Abstract is missing.
- Comparing Information-Centric and Delay-Tolerant NetworkingKevin Fall. [doi]
- A fine-grained distance metric for analyzing Internet topologyMark Crovella. [doi]
- Facilitating Non-collocated coexistence for WiFi and 4G wireless networksPunit Rathod, Abhay Karandikar, Anirudha Sahoo. 1-9 [doi]
- A privacy-preserving reputation system for participatory sensingKuan Lun Huang, Salil S. Kanhere, Wen Hu. 10-18 [doi]
- Secure sensor network SUM aggregation with detection of malicious nodesSunoh Choi, Gabriel Ghinita, Elisa Bertino. 19-27 [doi]
- Interconnecting disjoint network segments using a mix of stationary and mobile nodesAhmad Abbas, Mohamed Younis. 28-35 [doi]
- Modeling visitor movement in theme parksGürkan Solmaz, Mustafa Ilhan Akbas, Damla Turgut. 36-43 [doi]
- Comparison of Anchor Selection algorithms for improvement of position estimation during the Wi-Fi localization process in disaster scenarioOleksandr Artemenko, Tobias Simon, Andreas Mitschele-Thiel, Dominik Schulz, Rheza Satria Ta. 44-49 [doi]
- TOMP: Opportunistic traffic offloading using movement predictionsPatrick Baier, Frank Dürr, Kurt Rothermel. 50-58 [doi]
- Monitoring Traffic Activity Graphs with low-rank matrix approximationYang Liu, Wenji Chen, Yong Guan. 59-67 [doi]
- Sub-flow packet sampling for scalable ML classification of interactive trafficSebastian Zander, Thuy T. T. Nguyen, Grenville J. Armitage. 68-75 [doi]
- Decoupling non-stationary and stationary components in long range network time series in the context of anomaly detectionCyriac James, Hema A. Murthy. 76-84 [doi]
- Rapid and generalized identification of packetized voice traffic flowsPhilip Branch, Jason But. 85-92 [doi]
- Multi-Resolution Elliptic Curve digital SignaturePanoat Chuchaisri, Richard E. Newman. 93-101 [doi]
- Applicability of crypto-based security approaches in tactical wireless multi-hop networksNils Aschenbruck, Elmar Gerhards-Padilla, Martin Lambertz. 102-110 [doi]
- 3DSVAT: A 3D Stereoscopic Vulnerability Assessment Tool for network securityTroy Nunnally, A. Selcuk Uluagac, John A. Copeland, Raheem A. Beyah. 111-118 [doi]
- Efficient construction of directed Redundant Steiner treesYigal Bejerano, Suman Jana, Pramod V. Koppol. 119-127 [doi]
- Intrusion detection in computer networks using Optimum-Path Forest clusteringKelton A. P. Costa, Clayton R. Pereira, Rodrigo Nakamura, João Paulo Papa. 128-131 [doi]
- A study of P2P traffic localization by network delay insertionHyunYong Lee, Akihiro Nakao. 132-135 [doi]
- Automatic generation of extended dependency graphs for network securityHeiko Günther, Marko Jahnke. 136-139 [doi]
- A key distribution protocol for Wireless Sensor NetworksAdrian Herrera, Wen Hu. 140-143 [doi]
- On bandwidth reservation for optimal resource utilization in high-performance networksPoonam Dharam, Qishi Wu, Mengxia Zhu. 144-147 [doi]
- HydroNode: A low cost, energy efficient, multi purpose node for underwater sensor networksDavid Pinto, Sadraque S. Viana, José Augusto Miranda Nacif, Luiz Filipe M. Vieira, Marcos Augusto M. Vieira, Alex Borges Vieira, Antonio O. Fernandes. 148-151 [doi]
- On the distribution of inter contact time for DTNsYuting Hu, Haiquan Wang, Chunhe Xia, Weiguo Li, Ying Yang. 152-155 [doi]
- Reliable communications in aerial sensor networks by using a hybrid antennaKai Li, Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha. 156-159 [doi]
- A new design of the IEEE 802.11 MAC layer to enhance the scalability of the DMS serviceYousri Daldoul, Djamal-Eddine Meddour, Toufik Ahmed. 160-163 [doi]
- A secure monitoring and control system for Wireless Sensor NetworksMichael Riecker, Rainer Thome, Dingwen Yuan, Matthias Hollick. 164-167 [doi]
- Timed redirection: HTTP request coalescing to reduce energy use of hybrid web serversMehrgan Mostowfi, Ken Christensen, SangHak Lee, Jungmee Yun. 168-171 [doi]
- Application-aware adaptive duty cycle-based Medium Access Control for energy efficient wireless data transmissionsYang Song, Bogdan Ciubotaru, Gabriel-Miro Muntean. 172-175 [doi]
- A context-aware cross-layer energy-efficient adaptive routing algorithm for WLAN communicationsRuiqi Ding, Gabriel-Miro Muntean. 176-179 [doi]
- A wireless mesh sensor network for hazard and safety monitoring at the Port of BrisbaneAmin Ahmadi, Abbas Bigdeli, Mahsa Baktashmotlagh, Brian C. Lovell. 180-183 [doi]
- Active breadcrumbs: Aggressive distribution method of in-network guidance information for content-oriented networksMasayuki Kakida, Yosuke Tanigawa, Hideki Tode. 184-187 [doi]
- Information fusion techniques applied to Shared Sensor and Actuator NetworksClaudio M. de Farias, Luci Pirmez, Flávia Coimbra Delicato, Igor Leão dos Santos, Albert Y. Zomaya. 188-191 [doi]
- DYAMAND: DYnamic, Adaptive MAnagement of Networks and DevicesJelle Nelis, Tom Verschueren, Dieter Verslype, Chris Develder. 192-195 [doi]
- Strategies for automatic labelling of web traffic tracesLuis Miguel Torres, Eduardo Magaña, Mikel Izal, Daniel Morató. 196-199 [doi]
- On the impact of wireless network traffic location and access technology on mobile device energy consumptionRamona Trestian, Olga Ormond, Gabriel-Miro Muntean. 200-203 [doi]
- Applying temporal feedback to rapid identification of BitTorrent trafficJason But, Philip Branch. 204-207 [doi]
- Decision centric identification and rank ordering of security metricsMoazzam Khan, Mohammad Omer, John A. Copeland. 208-211 [doi]
- DELTA: Delta encoding for less traffic for appsNikolai Samteladze, Ken Christensen. 212-215 [doi]
- LT-OLSR: Attack-tolerant OLSR against link spoofingYuseok Jeon, Tae Hyung Kim, Yuna Kim, Jong Kim. 216-219 [doi]
- Modelling packet loss in RTP-based streaming video for residential usersMartin Ellis, Dimitrios P. Pezaros, Theodore Kypraios, Colin Perkins. 220-223 [doi]
- Protecting IEEE 802.11s wireless mesh networks against insider attacksAndreas Reinhardt, Daniel Seither, André König, Ralf Steinmetz, Matthias Hollick. 224-227 [doi]
- On the feasibility of secure application-layer communications on the Web of ThingsJorge Granjal, Edmundo Monteiro, Jorge Sá Silva. 228-231 [doi]
- A cross layer approach to the novel distributed scheduling protocol and event-triggered controller design for Cyber Physical SystemsHao Xu, Sarangapani Jagannathan. 232-235 [doi]
- A differential game theoretic model for real-time spectrum pricing in cognitive radio networksDong Hao, Atsushi Iwasaki, Makoto Yokoo. 236-239 [doi]
- Cache isolation and thin provisioning of hypervisor cachesVidya Suryanarayana, Karthik Mylar Balasubramanya, Ravi Pendse. 240-243 [doi]
- Flow-Path: An AllPath flow-based protocolElisa Rojas, Guillermo Ibáñez, Diego Rivera, Juan A. Carral. 244-247 [doi]
- Plugging the leaks without unplugging your network in the midst of DisasterAaron D. Goldman, A. Selcuk Uluagac, Raheem A. Beyah, John A. Copeland. 248-251 [doi]
- An optimised dynamic resource allocation algorithm for Cloud's backbone networkIlhem Fajjari, Nadjib Aitsaadi, Guy Pujolle, Hubert Zimmermann. 252-255 [doi]
- Distributed data filtering in logistics wireless sensor networks based on transmission relevanceSebastian Zöller, Andreas Reinhardt, Ralf Steinmetz. 256-259 [doi]
- Towards an architecture for mobile healthcarePaul Dillon, Taieb Znati. 260-263 [doi]
- TDMA for wireless passive backscatter networks: An information theoretic approachAditya V. Padaki, Maciej J. Zawodniok. 264-267 [doi]
- Autonomous dynamic transmission scheduling based on neighbor node behavior for multihop wireless networksDaiki Nobayashi, Yutaka Fukuda, Takeshi Ikenaga. 268-271 [doi]
- Power-aware routing in networks with delay and link utilization constraintsGongqi Lin, Sieteng Soh, Mihai Lazarescu, Kwan-Wu Chin. 272-275 [doi]
- Resource and query aware, peer-to-peer-based multi-attribute Resource DiscoveryH. M. N. Dilum Bandara, Anura P. Jayasumana. 276-279 [doi]
- Detecting protocol switching covert channelsSteffen Wendzel, Sebastian Zander. 280-283 [doi]
- Time series matrix factorization prediction of internet traffic matricesYunlong Song, Min Liu, ShaoJie Tang, Xufei Mao. 284-287 [doi]
- An opportunistic multicast routing protocol for wireless mesh networksAbdoulmenim Bilh, Chun Tung Chou. 288-291 [doi]
- Performance evaluation of Sub 1 GHz wireless sensor networks for the smart gridStefan Aust, R. Venkatesha Prasad, Ignas G. Niemegeers. 292-295 [doi]
- Distributed client-server assignmentThuan Duong-Ba, Thinh P. Nguyen. 296-299 [doi]
- Detecting covert communication on AndroidMichael Hansen, Raquel Hill, Seth Wimberly. 300-303 [doi]
- A modular and power-intelligent architecture for wireless sensor nodesDavid Riley, Mohamed Younis. 304-307 [doi]
- An RSSI-based navigation algorithm for a mobile robot in Wireless Sensor NetworksAntonio R. de Carvalho, Afonso D. Ribas, Vilar Fiuza da Camara Neto, Eduardo Freire Nakamura, Carlos Mauricio S. Figueiredo. 308-311 [doi]
- Models and algorithms for elastic-demand network equilibrium problems in communication networks with multicast sessionsXuefeng Ma, Jinpeng Huai, Bo Li, Hanwen Wang, Ye Jiao. 312-315 [doi]
- Unravel the characteristics and development of current IPv6 networkFuliang Li, Changqing An, Jiahai Yang, Jianping Wu, Zejia Chen. 316-319 [doi]
- Half-Symmetric Lens based localization algorithm for wireless sensor networksNoureddine Lasla, Abdelouahid Derhab, Abdelraouf Ouadjaout, Miloud Bagaa, Adlen Ksentini, Nadjib Badache. 320-323 [doi]
- Resiliency taxonomy of routing protocols in Wireless Sensor NetworksOchirkhand Erdene-Ochir, Marine Minier, Fabrice Valois, Apostolos A. Kountouris. 324-327 [doi]
- Achieving end-to-end goals of WSN using Weighted Cognitive MapsAmr H. El Mougy, Mohamed Ibnkahla. 328-331 [doi]
- A novel dynamic Q-learning-based scheduler technique for LTE-advanced technologies using neural networksIoan Sorin Comsa, Sijing Zhang, Mehmet Aydin, Pierre Kuonen, Jean-Frédéric Wagen. 332-335 [doi]
- On the performance of sensor node repositioning under realistic terrain constraintsIzzet F. Senturk, Kemal Akkaya. 336-339 [doi]
- Novel assessment metric and countermeasures for traffic attack threats in wireless sensor networksYousef Ebrahimi, Mohamed Younis. 340-343 [doi]
- An evaluation of fairness among heterogeneous TCP variants over 10Gbps high-speed networksLin Xue, Suman Kumar, Cheng Cui, Seung-Jong Park. 344-347 [doi]
- Efficient traffic flow measurement for ISP networksQinghua Wu, Zhenyu Li, Jianhua Yang, Gaogang Xie, Kavé Salamatian. 348-351 [doi]
- Characterization and modeling in large-scale urban DTNsChunhe Xia, Dong Liang, Haiquan Wang, Min Luo, Weifeng Lv. 352-359 [doi]
- A geolocation-based Vertical Handover Decision Algorithm for Vehicular NetworksJohann Márquez-Barja, Carlos Miguel Tavares Calafate, Juan-Carlos Cano, Pietro Manzoni. 360-367 [doi]
- LPS and LRF: Efficient buffer management policies for Delay and Disruption Tolerant NetworksJuliano Fischer Naves, Igor Monteiro Moraes, Célio Vinicius N. de Albuquerque. 368-375 [doi]
- Mobility based dynamic TXOP for vehicular communicationHikmat El Ajaltouni, Azzedine Boukerche, Richard W. Pazzi. 376-383 [doi]
- Modeling and optimizing transport-support workflows in high-performance networksDaqing Yun, Qishi Wu, Patrick Brown, Mengxia Zhu. 384-391 [doi]
- Enhancing TCP with cross-layer notifications and capacity estimation in heterogeneous access networksLaila Daniel, Markku Kojo. 392-400 [doi]
- Performance of on-off traffic stemming from live adaptive segmented HTTP video streamingTomas Kupka, Pål Halvorsen, Carsten Griwodz. 401-409 [doi]
- Characterizing cyberlocker traffic flowsAniket Mahanti, Niklas Carlsson, Martin F. Arlitt, Carey Williamson. 410-418 [doi]
- Robust MAC-layer rate control mechanism for 802.11 wireless networksWei Yin, Peizhao Hu, Jadwiga Indulska, Marius Portmann, Jonathan Guerin. 419-427 [doi]
- Network coding based SVC multicast over broadband wireless networksHao Zhou, Yusheng Ji, Yu Gu 0003, Baohua Zhao. 428-435 [doi]
- Distributed Decode and Forward BeamformingChris Walsh, Douglas Hakkarinen, Tracy Camp. 436-444 [doi]
- Flexible resource allocation for multicast in OFDMA based wireless networksXin Zhao, Sanjay Jha. 445-452 [doi]
- Efficient geocasting to multiple regions in large-scale wireless sensor networksCuong Truong, Kay Römer. 453-461 [doi]
- Near-optimal routing for contour detection in wireless sensor networksVenkat Pulimi, Tuhin Paul, Kevin G. Stanley, Derek L. Eager. 462-469 [doi]
- Adaptive HELLO for the Neighborhood Discovery ProtocolRaphael Ernst, Peter Martini. 470-478 [doi]
- Maximizing network lifetime via 3G gateway assignment in dual-radio sensor networksXu Xu, Weifa Liang, Tim Wark, Jaein Jeong. 479-486 [doi]
- Network capabilities of cloud services for a real time scientific applicationDilip Kumar Krishnappa, Eric Lyons, David E. Irwin, Michael Zink. 487-495 [doi]
- An integrated resource allocation scheme for multi-tenant data-centerMohan Gurusamy, Tho Ngoc Le, Dinil Mon Divakaran. 496-504 [doi]
- A distributed energy saving approach for Ethernet switches in data centersWeisheng Si, Javid Taheri, Albert Y. Zomaya. 505-512 [doi]
- Large-scale measurement and analysis of one-way delay in hybrid multicast networksSebastian Meiling, Thomas C. Schmidt, Matthias Wählisch. 513-520 [doi]
- How's My Network? Predicting performance from within a Web browser sandboxMurad Kaplan, Mihajlo Zeljkovic, Mark Claypool, Craig E. Wills. 521-528 [doi]
- A real-time services performance and interference mitigation for femtocell scenarios in LTE networksMauricio Iturralde, Tara Ali-Yahiya, Anne Wei, André-Luc Beylot. 529-536 [doi]
- KBAC: Knowledge-Based Admission ControlDoreid Ammar, Thomas Begin, Isabelle Guérin Lassous, Ludovic Noirie. 537-544 [doi]
- Impact of network conditions on delay-stable communications in closed industrial control networksDavid A. Miller, Ahmed E. Kamal. 545-550 [doi]
- Inference in wireless sensor networks based on information structure optimizationWei Zhao, Yao Liang. 551-558 [doi]
- Optimization trade-offs in the design of wireless sensor and actor networksHyunbum Kim, Jorge Arturo Cobb. 559-567 [doi]
- On using game theory to balance energy consumption in heterogeneous wireless sensor networksXiao-Hui Lin, Hui Wang. 568-576 [doi]
- Energy efficient data survivability for WSNs via Decentralized Erasure CodesLouai Al-Awami, Hossam S. Hassanein. 577-584 [doi]
- An approach for bounding breach path detection reliability in wireless sensor networksMohamed H. Shazly, Ehab S. Elmallah, Janelle J. Harms. 585-592 [doi]
- MP-DNA: A novel distributed replica placement heuristic for WMNsZakwan Al-Arnaout, Jonathan Hart, Qiang Fu, Marcus Frean. 593-600 [doi]
- Dynamic file bundling for large-scale content distributionSong Zhang, Niklas Carlsson, Derek L. Eager, Zongpeng Li, Anirban Mahanti. 601-609 [doi]
- CDN Request Routing to reduce network access costVarun Khare, Beichuan Zhang. 610-617 [doi]
- A tale of nine Internet exchange points: Studying path latencies through major regional IXPsMohammad Zubair Ahmad, Ratan Guha. 618-625 [doi]
- Safe cities. A participatory sensing approachJaime Ballesteros, Mahmudur Rahman, Bogdan Carbunar, Naphtali Rishe. 626-634 [doi]
- HOPSCOTCH: An adaptive and distributed channel hopping technique for interference avoidance in Wireless Sensor NetworksDingwen Yuan, Michael Riecker, Matthias Hollick. 635-642 [doi]
- Agnostic broadcast rendezvous for cognitive radio networks using channel hoppingRaphael M. Guedes, Marcel William Rocha da Silva, Pedro S. Coutinho, José Ferreira de Rezende. 643-650 [doi]
- Wireless multi-rate scheduling: From physical interference to disk graphsOlga Goussevskaia, Luiz Filipe M. Vieira, Marcos Augusto M. Vieira. 651-658 [doi]