callback( { "result":{ "query":":facetid:toc:\"db/journals/ton/ton14.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"65.79" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"112", "@dc":"112", "@oc":"112", "@id":"43488559", "text":":facetid:toc:db/journals/ton/ton14.bht" } }, "hits":{ "@total":"112", "@computed":"112", "@sent":"112", "@first":"0", "hit":[{ "@score":"1", "@id":"5690722", "info":{"authors":{"author":{"@pid":"59/6458","text":"Maher Ali"}},"title":"Generalized sharing in survivable optical networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"6","pages":"1388-1399","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/Ali06","doi":"10.1145/1217707","ee":"http://doi.acm.org/10.1145/1217707","url":"https://dblp.org/rec/journals/ton/Ali06"}, "url":"URL#5690722" }, { "@score":"1", "@id":"5690723", "info":{"authors":{"author":[{"@pid":"a/MatthewAndrews","text":"Matthew Andrews"},{"@pid":"z/LisaZhang","text":"Lisa Zhang"}]},"title":"Scheduling over nonstationary wireless channels with finite rate sets.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"5","pages":"1067-1077","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/AndrewsZ06","doi":"10.1145/1217720","ee":"http://doi.acm.org/10.1145/1217720","url":"https://dblp.org/rec/journals/ton/AndrewsZ06"}, "url":"URL#5690723" }, { "@score":"1", "@id":"5690724", "info":{"authors":{"author":[{"@pid":"99/2651","text":"David L. Applegate"},{"@pid":"40/1039","text":"Edith Cohen"}]},"title":"Making routing robust to changing traffic demands: algorithms and evaluation.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"6","pages":"1193-1206","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/ApplegateC06","doi":"10.1145/1217691","ee":"http://doi.acm.org/10.1145/1217691","url":"https://dblp.org/rec/journals/ton/ApplegateC06"}, "url":"URL#5690724" }, { "@score":"1", "@id":"5690725", "info":{"authors":{"author":[{"@pid":"a/AArora","text":"Anish Arora"},{"@pid":"27/5935-1","text":"Hongwei Zhang 0001"}]},"title":"LSRP: local stabilization in shortest path routing.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"3","pages":"520-531","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/AroraZ06","doi":"10.1145/1143396.1143402","ee":"http://doi.acm.org/10.1145/1143396.1143402","url":"https://dblp.org/rec/journals/ton/AroraZ06"}, "url":"URL#5690725" }, { "@score":"1", "@id":"5690726", "info":{"authors":{"author":[{"@pid":"15/5313","text":"Daniel O. Awduche"},{"@pid":"52/4297","text":"Bijan Jabbari"}]},"title":"Demand assigned capacity management (DACM) in IP over optical (IPO) networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"4","pages":"900-913","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/AwducheJ06","doi":"10.1145/1217664","ee":"http://doi.acm.org/10.1145/1217664","url":"https://dblp.org/rec/journals/ton/AwducheJ06"}, "url":"URL#5690726" }, { "@score":"1", "@id":"5690727", "info":{"authors":{"author":[{"@pid":"345/5455-1","text":"Suman Banerjee 0001"},{"@pid":"15/4697","text":"Seungjoon Lee"},{"@pid":"b/BobbyBhattacharjee","text":"Bobby Bhattacharjee"},{"@pid":"s/AravindSrinivasan","text":"Aravind Srinivasan"}]},"title":"Resilient multicast using overlays.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"2","pages":"237-248","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/BanerjeeLBS06","doi":"10.1145/1217619.1217620","ee":"http://doi.acm.org/10.1145/1217619.1217620","url":"https://dblp.org/rec/journals/ton/BanerjeeLBS06"}, "url":"URL#5690727" }, { "@score":"1", "@id":"5690728", "info":{"authors":{"author":[{"@pid":"b/GBarrenetxea","text":"Guillermo Barrenetxea"},{"@pid":"b/BBeferullLozano","text":"Baltasar Beferull-Lozano"},{"@pid":"v/MVetterli","text":"Martin Vetterli"}]},"title":"Lattice networks: capacity limits, optimal routing, and queueing behavior.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"3","pages":"492-505","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/BarrenetxeaBV06","doi":"10.1145/1143396.1143400","ee":"http://doi.acm.org/10.1145/1143396.1143400","url":"https://dblp.org/rec/journals/ton/BarrenetxeaBV06"}, "url":"URL#5690728" }, { "@score":"1", "@id":"5690729", "info":{"authors":{"author":[{"@pid":"b/GBarrenetxea","text":"Guillermo Barrenetxea"},{"@pid":"b/BBeferullLozano","text":"Baltasar Beferull-Lozano"},{"@pid":"v/MVetterli","text":"Martin Vetterli"}]},"title":"Correction to "Lattice networks: Capacity limits, optimal routing, and queueing behavior".","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"5","pages":"1150","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/BarrenetxeaBV06a","doi":"10.1145/1217727","ee":"http://doi.acm.org/10.1145/1217727","url":"https://dblp.org/rec/journals/ton/BarrenetxeaBV06a"}, "url":"URL#5690729" }, { "@score":"1", "@id":"5690730", "info":{"authors":{"author":[{"@pid":"80/2525","text":"Yigal Bejerano"},{"@pid":"53/5575","text":"Randeep Bhatia"}]},"title":"MiFi: a framework for fairness and QoS assurance for current IEEE 802.11 networks with multiple access points.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"4","pages":"849-862","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/BejeranoB06","doi":"10.1145/1217660","ee":"http://doi.acm.org/10.1145/1217660","url":"https://dblp.org/rec/journals/ton/BejeranoB06"}, "url":"URL#5690730" }, { "@score":"1", "@id":"5690731", "info":{"authors":{"author":[{"@pid":"80/2525","text":"Yigal Bejerano"},{"@pid":"r/RajeevRastogi","text":"Rajeev Rastogi"}]},"title":"Robust monitoring of link delays and faults in IP networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"5","pages":"1092-1103","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/BejeranoR06","doi":"10.1145/1217722","ee":"http://doi.acm.org/10.1145/1217722","url":"https://dblp.org/rec/journals/ton/BejeranoR06"}, "url":"URL#5690731" }, { "@score":"1", "@id":"5690732", "info":{"authors":{"author":[{"@pid":"80/2525","text":"Yigal Bejerano"},{"@pid":"13/5586","text":"Mark A. Smith"},{"@pid":"n/JosephNaor","text":"Joseph Naor"},{"@pid":"43/3631","text":"Nicole Immorlica"}]},"title":"Efficient location area planning for personal communication systems.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"2","pages":"438-450","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/BejeranoSNI06","doi":"10.1145/1217619.1217635","ee":"http://doi.acm.org/10.1145/1217619.1217635","url":"https://dblp.org/rec/journals/ton/BejeranoSNI06"}, "url":"URL#5690732" }, { "@score":"1", "@id":"5690733", "info":{"authors":{"author":[{"@pid":"11/3015","text":"Stephan Bohacek"},{"@pid":"h/JoaoPedroHespanha","text":"João Pedro Hespanha"},{"@pid":"87/3598","text":"Junsoo Lee"},{"@pid":"19/3681","text":"Chansook Lim"},{"@pid":"o/KatiaObraczka","text":"Katia Obraczka"}]},"title":"A new TCP for persistent packet reordering.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"2","pages":"369-382","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/BohacekHLLO06","doi":"10.1145/1217619.1217630","ee":"http://doi.acm.org/10.1145/1217619.1217630","url":"https://dblp.org/rec/journals/ton/BohacekHLLO06"}, "url":"URL#5690733" }, { "@score":"1", "@id":"5690734", "info":{"authors":{"author":[{"@pid":"04/6226","text":"Anthony C. Boucouvalas"},{"@pid":"56/347","text":"Pi Huang"}]},"title":"OBEX over IrDA: performance analysis and optimization by considering multiple applications.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"6","pages":"1292-1301","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/BoucouvalasH06","doi":"10.1145/1217699","ee":"http://doi.acm.org/10.1145/1217699","url":"https://dblp.org/rec/journals/ton/BoucouvalasH06"}, "url":"URL#5690734" }, { "@score":"1", "@id":"5690735", "info":{"authors":{"author":[{"@pid":"l/JYLeBoudec","text":"Jean-Yves Le Boudec"},{"@pid":"00/1815","text":"Milan Vojnovic"}]},"title":"The random trip model: stability, stationary regime, and perfect simulation.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"6","pages":"1153-1166","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/BoudecV06","doi":"10.1145/1217688","ee":"http://doi.acm.org/10.1145/1217688","url":"https://dblp.org/rec/journals/ton/BoudecV06"}, "url":"URL#5690735" }, { "@score":"1", "@id":"5690736", "info":{"authors":{"author":[{"@pid":"59/4355","text":"David Breitgand"},{"@pid":"r/DannyRaz","text":"Danny Raz"},{"@pid":"83/1922","text":"Yuval Shavitt"}]},"title":"The traveling miser problem.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"4","pages":"711-724","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/BreitgandRS06","doi":"10.1145/1217650","ee":"http://doi.acm.org/10.1145/1217650","url":"https://dblp.org/rec/journals/ton/BreitgandRS06"}, "url":"URL#5690736" }, { "@score":"1", "@id":"5690737", "info":{"authors":{"author":[{"@pid":"b/JohnWByers","text":"John W. Byers"},{"@pid":"80/4212","text":"Gu-In Kwon"},{"@pid":"l/MichaelLuby","text":"Michael Luby"},{"@pid":"74/838","text":"Michael Mitzenmacher"}]},"title":"Fine-grained layered multicast with STAIR.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"1","pages":"81-93","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/ByersKLM06","doi":"10.1145/1133553.1133560","ee":"http://doi.acm.org/10.1145/1133553.1133560","url":"https://dblp.org/rec/journals/ton/ByersKLM06"}, "url":"URL#5690737" }, { "@score":"1", "@id":"5690738", "info":{"authors":{"author":[{"@pid":"75/2172-1","text":"Ning Cai 0001"},{"@pid":"61/5309","text":"Mung Chiang"},{"@pid":"83/4741","text":"Michelle Effros"},{"@pid":"k/RalfKoetter","text":"Ralf Koetter"},{"@pid":"m/MurielMedard","text":"Muriel Médard"},{"@pid":"48/1750","text":"Balaji Prabhakar"},{"@pid":"s/RSrikant","text":"R. Srikant 0001"},{"@pid":"t/DonaldFTowsley","text":"Donald F. Towsley"},{"@pid":"89/2937","text":"Raymond W. Yeung"}]},"title":"Introduction to the special issue on networking and information theory.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"4","pages":"674","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/CaiCEKMPSTY06","doi":"10.1145/1217646","ee":"http://doi.acm.org/10.1145/1217646","url":"https://dblp.org/rec/journals/ton/CaiCEKMPSTY06"}, "url":"URL#5690738" }, { "@score":"1", "@id":"5690739", "info":{"authors":{"author":[{"@pid":"68/6327","text":"Nedo Celandroni"},{"@pid":"72/147","text":"Franco Davoli"},{"@pid":"26/3617","text":"Erina Ferro"},{"@pid":"65/4788","text":"Alberto Gotta"}]},"title":"Long-lived TCP connections via satellite: cross-layer bandwidth allocation, pricing, and adaptive control.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"5","pages":"1019-1030","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/CelandroniDFG06","doi":"10.1145/1217716","ee":"http://doi.acm.org/10.1145/1217716","url":"https://dblp.org/rec/journals/ton/CelandroniDFG06"}, "url":"URL#5690739" }, { "@score":"1", "@id":"5690740", "info":{"authors":{"author":[{"@pid":"29/2042","text":"Jacob Chakareski"},{"@pid":"c/PhilipAChou","text":"Philip A. Chou"}]},"title":"RaDiO edge: rate-distortion optimized proxy-driven streaming from the network edge.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"6","pages":"1302-1312","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/ChakareskiC06","doi":"10.1145/1217700","ee":"http://doi.acm.org/10.1145/1217700","url":"https://dblp.org/rec/journals/ton/ChakareskiC06"}, "url":"URL#5690740" }, { "@score":"1", "@id":"5690741", "info":{"authors":{"author":[{"@pid":"58/2564","text":"Cheng-Shang Chang"},{"@pid":"63/4845","text":"Duan-Shin Lee"},{"@pid":"91/1814","text":"Chi-Yao Yue"}]},"title":"Providing guaranteed rate services in the load balanced Birkhoff-von Neumann switches.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"3","pages":"644-656","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/ChangLY06","doi":"10.1145/1143396.1143412","ee":"http://doi.acm.org/10.1145/1143396.1143412","url":"https://dblp.org/rec/journals/ton/ChangLY06"}, "url":"URL#5690741" }, { "@score":"1", "@id":"5690742", "info":{"authors":{"author":[{"@pid":"87/4995","text":"Prasanna Chaporkar"},{"@pid":"34/4059","text":"Saswati Sarkar"},{"@pid":"55/2155","text":"Rahul Shetty"}]},"title":"Dynamic quorum policy for maximizing throughput in limited information multiparty MAC.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"4","pages":"835-848","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/ChaporkarSS06","doi":"10.1145/1217659","ee":"http://doi.acm.org/10.1145/1217659","url":"https://dblp.org/rec/journals/ton/ChaporkarSS06"}, "url":"URL#5690742" }, { "@score":"1", "@id":"5690743", "info":{"authors":{"author":[{"@pid":"61/2918","text":"Zesheng Chen"},{"@pid":"64/2242","text":"Tian Bu"},{"@pid":"a/MHAmmar","text":"Mostafa H. Ammar"},{"@pid":"t/DonaldFTowsley","text":"Donald F. Towsley"}]},"title":"Comments on "modeling TCP reno performance: a simple model and its empirical validation".","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"2","pages":"451-453","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/ChenBAT06","doi":"10.1145/1217619.1217636","ee":"http://doi.acm.org/10.1145/1217619.1217636","url":"https://dblp.org/rec/journals/ton/ChenBAT06"}, "url":"URL#5690743" }, { "@score":"1", "@id":"5690744", "info":{"authors":{"author":[{"@pid":"96/3060-3","text":"Yu Cheng 0003"},{"@pid":"z/WeihuaZhuang","text":"Weihua Zhuang"}]},"title":"Dynamic inter-SLA resource sharing in path-oriented differentiated services networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"3","pages":"657-670","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/ChengZ06","doi":"10.1145/1143396.1143413","ee":"http://doi.acm.org/10.1145/1143396.1143413","url":"https://dblp.org/rec/journals/ton/ChengZ06"}, "url":"URL#5690744" }, { "@score":"1", "@id":"5690745", "info":{"authors":{"author":[{"@pid":"78/390","text":"Zi-Tsan Chou"},{"@pid":"06/1633","text":"Ching-Chi Hsu"},{"@pid":"14/5458","text":"Shin-Neng Hsu"}]},"title":"UPCF: a new point coordination function with QoS and power management for multimedia over wireless LANs.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"4","pages":"807-820","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/ChouHH06","doi":"10.1145/1217657","ee":"http://doi.acm.org/10.1145/1217657","url":"https://dblp.org/rec/journals/ton/ChouHH06"}, "url":"URL#5690745" }, { "@score":"1", "@id":"5690746", "info":{"authors":{"author":[{"@pid":"34/2130","text":"Chun-Ting Chou"},{"@pid":"s/KangGShin","text":"Kang G. Shin"},{"@pid":"44/7909","text":"Sai Shankar N."}]},"title":"Contention-based airtime usage control in multirate IEEE 802.11 wireless LANs.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"6","pages":"1179-1192","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/ChouSN06","doi":"10.1145/1217690","ee":"http://doi.acm.org/10.1145/1217690","url":"https://dblp.org/rec/journals/ton/ChouSN06"}, "url":"URL#5690746" }, { "@score":"1", "@id":"5690747", "info":{"authors":{"author":[{"@pid":"51/7019","text":"Luís Henrique Maciel Kosmalski Costa"},{"@pid":"35/4858","text":"Serge Fdida"},{"@pid":"18/2077","text":"Otto Carlos Muniz Bandeira Duarte"}]},"title":"Incremental service deployment using the hop-by-hop multicast routing protocol.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"3","pages":"543-556","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/CostaFD06","doi":"10.1145/1143396.1143404","ee":"http://doi.acm.org/10.1145/1143396.1143404","url":"https://dblp.org/rec/journals/ton/CostaFD06"}, "url":"URL#5690747" }, { "@score":"1", "@id":"5690748", "info":{"authors":{"author":[{"@pid":"27/2699","text":"Razvan Cristescu"},{"@pid":"b/BBeferullLozano","text":"Baltasar Beferull-Lozano"},{"@pid":"v/MVetterli","text":"Martin Vetterli"},{"@pid":"w/RogerWattenhofer","text":"Roger Wattenhofer"}]},"title":"Network correlated data gathering with explicit communication: NP-completeness and algorithms.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"1","pages":"41-54","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/CristescuBVW06","doi":"10.1145/1133553.1133557","ee":"http://doi.acm.org/10.1145/1133553.1133557","url":"https://dblp.org/rec/journals/ton/CristescuBVW06"}, "url":"URL#5690748" }, { "@score":"1", "@id":"5690749", "info":{"authors":{"author":[{"@pid":"06/802","text":"Sarang Dharmapurikar"},{"@pid":"90/2711","text":"Praveen Krishnamurthy"},{"@pid":"59/6398","text":"David E. Taylor"}]},"title":"Longest prefix matching using bloom filters.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"2","pages":"397-409","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/DharmapurikarKT06","doi":"10.1145/1217619.1217632","ee":"http://doi.acm.org/10.1145/1217619.1217632","url":"https://dblp.org/rec/journals/ton/DharmapurikarKT06"}, "url":"URL#5690749" }, { "@score":"1", "@id":"5690750", "info":{"authors":{"author":[{"@pid":"d/DannyDolev","text":"Danny Dolev"},{"@pid":"91/1749","text":"Osnat Mokryn"},{"@pid":"83/1922","text":"Yuval Shavitt"}]},"title":"On multicast trees: structure and size estimation.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"3","pages":"557-567","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/DolevMS06","doi":"10.1145/1143396.1143405","ee":"http://doi.acm.org/10.1145/1143396.1143405","url":"https://dblp.org/rec/journals/ton/DolevMS06"}, "url":"URL#5690750" }, { "@score":"1", "@id":"5690751", "info":{"authors":{"author":[{"@pid":"d/NickGDuffield","text":"Nick G. Duffield"},{"@pid":"93/5131","text":"Francesco Lo Presti"},{"@pid":"p/VernPaxson","text":"Vern Paxson"},{"@pid":"t/DonaldFTowsley","text":"Donald F. Towsley"}]},"title":"Network loss tomography using striped unicast probes.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"4","pages":"697-710","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/DuffieldPPT06","doi":"10.1145/1217649","ee":"http://doi.acm.org/10.1145/1217649","url":"https://dblp.org/rec/journals/ton/DuffieldPPT06"}, "url":"URL#5690751" }, { "@score":"1", "@id":"5690752", "info":{"authors":{"author":[{"@pid":"e/CristianEstan","text":"Cristian Estan"},{"@pid":"v/GeorgeVarghese","text":"George Varghese"},{"@pid":"f/MikeFisk","text":"Michael E. Fisk"}]},"title":"Bitmap algorithms for counting active flows on high-speed links.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"5","pages":"925-937","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/EstanVF06","doi":"10.1145/1217709","ee":"http://doi.acm.org/10.1145/1217709","url":"https://dblp.org/rec/journals/ton/EstanVF06"}, "url":"URL#5690752" }, { "@score":"1", "@id":"5690753", "info":{"authors":{"author":[{"@pid":"17/969","text":"Xingzhe Fan"},{"@pid":"45/1012","text":"Kartikeya Chandrayana"},{"@pid":"94/6666","text":"Murat Arcak"},{"@pid":"k/ShivkumarKalyanaraman","text":"Shivkumar Kalyanaraman"},{"@pid":"w/JohnTWen","text":"John Ting-Yung Wen"}]},"title":"A two-time-scale design for edge-based detection and rectification of uncooperative flows.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"6","pages":"1313-1322","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/FanCAKW06","doi":"10.1145/1217701","ee":"http://doi.acm.org/10.1145/1217701","url":"https://dblp.org/rec/journals/ton/FanCAKW06"}, "url":"URL#5690753" }, { "@score":"1", "@id":"5690754", "info":{"authors":{"author":[{"@pid":"23/3346","text":"Ian Ferrel"},{"@pid":"99/3547","text":"Adrian Mettler"},{"@pid":"87/6622","text":"Edward Miller"},{"@pid":"84/2066","text":"Ran Libeskind-Hadas"}]},"title":"Virtual topologies for multicasting with multiple originators in WDM networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"1","pages":"183-190","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/FerrelMML06","doi":"10.1145/1133553.1133568","ee":"http://doi.acm.org/10.1145/1133553.1133568","url":"https://dblp.org/rec/journals/ton/FerrelMML06"}, "url":"URL#5690754" }, { "@score":"1", "@id":"5690755", "info":{"authors":{"author":[{"@pid":"83/4567","text":"Andrea Fumagalli"},{"@pid":"32/5449","text":"Marco Tacca"}]},"title":"Differentiated reliability (DiR) in wavelength division multiplexing rings.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"1","pages":"159-168","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/FumagalliT06","doi":"10.1145/1133553.1133566","ee":"http://doi.acm.org/10.1145/1133553.1133566","url":"https://dblp.org/rec/journals/ton/FumagalliT06"}, "url":"URL#5690755" }, { "@score":"1", "@id":"5690756", "info":{"authors":{"author":[{"@pid":"g/AyalvadiJGanesh","text":"Ayalvadi J. Ganesh"},{"@pid":"22/3458","text":"Peter B. Key"},{"@pid":"42/4957","text":"Damien Polis"},{"@pid":"s/RSrikant","text":"R. Srikant 0001"}]},"title":"Congestion notification and probing mechanisms for endpoint admission control.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"3","pages":"568-578","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/GaneshKPS06","doi":"10.1145/1143396.1143406","ee":"http://doi.acm.org/10.1145/1143396.1143406","url":"https://dblp.org/rec/journals/ton/GaneshKPS06"}, "url":"URL#5690756" }, { "@score":"1", "@id":"5690757", "info":{"authors":{"author":[{"@pid":"50/4752","text":"Sergey Gorinsky"},{"@pid":"95/2724","text":"Sugat Jain"},{"@pid":"v/HarrickMVin","text":"Harrick M. Vin"},{"@pid":"70/3755","text":"Yongguang Zhang"}]},"title":"Design of multicast protocols robust against inflated subscription.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"2","pages":"249-262","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/GorinskyJVZ06","doi":"10.1145/1217619.1217621","ee":"http://doi.acm.org/10.1145/1217619.1217621","url":"https://dblp.org/rec/journals/ton/GorinskyJVZ06"}, "url":"URL#5690757" }, { "@score":"1", "@id":"5690758", "info":{"authors":{"author":[{"@pid":"g/MGrossglauser","text":"Matthias Grossglauser"},{"@pid":"v/MVetterli","text":"Martin Vetterli"}]},"title":"Locating mobile nodes with EASE: learning efficient routes from encounter histories alone.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"3","pages":"457-469","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/GrossglauserV06","doi":"10.1145/1143396.1143397","ee":"http://doi.acm.org/10.1145/1143396.1143397","url":"https://dblp.org/rec/journals/ton/GrossglauserV06"}, "url":"URL#5690758" }, { "@score":"1", "@id":"5690759", "info":{"authors":{"author":[{"@pid":"27/4477","text":"Bamba Gueye"},{"@pid":"47/772","text":"Artur Ziviani"},{"@pid":"c/MarkCrovella","text":"Mark Crovella"},{"@pid":"35/4858","text":"Serge Fdida"}]},"title":"Constraint-based geolocation of internet hosts.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"6","pages":"1219-1232","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/GueyeZCF06","doi":"10.1145/1217693","ee":"http://doi.acm.org/10.1145/1217693","url":"https://dblp.org/rec/journals/ton/GueyeZCF06"}, "url":"URL#5690759" }, { "@score":"1", "@id":"5690760", "info":{"authors":{"author":[{"@pid":"g/HimanshuGupta","text":"Himanshu Gupta 0001"},{"@pid":"21/3016","text":"Zongheng Zhou"},{"@pid":"90/4174","text":"Samir R. Das"},{"@pid":"79/709","text":"Quinyi Gu"}]},"title":"Connected sensor cover: self-organization of sensor networks for efficient query execution.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"1","pages":"55-67","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/GuptaZDG06","doi":"10.1145/1133553.1133558","ee":"http://doi.acm.org/10.1145/1133553.1133558","url":"https://dblp.org/rec/journals/ton/GuptaZDG06"}, "url":"URL#5690760" }, { "@score":"1", "@id":"5690761", "info":{"authors":{"author":[{"@pid":"16/6327","text":"Omer Gurewitz"},{"@pid":"58/2164","text":"Israel Cidon"},{"@pid":"s/MosheSidi","text":"Moshe Sidi"}]},"title":"Network classless time protocol based on clock offset optimization.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"4","pages":"876-888","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/GurewitzCS06","doi":"10.1145/1217662","ee":"http://doi.acm.org/10.1145/1217662","url":"https://dblp.org/rec/journals/ton/GurewitzCS06"}, "url":"URL#5690761" }, { "@score":"1", "@id":"5690762", "info":{"authors":{"author":[{"@pid":"h/ZygmuntJHaas","text":"Zygmunt J. Haas"},{"@pid":"h/JosephYHalpern","text":"Joseph Y. Halpern"},{"@pid":"l/ErranLLi","text":"Li (Erran) Li"}]},"title":"Gossip-based ad hoc routing.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"3","pages":"479-491","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/HaasHL06","doi":"10.1145/1143396.1143399","ee":"http://doi.acm.org/10.1145/1143396.1143399","url":"https://dblp.org/rec/journals/ton/HaasHL06"}, "url":"URL#5690762" }, { "@score":"1", "@id":"5690763", "info":{"authors":{"author":[{"@pid":"h/ZygmuntJHaas","text":"Zygmunt J. Haas"},{"@pid":"24/2229","text":"Tara Small"}]},"title":"A new networking model for biological applications of ad hoc sensor networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"1","pages":"27-40","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/HaasS06","doi":"10.1145/1133553.1133556","ee":"http://doi.acm.org/10.1145/1133553.1133556","url":"https://dblp.org/rec/journals/ton/HaasS06"}, "url":"URL#5690763" }, { "@score":"1", "@id":"5690764", "info":{"authors":{"author":[{"@pid":"13/560","text":"Huaizhong Han"},{"@pid":"03/353","text":"Srinivas Shakkottai"},{"@pid":"53/11367","text":"C. V. Hollot"},{"@pid":"s/RSrikant","text":"R. Srikant 0001"},{"@pid":"t/DonaldFTowsley","text":"Donald F. Towsley"}]},"title":"Multi-path TCP: a joint congestion control and routing scheme to exploit path diversity in the internet.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"6","pages":"1260-1271","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/HanSHST06","doi":"10.1145/1217696","ee":"http://doi.acm.org/10.1145/1217696","url":"https://dblp.org/rec/journals/ton/HanSHST06"}, "url":"URL#5690764" }, { "@score":"1", "@id":"5690765", "info":{"authors":{"author":[{"@pid":"68/570","text":"Hiroaki Harai"},{"@pid":"99/4092-1","text":"Masayuki Murata 0001"}]},"title":"High-speed buffer management for 40 Gb/s-based photonic packet switches.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"1","pages":"191-204","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/HaraiM06","doi":"10.1145/1133553.1133569","ee":"http://doi.acm.org/10.1145/1133553.1133569","url":"https://dblp.org/rec/journals/ton/HaraiM06"}, "url":"URL#5690765" }, { "@score":"1", "@id":"5690766", "info":{"authors":{"author":[{"@pid":"50/845","text":"Xinming He"},{"@pid":"91/1770","text":"Christos Papadopoulos"},{"@pid":"24/6452","text":"Pavlin Radoslavov"}]},"title":"Incremental deployment strategies for router-assisted reliable multicast.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"4","pages":"779-792","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/HePR06","doi":"10.1145/1217655","ee":"http://doi.acm.org/10.1145/1217655","url":"https://dblp.org/rec/journals/ton/HePR06"}, "url":"URL#5690766" }, { "@score":"1", "@id":"5690767", "info":{"authors":{"author":[{"@pid":"80/2105","text":"Nicolas Hohn"},{"@pid":"05/226","text":"Darryl Veitch"}]},"title":"Inverting sampled traffic.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"1","pages":"68-80","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/HohnV06","doi":"10.1145/1133553.1133559","ee":"http://doi.acm.org/10.1145/1133553.1133559","url":"https://dblp.org/rec/journals/ton/HohnV06"}, "url":"URL#5690767" }, { "@score":"1", "@id":"5690768", "info":{"authors":{"author":[{"@pid":"70/5054","text":"Yaqing Huang"},{"@pid":"15/745","text":"Roch Guérin"},{"@pid":"82/5943","text":"Pranav Gupta"}]},"title":"Supporting excess real-time traffic with active drop queue.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"5","pages":"965-977","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/HuangGG06","doi":"10.1145/1217712","ee":"http://doi.acm.org/10.1145/1217712","url":"https://dblp.org/rec/journals/ton/HuangGG06"}, "url":"URL#5690768" }, { "@score":"1", "@id":"5690769", "info":{"authors":{"author":[{"@pid":"h/FrankKHwang","text":"Frank K. Hwang"},{"@pid":"49/3819","text":"Wen-Dar Lin"},{"@pid":"70/6048","text":"Vadim Lioubimov"}]},"title":"On noninterruptive rearrangeable networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"5","pages":"1141-1149","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/HwangLL06","doi":"10.1145/1217726","ee":"http://doi.acm.org/10.1145/1217726","url":"https://dblp.org/rec/journals/ton/HwangLL06"}, "url":"URL#5690769" }, { "@score":"1", "@id":"5690770", "info":{"authors":{"author":[{"@pid":"72/2812","text":"Janardhan R. Iyengar"},{"@pid":"a/PDAmer","text":"Paul D. Amer"},{"@pid":"38/1108","text":"Randall R. Stewart"}]},"title":"Concurrent multipath transfer using SCTP multihoming over independent end-to-end paths.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"5","pages":"951-964","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/IyengarAS06","doi":"10.1145/1217711","ee":"http://doi.acm.org/10.1145/1217711","url":"https://dblp.org/rec/journals/ton/IyengarAS06"}, "url":"URL#5690770" }, { "@score":"1", "@id":"5690771", "info":{"authors":{"author":[{"@pid":"45/1350","text":"Hani Jamjoom"},{"@pid":"s/KangGShin","text":"Kang G. Shin"}]},"title":"On the role and controllability of persistent clients in traffic aggregates.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"2","pages":"410-423","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/JamjoomS06","doi":"10.1145/1217619.1217633","ee":"http://doi.acm.org/10.1145/1217619.1217633","url":"https://dblp.org/rec/journals/ton/JamjoomS06"}, "url":"URL#5690771" }, { "@score":"1", "@id":"5690772", "info":{"authors":{"author":{"@pid":"52/146","text":"Yuming Jiang 0001"}},"title":"Per-domain packet scale rate guarantee for expedited forwarding.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"3","pages":"630-643","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/Jiang06","doi":"10.1145/1143396.1143411","ee":"http://doi.acm.org/10.1145/1143396.1143411","url":"https://dblp.org/rec/journals/ton/Jiang06"}, "url":"URL#5690772" }, { "@score":"1", "@id":"5690773", "info":{"authors":{"author":[{"@pid":"72/990","text":"Koushik Kar"},{"@pid":"93/5661","text":"Ananth Krishnamurthy"},{"@pid":"85/2285","text":"Neeraj Jaggi"}]},"title":"Dynamic node activation in networks of rechargeable sensors.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"1","pages":"15-26","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/KarKJ06","doi":"10.1145/1133553.1133555","ee":"http://doi.acm.org/10.1145/1133553.1133555","url":"https://dblp.org/rec/journals/ton/KarKJ06"}, "url":"URL#5690773" }, { "@score":"1", "@id":"5690774", "info":{"authors":{"author":{"@pid":"77/3734","text":"Martin Karsten"}},"title":"Collected experience from implementing RSVP.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"4","pages":"767-778","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/Karsten06","doi":"10.1145/1217654","ee":"http://doi.acm.org/10.1145/1217654","url":"https://dblp.org/rec/journals/ton/Karsten06"}, "url":"URL#5690774" }, { "@score":"1", "@id":"5690775", "info":{"authors":{"author":[{"@pid":"78/5231","text":"Eddie Kohler"},{"@pid":"79/572-1","text":"Jinyang Li 0001"},{"@pid":"p/VernPaxson","text":"Vern Paxson"},{"@pid":"34/5593","text":"Scott Shenker"}]},"title":"Observed structure of addresses in IP traffic.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"6","pages":"1207-1218","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/KohlerLPS06","doi":"10.1145/1217692","ee":"http://doi.acm.org/10.1145/1217692","url":"https://dblp.org/rec/journals/ton/KohlerLPS06"}, "url":"URL#5690775" }, { "@score":"1", "@id":"5690776", "info":{"authors":{"author":{"@pid":"44/3953","text":"Jerzy Konorski"}},"title":"A game-theoretic study of CSMA/CA under a backoff attack.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"6","pages":"1167-1178","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/Konorski06","doi":"10.1145/1217689","ee":"http://doi.acm.org/10.1145/1217689","url":"https://dblp.org/rec/journals/ton/Konorski06"}, "url":"URL#5690776" }, { "@score":"1", "@id":"5690777", "info":{"authors":{"author":[{"@pid":"03/1746","text":"Iordanis Koutsopoulos"},{"@pid":"03/3843","text":"Leandros Tassiulas"}]},"title":"Cross-layer adaptive techniques for throughput enhancement in wireless OFDM-based networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"5","pages":"1056-1066","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/KoutsopoulosT06","doi":"10.1145/1217719","ee":"http://doi.acm.org/10.1145/1217719","url":"https://dblp.org/rec/journals/ton/KoutsopoulosT06"}, "url":"URL#5690777" }, { "@score":"1", "@id":"5690778", "info":{"authors":{"author":[{"@pid":"97/7025","text":"Sunil Suresh Kulkarni"},{"@pid":"46/2106","text":"Aravind Iyer"},{"@pid":"83/2673","text":"Catherine Rosenberg"}]},"title":"An address-light, integrated MAC and routing protocol for wireless sensor networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"4","pages":"793-806","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/KulkarniIR06","doi":"10.1145/1217656","ee":"http://doi.acm.org/10.1145/1217656","url":"https://dblp.org/rec/journals/ton/KulkarniIR06"}, "url":"URL#5690778" }, { "@score":"1", "@id":"5690779", "info":{"authors":{"author":[{"@pid":"k/AleksandarKuzmanovic","text":"Aleksandar Kuzmanovic"},{"@pid":"k/EWKnightly","text":"Edward W. Knightly"}]},"title":"Low-rate TCP-targeted denial of service attacks and counter strategies.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"4","pages":"683-696","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/KuzmanovicK06","doi":"10.1145/1217648","ee":"http://doi.acm.org/10.1145/1217648","url":"https://dblp.org/rec/journals/ton/KuzmanovicK06"}, "url":"URL#5690779" }, { "@score":"1", "@id":"5690780", "info":{"authors":{"author":[{"@pid":"k/AleksandarKuzmanovic","text":"Aleksandar Kuzmanovic"},{"@pid":"k/EWKnightly","text":"Edward W. Knightly"}]},"title":"TCP-LP: low-priority service via end-point congestion control.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"4","pages":"739-752","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/KuzmanovicK06a","doi":"10.1145/1217652","ee":"http://doi.acm.org/10.1145/1217652","url":"https://dblp.org/rec/journals/ton/KuzmanovicK06a"}, "url":"URL#5690780" }, { "@score":"1", "@id":"5690781", "info":{"authors":{"author":[{"@pid":"76/1630","text":"David Lee"},{"@pid":"48/5222","text":"Dongluo Chen"},{"@pid":"51/3072","text":"Ruibing Hao"},{"@pid":"m/RaymondEMiller","text":"Raymond E. Miller"},{"@pid":"82/4905","text":"Jianping Wu"},{"@pid":"77/5776","text":"Xia Yin"}]},"title":"Network protocol system monitoring: a formal approach with passive testing.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"2","pages":"424-437","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/LeeCHMWY06","doi":"10.1145/1217619.1217634","ee":"http://doi.acm.org/10.1145/1217619.1217634","url":"https://dblp.org/rec/journals/ton/LeeCHMWY06"}, "url":"URL#5690781" }, { "@score":"1", "@id":"5690782", "info":{"authors":{"author":[{"@pid":"25/4018","text":"Patrick P. C. Lee"},{"@pid":"l/JohnCSLui","text":"John C. S. Lui"},{"@pid":"47/5905","text":"David K. Y. Yau"}]},"title":"Distributed collaborative key agreement and authentication protocols for dynamic peer groups.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"2","pages":"263-276","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/LeeLY06","doi":"10.1145/1217619.1217622","ee":"http://doi.acm.org/10.1145/1217619.1217622","url":"https://dblp.org/rec/journals/ton/LeeLY06"}, "url":"URL#5690782" }, { "@score":"1", "@id":"5690783", "info":{"authors":{"author":[{"@pid":"52/4915","text":"Jang-Won Lee"},{"@pid":"m/RaviMazumdar","text":"Ravi R. Mazumdar"},{"@pid":"67/1991","text":"Ness B. Shroff"}]},"title":"Jiont resource allocation and base-station assignment for the downlink in CDMA networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"1","pages":"1-14","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/LeeMS06","doi":"10.1145/1133553.1133554","ee":"http://doi.acm.org/10.1145/1133553.1133554","url":"https://dblp.org/rec/journals/ton/LeeMS06"}, "url":"URL#5690783" }, { "@score":"1", "@id":"5690784", "info":{"authors":{"author":[{"@pid":"89/6662","text":"Hyoung-Il Lee"},{"@pid":"33/3717","text":"Seung-Woo Seo"}]},"title":"Matching output queueing with a multiple input/output-queued switch.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"1","pages":"121-132","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/LeeS06","doi":"10.1145/1133553.1133563","ee":"http://doi.acm.org/10.1145/1133553.1133563","url":"https://dblp.org/rec/journals/ton/LeeS06"}, "url":"URL#5690784" }, { "@score":"1", "@id":"5690785", "info":{"authors":{"author":[{"@pid":"17/4882","text":"Kin Kwong Leung"},{"@pid":"10/1006","text":"Chi Wan Sung"}]},"title":"An opportunistic power control algorithm for cellular network.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"3","pages":"470-478","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/LeungS06","doi":"10.1145/1143396.1143398","ee":"http://doi.acm.org/10.1145/1143396.1143398","url":"https://dblp.org/rec/journals/ton/LeungS06"}, "url":"URL#5690785" }, { "@score":"1", "@id":"5690786", "info":{"authors":{"author":[{"@pid":"26/4332","text":"Hanoch Levy"},{"@pid":"12/284","text":"Haim Zlatokrilov"}]},"title":"The effect of packet dispersion on voice applications in IP networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"2","pages":"277-288","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/LevyZ06","doi":"10.1145/1217619.1217623","ee":"http://doi.acm.org/10.1145/1217619.1217623","url":"https://dblp.org/rec/journals/ton/LevyZ06"}, "url":"URL#5690786" }, { "@score":"1", "@id":"5690787", "info":{"authors":{"author":[{"@pid":"31/1277","text":"Weifa Liang"},{"@pid":"58/2732-2","text":"Xiaojun Shen 0002"}]},"title":"A general approach for all-to-all routing in multihop WDM optical networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"4","pages":"914-923","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/LiangS06","doi":"10.1145/1217665","ee":"http://doi.acm.org/10.1145/1217665","url":"https://dblp.org/rec/journals/ton/LiangS06"}, "url":"URL#5690787" }, { "@score":"1", "@id":"5690788", "info":{"authors":{"author":[{"@pid":"38/5957-1","text":"Xiaojun Lin 0001"},{"@pid":"67/1991","text":"Ness B. Shroff"}]},"title":"An optimization-based approach for QoS routing in high-bandwidth networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"6","pages":"1348-1361","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/LinS06","doi":"10.1145/1217704","ee":"http://doi.acm.org/10.1145/1217704","url":"https://dblp.org/rec/journals/ton/LinS06"}, "url":"URL#5690788" }, { "@score":"1", "@id":"5690789", "info":{"authors":{"author":[{"@pid":"38/5957-1","text":"Xiaojun Lin 0001"},{"@pid":"67/1991","text":"Ness B. Shroff"}]},"title":"The impact of imperfect scheduling on cross-layer congestion control in wireless networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"2","pages":"302-315","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/LinS06a","doi":"10.1145/1217619.1217625","ee":"http://doi.acm.org/10.1145/1217619.1217625","url":"https://dblp.org/rec/journals/ton/LinS06a"}, "url":"URL#5690789" }, { "@score":"1", "@id":"5690790", "info":{"authors":{"author":[{"@pid":"49/2478","text":"Dean H. Lorenz"},{"@pid":"65/1175","text":"Ariel Orda"},{"@pid":"r/DannyRaz","text":"Danny Raz"},{"@pid":"83/1922","text":"Yuval Shavitt"}]},"title":"Efficient QoS partition and routing of unicast and multicast.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"6","pages":"1336-1347","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/LorenzORS06","doi":"10.1145/1217703","ee":"http://doi.acm.org/10.1145/1217703","url":"https://dblp.org/rec/journals/ton/LorenzORS06"}, "url":"URL#5690790" }, { "@score":"1", "@id":"5690791", "info":{"authors":{"author":[{"@pid":"36/2375","text":"Liangping Ma"},{"@pid":"b/KennethEBarner","text":"Kenneth E. Barner"},{"@pid":"78/1427","text":"Gonzalo R. Arce"}]},"title":"Statistical analysis of TCP's retransmission timeout algorithm.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"2","pages":"383-396","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/MaBA06","doi":"10.1145/1217619.1217631","ee":"http://doi.acm.org/10.1145/1217619.1217631","url":"https://dblp.org/rec/journals/ton/MaBA06"}, "url":"URL#5690791" }, { "@score":"1", "@id":"5690792", "info":{"authors":{"author":[{"@pid":"70/3312","text":"Richard T. B. Ma"},{"@pid":"65/403","text":"Sam C. M. Lee"},{"@pid":"l/JohnCSLui","text":"John C. S. Lui"},{"@pid":"47/5905","text":"David K. Y. Yau"}]},"title":"Incentive and service differentiation in P2P networks: a game theoretic approach.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"5","pages":"978-991","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/MaLLY06","doi":"10.1145/1217713","ee":"http://doi.acm.org/10.1145/1217713","url":"https://dblp.org/rec/journals/ton/MaLLY06"}, "url":"URL#5690792" }, { "@score":"1", "@id":"5690793", "info":{"authors":{"author":[{"@pid":"44/4683","text":"Patrick Maillé"},{"@pid":"t/BrunoTuffin","text":"Bruno Tuffin"}]},"title":"Pricing the internet with multibid auctions.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"5","pages":"992-1004","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/MailleT06","doi":"10.1145/1217714","ee":"http://doi.acm.org/10.1145/1217714","url":"https://dblp.org/rec/journals/ton/MailleT06"}, "url":"URL#5690793" }, { "@score":"1", "@id":"5690794", "info":{"authors":{"author":[{"@pid":"22/2592","text":"Yinian Mao"},{"@pid":"s/YanLindsaySun","text":"Yan Sun 0001"},{"@pid":"16/0-1","text":"Min Wu 0001"},{"@pid":"68/3163","text":"K. J. Ray Liu"}]},"title":"JET: dynamic join-exit-tree amortization and scheduling for contributory key management.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"5","pages":"1128-1140","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/MaoSWL06","doi":"10.1145/1217725","ee":"http://doi.acm.org/10.1145/1217725","url":"https://dblp.org/rec/journals/ton/MaoSWL06"}, "url":"URL#5690794" }, { "@score":"1", "@id":"5690795", "info":{"authors":{"author":[{"@pid":"70/6527","text":"Ji-Cheol Moon"},{"@pid":"28/6023","text":"Byeong Gi Lee"}]},"title":"Rate-adaptive snoop: a TCP enhancement scheme over rate-controlled lossy links.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"3","pages":"603-615","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/MoonL06","doi":"10.1145/1143396.1143409","ee":"http://doi.acm.org/10.1145/1143396.1143409","url":"https://dblp.org/rec/journals/ton/MoonL06"}, "url":"URL#5690795" }, { "@score":"1", "@id":"5690796", "info":{"authors":{"author":[{"@pid":"54/4692","text":"John Musacchio"},{"@pid":"w/JeanCWalrand","text":"Jean C. Walrand"}]},"title":"WiFi access point pricing as a dynamic game.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"2","pages":"289-301","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/MusacchioW06","doi":"10.1145/1217619.1217624","ee":"http://doi.acm.org/10.1145/1217619.1217624","url":"https://dblp.org/rec/journals/ton/MusacchioW06"}, "url":"URL#5690796" }, { "@score":"1", "@id":"5690797", "info":{"authors":{"author":[{"@pid":"35/2411","text":"Dritan Nace"},{"@pid":"89/6827","text":"Nhat Linh Doan"},{"@pid":"200/8706","text":"Éric Gourdin"},{"@pid":"92/3360","text":"Bernard Liau"}]},"title":"Computing optimal max-min fair resource allocation for elastic flows.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"6","pages":"1272-1281","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/NaceDGL06","doi":"10.1145/1217697","ee":"http://doi.acm.org/10.1145/1217697","url":"https://dblp.org/rec/journals/ton/NaceDGL06"}, "url":"URL#5690797" }, { "@score":"1", "@id":"5690798", "info":{"authors":{"author":[{"@pid":"37/4143","text":"Hassan Naser"},{"@pid":"217/2530","text":"Hussein T. Mouftah"}]},"title":"A joint-ONU interval-based dynamic scheduling algorithm for ethernet passive optical networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"4","pages":"889-899","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/NaserM06","doi":"10.1145/1217663","ee":"http://doi.acm.org/10.1145/1217663","url":"https://dblp.org/rec/journals/ton/NaserM06"}, "url":"URL#5690798" }, { "@score":"1", "@id":"5690799", "info":{"authors":{"author":[{"@pid":"n/HungQNgo","text":"Hung Q. Ngo 0001"},{"@pid":"51/1567","text":"Dazhen Pan"},{"@pid":"60/6865","text":"Chunming Qiao"}]},"title":"Constructions and analyses of nonblocking WDM switches based on arrayed waveguide grating and limited wavelength conversion.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"1","pages":"205-217","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/NgoPQ06","doi":"10.1145/1133553.1133570","ee":"http://doi.acm.org/10.1145/1133553.1133570","url":"https://dblp.org/rec/journals/ton/NgoPQ06"}, "url":"URL#5690799" }, { "@score":"1", "@id":"5690800", "info":{"authors":{"author":[{"@pid":"17/288","text":"Pavan Nuggehalli"},{"@pid":"42/1769","text":"Vikram Srinivasan"},{"@pid":"c/CFChiasserini","text":"Carla-Fabiana Chiasserini"},{"@pid":"r/RameshRRao","text":"Ramesh R. Rao"}]},"title":"Efficient cache placement in multi-hop wireless networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"5","pages":"1045-1055","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/NuggehalliSCR06","doi":"10.1145/1217718","ee":"http://doi.acm.org/10.1145/1217718","url":"https://dblp.org/rec/journals/ton/NuggehalliSCR06"}, "url":"URL#5690800" }, { "@score":"1", "@id":"5690801", "info":{"authors":{"author":[{"@pid":"06/5567","text":"Canhui Ou"},{"@pid":"05/4779","text":"Laxman H. Sahasrabuddhe"},{"@pid":"33/6014","text":"Keyao Zhu"},{"@pid":"77/5716","text":"Charles U. Martel"},{"@pid":"86/3964","text":"Biswanath Mukherjee"}]},"title":"Survivable virtual concatenation for data over SONET/SDH in optical transport networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"1","pages":"218-231","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/OuSZMM06","doi":"10.1145/1133553.1133571","ee":"http://doi.acm.org/10.1145/1133553.1133571","url":"https://dblp.org/rec/journals/ton/OuSZMM06"}, "url":"URL#5690801" }, { "@score":"1", "@id":"5690802", "info":{"authors":{"author":[{"@pid":"54/4031","text":"Lili Qiu"},{"@pid":"y/YangRichardYang","text":"Yang Richard Yang"},{"@pid":"91/3045-1","text":"Yin Zhang 0001"},{"@pid":"34/5593","text":"Scott Shenker"}]},"title":"On selfish routing in internet-like environments.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"4","pages":"725-738","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/QiuYZS06","doi":"10.1145/1217651","ee":"http://doi.acm.org/10.1145/1217651","url":"https://dblp.org/rec/journals/ton/QiuYZS06"}, "url":"URL#5690802" }, { "@score":"1", "@id":"5690803", "info":{"authors":{"author":[{"@pid":"30/4247","text":"Sriram Ramabhadran"},{"@pid":"p/JPasquale","text":"Joseph Pasquale"}]},"title":"The Stratified Round Robin scheduler: design, analysis and implementation.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"6","pages":"1362-1373","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/RamabhadranP06","doi":"10.1145/1217705","ee":"http://doi.acm.org/10.1145/1217705","url":"https://dblp.org/rec/journals/ton/RamabhadranP06"}, "url":"URL#5690803" }, { "@score":"1", "@id":"5690804", "info":{"authors":{"author":[{"@pid":"31/221","text":"Priya Ranjan"},{"@pid":"l/RichardJLa","text":"Richard J. La"},{"@pid":"76/1854","text":"Eyad H. Abed"}]},"title":"Global stability conditions for rate control with arbitrary communication delays.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"1","pages":"94-107","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/RanjanLA06","doi":"10.1145/1133553.1133561","ee":"http://doi.acm.org/10.1145/1133553.1133561","url":"https://dblp.org/rec/journals/ton/RanjanLA06"}, "url":"URL#5690804" }, { "@score":"1", "@id":"5690805", "info":{"authors":{"author":[{"@pid":"91/44","text":"Vinay J. Ribeiro"},{"@pid":"46/6552","text":"Rudolf H. Riedi"},{"@pid":"32/2804","text":"Richard G. Baraniuk"}]},"title":"Multiscale queueing analysis.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"5","pages":"1005-1018","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/RibeiroRB06","doi":"10.1145/1217715","ee":"http://doi.acm.org/10.1145/1217715","url":"https://dblp.org/rec/journals/ton/RibeiroRB06"}, "url":"URL#5690805" }, { "@score":"1", "@id":"5690806", "info":{"authors":{"author":[{"@pid":"53/6203","text":"Zvi Rosberg"},{"@pid":"83/3948","text":"Andrew Zalesky"},{"@pid":"20/5601","text":"Hai Le Vu"},{"@pid":"01/4750","text":"Moshe Zukerman"}]},"title":"Analysis of OBS networks with limited wavelength conversion.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"5","pages":"1118-1127","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/RosbergZVZ06","doi":"10.1145/1217724","ee":"http://doi.acm.org/10.1145/1217724","url":"https://dblp.org/rec/journals/ton/RosbergZVZ06"}, "url":"URL#5690806" }, { "@score":"1", "@id":"5690807", "info":{"authors":{"author":[{"@pid":"53/6203","text":"Zvi Rosberg"},{"@pid":"83/3948","text":"Andrew Zalesky"},{"@pid":"01/4750","text":"Moshe Zukerman"}]},"title":"Packet delay in optical circuit-switched networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"2","pages":"341-354","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/RosbergZZ06","doi":"10.1145/1217619.1217628","ee":"http://doi.acm.org/10.1145/1217619.1217628","url":"https://dblp.org/rec/journals/ton/RosbergZZ06"}, "url":"URL#5690807" }, { "@score":"1", "@id":"5690808", "info":{"authors":{"author":[{"@pid":"51/2289","text":"Michael Rosenblum"},{"@pid":"96/5760","text":"Constantine Caramanis"},{"@pid":"g/MichelXGoemans","text":"Michel X. Goemans"},{"@pid":"15/2026","text":"Vahid Tarokh"}]},"title":"Approximating fluid schedules in crossbar packet-switches and Banyan networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"6","pages":"1374-1387","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/RosenblumCGT06","doi":"10.1145/1217706","ee":"http://doi.acm.org/10.1145/1217706","url":"https://dblp.org/rec/journals/ton/RosenblumCGT06"}, "url":"URL#5690808" }, { "@score":"1", "@id":"5690809", "info":{"authors":{"author":[{"@pid":"35/2239","text":"Poompat Saengudomlert"},{"@pid":"m/EytanModiano","text":"Eytan H. Modiano"},{"@pid":"26/5879","text":"Robert G. Gallager"}]},"title":"On-line routing and wavelength assignment for dynamic traffic in WDM ring and torus networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"2","pages":"330-340","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/SaengudomlertMG06","doi":"10.1145/1217619.1217627","ee":"http://doi.acm.org/10.1145/1217619.1217627","url":"https://dblp.org/rec/journals/ton/SaengudomlertMG06"}, "url":"URL#5690809" }, { "@score":"1", "@id":"5690810", "info":{"authors":{"author":[{"@pid":"s/AmanShaikh","text":"Aman Shaikh"},{"@pid":"15/6310","text":"Rohit Dube"},{"@pid":"37/602","text":"Anujan Varma"}]},"title":"Avoiding instability during graceful shutdown of multiple OSPF routers.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"3","pages":"532-542","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/ShaikhDV06","doi":"10.1145/1143396.1143403","ee":"http://doi.acm.org/10.1145/1143396.1143403","url":"https://dblp.org/rec/journals/ton/ShaikhDV06"}, "url":"URL#5690810" }, { "@score":"1", "@id":"5690811", "info":{"authors":{"author":[{"@pid":"03/353","text":"Srinivas Shakkottai"},{"@pid":"s/RSrikant","text":"R. Srikant 0001"}]},"title":"Economics of network pricing with multiple ISPs.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"6","pages":"1233-1245","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/ShakkottaiS06","doi":"10.1145/1217694","ee":"http://doi.acm.org/10.1145/1217694","url":"https://dblp.org/rec/journals/ton/ShakkottaiS06"}, "url":"URL#5690811" }, { "@score":"1", "@id":"5690812", "info":{"authors":{"author":[{"@pid":"59/4874","text":"Robert Shorten"},{"@pid":"99/6155","text":"Fabian Wirth"},{"@pid":"l/DouglasJLeith","text":"Douglas J. Leith"}]},"title":"A positive systems model of TCP-like congestion control: asymptotic results.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"3","pages":"616-629","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/ShortenWL06","doi":"10.1145/1143396.1143410","ee":"http://doi.acm.org/10.1145/1143396.1143410","url":"https://dblp.org/rec/journals/ton/ShortenWL06"}, "url":"URL#5690812" }, { "@score":"1", "@id":"5690813", "info":{"authors":{"author":[{"@pid":"87/2991","text":"Narendra K. Singhal"},{"@pid":"05/4779","text":"Laxman H. Sahasrabuddhe"},{"@pid":"86/3964","text":"Biswanath Mukherjee"}]},"title":"Optimal multicasting of multiple light-trees of different bandwidth granularities in a WDM mesh network with sparse splitting capabilities.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"5","pages":"1104-1117","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/SinghalSM06","doi":"10.1145/1217723","ee":"http://doi.acm.org/10.1145/1217723","url":"https://dblp.org/rec/journals/ton/SinghalSM06"}, "url":"URL#5690813" }, { "@score":"1", "@id":"5690814", "info":{"authors":{"author":[{"@pid":"38/5335","text":"Wee-Seng Soh"},{"@pid":"96/2520","text":"Hyong S. Kim"}]},"title":"A predictive bandwidth reservation scheme using mobile positioning and road topology information.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"5","pages":"1078-1091","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/SohK06","doi":"10.1145/1217721","ee":"http://doi.acm.org/10.1145/1217721","url":"https://dblp.org/rec/journals/ton/SohK06"}, "url":"URL#5690814" }, { "@score":"1", "@id":"5690815", "info":{"authors":{"author":[{"@pid":"09/3053","text":"Tarik Taleb"},{"@pid":"19/3059","text":"Nei Kato"},{"@pid":"78/1116","text":"Yoshiaki Nemoto"}]},"title":"REFWA: an efficient and fair congestion control scheme for LEO satellite networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"5","pages":"1031-1044","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/TalebKN06","doi":"10.1145/1217717","ee":"http://doi.acm.org/10.1145/1217717","url":"https://dblp.org/rec/journals/ton/TalebKN06"}, "url":"URL#5690815" }, { "@score":"1", "@id":"5690816", "info":{"authors":{"author":[{"@pid":"85/4619","text":"Ao Tang"},{"@pid":"80/797","text":"Jiantao Wang"},{"@pid":"l/StevenHLow","text":"Steven H. Low"}]},"title":"Counter-intuitive throughput behaviors in networks under end-to-end control.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"2","pages":"355-368","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/TangWL06","doi":"10.1145/1217619.1217629","ee":"http://doi.acm.org/10.1145/1217619.1217629","url":"https://dblp.org/rec/journals/ton/TangWL06"}, "url":"URL#5690816" }, { "@score":"1", "@id":"5690817", "info":{"authors":{"author":[{"@pid":"42/678","text":"Richard W. Thommes"},{"@pid":"c/MarkCoates","text":"Mark Coates"}]},"title":"Deterministic packet marking for time-varying congestion price estimation.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"3","pages":"592-602","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/ThommesC06","doi":"10.1145/1143396.1143408","ee":"http://doi.acm.org/10.1145/1143396.1143408","url":"https://dblp.org/rec/journals/ton/ThommesC06"}, "url":"URL#5690817" }, { "@score":"1", "@id":"5690818", "info":{"authors":{"author":[{"@pid":"17/782","text":"Peerapol Tinnakornsrisuphap"},{"@pid":"l/RichardJLa","text":"Richard J. La"}]},"title":"Asymptotic behavior of heterogeneous TCP flows and RED gateway.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"1","pages":"108-120","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/TinnakornsrisuphapL06","doi":"10.1145/1133553.1133562","ee":"http://doi.acm.org/10.1145/1133553.1133562","url":"https://dblp.org/rec/journals/ton/TinnakornsrisuphapL06"}, "url":"URL#5690818" }, { "@score":"1", "@id":"5690819", "info":{"authors":{"author":{"@pid":"t/DonaldFTowsley","text":"Donald F. Towsley"}},"title":"Editorial.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"4","pages":"673","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/Towsley06","doi":"10.1145/1217645","ee":"http://doi.acm.org/10.1145/1217645","url":"https://dblp.org/rec/journals/ton/Towsley06"}, "url":"URL#5690819" }, { "@score":"1", "@id":"5690820", "info":{"authors":{"author":{"@pid":"t/DonaldFTowsley","text":"Donald F. Towsley"}},"title":"Abstracts from the IEEE transactions on information theory, special issue, June 2006.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"4","pages":"675-682","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/Towsley06a","doi":"10.1145/1217647","ee":"http://doi.acm.org/10.1145/1217647","url":"https://dblp.org/rec/journals/ton/Towsley06a"}, "url":"URL#5690820" }, { "@score":"1", "@id":"5690821", "info":{"authors":{"author":[{"@pid":"50/1903","text":"Lih-feng Tsaur"},{"@pid":"01/4296-1","text":"Daniel Chonghwan Lee"}]},"title":"Closed-loop architecture and protocols for rapid dynamic spreading gain adaptation in CDMA networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"4","pages":"821-834","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/TsaurL06","doi":"10.1145/1217658","ee":"http://doi.acm.org/10.1145/1217658","url":"https://dblp.org/rec/journals/ton/TsaurL06"}, "url":"URL#5690821" }, { "@score":"1", "@id":"5690822", "info":{"authors":{"author":[{"@pid":"03/5691","text":"Eveline Veloso"},{"@pid":"a/VirgilioAlmeida","text":"Virgílio A. F. Almeida"},{"@pid":"m/WagnerMeiraJr","text":"Wagner Meira Jr."},{"@pid":"b/ABestavros","text":"Azer Bestavros"},{"@pid":"77/798","text":"Shudong Jin"}]},"title":"A hierarchical characterization of a live streaming media workload.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"1","pages":"133-146","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/VelosoAMBJ06","doi":"10.1145/1133553.1133564","ee":"http://doi.acm.org/10.1145/1133553.1133564","url":"https://dblp.org/rec/journals/ton/VelosoAMBJ06"}, "url":"URL#5690822" }, { "@score":"1", "@id":"5690823", "info":{"authors":{"author":[{"@pid":"48/5870","text":"Mehmet C. Vuran"},{"@pid":"a/IAAkyildiz","text":"Ian F. Akyildiz"}]},"title":"Spatial correlation-based collaborative medium access control in wireless sensor networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"2","pages":"316-329","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/VuranA06","doi":"10.1145/1217619.1217626","ee":"http://doi.acm.org/10.1145/1217619.1217626","url":"https://dblp.org/rec/journals/ton/VuranA06"}, "url":"URL#5690823" }, { "@score":"1", "@id":"5690824", "info":{"authors":{"author":[{"@pid":"47/2911","text":"Wei-Hua Wang"},{"@pid":"10/5477","text":"Marimuthu Palaniswami"},{"@pid":"l/StevenHLow","text":"Steven H. Low"}]},"title":"Application-oriented flow control: fundamentals, algorithms and fairness.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"6","pages":"1282-1291","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/WangPL06","doi":"10.1145/1217698","ee":"http://doi.acm.org/10.1145/1217698","url":"https://dblp.org/rec/journals/ton/WangPL06"}, "url":"URL#5690824" }, { "@score":"1", "@id":"5690825", "info":{"authors":{"author":[{"@pid":"21/1550-1","text":"Jianping Wang 0001"},{"@pid":"61/944","text":"Xiangtong Qi"},{"@pid":"98/449","text":"Biao Chen"}]},"title":"Wavelength assignment for multicast in all-optical WDM networks with splitting constraints.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"1","pages":"169-182","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/WangQC06","doi":"10.1145/1133553.1133567","ee":"http://doi.acm.org/10.1145/1133553.1133567","url":"https://dblp.org/rec/journals/ton/WangQC06"}, "url":"URL#5690825" }, { "@score":"1", "@id":"5690826", "info":{"authors":{"author":[{"@pid":"10/5630-1","text":"Xin Wang 0001"},{"@pid":"s/HenningSchulzrinne","text":"Henning Schulzrinne"}]},"title":"Pricing network resources for adaptive applications.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"3","pages":"506-519","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/WangS06","doi":"10.1145/1143396.1143401","ee":"http://doi.acm.org/10.1145/1143396.1143401","url":"https://dblp.org/rec/journals/ton/WangS06"}, "url":"URL#5690826" }, { "@score":"1", "@id":"5690827", "info":{"authors":{"author":[{"@pid":"64/2048","text":"David X. Wei"},{"@pid":"84/4201-9","text":"Cheng Jin 0009"},{"@pid":"l/StevenHLow","text":"Steven H. Low"},{"@pid":"16/5923","text":"Sanjay Hegde"}]},"title":"FAST TCP: motivation, architecture, algorithms, performance.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"6","pages":"1246-1259","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/WeiJLH06","doi":"10.1145/1217695","ee":"http://doi.acm.org/10.1145/1217695","url":"https://dblp.org/rec/journals/ton/WeiJLH06"}, "url":"URL#5690827" }, { "@score":"1", "@id":"5690828", "info":{"authors":{"author":[{"@pid":"11/4605","text":"Feng Xie"},{"@pid":"94/3694-4","text":"Gang Feng 0004"},{"@pid":"49/1752","text":"Chee Kheong Siew"}]},"title":"The impact of loss recovery on congestion control for reliable multicast.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"6","pages":"1323-1335","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/XieFS06","doi":"10.1145/1217702","ee":"http://doi.acm.org/10.1145/1217702","url":"https://dblp.org/rec/journals/ton/XieFS06"}, "url":"URL#5690828" }, { "@score":"1", "@id":"5690829", "info":{"authors":{"author":[{"@pid":"63/4596","text":"Dahai Xu"},{"@pid":"48/4792","text":"Yang Chen"},{"@pid":"05/2975","text":"Yizhi Xiong"},{"@pid":"60/6865","text":"Chunming Qiao"},{"@pid":"69/1798","text":"Xin He"}]},"title":"On the complexity of and algorithms for finding the shortest path with a disjoint counterpart.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"1","pages":"147-158","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/XuCXQH06","doi":"10.1145/1133553.1133565","ee":"http://doi.acm.org/10.1145/1133553.1133565","url":"https://dblp.org/rec/journals/ton/XuCXQH06"}, "url":"URL#5690829" }, { "@score":"1", "@id":"5690830", "info":{"authors":{"author":[{"@pid":"01/66","text":"Yung Yi"},{"@pid":"99/4679","text":"Supratim Deb"},{"@pid":"61/4596","text":"Sanjay Shakkottai"}]},"title":"Time-scale decomposition and equivalent rate-based marking.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"5","pages":"938-950","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/YiDS06","doi":"10.1145/1217710","ee":"http://doi.acm.org/10.1145/1217710","url":"https://dblp.org/rec/journals/ton/YiDS06"}, "url":"URL#5690830" }, { "@score":"1", "@id":"5690831", "info":{"authors":{"author":[{"@pid":"27/4818","text":"Lei Ying 0001"},{"@pid":"d/GeirEDullerud","text":"Geir E. Dullerud"},{"@pid":"s/RSrikant","text":"Rayadurgam Srikant"}]},"title":"Global stability of internet congestion controllers with heterogeneous delays.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"3","pages":"579-591","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/YingDS06","doi":"10.1145/1143396.1143407","ee":"http://doi.acm.org/10.1145/1143396.1143407","url":"https://dblp.org/rec/journals/ton/YingDS06"}, "url":"URL#5690831" }, { "@score":"1", "@id":"5690832", "info":{"authors":{"author":[{"@pid":"73/3928-3","text":"Kai Zheng 0003"},{"@pid":"62/921","text":"Chengchen Hu"},{"@pid":"79/4698","text":"Hongbin Lu"},{"@pid":"35/837-1","text":"Bin Liu 0001"}]},"title":"A TCAM-based distributed parallel IP lookup scheme and performance analysis.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"4","pages":"863-875","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/ZhengHLL06","doi":"10.1145/1217661","ee":"http://doi.acm.org/10.1145/1217661","url":"https://dblp.org/rec/journals/ton/ZhengHLL06"}, "url":"URL#5690832" }, { "@score":"1", "@id":"5690833", "info":{"authors":{"author":[{"@pid":"93/4160-1","text":"Jing Zhu 0001"},{"@pid":"57/3191-1","text":"Sumit Roy 0001"},{"@pid":"07/6647","text":"Jae H. Kim"}]},"title":"Performance modelling of TCP enhancements in terrestrial-satellite hybrid networks.","venue":"IEEE/ACM Trans. Netw.","volume":"14","number":"4","pages":"753-766","year":"2006","type":"Journal Articles","access":"closed","key":"journals/ton/ZhuRK06","doi":"10.1145/1217653","ee":"http://doi.acm.org/10.1145/1217653","url":"https://dblp.org/rec/journals/ton/ZhuRK06"}, "url":"URL#5690833" } ] } } } )