default search action
27th INFOCOM 2008: Phoenix, AZ, USA
- INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA. IEEE 2008, ISBN 978-1-4244-2026-1
Theoretical Foundations
- Yi Shi, Yiwei Thomas Hou:
Theoretical Results on Base Station Movement Problem for Sensor Network. 1-5 - Michael J. Neely:
Delay Analysis for Maximal Scheduling in Wireless Networks with Bursty Traffic. 6-10 - Zhenning Kong, Edmund M. Yeh:
Connectivity and Latency in Large-Scale Wireless Networks with Unreliable Links. 11-15 - Yi Xu, Wenye Wang:
The Speed of Information Propagation in Large Wireless Networks. 16-20
Internet Measurement 1
- Jin Cao, Aiyou Chen, Tian Bu:
A Quasi-Likelihood Approach for Accurate Traffic Matrix Estimation in a High Speed Network. 21-25 - Chengchen Hu, Sheng Wang, Jia Tian, Bin Liu, Yu Cheng, Yan Chen:
Accurate and Efficient Traffic Monitoring Using Adaptive Non-Linear Sampling Method. 26-30 - Derek Leonard, Dmitri Loguinov:
Turbo King: Framework for Large-Scale Internet Delay Measurements. 31-35 - Jian Ni, Haiyong Xie, Sekhar Tatikonda, Yang Richard Yang:
Network Routing Topology Inference from End-to-End Measurements. 36-40
Sensor Security 1
- Xin Hu, Taejoon Park, Kang G. Shin:
Attack-Tolerant Time-Synchronization in Wireless Sensor Networks. 41-45 - Bo Sheng, Qun Li:
Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor Networks. 46-50 - Min Shao, Yi Yang, Sencun Zhu, Guohong Cao:
Towards Statistically Strong Source Anonymity for Sensor Networks. 51-55 - Taiming Feng, Chuang Wang, Wensheng Zhang, Lu Ruan:
Confidentiality Protection for Distributed Sensor Data Aggregation. 56-60
Wireless Mesh Networks 1
- Dattatraya Y. Gokhale, Sayandeep Sen, Kameswari Chebrolu, Bhaskaran Raman:
On the Feasibility of the Link Abstraction in (Rural) Mesh Networks. 61-65 - Richard Alimi, Li (Erran) Li, Ramachandran Ramjee, Harish Viswanathan, Yang Richard Yang:
iPack: in-Network Packet Mixing for High Throughput Wireless Mesh Networks. 66-70 - Liang Dai, Yuan Xue, Bin Chang, Yanchuan Cao, Yi Cui:
Integrating Traffic Estimation and Routing Optimization for Multi-Radio Multi-Channel Wireless Mesh Networks. 71-75 - Joseph Camp, Vincenzo Mancuso, Omer Gurewitz, Edward W. Knightly:
A Measurement Study of Multiplicative Overhead Effects in Wireless Networks. 76-80
Congestion Control 1
- Abdallah Khreishah, Chih-Chun Wang, Ness B. Shroff:
Optimization Based Rate Control for Communication Networks with Inter-Session Network Coding. 81-85 - Ashvin Lakshmikantha, R. Srikant, Carolyn L. Beck:
Impact of File Arrivals and Departures on Buffer Sizing in Core Routers. 86-90 - Ao Tang, Lachlan L. H. Andrew, Krister Jacobsson, Karl Henrik Johansson, Steven H. Low, Håkan Hjalmarsson:
Window Flow Control: Macroscopic Properties from Microscopic Factors. 91-95 - Ihsan Ayyub Qazi, Taieb Znati:
On the Design of Load Factor based Congestion Control Protocols for Next-Generation Networks. 96-100
Router/Switch Design 1
- Sailesh Kumar, Jonathan S. Turner, Patrick Crowley:
Peacock Hashing: Deterministic and Updatable Hashing for High Performance Networking. 101-105 - Adam Kirsch, Michael Mitzenmacher:
The Power of One Move: Hashing Schemes for Hardware. 106-110 - Alex X. Liu, Chad R. Meiners, Yun Zhou:
All-Match Based Complete Redundancy Removal for Packet Classifiers in TCAMs. 111-115 - Matthew Andrews, Lisa Zhang:
Satisfying Arbitrary Delay Requirements in Multihop Networks. 116-120
Transport Protocols
- Vicky Sharma, Shivkumar Kalyanaraman, Koushik Kar, K. K. Ramakrishnan, Vijaynarayanan Subramanian:
MPLOT: A Transport Protocol Exploiting Multipath Diversity Using Erasure Codes. 121-125 - Hung Xuan Nguyen, Daniel R. Figueiredo, Matthias Grossglauser, Patrick Thiran:
Balanced Relay Allocation on Heterogeneous Unstructured Overlays. 126-130 - François Baccelli, Giovanna Carofiglio, Serguei Foss:
Proxy Caching in Split TCP: Dynamics, Stability and Tail Asymptotics. 131-135 - Willem de Bruijn, Herbert Bos:
Beltway Buffers: Avoiding the OS Traffic Jam. 136-140
Peer-to-Peer Networks 1
- Georgios Smaragdakis, Azer Bestavros, Nikolaos Laoutaris, John W. Byers, Pietro Michiardi, Mema Roussopoulos:
Swarming on Optimized Graphs for n-Way Broadcast. 141-145 - Zhongmei Yao, Dmitri Loguinov:
Link Lifetimes and Randomized Neighbor Selection in DHTs. 146-150 - Xiaoying Zheng, Chunglae Cho, Ye Xia:
Optimal Peer-to-Peer Technique for Massive Content Distribution. 151-155 - Hao Yan, Utku Irmak, Torsten Suel:
Algorithms for Low-Latency Remote File Synchronization. 156-160
Network Security 1
- Patrick Tague, David Slater, Jason Rogers, Radha Poovendran:
Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis. 161-165 - Tian Song, Wei Zhang, Dongsheng Wang, Yibo Xue:
A Memory Efficient Multiple Pattern Matching Architecture for Network Security. 166-170 - Sherif M. Khattab, Sameh Gobriel, Rami G. Melhem, Daniel Mossé:
Live Baiting for Service-Level DoS Attackers. 171-175 - Alex X. Liu, Eric Torng, Chad R. Meiners:
Firewall Compressor: An Algorithm for Minimizing Firewall Policies. 176-180
Optical Networks 1
- Satyajeet Ahuja, Srinivasan Ramasubramanian, Marwan Krunz:
SRLG Failure Localization in All-Optical Networks Using Monitoring Cycles and Paths. 700-708 - Dahai Xu, Elliot Anshelevich, Mung Chiang:
On Survivable Access Network Design: Complexity and Algorithms. 186-190 - Sheng Huang, Biswanath Mukherjee, Charles U. Martel:
Survivable Multipath Provisioning with Differential Delay Constraint in Telecom Mesh Networks. 191-195 - Massimo Tornatore, Diego Lucerna, Achille Pattavina:
Improving Efficiency of Backup Reprovisioning in WDM Networks. 196-200
Cooperative Ad Hoc Networking
- Leonard H. Grokop, David N. C. Tse:
Spectrum Sharing Between Wireless Networks. 201-205 - Michele Garetto, Paolo Giaccone, Emilio Leonardi:
Capacity Scaling of Sparse Mobile Ad Hoc Networks. 206-210 - Zheng Wang, Hamid R. Sadjadpour, J. J. Garcia-Luna-Aceves:
A Unifying Perspective on the Capacity of Wireless Ad Hoc Networks. 211-215 - See-Kee Ng, Winston Khoon Guan Seah:
Game-Theoretic Model for Collaborative Protocols in Selfish, Tariff-Free, Multihop Wireless Networks. 216-220
Underwater Networks
- Antonio Caruso, Francesco Paparella, Luiz Filipe M. Vieira, Melike Erol, Mario Gerla:
The Meandering Current Mobility Model and its Impact on Underwater Mobile Sensor Networks. 221-225 - Mehmet C. Vuran, Ian F. Akyildiz:
Cross-Layer Packet Size Optimization for Wireless Terrestrial, Underwater, and Underground Sensor Networks. 226-230 - Affan A. Syed, Wei Ye, John S. Heidemann:
T-Lohi: A New Class of MAC Protocols for Underwater Acoustic Sensor Networks. 231-235 - Wei Cheng, Amin Y. Teymorian, Liran Ma, Xiuzhen Cheng, Xicheng Lu, Zexin Lu:
Underwater Localization in Sparse 3D Acoustic Sensor Networks. 236-240
Ad Hoc Networks Security
- Parvathinathan Venkitasubramaniam, Lang Tong:
Throughput Anonymity Trade-off in Wireless Networks under Latency Constraints. 241-245 - Chenxi Zhang, Rongxing Lu, Xiaodong Lin, Pin-Han Ho, Xuemin Shen:
An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks. 246-250 - Chi Zhang, Yang Song, Yuguang Fang:
Modeling Secure Connectivity of Self-Organized Wireless Ad Hoc Networks. 251-255 - Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu:
A Scalable Method for Access Control in Location-Based Broadcast Services. 256-260
Internet Measurement 2
- Dario Bonfiglio, Marco Mellia, Michela Meo, Nicolo Ritacca, Dario Rossi:
Tracking Down Skype Traffic. 261-265 - Xiaoqiao Meng, Guofei Jiang, Hui Zhang, Haifeng Chen, Kenji Yoshihira:
Automatic Profiling of Network Event Sequences: Algorithm and Applications. 266-270 - Yan Li, Jun-Hong Cui, Dario Maggiorini, Michalis Faloutsos:
Characterizing and Modelling Clustering Features in AS-Level Internet Topology. 271-275 - Vijay Arya, Nick G. Duffield, Darryl Veitch:
Temporal Delay Tomography. 276-280
Sensor Networks Connectivity
- Satyajayant Misra, Seung Don Hong, Guoliang Xue, Jian Tang:
Constrained Relay Node Placement in Wireless Sensor Networks to Meet Connectivity and Survivability Requirements. 281-285 - Jie Wu, Shuhui Yang, Mihaela Cardei:
On Maintaining Sensor-Actor Connectivity in Wireless Sensor and Actor Networks. 286-290 - Yigal Bejerano:
Simple and Efficient k-Coverage Verification without Location Information. 291-295 - Xiaole Bai, Ziqiu Yun, Dong Xuan, Ten-Hwang Lai, Weijia Jia:
Deploying Four-Connectivity and Full-Coverage Wireless Sensor Networks. 296-300
Router/Switch Design 2
- Srikanth Jagabathula, Vishal Doshi, Devavrat Shah:
Fair Scheduling through Packet Election. 301-305 - Cheng-Shang Chang, Jay Cheng, Duan-Shin Lee, Chi-Feung Wu:
Quasi-Output-Buffered Switches. 306-310 - Domenico Ficara, Stefano Giordano, Gregorio Procissi, Fabio Vitucci:
MultiLayer Compressed Counting Bloom Filters. 311-315 - Wencheng Lu, Sartaj Sahni:
Low Power TCAMs for Very Large Forwarding Tables. 316-320
Congestion Control 2
- Tian Lan, Xiaojun Lin, Mung Chiang, Ruby B. Lee:
How Bad is Suboptimal Rate Allocation? 321-325 - Kexin Ma, Ravi Mazumdar, Jun Luo:
On the Performance of Primal/Dual Schemes for Congestion Control in Networks with Dynamic Flows. 326-330 - Konstantin Miller, Tobias Harks:
Utility Max-Min Fair Congestion Control with Time-Varying Delays. 331-335 - Mihaela Enachescu, Mei Wang, Ashish Goel:
Reducing Maximum Stretch in Compact Routing. 336-340
Sensor Network Routing
- Mehdi Kalantari, Masoumeh Haghpanahi, Mark A. Shayman:
A p-norm Flow Optimization Problem in Dense Wireless Sensor Networks. 341-345 - Hanna Kalosha, Amiya Nayak, Stefan Rührup, Ivan Stojmenovic:
Select-and-Protest-Based Beaconless Georouting with Guaranteed Delivery in Wireless Sensor Networks. 346-350 - Chia-Hung Lin, Bing-Hong Liu, Hong-Yen Yang, Chi-Yen Kao, Ming-Jer Tsai:
Virtual-Coordinate-Based Delivery-Guaranteed Routing Protocol in Wireless Sensor Networks with Unidirectional Links. 351-355 - Yan Wu, Sonia Fahmy, Ness B. Shroff:
On the Construction of a Maximum-Lifetime Data Gathering Tree in Sensor Networks: NP-Completeness and Approximation Algorithm. 356-360
Network Coding 1
- Tao Cui, Lijun Chen, Tracey Ho:
Energy Efficient Opportunistic Network Coding for Wireless Networks. 361-365 - Raju Kumar, Heesook Choi, Jaesheung Shin, Thomas La Porta:
Channelization for Network Coding in Wireless Networks. 366-370 - Jilin Le, John C. S. Lui, Dah-Ming Chiu:
How Many Packets Can We Encode? - An Analysis of Practical Wireless Network Coding. 371-375 - Alireza Keshavarz-Haddad, Rudolf H. Riedi:
Bounds on the Benefit of Network Coding: Throughput and Energy Saving in Wireless Networks. 376-384
Wireless MAC 1
- Jia Liu, Y. Thomas Hou:
Weighted Proportional Fairness Capacity of Gaussian MIMO Broadcast Channels. 385-393 - Ishai Menache, Nahum Shimkin:
Decentralized Rate Regulation in Random Access Channels. 394-402 - Ishai Menache, Nahum Shimkin:
Efficient Rate-Constrained Nash Equilibrium in Collision Channels with State Information. 403-411 - Ioannis Broustis, Angelos Vlavianos, Prashant Krishnamurthy, Srikanth V. Krishnamurthy:
CTU: Capturing Throughput Dependencies in UWB Networks. 412-420
Ad Hoc Networks: Energy Efficiency
- Xiliang Zhong, Cheng-Zhong Xu:
Online Energy Efficient Packet Scheduling with Delay Constraints in Wireless Networks. 421-429 - Sungoh Kwon, Ness B. Shroff:
Unified Energy-Efficient Routing for Multi-Hop Wireless Networks. 430-438 - Deokwoo Jung, Andreas Savvides:
An Energy Efficiency Evaluation for Sensor Nodes with Multiple Processors, Radios and Sensors. 439-447 - Ron Banner, Ariel Orda:
Multi-Objective Topology Control in Wireless Networks. 448-456
Routing Protocols
- Joseph Chabarek, Joel Sommers, Paul Barford, Cristian Estan, David Tsiang, Stephen J. Wright:
Power Awareness in Network Design and Routing. 457-465 - Dahai Xu, Mung Chiang, Jennifer Rexford:
Link-State Routing with Hop-by-Hop Forwarding Can Achieve Optimal Traffic Engineering. 466-474 - Haim Zlatokrilov, Hanoch Levy:
Area Avoidance Routing in Distance-Vector Networks. 475-483 - Lei Ying, R. Srikant, Donald F. Towsley:
Cluster-Based Back-Pressure Routing Algorithm. 484-492
Crosslayer Design 1
- Qinghai Gao, Junshan Zhang, Stephen V. Hanly:
Cross-Layer Rate Control in Wireless Networks with Lossy Links: Leaky-Pipe Flow, Effective Network Utility Maximization and Hop-by-Hop Algorithms. 493-501 - Balaji Rengarajan, Gustavo de Veciana:
Architecture and Abstractions for Environment and Traffic Aware System-Level Coordination of Wireless Networks: The Downlink Case. 502-510 - Reuven Cohen, Liran Katzir:
Computational Analysis and Efficient Algorithms for Micro and Macro OFDMA Scheduling. 511-519 - Ulas C. Kozat:
On the Throughput Capacity of Opportunistic Multicasting with Erasure Codes. 520-528
Network Security 2
- Sanjeev Khanna, Santosh S. Venkatesh, Omid Fatemieh, Fariba Khan, Carl A. Gunter:
Adaptive SelectiveVerification. 529-537 - Xukai Zou, Yuan-Shun Dai, Elisa Bertino:
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing. 538-546 - Toby Xu, Ying Cai:
Exploring Historical Location Data for Anonymity Preservation in Location-Based Services. 547-555 - Zhenyu Zhong, Lakshmish Ramaswamy, Kang Li:
ALPACAS: A Large-Scale Privacy-Aware Collaborative Anti-Spam System. 556-564
Sensor Networks 1
- Gang Zhou, Jian Lu, Chieh-Yih Wan, Mark D. Yarvis, John A. Stankovic:
BodyQoS: Adaptive and Radio-Agnostic QoS for Body Sensor Networks. 565-573 - Leijun Huang, Sanjeev Setia:
CORD: Energy-Efficient Reliable Bulk Data Dissemination in Sensor Networks. 574-582 - Jaehoon Jeong, Shuo Guo, Tian He, David Hung-Chang Du:
APL: Autonomous Passive Localization for Wireless Sensors Deployed in Road Networks. 583-591 - Yanmin Zhu, Lionel M. Ni:
Probabilistic Approach to Provisioning Guaranteed QoS for Distributed Event Detection. 592-600
Ad Hoc Networks 1
- Mathilde Durvy, Olivier Dousse, Patrick Thiran:
Border Effects, Fairness, and Phase Transition in Large Wireless Networks. 601-609 - Simone Merlin, Nitin H. Vaidya, Michele Zorzi:
Resource Allocation in Multi-Radio Multi-Channel Multi-Hop Wireless Networks. 610-618 - Umut Akyol, Matthew Andrews, Piyush Gupta, John D. Hobby, Iraj Saniee, Alexander L. Stolyar:
Joint Scheduling and Congestion Control in Mobile Ad-Hoc Networks. 619-627 - Hongning Dai, Kam-Wing Ng, Raymond Chi-Wing Wong, Min-You Wu:
On the Capacity of Multi-Channel Wireless Networks Using Directional Antennas. 628-636
Optical Networks 2
- Duan-Shin Lee, Cheng-Shang Chang, Jay Cheng, Horng-Sheng Yan:
Queueing Analysis of Loss Systems with Variable Optical Delay Lines. 637-645 - Byongkwon Moon:
Emergency Handling in Ethernet Passive Optical Networks Using Priority-Based Dynamic Bandwidth Allocation. 646-654 - Fernando Solano, Ruth van Caenegem, Didier Colle, José-Luis Marzo, Mario Pickavet, Ramón Fabregat, Piet Demeester:
All-Optical Label Stacking: Easing the Trade-offs Between Routing and Architecture Cost in All-Optical Packet Switching. 655-663 - Jay Cheng, Cheng-Shang Chang, Tsz-Hsuan Chao, Duan-Shin Lee, Ching-Ming Lien:
On Constructions of Optical Queues with a Limited Number of Recirculations. 664-672
Cellular Networks
- Eitan Altman, Konstantin Avrachenkov, Andrey Garnaev:
Closed Form Solutions for Symmetric Water Filling Games. 673-681 - Huseyin Mutlu, Murat Alanyali, David Starobinski:
Spot Pricing of Secondary Spectrum Usage in Wireless Cellular Networks. 682-690 - Alexander L. Stolyar, Harish Viswanathan:
Self-Organizing Dynamic Fractional Frequency Reuse in OFDMA Systems. 691-699 - David Amzallag, Reuven Bar-Yehuda, Danny Raz, Gabriel Scalosub:
Cell Selection in 4G Cellular Networks. 700-708
Wireless: IEEE 802.11 issues
- Mohammad Nassiri, Martin Heusse, Andrzej Duda:
A Novel Access Method for Supporting Absolute and Proportional Priorities in 802.11 WLANs. 709-717 - Anand Prabhu Subramanian, Pralhad Deshpande, Jie Gao, Samir R. Das:
Drive-By Localization of Roadside WiFi Networks. 718-725 - Sangho Shin, Henning Schulzrinne:
Call Admission Control in IEEE 802.11 WLANs Using QP-CAT. 726-734 - Shravan K. Rayanchu, Arunesh Mishra, Dheeraj Agrawal, Sharad Saha, Suman Banerjee:
Diagnosing Wireless Packet Losses in 802.11: Separating Collision from Weak Signal. 735-743
Wireless Mesh Networks 2
- Gentian Jakllari, Stephan J. Eidenbenz, Nicolas W. Hengartner, Srikanth V. Krishnamurthy, Michalis Faloutsos:
Link Positions Matter: A Noncommutative Routing Metric for Wireless Mesh Network. 744-752 - Hithesh Nama, Narayan B. Mandayam, Roy D. Yates:
Network Formation Among Selfish Energy-Constrained Wireless Devices. 753-761 - Ehsan Aryafar, Omer Gurewitz, Edward W. Knightly:
Distance-1 Constrained Channel Assignment in Single Radio Wireless Mesh Networks. 762-770 - Debmalya Panigrahi, Partha Dutta, Sharad Jaiswal, K. V. M. Naidu, Rajeev Rastogi:
Minimum Cost Topology Construction for Rural Wireless Mesh Networks. 771-779
Sensor Networks 2
- Animashree Anandkumar, Lang Tong, Ananthram Swami, Anthony Ephremides:
Minimum Cost Data Aggregation with Localized Processing for Statistical Inference. 780-788 - Sol Lederer, Yue Wang, Jie Gao:
Connectivity-Based Localization of Large Scale Sensor Networks with Complex Shape. 789-797 - Fenghui Zhang, Anxiao Jiang, Jianer Chen:
Robust Planarization of Unlocalized Wireless Sensor Networks. 798-806 - Joohwan Kim, Xiaojun Lin, Ness B. Shroff, Prasun Sinha:
On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast. 807-815
Ad Hoc Networks 2
- Kai Zeng, Wenjing Lou, Hongqiang Zhai:
On End-to-End Throughput of Opportunistic Routing in Multirate and Multihop Wireless Networks. 816-824 - Zhen Jiang, Junchao Ma, Wei Lou, Jie Wu:
An Information Model for Geographic Greedy Forwarding in Wireless Ad-Hoc Sensor Networks. 825-833 - Roland Flury, Roger Wattenhofer:
Randomized 3D Geographic Routing. 834-842 - Xin Wang, J. J. Garcia-Luna-Aceves:
Embracing Interference in Ad Hoc Networks Using Joint Routing and Scheduling with Multiple Packet Reception. 843-851
Wireless Networks 1
- Eun-Chan Park, Hwangnam Kim, Jae-Young Kim, Han Seok Kim:
Dynamic Bandwidth Request-Allocation Algorithm for Real-Time Services in IEEE 802.16 Broadband Wireless Access Networks. 852-860 - Matthew Andrews, Lisa Zhang:
Creating Templates to Achieve Low Delay in Multi-Carrier Frame-Based Wireless Data Systems. 861-869 - Lili Cao, Haitao Zheng:
Stable and Efficient Spectrum Access in Next Generation Dynamic Spectrum Networks. 870-878 - Xiaolu Zhang, Wenhua Jiao, Meixia Tao:
End-to-End Resource Allocation in OFDM Based Linear Multi-Hop Networks. 879-887
Quality of Service 1
- Patrick Maillé, Bruno Tuffin:
Analysis of Price Competition in a Slotted Resource Allocation Game. 888-896 - Douglas Comer, Maxim Martynov:
Design and Analysis of Hybrid Packet Schedulers. 897-905 - Chuanxiong Guo:
Improved Smoothed Round Robin Schedulers for High-Speed Packet Networks. 906-914 - Edson H. Watanabe, Daniel S. Menasché, Edmundo de Souza e Silva, Rosa Maria Meri Leão:
Modeling Resource Sharing Dynamics of VoIP Users over a WLAN Using a Game-Theoretic Approach. 915-923
Mobility
- Injong Rhee, Minsu Shin, Seongik Hong, Kyunghan Lee, Song Chong:
On the Levy-Walk Nature of Human Mobility. 924-932 - Wenye Wang, Ming Zhao:
Joint Effects of Radio Channels and Node Mobility on Link Dynamics in Wireless Networks. 933-941 - Hongzi Zhu, Yanmin Zhu, Minglu Li, Lionel M. Ni:
HERO: Online Real-Time Vehicle Tracking in Shanghai. 942-950 - Xin Hu, Li (Erran) Li, Zhuoqing Morley Mao, Yang Richard Yang:
Wide-Area IP Network Mobility. 951-959
Sensor Querying
- Rik Sarkar, Xianjin Zhu, Jie Gao, Leonidas J. Guibas, Joseph S. B. Mitchell:
Iso-Contour Queries and Gradient Descent with Guaranteed Delivery in Sensor Networks. 960-967 - Xiaoming Lu, Matt Spear, Karl N. Levitt, Shyhtsun Felix Wu:
iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks. 968-976 - Lei Ying, Zhen Liu, Donald F. Towsley, Cathy H. Xia:
Distributed Operator Placement and Data Caching in Large-Scale Sensor Networks. 977-985 - Patrick Denantes, Florence Bénézit, Patrick Thiran, Martin Vetterli:
Which Distributed Averaging Algorithm Should I Choose for my Sensor Network? 986-994
Wireless Networks 2
- Ramakrishna Gummadi, Kyomin Jung, Devavrat Shah, Ramavarapu S. Sreenivas:
Feasible Rate Allocation in Wireless Networks. 995-1003 - Li (Erran) Li, Martin Pal, Yang Richard Yang:
Proportional Fairness in Multi-Rate Wireless LANs. 1004-1012 - Yan Gao, Jennifer C. Hou, Hoang Nguyen:
Topology Control for Maintaining Network Connectivity and Maximizing Network Capacity under the Physical Model. 1013-1021 - Cunqing Hua, Rong Zheng:
Starvation Modeling and Identification in Dense 802.11 Wireless Community Networks. 1022-1030
Peer-to-Peer Networks 2
- Bo Li, Susu Xie, Yang Qu, Gabriel Yik Keung, Chuang Lin, Jiangchuan Liu, Xinyan Zhang:
Inside the New Coolstreaming: Principles, Measurements and Performance Implications. 1031-1039 - Thanasis G. Papaioannou, George D. Stamoulis:
Achieving Honest Ratings with Reputation-Based Fines in Electronic Markets. 1040-1048 - Zhongmei Yao, Dmitri Loguinov:
Understanding Disconnection and Stabilization of Chord. 1049-1057 - Dongni Ren, Yui Tung Hillman Li, Shueng-Han Gary Chan:
On Reducing Mesh Delay for Peer-to-Peer Live Streaming. 1058-1066
Internet Measurement 3
- Fang Hao, Murali S. Kodialam, T. V. Lakshman:
Incremental Bloom Filters. 1067-1075 - Mehmet Hadi Gunes, Kamil Saraç:
Resolving Anonymous Routers in Internet Topology Measurement Studies. 1076-1084 - Pierre Fraigniaud, Emmanuelle Lebhar, Laurent Viennot:
The Inframetric Model for the Internet. 1085-1093 - Xiaoming Wang, Xiliang Liu, Dmitri Loguinov:
Modeling the Evolution of Degree Correlation in Scale-Free Topology Generators. 1094-1102
Ad Hoc Networks: Scheduling
- Changhee Joo, Xiaojun Lin, Ness B. Shroff:
Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-Hop Wireless Networks. 1103-1111 - Ming Li, Hua Zhu, Yang Xiao, Imrich Chlamtac, Balakrishnan Prabhakaran:
Adaptive Frame Concatenation Mechanisms for QoS in Multi-Rate Wireless Ad Hoc Networks. 1112-1120 - Supratim Deb, Karan Mangla, K. V. M. Naidu:
Fast and Distributed Computation of Schedules in Wireless Networks. 1121-1129 - Anand Srinivas, Eytan H. Modiano:
Joint Node Placement and Assignment for Throughput Optimization in Mobile Backbone Networks. 1130-1138
Cross layer Design 2
- Gil Zussman, Andrew Brzezinski, Eytan H. Modiano:
Multihop Local Pooling for Distributed Throughput Maximization in Wireless Networks. 1139-1147 - Deepti Chafekar, Dave Levin, V. S. Anil Kumar, Madhav V. Marathe, Srinivasan Parthasarathy, Aravind Srinivasan:
Capacity of Asynchronous Random-Access Scheduling in Wireless Networks. 1148-1156 - Kai Yang, Yihong Wu, Jianwei Huang, Xiaodong Wang, Sergio Verdú:
Distributed Robust Optimization for Communication Networks. 1157-1165 - Deepti Chafekar, V. S. Anil Kumar, Madhav V. Marathe, Srinivasan Parthasarathy, Aravind Srinivasan:
Approximation Algorithms for Computing Capacity of Wireless Networks with SINR Constraints. 1166-1174
Sensor Networks 3
- Xianjin Zhu, Rik Sarkar, Jie Gao, Joseph S. B. Mitchell:
Light-Weight Contour Tracking in Wireless Sensor Networks. 1175-1183 - Tian He, John A. Stankovic, Radu Stoleru, Yu Gu, Yafeng Wu:
Essentia: Architecting Wireless Sensor Networks Asymmetrically. 1184-1192 - Yafeng Wu, John A. Stankovic, Tian He, Shan Lin:
Realistic and Efficient Multi-Channel Communications in Wireless Sensor Networks. 1193-1201 - Bartlomiej Blaszczyszyn, Bozidar Radunovic:
Using Transmit-Only Sensors to Reduce Deployment Cost of Wireless Sensor Networks. 1202-1210
Network Security 3
- Jerry T. Chiang, Yih-Chun Hu:
Dynamic Jamming Mitigation for Wireless Broadcast Networks. 1211-1219 - Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng:
A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks. 1220-1228 - Rongxing Lu, Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen:
ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. 1229-1237 - Maxim Raya, Panagiotis Papadimitratos, Virgil D. Gligor, Jean-Pierre Hubaux:
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks. 1238-1246
Wireless Networks 3
- Joshua Robinson, Mustafa Uysal, Ram Swaminathan, Edward W. Knightly:
Adding Capacity Points to a Wireless Mesh Network Using Local Search. 1247-1255 - Minkyong Kim, Zhen Liu, Srinivasan Parthasarathy, Dimitrios E. Pendarakis, Hao Yang:
Association Control in Mobile Wireless Networks. 1256-1264 - Emrah Bayraktaroglu, Christopher King, Xin Liu, Guevara Noubir, Rajmohan Rajaraman, Bishal Thapa:
On the Performance of IEEE 802.11 under Jamming. 1265-1273 - Muhammad Usman Ilyas, Hayder Radha:
Measurement Based Analysis and Modeling of the Error Process in IEEE 802.15.4 LR-WPANs. 1274-1282
Cross Layer Design 3
- Miao Zhao, Ming Ma, Yuanyuan Yang:
Mobile Data Gathering with Space-Division Multiple Access in Wireless Sensor Networks. 1283-1291 - Yi Shi, Y. Thomas Hou:
A Distributed Optimization Algorithm for Multi-Hop Cognitive Radio Networks. 1292-1300 - Rahul Urgaonkar, Michael J. Neely:
Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks. 1301-1309 - Mathias Kurth, Anatolij Zubow, Jens-Peter Redlich:
Cooperative Opportunistic Routing Using Transmit Diversity in Wireless Mesh Networks. 1310-1318
Wireless Routing
- Nikhil Bansal, Ranjita Bhagwan, Navendu Jain, Yoonho Park, Deepak S. Turaga, Chitra Venkatramani:
Towards Optimal Resource Allocation in Partial-Fault Tolerant Applications. 1319-1327 - Sundar Subramanian, Sanjay Shakkottai, Piyush Gupta:
Optimal Geographic Routing for Wireless Networks with Near-Arbitrary Holes and Traffic. 1328-1336 - Di Wang, Alhussein A. Abouzeid:
Link State Routing Overhead in Mobile Ad Hoc Networks: A Rate-Distortion Formulation. 1337-1345 - Fan Li, Yu Wang:
Circular Sailing Routing for Wireless Networks. 1346-1354
Multimedia
- Chuan Wu, Baochun Li, Shuqiao Zhao:
Multi-Channel Live P2P Streaming: Refocusing on Servers. 1355-1363 - Feng Wang, Jiangchuan Liu, Yongqiang Xiong:
Stable Peers: Existence, Importance, and Application in Peer-to-Peer Live Video Streaming. 1364-1372 - Shun-Yun Hu, Ting-Hao Huang, Shao-Chen Chang, Wei-Lun Sung, Jehn-Ruey Jiang, Bing-Yu Chen:
FLoD: A Framework for Peer-to-Peer 3D Streaming. 1373-1381 - Haodong Wang, Chiu C. Tan, Qun Li:
Snoogle: A Search Engine for the Physical World. 1382-1390
Sensor Security 2
- Sheng Zhong, Murtuza Jadliwala, Shambhu J. Upadhyaya, Chunming Qiao:
Towards a Theory of Robust Localization Against Malicious Beacon Nodes. 1391-1399 - Premkumar Karumbu, Anurag Kumar:
Optimal Sleep-Wake Scheduling for Quickest Intrusion Detection Using Wireless Sensor Networks. 1400-1408 - Zhen Yu, Yawen Wei, Bhuvaneswari Ramkumar, Yong Guan:
An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks. 1409-1417 - Wensheng Zhang, Nalin Subramanian, Guiling Wang:
Lightweight and Compromise-Resilient Message Authentication in Sensor Networks. 1418-1426
Wireless MAC 2
- Senhua Huang, Xin Liu, Zhi Ding:
Opportunistic Spectrum Access in Cognitive Radio Networks. 1427-1435 - Guner D. Celik, Gil Zussman, Wajahat F. Khan, Eytan H. Modiano:
MAC for Networks with Multipacket Reception Capability and Spatially Distributed Nodes. 1436-1444 - Zheng Zeng, Yong Yang, Jennifer C. Hou:
How Physical Carrier Sense Affects System Throughput in IEEE 802.11 Wireless Networks. 1445-1453 - Dong Zheng, Min Cao, Junshan Zhang, P. R. Kumar:
Channel Aware Distributed Scheduling for Exploiting Multi-Receiver Diversity and Multiuser Diversity in Ad-Hoc Networks: A Unified PHY/MAC Approach. 1454-1462
Quality of Service 2
- Yufang Xi, Edmund M. Yeh:
Pricing, Competition, and Routing for Selfish and Strategic Nodes in Multi-Hop Relay Networks. 1463-1471 - Rui Zhang-Shen, Nick McKeown:
Guaranteeing Quality of Service to Peering Traffic. 1472-1480 - Ravi S. Prasad, Marina Thottan, T. V. Lakshman:
A Stateless and Light-Weight Bandwidth Management Mechanism for Elastic Traffic. 1481-1489 - Gianluca Rizzo, Jean-Yves Le Boudec:
Stability and Delay Bounds in Heterogeneous Networks of Aggregate Schedulers. 1490-1498
Network Coding 2
- Shuhui Yang, Jie Wu, Mihaela Cardei:
Efficient Broadcast in MANETs Using Network Coding and Directional Antennas. 1499-1507 - Yunfeng Lin, Baochun Li, Ben Liang:
Efficient Network Coded Data Transmissions in Disruption Tolerant Networks. 1508-1516 - I-Hong Hou, Yu-En Tsai, Tarek F. Abdelzaher, Indranil Gupta:
AdapCode: Adaptive Network Coding for Code Updates in Wireless Sensor Networks. 1517-1525 - Wei Pu, Chong Luo, Shipeng Li, Chang Wen Chen:
Continuous Network Coding in Wireless Relay Networks. 1526-1534
Wireless Networks 4
- Nicholas B. Chang, Mingyan Liu:
Competitive Analysis of Opportunistic Spectrum Access Strategies. 1535-1542 - Fan Wu, Sheng Zhong, Chunming Qiao:
Globally Optimal Channel Assignment for Non-Cooperative Wireless Networks. 1543-1551 - Mohammad Hossein Manshaei, Julien Freudiger, Márk Félegyházi, Peter Marbach, Jean-Pierre Hubaux:
On Wireless Social Community Networks. 1552-1560 - Greger Wikstrand, Thomas Nilsson, Mark S. Dougherty:
Prioritized Repeated Eliminations Multiple Access: A Novel Protocol for Wireless Networks. 1561-1569
Multicast
- Vivek Raghunathan, Vivek S. Borkar, Min Cao, P. R. Kumar:
Index Policies for Real-Time Multicast Scheduling for Wireless Broadcast Systems. 1570-1578 - Supratim Deb, Sharad Jaiswal, Kanthi Nagaraj:
Real-Time Video Multicast in WiMAX Networks. 1579-1587 - Zongpeng Li:
Cross-Monotonic Multicast. 1588-1596 - Knut-Helge Vik, Pål Halvorsen, Carsten Griwodz:
Multicast Tree Diameter for Dynamic Distributed Interactive Applications. 1597-1605
Wireless Mesh Networks 3
- Lap Kong Law, Srikanth V. Krishnamurthy, Michalis Faloutsos:
Capacity of Hybrid Cellular-Ad Hoc Data Networks. 1606-1614 - Yaling Yang, Jun Wang:
Design Guidelines for Routing Metrics in Multihop Wireless Networks. 1615-1623 - Qunfeng Dong, Yigal Bejerano:
Building Robust Nomadic Wireless Mesh Networks Using Directional Antennas. 1624-1632 - Jingpu Shi, Omer Gurewitz, Vincenzo Mancuso, Joseph Camp, Edward W. Knightly:
Measurement and Modeling of the Origins of Starvation in Congestion Controlled Mesh Networks. 1633-1641
Internet Measurement 4
- Roman Chertov, Sonia Fahmy, Ness B. Shroff:
A Device-Independent Router Model. 1642-1650 - Yu Gu, Lee Breslau, Nick G. Duffield, Subhabrata Sen:
GRE Encapsulated Multicast Probing: A Scalable Technique for Measuring One-Way Loss. 1651-1659 - Matthieu Latapy, Clémence Magnien:
Complex Network Measurements: Estimating the Relevance of Observed Properties. 1660-1668 - Jens B. Schmitt, Frank A. Zdarsky, Markus Fidler:
Delay Bounds under Arbitrary Multiplexing: When Network Calculus Leaves You in the Lurch... 1669-1677
Network Security 3
- Milan Vojnovic, Varun Gupta, Thomas Karagiannis, Christos Gkantsidis:
Sampling Strategies for Epidemic-Style Information Dissemination. 1678-1686 - Jinyuan Sun, Chi Zhang, Yuguang Fang:
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks. 1687-1695 - Parbati K. Manna, Shigang Chen, Sanjay Ranka:
Exact Modeling of Propagation for Permutation-Scanning Worms. 1696-1704 - Parminder Chhabra, Clayton D. Scott, Eric D. Kolaczyk, Mark Crovella:
Distributed Spatial Anomaly Detection. 1705-1713
Peer-to-Peer Networks 3
- Stefano Castelli, Paolo Costa, Gian Pietro Picco:
HyperCBR: Large-Scale Content-Based Routing in a Multidimensional Space. 1714-1722 - Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. Zhao:
Searching for Rare Objects Using Index Replication. 1723-1731 - Sung-Ju Lee, Sujata Banerjee, Puneet Sharma, Praveen Yalagandula, Sujoy Basu:
Bandwidth-Aware Routing in Overlay Networks. 1732-1740 - Rita H. Wouhaybi, Puneet Sharma, Sujata Banerjee, Andrew T. Campbell:
Minerva: Learning to Infer Network Path Properties. 1741-1749
Wireless MAC 3
- Younggeun Cho, Chan-Soo Hwang, Fouad A. Tobagi:
Design of Robust Random Access Protocols For Wireless Networks Using Game Theoretic Models. 1750-1758 - Eitan Altaian, Yezekael Hayel:
A Stochastic Evolutionary Game of Energy Management in a Distributed Aloha Network. 1759-1767 - Yong Sheng, Keren Tan, Guanling Chen, David Kotz, Andrew T. Campbell:
Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength. 1768-1776 - Gardar Hauksson, Murat Alanyali:
Wireless Medium Access via Adaptive Backoff: Delay and Loss Minimization. 1777-1785
Router/Switch Design 3
- Weirong Jiang, Qingbo Wang, Viktor K. Prasanna:
Beyond TCAMs: An SRAM-Based Parallel Multi-Pipeline Architecture for Terabit IP Lookup. 1786-1794 - Heeyeol Yu, Rabi N. Mahapatra:
A Memory-Efficient Hashing by Multi-Predicate Bloom Filters for Packet Classification. 1795-1803 - Viet Thang Nguyen, Miklós Telek:
Time Blocking Analysis in Time-Driven Switching Networks. 1804-1812 - Upendra Shevade, Ravi Kokku, Harrick M. Vin:
Run-Time System for Scalable Network Services. 1813-1821
Economics, Pricing and Measurement
- Qian Lv, George N. Rouskas:
On Optimal Sizing of Tiered Network Services. 1822-1830 - Marcelo Yannuzzi, Xavier Masip-Bruin, René Serral-Gracià, Eva Marín-Tordera, Alexander Sprintson, Ariel Orda:
Maximum Coverage at Minimum Cost for Multi-Domain IP/MPLS Networks. 1831-1839 - Peter B. Key, Laurent Massoulié, Dan-Cristian Tomozei:
Non-Metric Coordinates for Predicting Network Proximity. 1840-1848 - K. V. M. Naidu, Debmalya Panigrahi, Rajeev Rastogi:
Detecting Anomalies Using End-to-End Path Measurements. 1849-1857
Wireless ad hoc networks - I
- Hermann S. Lichte, Stefan Valentin, Holger Karl, Imad Aad, Luis Loyola, Jörg Widmer:
Design and Evaluation of a Routing-Informed Cooperative MAC Protocol for Ad Hoc Networks. 1858-1866 - Zygmunt J. Haas, Edward Y. Hua:
Residual Link Lifetime Prediction with Limited Information Input in Mobile Ad Hoc Networks. 1867-1875 - Ruiliang Chen, Jung-Min Park, Kaigui Bian:
Robust Distributed Spectrum Sensing in Cognitive Radio Networks. 1876-1884 - Fan Wang, Marwan Krunz, Shuguang Cui:
Spectrum Sharing in Cognitive Radio Networks. 1885-1893
Medium access control and channel diversity
- Young-June Choi, Kang G. Shin:
Power-Adjusted Random Access to a Wireless Channel. 1894-1902 - Pavan Nuggehalli, Mahasweta Sarkar, Kishor Kulkarni, Ramesh R. Rao:
A Game-Theoretic Analysis of QoS in Wireless MAC. 1903-1911 - Lin X. Cai, Lin Cai, Xuemin Shen, Jon W. Mark:
Optimizing Distributed MAC Protocol for Multi-Hop Ultra-Wideband Wireless Networks. 1912-1920 - Alexander W. Min, Kang G. Shin:
Exploiting Multi-Channel Diversity in Spectrum-Agile Networks. 1921-1929
Network Security I
- Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan, Wei Zhao:
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems. 1930-1938 - Anirban Banerjee, Dhiman Barman, Michalis Faloutsos, Laxmi N. Bhuyan:
Cyber-Fraud is One Typo Away. 1939-1947 - Jean-Chrysostome Bolot, Marc Lelarge:
A New Perspective on Internet Security using Insurance. 1948-1956 - Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan:
A Novel Quantitative Approach For Measuring Network Security. 1957-1965
Optical Networks and Switching
- Xin Liu, Wei Wei, Chunming Qiao, Ting Wang, Weisheng Hu, Wei Guo, Min-You Wu:
Task Scheduling and Lightpath Establishment in Optical Grids. 1966-1974 - Guangzhi Li, Angela L. Chiu, Robert D. Doverspike, Martin Birk, Don Husa, Nick Zanki:
On Transient-Constrained Wavelength Assignment. 1975-1983 - Quanyan Zhu, Lacra Pavel:
Theory of Linear Games with Constraints and Its Application to Power Control of Optical Networks. 1984-1992 - Xiaolin Wang, Yan Cai, Sheng Xiao, Weibo Gong:
A Three-Stage Load-Balancing Switch. 1993-2001 - Tony Tong Lee:
The Kraft's Inequality of Scheduling for Packet-Switched Clos Networks. 2002-2010
Sensor networks - I
- Gabriel Paillard, Vlady Ravelomanana:
Limit Theorems for Degree of Coverage and Lifetime in Large Sensor Networks. 2011-2019 - Guanqun Yang, Vinod Shukla, Daji Qiao:
A Novel On-Demand Framework for Collaborative Object Detection in Sensor Networks. 2020-2028 - Huang Lee, Abtin Keshavarzian:
Towards Energy-Optimal and Reliable Data Collection via Collision-Free Scheduling in Wireless Sensor Networks. 2029-2037 - Tommaso Melodia, Ian F. Akyildiz:
Cross-Layer Quality of Service Support for UWB Wireless Multimedia Sensor Networks. 2038-2046 - Murat Demirbas, Onur Soysal, Muzammil Hussain:
A Singlehop Collaborative Feedback Primitive for Wireless Sensor Networks. 2047-2055
Wireless LANs
- Haithem Al-Mefleh, J. Morris Chang:
A New ACK Policy To Mitigate the Effects of Coexisting IEEE 802.11/802.11e Devices. 2056-2064 - Caleb T. Phillips, Suresh Singh:
An Empirical Activity Model for WLAN Users. 2065-2073 - Seong-il Hahm, Jongwon Lee, Chong-kwon Kim:
Opportunistic Waiver of Data Reception for Exploiting Multiuser Diversity in the Uplink of IEEE 802.11 WLAN. 2074-2082 - Jiansong Zhang, Kun Tan, Jun Zhao, Haitao Wu, Yongguang Zhang:
A Practical SNR-Guided Rate Adaptation. 2083-2091 - Yigal Bejerano, Dongwook Lee, Prasun Sinha, Lisa Zhang:
Approximation Algorithms for Scheduling Real-Time Multicast Flows in Wireless LANs. 2092-2100
Wireless Applications and Security
- Xuwen Yu, Surendar Chandra:
Delay Tolerant Collaborations among Campus-Wide Wireless Users. 2101-2109 - Quan Yuan, Jie Wu:
DRIP: A Dynamic VoRonoi RegIons-Based Publish/Subscribe Protocol in Mobile Networks. 2110-2118 - Saswati Sarkar, Eitan Altman, Rachid El Azouzi, Yezekael Hayel:
Information Concealing Games. 2119-2127 - Hui Song, Sencun Zhu, Guohong Cao:
SVATS: A Sensor-Network-Based Vehicle Anti-Theft System. 2128-2136 - Lifeng Sang, Anish Arora:
Spatial Signatures for Lightweight Security in Wireless Sensor Networks. 2137-2145
Congestion Control and Network Coding
- Krister Jacobsson, Lachlan L. H. Andrew, Ao Tang, Karl Henrik Johansson, Håkan Hjalmarsson, Steven H. Low:
ACK-Clocking Dynamics: Modelling the Interaction between Windows and the Network. 2146-2152 - Kiran Misra, Shirish Karande, Hayder Radha:
Maximal Recovery Network Coding under Topology Constraint. 2153-2161 - Jin Jin, Baochun Li, Taegon Kong:
Is Random Network Coding Helpful in WiMAX? 2162-2170 - Majid Ghaderi, Donald F. Towsley, James F. Kurose:
Reliability Gain of Network Coding in Lossy Wireless Networks. 2171-2179 - Chia-Hui Tai, Jiang Zhu, Nandita Dukkipati:
Making Large Scale Deployment of RCP Practical for Real Networks. 2180-2188
Sensor networks - II
- Ioannis Ch. Paschalidis, Wei Lai, Xiangdong Song:
A Decomposition Method for Transmission Scheduling in Multi-Channel Wireless Sensor Networks. 2189-2197 - Robert Zhong Zhou, Jun-Hong Cui, Amvrossios C. Bagtzoglou:
Scalable Localization with Mobility Prediction for Underwater Sensor Networks. 2198-2206 - Jing Wang, Yonghe Liu, Sajal K. Das:
Asynchronous Sampling Benefits Wireless Sensor Networks. 2207-2215 - Guanqun Yang, Bin Tong, Daji Qiao, Wensheng Zhang:
Sensor-Aided Overlay Deployment and Relocation for Vast-Scale Sensor Networks. 2216-2224 - Yang Yu, Loren J. Rittle:
Utility-Driven Spatiotemporal Sampling Using Mobile Sensors. 2225-2233
Multi-hop/Mesh wireless networks
- Alessandro Mei, Julinda Stefa:
Routing in Outer Space. 2234-2242 - Tehuang Liu, Wanjiun Liao:
Location-Dependent Network Performance and Design Strategies for Wireless Mesh Networks. 2243-2251 - Bozidar Radunovic, Christos Gkantsidis, Peter B. Key, Pablo Rodriguez:
An Optimization Framework for Opportunistic Multipath Routing in Wireless Mesh Networks. 2252-2260 - Partha Dutta, Sharad Jaiswal, Debmalya Panigrahi, Rajeev Rastogi:
A New Channel Assignment Mechanism for Rural Wireless Mesh Networks. 2261-2269 - Mina Sartipi, Badri N. Vellambi, Nazanin Rahnavard, Faramarz Fekri:
DSCM: An Energy-Efficient and Rate-Optimal Multicast Protocol for Multihop Wireless Networks Using Distributed Source Coding. 2270-2278
Network Security II
- Andreas Hess, Sudipta Sengupta, Vijay P. Kumar:
Joint Traffic Routing and Distribution of Security Services in High Speed Networks. 2279-2287 - Yoon-Ho Choi, Moon-Young Jung, Seung-Woo Seo:
L+1-MWM: A Fast Pattern Matching Algorithm for High-Speed Packet Filtering. 2288-2296 - Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy:
Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks. 2297-2305 - Zesheng Chen, Chuanyi Ji, Paul Barford:
Spatial-Temporal Characteristics of Internet Malicious Sources. 2306-2314 - Parbati K. Manna, Sanjay Ranka, Shigang Chen:
DAWN: A Novel Strategy for Detecting ASCII Worms in Networks. 2315-2323
Restoration and Fault Tolerance
- Reuven Cohen, Gabi Nakibly:
Maximizing Restorable Throughput in MPLS Networks. 2324-2332 - Feng Wang, Lixin Gao:
A Backup Route Aware Routing Protocol - Fast Recovery from Transient Routing Failures. 2333-2341 - Yihua He, Michalis Faloutsos, Srikanth V. Krishnamurthy, Marek Chrobak:
Policy-Aware Topologies for Efficient Inter-Domain Routing Evaluations. 2342-2350 - Ramin Khalili, James F. Kurose:
A Distributed Minimum-Distortion Routing Algorithm with In-Network Data Processing. 2351-2359 - Rui Zhang-Shen, Nick McKeown:
Designing a Fault-Tolerant Network Using Valiant Load-Balancing. 2360-2368
Wireless ad hoc networks - II
- Jin Zhang, Qian Zhang:
Cooperative Routing in Multi-Source Multi-Destination Multi-Hop Wireless Networks. 2369-2377 - Nikhil Singh, Ramavarapu S. Sreenivas:
On a Non-Linear Optimization Approach for Proportional Fairness in Ad-Hoc Wireless Networks. 2378-2386 - Song Luo, Jason H. Li, Kihong Park, Renato Levy:
Exploiting Heavy-Tailed Statistics for Predictable QoS Routing in Ad Hoc Wireless Networks. 2387-2395 - Sumit Singh, Upamanyu Madhow, Elizabeth M. Belding:
Beyond Proportional Fairness: A Resource Biasing Framework for Shaping Throughput Profiles in Multihop Wireless Networks. 2396-2404
QoS and performance evaluation
- Qinghe Du, Xi Zhang:
Resource Allocation for Downlink Statistical Multiuser QoS Provisionings in Cellular Wireless Networks. 2405-2413 - Jung-Tsung Tsai:
State-Dependent Proportional Fair Scheduling Algorithms for Wireless Forward Link Data Services. 2414-2422 - Brent Ishibashi, Nizar Bouabdallah, Raouf Boutaba:
QoS Performance Analysis of Cognitive Radio-Based Virtual Wireless Networks. 2423-2431 - Domenico Giustiniano, Giuseppe Bianchi, Luca Scalia, Ilenia Tinnirello:
An Explanation for Unexpected 802.11 Outdoor Link-level Measurement Results. 2432-2440 - Rupa Krishnan, Ashish Raniwala, Tzi-cker Chiueh:
Design of a Channel Characteristics-Aware Routing Protocol. 2441-2449
Peer-to-Peer Networks and Applications
- Deke Guo, Yunhao Liu, Xiang-Yang Li:
BAKE: A Balanced Kautz Tree Structure for Peer-to-Peer Networks. 2450-2457 - Bin Chang, Yi Cui, Yuan Xue:
Maximizing Resilient Throughput in Peer-to-Peer Network: A Generalized Flow Approach. 2458-2466 - William Acosta, Surendar Chandra:
Exploiting the Properties of Query Workload and File Name Distributions to Improve P2P Synopsis-Based Searches. 2467-2475 - Yongning Tang, Ehab Al-Shaer:
Towards Collaborative User-Level Overlay Fault Diagnosis. 2476-2484 - Jun Bi, Jianping Wu, Wenmao Zhang:
A Trust and Reputation based Anti-SPIM Method. 2485-2493
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.