Abstract is missing.
- Message from the general chairAnura P. Jayasumana. [doi]
- Message from the demonstrations chairKemal Akkaya. [doi]
- Message from the Program chairsDamla Turgut, Nils Aschenbruck. [doi]
- Software defined networks (SDN) - Enabling virtualised, programmable infrastructureKevin Bloch. [doi]
- Challenges of data access and transport in a truly mobile worldAruna Seneviratne. [doi]
- Autonomous deployment of sensors for maximized coverage and guaranteed connectivity in Underwater Acoustic Sensor NetworksFatih Senel, Kemal Akkaya, Turgay Yilmaz. 211-218 [doi]
- Let's talk together: Understanding concurrent transmission in wireless sensor networksDingwen Yuan, Matthias Hollick. 219-227 [doi]
- Efficient multicast delivery for wireless data center networksYa-Ju Yu, Ching-Chih Chuang, Hsin-Peng Lin, Ai-Chun Pang. 228-235 [doi]
- PopCache: Cache more or less based on content popularity for information-centric networkingKalika Suksomboon, Saran Tarnoi, Yusheng Ji, Michihiro Koibuchi, Kensuke Fukuda, Shunji Abe, Motonori Nakamura, Michihiro Aoki, Shigeo Urushidani, Shigeki Yamada. 236-243 [doi]
- Protocol for efficient opportunistic communicationRanjana Pathak, Peizhao Hu, Jadwiga Indulska, Marius Portmann. 244-247 [doi]
- Spectrum sensing aided long-term spectrum management in cognitive radio networksPål Grønsund, Paal E. Engelstad, Przemyslaw Pawelczak, Ole Grøndalen, Per H. Lehne, Danijela Cabric. 248-251 [doi]
- EnerSim: An energy consumption model for large-scale overlay simulatorsChristian Gross, Fabian Kaup, Dominik Stingl, Björn Richerzhagen, David Hausheer, Ralf Steinmetz. 252-255 [doi]
- Alleviating the Domino Effect in Wireless Sensor NetworksSara A. Abd El Hamid, Haitham S. Hamza, Imane Aly Saroit. 256-259 [doi]
- GRS: Global Resolution Service for mobility support in the InternetYou Wang, Jun Bi. 260-263 [doi]
- Minimally-intrusive frequent round trip time measurements using Synthetic Packet-PairsSebastian Zander, Grenville J. Armitage. 264-267 [doi]
- Adaptive QoS control adjusting receive buffer sizes and parallel TCP connections on information gathering serverYasutaka Sakajiri, Yosuke Tanigawa, Hideki Tode. 268-271 [doi]
- Leveraging online social networks for a real-time malware alerting systemIsra' Al-Qasem, Sumaya Al-Qasem, Ahmad T. Al-Hammouri. 272-275 [doi]
- On the use of a Cooperative Neighbor Position Verification scheme to secure warning message dissemination in VANETsManuel Fogue, Francisco J. Martinez, Piedad Garrido, Marco Fiore, Carla-Fabiana Chiasserini, Claudio Casetti, Juan-Carlos Cano, Carlos Miguel Tavares Calafate, Pietro Manzoni. 276-279 [doi]
- LTE-Advanced handover: An orientation matching- based fast and reliable approachSayan Kumar Ray, Harsha Sirisena, Devatanu Deka. 280-283 [doi]
- Delay-Constrained and Energy-Balanced broadcasts for low duty-cycled wireless sensor networksPeizhong Shi, Yun Wang, Kai Li, Alvin T. S. Chan. 284-287 [doi]
- Evaluating a framework for different networking paradigmsDenis Martin, Hans Wippel. 288-291 [doi]
- Comparative performance analysis of high-speed transfer protocols for big dataSe-Young Yu, Nevil Brownlee, Aniket Mahanti. 292-295 [doi]
- An end-to-end delay metric for multi-rate wireless mesh networks with cooperative retransmissionBipul Sen, Lavy Libman, Xin Zhao, Sanjay Jha. 296-299 [doi]
- Detecting heap-spray attacks in drive-by downloads: Giving attackers a handVan Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk. 300-303 [doi]
- Received signal strength indicator and its analysis in a typical WLAN system (short paper)Yogita Chapre, Prasant Mohapatra, Sanjay Jha, Aruna Seneviratne. 304-307 [doi]
- Security analysis of a protocol for pollution attack detectionKiattikul Sooksomsatarn, Ian Welch, Winston Khoon Guan Seah. 308-311 [doi]
- STELA: A transceiver duty cycle management strategy for energy efficiency in wireless communicationsYang Song, Bogdan Ciubotaru, Gabriel-Miro Muntean. 312-315 [doi]
- UAS: Universal anti-spoofing by incorporating existing mechanismsHyok An, Heejo Lee, Adrian Perrig. 316-319 [doi]
- The OFELIA TUB-island an Europe-wide connected OpenFlow testbedMarc Koerner. 320-323 [doi]
- A genetic algorithm for spanning tree optimization in sensor networksJuan Pou, Sebastià Galmés. 324-327 [doi]
- Distributed optimization of event dissemination exploiting interest clusteringMax Lehn, Robert Rehner, Alejandro P. Buchmann. 328-331 [doi]
- An improved connectivity-based boundary detection algorithm in wireless sensor networksBaoqi Huang, Wei Wu, Tao Zhang. 332-335 [doi]
- Evaluating the energy-efficiency of the Rich Uncle key exchange protocol in WSNsChristian Haas, Joachim Wilke, Fabian Knittel. 336-339 [doi]
- Experiences from security research using a Wireless Mesh Network testbedAndre Egners, Patrick Herrmann, Tobias Jarmuzek, Ulrike Meyer. 340-343 [doi]
- Accurate QoS-based service selection algorithm for service compositionJianxin Liao, Yang Liu, Xiaomin Zhu, Jingyu Wang, Qi Qi. 344-347 [doi]
- Near optimal design of multi-level WSNs for environmental monitoringBabak Behsaz, Mike H. MacGregor. 348-355 [doi]
- Energy-aware cross-layer optimization for EEG-based wireless monitoring applicationsAlaa Awad, Ramy Hussein, Amr Mohamed, Amr A. El-Sherif. 356-363 [doi]
- Event-driven energy-harvesting wireless sensor network for structural health monitoringMing-Yuan Cheng, Yan-Bin Chen, Hung-Yu Wei, Winston Khoon Guan Seah. 364-372 [doi]
- BlockTree: Location-aware decentralized monitoring in mobile ad hoc networksDominik Stingl, Christian Gross, Leonhard Nobach, Ralf Steinmetz, David Hausheer. 373-381 [doi]
- Approaches for practical BitTorrent traffic controlHyunYong Lee, Akihiro Nakao. 382-389 [doi]
- Multi-dimensional aggregation for DNS monitoringLautaro Dolberg, Jérôme François, Thomas Engel. 390-398 [doi]
- High quality streaming system with hierarchical cache servers based on inter-stream FEC functionAkihiro Fujimoto, Yusuke Hirota, Hideki Tode, Koso Murakami. 399-406 [doi]
- DASHing YouTube: An analysis of using DASH in YouTube video serviceDilip Kumar Krishnappa, Divyashri Bhat, Michael Zink. 407-415 [doi]
- Improvement in packet-reordering with limited re-sequencing buffers: An analysisRaghunandan M. Narasiodeyar, Anura P. Jayasumana. 416-424 [doi]
- A game-theoretic spectrum allocation framework for mixed unicast and broadcast traffic profile in cognitive radio networksMuhammad Junaid Farooq, Muddassar Hussain, Junaid Qadir, Adeel Baig. 425-432 [doi]
- On path exposure in probabilistic wireless sensor networksMohammed Elmorsy, Ehab S. Elmallah, Hosam M. F. AboElFotoh. 433-440 [doi]
- Data filtering for wireless sensor networks using forecasting and value of informationSebastian Zöller, Christian Vollmer, Markus Wachtel, Ralf Steinmetz, Andreas Reinhardt. 441-449 [doi]
- Autonomous discovery and repair of damage in Wireless Sensor NetworksThuy T. Truong, Kenneth N. Brown, Cormac J. Sreenan. 450-458 [doi]
- Quantifying selfishness and fairness in wireless multihop networksNormalia Samian, Winston Khoon Guan Seah, Gang Chen. 459-467 [doi]
- An energy efficient network coding approach for Wireless Body Area NetworksSamaneh Movassaghi, Mahyar Shirvanimoghaddam, Mehran Abolhasan, David Smith. 468-475 [doi]
- eCMT-SCTP: Improving performance of multipath SCTP with erasure coding over lossy linksGolam Sarwar, Pierre-Ugo Tournoux, Roksana Boreli, Emmanuel Lochin. 476-483 [doi]
- DHash: A cache-friendly TCP lookup algorithm for fast network processingKai Zhang, Junchang Wang, Bei Hua, Li Lu. 484-491 [doi]
- Initial spreading: A fast Start-Up TCP mechanismRenaud Sallantin, Cédric Baudoin, Emmanuel Chaput, Fabrice Arnal, Emmanuel Dubois 0003, André-Luc Beylot. 492-499 [doi]
- Evolution of TCP's initial window sizeRuna Barik, Dinil Mon Divakaran. 500-508 [doi]
- Using delay-gradient TCP for multimedia-friendly 'background' transport in home networksGrenville Armitage, Naeem Khademi. 509-515 [doi]
- Packet transmission scheduling for enhancing total throughput against channel fading in wireless LANShiori Yoshioka, Yosuke Tanigawa, Hideki Tode. 516-522 [doi]
- DSH-MAC: Medium Access Control based on Decoupled and Suppressed Handshaking for long-delay Underwater Acoustic Sensor NetworksTiansi Hu, Yunsi Fei. 523-531 [doi]
- Analysing and reducing network inaccessibility in IEEE 802.15.4 wireless communicationsJeferson L. R. Souza, José Rufino. 532-540 [doi]
- Advance bandwidth reservation for energy efficiency in high-performance networksTong Shu, Chase Qishi Wu, Daqing Yun. 541-548 [doi]
- Rate equilibria in WLANs with block ACKsSuong H. Nguyen, Ihsan Ayyub Qazi, Lachlan L. H. Andrew, Hai Le Vu. 549-556 [doi]
- An adaptive channel coordination mechanism for Vehicular Ad hoc NetworksLifeng Zhang, Beihong Jin, Keqin Li, Fusang Zhang. 557-564 [doi]
- Characterization of a transoceanic aircraft delay tolerant networkRubén Martínez-Vidal, Ramon Martí, Joan Borrell. 565-572 [doi]
- Assessing the effectiveness of DTN techniques under realistic urban environmentsSergio Martínez Tornell, Carlos Miguel Tavares Calafate, Juan-Carlos Cano, Pietro Manzoni. 573-580 [doi]
- Probabilistic routing based on fine-grained contact characterization in delay tolerant networksAysha Al Hinai, Haibo Zhang 0001. 581-588 [doi]
- Throughput maximization for online request admissions in mobile cloudletsQiufen Xia, Weifa Liang, Wenzheng Xu. 589-596 [doi]
- A Cloud Storage overlay to aggregate heterogeneous Cloud servicesGuilherme Sperb Machado, Thomas Bocek, Michael Ammann, Burkhard Stiller. 597-605 [doi]
- SlickFlow: Resilient source routing in Data Center Networks unlocked by OpenFlowRamon Marques Ramos, Magnos Martinello, Christian Esteve Rothenberg. 606-613 [doi]
- Automated diagnosis of known and unknown soft-failure in user devices using transformed Signatures and single classifier architectureChathuranga Widanapathirana, Jonathan C. Li, Milosh V. Ivanovich, Paul G. Fitzpatrick, Y. Ahmet Sekercioglu. 614-621 [doi]
- Secure connected scalable combinatorial KPS in WSN: Deterministic merging, localizationPinaki Sarkar, Sarbajit Mukherjee. 622-629 [doi]
- Poseidon: Mitigating interest flooding DDoS attacks in Named Data NetworkingAlberto Compagno, Mauro Conti, Paolo Gasti, Gene Tsudik. 630-638 [doi]
- SCADAVT-A framework for SCADA security testbed based on virtualization technologyAbdulmohsen Almalawi, Zahir Tari, Ibrahim Khalil, Adil Fahad. 639-646 [doi]
- IP agnostic real-time traffic filtering and host identification using TCP timestampsGeorg Wicherski, Florian Weingarten, Ulrike Meyer. 647-654 [doi]
- A virtual sensor scheduling framework for heterogeneous wireless sensor networksWen Hu, Damien O'Rourke, Branislav Kusy, Tim Wark. 655-658 [doi]
- Performance evaluation of IEEE 802.1Qbu: Experimental and simulation resultsWen-Kang Jia, Gen-Hen Liu, Yaw-Chung Chen. 659-662 [doi]
- QoS assessment for mission-critical Wireless Sensor Network applicationsFelix Dobslaw, Tingting Zhang, Mikael Gidlund. 663-666 [doi]
- Topology-aware PEX for improving BitTorrentHyunYong Lee, Akihiro Nakao. 667-670 [doi]
- A novel MAC protocol of wireless LAN with high throughput and fairnessXuejun Tian, Takumi Sanada, Takashi Okuda, Tetsuo Ideguchi. 671-674 [doi]
- Automatic over-the-air provisioning for Wi-Fi equipped M2M devicesKenji Hori, Tomohiko Ogishi, Ming-Yee Lai, Dana Chee, Kaustubh Sinkar. 675-678 [doi]
- Time division configuration multiplexing of wireless interfacesHakan Coskun, Tom Pfeifer. 679-682 [doi]
- Virtualized network isolation using Software Defined NetworksRogerio V. Nunes, Raphael L. Pontes, Dorgival Guedes. 683-686 [doi]
- SOS: Social network-based distributed data storagePhani C. Polina, Tuan T. Tran, Bin Xie 0001, Anup Kumar. 687-690 [doi]
- ACSP-tree: A tree structure for mining behavioral patterns from wireless sensor networksMd. Mamunur Rashid, Iqbal Gondal, Joarder Kamruzzaman. 691-694 [doi]
- Multi-layer optimization for service provider transport networksDeval Bhamare, Ashwin Gumaste, Prachi Srivastava, Mohan Krishnamoorthy. 695-698 [doi]
- Cooperative routing protocol for Content-Centric NetworkingSaran Tarnoi, Kalika Suksomboon, Wuttipong Kumwilaisak, Yusheng Ji. 699-702 [doi]
- Virtual topology control with multistate neural associative memoriesY. Sinan Hanay, Shin'ichi Arakawa, Masayuki Murata. 703-706 [doi]
- IEEE 802.15.4 based hybrid MAC protocol for hybrid monitoring WSNsSumudu Wijetunge, U. Gunawardana, R. Liyanapathirana. 707-710 [doi]
- Faster distributed localization of large numbers of nodes using clusteringFlorian Klingler, ShaoJie Tang, Xuefeng Liu, Falko Dressler, Christoph Sommer, Jiannong Cao. 711-714 [doi]
- The use of Erasure Coding for video streaming unicast over Vehicular Ad Hoc NetworksCristiano De Rezende, Mohammed Almulla, Azzedine Boukerche. 715-718 [doi]
- A joint 3D localization and synchronization solution for Wireless Sensor Networks using UAVLeandro A. Villas, Azzedine Boukerche, Daniel L. Guidoni, Guilherme Maia, Antonio A. F. Loureiro. 719-722 [doi]
- An efficient ARP for large-scale IEEE 802.11s-based Smart Grid networksNico Saputro, Kemal Akkaya. 723-726 [doi]
- Reactive and proactive congestion management for emergency building evacuationAntoine Desmet, Erol Gelenbe. 727-730 [doi]
- Wireless sensor networks and LTE-A network convergenceGarth V. Crosby, Farzam Vafa. 731-734 [doi]
- Component-based Wireless Sensor Networks: A dynamic paradigm for synergetic and resilient architecturesSharief M. A. Oteafy, Hossam S. Hassanein. 735-738 [doi]
- Network performance of the JBoss Application ServerNabil Benothman, Jean-Frederic Clere, Eryk Schiller, Peter Kropf, Remy Maucherat. 739-742 [doi]
- Deferred discard for improving the quality of video sent across congested networksDennis Ong, Tim Moors. 743-746 [doi]
- Resource allocation by pondering parameters for uplink system in LTE NetworksMauricio Iturralde, Steven Martin, Tara Ali-Yahiya. 747-750 [doi]
- Maximizing topic propagation driven by multiple user nodes in micro-bloggingChang Su, Youtian Du, Xiaohong Guan, Chenhe Wu. 751-754 [doi]
- Performance of multi-channel IEEE 802.11 WLANs with bidirectional flow controlSuong H. Nguyen, Lachlan L. H. Andrew, Hai Le Vu. 755-758 [doi]
- Private and resilient data aggregationMathieu Cunche, Cédric Lauradoux, Marine Minier, Roksana Boreli. 759-762 [doi]
- A framework to rapidly test SDN use-cases and accelerate middlebox applicationsRajesh Narayanan, Geng Lin, Affan A. Syed, Saad Shafiq, Fahd Gilani. 763-770 [doi]
- On the use of thin-client Set-Top Boxes for IPTV servicesTiago Cruz, Paulo Simões, Pedro Cabaco, Edmundo Monteiro, Fernando Bastos. 771-778 [doi]
- Can dynamic pricing make femto users and service providers happy?Mehdi Khabazian, Nizar Zorba, Hossam S. Hassanein. 779-784 [doi]
- Capacity analysis of combined IPTV and VoIP over IEEE 802.11nSaad Saleh, Zawar Shah, Adeel Baig. 785-792 [doi]
- A community-oriented route coordination using information centric networking approachRuidong Li, Hitoshi Asaeda. 793-800 [doi]
- PCV: Predicting contact volume for reliable and efficient data transfers in opportunistic networksShiraz Qayyum, Mehrab Shahriar, Mohan Kumar, Sajal K. Das. 801-809 [doi]
- Enhanced Data Delivery framework for dynamic Information-Centric Networks (ICNs)Fadi M. Al-Turjman, Hossam S. Hassanein. 810-817 [doi]
- On the efficiency of privacy-preserving path hiding for mobile sensing applicationsDelphine Christin, Andreas Reinhardt, Matthias Hollick. 818-826 [doi]
- SmartRevoc: An efficient and privacy preserving revocation system using parked vehiclesDavid Eckhoff, Falko Dressler, Christoph Sommer. 827-834 [doi]
- Modeling cooperative, selfish and malicious behaviors for Trajectory Privacy Preservation using Bayesian game theoryXinyu Jin, Niki Pissinou, Sitthapon Pumpichet, Charles A. Kamhoua, Kevin A. Kwiat. 835-842 [doi]