


default search action
30th INFOCOM 2011: Shanghai, China
- INFOCOM 2011. 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 10-15 April 2011, Shanghai, China. IEEE 2011, ISBN 978-1-4244-9921-2

Network Measurement
- Salvatore Scellato, Ilias Leontiadis, Cecilia Mascolo

, Prithwish Basu, Murtaza Zafer:
Understanding robustness of mobile networks through temporal network measures. 1-5 - Sukhyun Song, Peter J. Keleher, Bobby Bhattacharjee, Alan Sussman

:
Decentralized, accurate, and low-cost network bandwidth prediction. 6-10 - Xingang Shi, Chi-Kin Chau

, Dah-Ming Chiu:
Space-efficient tracking of network-wide flow correlations. 11-15 - Gonca Gürsun, Mark Crovella, Ibrahim Matta

:
Describing and forecasting video access patterns. 16-20 - Yiming Zhang:

Exploiting Tag-based Path Diversity in the DLG-Kautz network. 21-25
Secure Wireless Networks
- Ping Xu, XiaoHua Xu, Shaojie Tang, Xiang-Yang Li:

Truthful online spectrum allocation and auction in multi-channel wireless networks. 26-30 - Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz

:
Privacy analysis of user association logs in a large-scale wireless LAN. 31-35 - Shaxun Chen, Kai Zeng, Prasant Mohapatra:

Hearing is believing: Detecting mobile primary user emulation attack in white space. 36-40 - Hossein Kaffash Bokharaei, Alireza Sahraei, Yashar Ganjali, Ram Keralapura, Antonio Nucci:

You can SPIT, but you can't hide: Spammer identification in telephony networks. 41-45 - Mahmoud Taghizadeh, Amir R. Khakpour, Alex X. Liu, Subir Biswas:

Collaborative firewalling in wireless networks. 46-50
Data Center
- Yan Zhang, Nirwan Ansari

:
On mitigating TCP Incast in Data Center Networks. 51-55 - Dan Li, Mingwei Xu, Ming-Chen Zhao, Chuanxiong Guo

, Yongguang Zhang, Min-You Wu:
RDCM: Reliable data center multicast. 56-60 - Deke Guo, Tao Chen

, Dan Li, Yunhao Liu, Xue Liu, Guihai Chen
:
BCN: Expansible network structures for data centers using hierarchical compound graphs. 61-65 - Vivek Shrivastava, Petros Zerfos, Kang-Won Lee, Hani Jamjoom, Yew-Huey Liu, Suman Banerjee:

Application-aware virtual machine migration in data centers. 66-70 - Meng Wang, Xiaoqiao Meng, Li Zhang:

Consolidating virtual machines with dynamic bandwidth demand in data centers. 71-75
Spectrum Allocation and Channel Assignment
- Mahdi Hajiaghayi, Min Dong

, Ben Liang
:
Optimal channel assignment and power allocation for dual-hop multi-channel multi-user relaying. 76-80 - Fan Wu, Nitin H. Vaidya:

SMALL: A Strategy-proof Mechanism for radio spectrum allocation. 81-85 - Ajay Gopinathan, Zongpeng Li:

A prior-free revenue maximizing auction for secondary spectrum access. 86-90 - Jonathan Wellons, Yuan Xue:

Towards robust and efficient routing in multi-radio, multi-channel wireless mesh networks. 91-95 - Reuven Cohen, Guy Grebla:

Efficient allocation of CQI channels in broadband wireless networks. 96-100
Resource Allocation in Cellular Networks
- Yu Jin, Nick G. Duffield

, Alexandre Gerber, Patrick Haffner, Wen-Ling Hsu, Guy Jacobson, Subhabrata Sen, Shobha Venkataraman, Zhi-Li Zhang:
Making sense of customer tickets in cellular networks. 101-105 - Salah-Eddine Elayoubi

, Louai Saker
, Tijani Chahed:
Optimal control for base station sleep mode in energy efficient radio access networks. 106-110 - David López-Pérez, Ákos Ladányi, Alpár Jüttner, Hervé Rivano

, Jie Zhang
:
Optimization method for the joint allocation of modulation schemes, coding rates, resource blocks and power in self-organizing LTE networks. 111-115 - Se-Young Yun, Yung Yi, Dong-Ho Cho, Jeonghoon Mo:

Open or close: On the sharing of femtocells. 116-120 - Gyan Ranjan, Zhi-Li Zhang, Supranamaya Ranjan, Ram Keralapura, Joshua Robinson:

Un-zipping cellular infrastructure locations via user geo-intent. 121-125
Internet Routing
- Péter Mátray, Péter Hága, Sándor Laki

, István Csabai
, Gábor Vattay:
On the network geography of the Internet. 126-130 - Shiva Prasad Kasiviswanathan, Stephan J. Eidenbenz

, Guanhua Yan:
Geography-based analysis of the Internet infrastructure. 131-135 - Mohit Chamania

, Marcel Caria, Admela Jukan:
A comparative performance analysis of IP traffic offloading schemes over Dynamic Circuits. 136-140 - Onur Turkcu, Arun K. Somani

:
Efficient multicasting approaches using collection-distribution networks. 141-145 - Ravish Khosla, Sonia Fahmy

, Y. Charlie Hu:
BGP molecules: Understanding and predicting prefix failures. 146-150
Network Monitoring
- Udi Weinsberg, Augustin Soule, Laurent Massoulié:

Inferring traffic shaping and policy parameters using end host measurements. 151-155 - Pinghui Wang, Xiaohong Guan, Weibo Gong, Donald F. Towsley

:
A new virtual indexing method for measuring host connection degrees. 156-160 - Kohei Watabe, Masaki Aida:

Analysis on the fluctuation magnitude in probe interval for active measurement. 161-165 - Mikkel Thorup

:
Timeouts with time-reversed linear probing. 166-170 - Brian Eriksson, Paul Barford, Joel Sommers, Robert D. Nowak:

DomainImpute: Inferring unseen components in the Internet. 171-175
Security
- Kaustubh Nyalkalkar, Sushant Sinha, Michael D. Bailey, Farnam Jahanian:

A comparative study of two network-based anomaly detection methods. 176-180 - Jing Gao, Wei Fan, Deepak S. Turaga, Olivier Verscheure, Xiaoqiao Meng, Lu Su, Jiawei Han:

Consensus extraction from heterogeneous detectors to improve performance over network traffic anomaly detection. 181-185 - Zhen Ling, Xinwen Fu

, Weijia Jia
, Wei Yu
, Dong Xuan:
A novel packet size based covert channel attack against anonymizer. 186-190 - Anh Le, Athina Markopoulou

, Michalis Faloutsos
:
PhishDef: URL names say it all. 191-195 - Yeim-Kuan Chang, Chun-I Lee, Cheng-Chien Su:

Multi-field range encoding for packet classification in TCAM. 196-200
Cloud and Network Management
- Zixia Huang, Chao Mei, Li Erran Li, Thomas Woo:

CloudStream: Delivering high-quality streaming videos through a cloud-based SVC proxy. 201-205 - Upendra Sharma, Prashant J. Shenoy

, Sambit Sahu, Anees Shaikh:
Kingfisher: Cost-aware elasticity in the cloud. 206-210 - Yousuk Seung, Terry Lam, Li Erran Li, Thomas Woo:

CloudFlex: Seamless scaling of enterprise applications into the cloud. 211-215 - Xavier León, Leandro Navarro

:
Limits of energy saving for the allocation of data center resources to networked applications. 216-220 - Xin Sun, Sanjay G. Rao:

A cost-benefit framework for judicious enterprise network redesign. 221-225
Cognitive Radio
- Chuan Han, Yaling Yang:

Information propagation speed study in multihop cognitive radio networks. 226-230 - Ying Zhu, Minsu Huang, Siyuan Chen, Yu Wang:

Cooperative energy spanners: Energy-efficient topology control in cooperative ad hoc networks. 231-235 - Kaigui Bian, Jung-Min Park:

Asynchronous channel hopping for establishing rendezvous in cognitive radio networks. 236-240 - Chengzhi Li, Huaiyu Dai:

On the throughput scaling of Cognitive Radio ad hoc networks. 241-245 - Lei Sun, Wenye Wang

:
On distribution and limits of information dissemination latency and speed in mobile cognitive radio networks. 246-250
Routing in Wireless Networks
- Alessandro Mei

, Giacomo Morabito
, Paolo Santi, Julinda Stefa
:
Social-aware stateless forwarding in pocket switched networks. 251-255 - Yifan Li, Ping Wang, Dusit Niyato

, Weihua Zhuang
:
A dynamic relay selection scheme for mobile users in wireless relay networks. 256-260 - Riccardo Masiero, Giovanni Neglia:

Distributed subgradient methods for Delay Tolerant Networks. 261-265 - Suk-Bok Lee, Starsky H. Y. Wong, Kang-Won Lee, Songwu Lu:

Content management in a mobile ad hoc network: Beyond opportunistic strategy. 266-270 - Chi-Kin Chau

, Richard J. Gibbens, Robert E. Hancock, Donald F. Towsley
:
Robust multipath routing in large wireless networks. 271-275
Wireless Sensor Networks I
- Tao Chen

, Zheng Yang, Yunhao Liu, Deke Guo, Xueshan Luo:
Localization in non-localizable sensor and ad-hoc networks: A Localizability-aided approach. 276-280 - XuFei Mao, Shaojie Tang, Xiaohua Xu, Xiang-Yang Li, Huadong Ma:

iLight: Indoor device-free passive tracking using wireless sensor networks. 281-285 - Wenbo Zhao

, Xueyan Tang:
Scheduling data collection with dynamic traffic patterns in wireless sensor networks. 286-290 - Ming Liu, Haigang Gong, Yonggang Wen, Guihai Chen

, Jiannong Cao
:
The last minute: Efficient Data Evacuation strategy for sensor networks in post-disaster applications. 291-295 - Cheng Wang, Shaojie Tang, Xiang-Yang Li, Changjun Jiang:

SelectCast: Scalable data aggregation scheme in wireless sensor networks. 296-300
Routing and Forwarding
- Jin Zhao, Xinya Zhang, Xin Wang, Yangdong Deng, Xiaoming Fu

:
Exploiting graphics processors for high-performance IP lookup in software routers. 301-305 - Kun Huang, Gaogang Xie, Yanbiao Li, Alex X. Liu:

Offset addressing approach to memory-efficient IP address lookup. 306-310 - Zhuo Huang, Jih-Kwon Peir, Shigang Chen:

Approximately-perfect hashing: Improving network throughput through efficient off-chip routing table lookup. 311-315 - Guner D. Celik, Long Bao Le

, Eytan H. Modiano:
Scheduling in parallel queues with randomly varying connectivity and switchover delay. 316-320 - Qing Li

, Dan Wang
, Mingwei Xu, Jiahai Yang:
On the scalability of router forwarding tables: Nexthop-Selectable FIB aggregation. 321-325
Security and Privacy in Wireless Sensor Networks
- Sushmita Ruj

, Amiya Nayak
, Ivan Stojmenovic:
Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs. 326-330 - Daojing He

, Jiajun Bu, Sencun Zhu, Mingjian Yin, Yi Gao, Haodong Wang, Sammy Chan
, Chun Chen:
Distributed privacy-preserving access control in a single-owner multi-user sensor network. 331-335 - Chuang Wang, Guiling Wang

, Wensheng Zhang, Taiming Feng
:
Reconciling privacy preservation and intrusion detection in sensory data aggregation. 336-340 - Xiaoyan Li, Yingying Chen, Jie Yang, Xiuyuan Zheng:

Designing localization algorithms robust to signal strength attacks. 341-345 - Xiali Hei, Xiaojiang Du:

Biometric-based two-level secure access control for Implantable Medical Devices during emergencies. 346-350
RFID and WLAN
- Lei Kang, Kaishun Wu

, Jin Zhang, Haoyu Tan:
Decoding the collisions in RFID systems. 351-355 - Wen Luo, Shigang Chen, Tao Li, Shiping Chen:

Efficient missing tag detection in RFID systems. 356-360 - Yong Cui, Wei Li, Xiuzhen Cheng:

Partially overlapping channel assignment based on "node orthogonality" for 802.11 wireless networks. 361-365 - Sriram Lakshmanan, Shruti Sanadhya, Raghupathy Sivakumar:

On link rate adaptation in 802.11n WLANs. 366-370 - Libin Jiang, Mathieu Leconte, Jian Ni, R. Srikant, Jean C. Walrand:

Fast mixing of parallel Glauber dynamics and low-delay CSMA scheduling. 371-375
Network Coding
- Wei Dong, Yunhao Liu, Chun Chen, Jiajun Bu, Chao Huang:

ℛ2: Incremental ℛeprogramming using ℛelocatable code in networked embedded systems. 376-380 - Jun Sun, Yonggang Wen, Lizhong Zheng:

On file-based content distribution over wireless networks via multiple paths: Coding and delay trade-off. 381-385 - Wai-Leong Yeow, Cédric Westphal, Ulas C. Kozat:

Highly available virtual machines with network coding. 386-390 - Dan Zhang, Narayan B. Mandayam:

Resource allocation for multicast in an OFDMA network with Random Network Coding. 391-395 - Shanshan Wang, Yalin Evren Sagduyu, Junshan Zhang, Jason Hongjun Li:

Spectrum shaping via network coding in cognitive radio networks. 396-400
Peer-to-peer systems
- Matthieu Latapy, Clémence Magnien, Raphaël Fournier:

Quantifying paedophile queries in a large P2P system. 401-405 - Rafit Izhak-Ratzin, Hyunggon Park, Mihaela van der Schaar:

Reinforcement learning in BitTorrent systems. 406-410 - Brett Stone-Gross, Marco Cova, Christopher Kruegel, Giovanni Vigna:

Peering through the iframe. 411-415 - Jie Zhang, Wei Lou

:
The digital rights management game in peer-to-peer streaming systems. 416-420 - Di Niu, Zimu Liu, Baochun Li, Shuqiao Zhao:

Demand forecast and performance prediction in peer-assisted on-demand streaming systems. 421-425
Vehicular Ad Hoc Networks
- Francesco Malandrino

, Claudio Casetti, Carla-Fabiana Chiasserini
, Marco Fiore
:
Content downloading in vehicular networks: What really matters. 426-430 - Nianbo Liu, Ming Liu, Wei Lou

, Guihai Chen
, Jiannong Cao
:
PVA in VANETs: Stopped cars are not silent. 431-435 - Emmanuel Baccelli

, Philippe Jacquet, Bernard Mans
, Georgios Rodolakis:
Information propagation speed in bidirectional vehicular delay tolerant networks. 436-440 - Fulong Xu, Shuo Guo, Jaehoon Jeong, Yu Gu, Qing Cao, Ming Liu, Tian He:

Utilizing shared vehicle trajectories for data forwarding in vehicular networks. 441-445 - Utku Günay Acer

, Paolo Giaccone
, David Hay, Giovanni Neglia, Saed Tarapiah
:
Timely data delivery in a realistic bus network. 446-450
Energy Efficiency and Congestion Control
- Sourjya Bhaumik, David Chuck, Girija J. Narlikar, Gordon T. Wilfong:

Energy-efficient design and optimization of wireline access networks. 451-455 - Omur Ozel, Kaya Tutuncuoglu, Jing Yang

, Sennur Ulukus, Aylin Yener:
Resource management for fading wireless channels with energy harvesting nodes. 456-460 - Miao He, Sugumar Murugesan, Junshan Zhang:

Multiple timescale dispatch and scheduling for stochastic reliability in smart grids with wind generation integration. 461-465 - Mario Marchese

, Marco Cello, Giorgio Gnecco
, Marcello Sanguineti
:
Structural properties of optimal coordinate-convex policies for CAC with nonlinearly-constrained feasibility regions. 466-470 - Somayeh Sojoudi, Steven H. Low, John C. Doyle:

Effect of buffers on stability of Internet congestion controllers. 471-475 - Hao Jin, Deng Pan, Jason Liu

, Niki Pissinou:
OpenFlow based flow level bandwidth provisioning for CICQ switches. 476-480
Wireless Networks
- Xiao Lei, Laura Cottatellucci, Konstantin Avrachenkov

:
Equilibriums in slow fading interfering channels with partial knowledge of the channels. 481-485 - Boulat A. Bash, Dennis Goeckel, Donald F. Towsley

:
Clustering in cooperative networks. 486-490 - Krishna P. Jagannathan

, Shie Mannor
, Ishai Menache, Eytan H. Modiano:
A state action frequency approach to throughput maximization over uncertain wireless channels. 491-495 - Saeed Moghaddam, Ahmed Helmy

:
Spatio-temporal modeling of wireless users internet access patterns using self-organizing maps. 496-500 - Thanh Dang, Wu-chi Feng, Nirupama Bulusu:

Zoom: A multi-resolution tasking framework for crowdsourced geo-spatial sensing. 501-505 - Massimiliano Pierobon

, Ian F. Akyildiz:
Information capacity of diffusion-based molecular communication in nanonetworks. 506-510
Wireless Ad Hoc Networks
- Peng-Jun Wan, Minming Li

, Lixin Wang, Zhu Wang, Ophir Frieder:
Local pooling factor of multihop wireless networks. 511-515 - Greg Kuperman, Eytan H. Modiano, Aradhana Narula-Tam:

Analysis and algorithms for partial protection in mesh networks. 516-520 - Abhijeet Bhorkar, Tara Javidi

, Alex C. Snoeren:
Achieving congestion diversity in wireless ad-hoc networks. 521-525 - Honghai Zhang, Yuanxi Jiang, Karthikeyan Sundaresan, Sampath Rangarajan, Baohua Zhao:

Wireless data multicasting with switched beamforming antennas. 526-530 - Hsiao-Chen Lu, Wanjiun Liao

:
On cooperative strategies in wireless relay networks. 531-535 - Niels Karowski, Aline Carneiro Viana, Adam Wolisz:

Optimized asynchronous multi-channel neighbor discovery. 536-540
Social Networks
- Ruichuan Chen, Eng Keong Lua, Zhuhua Cai:

Bring order to online social networks. 541-545 - Ajay Sridharan, Yong Gao, Kui Wu, James Nastos

:
Statistical behavior of embeddedness and communities of overlapping cliques in online social networks. 546-550 - Xiwang Yang, Yang Guo, Yong Liu

:
Bayesian-inference based recommendation in online social networks. 551-555 - Bin Liu, Peter Terlecky, Amotz Bar-Noy, Ramesh Govindan, Michael J. Neely:

Optimizing information credibility in social swarming applications. 556-560 - Muhammad Usman Ilyas

, Muhammad Zubair Shafiq, Alex X. Liu, Hayder Radha:
A distributed and privacy preserving algorithm for identifying information hubs in social networks. 561-565 - Felix Ming, Fai Wong, Peter Marbach:

"Who Are Your Friends?" - A Simple Mechanism that achieves perfect network formation. 566-570
Incentive and Economic Models
- Jaeok Park, Mihaela van der Schaar:

Incentive provision using intervention. 571-575 - Stefano Paris, Cristina Nita-Rotaru, Fabio Martignon, Antonio Capone

:
EFW: A cross-layer metric for reliable routing in wireless mesh networks with selfish participants. 576-580 - MohammadHossein Bateni, Mohammad Taghi Hajiaghayi, Sina Jafarpour, Dan Pei

:
Towards an efficient algorithmic framework for pricing cellular data service. 581-585 - Hong Xu

, Baochun Li:
Seen as stable marriages. 586-590 - Gaoning He, Samson Lasaulce, Yezekael Hayel:

Stackelberg games for energy-efficient power control in wireless networks. 591-595 - Yuan Wu, Hongseok Kim, Prashanth Hande, Mung Chiang, Danny H. K. Tsang:

Revenue sharing among ISPs in two-sided markets. 596-600
Wireless Sensor Networks II
- Guohua Li, Jianzhong Li:

Global weighted fairness guaranteed congestion avoidance protocol for wireless sensor networks. 601-605 - Yongle Cao, Ziguo Zhong, Yu Gu, Tian He:

Safeguarding schedule updates in wireless sensor networks. 606-610 - Chul-Ho Lee, Do Young Eun

:
Smart sleep: Sleep more to reduce delay in duty-cycled wireless sensor networks. 611-615 - Jun Luo

, Ying He
:
GeoQuorum: Load balancing and energy efficient data access in wireless sensor networks. 616-620 - Xiaokang Yu, Xiaomeng Ban, Wei Zeng, Rik Sarkar, Xianfeng Gu

, Jie Gao:
Spherical representation and polyhedron routing for load balancing in wireless sensor networks. 621-625 - Ai Chen, Zhizhou Li, Ten-Hwang Lai, Cong Liu:

One-way barrier coverage with wireless sensors. 626-630
Mobile ad hoc networks (MANET) 1
- Guoqiang Mao

, Brian D. O. Anderson:
On the asymptotic connectivity of random networks under the random connection model. 631-639 - Yun Wang, Xiaoyu Chu, Xinbing Wang, Yu Cheng

:
Optimal multicast capacity and delay tradeoffs in MANETs: A global perspective. 640-648 - Luoyi Fu, Yi Qin, Xinbing Wang, Xue Liu:

Converge-cast with MIMO. 649-657 - Yuxin Chen, Sanjay Shakkottai, Jeffrey G. Andrews:

Sharing multiple messages over mobile networks. 658-666
Peer-to-peer Networks 1
- Haiying Shen, Lianyu Zhao, Harrison Chandler, Jared Stokes, Jin Li:

Toward P2P-based multimedia sharing in user generated contents. 667-675 - Ke Xu, Meng Shen, Mingjiang Ye:

A model approach to estimate Peer-to-Peer traffic matrices. 676-684 - Milan Vojnovic, Alexandre Proutière:

Hop limited flooding over dynamic networks. 685-693 - Bo Tan, Laurent Massoulié:

Optimal content placement for peer-to-peer video-on-demand systems. 694-702
Performance Analysis and Modeling 1
- Qiuyu Peng, Xinbing Wang, Huan Tang:

Heterogeneity increases multicast capacity in clustered network. 703-711 - Cheng Wang, Changjun Jiang, Xiang-Yang Li, Shaojie Tang, Panlong Yang:

General capacity scaling of wireless networks. 712-720 - Abhigyan Sharma, Aditya Kumar Mishra, Vikas Kumar, Arun Venkataramani:

Beyond MLU: An application-centric comparison of traffic engineering schemes. 721-729 - Cheng-Shang Chang, Chin-Yi Hsu, Jay Cheng, Duan-Shin Lee:

A general probabilistic framework for detecting community structure in networks. 730-738
Network coding 1
- Guanfeng Liang, Nitin H. Vaidya:

Capacity of byzantine agreement with finite link capacity. 739-747 - Yuan Feng, Zimu Liu, Baochun Li:

GestureFlow: Streaming gestures to an audience. 748-756 - Jin Wang, Jianping Wang

, Kejie Lu, Yi Qian, Bin Xiao
, Naijie Gu:
Optimal Design of Linear Network Coding for information theoretically secure unicast. 757-765 - Tracey Ho, Sidharth Jaggi, Svitlana Vyetrenko, Lingxiao Xia:

Universal and robust distributed network codes. 766-774
Wireless sensor network design 1
- Jiliang Wang, Yunhao Liu, Mo Li

, Wei Dong, Yuan He:
QoF: Towards comprehensive path quality measurement in wireless sensor networks. 775-783 - Hongbo Jiang, Shengkai Zhang, Guang Tan, Chonggang Wang:

CABET: Connectivity-based boundary extraction of large-scale 3D sensor networks. 784-792 - Hongbo Jiang, Jie Cheng, Dan Wang

, Chonggang Wang, Guang Tan:
Continuous multi-dimensional top-k query processing in sensor networks. 793-801
Cloud/Grid computing and networks 1
- Jun Zhu, Zhefu Jiang, Zhen Xiao:

Twinkle: A fast resource provisioning mechanism for internet services. 802-810 - Clint Sparkman, Hsin-Tsang Lee, Dmitri Loguinov:

Agnostic topology-based spam avoidance in large-scale web crawls. 811-819 - Cong Wang

, Kui Ren
, Jia Wang:
Secure and practical outsourcing of linear programming in cloud computing. 820-828 - Ning Cao, Cong Wang

, Ming Li, Kui Ren
, Wenjing Lou:
Privacy-preserving multi-keyword ranked search over encrypted cloud data. 829-837
Wireless cross-layer design 1
- Peng-Jun Wan, Ophir Frieder, Xiaohua Jia

, F. Frances Yao, Xiaohua Xu, Shaojie Tang:
Wireless link scheduling under physical interference model. 838-845 - Peng-Jun Wan, Yu Cheng

, Zhu Wang, F. Frances Yao:
Multiflows in multi-channel multi-radio multihop wireless networks. 846-854 - Fung Po Tso

, Lin Cui, Lizhuo Zhang, Weijia Jia
, Di Yao, Jin Teng, Dong Xuan:
DragonNet: A robust mobile Internet service system for long distance trains. 855-863 - Marjan A. Baghaie, Bhaskar Krishnamachari:

Delay constrained minimum energy broadcast in cooperative wireless networks. 864-872
Wireless network monitoring and measurement 1
- Yunhao Liu, Yuan He, Mo Li

, Jiliang Wang, Kebin Liu, Lufeng Mo, Wei Dong, Zheng Yang, Min Xi, Jizhong Zhao, Xiang-Yang Li:
Does wireless sensor network scale? A measurement study on GreenOrbs. 873-881 - Utpal Paul, Anand Prabhu Subramanian, Milind M. Buddhikot, Samir R. Das:

Understanding traffic dynamics in cellular data networks. 882-890 - Biao Han

, Jie Li
, Jinshu Su
:
Self-supported congestion-aware networking for emergency services in WANETs. 891-899 - Roy Friedman, Alex Kogan, Yevgeny Krivolapov

:
On power and throughput tradeoffs of WiFi and Bluetooth in smartphones. 900-908
Mobile ad hoc networks (MANET) 2
- Ze Li, Haiying Shen:

A hierarchical account-aided Reputation Management system for large-scale MANETs. 909-917 - Chi Zhang, Xiaoyan Zhu, Yang Song, Yuguang Fang

:
C4: A new paradigm for providing incentives in multi-hop wireless networks. 918-926 - Joshua Reich, Vishal Misra, Dan Rubenstein, Gil Zussman:

Connectivity maintenance in mobile wireless networks via constrained mobility. 927-935
Peer-to-peer networks 2
- Fangming Liu, Shijun Shen, Bo Li, Baochun Li, Hao Yin, Sanli Li:

Novasky: Cinematic-quality VoD in a P2P storage cloud. 936-944 - Yipeng Zhou

, Tom Z. J. Fu, Dah Ming Chiu:
Statistical modeling and analysis of P2P replication to support VoD service. 945-953 - Raphael Eidenbenz

, Thomas Locher, Roger Wattenhofer:
Hidden communication in P2P networks Steganographic handshake and broadcast. 954-962 - Rubén Cuevas Rumín, Nikolaos Laoutaris

, Xiaoyuan Yang, Georgos Siganos, Pablo Rodriguez:
Deep diving into BitTorrent locality. 963-971
Performance analysis and modeling 2
- Yuanzhong Xu, Xinbing Wang:

Fundamental lower bound for node buffer size in intermittently connected wireless networks. 972-980 - Peng-Jun Wan, Lixin Wang:

Asymptotic distribution of critical transmission radius for greedy forward routing. 981-989 - Hongkun Li, Yu Cheng

, Peng-Jun Wan, Jiannong Cao
:
Local sufficient rate constraints for guaranteed capacity region in multi-radio multi-channel wireless networks. 990-998 - Aditya Gopalan, Siddhartha Banerjee, Abhik Kumar Das, Sanjay Shakkottai:

Random mobility and the spread of infection. 999-1007
Network coding 2
- Jin Wang, Jianping Wang

, Chuan Wu
, Kejie Lu, Naijie Gu:
Anonymous communication with network coding against traffic analysis attack. 1008-1016 - Arash Saber Tehrani, Alexandros G. Dimakis, Michael J. Neely:

SigSag: Iterative detection through soft message-passing. 1017-1025 - Peng Zhang, Yixin Jiang, Chuang Lin, Hongyi Yao, Albert Wasef, Xuemin Shen:

Padding for orthogonality: Efficient subspace authentication for network coding. 1026-1034 - Hulya Seferoglu, Athina Markopoulou

, K. K. Ramakrishnan
:
I2NC: Intra- and inter-session network coding for unicast flows in wireless networks. 1035-1043
Wireless sensor network design 2
- Dezun Dong, Yunhao Liu, Xiangke Liao, Xiang-Yang Li:

Fine-grained location-free planarization in wireless sensor networks. 1044-1052 - Hongyu Zhou, Hongyi Wu, Su Xia, Miao Jin, Ning Ding:

A distributed triangulation algorithm for wireless sensor networks on 2D and 3D surface. 1053-1061 - Shouling Ji, Yingshu Li

, Xiaohua Jia
:
Capacity of dual-radio multi-channel wireless sensor networks for continuous data collection. 1062-1070 - Matthew P. Johnson, Amotz Bar-Noy:

Pan and scan: Configuring cameras for coverage. 1071-1079
CloudlGrid computing and networks 2
- Mathias Björkqvist, Lydia Y. Chen, Marko Vukolic, Xi Zhang:

Minimizing retrieval latency for content cloud. 1080-1088 - Danhua Guo, Laxmi N. Bhuyan:

A QoS aware multicore hash scheduler for network applications. 1089-1097 - Minghong Lin, Adam Wierman, Lachlan L. H. Andrew, Eno Thereska:

Dynamic right-sizing for power-proportional data centers. 1098-1106
Wireless cross-layer design 2
- Honghai Zhang, Yuanxi Jiang, Sampath Rangarajan, Baohua Zhao:

Multicast video delivery with switched beamforming antennas in indoor wireless networks. 1107-1115 - Guanhong Pei, V. S. Anil Kumar, Srinivasan Parthasarathy, Aravind Srinivasan:

Approximation algorithms for throughput maximization in wireless networks with delay constraints. 1116-1124 - Shyamnath Gollakota, Dina Katabi:

Physical layer wireless security made fast and channel independent. 1125-1133 - Sungro Yoon, Injong Rhee, Bang Chul Jung

, Babak Daneshrad, Jae H. Kim:
Contrabass: Concurrent transmissions without coordination for ad hoc networks. 1134-1142
Wireless network monitoring and measurement 2
- Xinyu Xing, Jianxun Dang, Shivakant Mishra, Xue Liu:

A highly scalable bandwidth estimation of commercial hotspot access points. 1143-1151 - Pallavi Arora, Csaba Szepesvári, Rong Zheng:

Sequential learning for optimal monitoring of multi-channel wireless networks. 1152-1160 - Mariyam Mirza, Paul Barford, Xiaojin Zhu, Suman Banerjee, Michael Blodgett:

Fingerprinting 802.11 rate adaption algorithms. 1161-1169
Mobile ad hoc networks (MANET) 3
- Ryad Ben-El-Kezadri

, Giovanni Pau
, Thomas Claveirole:
TurboSync: Clock synchronization for shared media networks via principal component analysis with missing data. 1170-1178 - Gjergji Zyba, Geoffrey M. Voelker, Stratis Ioannidis

, Christophe Diot:
Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd. 1179-1187 - Bruno Nardelli, Jinsung Lee, Kangwook Lee, Yung Yi, Song Chong, Edward W. Knightly, Mung Chiang:

Experimental evaluation of optimal CSMA. 1188-1196
Peer-to-peer networks 3
- Di Niu, Baochun Li:

Asymptotic optimality of randomized peer-to-peer broadcast with network coding. 1197-1205 - Weijie Wu, John C. S. Lui:

Exploring the optimal replication strategy in P2P-VoD systems: Characterization and evaluation. 1206-1214 - Frédérique E. Oggier, Anwitaman Datta

:
Self-repairing homomorphic codes for distributed storage systems. 1215-1223 - Jie Dai, Bo Li, Fangming Liu, Baochun Li, Hai Jin:

On the efficiency of collaborative caching in ISP-aware P2P networks. 1224-1232
Performance analysis and modeling 3
- Ting He, Animashree Anandkumar, Dakshi Agrawal:

Index-based sampling policies for tracking dynamic networks under sampling constraints. 1233-1241 - Yashar Ghiassi-Farrokhfal, Jörg Liebeherr, Almut Burchard:

The impact of link scheduling on long paths: Statistical analysis and optimal bounds. 1242-1250 - Shreeshankar Bodas, Sanjay Shakkottai, Lei Ying

, R. Srikant:
Scheduling for small delay in multi-rate multi-channel wireless networks. 1251-1259 - Jian Tan, Yang Yang, Ness B. Shroff, Hesham El Gamal:

Delay asymptotics with retransmissions and fixed rate codes over erasure channels. 1260-1268
Network Quality of Service
- Dejun Yang

, Xi Fang, Guoliang Xue:
ESPN: Efficient server placement in probabilistic networks with budget constraint. 1269-1277 - Moti Geva, Amir Herzberg

:
QoSoDoS: If you can't beat them, join them! 1278-1286 - Shaohe Lv, Weihua Zhuang

, Xiaodong Wang, Xingming Zhou:
Scheduling in wireless ad hoc networks with successive interference cancellation. 1287-1295
Wireless sensor network design 3
- Yunbo Wang, Mehmet C. Vuran

, Steve Goddard:
Analysis of event detection delay in wireless sensor networks. 1296-1304 - Lei Tang, Yanjun Sun, Omer Gurewitz, David B. Johnson:

PW-MAC: An energy-efficient predictive-wakeup MAC protocol for wireless sensor networks. 1305-1313 - Yang Peng, Zi Li, Daji Qiao, Wensheng Zhang:

Delay-bounded MAC with minimal idle listening for sensor networks. 1314-1322 - Shuguang Xiong, Jianzhong Li, Mo Li

, Jiliang Wang, Yunhao Liu:
Multiple task scheduling for low-duty-cycled wireless sensor networks. 1323-1331
Energy-efficient networks 1
- Brian Guenter, Navendu Jain, Charles Williams:

Managing cost, performance, and reliability tradeoffs for energy-aware server provisioning. 1332-1340 - Canming Jiang, Yi Shi

, Y. Thomas Hou
, Sastry Kompella
:
On optimal throughput-energy curve for multi-hop wireless networks. 1341-1349 - Yi Shi

, Liguang Xie, Y. Thomas Hou
, Hanif D. Sherali:
On renewable sensor networks with wireless energy transfer. 1350-1358 - Matthew Andrews, Spyridon Antonakopoulos, Lisa Zhang:

Energy-aware scheduling algorithms for network stability. 1359-1367
Data center networking 1
- Dan Li, Jiangwei Yu, Junbiao Yu, Jianping Wu:

Exploring efficient and scalable multicast routing in future data center networks. 1368-1376 - Jiao Zhang, Fengyuan Ren, Chuang Lin:

Modeling and understanding TCP incast in data center networks. 1377-1385 - Chao-Chih Chen, Lihua Yuan, Albert G. Greenberg, Chen-Nee Chuah

, Prasant Mohapatra:
Routing-as-a-Service (RaaS): A framework For tenant-directed route control in data center. 1386-1394 - Yong Cui, Hongyi Wang, Xiuzhen Cheng:

Channel allocation in wireless data center networks. 1395-1403
Wireless network security 1
- Nam Tuan Nguyen, Guanbo Zheng, Zhu Han, Rong Zheng:

Device fingerprinting to enhance wireless security using nonparametric Bayesian method. 1404-1412 - Qian Wang

, Ping Xu, Kui Ren
, Xiang-Yang Li:
Delay-bounded adaptive UFH-based anti-jamming wireless communication. 1413-1421 - Qian Wang

, Hai Su, Kui Ren
, Kwangjo Kim:
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. 1422-1430 - Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy, Bernhard Plattner:

On the vulnerability of the proportional fairness scheduler to retransmission attacks. 1431-1439
Peer-to-peer networks 4
- Eitan Altman, Philippe Nain, Adam Shwartz

, Yuedong Xu:
Predicting the impact of measures against P2P networks on the transient behaviors. 1440-1448 - Can Zhao, Xiaojun Lin, Chuan Wu

:
The streaming capacity of sparsely-connected P2P systems with distributed control. 1449-1457 - Michael J. Neely, Leana Golubchik:

Utility optimization for dynamic peer-to-peer networks with tit-for-tat constraints. 1458-1466
Performance analysis and modeling 4
- François Baccelli, Jean Bolot:

Modeling the economic value of the location data of mobile users. 1467-1475 - Devu Manikantan Shila, Yu Cheng

, Tricha Anjali:
Throughput and delay analysis of hybrid wireless networks with multi-hop uplinks. 1476-1484 - Pan Li

, Miao Pan, Yuguang Fang
:
The capacity of three-dimensional wireless ad hoc networks. 1485-1493 - George Iosifidis

, Iordanis Koutsopoulos, Georgios Smaragdakis
:
The impact of storage capacity on end-to-end delay in time varying networks. 1494-1502
Optical networks
- Yang Wang, Xiaojun Cao

, Yi Pan
:
A study of the routing and spectrum allocation in spectrum-sliced Elastic Optical Path networks. 1503-1511 - Matthew Johnston, Hyang-Won Lee, Eytan H. Modiano:

A robust optimization approach to backup network design with random failures. 1512-1520 - Pankaj K. Agarwal, Alon Efrat

, Shashidhara K. Ganjugunte, David Hay, Swaminathan Sankararaman, Gil Zussman:
The resilience of WDM networks to probabilistic geographical failures. 1521-1529 - Lin Liu, Zhenghao Zhang, Yuanyuan Yang

:
Packet scheduling in a low-latency optical switch with wavelength division multiplexing and electronic buffer. 1530-1538
Wireless sensor network design 4
- Kebin Liu, Qiang Ma, Xibin Zhao, Yunhao Liu:

Self-diagnosis for large scale wireless sensor networks. 1539-1547 - Xin Miao, Kebin Liu, Yuan He, Yunhao Liu, Dimitris Papadias:

Agnostic diagnosis: Discovering silent failures in wireless sensor networks. 1548-1556 - Ling Ding, Weili Wu, James Willson, Hongjie Du, Wonjun Lee:

Construction of directional virtual backbones with minimum routing cost in wireless networks. 1557-1565 - Dijun Luo, Xiaojun Zhu

, Xiaobing Wu, Guihai Chen
:
Maximizing lifetime for the shortest path aggregation tree in wireless sensor networks. 1566-1574
Energy-efficient networks 2
- Paul Balister

, Béla Bollobás, Animashree Anandkumar, Alan S. Willsky:
Energy-latency tradeoff for in-network function computation in random networks. 1575-1583 - Yi Xu, Wenye Wang

:
Information delivery in large wireless networks with minimum energy expense. 1584-1592 - Tao Jin, Guevara Noubir, Bo Sheng

:
WiZi-Cloud: Application-transparent dual ZigBee-WiFi radios for low power internet access. 1593-1601 - Maria Gorlatova, Aya Wallwater, Gil Zussman:

Networking low-power energy harvesting devices: Measurements and algorithms. 1602-1610
Data center networking 2
- Longjiang Guo, Raheem A. Beyah

, Yingshu Li
:
SMITE: A stochastic compressive data collection protocol for Mobile Wireless Sensor Networks. 1611-1619 - Yingying Chen, Sourabh Jain, Vijay Kumar Adhikari, Zhi-Li Zhang, Kuai Xu

:
A first look at inter-data center traffic characteristics via Yahoo! datasets. 1620-1628 - Andrew R. Curtis, Wonho Kim, Praveen Yalagandula:

Mahout: Low-overhead datacenter traffic management using end-host-based elephant detection. 1629-1637
Wireless network security 2
- Jin Tang, Yu Cheng

, Weihua Zhuang
:
An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks. 1638-1646 - Wei Dong, Vacha Dave, Lili Qiu, Yin Zhang:

Secure friend discovery in mobile social networks. 1647-1655 - Kanthakumar Pongaliur, Li Xiao:

Maintaining source privacy under eavesdropping and node compromise attacks. 1656-1664 - Hao Han, Fengyuan Xu, Chiu C. Tan, Yifan Zhang, Qun Li:

Defending against vehicular rogue APs. 1665-1673
Performance analysis and modeling 5
- Tae Hyun Kim, Jian Ni, R. Srikant, Nitin H. Vaidya:

On the achievable throughput of CSMA under imperfect carrier sensing. 1674-1682 - M. H. R. Khouzani, Saswati Sarkar, Eitan Altman:

Optimal control of epidemic evolution. 1683-1691 - Zhiyang Guo, Zhemin Zhang, Yuanyuan Yang

:
Performance modeling of hybrid optical packet switches with shared buffer. 1692-1700
Cyber-physical systems and networks
- Cheng Wang, Changjun Jiang, Yunhao Liu, Xiang-Yang Li, Shaojie Tang, Huadong Ma:

Aggregation capacity of wireless sensor networks: Extended network case. 1701-1709 - Aniket Pingley, Nan Zhang, Xinwen Fu

, Hyeong-Ah Choi, Suresh Subramaniam
, Wei Zhao
:
Protection of query privacy for continuous location based services. 1710-1718 - Matthew Keally, Gang Zhou, Guoliang Xing, Jianxin Wu:

Exploiting sensing diversity for confident sensing in wireless sensor networks. 1719-1727
Network algorithms and calculus 1
- Michael J. Neely:

Opportunistic scheduling with worst case delay guarantees in single and multi-hop networks. 1728-1736 - Hongwei Du, Qiang Ye

, Weili Wu, Wonjun Lee, Deying Li, Ding-Zhu Du, Stephen Howard:
Constant approximation for virtual backbone construction with Guaranteed Routing Cost in wireless sensor networks. 1737-1744 - Yan Qiao, Tao Li, Shigang Chen:

One memory access bloom filters and their generalization. 1745-1753 - Rachit Agarwal, Philip Brighten Godfrey, Sariel Har-Peled

:
Approximate distance queries and compact routing in sparse graphs. 1754-1762
Wireless sensor network design 5
- Lei Yu

, Jianzhong Li, Siyao Cheng, Shuguang Xiong:
Secure continuous aggregation via sampling-based verification in wireless sensor networks. 1763-1771 - Ryo Sugihara, Rajesh K. Gupta:

Sensor localization with deterministic accuracy guarantee. 1772-1780 - Yi Wang, Guohong Cao:

On full-view coverage in camera sensor networks. 1781-1789 - Yi Wang, Guohong Cao:

Minimizing service delay in directional sensor networks. 1790-1798
Internet monitoring and measurement 1
- Tao Li, Shigang Chen, Yibei Ling:

Fast and compact per-flow traffic measurement through randomized counter sharing. 1799-1807 - Xiaoming Wang, Xiaoyong Li, Dmitri Loguinov:

Modeling residual-geometric flow sampling. 1808-1816 - Ralf Lübben, Markus Fidler, Jörg Liebeherr:

A foundation for stochastic bandwidth estimation of networks with random service. 1817-1825 - Imed Lassoued, Amir Krifa, Chadi Barakat

, Konstantin Avrachenkov
:
Network-wide monitoring through self-configuring adaptive system. 1826-1834
Firewalls and network intrusion detection 1
- Ze Li, Haiying Shen:

SOAP: A Social network Aided Personalized and effective spam filter to clean your e-mail box. 1835-1843 - Matthew Knysz, Xin Hu, Kang G. Shin:

Good guys vs. Bot Guise: Mimicry attacks against fast-flux detection systems. 1844-1852 - Yi-Hua E. Yang, Viktor K. Prasanna:

Space-time tradeoff in regular expression matching with semi-deterministic finite automata. 1853-1861
Wireless network security 3
- Fengyuan Xu, Zhengrui Qin, Chiu C. Tan, Baosheng Wang, Qun Li

:
IMDGuard: Securing implantable medical devices with the external wearable guardian. 1862-1870 - Zhuo Lu, Wenye Wang

, Cliff Wang:
From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic. 1871-1879 - Kai Zeng

, Kannan Govindan
, Daniel Wu, Prasant Mohapatra:
Identity-based attack detection in mobile wireless networks. 1880-1888 - Zhichao Zhu, Guohong Cao:

APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based services. 1889-1897
Network optimization
- Sushant Sharma, Yi Shi

, Y. Thomas Hou
, Hanif D. Sherali, Sastry Kompella
:
Optimizing network-coded cooperative communications via joint session grouping and relay node selection. 1898-1906 - Xi Fang, Dejun Yang

, Guoliang Xue:
Consort: Node-Constrained Opportunistic Routing in wireless mesh networks. 1907-1915 - Yi Shi

, Jia Liu, Canming Jiang, Cunhao Gao, Y. Thomas Hou
:
An optimal link layer model for multi-hop MIMO networks. 1916-1924 - Jianping Wang

, Chunming Qiao, Hongfang Yu:
On progressive network recovery after a major disruption. 1925-1933
Miscellaneous topics
- Xu Li, Nathalie Mitton, Isabelle Simplot-Ryl, David Simplot-Ryl:

A novel family of geometric planar graphs for wireless ad hoc networks. 1934-1942 - Abedelaziz Mohaisen

, Nicholas Hopper, Yongdae Kim
:
Keep your friends close: Incorporating trust into social network-based Sybil defenses. 1943-1951 - Yi-Ruei Chen, J. D. Tygar, Wen-Guey Tzeng:

Secure group key management using uni-directional proxy re-encryption schemes. 1952-1960 - Sastry Kompella

, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides:
Stable throughput tradeoffs in cognitive shared channels with cooperative relaying. 1961-1969
Network algorithms and calculus 2
- Jens B. Schmitt, Nicos Gollan, Steffen Bondorf

, Ivan Martinovic:
Pay bursts only once holds for (some) non-FIFO systems. 1970-1978 - Florin Ciucu, Jens B. Schmitt, Hao Wang:

On expressing networks with flow transformations in convolution-form. 1979-1987 - Florin Ciucu, Oliver Hohlfeld

, Lydia Y. Chen:
On the convergence to fairness in overloaded FIFO systems. 1988-1996 - Zengfeng Huang

, Ke Yi, Yunhao Liu, Guihai Chen
:
Optimal sampling algorithms for frequency estimation in distributed data. 1997-2005
Wireless sensor network design 6
- Shibo He, Jiming Chen, Fachang Jiang, David K. Y. Yau, Guoliang Xing, Youxian Sun:

Energy provisioning in wireless rechargeable sensor networks. 2006-2014 - Khuong Vu, Rong Zheng:

Robust coverage under uncertainty in wireless sensor networks. 2015-2023 - Michael M. Groat, Wenbo He, Stephanie Forrest

:
KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. 2024-2032 - Robert Sauter, Olga Saukh, Oliver Frietsch, Pedro José Marrón

:
TinyLTS: Efficient network-wide Logging and Tracing System for TinyOS. 2033-2041
Wireless mesh networks
- Xin Zhao, Jun Guo

, Chun Tung Chou
, Archan Misra
, Sanjay K. Jha
:
A high-throughput routing metric for reliable multicast in multi-rate wireless mesh networks. 2042-2050 - Yong Ding, Yang Yang, Li Xiao:

Multi-path routing and rate allocation for multi-source video on-demand streaming in wireless mesh networks. 2051-2059 - Weiyi Zhang, Shi Bai, Guoliang Xue, Jian Tang, Chonggang Wang:

DARP: Distance-aware relay placement in WiMAX mesh networks. 2060-2068 - Arik Motskin, Ian Downes, Branislav Kusy, Omprakash Gnawali

, Leonidas J. Guibas:
Network warehouses: Efficient information distribution to mobile users. 2069-2077
Internet monitoring and measurement 2
- Kuai Xu

, Feng Wang
, Lin Gu:
Network-aware behavior clustering of Internet end hosts. 2078-2086 - Weiyu Xu, Enrique Mallada

, Ao Tang:
Compressive sensing over graphs. 2087-2095 - Xiaofei Wu, Ke Yu, Xin Wang:

On the growth of Internet application flows: A complex network perspective. 2096-2104 - Paul Tune, Darryl Veitch:

Sampling vs sketching: An information theoretic comparison. 2105-2113
Firewalls and network intrusion detection 2
- Yaxuan Qi, Kai Wang, Jeffrey Fong, Yibo Xue, Jun Li, Weirong Jiang

, Viktor K. Prasanna:
FEACAN: Front-end acceleration for content-aware network processing. 2114-2122 - Hrishikesh B. Acharya, Mohamed G. Gouda:

Firewall verification and redundancy checking are equivalent. 2123-2128 - Tingwen Liu

, Yifu Yang, Yanbing Liu
, Yong Sun, Li Guo:
An efficient regular expressions compression algorithm from a new perspective. 2129-2137
Wireless network security 4
- M. H. R. Khouzani, Saswati Sarkar, Eitan Altman:

A dynamic game solution to malware attack. 2138-2146 - Xiaodong Lin, Rongxing Lu, Xiaohui Liang

, Xuemin Shen
:
STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs. 2147-2155 - Zhuo Hao, Sheng Zhong, Li Erran Li:

Towards wireless security without computational assumptions - An oblivious transfer protocol based on an unauthenticated wireless channel. 2156-2164 - Yunchuan Wei, Kai Zeng, Prasant Mohapatra:

Adaptive wireless channel probing for shared key generation. 2165-2173
Vehicular networks
- Xu Li, Xuegang Yu, Aditya Wagh, Chunming Qiao:

Human factors-aware service scheduling in Vehicular Cyber-Physical systems. 2174-2182 - Yuchen Wu, Yanmin Zhu, Bo Li:

Trajectory improves data delivery in vehicular networks. 2183-2191 - Hongzi Zhu, Shan Chang, Minglu Li, Kshirasagar Naik, Sherman X. Shen

:
Exploiting temporal dependency for opportunistic forwarding in urban vehicular networks. 2192-2200 - Bo Yu, Fan Bai:

ETP: Encounter Transfer Protocol for opportunistic vehicle communication. 2201-2209
Cognitive radio and software defined radio 1
- Wentao Huang, Xinbing Wang:

Throughput and delay scaling of general cognitive networks. 2210-2218 - Lara B. Deek, Xia Zhou, Kevin C. Almeroth, Haitao Zheng:

To preempt or not: Tackling bid and time-based cheating in online spectrum auctions. 2219-2227 - Lei Yang, Hongseok Kim, Junshan Zhang, Mung Chiang, Chee-Wei Tan

:
Pricing-based spectrum access control in cognitive radio networks with random access. 2228-2236 - Miao Pan, Chi Zhang, Pan Li

, Yuguang Fang
:
Joint routing and link scheduling for cognitive radio networks under uncertain spectrum supply. 2237-2245
Wireless sensor network design 7
- Zhenjiang Li, Mo Li

, Jiliang Wang, Zhichao Cao:
Ubiquitous data collection for mobile users in wireless sensor networks. 2246-2254 - Bowu Zhang

, Xiuzhen Cheng, Nan Zhang, Yong Cui, Yingshu Li
, Qilian Liang:
Sparse target counting and localization in sensor networks based on compressive sensing. 2255-2263 - Zuoming Yu, Jin Teng, Xiaole Bai, Dong Xuan, Weijia Jia

:
Connected coverage in wireless networks with directional antennas. 2264-2272 - Shengbo Chen, Prasun Sinha, Ness B. Shroff, Changhee Joo

:
Finite-horizon energy allocation and routing scheme in rechargeable sensor networks. 2273-2281
Online social networks
- Nam P. Nguyen, Thang N. Dinh

, Ying Xuan, My T. Thai:
Adaptive algorithms for detecting community structure in dynamic social networks. 2282-2290 - Shaojie Tang, Jing Yuan

, XuFei Mao, Xiang-Yang Li, Wei Chen, Guojun Dai:
Relationship classification in large scale online social networks and its impact on information propagation. 2291-2299 - Michael Sirivianos

, Kyungbaek Kim
, Xiaowei Yang:
SocialFilter: Introducing social trust to collaborative spam mitigation. 2300-2308 - Youngsang Shin, Minaxi Gupta, Steven A. Myers:

Prevalence and mitigation of forum spamming. 2309-2317
Scheduling, flow, and congestion control 1
- Krishna P. Jagannathan

, Mihalis G. Markakis
, Eytan H. Modiano, John N. Tsitsiklis:
Queue length asymptotics for generalized max-weight scheduling in the presence of heavy-tailed traffic. 2318-2326 - Peng-Jun Wan, Chao Ma, Zhu Wang, Boliu Xu, Minming Li

, Xiaohua Jia
:
Weighted wireless link scheduling without information of positions and interference/communication radii. 2327-2335 - V. J. Venkataramanan, Xiaojun Lin:

Low-complexity scheduling algorithm for sum-queue minimization in wireless convergecast. 2336-2344 - Ching-Ming Lien, Cheng-Shang Chang, Jay Cheng, Duan-Shin Lee:

Maximizing throughput in wireless networks with finite internal buffers. 2345-2353
Internet monitoring and measurement 3
- Myungjin Lee, Mohammad Y. Hajjat, Ramana Rao Kompella, Sanjay G. Rao:

RelSamp: Preserving application structure in sampled flow measurements. 2354-2362 - Joel Sommers, Rhys Alistair Bowden, Brian Eriksson, Paul Barford, Matthew Roughan

, Nick G. Duffield
:
Efficient network-wide flow record generation. 2363-2371 - Angela Wang, Cheng Huang, Jin Li, Keith W. Ross:

Estimating the performance of hypothetical cloud service deployments: A measurement-based approach. 2372-2380
Future Internet architectures
- Sourabh Jain, Yingying Chen, Zhi-Li Zhang:

VIRO: A scalable, robust and namespace independent virtual Id routing for future networks. 2381-2389 - Talmai Oliveira, Srisudha Mahadevan, Dharma P. Agrawal:

Handling network uncertainty in heterogeneous wireless networks. 2390-2398 - Mikko Särelä, Christian Esteve Rothenberg

, Tuomas Aura, András Zahemszky, Pekka Nikander, Jörg Ott:
Forwarding anomalies in Bloom filter-based multicast. 2399-2407
Network privacy and trustworthiness
- Ting Wang, Yaling Yang:

Location privacy protection from RSS localization system using antenna pattern synthesis. 2408-2416 - Yu Hua, Xue Liu:

Scheduling design and analysis for end-to-end heterogeneous flows in an avionics network. 2417-2425 - Junwei Huang, Xian Pan, Xinwen Fu

, Jie Wang:
Long PN code based DSSS watermarking. 2426-2434 - Ming Li, Ning Cao, Shucheng Yu

, Wenjing Lou:
FindU: Privacy-preserving personal profile matching in mobile social networks. 2435-2443
Cognitive radio and software defined radio 2
- Zhiyong Lin, Hai Liu

, Xiaowen Chu
, Yiu-Wing Leung:
Jump-stay based channel-hopping algorithm with guaranteed rendezvous for cognitive radio networks. 2444-2452 - Hyoil Kim, Jaehyuk Choi, Kang G. Shin:

Wi-Fi 2.0: Price and quality competitions of duopoly cognitive radio wireless service providers with time-varying spectrum availability. 2453-2461 - Cem Tekin, Mingyan Liu:

Online learning in opportunistic spectrum access: A restless bandit approach. 2462-2470 - Yifan Zhang, Qun Li

, Gexin Yu, Baosheng Wang:
ETCH: Efficient Channel Hopping for communication rendezvous in dynamic spectrum access networks. 2471-2479
Wireless sensor network design 8
- Ziguo Zhong, Pengpeng Chen, Tian He:

On-demand time synchronization with predictable accuracy. 2480-2488 - Pu Wang

, Rui Dai, Ian F. Akyildiz:
Visual correlation-based image gathering for wireless multimedia sensor networks. 2489-2497 - (Withdrawn) Optimal multiple-coverage of sensor networks. 2498-2506

- Qing Cao, Xiaorui Wang, Hairong Qi, Tian He:

r-Kernel: An operating system foundation for highly reliable networked embedded systems. 2507-2515
Wireless resource/spectrum management 1
- Mingyi Hong, Alfredo García

, Jorge Barrera
:
Joint distributed access point selection and power allocation in cognitive radio networks. 2516-2524 - Zvi Lotker, Merav Parter, David Peleg, Yvonne-Anne Pignolet:

Distributed power control in the SINR model. 2525-2533 - Haiping Liu, Xiaoling Qiu, Dipak Ghosal, Chen-Nee Chuah

, Xin Liu, Yueyue Fan:
Traffic-tracing gateway (TTG). 2534-2542 - Sundeep Rangan, Ritesh Madan:

Belief propagation methods for intercell interference coordination. 2543-2551
Wireless cellular networks 1
- Chee Wei Tan

:
Optimal power control in Rayleigh-fading heterogeneous networks. 2552-2560 - Yingsong Huang, Shiwen Mao:

Downlink power control for variable bit rate videos over multicell wireless networks. 2561-2569 - Wei Yu, Taesoo Kwon

, Changyong Shin:
Multicell coordination via joint scheduling, beamforming and power spectrum adaptation. 2570-2578
Scheduling, flow, and congestion control 2
- Bo Ji

, Changhee Joo
, Ness B. Shroff:
Delay-based Back-Pressure scheduling in multi-hop wireless networks. 2579-2587 - Po-Kai Huang, Xiaojun Lin

, Chih-Chun Wang:
A low-complexity congestion control and scheduling algorithm for multihop wireless networks with order-optimal per-flow delay. 2588-2596 - Bin Li

, Atilla Eryilmaz:
On the limitations of randomization for Queue-Length-Based Scheduling in wireless networks. 2597-2605 - Yishay Mansour, Boaz Patt-Shamir, Dror Rawitz:

Overflow management with multipart packets. 2606-2614
Internet monitoring and measurement 4
- Cheng Huang, David A. Maltz, Jin Li, Albert G. Greenberg:

Public DNS system and Global Traffic Management. 2615-2623 - Jun Li, Scott Brooks:

I-seismograph: Observing and measuring Internet earthquakes. 2624-2632 - Xin Hu, Matthew Knysz, Kang G. Shin:

Measurement and analysis of global IP-usage patterns of fast-flux botnets. 2633-2641
Wireless LAN/MAN 1
- Giusi Alfano

, Michele Garetto
, Emilio Leonardi
:
New insights into the stochastic geometry analysis of dense CSMA networks. 2642-2650 - Yinjie Chen, Zhongli Liu, Benyuan Liu, Xinwen Fu

, Wei Zhao
:
Identifying mobiles hiding behind wireless routers. 2651-2659 - Yan Gao, Chee Wei Tan

, Ying Huang, Zheng Zeng, P. R. Kumar:
Feasibility and optimization of delay guarantees for non-homogeneous flows in IEEE 802.11 WLANs. 2660-2668 - Zheng Zeng, Yan Gao, Kun Tan, P. R. Kumar:

CHAIN: Introducing minimum controlled coordination into random access MAC. 2669-2677
Network economics and pricing
- Yong Cui, Tianze Ma, Xiuzhen Cheng:

Multi-hop access pricing in public area WLANs. 2678-2686 - Yi Gai, Hua Liu, Bhaskar Krishnamachari:

A packet dropping-based incentive mechanism for M/M/1 queues with selfish users. 2687-2695 - Shaolei Ren

, Jaeok Park, Mihaela van der Schaar:
User subscription dynamics and revenue maximization in communications markets. 2696-2704 - Chandramani Kishore Singh, Eitan Altman:

The wireless multicast coalition game and the non-cooperative association problem. 2705-2713
Cognitive radio and software defined radio 3
- Sha Hua, Hang Liu, Mingquan Wu, Shivendra S. Panwar:

Exploiting MIMO antennas in cooperative cognitive radio networks. 2714-2722 - Tengyi Zhang, Danny H. K. Tsang:

Optimal Cooperative Sensing Scheduling for energy-efficient Cognitive Radio Networks. 2723-2731 - Chengzhi Li, Huaiyu Dai:

Transport throughput of secondary networks in spectrum sharing systems. 2732-2740 - Chonggang Wang, Kazem Sohraby, Rittwik Jana, Lusheng Ji, Mahmoud Daneshmand:

Network selection for secondary users in cognitive radio systems. 2741-2749
Wireless sensor network design 9
- Zhen Ren, Gang Zhou, Andrew J. Pyles, Matthew Keally, Weizhen Mao, Haining Wang:

BodyT2: Throughput and time delay performance assurance for heterogeneous BSNs. 2750-2758 - Miao Zhao

, Yuanyuan Yang
:
A framework for mobile data gathering with load balanced clustering and MIMO uploading. 2759-2767 - Xuefeng Liu, Jiannong Cao

, Steven Lai, Chao Yang, Hejun Wu, Youlin Xu:
Energy efficient clustering for WSN-based structural health monitoring. 2768-2776 - Yaling Yang, Yujun Li, Mengshu Hou:

Many-to-one deliverability of greedy routing in 2-D wireless sensor networks. 2777-2785
Wireless resourcelspectrum management 2
- Zhe Yang, Yuanqian Luo, Lin Cai

:
Network modulation: A new dimension to enhance wireless network performance. 2786-2794 - Zih-Ci Lin, Huai-Lei Fu, Phone Lin

:
Dynamic Channel Allocation for wireless zone-based Multicast and Broadcast Service. 2795-2803 - Fan Wu, Nikhil Singh, Nitin H. Vaidya, Guihai Chen

:
On adaptive-width channel allocation in non-cooperative, multi-radio wireless networks. 2804-2812 - Mahmoud Al-Ayyoub, Himanshu Gupta:

Truthful spectrum auctions with approximate revenue. 2813-2821
Wireless cellular networks 2
- Mohit Thakur, Nadia Fawaz

, Muriel Médard:
Optimal relay location and power allocation for low SNR broadcast relay channels. 2822-2830 - Pan Li

, Xiaoxia Huang, Yuguang Fang
:
Capacity scaling of multihop cellular networks. 2831-2839 - Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuzmanovic, Antonio Nucci:

Taming user-generated content in mobile networks via Drop Zones. 2840-2848
Scheduling, flow, and congestion control 3
- Urtzi Ayesta, Peter Jacko

, Vladimír Novák
:
A nearly-optimal index rule for scheduling of users with abandonment. 2849-2857 - Meghana M. Amble, Parimal Parag

, Srinivas Shakkottai, Lei Ying
:
Content-aware caching and traffic management in content distribution networks. 2858-2866 - Mahdi Lotfinezhad, Peter Marbach:

Throughput-optimal random access with order-optimal delay. 2867-2875 - Vinod Ramaswamy, Diganto Choudhury, Srinivas Shakkottai:

Which protocol? Mutual interaction of heterogeneous congestion controllers. 2876-2884
Network protocols
- Hyungsoo Jung, Shin Gyu Kim, Heon Young Yeom, Sooyong Kang, Lavy Libman:

Adaptive delay-based congestion control for high bandwidth-delay product networks. 2885-2893 - Jingyuan Wang, Jiangtao Wen, Jun Zhang, Yuxing Han:

TCP-FIT: An improved TCP congestion control algorithm and its performance. 2894-2902 - Fei Chen, Bezawada Bruhadeshwar

, Alex X. Liu:
A cross-domain privacy-preserving protocol for cooperative firewall optimization. 2903-2911 - Shruti Sanadhya, Raghupathy Sivakumar:

Adaptive flow control for TCP on mobile phones. 2912-2920
Wireless LAN/MAN 2
- Amitabha Amitava Ghosh, Rittwik Jana, V. Ramaswami, Jim Rowland, N. K. Shankaranarayanan:

Modeling and characterization of large-scale Wi-Fi traffic in public hot-spots. 2921-2929 - Kyu-Han Kim, Alexander W. Min, Dhruv Gupta, Prasant Mohapatra, Jatinder Pal Singh:

Improving energy efficiency of Wi-Fi sensing on smartphones. 2930-2938 - Jie Xiong

, Romit Roy Choudhury:
PeerCast: Improving link layer multicast through cooperative relaying. 2939-2947
Internet routing
- Gábor Rétvári, János Tapolcai

, Gábor Enyedi, András Császár:
IP fast ReRoute: Loop Free Alternates revisited. 2948-2956 - Marco Chiesa

, Luca Cittadini, Giuseppe Di Battista
, Stefano Vissicchio:
Local transit policies and the complexity of BGP Stability Testing. 2957-2965 - Martin Suchara

, Alex Fabrikant, Jennifer Rexford
:
BGP safety with spurious updates. 2966-2974 - Alex Fabrikant, Umar Syed, Jennifer Rexford

:
There's something about MRAI: Timing diversity can exponentially worsen BGP convergence. 2975-2983
Cognitive radio and software defined radio 4
- Dongyue Xue, Eylem Ekici

:
Guaranteed opportunistic scheduling in multi-hop cognitive radio networks. 2984-2992 - Alexander W. Min, Kyu-Han Kim, Jatinder Pal Singh, Kang G. Shin:

Opportunistic spectrum access for mobile cognitive radios. 2993-3001 - Karim Khalil, Mehmet Karaca

, Özgür Erçetin, Eylem Ekici
:
Optimal scheduling in cooperate-to-join Cognitive Radio Networks. 3002-3010 - Yi Song, Jiang Xie:

Performance analysis of spectrum handoff for cognitive radio ad hoc networks without common control channel under homogeneous primary traffic. 3011-3019
Wireless resource/spectrum management 3
- Ajay Gopinathan, Zongpeng Li, Chuan Wu

:
Strategyproof auctions for balancing social welfare and fairness in secondary spectrum markets. 3020-3028 - Eyjolfur Ingi Asgeirsson, Pradipta Mitra:

On a game theoretic approach to capacity maximization in wireless networks. 3029-3037 - Qinghe Du, Xi Zhang:

Base-station selections for qos provisioning over distributed multi-user MIMO links in wireless networks. 3038-3046 - Chandrashekhar Thejaswi P. S., Tuan Tran, Junshan Zhang:

When compressive sampling meets multicast: Outage analysis and subblock network coding. 3047-3055
Scheduling, flow, and congestion control 4
- Wenzhuo Ouyang, Sugumar Murugesan, Atilla Eryilmaz, Ness B. Shroff:

Exploiting channel memory for joint estimation and scheduling in downlink networks. 3056-3064 - Ruogu Li, Atilla Eryilmaz:

Scheduling for end-to-end deadline-constrained traffic with reliability requirements in multi-hop networks. 3065-3073 - Hyunseok Chang, Murali S. Kodialam, Ramana Rao Kompella, T. V. Lakshman, Myungjin Lee, Sarit Mukherjee:

Scheduling in mapreduce-like systems for fast completion time. 3074-3082 - Lin Liu, Zhenghao Zhang, Yuanyuan Yang

:
Pipelining packet scheduling in a low latency optical packet switch. 3083-3091
Wireless communications - Short-range (UWB, RFID, ...)
- Lei Yang

, Jinsong Han, Yong Qi, Cheng Wang, Tao Gu
, Yunhao Liu:
Season: Shelving interference and joint identification in large-scale RFID systems. 3092-3100 - Shigang Chen, Ming Zhang, Bin Xiao

:
Efficient information collection protocols for sensor-augmented RFID networks. 3101-3109 - Nazif C. Tas, Tamer Nadeem

, Ashok K. Agrawala:
Making wireless networks MORAL. 3110-3118
Delay tolerant networks
- Wei Gao, Guohong Cao:

User-centric data dissemination in disruption tolerant networks. 3119-3127 - Kyunghan Lee

, Yoora Kim, Song Chong, Injong Rhee, Yung Yi:
Delay-capacity tradeoffs for mobile networks with Lévy walks and Lévy flights. 3128-3136 - Esa Hyytiä

, Jorma T. Virtamo, Pasi E. Lassila, Jussi Kangasharju
, Jörg Ott:
When does content float? Characterizing availability of anchored information in opportunistic content sharing. 3137-3145 - Eitan Altman, Veeraruna Kavitha, Francesco De Pellegrini, Vijay Kamble, Vivek S. Borkar:

Risk sensitive optimal control framework applied to delay tolerant networks. 3146-3154
Localization
- Junxing Zhang, Sneha Kumar Kasera, Neal Patwari, Piyush Rai:

Distinguishing locations across perimeters using wireless link measurements. 3155-3163 - Miao Jin, Su Xia, Hongyi Wu, Xianfeng Gu

:
Scalable and fully distributed localization with mere connectivity. 3164-3172 - Sándor Laki

, Péter Mátray, Péter Hága, Tamas Sebok, István Csabai
, Gábor Vattay:
Spotter: A model based active geolocation service. 3173-3181 - Jun-geun Park, Dorothy Curtis, Seth J. Teller, Jonathan Ledlie:

Implications of device diversity for organic localization. 3182-3190
Router and switch design
- Isaac Keslassy

, Kirill Kogan
, Gabriel Scalosub, Michael Segal
:
Providing performance guarantees in multipass network processors. 3191-3199 - Tao Li, Shigang Chen, Wen Luo, Ming Zhang:

Scan detection in high-speed networks based on optimal dynamic bit sharing. 3200-3208 - Lixiong Chen

, Xue Liu, Qixin Wang
, Yufei Wang:
A real-time multicast routing scheme for multi-hop switched fieldbuses. 3209-3217
Overlay networks and distributed computing
- Dinh Nguyen Tran, Jinyang Li, Lakshminarayanan Subramanian, Sherman S. M. Chow

:
Optimal Sybil-resilient node admission control. 3218-3226 - Lu Zhang, Xueyan Tang:

Client assignment for improving interactivity in distributed interactive applications. 3227-3235 - Rami Cohen, Danny Raz:

Cost effective resource allocation of overlay routing relay nodes. 3236-3244

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














