Abstract is missing.
- Competitive and Considerate Congestion Control for Bulk Data TransfersShao Liu, Milan Vojnovic, Dinan Gunawardena. 1-9 [doi]
- PIQI-RCP: Design and Analysis of Rate-Based Explicit Congestion ControlSaurabh Jain, Dmitri Loguinov. 10-20 [doi]
- Fairness Attacks in the Explicit Control ProtocolChristo Wilson, Chris Coakley, Ben Y. Zhao. 21-28 [doi]
- Decentralized Replication Algorithms for Improving File Availability in P2P NetworksW. K. Lin, C. Ye, D. M. Chiu. 29-37 [doi]
- On the Resilience-Complexity Tradeoff of Network Coding in Dynamic P2P NetworksDi Niu, Baochun Li. 38-46 [doi]
- Parallelized Progressive Network Coding With Hardware AccelerationHassan Shojania, Baochun Li. 47-55 [doi]
- Probabilistic Field Coverage using a Hybrid Network of Static and Mobile SensorsDan Wang, Jiangchuan Liu, Qian Zhang. 56-64 [doi]
- Improving Routing Quality of Greedy Forwarding in Wireless NetworksChen Wang, Li Xiao. 65-73 [doi]
- Evaluation of a Stateful Transport Protocol for Multi-channel Wireless Mesh NetworksAshish Raniwala, Srikant Sharma, Pradipta De, Rupa Krishnan, Tzi-cker Chiueh. 74-82 [doi]
- On the Stability Region of Linear-Memory Scheduling for Time Varying ChannelsMahdi Lotfinezhad, Ben Liang, Elvino S. Sousa. 83-86 [doi]
- On Area of Interest Coverage in Surveillance Mobile Sensor NetworksYu Dong, Wing-Kai Hon, David K. Y. Yau. 87-90 [doi]
- On the Feasibility of Switching ISPs in Residential MultihomingAhsan Habib, Nicolas Christin, John C.-I. Chuang. 91-99 [doi]
- Load Balancing Routing of Fault Tolerant QoS-Guaranteed VPNsKartik Gopalan, Tzi-cker Chiueh, Yow-Jian Lin. 100-108 [doi]
- Value of Supporting Class-of-Service in IP BackbonesMurat Yuksel, K. K. Ramakrishnan, Shivkumar Kalyanaraman, Joseph D. Houle, Rita Sadhvani. 109-112 [doi]
- Efficient Algorithms For Optimizing Policy-Constrained RoutingAndrew R. Curtis, Ross M. McConnell, Daniel Massey. 113-116 [doi]
- Drop counters are enoughRade Stanojevic, Robert Shorten. 117-125 [doi]
- Slow and Steady: Modelling and Performance Analysis of the Network Entry Process in IEEE 802.16Matthias Hollick, Parag S. Mogre, Christian Schott, Ralf Steinmetz. 126-134 [doi]
- Recall and Precision in Distributed Bandwidth AllocationPatrick Stuedi, Gustavo Alonso. 135-140 [doi]
- Improving Individual Flow Performance with Multiple Queue Fair QueuingManfred Georg, Christoph Jechlitschek, Sergey Gorinsky. 141-144 [doi]
- Detecting Stealthy Spreaders Using Online Outdegree HistogramsYan Gao, Yao Zhao, Robert T. Schweller, Shobha Venkataraman, Yan Chen, Dawn Xiaodong Song, Ming-Yang Kao. 145-153 [doi]
- Securing BGP through Keychain-based SignaturesHeng Yin, Bo Sheng, Haining Wang, Jianping Pan. 154-163 [doi]
- Designing networks with hop bounded protection pathsMansoor Alicherry, Randeep Bhatia, Yung-Chun (Justin) Wan. 164-172 [doi]
- Performance metrics and configuration strategies for group network communicationTom Z. J. Fu, Dah-Ming Chiu, John C. S. Lui. 173-181 [doi]
- Structuring Multi-Layer Scalable Streams to Maximize Cient-Perceived QualityCheng-Hsin Hsu, Mohamed Hefeeda. 182-187 [doi]
- Profit-aware Admission Control for Overload Protection in E-commerce Web SitesChuan Yue, Haining Wang. 188-193 [doi]