


default search action
20th ICCCN 2011: Maui, Hawaii, USA
- Haohong Wang, Jin Li, George N. Rouskas, Xiaobo Zhou:

Proceedings of 20th International Conference on Computer Communications and Networks, ICCCN 2011, Maui, Hawaii, USA, July 31 - August 4, 2011. IEEE 2011, ISBN 978-1-4577-0637-0 - Wei Zhang, Jun Bi

, Jianping Wu, Baobao Zhang:
Caching Popular BGP Prefixes with Grey Modeling Prediction. 1-6 - Jiang Zhu, Ying Zhang:

Towards Accountable Mobility Model: A Language Approach on User Behavior Modeling in Office WLAN. 1-6 - Haiying Shen, Guoxin Liu:

Harmony: Integrated Resource and Reputation Management for Large-Scale Distributed Systems. 1-6 - Haifan Yao

, Yue Ji:
Security Protection for Online Learning of Music. 1-4 - Claudio E. Palazzi

, Armir Bujari
, Stefano Bonetta, Gustavo Marfia
, Marco Roccetti
, Alessandro Amoroso:
MDTN: Mobile Delay/Disruption Tolerant Network. 1-6 - Jiancun Fan, Qinye Yin, Geoffrey Ye Li, Bingguang Peng, Xiaolong Zhu:

Adaptive Block-Level Resource Allocation in OFDMA Networks. 1-5 - Jiancun Fan, Qinye Yin, Geoffrey Ye Li, Bingguang Peng, Xiaolong Zhu:

MCS Selection for Throughput Improvement in Downlink LTE Systems. 1-5 - Haiying Shen, Lianyu Zhao:

Refining Reputation to Truly Select High-QoS Servers in Peer-to-Peer Networks. 1-6 - Shanshan Lu, Gautam Chavan, Yanliang Liu, Yonghe Liu:

Design and Analysis of a Mobile File Sharing System for Opportunistic Networks. 1-6 - Pei-Jung Lin

, Chyi-Ren Dow, Lu-Hui Huang, Shiow-Fen Hwang:
A Hybrid Adaptive Traffic Control Strategy in Wireless Mesh Networks. 1-5 - Sangho Lee, Kiseon Kim:

Determination of Communication Range for Range-Free Multi-Hop Localization in Wireless Sensor Networks. 1-4 - Gustavo Marfia

, Alessandro Amoroso, Marco Roccetti
, Giulio Basile, Claudio E. Palazzi
:
Video Games at the Library: A Historical Perspective. 1-6 - Andrea Vesco

, Riccardo Scopigno:
Advances on Time-Division Unbalanced Carrier Sense Multiple Access. 1-6 - Alessandro Amoroso, Gustavo Marfia

, Marco Roccetti
, Claudio E. Palazzi
:
A Simulative Evaluation of V2V Algorithms for Road Safety and In-Car Entertainment. 1-6 - Bong-seok Kim, Kwonhue Choi:

Timing Offsets-Resilient OFDMA for Asynchronous Wireless Ad Hoc Networks. 1-5 - Brigitte Jaumard, Rejaul Chowdhury:

Location and Allocation of Switching Equipment (Splitters/AWGs) in a WDM PON Network. 1-8 - Jin Hirose, Ken-ichi Baba, Hirotake Abe:

A Protocol-Aware Network Control Method for Large-Scale Data Transfer in Long-Distance Broadband Networks. 1-6 - Hua Yu, Kai Zeng, Prasant Mohapatra:

Measurement-Based Short-Term Performance Prediction in Wireless Mesh Networks. 1-6 - Matthias Kuba, Karlheinz Ronge, Robert Weigel:

Decision-Theoretic Communication Standard Recognition in the European 868 MHz Band. 1-4 - Gul N. Khan

, Jack Yu, Fei Yuan:
XTEA Based Secure Authentication Protocol for RFID Systems. 1-6 - Xukai Zou, Fabio Maino, Elisa Bertino, Yan Sui, Kai Wang, Feng Li:

A New Approach to Weighted Multi-Secret Sharing. 1-6 - Yan Sui, Xukai Zou, Eliza Yingzi Du:

Biometrics-Based Authentication: A New Approach. 1-6 - Arslan Munir

, Ann Gordon-Ross:
Markov Modeling of Fault-Tolerant Wireless Sensor Networks. 1-6 - Toshiaki Miyazaki, Daiki Shitara, Ryouhei Kawano, Yuji Endo, Yuuki Tanno, Hidenori Igari:

Robust Wireless Sensor Network Featuring Automatic Function Alternation. 1-6 - Surjeet Mishra, Atul Agarwal, Vinay Khemka, Geetika Sharma

:
Enhancing Enterprise Virtual Worlds with Real-World Event Information. 1-4 - Cristina Fonseca, José Mocito, Luís E. T. Rodrigues:

Low-Coupling Cluster-Based Multipath Routing for Wireless Mesh Networks. 1-6 - Michael P. McGarry, Martin Reisslein

, Frank Aurzada, Michael Scheutzow:
Impact of EPON DBA Components on Performance. 1-5 - Mohammad Al-Mutawa, Shivakant Mishra:

CID3: System Support for Loosely-Coupled Personal Computing Environments. 1-6 - David López-Pérez, Xiaoli Chu

:
Inter-Cell Interference Coordination for Expanded Region Picocells in Heterogeneous Networks. 1-6 - Michael P. McGarry, Rosish Shakya, Mesrob I. Ohannessian, Rony Ferzli:

Optimal Caching Router Placement for Reduction in Retransmission Delay. 1-8 - Marion Souil, Abdelmadjid Bouabdallah:

On QoS Provisioning in Context-Aware Wireless Sensor Networks for Healthcare. 1-6 - Jens Buysse, Konstantinos Georgakilas, Anna Tzanakaki

, Marc De Leenheer, Bart Dhoedt, Chris Develder
, Piet Demeester:
Calculating the Minimum Bounds of Energy Consumption for Cloud Networks. 1-7 - Bjoern Dusza, Christian Wietfeld

:
QDV - A QoS Enabled Packet Scheduling Scheme for Mobile WiMAX in UAV Swarms. 1-5 - Yasamine Zrelli, Mélanie Marazin, Roland Gautier, Eric Rannou:

Blind Identification of Convolutional Encoder Parameters over GF(2m) in the Noiseless Case. 1-5 - Oleksandr Artemenko, Gunar Schorcht, Sebastian Mann, Dominik Schulz, Mikhail Tarasov:

A Groupwise Universal Improvement Scheme for Location Estimation in Wireless Networks. 1-5 - Matthias Zeppelzauer

, Dalibor Mitrovic, Christian Breiteneder:
Cross-Modal Analysis of Audio-Visual Film Montage. 1-6 - Guangwu Hu, Jianping Wu, Ke Xu, Wenlong Chen:

SAVT: A Practical Scheme for Source Address Validation and Traceback in Campus Network. 1-8 - Saleh Al-shadly, Omar Alfandi

, Henrik Brosenne, Dieter Hogrefe:
Security Verification of Trust-Based Authentication Handover in IP Networks. 1-6 - HyunYong Lee, Masahiro Yoshida, Akihiro Nakao

:
Multi-Swarm Collaboration for Improving Content Availability in Swarming Systems. 1-6 - Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda:

TPP: The Two-Way Password Protocol. 1-6 - Taehwan Choi, Mohamed G. Gouda:

HTTPI: An HTTP with Integrity. 1-6 - Mahshid Rahnamay-Naeini, Jorge E. Pezoa

, Ghady Azar, Nasir Ghani, Majeed M. Hayat:
Modeling Stochastic Correlated Failures and their Effects on Network Reliability. 1-6 - Qi Li, Mingwei Xu, Jianping Wu, Patrick P. C. Lee

, Ke Xu:
An Algebraic Approach to Computing the Reliability of Internet Routing. 1-6 - Patrick-Benjamin Bök, Stephanie Dünhaupt:

A Simulative Performance Study of the Semantic QoS Provisioning Scheme sQoS. 1-6 - Liuju Wu, Maciej J. Zawodniok

:
Cooperative Approaches Indicating to Capacity and Power Control for Ad Hoc Wireless Network. 1-6 - Andreas Grau, Klaus Herrmann, Kurt Rothermel:

NETbalance: Reducing the Runtime of Network Emulation Using Live Migration. 1-6 - Márton Csernai, András Gulyás:

Wireless Adapter Sleep Scheduling Based on Video QoE: How to Improve Battery Life When Watching Streaming Video? 1-6 - Maurizio Casoni

, Walter Cerroni
:
End-to-End Performance of Heterogeneous Multi-EPON/OBS Networks. 1-6 - Laercio Cruvinel, Teresa Maria Vazão

:
Profile-Based Adaptive DiffServ Policing with Learning Techniques. 1-7 - Emir Halepovic, Carey Williamson, Majid Ghaderi:

DYNABYTE: A Dynamic Sampling Algorithm for Redundant Content Detection. 1-8 - Andong Zhan, Fan Wu, Guihai Chen

:
SOS: A Safe, Ordered, and Speedy Emergency Navigation Algorithm in Wireless Sensor Networks. 1-6 - Hao Shen, Qinru Qiu:

An FPGA-Based Distributed Computing System with Power and Thermal Management Capabilities. 1-6 - S. Srinivasan:

An Assessment of Technologies for In-Home Entertainment. 1-6 - Aditya V. Padaki, Maciej J. Zawodniok

:
Theoretical Capacity Analysis for Multi-Hop Backscatter Communication Networks. 1-6 - Patrick-Benjamin Bök, York Tüchelmann:

Context-Aware QoS Control for Wireless Mesh Networks of UAVs. 1-6 - Faisal Nawab, Kamran Jamshaid, Basem Shihada

, Pin-Han Ho:
TMAC: Timestamp-Ordered MAC for CSMA/CA Wireless Mesh Networks. 1-6 - Quan Jia, Kun Sun, Angelos Stavrou

:
CapMan: Capability-Based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET. 1-6 - Abdennour El Rhalibi, Chris Carter, Simon Cooper, Madjid Merabti:

Highly Realistic MPEG-4 Compliant Facial Animation with Charisma. 1-6 - Matin Bagherpour, Mehdi Sharifyazdi, Øivind Kure:

A Revenue Maximization Model for Call Admission Control Problem of Media on Demand Service Providers. 1-7 - Kien Nguyen, Thinh P. Nguyen, Viet Le, Yevgeniy Kovchegov

:
P2P Distributed Data Replenishment. 1-6 - Eyuphan Bulut, Boleslaw K. Szymanski

:
On Secure Multi-Copy Based Routing in Compromised Delay Tolerant Networks. 1-7 - Wei Liu, E. K. Park:

e-Health Service Characteristics and QoS Guarantee. 1-5 - Sanghwan Lee, Youngjun Lee, Min Sun Jeong, Sambit Sahu:

Mesh Router Placement Exploiting Obstacles for Mitigating Interference. 1-6 - Yang Wang, Xiaojun Cao

:
Wavelength Retuning in Optical Waveband Switching Networks. 1-6 - Seung-woo Kum, Kyung Won Kim, Yun-Ju Lee, Tae-Beom Lim, Seok-Pil Lee:

Design and Implementation of Aggregation Framework for UPnP/DLNA Media Server. 1-4 - Deli Jia, Gang Wu

, Shaoqian Li, Geoffrey Ye Li, Xiaolong Zhu:
Dynamic Soft-Frequency Reuse with Inter-Cell Coordination in OFDMA Networks. 1-6 - Xusheng Sun, Edward J. Coyle

:
Optimal Energy-Aware Distributed Estimation in Wireless Sensor Networks. 1-6 - Kazufumi Yogo, Akihiro Kida, Ryoichi Shinkuma

, Tatsuro Takahashi, Hiroyuki Kasai
, Kazuhiro Yamaguchi:
Extraction of Hidden Common Interests between People Using New Social-Graph Representation. 1-6 - Tianyang Li, Fuye Han, Shuai Ding, Zhen Chen:

LARX: Large-Scale Anti-Phishing by Retrospective Data-Exploring Based on a Cloud Computing Platform. 1-5 - Tiia Sutinen, Helena Rivas:

Cross-Layer Assisted Network Interface Selection for Multi-Interface Video Streaming. 1-6 - Lu Lu, Ming Xiao, Lars K. Rasmussen:

Relay-Aided Broadcasting with Instantaneously Decodable Binary Network Codes. 1-5 - Johan Eklund, Karl-Johan Grinnemo, Anna Brunström, Georgios Cheimonidis, Yuri Ismailov:

Impact of Slow Start on SCTP Handover Performance. 1-7 - Xiaolong Li, Homayoun Yousefi'zadeh:

A Hybrid Cross-Layer Routing Protocol for MANETs. 1-6 - Yongkun Li, John C. S. Lui:

Friends or Foes: Detecting Dishonest Recommenders in Online Social Networks. 1-6 - Yongkun Li, John C. S. Lui:

Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks. 1-6 - Bingxuan Zhao, Shigeru Shimamoto:

Energy-Aware Cooperative Spectrum Sensing with Inter-Channel Interference Cancellation for Cognitive Radio Networks. 1-6 - Guillaume de la Roche, Jean-Frédéric Wagen, Guillaume Villemaud, Jean-Marie Gorce

, Jie Zhang
:
Comparison between Two Implementations of ParFlow for Simulating Femtocell Networks. 1-4 - Krishna Balachandran, Joseph H. Kang, Mehmet Kemal Karakayali, Kiran M. Rege:

Seamless Macro-Cell Anchored Radio Transmission for Enhanced Downlink Performance in Heterogeneous Networks. 1-5 - Tiffany Hyun-Jin Kim, Virgil D. Gligor, Adrian Perrig:

A Picture is Worth a Thousand Words: Improving Usability and Robustness of Online Recommendation Systems. 1-6 - Cairong Zou, Chengwei Huang

, Dong Han, Li Zhao:
Detecting Practical Speech Emotion in a Cognitive Task. 1-5 - Angelo Coiro, Flavio Iervini, Marco Listanti

:
Distributed and Adaptive Interface Switch Off for Internet Energy Saving. 1-8 - Guido Maier, Paolo Valzasina, Achille Pattavina:

AWG-Based Shuffle-Exchange Optical-Interconnection Architectures. 1-6 - Jia Bai, Yuan Xue:

Understanding the Impact of Neighborhood Information on End-to-End Fairness in Multi-Hop Wireless Networks. 1-8 - Tareq Hossain, Yi Cui:

Sum-Product Based Optimization for Scalable Video Streams in Peer-to-Peer Mesh Network. 1-8 - Patricia Ruiz

, Bernabé Dorronsoro
, Pascal Bouvry
:
Optimization and Performance Analysis of the AEDB Broadcasting Algorithm. 1-6 - Kyungtae Kang, Dong Kun Noh

:
Performance Assessment of Wireless ECG Transmission over IEEE 802.11 WLANs. 1-5 - Tieying Zhang, Zhenhua Li, Huawei Shen, Yan Huang, Xueqi Cheng:

A White-Box Empirical Study of P2P-VoD Systems: Several Unconventional New Findings. 1-6 - Markus Luoto, Teemu Rautio, Jukka Mäkelä:

Providing Support for Legacy IPv4 Applications in IPv6 Network with Network Aware Mobility. 1-6 - Matadeen Bansal

, Aditya Trivedi:
Joint Routing and Stream Control Scheduling in MIMO-Based WMNs. 1-6 - Inho Choi, Seungchul Han, Daijin Kim:

Eye Detection and Eye Blink Detection Using AdaBoost Learning and Grouping. 1-4 - Zhengping Wu, Yuanyao Liu:

Knowledge-Based Policy Conflict Analysis in Mobile Social Networks. 1-6 - Scott Shepard, Douglas Schmidt:

Traditional and Reacquisition-Induced Outage Prediction for DSSS and OFDMA Systems on Multipath Fading Channels. 1-6 - Marc Mosko

, Ignacio Solis, J. J. Garcia-Luna-Aceves:
Ring Optimal Assignment of Slot Reservations for Cyclic TDMA Protocols. 1-8 - Sarah Gallacher, Elizabeth Papadopoulou, Nick K. Taylor

, Fraser R. Blackmun, M. Howard Williams, Ioanna Roussaki, Nikos Kalatzis
, Nicolas Liampotis
, Daqing Zhang:
Personalisation in a System Combining Pervasiveness and Social Networking. 1-6 - Joohwan Kim, R. Srikant:

Achieving the Maximum P2P Streaming Rate Using a Small Number of Trees. 1-6 - Anand V. Panangadan, Ashit Talukder:

Interleaving Wavelet Coefficients for Adaptive Data Transmission from Pervasive Sensing Systems. 1-6 - Richard Süselbeck, Florian Heger, Gregor Schiele, Christian Becker

:
Challenges for Selecting Optimal Coordinators in Peer-to-Peer-Based Massively Multi-User Virtual Environments. 1-6 - Bora Karaoglu, Ilker Demirkol

, Wendi B. Heinzelman
:
Exploring the Benefits of Symbiotic Routing. 1-6 - Konrad Jünemann, Philipp Andelfinger

, Hannes Hartenstein:
Towards a Basic DHT Service: Analyzing Network Characteristics of a Widely Deployed DHT. 1-7 - Abderrahmen Mtibaa, Khaled A. Harras

:
Social Forwarding in Large Scale Networks: Insights Based on Real Trace Analysis. 1-8 - Casey T. Deccio, Jeff Sedayao, Krishna Kant, Prasant Mohapatra:

Quantifying and Improving DNSSEC Availability. 1-7 - Yingnan Zhu, Hang Liu, Yang Guo, Wenjun Zeng

:
Network Assisted Media Streaming in Multi-Hop Wireless Networks. 1-7 - Chenghao Liu, Imed Bouazizi, Moncef Gabbouj

:
Parallel Adaptive HTTP Media Streaming. 1-6 - Ryota Yoshizawa

, Hideki Ochiai
:
Peak Power Reduction of OFDM Signals Using Trellis Shaping with M-Algorithm. 1-5 - Amin Ranjbar, Muthucumaru Maheswaran:

Community-Centric Approaches for Confidentiality Management in Online Systems. 1-6 - Chih-Ping Tsu, Dah-Chung Chang:

Modulation Classification for M-ary CPM Signals: Based on PAM Decomposition and Phase Detection Methods. 1-5 - Hyung Rai Oh, Hwangjun Song:

Mesh-Pull-Based P2P Video Streaming System Using Fountain Codes. 1-6 - Hsieh-Chung Chen, H. T. Kung:

Separation-Based Joint Decoding in Compressive Sensing. 1-6 - Sejun Song, Hyungbae Park, Baek-Young Choi

:
STEP: Source Traceability Elimination for Privacy against Global Attackers in Sensor Networks. 1-6 - Zhenzhen Ye, Alhussein A. Abouzeid

:
Layered Sequential Decision Policies for Cross-Layer Design of Wireless Ad-Hoc Networks. 1-6 - Dah-Chung Chang, Shih-Kang Wang:

Modified Decision Feedback Channel Estimation Method for Mobile OFDM Systems. 1-6 - Danai Chasaki, Qiang Wu, Tilman Wolf

:
Attacks on Network Infrastructure. 1-8 - Shervin Sharifi, Yen-Kuan Wu, Tajana Simunic Rosing:

Temperature-Aware Scheduling for Embedded Heterogeneous MPSoCs with Special Purpose IP Cores. 1-6 - Shuang Li, Eylem Ekici

, Ness B. Shroff:
Power Control for AP-Based Wireless Networks under the SINR Interference Model: Complexity and Efficient Algorithm Development. 1-6 - Ying Zhang, Mark Quilling:

Optimal Backbone Generation for Robotic Relay Networks. 1-6 - Shintaro Izumi, Hiroki Noguchi, Tomoya Takagi, Koji Kugata, Shinpei Soda, Masahiko Yoshimoto, Hiroshi Kawaguchi

:
Data Aggregation Protocol for Multiple Sound Sources Acquisition with Microphone Array Network. 1-6 - Kyle Bradford, Max Brugger, Samina Ehsan, Bechir Hamdaoui, Yevgeniy Kovchegov

:
Data Loss Modeling and Analysis in Partially-Covered Delay-Tolerant Networks. 1-7 - Martin Szydlowski, Ben Y. Zhao, Engin Kirda, Christopher Kruegel:

BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients. 1-6 - Bechir Hamdaoui, MohammadJavad NoroozOliaee, Kagan Tumer, Ammar Rayes:

Aligning Spectrum-User Objectives for Maximum Inelastic-Traffic Reward. 1-6 - Tian Song, Dongsheng Wang:

Another CDFA Based Multi-Pattern Matching Algorithm and Architecture for Packet Inspection. 1-8 - Xiaobing Wu, Shen Li, Guihai Chen

:
Aggregation-Friendly Data Collection Protocol of Wireless Sensor Networks for PoI Monitoring. 1-6 - Feng Zhu

, Ajinkya Kulkarni:
DynamicSD: Discover Dynamic and Uncertain Services in Pervasive Computing Environments. 1-8 - Feng Wang

, Bin Dai
, Jinshu Su
:
How Can Multipath Dissemination Help to Detect Prefix Hijacking? 1-8 - Yaxiong Zhao, Jie Wu:

ZigZag: A Content-Based Publish/Subscribe Architecture for Human Networks. 1-6 - Chinwe E. Abosi, Reza Nejabati, Dimitra Simeonidou:

Service Oriented Resource Orchestration in Future Optical Networks. 1-6 - Audrius Jurgelionis, Jukka-Pekka Laulajainen, Matti Hirvonen, Alf Inge Wang:

An Empirical Study of NetEm Network Emulation Functionalities. 1-6 - Jie Wu, Ying Dai, Yanchao Zhao:

Local Channel Assignments in Cognitive Radio Networks. 1-6 - Yu Tian, Wenzhong Li, Zhuo Li, Sanglu Lu, Xiaoming Fu

:
Low Overhead Dynamic Spectrum Reallocation in Opportunistic Spectrum Access Networks. 1-6 - Kashif Mahmood, Mikko Vehkaperä

, Yuming Jiang
:
Delay Constrained Throughput Analysis of a Correlated MIMO Wireless Channel. 1-7 - Hsiu-Sen Chiang, Woei-Jiunn Tsaur:

Identifying Smartphone Malware Using Data Mining Technology. 1-6 - Seong Hoon Kim, Pohkit Chong, Woncheol Cho, Daeyoung Kim:

Location-Free Semi-Directional Flooding for On-Demand Routing in Low-Rate Wireless Mesh Networks. 1-7 - Ali Riza Ekti

, Serhan Yarkan, Khalid A. Qaraqe
, Erchin Serpedin
:
On the Evolution of Interference in Time for Cellular Mobile Radio Networks. 1-6 - Ching-Yu Wu, Po-Chyi Su

:
A Content-Adaptive Distortion-Quantization Model for Intra Coding in H.264/AVC. 1-6 - Tatsuya Muramatsu, Toshiki Kato, Fumie Ono, Hiromasa Habuchi:

Multiple Access Performance for Repeated-Permutation MPPM with Interference Avoidance. 1-6 - Jinsung Byun, Insung Hong, Byeongkwan Kang, Sehyun Park:

Implementation of an Adaptive Intelligent Home Energy Management System Using a Wireless Ad-Hoc and Sensor Network in Pervasive Environments. 1-6 - Mahmoud Ayesh Alayesh, Nasir Ghani:

Game Theoretic Power Control under Rician Slow-Flat Fading Channels in Cognitive Radios Networks. 1-6 - Xiaowei Chen, Xiaowen Chu

, Zongpeng Li:
Improving Sustainability of Private P2P Communities. 1-6 - JaeSeung Song

, Tiejun Ma, Cristian Cadar, Peter R. Pietzuch:
Rule-Based Verification of Network Protocol Implementations Using Symbolic Execution. 1-8 - Jan Stanek, Lukas Kencl

:
SIPp-DD: SIP DDoS Flood-Attack Simulation Tool. 1-7 - Ju-Won Park, Chan Kyou Hwang, Jae-Hyoung Yoo, Roger P. Karrer:

Opportunistic Fair Parallel Download Protocol. 1-7 - Chit-Kwan Lin, H. T. Kung, Tsung-Han Lin, Stephen J. Tarsa, Dario Vlah:

Achieving High Throughput Ground-to-UAV Transport via Parallel Links. 1-7 - Sangchul Oh

, Hongsoog Kim, Byunghan Ryu, Namhoon Park:
Inbound Mobility Management on LTE-Advanced Femtocell Topology Using X2 Interface. 1-5 - Chi-Lun Liu:

Contact Information Management System Architecture for Social Media. 1-5 - Hiroshi Nishida, Thinh P. Nguyen:

Optimal Client-Server Assignment for Internet Distributed Systems. 1-6 - Andrew D. Jurik, Alfred C. Weaver

:
Securing Mobile Devices with Biotelemetry. 1-6 - Ryoichi Shinkuma

, Yoshinori Takata, Naoki Yoshinaga, Satoko Itaya, Shinichi Doi, Tatsuro Takahashi, Keiji Yamada:
Toward Future Network Systems Boosting Interactions between People in Social Networks. 1-6 - Gul N. Khan

, Markus B. Moessner:
Secure Authentication Protocol for RFID Systems. 1-7 - Aki Kaizu, Yu Morishima, Ikuo Oka, Shingo Ata:

Moment Analysis of Decision Variables for MAP Decoding. 1-5 - Jing Feng, Xiaoxing Yu, Zijun Liu, Cuihan Wang:

A QoS Enhanced Routing Protocol in Wireless Sensor Networks. 1-6 - Cuong Pham, Feng Zhang, Duc A. Tran

:
Maintenance-Efficient Erasure Coding for Distributed Archival Storage. 1-5 - Haitao Du, Shanchieh Jay Yang:

Characterizing Transition Behaviors in Internet Attack Sequences. 1-6 - Yan Cai, Y. Sinan Hanay

, Tilman Wolf
:
A Study of the Impact of Network Traffic Pacing from Network and End-User Perspectives. 1-6 - Jack Brassil:

Analyzing Flow Isolation in Shared Resource Systems. 1-7 - Bruce DeBruhl, Patrick Tague

:
Digital Filter Design for Jamming Mitigation in 802.15.4 Communication. 1-6 - Trac N. Nguyen, Min Kyung An

, Nhat X. Lam, Dung T. Huynh:
The Complexity of Minimizing Receiver-Based and SINR Edge Interference. 1-7 - Haiqin Liu, Yan Sun, Min Sik Kim:

Fine-Grained DDoS Detection Scheme Based on Bidirectional Count Sketch. 1-6 - Peter Quax

, Jimmy Cleuren, Wouter Vanmontfort, Wim Lamotte:
Empirical Evaluation of the Efficiency of Spatial Subdivision Schemes and Load Balancing Strategies for Networked Games. 1-6 - Fábio Coelho, Rui Dinis

, Paulo Montezuma
:
Efficient Channel Estimation for OFDM and SC-FDE Schemes. 1-7 - Andreas Noack, Patrick-Benjamin Bök, Sebastian Krück:

Evaluating the Impact of Transmission Power on QoS in Wireless Mesh Networks. 1-6 - Juergen Eckert, Félix Jesús Villanueva

, Reinhard German, Falko Dressler
:
Distributed Mass-Spring-Relaxation for Anchor-Free Self-Localization in Sensor and Actor Networks. 1-8 - Vijay Kumar Adhikari, Sourabh Jain, Zhi-Li Zhang:

Where Do You "Tube"? Uncovering YouTube Server Selection Strategy. 1-6 - Bilal Erman Bilgin

, Vehbi Cagri Gungor:
On the Performance of Multi-Channel Wireless Sensor Networks in Smart Grid Environments. 1-6 - Yingwu Zhu:

Making P2P Downloading Dependable by Exploiting Social Networks. 1-6 - Francisco Ganhão, Miguel P. Pereira

, Luís Bernardo
, Rui Dinis
, Rodolfo Oliveira
, Paulo Pinto
:
Performance of Hybrid ARQ for Network Diversity Multiple Access Schemes. 1-6 - Kei Ohnishi, Takeshi Koga, Kazuya Tsukamoto, Yuji Oie:

Self-Adaptive Routing for Temporary Information Sharing in Wireless Mesh Networks. 1-6 - Sohraab Soltani, Kiran Misra, Hayder Radha:

On Link Layer Prioritization for Wireless Communication. 1-6 - Sohraab Soltani, Muhammad Usman Ilyas

, Hayder Radha:
An Energy Efficient Link Layer Protocol for Power-Constrained Wireless Networks. 1-6 - Amin Hassanzadeh, Radu Stoleru:

Towards Optimal Monitoring in Cooperative IDS for Resource Constrained Wireless Networks. 1-8 - Qiang Guan, Ziming Zhang, Song Fu

:
Ensemble of Bayesian Predictors for Autonomic Failure Management in Cloud Computing. 1-6 - Ningning Cheng, Kannan Govindan

, Prasant Mohapatra:
Exploiting Mobility for Trust Propagation in Mobile Ad Hoc Networks. 1-6 - Abdalkarim Awad

, Andreas Mitschele-Thiel, Falko Dressler
:
Reactive Virtual Position-Based Routing in Wireless Sensor Networks. 1-6 - Hui-Tang Lin, Chai-Lin Lai, Wang-Rong Chang, Chin-Lien Liu:

FIPACT: A Frame-Oriented Dynamic Bandwidth Allocation Scheme for Triple-Play Services over EPONs. 1-6 - Matthäus Wander, Torben Weis

, Arno Wacker:
Detecting Opportunistic Cheaters in Volunteer Computing. 1-6 - Miao Xiong, Jiannong Cao

, Jun Zhang:
Context-Aware Mechanism for IEEE 802.21 Media Independent Handover. 1-6 - Marco Di Felice, Kaushik R. Chowdhury

, Andreas J. Kassler, Luciano Bononi
:
Adaptive Sensing Scheduling and Spectrum Selection in Cognitive Wireless Mesh Networks. 1-6 - Le Yu, Ge Nong, Mounir Hamdi

:
A Framed Packet Switch Without Control Loop. 1-5 - Tai-Hsiang Huang, Su-Ling Yeh

, Homer H. Chen
:
Enhancement of LCD Images Illuminated with Dim Backlight. 1-5 - Seung-Eun Hong, Woo Yong Lee:

Flexible Unequal Error Protection Scheme for Uncompressed Video Transmission over 60GHz Multi-Gigabit Wireless System. 1-6 - Jim Martin, Rahul Amin

, Ahmed M. Eltawil
, Amr M. A. Hussien:
Using Reconfigurable Devices to Maximize Spectral Efficiency in Future Heterogeneous Wireless Systems. 1-8 - Abderrahmen Mtibaa, Khaled A. Harras

:
Social-Based Trust in Mobile Opportunistic Networks. 1-6 - Ali Tekeoglu, Nihat Altiparmak

, Ali Saman Tosun:
Approximating the Number of Active Nodes Behind a NAT Device. 1-7 - Mohammad S. Kiaei, Samir Sebbah, Anton Cerný, Hamed M. K. Alazemi, Chadi Assi:

Survivable Network Design Models Based on Pre-Cross-Connected Trails. 1-7 - Khalid Elbadawi, James T. Yu:

Improving Network Services Configuration Management. 1-6 - Sangheon Pack

, Kihun Kim, Wonjung Kim, Taewon Song
:
Consistent Random Backoff to Reduce Channel Access Delay Jitter in IEEE 802.11 WLANs. 1-5 - Kwangjae Sung, Suk Kyu Lee, Hwangnam Kim:

Improving Location Estimation with Two-Tier Particle Filtering in Mobile Wireless Environment. 1-6 - Yacob Astatke, Yonas Woldearegay, Richard Dean, Abdoulaye Traore:

Performance Management in Mixed Wireless Networks Using Multi Distortion Measures. 1-6 - Shan-Hung Wu, Chung-Min Chen:

Minimizing Broadcast Delay in Location-Based Channel Access Protocols. 1-6 - Bradley R. Smith:

Using Dijkstra to Compute Hop-by-Hop QoS Paths. 1-6 - Zhipeng Ouyang, Lisong Xu, Byrav Ramamurthy:

Providing NPR-Style Time-Shifted Streaming in P2P Systems. 1-6 - Kanghee Lee, Hyuck M. Kwon, Zuojun Wang:

Noncooperative Distributed Wireless Relay Networks under Channel Uncertainty and Power Constraint. 1-5 - Chia-Hang Lee, Wen-Hsiang Shaw, Hsin-I Liao, Su-Ling Yeh

, Homer H. Chen
:
Local Dimming of Liquid Crystal Display Using Visual Attention Prediction Model. 1-6 - Ahmed Shawky, Rasmus L. Olsen, Jens Myrup Pedersen

, Jakob Gulddahl Rasmussen
:
Service Degradation in Context Management Frameworks. 1-6 - Zhiqiang Shi, Dan Ionescu, Dongli Zhang:

Congestion Control in Networks with Mixed IP and P2P Traffic. 1-6 - Yi Shi

, Canming Jiang, Y. Thomas Hou
, Sastry Kompella
:
On Capacity Scaling Law of Cognitive Radio Ad Hoc Networks. 1-8 - Tobias Limmer, Falko Dressler

:
Adaptive Load Balancing for Parallel IDS on Multi-Core Systems Using Prioritized Flows. 1-8 - Farid Farahmand

, Mohammad Masud Hasan, Isabella Cerutti, Jason P. Jue, Joel J. P. C. Rodrigues:
Power-Efficient Lightpath-Based Grooming Strategies in WDM Mesh Networks. 1-6 - Francesco Beneventi, Andrea Bartolini

, Luca Benini
:
Static Thermal Model Learning for High-Performance Multicore Servers. 1-6 - Jun Yi, Christian Poellabauer

, Liqiang Zhang:
Mobi-Sync: Configurable Time Synchronization for Mobile Multihop Networks. 1-6 - Jianxin Sun, Xueyi Wang, Song Ci:

Battery-Aware Multimedia Coding Optimization by Dynamic Frequency Scaling. 1-6 - Byung-Gook Kim, Jeong-Ahn Kwon, Jang-Won Lee

:
Utility-Based Subchannel Allocation for OFDMA Femtocell Networks. 1-6 - Alexander Pyattaev

, Sergey D. Andreev
, Olga Galinina
, Yevgeni Koucheryavy
:
System-Level Evaluation of Opportunistic Client Cooperation in Wireless Cellular Networks. 1-6 - Carlos Eduardo Uc-Rios, Domingo Lara-Rodríguez:

An Efficient Scheduler for Real and Non-Real Time Services Maximizing Satisfied Users in Wireless Networks. 1-5 - Shinji Ogawa, Fumie Ono:

STBC-MIMO Network Coding with Dual Polarization Antennas. 1-6 - Eric J. Brown, Mark K. Gardner, Umar Kalim, Wu-chun Feng:

Restoring End-to-End Resilience in the Presence of Middleboxes. 1-7 - Stephan Bohacek, Andres Medina:

A Model of Path Stretch in Proactive Routing in MANETs. 1-7 - Joan Triay, Derek R. Rousseau, Cristina Cervello-Pastor

, Vinod Vokkarane
:
Dynamic Service-Aware Reservation Framework for Multi-Layer High-Speed Networks. 1-7 - Billy Pinheiro, Vagner de Brito Nascimento, Rafael Lopes Gomes

, Eduardo Cerqueira, Antônio Abelém:
A Multimedia-Based Fuzzy Queue-Aware Routing Approach for Wireless Mesh Networks. 1-7 - Karthik Kumar, Jing Feng, Yamini Nimmagadda, Yung-Hsiang Lu:

Resource Allocation for Real-Time Tasks Using Cloud Computing. 1-7 - Telex Magloire Nkouatchah Ngatched, Attahiru Sule Alfa, Jun Cai:

Analysis of Cognitive Radio Networks with Channel Aggregation and Imperfect Sensing. 1-6 - Cristian Gadea, Bogdan Solomon, Bogdan Ionescu, Dan Ionescu:

A Collaborative Cloud-Based Multimedia Sharing Platform for Social Networking Environments. 1-6 - Karen R. Sollins:

Challenges to Privacy in Social Networking Mashups: Social TV as a Case Study. 1-6 - Shu Liu, Aaron Striegel

:
Accurate Extraction of Face-to-Face Proximity Using Smartphones and Bluetooth. 1-5 - Andrei Pruteanu, Venkat Iyer, Stefan Dulman:

FailDetect: Gossip-Based Failure Estimator for Large-Scale Dynamic Networks. 1-6 - Benjamin Pearre, Timothy X. Brown:

Fast, Scalable, Model-Free Trajectory Optimization for Wireless Data Ferries. 1-8 - Paul K. Harmer, McKay D. Williams, Michael A. Temple:

Using DE-Optimized LFS Processing to Enhance 4G Communication Security. 1-8 - Dan Ionescu, Bogdan Ionescu, Cristian Gadea, Shahidul Islam:

A Multimodal Interaction Method that Combines Gestures and Physical Game Controllers. 1-6 - Joaquín Cortez González, Miguel Bazdresch, Deni Torres Román, Erica Ruiz-Ibarra:

An Efficient Scheduling Architecture for QR Decomposition Using Fixed-Point Arithmetic for Detection of STBC-VBLAST Codes. 1-5 - Aytac Azgin, Yucel Altunbasak:

A Semi-Distributed Fast Channel Change Framework for IPTV Networks. 1-8 - A. B. M. Alim Al Islam, Mohammad Sajjad Hossain, Vijay Raghunathan, Y. Charlie Hu:

Backpacking: Deployment of Heterogeneous Radios in High Data Rate Sensor Networks. 1-8 - Yong Li, Depeng Jin, Li Su, Lieguang Zeng:

Stability and Scalability Properties for Dynamic Content Updates Over Delay Tolerant Networks. 1-6 - Oluwatobi Olabiyi, Annamalai Annamalai:

ASER Analysis of Cooperative Non-Regenerative Relay Systems over Generalized Fading Channels. 1-6 - Tong Shu, Min Liu, Zhongcheng Li:

Spectrum Allocation for Distributed Throughput Maximization under Secondary Interference Constraints in Wireless Mesh Networks. 1-6 - Yan Sun, Victor C. Valgenti, Min Sik Kim:

NFA-Based Pattern Matching for Deep Packet Inspection. 1-6 - Bhuvan Modi, Annamalai Annamalai:

Improving the Spectral Efficiency of Amplify-and-Forward Cooperative Relay Network with Adaptive M-QAM Modulation. 1-6 - Bruno Astuto A. Nunes

, Kerry Veenstra, William Ballenthin, Stephanie M. Lukin, Katia Obraczka:
A Machine Learning Approach to End-to-End RTT Estimation and its Application to TCP. 1-6 - Young-Sil Kim, Kyungran Kang, Young-Jong Cho:

On the Network Coding Delay in Multi-Hop Wireless Networks with Multiple Coding Points. 1-5 - Peter Dely, Andreas Kassler

, Nico Bayer:
OpenFlow for Wireless Mesh Networks. 1-6 - Byrav Ramamurthy, K. K. Ramakrishnan

, Rakesh K. Sinha:
Cost and Reliability Considerations in Designing the Next-Generation IP over WDM Backbone Networks. 1-6 - Roland Bless, Martin Röhricht, Christoph Werle:

Authenticated Setup of Virtual Links with Quality-of-Service Guarantees. 1-8 - Gerardo Rubino:

On Kleinrock's Power Metric for Queueing Systems. 1-6 - Takefumi Hiraguri, Toshiyuki Ogawa, Takahiro Ueno, Kentaro Nishimori, Kenya Jin'no

:
Transmission Queuing Schemes for Improving Downlink Throughput on IEEE 802.11 WLANs. 1-5 - Qing Chen, Mustafa Cenk Gursoy:

Energy Efficiency and Goodput Analysis in Two-Way Wireless Relay Networks. 1-6 - Ahsan Tariq, Sana Jawad, Zartash Afzal Uzmi:

TaCo: Semantic Equivalence of IP Prefix Tables. 1-6 - Thorsten Horstmann, Mathias Kretschmer, Jens Mödeker, Christian Niephaus, Stefan Sauer:

Development Framework for Prototyping Heterogeneous Multi-Radio Wireless Networks. 1-5 - Xiaohui Li, Yongqiang Hei, Guanghui Yu:

A Delay-Optimal Spectrum Access Policy for Cognitive Coexistence Systems. 1-4 - Di Ma

, Anudath K. Prasad:
A Context-Aware Approach for Enhanced Security and Privacy in RFID Electronic Toll Collection Systems. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














