


default search action
28th INFOCOM 2009: Rio de Janeiro, Brazil
- INFOCOM 2009. 28th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil. IEEE 2009, ISBN 978-1-4244-3513-5

Congestion Control 1
- Vishnu Vardhan Reddy Konda, Jasleen Kaur:

RAPID: Shrinking the Congestion-Control Timescale. 1-9 - Ihsan Ayyub Qazi

, Taieb Znati, Lachlan L. H. Andrew:
Congestion Control using Efficient Explicit Feedback. 10-18 - François Baccelli, Giovanna Carofiglio, Marta Piancino:

Stochastic Analysis of Scalable TCP. 19-27 - Thomas Bonald, Mathieu Feuillet, Alexandre Proutière:

Is the ''Law of the Jungle'' Sustainable for the Internet? 28-36
Routing 1
- Rafael P. Laufer, Henri Dubois-Ferrière, Leonard Kleinrock:

Multirate Anypath Routing in Wireless Mesh Networks. 37-45 - Hongkun Li, Yu Cheng

, Chi Zhou, Weihua Zhuang
:
Minimizing End-to-End Delay: A Novel Routing Metric for Multi-Radio Wireless Mesh Networks. 46-54 - Simon Heimlicher, Merkourios Karaliopoulos, Hanoch Levy, Thrasyvoulos Spyropoulos:

On Leveraging Partial Paths in Partially-Connected Networks. 55-63 - Yujun Li, Yaling Yang, Xianliang Lu:

Routing Metric Designs for Greedy, Face and Combined-Greedy-Face Routing. 64-72
P2P 1
- Di Wu, Yong Liu

, Keith W. Ross:
Queuing Network Models for Multi-Channel P2P Live Streaming Systems. 73-81 - Zimu Liu, Chuan Wu

, Baochun Li, Shuqiao Zhao:
Distilling Superior Peers in Large-Scale P2P Streaming Systems. 82-90 - Vijay Gopalakrishnan, Samrat Bhattacharjee, K. K. Ramakrishnan

, Rittwik Jana, Divesh Srivastava:
CPM: Adaptive Video-on-Demand with Cooperative Peer Assists and Multicast. 91-99 - Eugenio Alessandria, Massimo Gallo, Emilio Leonardi

, Marco Mellia
, Michela Meo
:
P2P-TV Systems under Adverse Network Conditions: A Measurement Study. 100-108
Sensor Networks 1
- Ming-Chen Zhao, Jiayin Lei, Min-You Wu, Yunhuai Liu, Wei Shu:

Surface Coverage in Wireless Sensor Networks. 109-117 - Ji Luo, Dan Wang

, Qian Zhang
:
Double Mobility: Coverage of the Sea Surface with Mobile Sensor Networks. 118-126 - Anwar Saipulla, Cédric Westphal, Benyuan Liu, Jie Wang:

Barrier Coverage of Line-Based Deployed Wireless Sensor Networks. 127-135 - Paul Balister, Zizhan Zheng

, Santosh Kumar, Prasun Sinha:
Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks. 136-144
Energy Efficiency
- Niv Buchbinder

, Liane Lewin-Eytan, Ishai Menache, Joseph Naor, Ariel Orda:
Dynamic Power Allocation Under Arbitrary Varying Channels - An Online Approach. 145-153 - Jeremy Gummeson, Deepak Ganesan, Mark D. Corner, Prashant J. Shenoy

:
An Adaptive Link Layer for Range Diversity in Multi-Radio Mobile Sensor Networks. 154-162 - Hanan Shpungin, Michael Segal

:
Near Optimal Multicriteria Spanner Constructions in Wireless Ad-Hoc Networks. 163-171 - Li Ping Qian

, Ying Jun Zhang
:
Monotonic Optimization for Non-Concave Power Control in Multiuser Multicarrier Network Systems. 172-180
Network Coding 1
- Jin Zhang, Qian Zhang

:
Cooperative Network Coding-Aware Routing for Multi-Rate Wireless Networks. 181-189 - Wai-Leong Yeow, Anh Tuan Hoang, Chen-Khong Tham

:
Minimizing Delay for Multicast-Streaming in Wireless Networks with Network Coding. 190-198 - Chi Zhang, Yuguang Fang

, Xiaoyan Zhu:
Throughput-Delay Tradeoffs in Large-Scale MANETs with Network Coding. 199-207 - João Barros

, Rui A. Costa, Daniele Munaretto
, Jörg Widmer
:
Effective Delay Control in Online Network Coding. 208-216
Vehicular, Delay Tolerant Networks
- Hongzi Zhu, Yanmin Zhu, Multicast Li, Lionel M. Ni:

SEER: Metropolitan-Scale Traffic Perception Based on Lossy Sensory Data. 217-225 - Farzad Farnoud, Shahrokh Valaee:

Reliable Broadcast of Safety Messages in Vehicular Ad Hoc Networks. 226-234 - Marco Fiore

, Francesco Mininni, Claudio Casetti, Carla-Fabiana Chiasserini
:
To Cache or Not To Cache? 235-243 - Philippe Jacquet, Bernard Mans

, Georgios Rodolakis:
Information Propagation Speed in Mobile and Delay Tolerant Networks. 244-252
Congestion Control 2
- Ruogu Li, Lei Ying, Atilla Eryilmaz, Ness B. Shroff:

A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows. 253-261 - Ajit Warrier, Sankararaman Janakiraman, Sangtae Ha, Injong Rhee:

DiffQ: Practical Differential Backlog Congestion Control for Wireless Networks. 262-270 - Krishna Prasanna Jagannathan

, Eytan H. Modiano, Lizhong Zheng:
On the Trade-Off Between Control Rate and Congestion in Single Server Systems. 271-279 - Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard, Michael Mitzenmacher, João Barros

:
Network Coding Meets TCP. 280-288
Routing 2
- Saqib Raza, Yuanbo Zhu, Chen-Nee Chuah

:
Graceful Network Operations. 289-297 - Yasuhiro Ohara, Shinji Imahori, Rodney Van Meter:

MARA: Maximum Alternative Routing Algorithm. 298-306 - Feng Wang

, Lixin Gao:
Path Diversity Aware Interdomain Routing. 307-315 - Simon Balon, Guy Leduc:

BGP-Aware IGP Link Weight Optimization in Presence of Route Reflectors. 316-324
P2P 2
- Ben Q. Zhao, John C. S. Lui, Dah-Ming Chiu:

Analysis of Adaptive Incentive Protocols for P2P Networks. 325-333 - Xinyu Zhang, Baochun Li:

On the Market Power of Network Coding in P2P Content Distribution Systems. 334-342 - Raul Landa, David Griffin, Richard G. Clegg

, Eleni Mykoniati, Miguel Rio:
A Sybilproof Indirect Reciprocity Mechanism for Peer-to-Peer Networks. 343-351 - Yi Hu, Min Feng, Laxmi N. Bhuyan, Vana Kalogeraki

:
Budget-Based Self-Optimized Incentive Search in Unstructured P2P Networks. 352-360
Sensor Networks 2
- Xiaoyu Chu, Harish Sethu:

A New Distributed Algorithm for Even Coverage and Improved Lifetime in a Sensor Network. 361-369 - Maleq Khan, V. S. Anil Kumar, Madhav V. Marathe, Gopal Pandurangan

, S. S. Ravi:
Bi-Criteria Approximation Algorithms for Power-Efficient and Low-Interference Topology Control in Unreliable Ad Hoc Networks. 370-378 - Matthew P. Johnson, Deniz Sariöz, Amotz Bar-Noy, Theodore Brown, Dinesh C. Verma, Chai Wah Wu

:
More is More: The Benefits of Denser Sensor Deployment. 379-387 - Xiaole Bai, Chuanlin Zhang, Dong Xuan, Weijia Jia

:
Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks. 388-396
Security 1
- Anat Bremler-Barr

, Yaron Koral:
Accelerating Multi-Patterns Matching on Compressed HTTP Traffic. 397-405 - Zhen Yu, Yawen Wei, Bhuvaneswari Ramkumar, Yong Guan:

An Efficient Scheme for Securing XOR Network Coding against Pollution Attacks. 406-414 - Nan Hua, Haoyu Song

, T. V. Lakshman:
Variable-Stride Multi-Pattern Matching For Scalable Deep Packet Inspection. 415-423 - Nick G. Duffield

, Patrick Haffner, Balachander Krishnamurthy, Haakon Ringberg:
Rule-Based Anomaly Detection on IP Flows. 424-432
Network Coding 2
- Yoojin Choi, Petar Momcilovic:

On Effectiveness of Application-Layer Coding. 433-441 - Sorina Dumitrescu, Mingkai Shao, Xiaolin Wu:

Layered Multicast with Inter-Layer Network Coding. 442-449 - Minkyu Kim, Muriel Médard, Una-May O'Reilly, Danail Traskov:

An Evolutionary Approach To Inter-Session Network Coding. 450-458 - Hassan Shojania, Baochun Li, Xin Wang:

Nuclei: GPU-Accelerated Many-Core Network Coding. 459-467
Wireless / QoS
- Feng Wang, Jiangchuan Liu:

Duty-Cycle-Aware Broadcast in Wireless Sensor Networks. 468-476 - Qinghe Du, Xi Zhang:

Statistical QoS Provisionings for Wireless Unicast/Multicast of Layered Video Streams. 477-485 - I-Hong Hou, Vivek S. Borkar, P. R. Kumar:

A Theory of QoS for Wireless. 486-494 - Amin Farbod, Ben Liang

:
Structured Admission Control Policy in Heterogeneous Wireless Networks with Mesh Underlay. 495-503
Inference 1
- MyungKeun Yoon

, Tao Li, Shigang Chen, Jih-Kwon Peir:
Fit a Spread Estimator in Small Memory. 504-512 - Fang Hao, Murali S. Kodialam, T. V. Lakshman, Haoyu Song

:
Fast Multiset Membership Testing Using Combinatorial Bloom Filters. 513-521 - Yi Lu, Balaji Prabhakar:

Robust Counting Via Counter Braids: An Error-Resilient Network Measurement Architecture. 522-530 - Yao Zhao, Zhaosheng Zhu, Yan Chen, Dan Pei

, Jia Wang:
Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints. 531-539
Routing 3
- Dominic DiPalantino, Ramesh Johari:

Traffic Engineering vs. Content Distribution: A Game Theoretic Perspective. 540-548 - Rahul Sami, Michael Schapira, Aviv Zohar

:
Searching for Stability in Interdomain Routing. 549-557 - Satyajayant Misra, Guoliang Xue, Dejun Yang

:
Polynomial Time Approximations for Multi-Path Routing with Bandwidth and Delay Constraints. 558-566 - Anirban Majumder, Nisheeth Shrivastava, Rajeev Rastogi, Anand Srinivasan:

Scalable Content-Based Routing in Pub/Sub Systems. 567-575
P2P 3
- Stratis Ioannidis

, Peter Marbach:
Absence of Evidence as Evidence of Absence: A Simple Mechanism for Scalable P2P Search. 576-584 - Alix L. H. Chow, Leana Golubchik, Vishal Misra:

BitTorrent: An Extensible Heterogeneous Model. 585-593 - G. Matthew Ezovski, Ao Tang, Lachlan L. H. Andrew:

Minimizing Average Finish Time in P2P Networks. 594-602 - Xin Xiao, Yuanchun Shi, Yuan Gao, Qian Zhang

:
LayerP2P: A New Data Scheduling Approach for Layered Streaming in Heterogeneous Networks. 603-611
Sensor Networks 3
- Joohwan Kim, Xiaojun Lin

, Ness B. Shroff:
Optimal Anycast Technique for Delay-Sensitive Energy-Constrained Asynchronous Sensor Networks. 612-620 - Mohammad Zakariya Siam, Marwan Krunz, Ossama Younis:

Energy-Efficient Clustering/Routing for Cooperative MIMO Operation in Sensor Networks. 621-629 - Junchao Ma

, Wei Lou
, Yanwei Wu, Xiang-Yang Li, Guihai Chen
:
Energy Efficient TDMA Sleep Scheduling in Wireless Sensor Networks. 630-638 - Rajesh Krishna Panta, Saurabh Bagchi:

Hermes: Fast and Energy Efficient Incremental Code Updates for Wireless Sensor Networks. 639-647
Security 2
- Yaxuan Qi, Lianghong Xu, Baohua Yang, Yibo Xue, Jun Li:

Packet Classification Algorithms: From Theory to Practice. 648-656 - Konstantinos Pelechrinis, Guanhua Yan, Stephan J. Eidenbenz

, Srikanth V. Krishnamurthy
:
Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks. 657-665 - Jie Yang, Yingying Chen

, Wade Trappe, Jay Cheng:
Determining the Number of Attackers and Localizing Multiple Adversaries in Wireless Spoofing Attacks. 666-674 - Song Liu, Yingying Chen

, Wade Trappe, Larry J. Greenstein:
ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks. 675-683
Measurements, Management
- Daniel Nechay, Yvan Pointurier, Mark Coates:

Controlling False Alarm/Discovery Rates in Online Internet Traffic Flow Classification. 684-692 - David R. Choffnes, Fabian E. Bustamante:

On the Effectiveness of Measurement Reuse for Performance-Based Detouring. 693-701 - Kuan-Ta Chen, Cheng-Chun Tu, Wei-Cheng Xiao:

OneClick: A Framework for Measuring Network Quality of Experience. 702-710 - Pierre Borgnat

, Guillaume Dewaele, Kensuke Fukuda, Patrice Abry
, Kenjiro Cho:
Seven Years and One Day: Sketching the Evolution of Internet Traffic. 711-719
Optical 1
- Duan-Shin Lee, Kai-Jie Hsu, Cheng-Shang Chang, Jay Cheng:

Emulation and Approximation of a Flexible Delay Line by Parallel Non-Overtaking Delay Lines. 720-728 - Josef Kanizo, David Hay, Isaac Keslassy

:
The Crosspoint-Queued Switch. 729-737 - Cheng-Shang Chang, Jay Cheng, Duan-Shin Lee:

SDL Constructions of FIFO, LIFO and Absolute Contractors. 738-746 - Cheng-Shang Chang, Yu-Hao Hsu, Jay Cheng, Duan-Shin Lee:

A Dynamic Frame Sizing Algorithm for CICQ Switches with 100% Throughput. 747-755
Architecture, Survivability
- Weixiong Rao, Lei Chen

, Ada Wai-Chee Fu, Hanhua Chen, Futai Zou:
On Efficient Content Matching in Distributed Pub/Sub Systems. 756-764 - Hitesh Ballani, Paul Francis:

Fault Management Using the CONMan Abstraction. 765-773 - Hung Q. Ngo, Thanh-Nhan Nguyen, Dahai Xu:

Hardness and Approximation of the Survivable Multi-Level Fat Tree Problem. 774-782 - N. M. Mosharaf Kabir Chowdhury, Muntasir Raihan Rahman, Raouf Boutaba:

Virtual Network Embedding with Coordinated Node and Link Mapping. 783-791
Inference 2
- Yuval Shavitt

, Udi Weinsberg:
Quantifying the Importance of Vantage Points Distribution in Internet Topology Measurements. 792-800 - Brian Eriksson, Paul Barford, Robert D. Nowak:

Estimating Hop Distance Between Arbitrary Host Pairs. 801-809 - Jing Cao, Yu Jin, Aiyou Chen, Tian Bu, Zhi-Li Zhang:

Identifying High Cardinality Internet Hosts. 810-818 - Aiyou Chen, Li Erran Li, Jin Cao:

Tracking Cardinality Distributions in Network Traffic. 819-827
DTN 1
- Chi-Kin Chau

, Prithwish Basu:
Exact Analysis of Latency of Stateless Opportunistic Forwarding. 828-836 - Josep M. Pujol, Alberto López Toledo, Pablo Rodriguez:

Fair Routing in Delay Tolerant Networks. 837-845 - Samuel C. Nelson, Mehedi Bakht, Robin Kravets

:
Encounter-Based Routing in DTNs. 846-854 - Kyunghan Lee

, Seongik Hong, Seong Joon Kim, Injong Rhee, Song Chong:
SLAW: A New Mobility Model for Human Walks. 855-863
P2P 4
- Cameron Dale, Jiangchuan Liu:

apt-p2p: A Peer-to-Peer Distribution System for Software Package Releases and Updates. 864-872 - Ye Sun, Fangming Liu, Bo Li, Baochun Li, Xinyan Zhang:

FS2You: Peer-Assisted Semi-Persistent Online Storage at a Large Scale. 873-881 - Melih Onus, Andréa W. Richa:

Minimum Maximum Degree Publish-Subscribe Overlay Network Design. 882-890 - Chen Feng

, Baochun Li, Bo Li:
Understanding the Performance Gap Between Pull-Based Mesh Streaming Protocols and Fundamental Limits. 891-899
Sensor Networks 4
- Sahin Cem Geyik, Boleslaw K. Szymanski

:
Event Recognition in Sensor Networks by Means of Grammatical Inference. 900-908 - Rong Zheng, Amit Pendharkar:

Obstacle Discovery in Distributed Active Sensor Networks. 909-917 - Guanqun Yang, Daji Qiao:

Barrier Information Coverage with Wireless Sensors. 918-926 - Jaehoon Jeong, Yu Gu, Tian He, David Hung-Chang Du:

VISA: Virtual Scanning Algorithm for Dynamic Protection of Road Networks. 927-935
Security 3
- Nalin Subramanian, Ka Yang, Wensheng Zhang, Daji Qiao:

ElliPS: A Privacy Preserving Scheme for Sensor Data Storage and Query. 936-944 - Jing Shi, Rui Zhang, Yanchao Zhang:

Secure Range Queries in Tiered Sensor Networks. 945-953 - Qian Wang

, Kui Ren
, Wenjing Lou, Yanchao Zhang:
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance. 954-962 - Shucheng Yu

, Kui Ren
, Wenjing Lou:
FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks. 963-971
Incentive Pricing and Game Theory
- Thomas Moscibroda, Stefan Schmid

:
On Mechanism Design without Payments for Throughput Maximization. 972-980 - Yuan Wu, Danny H. K. Tsang:

Distributed Power Allocation Algorithm for Spectrum Sharing Cognitive Radio Networks with QoS Guarantee. 981-989 - Prashanth Hande, Mung Chiang, A. Robert Calderbank, Sundeep Rangan:

Network Pricing and Rate Allocation with Content Provider Participation. 990-998 - Xia Zhou, Haitao Zheng:

TRUST: A General Framework for Truthful Double Spectrum Auctions. 999-1007
Optical 2
- János Tapolcai

, Bin Wu, Pin-Han Ho:
On Monitoring and Failure Localization in Mesh All-Optical Networks. 1008-1016 - Kyunghan Lee, Eytan H. Modiano:

Cross-Layer Survivability in WDM-Based Networks. 1017-1025 - Krishnaiyan Thulasiraman, Muhammad S. Javed, Guoliang Xue:

Circuits/Cutsets Duality and a Unified Algorithmic Framework for Survivable Logical Topology Design in IP-over-WDM Optical Networks. 1026-1034 - Hyang-Won Lee, Eytan H. Modiano:

Diverse Routing in Networks with Probabilistic Failures. 1035-1043
Resource Management
- Kamalika Chaudhuri, Constantinos Daskalakis, Robert D. Kleinberg, Henry Lin:

Online Bipartite Perfect Matching With Augmentations. 1044-1052 - Masato Uchida

, Jim Kurose:
An Information-Theoretic Characterization of Weighted alpha-Proportional Fairness. 1053-1061 - Fei Li:

Competitive Scheduling of Packets with Hard Deadlines in a Finite Capacity Queue. 1062-1070 - Florin Ciucu, Jörg Liebeherr:

A Case for Decomposition of FIFO Networks. 1071-1079
Inference 3
- Malik Ahmad Yar Khan, Darryl Veitch:

Isolating Physical PER for Smart Rate Selection in 802.11. 1080-1088 - Pablo Serrano

, Michael Zink
, Jim Kurose:
Assessing the Fidelity of COTS 802.11 Sniffers. 1089-1097 - Michael Bredel, Markus Fidler:

Understanding Fairness and its Impact on Quality of Service in IEEE 802.11. 1098-1106 - Janne Riihijärvi, Matthias Wellens, Petri Mähönen:

Measuring Complexity and Predictability in Networks with Multiscale Entropy Analysis. 1107-1115
DTN 2
- Pierre-Ugo Tournoux, Jeremie Leguay

, Farid Benbadis, Vania Conan
, Marcelo Dias de Amorim, John Whitbeck:
The Accordion Phenomenon: Analysis, Characterization, and Impact on DTN Routing. 1116-1124 - Utku Günay Acer

, Alhussein A. Abouzeid
, Shivkumar Kalyanaraman:
An Evaluation of Weak State Mechanism Design for Indirection in Dynamic Networks. 1125-1133 - Eitan Altman, Giovanni Neglia, Francesco De Pellegrini, Daniele Miorandi:

Decentralized Stochastic Control of Delay Tolerant Networks. 1134-1142 - Abdul Jabbar, Justin P. Rohrer, Andrew Oberthaler, Egemen K. Çetinkaya

, Victor Frost, James P. G. Sterbenz:
Performance Comparison of Weather Disruption-Tolerant Cross-Layer Routing Algorithms. 1143-1151
P2P 5
- Xu Cheng, Jiangchuan Liu:

NetTube: Exploring Social Networks for Peer-to-Peer Short Video Sharing. 1152-1160 - Matteo Varvello, C. Diout, Ernst W. Biersack:

P2P Second Life: Experimental Validation Using Kad. 1161-1169 - Wai Hung Tang, H. W. Chan:

MIX-Crowds, an Anonymity Scheme for File Retrieval Systems. 1170-1178 - Te-Yuan Huang, Kuan-Ta Chen, Polly Huang:

Tuning Skype's Redundancy Control Algorithm for User Satisfaction. 1179-1187
Sensor Networks 5
- Liang Liu, Xi Zhang, Huadong Ma:

Dynamic Node Collaboration for Mobile Target Tracking in Wireless Camera Sensor Networks. 1188-1196 - Dengpan Zhou, Jie Gao:

Opportunistic Processing and Query of Motion Trajectories in Wireless Sensor Networks. 1197-1205 - Yong Yang, I-Hong Hou, Jennifer C. Hou, Mallikarjun Shankar

, Nageswara S. V. Rao
:
Sensor Placement for Detecting Propagative Sources in Populated Environments. 1206-1214 - Ziguo Zhong, Ting Zhu, Dan Wang, Tian He:

Tracking with Unreliable Node Sequences. 1215-1223
Security 4
- Elias Kehdi, Baochun Li:

Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding. 1224-1232 - Qiyan Wang, Himanshu Khurana, Ying Huang, Klara Nahrstedt:

Time Valid One-Time Signature for Time-Critical Multicast Data Authentication. 1233-1241 - An Liu, Peng Ning, Chun Wang:

Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks. 1242-1250 - Rui Zhang, Yanchao Zhang, Kui Ren

:
DP2AC: Distributed Privacy-Preserving Access Control in Sensor Networks. 1251-1259
Wireless Scheduling 1
- Sem C. Borst, Nidhi Hegde, Alexandre Proutière:

Mobility-Driven Scheduling in Wireless Networks. 1260-1268 - Suk-Bok Lee, Sayantan Choudhury, Ahmad Khoshnevis, Shugong Xu

, Songwu Lu:
Downlink MIMO with Frequency-Domain Packet Scheduling for 3GPP LTE. 1269-1277 - Matthew Andrews, Lisa Zhang:

Multiserver Scheduling with Contiguity Constraints. 1278-1286 - Alexander L. Stolyar, Harish Viswanathan:

Self-Organizing Dynamic Fractional Frequency Reuse for Best-Effort Traffic through Distributed Inter-Cell Coordination. 1287-1295
TCAM / Optical
- Anat Bremler-Barr

, David Hay, Danny Hendler, Ron M. Roth:
PEDS: A Parallel Error Detection Scheme for TCAM Devices. 1296-1304 - Anat Bremler-Barr

, David Hay, Danny Hendler:
Layered Interval Codes for TCAM-Based Classification. 1305-1313 - Rick McGeer, Praveen Yalagandula:

Minimizing Rulesets for TCAM Implementation. 1314-1322 - Arun Vishwanath, Vijay Sivaraman, George N. Rouskas

:
Considerations for Sizing Buffers in Optical Packet Switched Networks. 1323-1331
Capacity
- Matthew Andrews, Michael Dinitz

:
Maximizing Capacity in Arbitrary Wireless Networks in the SINR Model: Complexity and Game Theory. 1332-1340 - Ramakrishna Gummadi, Kyomin Jung, Devavrat Shah, Ramavarapu S. Sreenivas:

Computing the Capacity Region of a Wireless Network. 1341-1349 - Chee-Wei Tan

, Mung Chiang, R. Srikant:
Fast Algorithms and Performance Bounds for Sum Rate Maximization in Wireless Networks. 1350-1358 - Asaf Baron, Ran Ginosar, Isaac Keslassy

:
The Capacity Allocation Paradox. 1359-1367
Inference 4
- Shrinivasa Kini, Srinivasan Ramasubramanian, Amund Kvalbein, Audun Fosselie Hansen:

Fast Recovery from Dual Link Failures in IP Networks. 1368-1376 - Paul Barford, Nick G. Duffield

, Amos Ron, Joel Sommers:
Network Performance Anomaly Detection and Localization. 1377-1385 - Hung Xuan Nguyen, Renata Teixeira, Patrick Thiran, Christophe Diot:

Minimizing Probing Cost for Detecting Interface Failures: Algorithms and Scalability Analysis. 1386-1394 - Darryl Veitch, Brice Augustin, Renata Teixeira, Timur Friedman

:
Failure Control in Multipath Route Tracing. 1395-1403
DTN 3
- Bin Bin Chen

, Mun Choon Chan:
MobTorrent: A Framework for Mobile Internet Access from Vehicles. 1404-1412 - Rongxing Lu, Xiaodong Lin, Haojin Zhu

, Xuemin Shen
:
SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots. 1413-1421 - Stratis Ioannidis

, Augustin Chaintreau
, Laurent Massoulié:
Optimal and Scalable Distribution of Content Updates over a Mobile Social Network. 1422-1430 - Eitan Altaian, Philippe Nain, Jean-Claude Bermond:

Distributed Storage Management of Evolving Files in Delay Tolerant Ad Hoc Networks. 1431-1439
P2P 6
- Fabien Mathieu, Gheorghe Postelnicu, Julien Reynier:

The Stable Configuration of Acyclic Preference-Based Systems. 1440-1448 - Rubén Cuevas Rumín, Manuel Urueña

, Albert Banchs:
Routing Fairness in Chord: Analysis and Enhancement. 1449-1457 - Daisuke Fukuchi, Christian Sommer, Yuichi Sei

, Shinichi Honiden:
Distributed Arrays: A P2P Data Structure for Efficient Logical Arrays. 1458-1466 - Bo Zhang, T. S. Eugene Ng:

Exploiting Internet Delay Space Properties for Selecting Distinct Network Locations. 1467-1475
Security 5
- Zhichao Zhu, Guohong Cao, Sencun Zhu, Supranamaya Ranjan, Antonio Nucci:

A Social Network Based Patching Scheme for Worm Containment in Cellular Networks. 1476-1484 - Jasmina Omic, Ariel Orda, Piet Van Mieghem:

Protecting Against Network Infections: A Game Theoretic Perspective. 1485-1493 - Marc Lelarge, Jean Bolot:

Economic Incentives to Increase Security in the Internet: The Case for Insurance. 1494-1502 - Gjergji Zyba, Geoffrey M. Voelker, Michael Liljenstam, András Méhes, Per Johansson:

Defending Mobile Phones from Proximity Malware. 1503-1511
Wireless Scheduling 2
- Wei Cheng, Xiuzhen Cheng, Taieb Znati, Xicheng Lu, Zexin Lu:

The Complexity of Channel Scheduling in Multi-Radio Multi-Channel Wireless Networks. 1512-1520 - Bo Han, V. S. Anil Kumar, Madhav V. Marathe, Srinivasan Parthasarathy, Aravind Srinivasan:

Distributed Strategies for Channel Allocation and Scheduling in Software-Defined Radio Networks. 1521-1529 - Liqun Fu, Soung Chang Liew, Jianwei Huang:

Power Controlled Scheduling with Consecutive Transmission Constraints: Complexity Analysis and Algorithm Design. 1530-1538 - Karthikeyan Sundaresan, Sampath Rangarajan:

Efficient Algorithms for Leveraging Spatial Reuse in OFDMA Relay Networks. 1539-1547
Optical 3
- Spyridon Antonakopoulos, Lisa Zhang:

Approximation Algorithms for Grooming in Optical Network Design. 1548-1556 - Konstantinos Manousakis

, Kostas Christodoulopoulos
, Emmanouel A. Varvarigos
:
Impairment-Aware Offline RWA for Transparent Optical Networks. 1557-1565 - Sebastian Neumayer, Gil Zussman, Reuven Cohen

, Eytan H. Modiano:
Assessing the Vulnerability of the Fiber Infrastructure to Disasters. 1566-1574 - Jun He, Maïté Brandt-Pearce

, Suresh Subramaniam
:
Analysis of Blocking Probability for First-Fit RWA in Transmission Impaired Optical Networks. 1575-1583
LAN, Access Networks
- Khaled Elmeleegy, Alan L. Cox:

EtherProxy: Scaling Ethernet By Suppressing Broadcast Traffic. 1584-1592 - Hao Han, Bo Sheng

, Chiu C. Tan, Qun Li
, Sanglu Lu:
A Measurement Based Rogue AP Detection Scheme. 1593-1601 - Bo Han, Lusheng Ji, Seungjoon Lee, Bobby Bhattacharjee, Robert R. Miller:

All Bits Are Not Equal - A Study of IEEE 802.11 Communication Bit Errors. 1602-1610
Game Theory, Wireless
- Eitan Altman, Ishai Menache, Alberto Suárez

:
Team and Noncooperative Solutions to Access Control with Priorities. 1611-1619 - Amir Nahir, Ariel Orda, Ari Freund:

Topology Design and Control: A Game-Theoretic Perspective. 1620-1628 - Eitan Altman, Anurag Kumar

, Chandramani Kishore Singh, Rajesh Sundaresan:
Spatial SINR Games Combining Base Station Placement and Mobile Association. 1629-1637 - Xin Ai, Vikram Srinivasan, Chen-Khong Tham

:
Wi-Sh: A Simple, Robust Credit Based Wi-Fi Community Network. 1638-1646
Ad Hoc 1
- Andrej Cvetkovski, Mark Crovella:

Hyperbolic Embedding and Routing for Dynamic Graphs. 1647-1655 - Stavros Toumpis, Savvas Gitzenis:

Load Balancing in Wireless Sensor Networks using Kirchhoff's Voltage Law. 1656-1664 - Zhen-Hua Feng, Yaling Yang:

Joint Transport, Routing and Spectrum Sharing Optimization for Wireless Networks with Frequency-Agile Radios. 1665-1673 - Lei Ying, Sanjay Shakkottai, Aneesh Reddy:

On Combining Shortest-Path and Back-Pressure Routing Over Multihop Wireless Networks. 1674-1682
Wireless Scheduling 3
- Chandrashekhar Thejaswi P. S., Junshan Zhang, Man-On Pun, H. Vincent Poor

:
Distributed Opportunistic Scheduling With Two-Level Channel Probing. 1683-1691 - Bilal Sadiq, Seung Jun Baek, Gustavo de Veciana:

Delay-Optimal Opportunistic Scheduling and Approximations: The Log Rule. 1692-1700 - Peter M. van de Ven, Sem C. Borst, Seva Shneer:

Instability of MaxWeight Scheduling Algorithms. 1701-1709 - JiaLiang Zhang, Soung Chang Liew, Liqun Fu:

On Fast Optimal STDMA Scheduling over Fading Wireless Channels. 1710-1718
Sensor Networks 6
- Guang Tan, Marin Bertier, Anne-Marie Kermarrec

:
Visibility-Graph-Based Shortest-Path Geographic Routing in Sensor Networks. 1719-1727 - Ming-Jer Tsai, Fang-Ru Wang, Hong-Yen Yang, Yuan-Po Cheng:

VirtualFace: An Algorithm to Guarantee Packet Delivery of Virtual-Coordinate-Based Routing Protocols in Wireless Sensor Networks. 1728-1736 - Roland Flury, Sriram V. Pemmaraju, Roger Wattenhofer:

Greedy Routing with Bounded Stretch. 1737-1745 - Guang Tan, Marin Bertier, Anne-Marie Kermarrec

:
Convex Partition of Sensor Networks and Its Use in Virtual Coordinate Geographic Routing. 1746-1754
Security 6
- Adam Bender, Rob Sherwood, Derek Monner, Nathan Goergen, Neil Spring, Bobby Bhattacharjee:

Fighting Spam with the NeighborhoodWatch DHT. 1755-1763 - Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei Dong, Mary Stephenson, James Michael Barker:

Detecting Spam Zombies by Monitoring Outgoing Messages. 1764-1772 - Jun-Won Ho, Matthew K. Wright

, Sajal K. Das
:
Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis. 1773-1781 - Lei Yu

, Jianzhong Li:
Grouping-Based Resilient Statistical En-Route Filtering for Sensor Networks. 1782-1790
Coding, Wireless
- Andrew Hagedorn, Sachin Agarwal, David Starobinski, Ari Trachtenberg:

Rateless Coding with Feedback. 1791-1799 - Daniel Enrique Lucani

, Milica Stojanovic, Muriel Médard:
Random Linear Network Coding For Time Division Duplexing: When To Stop Talking And Start Listening. 1800-1808 - Yunfeng Lin, Ben Liang

, Baochun Li:
Passive Loss Inference in Wireless Sensor Networks Based on Network Coding. 1809-1817 - Muhammad Usman Ilyas

, Moonseong Kim, Hayder Radha:
Reducing Packet Losses in Networks of Commodity IEEE 802.15.4 Sensor Motes Using Cooperative Communication and Diversity Combination. 1818-1826
MAC 1
- Chih-Cheng Hsu, Kuang-Fu Lai, Cheng-Fu Chou, Kate Ching-Ju Lin

:
ST-MAC: Spatial-Temporal MAC Scheduling for Underwater Sensor Networks. 1827-1835 - Petar Djukic

, Prasant Mohapatra:
Soft-TDMAC: A Software TDMA-Based MAC over Commodity 802.11 Hardware. 1836-1844 - Mo Sha

, Guoliang Xing, Gang Zhou, Shucheng Liu, Xiaorui Wang:
C-MAC: Model-Driven Concurrent Medium Access Control for Wireless Sensor Networks. 1845-1853 - HyungJune Lee

, Hyukjoon Kwon, Arik Motskin, Leonidas J. Guibas:
Interference-Aware MAC Protocol for Wireless Networks by a Game-Theoretic Approach. 1854-1862
Ad Hoc 2
- Cheng Wang, Xiang-Yang Li, Changjun Jiang, Shaojie Tang, Yunhao Liu, Jizhong Zhao:

Scaling Laws on Multicast Capacity of Large Scale Wireless Networks. 1863-1871 - Olga Goussevskaia, Roger Wattenhofer, Magnús M. Halldórsson

, Emo Welzl:
Capacity of Arbitrary Wireless Networks. 1872-1880 - Urs Niesen, Piyush Gupta, Devavrat Shah:

The Multicast Capacity Region of Large Wireless Networks. 1881-1889 - Giuseppa Alfano

, Michele Garetto
, Emilio Leonardi
:
Capacity Scaling of Wireless Networks with Inhomogeneous Node Density: Lower Bounds. 1890-1898
Error Correction, Wireless
- Eitan Altman, Francesco De Pellegrini:

Forward Correction and Fountain codes in Delay Tolerant Networks. 1899-1907 - Weiyao Xiao, David Starobinski:

Extreme Value FEC for Wireless Data Broadcasting. 1908-1916 - Reuven Cohen, Guy Grebla, Liran Katzir:

Cross-Layer Hybrid FEC/ARQ Reliable Multicast with Adaptive Modulation and Coding in Broadband Wireless Networks. 1917-1925 - Marco Levorato, Urbashi Mitra, Michele Zorzi:

On Optimal Control of Wireless Networks with Multiuser Detection, Hybrid ARQ and Distortion Constraints. 1926-1934
Security 7
- Etienne Perron, Suhas N. Diggavi, Emre Telatar:

On Cooperative Wireless Network Secrecy. 1935-1943 - Toby Xu, Ying Cai:

Location Cloaking for Safety Protection of Ad Hoc Networks. 1944-1952 - Li Lu, Jinsong Han, Renyi Xiao, Yunhao Liu:

ACTION: Breaking the Privacy Barrier for RFID Systems. 1953-1961 - Jerry T. Chiang, Jason J. Haas, Yih-Chun Hu, P. R. Kumar, Jihyuk Choi:

Fundamental Limits on Secure Clock Synchronization and Man-In-The-Middle Detection in Fixed Wireless Networks. 1962-1970
Multicasting
- Yigal Bejerano, Pramod V. Koppol:

Improving Zap Response Time for IPTV. 1971-1979 - Tae Won Cho, Michael Rabinovich

, K. K. Ramakrishnan
, Divesh Srivastava, Yin Zhang:
Enabling Content Dissemination Using Efficient and Scalable Multicast. 1980-1988 - Varun Khare, Beichuan Zhang:

Towards Economically Viable Infrastructure-Based Overlay Multicast Networks. 1989-1997 - Bo Xing, Sharad Mehrotra, Nalini Venkatasubramanian:

RADcast: Enabling Reliability Guarantees for Content Dissemination in Ad Hoc Networks. 1998-2006
Scheduling
- Adam Wierman, Lachlan L. H. Andrew, Ao Tang:

Power-Aware Speed Scaling in Processor Sharing Systems. 2007-2015 - Lykomidis Mastroleon:

Admissible Traces, Stability and Rate Management of Queueing / Switching Service Structures. 2016-2024 - Maciej Kurant:

Exploiting the Path Propagation Time Differences in Multipath Transmission with FEC. 2025-2033 - Randeep Bhatia, Girija J. Narlikar, Ivica Rimac, Andre Beck:

UNAP: User-Centric Network-Aware Push for Mobile Content Delivery. 2034-2042
MAC 2
- Seung-Jae Han, Thyaga Nandagopal, Yigal Bejerano, Hyoung-Gyu Choi:

Analysis of Spatial Unfairness in Wireless LANs. 2043-2051 - Jing Shi, Ehsan Aryafar, Theodoros Salonidis, Edward W. Knightly:

Synchronized CSMA Contention: Model, Implementation and Evaluation. 2052-2060 - Joseph Naor, Danny Raz, Gabriel Scalosub:

Toward Optimal Utilization of Shared Random Access Channels. 2061-2069 - Yu Cheng

, Xinhua Ling, Weihua Zhuang
:
A Protocol-Independent Approach for Analyzing the Optimal Operation Point of CSMA/CA Protocols. 2070-2078
Ad Hoc 3
- Chris Milling, Sundar Subramanian, Sanjay Shakkottai, Randall Berry

:
Routing Over Multi-Hop Wireless Networks with Non-Ergodic Mobility. 2079-2087 - Anand D. Sarwate

, Alexandros G. Dimakis:
The Impact of Mobility on Gossip Algorithms. 2088-2096 - Ben McCarthy, Christopher Edwards, Martin Dunmore:

Using NEMO to Support the Global Reachability of MANET Nodes. 2097-2105 - Alessandro Mei

, Julinda Stefa
:
SWIM: A Simple Model to Generate Small Mobile Worlds. 2106-2113
Cooperative Networks, Wireless
- Walid Saad, Zhu Han, Mérouane Debbah, Are Hjørungnes, Tamer Basar:

Coalitional Games for Distributed Collaborative Spectrum Sensing in Cognitive Radio Networks. 2114-2122 - Alireza Aram, Chandramani Kishore Singh, Saswati Sarkar, Anurag Kumar

:
Cooperative Profit Sharing in Coalition Based Resource Allocation in Wireless Networks. 2123-2131 - Tuncer C. Aysal, Kenneth E. Barner:

On the Convergence of Perturbed Non-Stationary Consensus Algorithms. 2132-2140 - Hong Xu

, Baochun Li:
XOR-Assisted Cooperative Diversity in OFDMA Wireless Networks: Optimization Framework and Approximation Algorithms. 2141-2149
Sensor Networks 7
- Animashree Anandkumar, Meng Wang, Lang Tong, Ananthram Swami:

Prize-Collecting Data Fusion for Cost-Performance Tradeoff in Distributed Inference. 2150-2158 - Bo Yu, Jianzhong Li, Yingshu Li

:
Distributed Data Aggregation Scheduling in Wireless Sensor Networks. 2159-2167 - Changlei Liu, Guohong Cao:

Minimizing the Cost of Mine Selection Via Sensor Networks. 2168-2176 - Lorenzo Keller, Mahdi Jafari Siavoshani, Christina Fragouli, Katerina J. Argyraki

, Suhas N. Diggavi:
Identity Aware Sensor Networks. 2177-2185
Security 8
- Adel El-Atawy

, Ehab Al-Shaer:
Building Covert Channels over the Packet Reordering Phenomenon. 2186-2194 - Weijia Jia

, Fung Po Tso
, Zhen Ling, Xinwen Fu
, Dong Xuan, Wei Yu
:
Blind Detection of Spread Spectrum Flow Watermarks. 2195-2203 - Sarah H. Sellke, Chih-Chun Wang, Saurabh Bagchi, Ness B. Shroff:

TCP/IP Timing Channels: Theory to Implementation. 2204-2212 - Yanfei Fan, Yixin Jiang, Haojin Zhu

, Xuemin Shen
:
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding. 2213-2221
Multicasting, Wireless
- Donglin Hu, Shiwen Mao, Jeffrey H. Reed:

On Video Multicast in Cognitive Radio Networks. 2222-2230 - Cheng-Hsin Hsu, Mohamed Hefeeda

:
Time Slicing in Mobile TV Broadcast Networks with Arbitrary Channel Bit Rates. 2231-2239 - Mhameed Aezladen, Reuven Cohen, Danny Raz:

Locally vs. Globally Optimized Flow-Based Content Distribution to Mobile Nodes. 2240-2248 - Seth Gilbert

, Rachid Guerraoui
, Dariusz R. Kowalski, Calvin C. Newport:
Interference-Resilient Information Exchange. 2249-2257
Backend Services
- Shuyi Chen, Kaustubh R. Joshi, Matti A. Hiltunen, William H. Sanders, Richard D. Schlichting:

Link Gradients: Predicting the Impact of Network Latency on Multitier Applications. 2258-2266 - Ho-Lin Chen

, Jason R. Marden, Adam Wierman:
On the Impact of Heterogeneity and Back-End Scheduling in Load Balancing Designs. 2267-2275 - Dan Li, Chuanxiong Guo

, Haitao Wu, Kun Tan, Songwu Lu:
FiConn: Using Backup Port for Server Interconnection in Data Centers. 2276-2285 - Hongbo Jiang, Arun Iyengar, Erich M. Nahum, Wolfgang Segmuller, Asser N. Tantawi

, Charles P. Wright:
Load Balancing for SIP Server Clusters. 2286-2294
MAC 3
- Senhua Huang, Xin Liu, Zhi Ding

:
Optimal Sensing-Transmission Structure for Dynamic Spectrum Access. 2295-2303 - Juncheng Jia, Jin Zhang, Qian Zhang

:
Cooperative Relay for Cognitive Radio Networks. 2304-2312 - Wonsoo Kim, Owais Khan, Kien T. Truong, Soon-Hyeok Choi, Robert Grant, Hyrum K. Wright, Ketan Mandke, Robert C. Daniels, Robert W. Heath Jr., Scott Nettles:

An Experimental Evaluation of Rate Adaptation for Multi-Antenna Systems. 2313-2321 - Haythem Bany Salameh

, Marwan Krunz, Ossama Younis:
Dynamic Spectrum Access Protocol Without Power Mask Constraints. 2322-2330
Ad Hoc 4
- Koushik Kar

, Xiang Luo, Saswati Sarkar:
Delay Guarantees for Throughput-Optimal Wireless Link Scheduling. 2331-2339 - Peng-Jun Wan, XiaoHua Xu, Lixin Wang, Xiaohua Jia

, Eun K. Park:
Minimum-Latency Beaconing Schedule in Multihop Wireless Networks. 2340-2346 - Lei Ying, Sanjay Shakkottai:

Scheduling in Mobile Ad Hoc Networks with Topology and Channel-State Uncertainty. 2347-2355 - Gagan Raj Gupta

, Ness B. Shroff:
Delay Analysis for Multi-Hop Wireless Networks. 2356-2364
Wireless, Sensor Networks
- Husheng Li, Lin Zhong, Kun Zheng:

Drowsy Transmission: Physical Layer Energy Optimization for Transmitting Random Packet Traffic. 2365-2373 - Mingming Lu, Jie Wu:

Opportunistic Routing Algebra and its Applications. 2374-2382 - Arik Motskin, Tim Roughgarden, Primoz Skraba, Leonidas J. Guibas:

Lightweight Coloring and Desynchronization for Networks. 2383-2391
Sensor Networks 8
- Zheng Yang, Yunhao Liu, Xiang-Yang Li:

Beyond Trilateration: On the Localizability of Wireless Ad-Hoc Networks. 2392-2400 - Yue Wang, Sol Lederer, Jie Gao:

Connectivity-Based Sensor Network Localization with Incremental Delaunay Refinement Method. 2401-2409 - Liang Zhang, Shigang Chen, Ying Jian, Yuguang Fang

:
Distributed Progressive Algorithm for Maximizing Lifetime Vector in Wireless Sensor Networks. 2410-2418 - Mo Li

, Yunhao Liu, Jiliang Wang, Zheng Yang:
Sensor Network Navigation without Locations. 2419-2427
Security 9
- Feng Li, Jie Wu, Anand Srinivasan:

Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets. 2428-2436 - Adel El-Atawy

, Ehab Al-Shaer, Tung Tran, Raouf Boutaba:
Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks. 2437-2445 - Fabio Soldo, Athina Markopoulou

, Katerina J. Argyraki
:
Optimal Filtering of Source Address Prefixes: Models and Algorithms. 2446-2454 - Bo Zhao, Caixia Chi, Wei Gao, Sencun Zhu, Guohong Cao:

A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses. 2455-2463
Protocols, Wireless
- Natalia Castro Fernandes

, Marcelo Duffles Donato Moreira, Otto Carlos Muniz Bandeira Duarte:
An Efficient Filter-based Addressing Protocol for Autoconfiguration of Mobile Ad Hoc Networks. 2464-2472 - Dimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun Wang:

Pacifier: High-Throughput, Reliable Multicast without "Crying Babies" in Wireless Mesh Networks. 2473-2481 - Kaushik R. Chowdhury

, Marco Di Felice, Ian F. Akyildiz:
TP-CRAHN: a Transport Protocol for Cognitive Radio Ad-Hoc Networks. 2482-2490 - Jiakang Lu, Kamin Whitehouse:

Flash Flooding: Exploiting the Capture Effect for Rapid Flooding in Wireless Sensor Networks. 2491-2499
Algorithms
- Josef Kanizo, David Hay, Isaac Keslassy

:
Optimal Fast Hashing. 2500-2508 - Mohammad Behdadfar, Hossein Saidi

, Hamid Alaei, Babak Samari:
Scalar Prefix Search: A New Route Lookup Algorithm for Next Generation Internet. 2509-2517 - Haoyu Song

, Fang Hao, Murali S. Kodialam, T. V. Lakshman:
IPv6 Lookups using Distributed and Load Balanced Bloom Filters for 100Gbps Core Router Line Cards. 2518-2526 - Etienne Perron, Dinkar Vasudevan, Milan Vojnovic:

Using Three States for Binary Consensus on Complete Graphs. 2527-2535
Ad Hoc Mobile Networks 1
- Murali S. Kodialam, T. V. Lakshman, Sudipta Sengupta:

Capacity of Multi-Hop Wireless Networks with Incomplete Traffic Specification. 2536-2540 - Shan-Hung Wu, Chung-Min Chen, Ming-Syan Chen

:
AAA: Asynchronous, Adaptive, and Asymmetric Power Management for Mobile Ad Hoc Networks. 2541-2545 - Zhiqiang Li, F. Richard Yu

, Minyi Huang:
A Cooperative Spectrum Sensing Consensus Scheme in Cognitive Radios. 2546-2550 - Lifeng Sang, Anish Arora:

Capabilities of Low-Power Wireless Jammers. 2551-2555 - Xiaoyuan Ta, Guoqiang Mao

, Brian D. O. Anderson:
On the Properties of Giant Component in Wireless Multi-Hop Networks. 2556-2560
QoS Provisionings and Evaluations
- Rahul Urgaonkar, Michael J. Neely:

Delay-Limited Cooperative Communication with Reliability Constraints in Wireless Networks. 2561-2565 - Ryo Sugihara, Rajesh K. Gupta:

Optimizing Energy-Latency Trade-Off in Sensor Networks with Controlled Mobility. 2566-2570 - Lei Pan, Hongyi Wu:

Smart Trend-Traversal: A Low Delay and Energy Tag Arbitration Protocol for Large RFID Systems. 2571-2575 - Amin Alamdar Yazdi, Sameh Sorour, Shahrokh Valaee, Ronny Yongho Kim:

Optimum Network Coding for Delay Sensitive Applications in WiMAX Unicast. 2576-2580 - René Serral-Gracià, Yann Labit, Jordi Domingo-Pascual, Philippe Owezarski:

Towards an Efficient Service Level Agreement Assessment. 2581-2585
Content Distribution and Delay/Disruption Tolerance Networks
- Nishanth Sastry

, Karen R. Sollins, Jon Crowcroft
:
Delivery Properties of Human Social Networks. 2586-2590 - Jiahua Wu

, Baochun Li:
Keep Cache Replacement Simple in Peer-Assisted VoD Systems. 2591-2595 - Yongning Tang, Ehab Al-Shaer:

Overlay Fault Diagnosis Based on Evidential Reasoning. 2596-2600 - David T.-H. Kao, Ashutosh Sabharwal:

Impact of Network Topology Knowledge on Fairness: A Geometric Approach. 2601-2605 - Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai

, Hussein T. Mouftah:
CFP: Cooperative Fast Protection. 2606-2610
Broadband Access Technologies
- Suk-Bok Lee, Ioannis Pefkianakis, Adam Meyerson, Shugong Xu

, Songwu Lu:
Proportional Fair Frequency-Domain Packet Scheduling for 3GPP LTE Uplink. 2611-2615 - Jin Teng, Changqing Xu, Weijia Jia

, Dong Xuan:
D-Scan: Enabling Fast and Smooth Handoffs in AP-Dense 802.11 Wireless Networks. 2616-2620 - Sriram Lakshmanan, Karthikeyan Sundaresan, Ravi Kokku, A. Khojestepour, Sampath Rangarajan:

Towards Adaptive Beamforming in Indoor Wireless Networks: An Experimental Approach. 2621-2625 - Thomas Bonald, Ali Ibrahim, James W. Roberts:

Enhanced Spatial Reuse in Multi-Cell WLANs. 2626-2630
Network Control and Management 1
- Elisha J. Rosensweig, Jim Kurose:

Breadcrumbs: Efficient, Best-Effort Content Location in Cache Networks. 2631-2635 - Eitan Altman, Ishai Menache, Asuman E. Ozdaglar:

Noncooperative Load Balancing in the Continuum Limit of a Dense Network. 2636-2640 - Reuven Cohen, Alexander Landau:

"Not All At Once!" - A Generic Scheme for Estimating the Number of Affected Nodes While Avoiding Feedback Implosion. 2641-2645 - Yigal Bejerano, Qunfeng Dong:

Distributed Construction of Fault Resilient High Capacity Wireless Networks with Bounded Node Degree. 2646-2650 - Juan F. Pérez

, Benny Van Houdt:
Dimensioning an OBS Switch with Partial Wavelength Conversion and Fiber Delay Lines via a Mean Field Model. 2651-2655
Network Architecture and Modeling
- Xin Liu, Chunming Qiao, Ting Wang:

Application-Specific, Agile and Private (ASAP) Platforms for Federated Computing Services over WDM Networks. 2656-2660 - Ritesh Maheshwari, Jing Cao, Samir R. Das:

Physical Interference Modeling for Transmission Scheduling on Commodity WiFi Hardware. 2661-2665 - Juanjuan Yu, Yue He, Kai Wu

, Marco Tacca, Andrea Fumagalli, Jean-Philippe Vasseur:
A Queueing Model Framework of PCE-Based Inter-Area Path Computation. 2666-2670 - Chun-cheng Chen, Chandra Chekuri, Diego Klabjan:

Topology Formation for Wireless Mesh Network Planning. 2671-2675
Multicast / Broadcast/ Anycast
- Mohamed A. Ismail, Walid Dabbous, Antoine Clerget:

A Multi-Burst Sliding Encoding for Mobile Satellite TV Broadcasting. 2676-2680 - Rajiv Gandhi, Yoo-Ah Kim, Seungjoon Lee, Jiho Ryu, Peng-Jun Wan:

Approximation Algorithms for Data Broadcast in Wireless Networks. 2681-2685 - Song Guo

, Minyi Guo, Victor C. M. Leung
:
Exploring the Multicast Lifetime Capacity of WANETs with Directional Multibeam Antennas. 2686-2690 - Nathalie Mitton, David Simplot-Ryl, Ivan Stojmenovic:

Guaranteed Delivery for Geographical Anycasting in Wireless Multi-Sink Sensor and Sensor-Actor Networks. 2691-2695 - Yigal Bejerano, Pramod V. Koppol:

Optimal Construction of Redundant Multicast Trees in Directed Graphs. 2696-2700
Pricing, Billing & Network Measurement 1
- Amir Hassan Rasti, Mojtaba Torkjazi, Reza Rejaie, Nick G. Duffield

, Walter Willinger, Daniel Stutzbach:
Respondent-Driven Sampling for Characterizing Unstructured Overlays. 2701-2705 - Mohit Saxena, Ramana Rao Kompella:

A Framework for Efficient Class-Based Scheduling. 2706-2710 - Ashwin Lall, Mitsunori Ogihara

, Jun (Jim) Xu:
An Efficient Algorithm for Measuring Medium- to Large-Sized Flows in Network Traffic. 2711-2715 - Ionut Constandache, Shravan Gaonkar, Matt Sayler, Romit Roy Choudhury, Landon P. Cox:

EnLoc: Energy-Efficient Localization for Mobile Phones. 2716-2720 - Jin Cao, Aiyou Chen, Tian Bu, Arumugam Buvaneswari:

Monitoring Time-Varying Network Streams Using State-Space Models. 2721-2725
Peer-to-Peer Networks
- Di Wu, Chao Liang, Yong Liu

, Keith W. Ross:
View-Upload Decoupling: A Redesign of Multi-Channel P2P Video Systems. 2726-2730 - Chuan Wu

, Baochun Li, Shuqiao Zhao:
Diagnosing Network-Wide P2P Live Streaming Inefficiencies. 2731-2735 - Khaldoon Shami, Damien Magoni

, Hyunseok Chang, Wenjie Wang, Sugih Jamin:
Impacts of Peer Characteristics on P2PTV Networks Scalability. 2736-2740 - Chao Liang, Zhenghua Fu, Yong Liu

, Chai Wah Wu
:
iPASS: Incentivized Peer-Assisted System for Asynchronous Streaming. 2741-2745 - Sanja Petrovic, Patrick Brown:

Large Scale Analysis of the eDonkey P2P File Sharing System. 2746-2750
Routing Protocols
- Cong Liu, Jie Wu:

Efficient Geometric Routing in Three Dimensional Ad Hoc Networks. 2751-2755 - MohammadHossein Bateni, Alexandre Gerber, Mohammad Taghi Hajiaghayi, Subhabrata Sen:

Multi-VPN Optimization for Scalable Routing via Relaying. 2756-2760 - Ryoichi Kawahara, Eng Keong Lua, Masato Uchida

, Satoshi Kamei, Hideaki Yoshino:
On the Quality of Triangle Inequality Violation Aware Routing Overlay Architecture. 2761-2765 - Rik Sarkar, Xianjin Zhu, Jie Gao:

Spatial Distribution in Routing Table Design for Sensor Networks. 2766-2770 - Gábor Enyedi, Péter Szilágyi, Gábor Rétvári, András Császár:

IP Fast ReRoute: Lightweight Not-Via without Additional Addresses. 2771-2775
Wireless Sensor Networks 1
- Yunhuai Liu, Lionel M. Ni:

A Generalized Probabilistic Topology Control for Wireless Sensor Networks. 2776-2780 - Changlei Liu, Guohong Cao:

A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks. 2781-2785 - Riccardo Crepaldi, Mirko Montanari, Indranil Gupta, Robin Kravets

:
Using Failure Models for Controlling Data Availability in Wireless Sensor Networks. 2786-2790 - Huadong Ma, Xi Zhang, Anlong Ming:

A Coverage-Enhancing Method for 3D Directional Sensor Networks. 2791-2795 - Yuanchen Zhu, Steven J. Gortler, Dylan Thurston:

Sensor Network Localization Using Sensor Perturbation. 2796-2800
Scheduling, Resource Allocation, and Management 1
- Chih-Chun Wang, Xiaojun Lin:

Fast Resource Allocation for Network-Coded Traffic - A Coded-Feedback Approach. 2801-2805 - Chi-Yao Hong, Ai-Chun Pang:

Link Scheduling with QoS Guarantee for Wireless Relay Networks. 2806-2810 - Pierre Coucheney, Corinne Touati, Bruno Gaujal:

Fair and Efficient User-Network Association Algorithm for Multi-Technology Wireless Networks. 2811-2815 - Pablo Belzarena, Andrés Ferragut

, Fernando Paganini:
Network Bandwidth Allocation via Distributed Auctions with Time Reservations. 2816-2820 - Udi Ben-Porat, Anat Bremler-Barr

, Hanoch Levy:
On the Exploitation of CDF Based Wireless Scheduling. 2821-2825
Internet Design
- Cédric Westphal, Guanhong Pei:

Scalable Routing Via Greedy Embedding. 2826-2830 - Zizhan Zheng

, Prasun Sinha, Santosh Kumar:
Alpha Coverage: Bounding the Interconnection Gap for Vehicular Internet Access. 2831-2835 - Takayuki Osogami:

A Fluid Limit for Cache Algorithms with General Request Processes. 2836-2840 - Chuanxiong Guo

, Yunxin Liu, Wenchao Shen, Helen J. Wang, Qing Yu, Yongguang Zhang:
Mining the Web and the Internet for Accurate IP Address Geolocations. 2841-2845
Security, Trust, and Privacy
- Tao Shu, Sisi Liu, Marwan Krunz

:
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes. 2846-2850 - Domenico Ficara, Stefano Giordano, Gregorio Procissi

, Fabio Vitucci, Gianni Antichi
, Andrea Di Pietro:
Faster DFAs through Simple and Efficient Inverse Homomorphisms. 2851-2855 - Mudhakar Srivatsa, Arun Iyengar, Ling Liu:

Privacy in VoIP Networks: A k-Anonymity Approach. 2856-2860 - Krishna P. N. Puttaswamy, Alessandra Sala, Ömer Egecioglu, Ben Y. Zhao:

Rome: Performance and Anonymity using Route Meshes. 2861-2865 - Daniela Brauckhoff, Kavé Salamatian

, Martin May:
Applying PCA for Traffic Anomaly Detection: Problems and Solutions. 2866-2870
Wireless Mesh Networks
- Raghuraman Mudumbai, Sumit Singh, Upamanyu Madhow:

Medium Access Control for 60 GHz Outdoor Mesh Networks with Highly Directional Links. 2871-2875 - Li (Erran) Li, Richard Alimi, Ramachandran Ramjee, Harish Viswanathan, Yang Richard Yang:

muNet: Harnessing Multiuser Capacity in Wireless Mesh Networks. 2876-2880 - Jun Zhang, Xiaohua Jia

:
Capacity Analysis of Wireless Mesh Networks with Omni or Directional Antennas. 2881-2885 - Chun-Pong Luk, Wing Cheong Lau, On-Ching Yue:

Opportunistic Routing with Directional Antennas in Wireless Mesh Networks. 2886-2890 - Dhruv Gupta, Di Wu, Prasant Mohapatra, Chen-Nee Chuah

:
Experimental Comparison of Bandwidth Estimation Tools for Wireless Mesh Networks. 2891-2895
Wireless Sensor Networks 2
- Paul Balister, Santosh Kumar:

Random vs. Deterministic Deployment of Sensors in the Presence of Failures and Placement Errors. 2896-2900 - Hiroshi Saito, Shinsuke Shimogawa, Shigeo Shioda

, Junko Harada:
Shape Estimation Using Networked Binary Sensors. 2901-2905 - Hui Kang, Jennifer L. Wong

:
A Localized Multi-Hop Desynchronization Algorithm for Wireless Sensor Networks. 2906-2910 - Xianjin Zhu, Rik Sarkar, Jie Gao:

Topological Data Processing for Distributed Sensor Networks with Morse-Smale Decomposition. 2911-2915 - Hongbo Jiang, Wenping Liu, Dan Wang

, Chen Tian, Xiang Bai, Xue Liu, Ying Wu, Wenyu Liu
:
CASE: Connectivity-Based Skeleton Extraction in Wireless Sensor Networks. 2916-2920
Scheduling, Resource Allocation, and Management 2
- Tianxiong Ji, Eleftheria Athanasopoulou, R. Srikant:

Optimal Scheduling Policies in Small Generalized Switches. 2921-2925 - Qiao Li, Rohit Negi:

Scheduling in Multi-Hop Wireless Networks with Priorities. 2926-2930 - Debmalya Panigrahi, Bhaskaran Raman:

TDMA Scheduling in Long-Distance WiFi Networks. 2931-2935 - Loc Bui, R. Srikant, Alexander L. Stolyar:

Novel Architectures and Algorithms for Delay Reduction in Back-Pressure Scheduling and Routing. 2936-2940
Pricing, Billing & Network Measurement 2
- Jacomo Corbo, Shaili Jain, Michael Mitzenmacher, David C. Parkes:

An Economically-Principled Generative Model of AS Graph Connectivity. 2941-2945 - Yu Gu, Lee Breslau, Nick G. Duffield

, Subhabrata Sen:
On Passive One-Way Loss Measurements Using Sampled Flow Statistics. 2946-2950 - Lydia Yiyu Chen, Natarajan Gautam:

Server Frequency Control Using Markov Decision Processes. 2951-2955 - Parthasarathy Ramanujam, Zongpeng Li, Lisa Higham:

Shadow Prices vs. Vickrey Prices in Multipath Routing. 2956-2960 - Kurtis B. Kredo II, Petar Djukic

, Prasant Mohapatra:
STUMP: Exploiting Position Diversity in the Staggered TDMA Underwater MAC Protocol. 2961-2965
Ad Hoc Mobile Networks 2
- Sachin Shetty

, Min Song, Chunsheng Xin, E. K. Park:
A Learning-based Multiuser Opportunistic Spectrum Access Approach in Unslotted Primary Networks. 2966-2970 - Paolo Minero, Massimo Franceschetti:

Throughput of Slotted ALOHA with Encoding Rate Optimization and Multipacket Reception. 2971-2975 - Tao Shu, Marwan Krunz:

Coordinated Channel Access in Cognitive Radio Networks: A Multi-Level Spectrum Opportunity Perspective. 2976-2980 - Dimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun Wang:

An Empirical Study of Performance Benefits of Network Coding in Multihop Wireless Networks. 2981-2985 - Dola Saha, Aveek Dutta, Dirk Grunwald, Douglas C. Sicker

:
PHY Aided MAC - A New Paradigm. 2986-2990
Network Control and Management 2
- Min Ding, Xiuzhen Cheng:

Robust Event Boundary Detection in Sensor Networks - A Mixture Model Based Approach. 2991-2995 - Haiming Yang, Hsin-Yi Shen, Biplab Sikdar

, Shivkumar Kalyanaraman:
A Threshold Based MAC Protocol for Cooperative MIMO Transmissions. 2996-3000 - Sundhar Srinivasan Ram, Venugopal V. Veeravalli, Angelia Nedic

:
Distributed Non-Autonomous Power Control through Distributed Convex Optimization. 3001-3005 - Andrew R. Curtis, Alejandro López-Ortiz:

Capacity Provisioning a Valiant Load-Balanced Network. 3006-3010 - Aditya Ramamoorthy, Vwani P. Roychowdhury, Sumit K. Singh:

Selfish Distributed Compression over Networks. 3011-3015

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














