Abstract is missing.
- Practical OFDMA for corridor-based routing in Wireless Multihop NetworksAdrian Loch, Matthias Hollick, Alexander Kühne, Anja Klein 0002. 1-9 [doi]
- Content peering in content centric networksJason Min Wang, Xiangming Dai, Brahim Bensaou. 10-18 [doi]
- vINCENT: An incentive scheme supporting heterogeneity in Peer-to-Peer content distributionMatthias Wichtlhuber, Peter Heise, Bjorn Scheurich, Julius Rückert, David Hausheer. 19-27 [doi]
- Caching-assisted access for vehicular resourcesSherin Abdel Hamid, Hossam S. Hassanein, Glen Takahara, Hesham Farahat. 28-36 [doi]
- Dynamic curve adaptation for geographic routing in Wireless Multihop NetworksAdrian Loch, Wei-Chih Hong, Matthias Hollick. 37-45 [doi]
- On the potential of MPT/MPR wireless networksKe Li, Ioanis Nikolaidis, Janelle J. Harms. 46-54 [doi]
- A multi-rate multi-channel multicast algorithm in wireless mesh networksWanqing Tu. 55-63 [doi]
- Caching piggyback information for efficient index code transmissionJalaluddin Qureshi. 64-71 [doi]
- Resource allocation and request handling for user-aware content retrieval in the cloudBoyang Yu, Jianping Pan. 72-80 [doi]
- Resource reservation comparison of fault resilient routing schemesYigal Bejerano, Pramod V. Koppol. 81-89 [doi]
- Efficient virtual network embedding via exploring periodic resource demandsZichuan Xu, Weifa Liang, Qiufen Xia. 90-98 [doi]
- Performance of probabilistic caching and cache replacement policies for Content-Centric NetworksSaran Tarnoi, Kalika Suksomboon, Wuttipong Kumwilaisak, Yusheng Ji. 99-106 [doi]
- CQRD: A switch-based approach to flow interference in Data Center NetworksGuo Chen, Dan Pei, Youjian Zhao. 107-115 [doi]
- Analyzing information propagation in a transoceanic aircraft delay tolerant networkRubén Martínez-Vidal, Ramon Martí, Joan Borrell. 116-123 [doi]
- Real-world evaluation of Sensor Context-aware Adaptive Duty-cycled opportunistic routingZhongliang Zhao, Torsten Braun. 124-132 [doi]
- MEME: Real-time mobility estimation for mobile environmentsShiraz Qayyum, Umair Sadiq, Mohan Kumar. 133-141 [doi]
- Cryptographically-Curated File System (CCFS): Secure, inter-operable, and easily implementable Information-Centric NetworkingAaron D. Goldman, A. Selcuk Uluagac, John A. Copeland. 142-149 [doi]
- Practical passive shared bottleneck detection using shape summary statisticsDavid A. Hayes, Simone Ferlin, Michael Welzl. 150-158 [doi]
- Evaluating CoDel, PIE, and HRED AQM techniques with load transientsIlpo Järvinen, Markku Kojo. 159-167 [doi]
- CluClas: Hybrid clustering-classification approach for accurate and efficient network classificationAdil Fahad, Kurayman Alharthi, Zahir Tari, Abdulmohsen Almalawi, Ibrahim Khalil. 168-176 [doi]
- A TCP model for short-lived flows to validate initial spreadingRenaud Sallantin, Cédric Baudoin, Emmanuel Chaput, Fabrice Arnal, Emmanuel Dubois 0003, André-Luc Beylot. 177-184 [doi]
- A cooperative localization scheme using RFID crowdsourcing and time-shifted multilaterationLobna M. Eslim, Hossam S. Hassanein, Walid M. Ibrahim, Abdallah Y. Alma'aitah. 185-192 [doi]
- An Energy Efficient Framework for Localization and Coverage in Participatory Urban SensingAdnan Khan, Sk. Kajal Arefin Imon, Sajal K. Das. 193-201 [doi]
- CSI-MIMO: Indoor Wi-Fi fingerprinting systemYogita Chapre, Aleksandar Ignjatovic, Aruna Seneviratne, Sanjay Jha. 202-209 [doi]
- WaP: Indoor localization and tracking using WiFi-Assisted Particle filterFeng Hong, Yongtuo Zhang, Zhao Zhang, Meiyu Wei, Yuan Feng, Zhongwen Guo. 210-217 [doi]
- How dia-shows turn into video flows: Adapting scalable video communication to heterogeneous network conditions in real-timeFabian Jager, Thomas C. Schmidt, Matthias Wählisch. 218-226 [doi]
- A deterministic QoE formalization of user satisfaction demands (DQX)Christos Tsiaras, Burkhard Stiller. 227-235 [doi]
- PowerPi: Measuring and modeling the power consumption of the Raspberry PiFabian Kaup, Philip Gottschling, David Hausheer. 236-243 [doi]
- H-box: Interconnecting devices across local networksDung Vu Ba Tien, Miika Komu, Matti Siekkinen, Antti Ylä-Jääski. 244-252 [doi]
- Breach path to target area detection reliability in Wireless Sensor NetworksMohammed Elmorsy, Ehab S. Elmallah. 253-261 [doi]
- An energy- and proximity-based unequal clustering algorithm for Wireless Sensor NetworksM. Mehdi Afsar, Mohamed Younis. 262-269 [doi]
- Maintaining sensor networks perpetually via wireless recharging mobile vehiclesWeifa Liang, Wenzheng Xu, Xiaojiang Ren, Xiaohua Jia, Xiaola Lin. 270-278 [doi]
- Bi-scale temporal sampling strategy for traffic-induced pollution data with Wireless Sensor NetworksLamling Venus Shum, Stephen Hailes, Manik Gupta, Eliane L. Bodanese, Pachamuthu Rajalakshmi, Uday B. Dasai. 279-287 [doi]
- Data collection from wireless sensor networks using a hybrid mobile agent-based approachTuhin Paul, Kevin Gordon Stanley. 288-295 [doi]
- Measuring the impact of denial-of-service attacks on wireless sensor networksMichael Riecker, Daniel Thies, Matthias Hollick. 296-304 [doi]
- MPFC: Massively Parallel Firewall CircuitsSven Hager, Frank Winkler, Björn Scheuermann, Klaus Reinhardt. 305-313 [doi]
- On rule width and the unreasonable effectiveness of policy verificationH. B. Acharya. 314-321 [doi]
- OutMet: A new metric for prioritising intrusion alerts using correlation and outlier analysisRiyanat Shittu, Alex Healing, Robert A. Ghanea-Hercock, Robin E. Bloomfield, Muttukrishnan Rajarajan. 322-330 [doi]
- A Gen2v2 compliant RFID authentication and ownership management protocolHaifeng Niu, S. Jagannathan, Eyad S. Taqieddin. 331-336 [doi]
- Unleashing the shrew: a stealth greedy targeted attack on TCP traffic in wireless LANsLiyi Gu, Jun Zhang, Brahim Bensaou. 337-344 [doi]
- Making active-probing-based network intrusion detection in Wireless Multihop Networks practical: A Bayesian inference approach to probe selectionRodrigo do Carmo, Justus Hoffmann, Volker Willert, Matthias Hollick. 345-353 [doi]
- LSD-ABAC: Lightweight static and dynamic attributes based access control scheme for secure data access in mobile environmentFei Li, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan. 354-361 [doi]
- Towards on-path caching alternatives in Information-Centric NetworksAndriana Ioannou, Stefan Weber. 362-365 [doi]
- Performances of cryptographic accumulatorsAmrit Kumar, Pascal Lafourcade, Cédric Lauradoux. 366-369 [doi]
- Delay tolerant handover for heterogeneous networksPeggy Begerow, Silvia Krug, Atheer Al Rubaye, Karsten Renhak, Jochen Seitz. 370-373 [doi]
- Reducing MANET neighborhood discovery overheadRaphael Ernst, Sascha Alexander Jopen, Tobias Bartelt. 374-377 [doi]
- Back to the future: A need for multi-drop Ethernet for cost-effective power distributionKenneth J. Christensen, Bruce Nordman. 378-381 [doi]
- Secure key renewal and revocation for Wireless Sensor NetworksIsmail Mansour, Gérard Chalhoub, Pascal Lafourcade, François Delobel. 382-385 [doi]
- Time calibration in experiments with networked sensorsOlivier Mehani, Ronnie Taib, Benjamin Itzstein. 386-389 [doi]
- Spatial unfairness in IEEE 802.11 networksYigal Bejerano, Hyoung-Gyu Choi, Seung-Jae Han. 390-393 [doi]
- Data aggregation in VANETs a generalized framework for channel load adaptive schemesJosef Jiru, Lars Bremer, Kalman Graffi. 394-397 [doi]
- Forming MS-free and outdegree-limited Bluetooth scatternets in pessimistic environmentsAhmed Jedda, Hussein T. Mouftah. 398-401 [doi]
- Decentralizing SDN's control planeMateus A. S. Santos, Bruno Astuto A. Nunes, Katia Obraczka, Thierry Turletti, Bruno Trevizan de Oliveira, Cintia B. Margi. 402-405 [doi]
- An image retrieval framework for distributed datacentersDi Yang, Jianxin Liao, Qi Qi, Jingyu Wang, Tonghong Li. 406-409 [doi]
- Optimal power allocation in cognitive networks using non-orthogonal AF relaysM. Elsaadany. 410-413 [doi]
- Optimal cooperative routing protocol based on prefix popularity for Content Centric NetworkingSaran Tarnoi, Wuttipong Kumwilaisak, Yusheng Ji. 414-417 [doi]
- Scheduling policies based on dynamic throughput and fairness tradeoff control in LTE-A networksIoan Sorin Comsa, Mehmet Aydin, Sijing Zhang, Pierre Kuonen, Jean-Frédéric Wagen, Yao Lu. 418-421 [doi]
- Incremental collaborative trajectory estimation using WSN based on multifrontal QR factorizationDaniel I. M. Quinones, Cintia B. Margi. 422-425 [doi]
- An approximation to rate-equalization fairness with logarithmic complexity for QoSJorge Arturo Cobb, Suparn Gupta. 426-429 [doi]
- An eigendecomposition based adaptive spatial sampling technique for wireless sensor networksSabri-E. Zaman, Manik Gupta, Raul J. Mondragón, Eliane L. Bodanese. 430-433 [doi]
- Characterizing the performance of beamforming WiFi access pointsMohammad Naghibi, Majid Ghaderi. 434-437 [doi]
- A cross layer routing scheme for passive RFID tag-to-tag communicationHaifeng Niu, S. Jagannathan. 438-441 [doi]
- A seamless handover for WSN using LMS filterWaltenegus Dargie, Jianjun Wen. 442-445 [doi]
- Standard-compliant simulation for self-organization schemes in LTE femtocellsKais Elmurtadi Suleiman, Abd-Elhamid M. Taha, Hossam S. Hassanein. 446-449 [doi]
- Modelling vegetation effects on RF propagationMohammad M. Bhuiyan, Mike H. MacGregor. 450-453 [doi]
- Evaluation of a hybrid multi-channel MAC protocol for periodic and burst trafficRana Diab, Gérard Chalhoub, Michel Misson. 454-457 [doi]
- Inbound interdomain traffic engineering with LISPDaniel Herrmann, Martin Turba, Arjan Kuijper, Immanuel Schweizer. 458-461 [doi]
- Towards stochastic flow-level network modeling: Performance evaluation of short TCP flowsFabien Geyer, Stefan Schneele, Georg Carle. 462-465 [doi]
- Cross-layer optimisation for topology design of wireless multicast networks via network codingQuoc-Tuan Vien, Wanqing Tu, Huan Xuan Nguyen, Ramona Trestian. 466-469 [doi]
- A distributed tracking algorithm for target interception in face-structured sensor networksEfren Lopes Souza, Richard W. Pazzi, Eduardo Freire Nakamura. 470-473 [doi]
- NCoS: A framework for realizing network coding over software-defined networkSicheng Liu, Bei Hua. 474-477 [doi]
- Optimal rate allocation and scheduling in cooperative streamingMohammad Reza Zakerinasab, Mea Wang. 478-481 [doi]
- Traffic Anomaly Detection in the presence of P2P trafficSardar Ali, Kui Wu, Hassan Khan. 482-485 [doi]
- Modeling for user interaction by influence transfer effect in online social networksQindong Sun, Nan Wang, Yadong Zhou, Hanqin Wang, Liansheng Sui. 486-489 [doi]
- A novel vehicular sensing framework for smart citiesJagruti Sahoo, Soumaya Cherkaoui, Abdelhakim Hafid. 490-493 [doi]
- Leveraging network virtualization for energy-efficient cloud: Future directionsFatoumata B. Kasse, Bamba Gueye, Halima Elbiaze. 494-497 [doi]
- On the possibility of mitigating content pollution in Content-Centric NetworkingIgor G. Ribeiro, Antonio Rocha, Célio Vinicius N. de Albuquerque, Flavio Guimaraes. 498-501 [doi]
- Anchor selection and Geo-Logical Routing in 3D Wireless Sensor NetworksYi Jiang, Anura P. Jayasumana. 502-505 [doi]
- A fine-grain partial MAC virtualization to support cross layer design in wireless ad hoc networksSeon-Yeong Han, Byoungheon Shin, Dongman Lee. 506-509 [doi]
- A stable minimum velocity CDS-based virtual backbone for VANET in city environmentMohammed Amine Togou, Abdelhakim Hafid, Pratap Kumar Sahu. 510-513 [doi]