Abstract is missing.
- LAMPS: A Loss Aware Scheduler for Multipath TCP over Highly Lossy NetworksEnhuan Dong, Mingwei Xu, Xiaoming Fu 0001, Yu Cao. 1-9 [doi]
- Utility-Gradient Implicit Cache Coordination Policy for Information-Centric Ad-Hoc Vehicular NetworksFelipe de Moraes Modesto, Azzedine Boukerche. 10-17 [doi]
- Pulse Arrival Scheduling for Nanonetworks Under Limited IoT Access BandwidthHang Yu, Bryan Ng, Winston K. G. Seah. 18-26 [doi]
- Mitigating On-Path Adversaries in Content-Centric NetworksCesar Ghali, Gene Tsudik, Christopher A. Wood. 27-34 [doi]
- Namespace Tunnels in Content-Centric NetworksIvan O. Nunes, Gene Tsudik, Christopher A. Wood. 35-42 [doi]
- CoMon++: Preventing Cache Pollution in NDN Efficiently and EffectivelyHani Salah, Mohammed Alfatafta, Saed SayedAhmed, Thorsten Strufe. 43-51 [doi]
- Efficient Crowd Sensing Task Distribution Through Context-Aware NDN-Based GeocastThe An Binh Nguyen, Pratyush Agnihotri, Christian Meurisch, Manisha Luthra, Rahul Chini Dwarakanath, Jeremias Blendin, Doreen Böhnstedt, Michael Zink, Ralf Steinmetz. 52-60 [doi]
- Optimal and Cost Efficient Algorithm for Virtual CDN OrchestrationHatem Ibn-Khedher, Emad Abd-Elrahman, Hossam Afifi, Michel Marot. 61-69 [doi]
- End-to-End Delay Evaluation of Industrial Automation Systems Based on EtherCATXuepei Wu, Lihua Xie. 70-77 [doi]
- Inter-Protocol Steganography for Real-Time Services and Its Detection Using Traffic Coloring ApproachFlorian Lehner, Wojciech Mazurczyk, Jörg Keller 0001, Steffen Wendzel. 78-85 [doi]
- Stop Screaming at Me: Avoiding Duplicates in Mesh/Push-Based Live Video StreamingJulian Wulfheide, Julius Rückert, David Hausheer. 86-94 [doi]
- mCast: An SDN-Based Resource-Efficient Live Video Streaming Architecture with ISP-CDN CollaborationAhmed Khalid, Ahmed H. Zahran, Cormac J. Sreenan. 95-103 [doi]
- MDTM: Optimizing Data Transfer Using Multicore-Aware I/O SchedulingLiang Zhang, Phil DeMar, Bockjoo Kim, Wenji Wu. 104-111 [doi]
- DeepContext: An OpenFlow-Compatible, Host-Based SDN for Enterprise NetworksMohamed E. Najd, Craig A. Shue. 112-119 [doi]
- Deterministic Confidence Interval Estimation of Networking Traffic in SDNLiang Yang, Bryan Ng, Winston K. G. Seah, Lindsay Groves. 120-127 [doi]
- Enforcing Transport-Agnostic Congestion Control in SDN-Based Data CentersAhmed M. Abdelmoniem, Brahim Bensaou. 128-136 [doi]
- Multi-controller Traffic Engineering in Software Defined NetworksVignesh Sridharan, Mohan Gurusamy, Tram Truong Huu. 137-145 [doi]
- BLAC: A Bindingless Architecture for Distributed SDN ControllersVictoria Huang, Qiang Fu, Gang Chen, Elliott Wen, Jonathan Hart. 146-154 [doi]
- Development of Unique Identity for E-Health Sensor Node in EHEART Passwordless Authentication ProtocolNazhatul Hafizah Kamarudin, Yusnani Mohd Yussoff, Nurhaflyza Marbukhari, Mustaffa Samad, Habibah Hashim. 155-158 [doi]
- Effective AP Association in SDWN Based on Signal Strength and Occupancy RateFernando Rodrigues de Sa, Adilson Marques da Cunha, Cecília de Azevedo Castro Cesar. 159-162 [doi]
- Leveraging Localisation Techniques for In-Network Duplicate Event Data Detection and FilteringJakob Pfender, Winston K. G. Seah. 163-166 [doi]
- Reliable Machine Learning for Networking: Key Issues and ApproachesChristian A. Hammerschmidt, Sebastian Garcia, Sicco Verwer, Radu State. 167-170 [doi]
- Repair Scheme for Wireless Coded Storage NetworksCheng Zhan, Zhe Wen. 171-174 [doi]
- Optimizing Caching Placement for Mobile Users in Heterogeneous Wireless NetworkCheng Zhan, Guo Yao. 175-178 [doi]
- A Diagnostic Tool for Ad-Hoc and Delay-Tolerant NetworksEdoardo Biagioni. 179-182 [doi]
- Measuring Privacy in Vehicular NetworksIsabel Wagner. 183-186 [doi]
- The Spatiotemporal Interplay of Regularity and Randomness in Cellular Data TrafficGuangshuo Chen, Sahar Hoteit, Aline Carneiro Viana, Marco Fiore, Carlos Sarraute. 187-190 [doi]
- Distributed and Collaborative Malware Analysis with MASSFabian Rump, Timm Behner, Raphael Ernst. 191-194 [doi]
- SEDCOS: A Secure Device-to-Device Communication System for Disaster ScenariosFlorian Kohnhäuser, Milan Stute, Lars Baumgärtner, Lars Almon, Stefan Katzenbeisser 0001, Matthias Hollick, Bernd Freisleben. 195-198 [doi]
- On the Dimension Reduction of Radio Maps with a Supervised ApproachBing Jia, Baoqi Huang, Hepeng Gao, Wuyungerile Li. 199-202 [doi]
- Minicamp: Prototype for Partial Participation in Structured Peer-to-Peer Monitoring ProtocolsAndreas Disterhöft, Kálmán Graffi. 203-206 [doi]
- EarlyDrop: A Trade-off Driven DDoS Defense Mechanism for Software-Defined InfrastructuresRobert Bauer, Hauke Heseding, Matthias Flittner. 207-210 [doi]
- Flipping the Data Center Network: Increasing East-West Capacity Using Existing HardwareH. Robert H. Andersson, Andreas de Blanche, Thomas Lundqvist. 211-214 [doi]
- TCP LoLa: Congestion Control for Low Latencies and High ThroughputMario Hock, Felix Neumeister, Martina Zitterbart, Roland Bless. 215-218 [doi]
- Towards a Secure Access Control Architecture for the Internet of ThingsShantanu Pal, Michael Hitchens, Vijay Varadharajan. 219-222 [doi]
- Simultaneous Optimization of User-Centric Security-Conscious Data Storage on Cloud PlatformsXiaoli Wang, Kale Rahul Vishwanath, Bharadwaj Veeravalli. 223-226 [doi]
- Impact of Development and Governance Factors on IPv4 Address OwnershipHaibo Wang, Jilong Wang, Jing'an Xue. 227-230 [doi]
- 100 Gbit/s End-to-End Communication: Low Overhead On-Demand Protocol Replacement in High Data Rate Communication SystemsSteffen Büchner, Jörg Nolte, Alireza Hasani, Rolf Kraemer. 231-234 [doi]
- On the Wireless Extension of EtherCAT NetworksXuepei Wu, Lihua Xie. 235-238 [doi]
- Propagation Loss Aware Routing in Wireless Nanosensor Networks Having Directional Nano-AntennasSuraiya Tairin, A. B. M. Alim Al Islam. 239-242 [doi]
- Share or Not: Investigating the Presence of Large-Scale Address Sharing in the InternetSebastian Zander, David Murray. 243-251 [doi]
- Experimental Evaluation of Less-Than-Best-Effort TCP Congestion Control MechanismsKevin Ong, Sebastian Zander, David Murray, Tanya J. McGill. 252-260 [doi]
- A Sequence Learning Model with Recurrent Neural Networks for Taxi Demand PredictionJun Xu, Rouhollah Rahmatizadeh, Ladislau Bölöni, Damla Turgut. 261-268 [doi]
- Data Transfer Advisor with Transport Profiling OptimizationDaqing Yun, Chase Q. Wu, Nageswara S. V. Rao, Qiang Liu, Rajkumar Kettimuthu, Eun Sung Jung. 269-277 [doi]
- Characterising LEDBAT Performance Through Bottlenecks Using PIE, FQ-CoDel and FQ-PIE Active Queue ManagementRasool Al-Saadi, Grenville Armitage, Jason But. 278-285 [doi]
- Improving Energy Efficiency of MQTT-SN in Lossy Environments Using Seed-Based Network CodingBertram Schütz, Jan Bauer, Nils Aschenbruck. 286-293 [doi]
- Measuring and Adapting MQTT in Cellular Networks for Collaborative Smart FarmingJan Bauer, Nils Aschenbruck. 294-302 [doi]
- Keep the Beat: On-The-Fly Clock Offset Compensation for Synchronous Transmissions in Low-Power NetworksMartina Brachmann, Olaf Landsiedel, Silvia Santini. 303-311 [doi]
- Viscous: An End to End Protocol for Ubiquitous Communication Over Internet of EverythingAbhijit Mondal, Sourav Bhattacharjee, Sandip Chakraborty. 312-320 [doi]
- Are Wearables Ready for HTTPS? On the Potential of Direct Secure Communication on WearablesHarini Kolamunna, Jagmohan Chauhan, Yining Hu, Kanchana Thilakarathna, Diego Perino, Dwight J. Makaroff, Aruna Seneviratne. 321-329 [doi]
- Reclaim Your Prefix: Mitigation of Prefix Hijacking Using IPsec TunnelsMatthias Wübbeling, Michael Meier 0001. 330-338 [doi]
- Few Throats to Choke: On the Current Structure of the InternetH. B. Acharya, Sambuddho Chakravarty, Devashish Gosain. 339-346 [doi]
- Enabling Privacy Preserving Mobile Advertising via Private Information RetrievalImdad Ullah, Babil Golam Sarwar, Roksana Boreli, Salil S. Kanhere, Stefan Katzenbeisser 0001, Matthias Hollick. 347-355 [doi]
- ANONUS: Anonymous Bonus Point System with Fraud DetectionSamuel Brack, Stefan Dietzel, Björn Scheuermann. 356-364 [doi]
- Can You Get into the Middle of Near Field Communication?Sajeda Akter, Tusher Chakraborty, Taslim Arefin Khan, Sriram Chellappan, A. B. M. Alim Al Islam. 365-373 [doi]
- Accelerating Yield Mapping at Low Data Rates Using Compressive Field EstimateThomas Hänel, Nils Aschenbruck. 374-382 [doi]
- Magnetic Induction Based Sensing and Localization for Fresh Food LogisticsAmitangshu Pal, Krishna Kant. 383-391 [doi]
- IEEE 802.11ac Link Adaptation Under MobilityRaja Karmakar, Samiran Chattopadhyay, Sandip Chakraborty. 392-400 [doi]
- On Building an Indoor Radio Map from Crowdsourced Samples with Annotation ErrorsYanzhen Ye, Bang Wang. 401-408 [doi]
- Take it or Leave it: Decentralized Resource Allocation in Mobile NetworksPatrick Lieser, Nils Richerzhagen, Tim Feuerbach, Leonhard Nobach, Doreen Böhnstedt, Ralf Steinmetz. 409-417 [doi]
- High Performance Intrusion Detection Using HTTP-Based Payload AggregationFelix Erlacher, Falko Dressler. 418-425 [doi]
- A General Formalism for Defining and Detecting OpenFlow Rule AnomaliesRamtin Aryan, Anis Yazidi, Paal Einar Engelstad, Øivind Kure. 426-434 [doi]
- Triviback: A Storage-Efficient Secure Backup SystemDominik Leibenger, Christoph Sorge. 435-443 [doi]
- Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks RevisitedLars Almon, Michael Riecker, Matthias Hollick. 444-452 [doi]
- Topology Maps for 3D Millimeter Wave Sensor Networks with Directional AntennasAshanie Gunathillake, Marjan Moradi, Kanchana Thilakarathna, Anura P. Jayasumana, Andrey V. Savkin. 453-461 [doi]
- Supporting Throughput Fairness in IEEE 802.11ac Dynamic Bandwidth Channel Access: A Hybrid ApproachKumar Ayush, Raja Karmakar, Varun Rawal, Pradyumna Kumar Bishoyi, Samiran Chattopadhyay, Sandip Chakraborty. 462-470 [doi]
- Network Under Limited Mobile Sensors: New Techniques for Weighted Target Coverage and Sensor ConnectivityNgoc-Tu Nguyen, Bing-Hong Liu, Shih-Yuan Wang. 471-479 [doi]
- Effective Lossless Compression of Sensor Information in Manufacturing IndustryHagen Sparka, Roman Naumann, Stefan Dietzel, Björn Scheuermann. 480-488 [doi]
- GoMacH: A Traffic Adaptive Multi-channel MAC Protocol for IoTShuguo Zhuo, Ye-Qiong Song. 489-497 [doi]
- Delay Oriented Content Placement and Request Redirection for Mobile-CDNJiayi Liu, Qinghai Yang, Gwendal Simon. 498-501 [doi]
- Q-Learning Based Co-Operative Spectrum Mobility in Cognitive Radio NetworksAvirup Das, Sasthi C. Ghosh, Nabanita Das, Abhirup Das Barman. 502-505 [doi]
- A Testing Framework for High-Speed Network and Security DevicesLeonard Bradatsch, Thomas Lukaseder, Frank Kargl. 506-509 [doi]
- QoE-Aware Task Offloading for Time Constraint Mobile ApplicationsZikai Zhang, Jigang Wu, Guiyuan Jiang, Long Chen, Siew Kei Lam. 510-513 [doi]
- Interconnect Energy Savings and Lower Latency Networks in Hadoop Clusters: The Missing LinkRenan Fischer e Silva, Paul M. Carpenter. 514-517 [doi]
- Video Workload Characteristics of Online Porn: Perspectives from a Major Video Streaming ServiceBenjamin Farrelly, Yiying Sun, Aniket Mahanti, Mingwei Gong. 518-519 [doi]
- Understanding Uploader Motivations and Sharing Dynamics in the One-Click Hosting EcosystemWilliam Thomson, Aniket Mahanti, Mingwei Gong. 520-522 [doi]
- Unsupervised Traffic Flow Classification Using a Neural AutoencoderJonas Hochst, Lars Baumgärtner, Matthias Hollick, Bernd Freisleben. 523-526 [doi]
- Application of Fault Management to Information-Centric NetworkingPaul Duggan, Stefan Weber. 527-530 [doi]
- Data Exchange in Self-Organizing Wireless Networks with Low LatencyEugeny S. Sagatov, Sophia V. Timofeeva, Dmitry V. Filimonov, Andrei M. Sukhov. 531-534 [doi]
- Indoor Location for Smart Environments with Wireless Sensor and Actuator NetworksZhongliang Zhao, Stephane Kuendig, Jose Carrera, Blaise Carron, Torsten Braun, Jose Rolim. 535-538 [doi]
- Exploring a New Proactive Algorithm for Resource Management and Its Application to Wireless Mobile EnvironmentsVishnu Vardhan Paranthaman, Yonal Kirsal, Glenford Mapp, Purav Shah, Huan Xuan Nguyen. 539-542 [doi]
- Wireless Positioning Sensor Network Integrated with Cloud for Industrial AutomationSikder M. Kamruzzaman, Muhammad Jaseemuddin, Xavier Fernando, Peyman Moeini. 543-546 [doi]
- A Hole-Bypassing Routing Algorithm for WANETsChien-Fu Cheng, Sheng-Ling Lin. 547-550 [doi]
- Modeling WiFi Traffic for White Space Prediction in Wireless Sensor NetworksIndika Sanjeewa Abeywickrama Dhanapala, Ramona Marfievici, Sameera Palipana, Piyush Agrawal, Dirk Pesch. 551-554 [doi]
- Detecting Covert Channels in FPS Online GamesSebastian Zander. 555-558 [doi]
- A Caching Miss Ratio Aware Path Selection Algorithm for Information-Centric NetworksWeihong Lin, Xinggong Zhang, Yu Guan, Ken Chen, Zongming Guo. 559-562 [doi]
- Identifying the Performance Impairment of HTTPJens Heuschkel, Jens Forstmann, Lin Wang, Max Mühlhäuser. 563-566 [doi]
- Modelling Software-Defined Networking: Switch Design with Finite Buffer and Priority QueueingDeepak Singh, Bryan Ng, Yuan-Cheng Lai, Ying-Dar Lin, Winston K. G. Seah. 567-570 [doi]
- Scheduling Methods to Improve the Performance of Heterogeneous Periodic Flows in Wireless Sensor NetworksAnh Huy Nguyen, Yosuke Tanigawa, Hideki Tode. 571-574 [doi]
- On the Applicability of Onion Routing on Predictable Delay-Tolerant NetworksDepeng Chen, Guillermo Navarro-Arribas, Joan Borrell. 575-578 [doi]
- Geographically-Distinct Request Patterns for Caching in Information-Centric NetworksAlireza Montazeri, Dwight J. Makaroff. 579-582 [doi]
- Stratosphere: Dynamic IP Overlay Above the CloudsParinya Ekparinya, Vincent Gramoli, Guillaume Jourjon, Liming Zhu. 583-586 [doi]
- Funplace: A Protocol for Network Function PlacementAnix Anbiah, Krishna M. Sivalingam. 587-590 [doi]
- Proposed Matching Scheme with Confidence and Prediction Uncertainty in Shared EconomyLonghua Guo, Jie Wu 0001, Wei Chang, Jun Wu, Jianhua Li. 591-594 [doi]
- Sensor Placement Based on an Improved Genetic Algorithm for Connected Confident Information Coverage in an Area with ObstaclesLu Dai, Bang Wang. 595-598 [doi]
- QoE-Based Framework to Optimize User Perceived Video QualityLamine Amour, M. Sajid Mushtaq, Sami Souihi, Abdelhamid Mellouk. 599-602 [doi]
- Does the Presence of Streamers Harm the Overall Performance of BitTorrent Swarms?Daniel Vasconcelos Correa da Silva, Antonio Augusto de Aragão Rocha. 603-606 [doi]
- Privacy-Preserving Content Delivery NetworksShujie Cui, Muhammad Rizwan Asghar, Giovanni Russello. 607-610 [doi]
- Access Mechanism for Outsourced Data by Preserving Data Owner's PreferenceMosarrat Jahan, Aruna Seneviratne, Sanjay Jha. 611-614 [doi]
- ATPS: Adaptive Transmission Power Selection for Communication in Wireless Body Area NetworksAbbas Arghavani, Haibo Zhang 0001, Zhiyi Huang 0001, Yawen Chen. 615-618 [doi]
- An Extensible Host-Agnostic Framework for SDN-Assisted DDoS-MitigationThomas Lukaseder, Alexander Hunt, Christian Stehle, Denis Wagner, Rens Wouter van der Heijden, Frank Kargl. 619-622 [doi]
- sec-cs: Getting the Most out of Untrusted Cloud StorageDominik Leibenger, Christoph Sorge. 623-631 [doi]
- Zcopy-vhost: Eliminating Packet Copying in Virtual Network I/ODongyang Wang, Bei Hua, Li Lu, Heqing Zhu, Cunming Liang. 632-639 [doi]
- Energy-Efficient Resource Allocation for Cache-Assisted Mobile Edge ComputingYing Cui, Wen He, Chun Ni, Chengjun Guo, Zhi Liu. 640-648 [doi]
- Bare-Metal Switches and Their Customization and Usability in a Carrier-Grade EnvironmentLeonhard Nobach, Jeremias Blendin, Hans-Jörg Kolbe, Georg Schyguda, David Hausheer. 649-657 [doi]
- Systematic IP Prefix Assignment for Compact Router Forwarding TablesDaron Miller, Xin Sun. 658-666 [doi]
- Predictive Traffic Engineering with 2-Segment Routing Considering Requirements of a Carrier IP NetworkTimmy Schuller, Nils Aschenbruck, Markus Chimani, Martin Horneffer, Stefan Schnitter. 667-675 [doi]
- ProxyDetector: A Guided Approach to Finding Web ProxiesZhipeng Chen, Peng Zhang, Qingyun Liu. 676-682 [doi]
- An Enhanced EPC Gen2v2 RFID Authentication and Ownership Management ProtocolEyad Taqieddin, Hiba Al-Dahoud, Moad Mowafi, Omar Banimelhem. 683-689 [doi]