doi]
- Wide area tentative scaling (WATS) for quick response in distributed cloud computingHitoshi Yabusaki, Hiroshi Nakagoe, Koichi Murayama, Takatoshi Kato. 31-36 [doi]
- Simple workload & application portability (SWAP)Sam Johnston. 37-42 [doi]
- Moving Business Intelligence to cloud environmentsAdrian Juan Verdejo, Bholanathsingh Surajbali, Henning Baars, Hans-Georg Kemper. 43-48 [doi]
- A component-based adaptation approach for multi-cloud applicationsAndré Almeida, Everton Cavalcante, Thaís Vasconcelos Batista, Nélio Cacho, Frederico Lopes. 49-54 [doi]
- Models and tools for the high-level simulation of a name-based interdomain routing architectureKari Visala, Andrew Keating, Rasib Hassan Khan. 55-60 [doi]
- POPE and PaNeL : Fast lookup in routing tablesHrishikesh B. Acharya. 61-66 [doi]
- An approach for efficient, accurate, and timely estimation of traffic matricesHongbin Luo, Zhe Chen, Jianbo Cui, Hongke Zhang. 67-72 [doi]
- HIDRA: Hiding mobility, multiplexing, and multi-homing from internet applicationsSpencer Sevilla, J. J. Garcia-Luna-Aceves. 73-78 [doi]
- Development and experimentation towards a multicast-enabled InternetDavide Careglio, Dimitri Papadimitriou, Fernando Agraz, Sahel Sahhaf, Jordi Perelló, Wouter Tavernier, Salvatore Spadaro, Didier Colle. 79-84 [doi]
- The new AQM kids on the block: An experimental evaluation of CoDel and PIENaeem Khademi, David Ros, Michael Welzl. 85-90 [doi]
- Energy-efficient distributed in-network caching for Content-Centric NetworksChao Fang, F. Richard Yu, Tao Huang, Jiang Liu, Yunjie Liu. 91-96 [doi]
- Social interaction based video recommendation: Recommending YouTube videos to facebook usersBin Nie, Honggang Zhang, Yong Liu. 97-102 [doi]
- CorteXlab: An open FPGA-based facility for testing SDR & cognitive radio networks in a reproducible environmentAbdelbasset Massouri, Leonardo Cardoso, Benjamin Guillon, Florin Hutu, Guillaume Villemaud, Tanguy Risset, Jean-Marie Gorce. 103-104 [doi]
- On the experimentation of the novel GCMR multicast routing in a large-scale testbedDavide Careglio, Dimitri Papadimitriou, Fernando Agraz, Sahel Sahhaf, Jordi Perelló, Wouter Tavernier. 105-106 [doi]
- Molecular communication linkNariman Farsad, Weisi Guo, Andrew W. Eckford. 107-108 [doi]
- REQMM : Real-time end-user QoE monitoring middleware for IP-based commercial TV serviceXiuyan Jiang, Hanyang Pan, Dejian Ye. 109-110 [doi]
- WE-bridge: West-east bridge for SDN inter-domain network peeringPingping Lin, Jun Bi, Ze Chen, Yangyang Wang, Hongyu Hu, Anmin Xu. 111-112 [doi]
- A management model for SDN-based data center networksYifei Xu, Yue Yan, Zhuyun Dai, Xiaolin Wang. 113-114 [doi]
- POCO-PLC: Enabling dynamic pareto-optimal resilient controller placement in SDN networksDavid Hock, Matthias Hartmann, Steffen Gebert, Thomas Zinner, Phuoc Tran-Gia. 115-116 [doi]
- Elastic data routing in cluster-based deduplication systemsYufeng Wang, ShaoJie Tang, Chiu C. Tan. 117-118 [doi]
- Energy Conserving Opportunistic Routing for self-powered wireless sensor networksPetros Spachos, Dimitrios Hatzinakos. 119-120 [doi]
- A practical real-time authentication system with Identity Tracking based on mouse dynamicsXiaojun Chen, Fei Xu, Rui Xu, Siu-Ming Yiu, Jinqiao Shi. 121-122 [doi]
- IoT-Privacy: To be private or not to be privateArijit Ukil, Soma Bandyopadhyay, Arpan Pal. 123-124 [doi]
- WLANs throughput improvement with CSMA/ECALuis Sanabria-Russo, Jaume Barceló, Azadeh Faridi, Boris Bellalta. 125-126 [doi]
- A proposal for elastic spectrum management in wireless local area networksLuis Amaral Lopes, Rute Sofia, Hassan Osman, Huseyin Haci. 127-128 [doi]
- G-Loc: Indoor localization leveraging gradient-based fingerprint mapYuanchao Shu, Philippe Coue, Yinghua Huang, Jiaqi Zhang, Peng Cheng, Jiming Chen. 129-130 [doi]
- Live video streaming in IEEE 802.11p vehicular networks: Demonstration of an automotive surveillance applicationEvgeny Belyaeiv, Alexey V. Vinel, Magnus Jonsson, Katrin Sjöberg. 131-132 [doi]
- Demonstrating resilient quality of service in Software Defined NetworkingSachin Sharma, Dimitri Staessens, Didier Colle, David Palma, Joao Goncalves, Mario Pickavet, Luís Cordeiro, Piet Demeester. 133-134 [doi]
- A demonstration of multirate multicast over an 802.11 mesh networkGeorgios S. Paschos, Chih-Ping Li, Eytan Modiano, Kostas Choumas, Thanasis Korakis. 135-136 [doi]
- Experimenting adaptive services in sea-cloud innovation environmentJingguo Ge, Yulei Wu, Tong Li, Yuepeng E., Chi Zhang. 137-138 [doi]
- Sensibility testbed: An internet-wide cloud platform for programmable exploration of mobile devicesYanyan Zhuang, Leonard Law, Albert Rafetseder, Lai Wang, Ivan Beschastnikh, Justin Cappos. 139-140 [doi]
- Automatically verifying STRAC policyYunchuan Guo, Lihua Yin, Li Chao. 141-142 [doi]
- Poster: Energy balance bounds of mixed data transmission in wireless sensor networksXianjin Xia, ShiNing Li, Yu Zhang, Zhe Yang. 143-144 [doi]
- On the effectiveness of high-speed WLAN standards for long distance communicationKamran Nishat, Ruwaifa Anwar, Ahmed Mehfooz, Bilal Zaidi, Haris Choudhary, Ihsan Ayyub Qazi. 145-146 [doi]
- When traceroute Met BGP... How to reveal hidden internet as-level connectivity with Portolan and IsolarioAdriano Faggiani, Pietro G. Giardina, Enrico Gregori, Alessandro Improta, Luciano Lenzini, Valerio Luconi, Alessandro Pischedda, Lorenzo Rossi, Luca Sani. 147-148 [doi]
- SD-ICN: An interoperable deployment framework for software-defined information-centric networksJinfan Wang, Wei Gao, Yuqing Liang, Rui Qin, Jianping Wang, Shucheng Liu. 149-150 [doi]
- OpenCache: Leveraging SDN to demonstrate a customisable and configurable cacheMatthew Broadbent, Panagiotis Georgopoulos, Vasileios Kotronis, Bernhard Plattner, Nicholas J. P. Race. 151-152 [doi]
- Demonstration of a social aware wireless content delivery paradigmAris Leivadeas, Chryssa A. Papagianni, Symeon Papavassiliou. 153-154 [doi]
- Small-cells radio resource management based on Radio Environmental MapsDaniel Denkovski, Valentin Rakovic, Marko Angjelicinoski, Vladimir Atanasovski, Liljana Gavrilovska. 155-156 [doi]
- Demonstrating Low-Power Distributed Queuing for active RFID communications at 433 MHzPere Tuset-Peiró, Luis Alonso 0001, Francisco Vazquez Gallego, Jesus Alonso-Zarate, Xavier Vilajosana-Guillen. 157-158 [doi]
- Adaptive cooperation schemes for energy efficient physical layer securityLi Wang, Lie-Liang Yang, Victor C. M. Schober, Mei Song. 159-160 [doi]
- A group-based security protocol for Machine Type Communications in LTE-AdvancedDaesung Choi, Sungdae Hong, Hyoung-Kee Choi. 161-162 [doi]
- Defending sybil attacks in mobile social networksYan Sun, Lihua Yin, Wenmao Liu. 163-164 [doi]
- Analyzing asking/bidding price in dynamic game for cooperative authenticationLicai Liu, Yunchuan Guo, Lihua Yin. 165-166 [doi]
- M2C: Energy efficient mobile cloud system for deep learningKai Sun, Zhikui Chen, Jiankang Ren, Song Yang, Jing Li. 167-168 [doi]
- Comparative study on CCN and CDNGe Ma, Zhen Chen. 169-170 [doi]
- SecLoc: Encryption system based on compressive sensing measurements for location estimationDimitris Milioris, Philippe Jacquet. 171-172 [doi]
- Delay-aware Predictive Network Selection in data offloadingHaoran Yu, Man Hon Cheung, Longbo Huang, Jianwei Huang. 173-174 [doi]
- Smart spectrum access algorithms in mobile TV white space networks for utility maximizationLiang Zheng, Chee-Wei Tan. 175-176 [doi]
- Assessment of practical energy savings in cellular networksDiala Naboulsi, Marco Fiore, Carla-Fabiana Chiasserini. 177-178 [doi]
- Private image computation: The case of cloud based privacy-preserving SIFTZhan Qin, Jingbo Yan, Kui Ren. 179-180 [doi]
- Distance distributions for real cellular networksSiyi Wang, Weisi Guo, Mark D. McDonnell. 181-182 [doi]
- Routine-based network deploymentEduardo Mucelli Rezende Oliveira, Aline Carneiro. 183-184 [doi]
- Wireless Device-to-Device hypergraph optimizationHongliang Zhang, Lili Ma, Lingyang Song, Zhu Han. 185-186 [doi]
- Proxy-based aggregated synchronization scheme in mobile cloud computingGiwon Lee, Haneul Ko, Sangheon Pack. 187-188 [doi]
- Reliable communication using Erasure Codes for monitoring bats in the wildMargit Mutschlechner, Florian Klingler, Felix Erlacher, Florian Hagenauer, Marcel Kiessling, Falko Dressler. 189-190 [doi]
- Enabling private and non-intrusive smartphone calls with LipTalkMuyuan Li, Si Chen, Kui Ren. 191-192 [doi]
- Lossless reconfiguration protocol for multi-domain data plane in software-defined networksBoyang Zhou, Haifeng Zhou, Wen Gao, Xiaoyan Hong, Bin Wang, Chunming Wu. 193-194 [doi]
- Are vehicular networks small world?Felipe D. da Cunha, Aline Carneiro Viana, Raquel A. F. Mini, Antonio A. F. Loureiro. 195-196 [doi]
- Radio resource allocation for full-duplex OFDMA networks using matching theoryBoya Di, Siavash Bayat, Lingyang Song, Yonghui Li. 197-198 [doi]
- Rings for privacy: An architecture for privacy-preserving user profilingCettina Barcellona, Ilenia Tinnirello, Maria Luisa Merani. 199-200 [doi]
- Random sensing order in cognitive radio systems: Performance evaluation and optimizationHossein Shokri Ghadikolaei, Carlo Fischione. 201-202 [doi]
- SCAPE: Safe Charging with Adjustable PowErHaipeng Dai, Yunhuai Liu, Guihai Chen, Xiaobing Wu, Tian He. 203-204 [doi]
- Adaptive channel assignment testbed on MICAzJunJie Zhu, Bo Chai, Jiming Chen. 205-206 [doi]
- RSU placement optimization in vehicular participatory sensing networksTeerawat Kumrai, Kaoru Ota, Mianxiong Dong, Paskorn Champrasert. 207-208 [doi]
- Transmit pulse shaping for molecular communicationsSiyi Wang, Weisi Guo, Mark D. McDonnell. 209-210 [doi]
- Empowering IP multicast for multimedia delivery over heterogeneous mobile wireless networksSérgio Figueiredo, Seil Jeon, Rui L. Aguiar. 211-212 [doi]
- CoMon: A system architecture for improving caching in CCNHani Salah, Benjamin Schiller, Thorsten Strufe. 213-214 [doi]
- AcousAuth: An acoustic-based mobile application for user authenticationSi Chen, Muyuan Li, Zhan Qin, Bingsheng Zhang, Kui Ren. 215-216 [doi]
- The power of indoor crowd: Indoor 3D maps from the crowdSi Chen, Muyuan Li, Kui Ren. 217-218 [doi]
- Social-aware multi-file dissemination in Device-to-Device overlay networksZijie Zheng, Tianyu Wang, Lingyang Song, Zhu Han, Jianjun Wu. 219-220 [doi]
- Coded caching with nonuniform demandsUrs Niesen, Mohammad Ali Maddah-Ali. 221-226 [doi]
- The effect of block-wise feedback on the throughput-delay trade-off in streamingGauri Joshi, Yuval Kochman, Gregory W. Wornell. 227-232 [doi]
- Distributed caching and coding in VoDArezou Pourmir, Parameswaran Ramanathan. 233-238 [doi]
- Dealing with user heterogeneity in P2P multiparty video conferencing: Layered coding versus receiver partitioningEymen Kurdoglu, Yong Liu, Yao Wang. 239-244 [doi]
- Hierarchical hexagonal modulation with ternary symbols for wireless video transmissionZhe Yang, Lin Cai, Xuan Wang, Siyuan Xiang, Jianping Pan. 245-250 [doi]
- An evaluation of RTP circuit breaker performance on LTE networksZaheduzzaman Sarker, Varun Singh, Colin Perkins. 251-256 [doi]
- Bounded delay scheduling with packet dependenciesMichael Markovitch, Gabriel Scalosub. 257-262 [doi]
- Content Relevance Opportunistic Routing for Wireless Multimedia Sensor NetworksPetros Spachos, Angelos K. Marnerides, Dimitrios Hatzinakos. 263-268 [doi]
- Leveraging users' likes in a video streaming P2P platformL. Natali, Cettina Barcellona, Maria Luisa Merani. 269-274 [doi]
- Dynamic rate allocation and opportunistic routing for scalable video multirate multicast over time-varying wireless networksChenglin Li, Hongkai Xiong, Junni Zou, Dapeng Oliver Wu. 275-280 [doi]
- Performance evaluation of streaming algorithms for network camerasGonzalo Munoz Ferrer, Hugo Méric, José Miguel Piquer, Javier Bustos-Jiménez. 281-286 [doi]
- WARP: A ICN architecture for social dataFabio Angius, Cédric Westphal, Mario Gerla, Giovanni Pau. 287-292 [doi]
- Analyzing the impact of proximity, location, and personality on smartphone usageLei Meng, Shu Liu, Aaron D. Striegel. 293-298 [doi]
- Mobile caching policies for device-to-device (D2D) content delivery networkingHye J. Kang, Kown Y. Park, Kumin Cho, Chung Gu Kang. 299-304 [doi]
- Protecting Location Privacy with Clustering Anonymization in vehicular networksBidi Ying, Dimitrios Makrakis. 305-310 [doi]
- Detecting collusive cheating in online shopping systems through characteristics of social networksJianwei Niu, Lei Wang, Yixin Chen, Wenbo He. 311-316 [doi]
- A strategy for differentiated access service selection based on application in WLANsZhikui Chen, Qianzi Xiong, Yang Liu, Chongming Huang. 317-322 [doi]
- An MRF cross-layer resource allocation approach with back-pressure features for QoS in dynamic social and cognitive communicationsEvangelos Anifantis, Eleni Stai, Vasileios Karyotis, Symeon Papavassiliou. 323-328 [doi]
- A two-stage algorithm to estimate the source of information diffusion in social media networksAlireza Louni, K. P. Subbalakshmi. 329-333 [doi]
- Cooperative online native advertisement: A game theoretical scheme leveraging on popularity dynamicsLorenzo Maggi, Francesco De Pellegrini. 334-339 [doi]
- Bringing mobile online games to cloudsDominik Meiländer, Frank Glinka, Sergei Gorlatch, Li Lin, Wei Zhang, Xiaofei Liao. 340-345 [doi]
- Bringing the cloud to the edgeHyunseok Chang, Adiseshu Hari, Sarit Mukherjee, T. V. Lakshman. 346-351 [doi]
- Heuristic offloading of concurrent tasks for computation-intensive applications in mobile cloud computingMike Jia, Jiannong Cao, Lei Yang. 352-357 [doi]
- Crowdsourcing on mobile cloud: Cost minimization of joint data acquisition and processingHuan Ke, Peng Li, Song Guo. 358-362 [doi]
- Wireless resources virtualization in LTE systemsMohamad Kalil, Abdallah Shami, Yinghua Ye. 363-368 [doi]
- Cloud radio access networks (C-RAN) in mobile cloud computing systemsYegui Cai, F. Richard Yu, Shengrong Bu. 369-374 [doi]
- Online multi-resource scheduling for minimum task completion time in cloud serversMohammadJavad NoroozOliaee, Bechir Hamdaoui, Mohsen Guizani, Mahdi Ben Ghorbel. 375-379 [doi]
- A lightweight access control mechanism for mobile cloud computingXuanxia Yao, Xiaoguang Han, Xiaojiang Du. 380-385 [doi]
- Energy-efficient cloud resource managementMehiar Dabbagh, Bechir Hamdaoui, Mohsen Guizani, Ammar Rayes. 386-391 [doi]
- Energy Compensated Cloud Assistance in mobile cloud computingJaya Prakash Champati, Ben Liang. 392-397 [doi]
- Characterizing energy consumption of IaaS clouds in non-saturated operationHaleh Khojasteh, Jelena V. Misic, Vojislav B. Misic. 398-403 [doi]
- An energy optimizing scheduler for mobile cloud computing environmentsManjinder Nir, Ashraf Matrawy, Marc St-Hilaire. 404-409 [doi]
- VANET via Named Data NetworkingGiulio Grassi, Davide Pesavento, Giovanni Pau, Rama Vuyyuru, Ryuji Wakikawa, Lixia Zhang 0001. 410-415 [doi]
- Decentralised binding of self-certifying names to real-world identities for assessment of third-party messages in fragmented mobile networksJan Seedorf, Dirk Kutscher, Fabian Schneider. 416-421 [doi]
- Efficient content routing in MANETs using distances to directoriesJ. J. Garcia-Luna-Aceves, Qian Li. 422-427 [doi]
- Information-centric delay-tolerant mobile ad-hoc networksYou Lu, Xiao Li, Yu-Ting Yu, Mario Gerla. 428-433 [doi]
- Name-based replication priorities in disaster casesIoannis Psaras, Lorenzo Saino, Mayutan Arumaithurai, K. K. Ramakrishnan, George Pavlou. 434-439 [doi]
- nCDN: CDN enhanced with NDNXiaoke Jiang, Jun Bi. 440-445 [doi]
- A CCN-based Social Network application optimising network proximityBertrand Mathieu, Patrick Truong. 446-451 [doi]
- Differentiated services in named-data networkingYusung Kim, Younghoon Kim, Ikjun Yeom. 452-457 [doi]
- Design of a high-speed content-centric-networking router using content addressable memoryAtsushi Ooka, Shingo Ata, Kazunari Inoue, Masayuki Murata. 458-463 [doi]
- Transport layer design for named data wireless networkingMarica Amadeo, Antonella Molinaro, Claudia Campolo, Manolis Sifalakis, Christian F. Tschudin. 464-469 [doi]
- MAGIC: A distributed MAx-Gain In-network Caching strategy in information-centric networksJing Ren, Wen Qi, Cédric Westphal, Jianping Wang, Kejie Lu, Shucheng Liu, Sheng Wang. 470-475 [doi]
- iDNS: Enabling information centric networking through The DNSSpencer Sevilla, Priya Mahadevan, J. J. Garcia-Luna-Aceves. 476-481 [doi]
- Consumer driven information freshness approach for content centric networkingJose Quevedo, Daniel Corujo, Rui L. Aguiar. 482-487 [doi]
- Loxin - A solution to password-less universal loginBo Zhu, Xinxin Fan, Guang Gong. 488-493 [doi]
- Hashdoop: A MapReduce framework for network anomaly detectionRomain Fontugne, Johan Mazel, Kensuke Fukuda. 494-499 [doi]
- Tackling the Big Data 4 vs for anomaly detectionJosé Camacho, Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro. 500-505 [doi]
- Behavioral analytics for inferring large-scale orchestrated probing eventsElias Bou-Harb, Mourad Debbabi, Chadi Assi. 506-511 [doi]
- Achieving big data privacy via hybrid cloudXueli Huang, Xiaojiang Du. 512-517 [doi]
- MACA: A privacy-preserving multi-factor cloud authentication system utilizing big dataWenyi Liu, A. Selcuk Uluagac, Raheem A. Beyah. 518-523 [doi]
- Load balancing for privacy-preserving access to big data in cloudPeng Li, Song Guo. 524-528 [doi]
- HVSTO: Efficient privacy preserving hybrid storage in cloud data centerMianxiong Dong, He Li, Kaoru Ota, Haojin Zhu. 529-534 [doi]
- Active deception model for securing cloud infrastructureAlbert Brzeczko, A. Selcuk Uluagac, Raheem A. Beyah, John A. Copeland. 535-540 [doi]
- Conditional proxy re-encryption for secure big data group sharing in cloud environmentJunggab Son, Donghyun Kim, Rasheed Hussain, Heekuck Oh. 541-546 [doi]
- Characterising user targeting for in-App Mobile AdsImdad Ullah, Roksana Boreli, Mohamed Ali Kâafar, Salil S. Kanhere. 547-552 [doi]
- Automatic objects removal for scene completionJianjun Yang, Kun Hua, Yin Wang, Wei Wang, Honggang Wang, Ju Shen. 553-558 [doi]
- A hierarchical clustering method for big data oriented ciphertext searchChi Chen, Xiaojie Zhu, Peisong Shen, Jiankun Hu. 559-564 [doi]
- More bars, more bang for the buck: Channel-dependent pricing for video delivery to mobile usersFraida Fund, S. Amir Hosseini, Shivendra S. Panwar. 565-570 [doi]
- Congestion-aware internet pricing for media streamingDi Niu, Baochun Li. 571-576 [doi]
- Sponsoring content: Motivation and pitfalls for content service providersLiang Zhang, Dan Wang. 577-582 [doi]
- Smart data pricing: To share or not to share?Yue Jin, Zhan Pang. 583-588 [doi]
- The stability of best effort and Managed Services in the Internet, and the role of application creationDebasis Mitra, Qiong Wang. 589-594 [doi]
- A simple two-sided market model with side-payments and ISP service classesGeorge Kesidis. 595-597 [doi]
- The impact of investment on price competition in unlicensed spectrumHang Zhou, Randall A. Berry, Michael L. Honig, Rakesh Vohra. 598-603 [doi]
- Information market for TV white spaceYuan Luo, Lin Gao, Jianwei Huang. 604-609 [doi]
- Optimal risk-aware power procurement for data centers in day-ahead and real-time electricity marketsMahdi Ghamkhari, Hamed Mohsenian Rad, Adam Wierman. 610-615 [doi]
- Joint pricing and proactive caching for data services: Global and user-centric approachesJohn Tadrous, Atilla Eryilmaz, Hesham El Gamal. 616-621 [doi]
- Combining cooperation and storage for the integration of renewable energy in smart gridsSubhash Lakshminarayana, Tony Q. S. Quek, H. Vincent Poor. 622-627 [doi]
- Lossy energy storage to cut power costsMohammad Rezaeian, Lachlan L. H. Andrew. 628-633 [doi]
- Scheduling long term energy storageRozanna N. Jesudasan, Lachlan L. H. Andrew. 634-639 [doi]
- Dynamic pricing for smart grid with reinforcement learningByung-Gook Kim, Yu Zhang, Mihaela van der Schaar, Jang-Won Lee. 640-645 [doi]
- Attacking power grids with secure meters: The case for breakers and JammersDeepjyoti Deka, Ross Baldick, Sriram Vishwanath. 646-651 [doi]
- SMART-ER: Peer-based privacy for smart meteringSören Finster, Ingmar Baumgart. 652-657 [doi]
- Preserving consumer privacy on IEEE 802.11s-based smart grid AMI networks using data obfuscationAndrew Beussink, Kemal Akkaya, Izzet F. Senturk, Mohamed M. E. A. Mahmoud. 658-663 [doi]
- Managing your trees: Insights from a metropolitan-scale low-power wireless networkZhang Fu, Olaf Landsiedel, Magnus Almgren, Marina Papatriantafilou. 664-669 [doi]
- Leveraging advanced metering infrastructure for distribution grid asset managementGary Atkinson, Marina Thottan. 670-675 [doi]
- Unidirectional probabilistic direct control for deferrable loadsGiovanni Neglia, Giuseppe Di Bella, Laura Giarré, Ilenia Tinnirello. 676-681 [doi]
- Analysing the real-time-capability of wide area communication in smart gridsNils Dorsch, Hanno Georg, Christian Wietfeld. 682-687 [doi]
- Equivalent bandwidth adaptation with energy preservation under delay constraintsRoberto Bruschi, Franco Davoli, Maurizio Mongelli. 688-693 [doi]
- Distributed dynamic spectrum access with adaptive power allocation: Energy efficiency and cross-layer awarenessMahdi Ben Ghorbel, Bechir Hamdaoui, Rami Hamdi, Mohsen Guizani, MohammadJavad NoroozOliaee. 694-699 [doi]
- Robust transmit beamforming against steering vector uncertainty in cognitive radio networksMd Monzurul Alam, Sudeep Bhattarai, Liang Hong, Sachin Shetty. 700-705 [doi]
- Energy-efficient power adaptation for cognitive radio systems under imperfect channel sensingGozde Ozcan, Mustafa Cenk Gursoy. 706-711 [doi]
- A game theory framework for a distributed and energy efficient bandwidth expansion processRodrigo A. Vaca Ramírez, John S. Thompson, Eitan Altman, Víctor M. Ramos R.. 712-717 [doi]
- Coordinated paradigm for D2D communicationsShahid Mumtaz, Kazi Mohammed Saidul Huq, Jonathan Rodriguez. 718-723 [doi]
- Unlimited cooperative sensing with energy detection for cognitive radioSunghwan Bae, Hongseok Kim. 724-729 [doi]
- Context-aware Machine-to-Machine communicationsJavier Mendonca Costa, Guowang Miao. 730-735 [doi]
- Modeling and analysis of handover failure probability in small cell networksCarlos H. M. de Lima, Mehdi Bennis, Matti Latva-aho. 736-741 [doi]
- Power allocation for interference alignment based cognitive radio networksNan Zhao, F. Richard Yu, Hongjian Sun. 742-746 [doi]
- Energy efficient resource allocation for collaborative mobile cloud with hybrid receiverZheng Chang, Jie Gong, Tapani Ristaniemi. 747-752 [doi]
- Power consumption optimization for real-time applications: Results on a MAC application implementationMichel Bourdellès, Julien Marechal. 753-758 [doi]
- Spectrum aware and energy efficient MAC protocol for cognitive radio sensor networkAmna Jamal, Chen-Khong Tham, Wai-Choong Wong. 759-764 [doi]
- Spectrum sensing-energy tradeoff in multi-hop cluster based cooperative cognitive radio networksAhmed S. B. Kozal, Madjid Merabti, Faycal Bouhafs. 765-770 [doi]
- Mining emerging user-centered network structures in location-based social networksKonstantinos Pelechrinis. 771-776 [doi]
- Urban mobility scaling: Lessons from 'little data'Galen Wilkerson, Ramin Khalili, Stefan Schmid. 777-782 [doi]
- A game theoretical study of peering vs transit in the internetGiovanni Accongiagioco, Eitan Altman, Enrico Gregori, Luciano Lenzini. 783-788 [doi]
- Designing an evolvable network with topological diversityLu Chen, Shin'ichi Arakawa, Masayuki Murata, Hideyuki Koto, Nagao Ogino, Hidetoshi Yokota. 789-794 [doi]
- Measuring routing tables in the internetElie Rotenberg, Christophe Crespelle, Matthieu Latapy. 795-800 [doi]
- Identifying roles in an IP network with temporal and structural densityJordan Viard, Matthieu Latapy. 801-806 [doi]
- Service characterizations for multi-Hop multiaccess wireless networksHussein Al-Zubaidy, Jörg Liebeherr. 807-812 [doi]
- Pay few, influence most: Online myopic network coveringKonstantin Avrachenkov, Prithwish Basu, Giovanni Neglia, Bruno F. Ribeiro, Donald F. Towsley. 813-818 [doi]
- How to network in online social networksGiovanni Neglia, Xiuhui Ye, Maksym Gabielkov, Arnaud Legout. 819-824 [doi]
- Maximum coverage and maximum connected covering in social networks with partial topology informationPatricio Reyes, Alonso Silva, Centre de Villarceaux. 825-830 [doi]
- Identification of K most vulnerable nodes in multi-layered network using a new model of interdependencyArunabha Sen, Anisha Mazumder, Joydeep Banerjee, Arun Das, Randy Compton. 831-836 [doi]
- Estimating clique composition and size distributions from sampled network dataMinas Gjoka, Emily Smith, Carter T. Butts. 837-842 [doi]
- Scaling properties of random networks under proximity-based social relationsAli Dabirmoghaddam, J. J. Garcia-Luna-Aceves. 843-848 [doi]
- Structure and evolution of missed collaborations in large networksMinh X. Hoang, Ram Ramanathan, Ambuj K. Singh. 849-854 [doi]