


default search action
IEEE/ACM Transactions on Networking, Volume 23
Volume 23, Number 1, February 2015
- Wanchun Jiang, Fengyuan Ren, Chuang Lin:

Phase Plane Analysis of Quantized Congestion Notification for Data Center Ethernet. 1-14 - Hongbo Jiang, Tianlong Yu, Chen Tian, Guang Tan, Chonggang Wang:

Connectivity-Based Segmentation in Large-Scale 2-D/3-D Sensor Networks: Algorithm and Applications. 15-27 - Cataldo Basile

, Antonio Lioy
:
Analysis of Application-Layer Filtering Policies With Application to HTTP. 28-41 - Marco Leogrande, Fulvio Risso

, Luigi Ciminiera:
Modeling Complex Packet Filters With Finite State Automata. 42-55 - Alberto Rabbachin, Andrea Conti

, Moe Z. Win
:
Wireless Network Intrinsic Secrecy. 56-69 - Haiying Shen, Ze Li:

A Hierarchical Account-Aided Reputation Management System for MANETs. 70-84 - Richard T. B. Ma

, John C. S. Lui, Vishal Misra:
Evolution of the Internet Economic Ecosystem. 85-98 - Guner D. Celik, Eytan H. Modiano:

Scheduling in Networks With Time-Varying Channels and Reconfiguration Delay. 99-113 - Reuven Cohen, Guy Grebla:

Joint Scheduling and Fast Cell Selection in OFDMA Wireless Networks. 114-125 - Yang Yang, Ness B. Shroff:

Throughput of Rateless Codes Over Broadcast Erasure Channels. 126-137 - Gabi Nakibly, Reuven Cohen, Liran Katzir:

Optimizing Data Plane Resources for Multipath Flows. 138-147 - Alessandro Checco

, Douglas J. Leith
:
Fair Virtualization of 802.11 Networks. 148-160 - Fabio Martignon, Stefano Paris, Ilario Filippini

, Lin Chen, Antonio Capone
:
Efficient and Truthful Bandwidth Allocation in Wireless Mesh Community Networks. 161-174 - Bahar Partov, Douglas J. Leith

, Rouzbeh Razavi:
Utility Fair Optimization of Antenna Tilt Angles in LTE Networks. 175-185 - Jiliang Wang, Wei Dong, Zhichao Cao, Yunhao Liu:

On the Delay Performance in a Large-Scale Wireless Sensor Network: Measurement, Analysis, and Implications. 186-197 - Fragkiskos Papadopoulos

, Constantinos Psomas, Dmitri V. Krioukov
:
Network Mapping by Replaying Hyperbolic Growth. 198-211 - Kang Chen, Haiying Shen:

DTN-FLOW: Inter-Landmark Data Flow for High-Throughput Routing in DTNs. 212-226 - Stefano Vissicchio, Luca Cittadini, Giuseppe Di Battista

:
On iBGP Routing Policies. 227-240 - Muhammad Shahzad, Alex X. Liu:

Fast and Accurate Estimation of RFID Tags. 241-254 - Yuan-Cheng Lai, Ling-Yen Hsiao, Bor-Shen Lin:

Optimal Slot Assignment for Binary Tracking Tree Protocol in RFID Tag Identification. 255-268 - Premkumar Karumbu

, Xiaomin Chen, Douglas J. Leith
:
Proportional Fair Coding for Wireless Mesh Networks. 269-281 - Brighten Godfrey, Matthew Caesar

, Ian Haken, Yaron Singer, Scott Shenker
, Ion Stoica:
Stabilizing Route Selection in BGP. 282-299 - Xinghua Sun, Lin Dai

:
Backoff Design for IEEE 802.11 DCF Networks: Fundamental Tradeoff and Design Criterion. 300-316 - Didem Gözüpek, Mordechai Shalom

, Fatih Alagöz:
A Graph-Theoretic Approach to Scheduling in Cognitive Radio Networks. 317-328
Volume 23, Number 2, April 2015
- Alberto Dainotti

, Alistair King, Kimberly C. Claffy
, Ferdinando Papale, Antonio Pescapè:
Analysis of a "/0" Stealth Scan From a Botnet. 341-354 - Carlee Joe-Wong, Soumya Sen, Sangtae Ha:

Offering Supplementary Network Technologies: Adoption Behavior and Offloading Benefits. 355-368 - Lieven Tytgat, Opher Yaron, Sofie Pollin

, Ingrid Moerman
, Piet Demeester:
Analysis and Experimental Verification of Frequency-Based Interference Avoidance Mechanisms in IEEE 802.15.4. 369-382 - Mukundan Madhavan, Harish Ganapathy, Malolan Chetlur, Shivkumar Kalyanaraman:

Adapting Cellular Networks to Whitespaces Spectrum. 383-397 - Supratim Deb, Pantelis Monogioudis:

Learning-Based Uplink Interference Management in 4G LTE Cellular Systems. 398-411 - George Papageorgiou, Shailendra Singh, Srikanth V. Krishnamurthy

, Ramesh Govindan, Tom La Porta:
A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks. 412-425 - Reuven Cohen, Guy Grebla:

Efficient Allocation of Periodic Feedback Channels in Broadband Wireless Networks. 426-436 - Liguang Xie, Yi Shi

, Yiwei Thomas Hou
, Wenjing Lou, Hanif D. Sherali, Scott F. Midkiff
:
Multi-Node Wireless Energy Charging in Sensor Networks. 437-450 - Chih-Chuan Cheng, Pi-Cheng Hsiu

:
Extend Your Journey: Considering Signal Strength and Fluctuation in Location-Based Applications. 451-464 - Yong Cui, Lian Wang, Xin Wang, Hongyi Wang, Yining Wang:

FMTCP: A Fountain Code-Based Multipath Transmission Control Protocol. 465-478 - Sanaz Barghi, Hamid Jafarkhani

:
Exploiting Asynchronous Amplify-and-Forward Relays to Enhance the Performance of IEEE 802.11 Networks. 479-490 - Tong Ye, Tony Tong Lee, Weisheng Hu

:
AWG-Based Non-Blocking Clos Networks. 491-504 - Po-Kai Huang, Xiaojun Lin:

Achieving Optimal Throughput Utility and Low Delay With CSMA-Like Algorithms: A Virtual Multichannel Approach. 505-518 - Dongyue Xue, Robert Murawski, Eylem Ekici

:
Capacity Achieving Distributed Scheduling With Finite Buffers. 519-532 - Tung-Wei Kuo, Kate Ching-Ju Lin, Ming-Jer Tsai:

Maximizing Submodular Set Function With Connectivity Constraint: Theory and Application to Networks. 533-546 - Lorenzo Rossi, Jacob Chakareski, Pascal Frossard, Stefania Colonnese

:
A Poisson Hidden Markov Model for Multiview Video Traffic. 547-558 - Armin Banaei, Daren B. H. Cline, Costas N. Georghiades

, Shuguang Cui
:
On Asymptotic Statistics for Geometric Routing Schemes in Wireless Ad Hoc Networks. 559-573 - Sucha Supittayapornpong, Michael J. Neely:

Quality of Information Maximization for Wireless Networks via a Fully Separable Quadratic Policy. 574-586 - Andreea Picu

, Thrasyvoulos Spyropoulos:
DTN-Meteo: Forecasting the Performance of DTN Protocols Under Heterogeneous Mobility. 587-602 - Zhenyu Wu, Zhang Xu, Haining Wang:

Whispers in the Hyper-Space: High-Bandwidth and Reliable Covert Channel Attacks Inside the Cloud. 603-615 - Chih-Ping Li, Eytan H. Modiano:

Receiver-Based Flow Control for Networks in Overload. 616-630 - Bin Li

, Ruogu Li, Atilla Eryilmaz:
On the Optimal Convergence Speed of Wireless Scheduling for Fair Resource Allocation. 631-643 - Qiang Liu, Xin Wang, Nageswara S. V. Rao

:
Fusion of State Estimates Over Long-Haul Sensor Networks With Random Loss and Delay. 644-656 - Zhenhua Liu, Minghong Lin, Adam Wierman, Steven H. Low, Lachlan L. H. Andrew:

Greening Geographical Load Balancing. 657-671 - Daniele Riboni, Antonio Villani, Domenico Vitali, Claudio Bettini

, Luigi V. Mancini
:
Obfuscation of Sensitive Data for Incremental Release of Network Flows. 672-686
Volume 23, Number 3, June 2015
- Yu Wu, Chuan Wu

, Bo Li, Linquan Zhang, Zongpeng Li, Francis C. M. Lau:
Scaling Social Media Applications Into Geo-Distributed Clouds. 689-702 - Ori Rottenstreich, Isaac Keslassy

:
The Bloom Paradox: When Not to Use a Bloom Filter. 703-716 - Christoph Lenzen, Philipp Sommer, Roger Wattenhofer:

PulseSync: An Efficient and Scalable Clock Synchronization Protocol. 717-727 - I-Hong Hou:

Broadcasting Delay-Constrained Traffic Over Unreliable Wireless Links With Network Coding. 728-740 - Stefano Traverso, Luca Abeni

, Robert Birke, Csaba Király
, Emilio Leonardi
, Renato Lo Cigno
, Marco Mellia
:
Neighborhood Filtering Strategies for Overlay Construction in P2P-TV Systems: Design and Experimental Comparison. 741-754 - Zhongmei Yao, Daren B. H. Cline, Dmitri Loguinov:

Unstructured P2P Link Lifetimes Redux. 755-767 - Zizhan Zheng

, Zhixue Lu, Prasun Sinha, Santosh Kumar:
Ensuring Predictable Contact Opportunity for Scalable Vehicular Internet Access on the Go. 768-781 - Jihwan Kim, Hyang-Won Lee, Song Chong:

CSMA-Based Robust AP Throughput Guarantee Under User Distribution Uncertainty. 782-795 - Muhammad Shahzad, Alex X. Liu:

Probabilistic Optimal Tree Hopping for RFID Identification. 796-809 - Yanjun Yao, Qing Cao, Athanasios V. Vasilakos

:
EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-Balancing Data Collection Protocol for Heterogeneous Wireless Sensor Networks. 810-823 - Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng:

Practical Conflict Graphs in the Wild. 824-835 - George Athanasiou

, Pradeep Chathuranga Weeraddana, Carlo Fischione
, Leandros Tassiulas
:
Optimizing Client Association for Load Balancing and Fairness in Millimeter-Wave Wireless Networks. 836-850 - Corentin Briat

, Emre Altug Yavuz, Håkan Hjalmarsson
, Karl Henrik Johansson
, Ulf T. Jönsson, Gunnar Karlsson, Henrik Sandberg
:
The Conservation of Information, Towards an Axiomatized Modular Modeling Approach to Congestion Control. 851-865 - Maricica Nistor, Daniel E. Lucani

, João Barros
:
Hardware Abstraction and Protocol Optimization for Coded Sensor Networks. 866-879 - Bo Ji

, Gagan Raj Gupta
, Manu Sharma, Xiaojun Lin, Ness B. Shroff:
Achieving Optimal Throughput and Near-Optimal Asymptotic Delay Performance in Multichannel Wireless Networks With Low Complexity: A Practical Greedy Scheduling Policy. 880-893 - Hu Jin, Bang Chul Jung

, Victor C. M. Leung
:
Fundamental Limits of CDF-Based Scheduling: Throughput, Fairness, and Feedback Overhead. 894-907 - Stojan Trajanovski, Fernando A. Kuipers, Aleksandar Ilic, Jon Crowcroft

, Piet Van Mieghem:
Finding Critical Regions and Region-Disjoint Paths in a Network. 908-921 - Zhichao Cao, Yuan He, Qiang Ma, Yunhao Liu:

L2: Lazy Forwarding in Low-Duty-Cycle Wireless Sensor Network. 922-930 - Leonidas Georgiadis, Georgios S. Paschos, Lavy Libman, Leandros Tassiulas:

Minimal Evacuation Times and Stability. 931-945 - Fei Chen, Bruhadeshwar Bezawada

, Alex X. Liu:
Privacy-Preserving Quantification of Cross-Domain Network Reachability. 946-958 - Yunbae Kim, Ganguk Hwang:

Design and Analysis of Medium Access Protocol: Throughput and Short-Term Fairness Perspective. 959-972 - Kianoosh Mokhtarian, Hans-Arno Jacobsen:

Minimum-Delay Multicast Algorithms for Mesh Overlays. 973-986 - Haiying Shen, Yuhua Lin, Jin Li:

A Social-Network-Aided Efficient Peer-to-Peer Live Streaming System. 987-1000 - Thang N. Dinh

, My T. Thai:
Network Under Joint Node and Link Attacks: Vulnerability Assessment Methods and Analysis. 1001-1011 - Abdallah Jarray, Ahmed Karmouch:

Decomposition Approaches for Virtual Network Embedding With One-Shot Node and Link Mapping. 1012-1025
Volume 23, Number 4, August 2015
- Mohammad Ali Maddah-Ali, Urs Niesen:

Decentralized Coded Caching Attains Order-Optimal Memory-Rate Tradeoff. 1029-1040 - Kai Han, Jun Luo

, Liu Xiang, Mingjun Xiao, Liusheng Huang:
Achieving Energy Efficiency and Reliability for Data Dissemination in Duty-Cycled WSNs. 1041-1052 - Qingkai Liang, Xinbing Wang, Xiaohua Tian, Fan Wu, Qian Zhang

:
Two-Dimensional Route Switching in Cognitive Radio Networks: A Game-Theoretical Framework. 1053-1066 - Ali Khanafer, Murali S. Kodialam, Krishna P. N. Puttaswamy:

To Rent or to Buy in the Presence of Statistical Information: The Constrained Ski-Rental Problem. 1067-1077 - Majid Khabbazian, Stephane Durocher, Alireza Haghnegahdar, Fabian Kuhn:

Bounding Interference in Wireless Ad Hoc Networks With Nodes in Random Position. 1078-1091 - Marcello Caleffi

, Ian F. Akyildiz, Luigi Paura:
On the Solution of the Steiner Tree NP-Hard Problem via Physarum BioNetwork. 1092-1106 - Joerg Widmer

, Andrea Capalbo, Antonio Fernández Anta
, Albert Banchs
:
Efficient Interlayer Network Codes for Fair Layered Multicast Streaming. 1107-1120 - Giuseppe Enrico Santagati, Tommaso Melodia

, Laura Galluccio
, Sergio Palazzo:
Medium Access Control and Rate Adaptation for Ultrasonic Intrabody Sensor Networks. 1121-1134 - Yu-Sian Li, Trang Cao Minh, Shu-Ting Wang, Xin Huang, Cheng-Hsin Hsu, Po-Ching Lin:

A Resource-Constrained Asymmetric Redundancy Elimination Algorithm. 1135-1148 - Yang Yang, Miao Jin, Yao Zhao, Hongyi Wu:

Distributed Information Storage and Retrieval in 3-D Sensor Networks With General Topologies. 1149-1162 - Yipeng Zhou

, Tom Z. J. Fu, Dah Ming Chiu:
A Unifying Model and Analysis of P2P VoD Replication and Scheduling. 1163-1175 - Jianhang Gao, Qing Zhao, Ananthram Swami:

The Thinnest Path Problem. 1176-1189 - Hazem Gomaa, Geoffrey G. Messier

, Robert J. Davies:
Hierarchical Cache Performance Analysis Under TTL-Based Consistency. 1190-1201 - Andres Garcia-Saavedra

, Balaji Rengarajan, Pablo Serrano
, Daniel Camps-Mur
, Xavier Costa-Pérez
:
SOLOR: Self-Optimizing WLANs With Legacy-Compatible Opportunistic Relays. 1202-1215 - Matthew Johnston, Hyang-Won Lee, Eytan H. Modiano:

A Robust Optimization Approach to Backup Network Design With Random Failures. 1216-1228 - Spyridon Antonakopoulos, Yigal Bejerano, Pramod V. Koppol:

Full Protection Made Easy: The DisPath IP Fast Reroute Scheme. 1229-1242 - Pablo Serrano

, Andres Garcia-Saavedra
, Giuseppe Bianchi
, Albert Banchs
, Arturo Azcorra:
Per-Frame Energy Consumption in 802.11 Devices and Its Implication on Modeling and Design. 1243-1256 - Jun Zhang

, Xiao Chen
, Yang Xiang
, Wanlei Zhou
, Jie Wu:
Robust Network Traffic Classification. 1257-1270 - Fan Wu, Qianyi Huang

, Yixin Tao, Guihai Chen
:
Towards Privacy Preservation in Strategy-Proof Spectrum Auction Mechanisms for Noncooperative Wireless Networks. 1271-1285 - Hisham M. Almasaeid

, Ahmed E. Kamal:
Receiver-Based Channel Allocation in Cognitive Radio Wireless Mesh Networks. 1286-1299 - Matteo Dell'Amico

, Maurizio Filippone
, Pietro Michiardi, Yves Roudier:
On User Availability Prediction and Network Applications. 1300-1313 - Enrico Gregori, Alessandro Improta, Luciano Lenzini, Lorenzo Rossi, Luca Sani:

A Novel Methodology to Address the Internet AS-Level Data Incompleteness. 1314-1327 - Chao Yang, Scott Jordan:

A Novel Coordinated Connection Access Control and Resource Allocation Framework for 4G Wireless Networks. 1328-1341 - Yu Cheng

, Hongkun Li, Devu Manikantan Shila, Xianghui Cao
:
A Systematic Study of Maximal Scheduling Algorithms in Multiradio Multichannel Wireless Networks. 1342-1355 - Yuanqing Zheng

, Mo Li
:
P-MTI: Physical-Layer Missing Tag Identification via Compressive Sensing. 1356-1366 - Fan Zhang, Yewen Cao, Deqiang Wang:

A Note on "Low-Complexity Distributed Scheduling Algorithms for Wireless Networks". 1367-1369
Volume 23, Number 5, October 2015
- François Clad, Stefano Vissicchio, Pascal Mérindol, Pierre François, Jean-Jacques Pansiot

:
Computing Minimal Update Sequences for Graceful Router-Wide Reconfigurations. 1373-1386 - Anne Bouillard, Giovanni Stea

:
Exact Worst-Case Delay in FIFO-Multiplexing Feed-Forward Networks. 1387-1400 - Sk. Kajal Arefin Imon, Adnan Rahath Khan, Mario Di Francesco, Sajal K. Das

:
Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree-Based Wireless Sensor Networks. 1401-1415 - Yi-Sheng Su:

Topology-Transparent Scheduling via the Chinese Remainder Theorem. 1416-1429 - Lei Yang, Yalin Evren Sagduyu, Junshan Zhang, Jason H. Li:

Deadline-Aware Scheduling With Adaptive Network Coding for Real-Time Traffic. 1430-1443 - Barlas Oguz, Venkat Anantharam, Ilkka Norros:

Stable Distributed P2P Protocols Based on Random Peer Sampling. 1444-1456 - Yunus Sarikaya, Özgür Erçetin, Can Emre Koksal:

Confidentiality-Preserving Control of Uplink Cellular Wireless Networks Using Hybrid ARQ. 1457-1470 - Xu Chen, Brian Proulx, Xiaowen Gong, Junshan Zhang:

Exploiting Social Ties for Cooperative D2D Communications: A Mobile Social Networking Case. 1471-1484 - Mina Yazdanpanah, Chadi Assi, Samir Sebbah, Yousef R. Shayan:

Does Network Coding Combined With Interference Cancellation Bring Any Gain to a Wireless Network? 1485-1500 - Sergi Abadal

, Mario Iannazzo, Mario Nemirovsky, Albert Cabellos-Aparicio, Heekwan Lee, Eduard Alarcón:
On the Area and Energy Scalability of Wireless Network-on-Chip: A Model-Based Benchmarked Design Space Exploration. 1501-1513 - Chenxi Qiu, Haiying Shen, Sohraab Soltani, Karan Sapra, Hao Jiang, Jason O. Hallstrom:

CEDAR: A Low-Latency and Distributed Strategy for Packet Recovery in Wireless Networks. 1514-1527 - Ioannis Ch. Paschalidis

, Fuzhuo Huang, Wei Lai:
A Message-Passing Algorithm for Wireless Network Scheduling. 1528-1541 - Bin Li

, Ruogu Li, Atilla Eryilmaz:
Throughput-Optimal Scheduling Design With Regular Service Guarantees in Wireless Networks. 1542-1552 - Sameh Sorour, Shahrokh Valaee:

Completion Delay Minimization for Instantly Decodable Network Codes. 1553-1567 - Timothy Wood

, K. K. Ramakrishnan
, Prashant J. Shenoy
, Jacobus E. van der Merwe, Jinho Hwang, Guyue Liu, Lucas Chaufournier:
CloudNet: Dynamic Pooling of Cloud Resources by Live WAN Migration of Virtual Machines. 1568-1583 - Sharayu Moharir, Sanjay Shakkottai:

MaxWeight Versus BackPressure: Routing and Scheduling in Multichannel Relay Networks. 1584-1598 - Ferhat Dikbiyik, Massimo Tornatore

, Biswanath Mukherjee:
Exploiting Excess Capacity, Part II: Differentiated Services Under Traffic Growth. 1599-1609 - András Gulyás, Gábor Rétvári, Zalán Heszberger

, Rachit Agarwal:
On the Scalability of Routing With Policies. 1610-1618 - Enrique Mallada

, Xiaoqiao Meng, Michel Hack, Li Zhang, Ao Tang:
Skewless Network Clock Synchronization Without Discontinuity: Convergence and Performance. 1619-1633 - George Iosifidis

, Lin Gao, Jianwei Huang, Leandros Tassiulas:
A Double-Auction Mechanism for Mobile Data-Offloading Markets. 1634-1647 - Dan Li, Jing Zhu, Jianping Wu, Junjie Guan, Ying Zhang:

Guaranteeing Heterogeneous Bandwidth Demand in Multitenant Data Center Networks. 1648-1660 - Wei Du, Yongjun Liao, Narisu Tao, Pierre Geurts, Xiaoming Fu

, Guy Leduc:
Rating Network Paths for Locality-Aware Overlay Construction and Routing. 1661-1673 - Virag Shah, Gustavo de Veciana:

High-Performance Centralized Content Delivery Infrastructure: Models and Asymptotics. 1674-1687 - Tao Shu, Yingying Chen

, Jie Yang:
Protecting Multi-Lateral Localization Privacy in Pervasive Environments. 1688-1701 - Dahai Xu, Mung Chiang, Jennifer Rexford

:
Corrections to "Link-State Routing With Hop-By-Hop Forwarding Can Achieve Optimal Traffic Engineering". 1702-1703
Volume 23, Number 6, December 2015
- Feng Yan, Anaïs Vergne, Philippe Martins, Laurent Decreusefond

:
Homology-Based Distributed Coverage Hole Detection in Wireless Sensor Networks. 1705-1718 - János Tapolcai

, Pin-Han Ho, Péter Babarczi
, Lajos Rónyai:
Neighborhood Failure Localization in All-Optical Networks via Monitoring Trails. 1719-1728 - Sharon Goldberg, David Xiao, Eran Tromer, Boaz Barak, Jennifer Rexford

:
Path-Quality Monitoring in the Presence of Adversaries: The Secure Sketch Protocols. 1729-1741 - Hongyu Zhou, Su Xia, Miao Jin, Hongyi Wu:

Localized and Precise Boundary Detection in 3-D Wireless Sensor Networks. 1742-1754 - Matthew Andrews, Spyridon Antonakopoulos, Lisa Zhang:

Rate-Adaptive Scheduling Policies for Network Stability and Energy Efficiency. 1755-1764 - Reuven Cohen, Guy Grebla:

Multidimensional OFDMA Scheduling in a Wireless Network With Relay Nodes. 1765-1776 - Hiroshi Saito:

Analysis of Geometric Disaster Evaluation Model for Physical Networks. 1777-1789 - Honggang Zhang

, Sudarshan Vasudevan, Ran Li, Don Towsley
:
Coalitions Improve Performance in Data Swarming Systems. 1790-1804 - Jianhang Gao, Qing Zhao, Wei Ren, Ananthram Swami, Ram Ramanathan, Amotz Bar-Noy:

Dynamic Shortest Path Algorithms for Hypergraphs. 1805-1817 - Youngmi Jin, George Kesidis, Jinwoo Shin, Fatih Kocak, Yung Yi:

Impacts of Selfish Behaviors on the Scalability of Hybrid Client-Server and Peer-to-Peer Caching Systems. 1818-1831 - János Tapolcai

, József Bíró, Péter Babarczi
, András Gulyás, Zalán Heszberger, Dirk Trossen:
Optimal False-Positive-Free Bloom Filter Design for Scalable Multicast Forwarding. 1832-1845 - Delia Ciullo, Valentina Martina, Michele Garetto

, Emilio Leonardi
:
How Much Can Large-Scale Video-on-Demand Benefit From Users' Cooperation? 1846-1861 - Nithin Michael, Ao Tang:

HALO: Hop-by-Hop Adaptive Link-State Optimal Routing. 1862-1875 - Yu-Pin Hsu

, Navid Abedini, Natarajan Gautam, Alex Sprintson, Srinivas Shakkottai:
Opportunities for Network Coding: To Wait or Not to Wait. 1876-1889 - Zheng Dong

, Son Hoang Dau
, Chau Yuen, Yu Gu, Xiumin Wang:
Delay Minimization for Relay-Based Cooperative Data Exchange With Network Coding. 1890-1902 - Norbert Radics, Lajos Bajzik, Zsolt Lakatos:

Survivable Mapping of Virtual Topologies for Double-Node Failure. 1903-1916 - John Tadrous, Atilla Eryilmaz, Hesham El Gamal:

Proactive Content Download and User Demand Shaping for Data Networks. 1917-1930 - Alexandre Fréchette, F. Bruce Shepherd, Marina K. Thottan, Peter J. Winzer:

Shortest Path Versus Multihub Routing in Networks With Uncertain Demand. 1931-1943 - Mario A. Sánchez, John S. Otto, Zachary S. Bischof

, David R. Choffnes, Fabian E. Bustamante, Balachander Krishnamurthy, Walter Willinger:
A Measurement Experimentation Platform at the Internet's Edge. 1944-1958 - Junjie Zhang

, Kang Xi, H. Jonathan Chao:
Load Balancing in IP Networks Using Generalized Destination-Based Multipath Routing. 1959-1969 - Shuai Wang, Song Min Kim, Yunhuai Liu, Guang Tan, Tian He:

CorLayer: A Transparent Link Correlation Layer for Energy-Efficient Broadcast. 1970-1983 - Vijay Kumar Adhikari, Yang Guo, Fang Hao, Volker Hilt, Zhi-Li Zhang, Matteo Varvello, Moritz Steiner:

Measurement Study of Netflix, Hulu, and a Tale of Three CDNs. 1984-1997 - Amir Nahir, Ariel Orda, Danny Raz:

Workload Factoring: A Game-Theoretic Perspective. 1998-2009 - Jeffrey Erman, Vijay Gopalakrishnan, Rittwik Jana, Kadangode K. Ramakrishnan

:
Towards a SPDY'ier Mobile Web? 2010-2023

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














