default search action
30th INFOCOM 2011: Shanghai, China
- INFOCOM 2011. 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 10-15 April 2011, Shanghai, China. IEEE 2011, ISBN 978-1-4244-9921-2
Network Measurement
- Salvatore Scellato, Ilias Leontiadis, Cecilia Mascolo, Prithwish Basu, Murtaza Zafer:
Understanding robustness of mobile networks through temporal network measures. 1-5 - Sukhyun Song, Peter J. Keleher, Bobby Bhattacharjee, Alan Sussman:
Decentralized, accurate, and low-cost network bandwidth prediction. 6-10 - Xingang Shi, Chi-Kin Chau, Dah-Ming Chiu:
Space-efficient tracking of network-wide flow correlations. 11-15 - Gonca Gürsun, Mark Crovella, Ibrahim Matta:
Describing and forecasting video access patterns. 16-20 - Yiming Zhang:
Exploiting Tag-based Path Diversity in the DLG-Kautz network. 21-25
Secure Wireless Networks
- Ping Xu, XiaoHua Xu, Shaojie Tang, Xiang-Yang Li:
Truthful online spectrum allocation and auction in multi-channel wireless networks. 26-30 - Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz:
Privacy analysis of user association logs in a large-scale wireless LAN. 31-35 - Shaxun Chen, Kai Zeng, Prasant Mohapatra:
Hearing is believing: Detecting mobile primary user emulation attack in white space. 36-40 - Hossein Kaffash Bokharaei, Alireza Sahraei, Yashar Ganjali, Ram Keralapura, Antonio Nucci:
You can SPIT, but you can't hide: Spammer identification in telephony networks. 41-45 - Mahmoud Taghizadeh, Amir R. Khakpour, Alex X. Liu, Subir Biswas:
Collaborative firewalling in wireless networks. 46-50
Data Center
- Yan Zhang, Nirwan Ansari:
On mitigating TCP Incast in Data Center Networks. 51-55 - Dan Li, Mingwei Xu, Ming-Chen Zhao, Chuanxiong Guo, Yongguang Zhang, Min-You Wu:
RDCM: Reliable data center multicast. 56-60 - Deke Guo, Tao Chen, Dan Li, Yunhao Liu, Xue Liu, Guihai Chen:
BCN: Expansible network structures for data centers using hierarchical compound graphs. 61-65 - Vivek Shrivastava, Petros Zerfos, Kang-Won Lee, Hani Jamjoom, Yew-Huey Liu, Suman Banerjee:
Application-aware virtual machine migration in data centers. 66-70 - Meng Wang, Xiaoqiao Meng, Li Zhang:
Consolidating virtual machines with dynamic bandwidth demand in data centers. 71-75
Spectrum Allocation and Channel Assignment
- Mahdi Hajiaghayi, Min Dong, Ben Liang:
Optimal channel assignment and power allocation for dual-hop multi-channel multi-user relaying. 76-80 - Fan Wu, Nitin H. Vaidya:
SMALL: A Strategy-proof Mechanism for radio spectrum allocation. 81-85 - Ajay Gopinathan, Zongpeng Li:
A prior-free revenue maximizing auction for secondary spectrum access. 86-90 - Jonathan Wellons, Yuan Xue:
Towards robust and efficient routing in multi-radio, multi-channel wireless mesh networks. 91-95 - Reuven Cohen, Guy Grebla:
Efficient allocation of CQI channels in broadband wireless networks. 96-100
Resource Allocation in Cellular Networks
- Yu Jin, Nick G. Duffield, Alexandre Gerber, Patrick Haffner, Wen-Ling Hsu, Guy Jacobson, Subhabrata Sen, Shobha Venkataraman, Zhi-Li Zhang:
Making sense of customer tickets in cellular networks. 101-105 - Salah-Eddine Elayoubi, Louai Saker, Tijani Chahed:
Optimal control for base station sleep mode in energy efficient radio access networks. 106-110 - David López-Pérez, Ákos Ladányi, Alpár Jüttner, Hervé Rivano, Jie Zhang:
Optimization method for the joint allocation of modulation schemes, coding rates, resource blocks and power in self-organizing LTE networks. 111-115 - Se-Young Yun, Yung Yi, Dong-Ho Cho, Jeonghoon Mo:
Open or close: On the sharing of femtocells. 116-120 - Gyan Ranjan, Zhi-Li Zhang, Supranamaya Ranjan, Ram Keralapura, Joshua Robinson:
Un-zipping cellular infrastructure locations via user geo-intent. 121-125
Internet Routing
- Péter Mátray, Péter Hága, Sándor Laki, István Csabai, Gábor Vattay:
On the network geography of the Internet. 126-130 - Shiva Prasad Kasiviswanathan, Stephan J. Eidenbenz, Guanhua Yan:
Geography-based analysis of the Internet infrastructure. 131-135 - Mohit Chamania, Marcel Caria, Admela Jukan:
A comparative performance analysis of IP traffic offloading schemes over Dynamic Circuits. 136-140 - Onur Turkcu, Arun K. Somani:
Efficient multicasting approaches using collection-distribution networks. 141-145 - Ravish Khosla, Sonia Fahmy, Y. Charlie Hu:
BGP molecules: Understanding and predicting prefix failures. 146-150
Network Monitoring
- Udi Weinsberg, Augustin Soule, Laurent Massoulié:
Inferring traffic shaping and policy parameters using end host measurements. 151-155 - Pinghui Wang, Xiaohong Guan, Weibo Gong, Donald F. Towsley:
A new virtual indexing method for measuring host connection degrees. 156-160 - Kohei Watabe, Masaki Aida:
Analysis on the fluctuation magnitude in probe interval for active measurement. 161-165 - Mikkel Thorup:
Timeouts with time-reversed linear probing. 166-170 - Brian Eriksson, Paul Barford, Joel Sommers, Robert D. Nowak:
DomainImpute: Inferring unseen components in the Internet. 171-175
Security
- Kaustubh Nyalkalkar, Sushant Sinha, Michael D. Bailey, Farnam Jahanian:
A comparative study of two network-based anomaly detection methods. 176-180 - Jing Gao, Wei Fan, Deepak S. Turaga, Olivier Verscheure, Xiaoqiao Meng, Lu Su, Jiawei Han:
Consensus extraction from heterogeneous detectors to improve performance over network traffic anomaly detection. 181-185 - Zhen Ling, Xinwen Fu, Weijia Jia, Wei Yu, Dong Xuan:
A novel packet size based covert channel attack against anonymizer. 186-190 - Anh Le, Athina Markopoulou, Michalis Faloutsos:
PhishDef: URL names say it all. 191-195 - Yeim-Kuan Chang, Chun-I Lee, Cheng-Chien Su:
Multi-field range encoding for packet classification in TCAM. 196-200
Cloud and Network Management
- Zixia Huang, Chao Mei, Li Erran Li, Thomas Woo:
CloudStream: Delivering high-quality streaming videos through a cloud-based SVC proxy. 201-205 - Upendra Sharma, Prashant J. Shenoy, Sambit Sahu, Anees Shaikh:
Kingfisher: Cost-aware elasticity in the cloud. 206-210 - Yousuk Seung, Terry Lam, Li Erran Li, Thomas Woo:
CloudFlex: Seamless scaling of enterprise applications into the cloud. 211-215 - Xavier León, Leandro Navarro:
Limits of energy saving for the allocation of data center resources to networked applications. 216-220 - Xin Sun, Sanjay G. Rao:
A cost-benefit framework for judicious enterprise network redesign. 221-225
Cognitive Radio
- Chuan Han, Yaling Yang:
Information propagation speed study in multihop cognitive radio networks. 226-230 - Ying Zhu, Minsu Huang, Siyuan Chen, Yu Wang:
Cooperative energy spanners: Energy-efficient topology control in cooperative ad hoc networks. 231-235 - Kaigui Bian, Jung-Min Park:
Asynchronous channel hopping for establishing rendezvous in cognitive radio networks. 236-240 - Chengzhi Li, Huaiyu Dai:
On the throughput scaling of Cognitive Radio ad hoc networks. 241-245 - Lei Sun, Wenye Wang:
On distribution and limits of information dissemination latency and speed in mobile cognitive radio networks. 246-250
Routing in Wireless Networks
- Alessandro Mei, Giacomo Morabito, Paolo Santi, Julinda Stefa:
Social-aware stateless forwarding in pocket switched networks. 251-255 - Yifan Li, Ping Wang, Dusit Niyato, Weihua Zhuang:
A dynamic relay selection scheme for mobile users in wireless relay networks. 256-260 - Riccardo Masiero, Giovanni Neglia:
Distributed subgradient methods for Delay Tolerant Networks. 261-265 - Suk-Bok Lee, Starsky H. Y. Wong, Kang-Won Lee, Songwu Lu:
Content management in a mobile ad hoc network: Beyond opportunistic strategy. 266-270 - Chi-Kin Chau, Richard J. Gibbens, Robert E. Hancock, Donald F. Towsley:
Robust multipath routing in large wireless networks. 271-275
Wireless Sensor Networks I
- Tao Chen, Zheng Yang, Yunhao Liu, Deke Guo, Xueshan Luo:
Localization in non-localizable sensor and ad-hoc networks: A Localizability-aided approach. 276-280 - XuFei Mao, Shaojie Tang, XiaoHua Xu, Xiang-Yang Li, Huadong Ma:
iLight: Indoor device-free passive tracking using wireless sensor networks. 281-285 - Wenbo Zhao, Xueyan Tang:
Scheduling data collection with dynamic traffic patterns in wireless sensor networks. 286-290 - Ming Liu, Haigang Gong, Yonggang Wen, Guihai Chen, Jiannong Cao:
The last minute: Efficient Data Evacuation strategy for sensor networks in post-disaster applications. 291-295 - Cheng Wang, Shaojie Tang, Xiang-Yang Li, Changjun Jiang:
SelectCast: Scalable data aggregation scheme in wireless sensor networks. 296-300
Routing and Forwarding
- Jin Zhao, Xinya Zhang, Xin Wang, Yangdong Deng, Xiaoming Fu:
Exploiting graphics processors for high-performance IP lookup in software routers. 301-305 - Kun Huang, Gaogang Xie, Yanbiao Li, Alex X. Liu:
Offset addressing approach to memory-efficient IP address lookup. 306-310 - Zhuo Huang, Jih-Kwon Peir, Shigang Chen:
Approximately-perfect hashing: Improving network throughput through efficient off-chip routing table lookup. 311-315 - Guner D. Celik, Long Bao Le, Eytan H. Modiano:
Scheduling in parallel queues with randomly varying connectivity and switchover delay. 316-320 - Qing Li, Dan Wang, Mingwei Xu, Jiahai Yang:
On the scalability of router forwarding tables: Nexthop-Selectable FIB aggregation. 321-325
Security and Privacy in Wireless Sensor Networks
- Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic:
Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs. 326-330 - Daojing He, Jiajun Bu, Sencun Zhu, Mingjian Yin, Yi Gao, Haodong Wang, Sammy Chan, Chun Chen:
Distributed privacy-preserving access control in a single-owner multi-user sensor network. 331-335 - Chuang Wang, Guiling Wang, Wensheng Zhang, Taiming Feng:
Reconciling privacy preservation and intrusion detection in sensory data aggregation. 336-340 - Xiaoyan Li, Yingying Chen, Jie Yang, Xiuyuan Zheng:
Designing localization algorithms robust to signal strength attacks. 341-345 - Xiali Hei, Xiaojiang Du:
Biometric-based two-level secure access control for Implantable Medical Devices during emergencies. 346-350
RFID and WLAN
- Lei Kang, Kaishun Wu, Jin Zhang, Haoyu Tan:
Decoding the collisions in RFID systems. 351-355 - Wen Luo, Shigang Chen, Tao Li, Shiping Chen:
Efficient missing tag detection in RFID systems. 356-360 - Yong Cui, Wei Li, Xiuzhen Cheng:
Partially overlapping channel assignment based on "node orthogonality" for 802.11 wireless networks. 361-365 - Sriram Lakshmanan, Shruti Sanadhya, Raghupathy Sivakumar:
On link rate adaptation in 802.11n WLANs. 366-370 - Libin Jiang, Mathieu Leconte, Jian Ni, R. Srikant, Jean C. Walrand:
Fast mixing of parallel Glauber dynamics and low-delay CSMA scheduling. 371-375
Network Coding
- Wei Dong, Yunhao Liu, Chun Chen, Jiajun Bu, Chao Huang:
ℛ2: Incremental ℛeprogramming using ℛelocatable code in networked embedded systems. 376-380 - Jun Sun, Yonggang Wen, Lizhong Zheng:
On file-based content distribution over wireless networks via multiple paths: Coding and delay trade-off. 381-385 - Wai-Leong Yeow, Cédric Westphal, Ulas C. Kozat:
Highly available virtual machines with network coding. 386-390 - Dan Zhang, Narayan B. Mandayam:
Resource allocation for multicast in an OFDMA network with Random Network Coding. 391-395 - Shanshan Wang, Yalin Evren Sagduyu, Junshan Zhang, Jason Hongjun Li:
Spectrum shaping via network coding in cognitive radio networks. 396-400
Peer-to-peer systems
- Matthieu Latapy, Clémence Magnien, Raphaël Fournier:
Quantifying paedophile queries in a large P2P system. 401-405 - Rafit Izhak-Ratzin, Hyunggon Park, Mihaela van der Schaar:
Reinforcement learning in BitTorrent systems. 406-410 - Brett Stone-Gross, Marco Cova, Christopher Kruegel, Giovanni Vigna:
Peering through the iframe. 411-415 - Jie Zhang, Wei Lou:
The digital rights management game in peer-to-peer streaming systems. 416-420 - Di Niu, Zimu Liu, Baochun Li, Shuqiao Zhao:
Demand forecast and performance prediction in peer-assisted on-demand streaming systems. 421-425
Vehicular Ad Hoc Networks
- Francesco Malandrino, Claudio Casetti, Carla-Fabiana Chiasserini, Marco Fiore:
Content downloading in vehicular networks: What really matters. 426-430 - Nianbo Liu, Ming Liu, Wei Lou, Guihai Chen, Jiannong Cao:
PVA in VANETs: Stopped cars are not silent. 431-435 - Emmanuel Baccelli, Philippe Jacquet, Bernard Mans, Georgios Rodolakis:
Information propagation speed in bidirectional vehicular delay tolerant networks. 436-440 - Fulong Xu, Shuo Guo, Jaehoon Jeong, Yu Gu, Qing Cao, Ming Liu, Tian He:
Utilizing shared vehicle trajectories for data forwarding in vehicular networks. 441-445 - Utku Günay Acer, Paolo Giaccone, David Hay, Giovanni Neglia, Saed Tarapiah:
Timely data delivery in a realistic bus network. 446-450
Energy Efficiency and Congestion Control
- Sourjya Bhaumik, David Chuck, Girija J. Narlikar, Gordon T. Wilfong:
Energy-efficient design and optimization of wireline access networks. 451-455 - Omur Ozel, Kaya Tutuncuoglu, Jing Yang, Sennur Ulukus, Aylin Yener:
Resource management for fading wireless channels with energy harvesting nodes. 456-460 - Miao He, Sugumar Murugesan, Junshan Zhang:
Multiple timescale dispatch and scheduling for stochastic reliability in smart grids with wind generation integration. 461-465 - Mario Marchese, Marco Cello, Giorgio Gnecco, Marcello Sanguineti:
Structural properties of optimal coordinate-convex policies for CAC with nonlinearly-constrained feasibility regions. 466-470 - Somayeh Sojoudi, Steven H. Low, John C. Doyle:
Effect of buffers on stability of Internet congestion controllers. 471-475 - Hao Jin, Deng Pan, Jason Liu, Niki Pissinou:
OpenFlow based flow level bandwidth provisioning for CICQ switches. 476-480
Wireless Networks
- Xiao Lei, Laura Cottatellucci, Konstantin Avrachenkov:
Equilibriums in slow fading interfering channels with partial knowledge of the channels. 481-485 - Boulat A. Bash, Dennis Goeckel, Donald F. Towsley:
Clustering in cooperative networks. 486-490 - Krishna P. Jagannathan, Shie Mannor, Ishai Menache, Eytan H. Modiano:
A state action frequency approach to throughput maximization over uncertain wireless channels. 491-495 - Saeed Moghaddam, Ahmed Helmy:
Spatio-temporal modeling of wireless users internet access patterns using self-organizing maps. 496-500 - Thanh Dang, Wu-chi Feng, Nirupama Bulusu:
Zoom: A multi-resolution tasking framework for crowdsourced geo-spatial sensing. 501-505 - Massimiliano Pierobon, Ian F. Akyildiz:
Information capacity of diffusion-based molecular communication in nanonetworks. 506-510
Wireless Ad Hoc Networks
- Peng-Jun Wan, Minming Li, Lixin Wang, Zhu Wang, Ophir Frieder:
Local pooling factor of multihop wireless networks. 511-515 - Greg Kuperman, Eytan H. Modiano, Aradhana Narula-Tam:
Analysis and algorithms for partial protection in mesh networks. 516-520 - Abhijeet Bhorkar, Tara Javidi, Alex C. Snoeren:
Achieving congestion diversity in wireless ad-hoc networks. 521-525 - Honghai Zhang, Yuanxi Jiang, Karthikeyan Sundaresan, Sampath Rangarajan, Baohua Zhao:
Wireless data multicasting with switched beamforming antennas. 526-530 - Hsiao-Chen Lu, Wanjiun Liao:
On cooperative strategies in wireless relay networks. 531-535 - Niels Karowski, Aline Carneiro Viana, Adam Wolisz:
Optimized asynchronous multi-channel neighbor discovery. 536-540
Social Networks
- Ruichuan Chen, Eng Keong Lua, Zhuhua Cai:
Bring order to online social networks. 541-545 - Ajay Sridharan, Yong Gao, Kui Wu, James Nastos:
Statistical behavior of embeddedness and communities of overlapping cliques in online social networks. 546-550 - Xiwang Yang, Yang Guo, Yong Liu:
Bayesian-inference based recommendation in online social networks. 551-555 - Bin Liu, Peter Terlecky, Amotz Bar-Noy, Ramesh Govindan, Michael J. Neely:
Optimizing information credibility in social swarming applications. 556-560 - Muhammad Usman Ilyas, Muhammad Zubair Shafiq, Alex X. Liu, Hayder Radha:
A distributed and privacy preserving algorithm for identifying information hubs in social networks. 561-565 - Felix Ming, Fai Wong, Peter Marbach:
"Who Are Your Friends?" - A Simple Mechanism that achieves perfect network formation. 566-570
Incentive and Economic Models
- Jaeok Park, Mihaela van der Schaar:
Incentive provision using intervention. 571-575 - Stefano Paris, Cristina Nita-Rotaru, Fabio Martignon, Antonio Capone:
EFW: A cross-layer metric for reliable routing in wireless mesh networks with selfish participants. 576-580 - MohammadHossein Bateni, Mohammad Taghi Hajiaghayi, Sina Jafarpour, Dan Pei:
Towards an efficient algorithmic framework for pricing cellular data service. 581-585 - Hong Xu, Baochun Li:
Seen as stable marriages. 586-590 - Gaoning He, Samson Lasaulce, Yezekael Hayel:
Stackelberg games for energy-efficient power control in wireless networks. 591-595 - Yuan Wu, Hongseok Kim, Prashanth Hande, Mung Chiang, Danny H. K. Tsang:
Revenue sharing among ISPs in two-sided markets. 596-600
Wireless Sensor Networks II
- Guohua Li, Jianzhong Li:
Global weighted fairness guaranteed congestion avoidance protocol for wireless sensor networks. 601-605 - Yongle Cao, Ziguo Zhong, Yu Gu, Tian He:
Safeguarding schedule updates in wireless sensor networks. 606-610 - Chul-Ho Lee, Do Young Eun:
Smart sleep: Sleep more to reduce delay in duty-cycled wireless sensor networks. 611-615 - Jun Luo, Ying He:
GeoQuorum: Load balancing and energy efficient data access in wireless sensor networks. 616-620 - Xiaokang Yu, Xiaomeng Ban, Wei Zeng, Rik Sarkar, Xianfeng Gu, Jie Gao:
Spherical representation and polyhedron routing for load balancing in wireless sensor networks. 621-625 - Ai Chen, Zhizhou Li, Ten-Hwang Lai, Cong Liu:
One-way barrier coverage with wireless sensors. 626-630
Mobile ad hoc networks (MANET) 1
- Guoqiang Mao, Brian D. O. Anderson:
On the asymptotic connectivity of random networks under the random connection model. 631-639 - Yun Wang, Xiaoyu Chu, Xinbing Wang, Yu Cheng:
Optimal multicast capacity and delay tradeoffs in MANETs: A global perspective. 640-648 - Luoyi Fu, Yi Qin, Xinbing Wang, Xue Liu:
Converge-cast with MIMO. 649-657 - Yuxin Chen, Sanjay Shakkottai, Jeffrey G. Andrews:
Sharing multiple messages over mobile networks. 658-666
Peer-to-peer Networks 1
- Haiying Shen, Lianyu Zhao, Harrison Chandler, Jared Stokes, Jin Li:
Toward P2P-based multimedia sharing in user generated contents. 667-675 - Ke Xu, Meng Shen, Mingjiang Ye:
A model approach to estimate Peer-to-Peer traffic matrices. 676-684 - Milan Vojnovic, Alexandre Proutière:
Hop limited flooding over dynamic networks. 685-693 - Bo Tan, Laurent Massoulié:
Optimal content placement for peer-to-peer video-on-demand systems. 694-702
Performance Analysis and Modeling 1
- Qiuyu Peng, Xinbing Wang, Huan Tang:
Heterogeneity increases multicast capacity in clustered network. 703-711 - Cheng Wang, Changjun Jiang, Xiang-Yang Li, Shaojie Tang, Panlong Yang:
General capacity scaling of wireless networks. 712-720 - Abhigyan Sharma, Aditya Kumar Mishra, Vikas Kumar, Arun Venkataramani:
Beyond MLU: An application-centric comparison of traffic engineering schemes. 721-729 - Cheng-Shang Chang, Chin-Yi Hsu, Jay Cheng, Duan-Shin Lee:
A general probabilistic framework for detecting community structure in networks. 730-738
Network coding 1
- Guanfeng Liang, Nitin H. Vaidya:
Capacity of byzantine agreement with finite link capacity. 739-747 - Yuan Feng, Zimu Liu, Baochun Li:
GestureFlow: Streaming gestures to an audience. 748-756 - Jin Wang, Jianping Wang, Kejie Lu, Yi Qian, Bin Xiao, Naijie Gu:
Optimal Design of Linear Network Coding for information theoretically secure unicast. 757-765 - Tracey Ho, Sidharth Jaggi, Svitlana Vyetrenko, Lingxiao Xia:
Universal and robust distributed network codes. 766-774
Wireless sensor network design 1
- Jiliang Wang, Yunhao Liu, Mo Li, Wei Dong, Yuan He:
QoF: Towards comprehensive path quality measurement in wireless sensor networks. 775-783 - Hongbo Jiang, Shengkai Zhang, Guang Tan, Chonggang Wang:
CABET: Connectivity-based boundary extraction of large-scale 3D sensor networks. 784-792 - Hongbo Jiang, Jie Cheng, Dan Wang, Chonggang Wang, Guang Tan:
Continuous multi-dimensional top-k query processing in sensor networks. 793-801
Cloud/Grid computing and networks 1
- Jun Zhu, Zhefu Jiang, Zhen Xiao:
Twinkle: A fast resource provisioning mechanism for internet services. 802-810 - Clint Sparkman, Hsin-Tsang Lee, Dmitri Loguinov:
Agnostic topology-based spam avoidance in large-scale web crawls. 811-819 - Cong Wang, Kui Ren, Jia Wang:
Secure and practical outsourcing of linear programming in cloud computing. 820-828 - Ning Cao, Cong Wang, Ming Li, Kui Ren, Wenjing Lou:
Privacy-preserving multi-keyword ranked search over encrypted cloud data. 829-837
Wireless cross-layer design 1
- Peng-Jun Wan, Ophir Frieder, Xiaohua Jia, F. Frances Yao, XiaoHua Xu, Shaojie Tang:
Wireless link scheduling under physical interference model. 838-845 - Peng-Jun Wan, Yu Cheng, Zhu Wang, F. Frances Yao:
Multiflows in multi-channel multi-radio multihop wireless networks. 846-854 - Fung Po Tso, Lin Cui, Lizhuo Zhang, Weijia Jia, Di Yao, Jin Teng, Dong Xuan:
DragonNet: A robust mobile Internet service system for long distance trains. 855-863 - Marjan A. Baghaie, Bhaskar Krishnamachari:
Delay constrained minimum energy broadcast in cooperative wireless networks. 864-872
Wireless network monitoring and measurement 1
- Yunhao Liu, Yuan He, Mo Li, Jiliang Wang, Kebin Liu, Lufeng Mo, Wei Dong, Zheng Yang, Min Xi, Jizhong Zhao, Xiang-Yang Li:
Does wireless sensor network scale? A measurement study on GreenOrbs. 873-881 - Utpal Paul, Anand Prabhu Subramanian, Milind M. Buddhikot, Samir R. Das:
Understanding traffic dynamics in cellular data networks. 882-890 - Biao Han, Jie Li, Jinshu Su:
Self-supported congestion-aware networking for emergency services in WANETs. 891-899 - Roy Friedman, Alex Kogan, Yevgeny Krivolapov:
On power and throughput tradeoffs of WiFi and Bluetooth in smartphones. 900-908
Mobile ad hoc networks (MANET) 2
- Ze Li, Haiying Shen:
A hierarchical account-aided Reputation Management system for large-scale MANETs. 909-917 - Chi Zhang, Xiaoyan Zhu, Yang Song, Yuguang Fang:
C4: A new paradigm for providing incentives in multi-hop wireless networks. 918-926 - Joshua Reich, Vishal Misra, Dan Rubenstein, Gil Zussman:
Connectivity maintenance in mobile wireless networks via constrained mobility. 927-935
Peer-to-peer networks 2
- Fangming Liu, Shijun Shen, Bo Li, Baochun Li, Hao Yin, Sanli Li:
Novasky: Cinematic-quality VoD in a P2P storage cloud. 936-944 - Yipeng Zhou, Tom Z. J. Fu, Dah Ming Chiu:
Statistical modeling and analysis of P2P replication to support VoD service. 945-953 - Raphael Eidenbenz, Thomas Locher, Roger Wattenhofer:
Hidden communication in P2P networks Steganographic handshake and broadcast. 954-962 - Rubén Cuevas Rumín, Nikolaos Laoutaris, Xiaoyuan Yang, Georgos Siganos, Pablo Rodriguez:
Deep diving into BitTorrent locality. 963-971
Performance analysis and modeling 2
- Yuanzhong Xu, Xinbing Wang:
Fundamental lower bound for node buffer size in intermittently connected wireless networks. 972-980 - Peng-Jun Wan, Lixin Wang:
Asymptotic distribution of critical transmission radius for greedy forward routing. 981-989 - Hongkun Li, Yu Cheng, Peng-Jun Wan, Jiannong Cao:
Local sufficient rate constraints for guaranteed capacity region in multi-radio multi-channel wireless networks. 990-998 - Aditya Gopalan, Siddhartha Banerjee, Abhik Kumar Das, Sanjay Shakkottai:
Random mobility and the spread of infection. 999-1007
Network coding 2
- Jin Wang, Jianping Wang, Chuan Wu, Kejie Lu, Naijie Gu:
Anonymous communication with network coding against traffic analysis attack. 1008-1016 - Arash Saber Tehrani, Alexandros G. Dimakis, Michael J. Neely:
SigSag: Iterative detection through soft message-passing. 1017-1025 - Peng Zhang, Yixin Jiang, Chuang Lin, Hongyi Yao, Albert Wasef, Xuemin Shen:
Padding for orthogonality: Efficient subspace authentication for network coding. 1026-1034 - Hulya Seferoglu, Athina Markopoulou, K. K. Ramakrishnan:
I2NC: Intra- and inter-session network coding for unicast flows in wireless networks. 1035-1043
Wireless sensor network design 2
- Dezun Dong, Yunhao Liu, Xiangke Liao, Xiang-Yang Li:
Fine-grained location-free planarization in wireless sensor networks. 1044-1052 - Hongyu Zhou, Hongyi Wu, Su Xia, Miao Jin, Ning Ding:
A distributed triangulation algorithm for wireless sensor networks on 2D and 3D surface. 1053-1061 - Shouling Ji, Yingshu Li, Xiaohua Jia:
Capacity of dual-radio multi-channel wireless sensor networks for continuous data collection. 1062-1070 - Matthew P. Johnson, Amotz Bar-Noy:
Pan and scan: Configuring cameras for coverage. 1071-1079
CloudlGrid computing and networks 2
- Mathias Björkqvist, Lydia Y. Chen, Marko Vukolic, Xi Zhang:
Minimizing retrieval latency for content cloud. 1080-1088 - Danhua Guo, Laxmi N. Bhuyan:
A QoS aware multicore hash scheduler for network applications. 1089-1097 - Minghong Lin, Adam Wierman, Lachlan L. H. Andrew, Eno Thereska:
Dynamic right-sizing for power-proportional data centers. 1098-1106
Wireless cross-layer design 2
- Honghai Zhang, Yuanxi Jiang, Sampath Rangarajan, Baohua Zhao:
Multicast video delivery with switched beamforming antennas in indoor wireless networks. 1107-1115 - Guanhong Pei, V. S. Anil Kumar, Srinivasan Parthasarathy, Aravind Srinivasan:
Approximation algorithms for throughput maximization in wireless networks with delay constraints. 1116-1124 - Shyamnath Gollakota, Dina Katabi:
Physical layer wireless security made fast and channel independent. 1125-1133 - Sungro Yoon, Injong Rhee, Bang Chul Jung, Babak Daneshrad, Jae H. Kim:
Contrabass: Concurrent transmissions without coordination for ad hoc networks. 1134-1142
Wireless network monitoring and measurement 2
- Xinyu Xing, Jianxun Dang, Shivakant Mishra, Xue Liu:
A highly scalable bandwidth estimation of commercial hotspot access points. 1143-1151 - Pallavi Arora, Csaba Szepesvári, Rong Zheng:
Sequential learning for optimal monitoring of multi-channel wireless networks. 1152-1160 - Mariyam Mirza, Paul Barford, Xiaojin Zhu, Suman Banerjee, Michael Blodgett:
Fingerprinting 802.11 rate adaption algorithms. 1161-1169
Mobile ad hoc networks (MANET) 3
- Ryad Ben-El-Kezadri, Giovanni Pau, Thomas Claveirole:
TurboSync: Clock synchronization for shared media networks via principal component analysis with missing data. 1170-1178 - Gjergji Zyba, Geoffrey M. Voelker, Stratis Ioannidis, Christophe Diot:
Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd. 1179-1187 - Bruno Nardelli, Jinsung Lee, Kangwook Lee, Yung Yi, Song Chong, Edward W. Knightly, Mung Chiang:
Experimental evaluation of optimal CSMA. 1188-1196
Peer-to-peer networks 3
- Di Niu, Baochun Li:
Asymptotic optimality of randomized peer-to-peer broadcast with network coding. 1197-1205 - Weijie Wu, John C. S. Lui:
Exploring the optimal replication strategy in P2P-VoD systems: Characterization and evaluation. 1206-1214 - Frédérique E. Oggier, Anwitaman Datta:
Self-repairing homomorphic codes for distributed storage systems. 1215-1223 - Jie Dai, Bo Li, Fangming Liu, Baochun Li, Hai Jin:
On the efficiency of collaborative caching in ISP-aware P2P networks. 1224-1232
Performance analysis and modeling 3
- Ting He, Animashree Anandkumar, Dakshi Agrawal:
Index-based sampling policies for tracking dynamic networks under sampling constraints. 1233-1241 - Yashar Ghiassi-Farrokhfal, Jörg Liebeherr, Almut Burchard:
The impact of link scheduling on long paths: Statistical analysis and optimal bounds. 1242-1250 - Shreeshankar Bodas, Sanjay Shakkottai, Lei Ying, R. Srikant:
Scheduling for small delay in multi-rate multi-channel wireless networks. 1251-1259 - Jian Tan, Yang Yang, Ness B. Shroff, Hesham El Gamal:
Delay asymptotics with retransmissions and fixed rate codes over erasure channels. 1260-1268
Network Quality of Service
- Dejun Yang, Xi Fang, Guoliang Xue:
ESPN: Efficient server placement in probabilistic networks with budget constraint. 1269-1277 - Moti Geva, Amir Herzberg:
QoSoDoS: If you can't beat them, join them! 1278-1286 - Shaohe Lv, Weihua Zhuang, Xiaodong Wang, Xingming Zhou:
Scheduling in wireless ad hoc networks with successive interference cancellation. 1287-1295
Wireless sensor network design 3
- Yunbo Wang, Mehmet C. Vuran, Steve Goddard:
Analysis of event detection delay in wireless sensor networks. 1296-1304 - Lei Tang, Yanjun Sun, Omer Gurewitz, David B. Johnson:
PW-MAC: An energy-efficient predictive-wakeup MAC protocol for wireless sensor networks. 1305-1313 - Yang Peng, Zi Li, Daji Qiao, Wensheng Zhang:
Delay-bounded MAC with minimal idle listening for sensor networks. 1314-1322 - Shuguang Xiong, Jianzhong Li, Mo Li, Jiliang Wang, Yunhao Liu:
Multiple task scheduling for low-duty-cycled wireless sensor networks. 1323-1331
Energy-efficient networks 1
- Brian Guenter, Navendu Jain, Charles Williams:
Managing cost, performance, and reliability tradeoffs for energy-aware server provisioning. 1332-1340 - Canming Jiang, Yi Shi, Y. Thomas Hou, Sastry Kompella:
On optimal throughput-energy curve for multi-hop wireless networks. 1341-1349 - Yi Shi, Liguang Xie, Y. Thomas Hou, Hanif D. Sherali:
On renewable sensor networks with wireless energy transfer. 1350-1358 - Matthew Andrews, Spyridon Antonakopoulos, Lisa Zhang:
Energy-aware scheduling algorithms for network stability. 1359-1367
Data center networking 1
- Dan Li, Jiangwei Yu, Junbiao Yu, Jianping Wu:
Exploring efficient and scalable multicast routing in future data center networks. 1368-1376 - Jiao Zhang, Fengyuan Ren, Chuang Lin:
Modeling and understanding TCP incast in data center networks. 1377-1385 - Chao-Chih Chen, Lihua Yuan, Albert G. Greenberg, Chen-Nee Chuah, Prasant Mohapatra:
Routing-as-a-Service (RaaS): A framework For tenant-directed route control in data center. 1386-1394 - Yong Cui, Hongyi Wang, Xiuzhen Cheng:
Channel allocation in wireless data center networks. 1395-1403
Wireless network security 1
- Nam Tuan Nguyen, Guanbo Zheng, Zhu Han, Rong Zheng:
Device fingerprinting to enhance wireless security using nonparametric Bayesian method. 1404-1412 - Qian Wang, Ping Xu, Kui Ren, Xiang-Yang Li:
Delay-bounded adaptive UFH-based anti-jamming wireless communication. 1413-1421 - Qian Wang, Hai Su, Kui Ren, Kwangjo Kim:
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. 1422-1430 - Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy, Bernhard Plattner:
On the vulnerability of the proportional fairness scheduler to retransmission attacks. 1431-1439
Peer-to-peer networks 4
- Eitan Altman, Philippe Nain, Adam Shwartz, Yuedong Xu:
Predicting the impact of measures against P2P networks on the transient behaviors. 1440-1448 - Can Zhao, Xiaojun Lin, Chuan Wu:
The streaming capacity of sparsely-connected P2P systems with distributed control. 1449-1457 - Michael J. Neely, Leana Golubchik:
Utility optimization for dynamic peer-to-peer networks with tit-for-tat constraints. 1458-1466
Performance analysis and modeling 4
- François Baccelli, Jean Bolot:
Modeling the economic value of the location data of mobile users. 1467-1475 - Devu Manikantan Shila, Yu Cheng, Tricha Anjali:
Throughput and delay analysis of hybrid wireless networks with multi-hop uplinks. 1476-1484 - Pan Li, Miao Pan, Yuguang Fang:
The capacity of three-dimensional wireless ad hoc networks. 1485-1493 - George Iosifidis, Iordanis Koutsopoulos, Georgios Smaragdakis:
The impact of storage capacity on end-to-end delay in time varying networks. 1494-1502
Optical networks
- Yang Wang, Xiaojun Cao, Yi Pan:
A study of the routing and spectrum allocation in spectrum-sliced Elastic Optical Path networks. 1503-1511 - Matthew Johnston, Hyang-Won Lee, Eytan H. Modiano:
A robust optimization approach to backup network design with random failures. 1512-1520 - Pankaj K. Agarwal, Alon Efrat, Shashidhara K. Ganjugunte, David Hay, Swaminathan Sankararaman, Gil Zussman:
The resilience of WDM networks to probabilistic geographical failures. 1521-1529 - Lin Liu, Zhenghao Zhang, Yuanyuan Yang:
Packet scheduling in a low-latency optical switch with wavelength division multiplexing and electronic buffer. 1530-1538
Wireless sensor network design 4
- Kebin Liu, Qiang Ma, Xibin Zhao, Yunhao Liu:
Self-diagnosis for large scale wireless sensor networks. 1539-1547 - Xin Miao, Kebin Liu, Yuan He, Yunhao Liu, Dimitris Papadias:
Agnostic diagnosis: Discovering silent failures in wireless sensor networks. 1548-1556 - Ling Ding, Weili Wu, James Willson, Hongjie Du, Wonjun Lee:
Construction of directional virtual backbones with minimum routing cost in wireless networks. 1557-1565 - Dijun Luo, Xiaojun Zhu, Xiaobing Wu, Guihai Chen:
Maximizing lifetime for the shortest path aggregation tree in wireless sensor networks. 1566-1574
Energy-efficient networks 2
- Paul Balister, Béla Bollobás, Animashree Anandkumar, Alan S. Willsky:
Energy-latency tradeoff for in-network function computation in random networks. 1575-1583 - Yi Xu, Wenye Wang:
Information delivery in large wireless networks with minimum energy expense. 1584-1592 - Tao Jin, Guevara Noubir, Bo Sheng:
WiZi-Cloud: Application-transparent dual ZigBee-WiFi radios for low power internet access. 1593-1601 - Maria Gorlatova, Aya Wallwater, Gil Zussman:
Networking low-power energy harvesting devices: Measurements and algorithms. 1602-1610
Data center networking 2
- Longjiang Guo, Raheem A. Beyah, Yingshu Li:
SMITE: A stochastic compressive data collection protocol for Mobile Wireless Sensor Networks. 1611-1619 - Yingying Chen, Sourabh Jain, Vijay Kumar Adhikari, Zhi-Li Zhang, Kuai Xu:
A first look at inter-data center traffic characteristics via Yahoo! datasets. 1620-1628 - Andrew R. Curtis, Wonho Kim, Praveen Yalagandula:
Mahout: Low-overhead datacenter traffic management using end-host-based elephant detection. 1629-1637
Wireless network security 2
- Jin Tang, Yu Cheng, Weihua Zhuang:
An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks. 1638-1646 - Wei Dong, Vacha Dave, Lili Qiu, Yin Zhang:
Secure friend discovery in mobile social networks. 1647-1655 - Kanthakumar Pongaliur, Li Xiao:
Maintaining source privacy under eavesdropping and node compromise attacks. 1656-1664 - Hao Han, Fengyuan Xu, Chiu C. Tan, Yifan Zhang, Qun Li:
Defending against vehicular rogue APs. 1665-1673
Performance analysis and modeling 5
- Tae Hyun Kim, Jian Ni, R. Srikant, Nitin H. Vaidya:
On the achievable throughput of CSMA under imperfect carrier sensing. 1674-1682 - M. H. R. Khouzani, Saswati Sarkar, Eitan Altman:
Optimal control of epidemic evolution. 1683-1691 - Zhiyang Guo, Zhemin Zhang, Yuanyuan Yang:
Performance modeling of hybrid optical packet switches with shared buffer. 1692-1700
Cyber-physical systems and networks
- Cheng Wang, Changjun Jiang, Yunhao Liu, Xiang-Yang Li, Shaojie Tang, Huadong Ma:
Aggregation capacity of wireless sensor networks: Extended network case. 1701-1709 - Aniket Pingley, Nan Zhang, Xinwen Fu, Hyeong-Ah Choi, Suresh Subramaniam, Wei Zhao:
Protection of query privacy for continuous location based services. 1710-1718 - Matthew Keally, Gang Zhou, Guoliang Xing, Jianxin Wu:
Exploiting sensing diversity for confident sensing in wireless sensor networks. 1719-1727
Network algorithms and calculus 1
- Michael J. Neely:
Opportunistic scheduling with worst case delay guarantees in single and multi-hop networks. 1728-1736 - Hongwei Du, Qiang Ye, Weili Wu, Wonjun Lee, Deying Li, Ding-Zhu Du, Stephen Howard:
Constant approximation for virtual backbone construction with Guaranteed Routing Cost in wireless sensor networks. 1737-1744 - Yan Qiao, Tao Li, Shigang Chen:
One memory access bloom filters and their generalization. 1745-1753 - Rachit Agarwal, Philip Brighten Godfrey, Sariel Har-Peled:
Approximate distance queries and compact routing in sparse graphs. 1754-1762
Wireless sensor network design 5
- Lei Yu, Jianzhong Li, Siyao Cheng, Shuguang Xiong:
Secure continuous aggregation via sampling-based verification in wireless sensor networks. 1763-1771 - Ryo Sugihara, Rajesh K. Gupta:
Sensor localization with deterministic accuracy guarantee. 1772-1780 - Yi Wang, Guohong Cao:
On full-view coverage in camera sensor networks. 1781-1789 - Yi Wang, Guohong Cao:
Minimizing service delay in directional sensor networks. 1790-1798
Internet monitoring and measurement 1
- Tao Li, Shigang Chen, Yibei Ling:
Fast and compact per-flow traffic measurement through randomized counter sharing. 1799-1807 - Xiaoming Wang, Xiaoyong Li, Dmitri Loguinov:
Modeling residual-geometric flow sampling. 1808-1816 - Ralf Lübben, Markus Fidler, Jörg Liebeherr:
A foundation for stochastic bandwidth estimation of networks with random service. 1817-1825 - Imed Lassoued, Amir Krifa, Chadi Barakat, Konstantin Avrachenkov:
Network-wide monitoring through self-configuring adaptive system. 1826-1834
Firewalls and network intrusion detection 1
- Ze Li, Haiying Shen:
SOAP: A Social network Aided Personalized and effective spam filter to clean your e-mail box. 1835-1843 - Matthew Knysz, Xin Hu, Kang G. Shin:
Good guys vs. Bot Guise: Mimicry attacks against fast-flux detection systems. 1844-1852 - Yi-Hua E. Yang, Viktor K. Prasanna:
Space-time tradeoff in regular expression matching with semi-deterministic finite automata. 1853-1861
Wireless network security 3
- Fengyuan Xu, Zhengrui Qin, Chiu C. Tan, Baosheng Wang, Qun Li:
IMDGuard: Securing implantable medical devices with the external wearable guardian. 1862-1870 - Zhuo Lu, Wenye Wang, Cliff Wang:
From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic. 1871-1879 - Kai Zeng, Kannan Govindan, Daniel Wu, Prasant Mohapatra:
Identity-based attack detection in mobile wireless networks. 1880-1888 - Zhichao Zhu, Guohong Cao:
APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based services. 1889-1897
Network optimization
- Sushant Sharma, Yi Shi, Y. Thomas Hou, Hanif D. Sherali, Sastry Kompella:
Optimizing network-coded cooperative communications via joint session grouping and relay node selection. 1898-1906 - Xi Fang, Dejun Yang, Guoliang Xue:
Consort: Node-Constrained Opportunistic Routing in wireless mesh networks. 1907-1915 - Yi Shi, Jia Liu, Canming Jiang, Cunhao Gao, Y. Thomas Hou:
An optimal link layer model for multi-hop MIMO networks. 1916-1924 - Jianping Wang, Chunming Qiao, Hongfang Yu:
On progressive network recovery after a major disruption. 1925-1933
Miscellaneous topics
- Xu Li, Nathalie Mitton, Isabelle Simplot-Ryl, David Simplot-Ryl:
A novel family of geometric planar graphs for wireless ad hoc networks. 1934-1942 - Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim:
Keep your friends close: Incorporating trust into social network-based Sybil defenses. 1943-1951 - Yi-Ruei Chen, J. D. Tygar, Wen-Guey Tzeng:
Secure group key management using uni-directional proxy re-encryption schemes. 1952-1960 - Sastry Kompella, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides:
Stable throughput tradeoffs in cognitive shared channels with cooperative relaying. 1961-1969
Network algorithms and calculus 2
- Jens B. Schmitt, Nicos Gollan, Steffen Bondorf, Ivan Martinovic:
Pay bursts only once holds for (some) non-FIFO systems. 1970-1978 - Florin Ciucu, Jens B. Schmitt, Hao Wang:
On expressing networks with flow transformations in convolution-form. 1979-1987 - Florin Ciucu, Oliver Hohlfeld, Lydia Y. Chen:
On the convergence to fairness in overloaded FIFO systems. 1988-1996 - Zengfeng Huang, Ke Yi, Yunhao Liu, Guihai Chen:
Optimal sampling algorithms for frequency estimation in distributed data. 1997-2005
Wireless sensor network design 6
- Shibo He, Jiming Chen, Fachang Jiang, David K. Y. Yau, Guoliang Xing, Youxian Sun:
Energy provisioning in wireless rechargeable sensor networks. 2006-2014 - Khuong Vu, Rong Zheng:
Robust coverage under uncertainty in wireless sensor networks. 2015-2023 - Michael M. Groat, Wenbo He, Stephanie Forrest:
KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. 2024-2032 - Robert Sauter, Olga Saukh, Oliver Frietsch, Pedro José Marrón:
TinyLTS: Efficient network-wide Logging and Tracing System for TinyOS. 2033-2041
Wireless mesh networks
- Xin Zhao, Jun Guo, Chun Tung Chou, Archan Misra, Sanjay K. Jha:
A high-throughput routing metric for reliable multicast in multi-rate wireless mesh networks. 2042-2050 - Yong Ding, Yang Yang, Li Xiao:
Multi-path routing and rate allocation for multi-source video on-demand streaming in wireless mesh networks. 2051-2059 - Weiyi Zhang, Shi Bai, Guoliang Xue, Jian Tang, Chonggang Wang:
DARP: Distance-aware relay placement in WiMAX mesh networks. 2060-2068 - Arik Motskin, Ian Downes, Branislav Kusy, Omprakash Gnawali, Leonidas J. Guibas:
Network warehouses: Efficient information distribution to mobile users. 2069-2077
Internet monitoring and measurement 2
- Kuai Xu, Feng Wang, Lin Gu:
Network-aware behavior clustering of Internet end hosts. 2078-2086 - Weiyu Xu, Enrique Mallada, Ao Tang:
Compressive sensing over graphs. 2087-2095 - Xiaofei Wu, Ke Yu, Xin Wang:
On the growth of Internet application flows: A complex network perspective. 2096-2104 - Paul Tune, Darryl Veitch:
Sampling vs sketching: An information theoretic comparison. 2105-2113
Firewalls and network intrusion detection 2
- Yaxuan Qi, Kai Wang, Jeffrey Fong, Yibo Xue, Jun Li, Weirong Jiang, Viktor K. Prasanna:
FEACAN: Front-end acceleration for content-aware network processing. 2114-2122 - Hrishikesh B. Acharya, Mohamed G. Gouda:
Firewall verification and redundancy checking are equivalent. 2123-2128 - Tingwen Liu, Yifu Yang, Yanbing Liu, Yong Sun, Li Guo:
An efficient regular expressions compression algorithm from a new perspective. 2129-2137
Wireless network security 4
- M. H. R. Khouzani, Saswati Sarkar, Eitan Altman:
A dynamic game solution to malware attack. 2138-2146 - Xiaodong Lin, Rongxing Lu, Xiaohui Liang, Xuemin Shen:
STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs. 2147-2155 - Zhuo Hao, Sheng Zhong, Li Erran Li:
Towards wireless security without computational assumptions - An oblivious transfer protocol based on an unauthenticated wireless channel. 2156-2164 - Yunchuan Wei, Kai Zeng, Prasant Mohapatra:
Adaptive wireless channel probing for shared key generation. 2165-2173
Vehicular networks
- Xu Li, Xuegang Yu, Aditya Wagh, Chunming Qiao:
Human factors-aware service scheduling in Vehicular Cyber-Physical systems. 2174-2182 - Yuchen Wu, Yanmin Zhu, Bo Li:
Trajectory improves data delivery in vehicular networks. 2183-2191 - Hongzi Zhu, Shan Chang, Minglu Li, Kshirasagar Naik, Sherman X. Shen:
Exploiting temporal dependency for opportunistic forwarding in urban vehicular networks. 2192-2200 - Bo Yu, Fan Bai:
ETP: Encounter Transfer Protocol for opportunistic vehicle communication. 2201-2209
Cognitive radio and software defined radio 1
- Wentao Huang, Xinbing Wang:
Throughput and delay scaling of general cognitive networks. 2210-2218 - Lara B. Deek, Xia Zhou, Kevin C. Almeroth, Haitao Zheng:
To preempt or not: Tackling bid and time-based cheating in online spectrum auctions. 2219-2227 - Lei Yang, Hongseok Kim, Junshan Zhang, Mung Chiang, Chee-Wei Tan:
Pricing-based spectrum access control in cognitive radio networks with random access. 2228-2236 - Miao Pan, Chi Zhang, Pan Li, Yuguang Fang:
Joint routing and link scheduling for cognitive radio networks under uncertain spectrum supply. 2237-2245
Wireless sensor network design 7
- Zhenjiang Li, Mo Li, Jiliang Wang, Zhichao Cao:
Ubiquitous data collection for mobile users in wireless sensor networks. 2246-2254 - Bowu Zhang, Xiuzhen Cheng, Nan Zhang, Yong Cui, Yingshu Li, Qilian Liang:
Sparse target counting and localization in sensor networks based on compressive sensing. 2255-2263 - Zuoming Yu, Jin Teng, Xiaole Bai, Dong Xuan, Weijia Jia:
Connected coverage in wireless networks with directional antennas. 2264-2272 - Shengbo Chen, Prasun Sinha, Ness B. Shroff, Changhee Joo:
Finite-horizon energy allocation and routing scheme in rechargeable sensor networks. 2273-2281
Online social networks
- Nam P. Nguyen, Thang N. Dinh, Ying Xuan, My T. Thai:
Adaptive algorithms for detecting community structure in dynamic social networks. 2282-2290 - Shaojie Tang, Jing Yuan, XuFei Mao, Xiang-Yang Li, Wei Chen, Guojun Dai:
Relationship classification in large scale online social networks and its impact on information propagation. 2291-2299 - Michael Sirivianos, Kyungbaek Kim, Xiaowei Yang:
SocialFilter: Introducing social trust to collaborative spam mitigation. 2300-2308 - Youngsang Shin, Minaxi Gupta, Steven A. Myers:
Prevalence and mitigation of forum spamming. 2309-2317
Scheduling, flow, and congestion control 1
- Krishna P. Jagannathan, Mihalis G. Markakis, Eytan H. Modiano, John N. Tsitsiklis:
Queue length asymptotics for generalized max-weight scheduling in the presence of heavy-tailed traffic. 2318-2326 - Peng-Jun Wan, Chao Ma, Zhu Wang, Boliu Xu, Minming Li, Xiaohua Jia:
Weighted wireless link scheduling without information of positions and interference/communication radii. 2327-2335 - V. J. Venkataramanan, Xiaojun Lin:
Low-complexity scheduling algorithm for sum-queue minimization in wireless convergecast. 2336-2344 - Ching-Ming Lien, Cheng-Shang Chang, Jay Cheng, Duan-Shin Lee:
Maximizing throughput in wireless networks with finite internal buffers. 2345-2353
Internet monitoring and measurement 3
- Myungjin Lee, Mohammad Y. Hajjat, Ramana Rao Kompella, Sanjay G. Rao:
RelSamp: Preserving application structure in sampled flow measurements. 2354-2362 - Joel Sommers, Rhys Alistair Bowden, Brian Eriksson, Paul Barford, Matthew Roughan, Nick G. Duffield:
Efficient network-wide flow record generation. 2363-2371 - Angela Wang, Cheng Huang, Jin Li, Keith W. Ross:
Estimating the performance of hypothetical cloud service deployments: A measurement-based approach. 2372-2380
Future Internet architectures
- Sourabh Jain, Yingying Chen, Zhi-Li Zhang:
VIRO: A scalable, robust and namespace independent virtual Id routing for future networks. 2381-2389 - Talmai Oliveira, Srisudha Mahadevan, Dharma P. Agrawal:
Handling network uncertainty in heterogeneous wireless networks. 2390-2398 - Mikko Särelä, Christian Esteve Rothenberg, Tuomas Aura, András Zahemszky, Pekka Nikander, Jörg Ott:
Forwarding anomalies in Bloom filter-based multicast. 2399-2407
Network privacy and trustworthiness
- Ting Wang, Yaling Yang:
Location privacy protection from RSS localization system using antenna pattern synthesis. 2408-2416 - Yu Hua, Xue Liu:
Scheduling design and analysis for end-to-end heterogeneous flows in an avionics network. 2417-2425 - Junwei Huang, Xian Pan, Xinwen Fu, Jie Wang:
Long PN code based DSSS watermarking. 2426-2434 - Ming Li, Ning Cao, Shucheng Yu, Wenjing Lou:
FindU: Privacy-preserving personal profile matching in mobile social networks. 2435-2443
Cognitive radio and software defined radio 2
- Zhiyong Lin, Hai Liu, Xiaowen Chu, Yiu-Wing Leung:
Jump-stay based channel-hopping algorithm with guaranteed rendezvous for cognitive radio networks. 2444-2452 - Hyoil Kim, Jaehyuk Choi, Kang G. Shin:
Wi-Fi 2.0: Price and quality competitions of duopoly cognitive radio wireless service providers with time-varying spectrum availability. 2453-2461 - Cem Tekin, Mingyan Liu:
Online learning in opportunistic spectrum access: A restless bandit approach. 2462-2470 - Yifan Zhang, Qun Li, Gexin Yu, Baosheng Wang:
ETCH: Efficient Channel Hopping for communication rendezvous in dynamic spectrum access networks. 2471-2479
Wireless sensor network design 8
- Ziguo Zhong, Pengpeng Chen, Tian He:
On-demand time synchronization with predictable accuracy. 2480-2488 - Pu Wang, Rui Dai, Ian F. Akyildiz:
Visual correlation-based image gathering for wireless multimedia sensor networks. 2489-2497 - (Withdrawn) Optimal multiple-coverage of sensor networks. 2498-2506
- Qing Cao, Xiaorui Wang, Hairong Qi, Tian He:
r-Kernel: An operating system foundation for highly reliable networked embedded systems. 2507-2515
Wireless resource/spectrum management 1
- Mingyi Hong, Alfredo García, Jorge Barrera:
Joint distributed access point selection and power allocation in cognitive radio networks. 2516-2524 - Zvi Lotker, Merav Parter, David Peleg, Yvonne-Anne Pignolet:
Distributed power control in the SINR model. 2525-2533 - Haiping Liu, Xiaoling Qiu, Dipak Ghosal, Chen-Nee Chuah, Xin Liu, Yueyue Fan:
Traffic-tracing gateway (TTG). 2534-2542 - Sundeep Rangan, Ritesh Madan:
Belief propagation methods for intercell interference coordination. 2543-2551
Wireless cellular networks 1
- Chee Wei Tan:
Optimal power control in Rayleigh-fading heterogeneous networks. 2552-2560 - Yingsong Huang, Shiwen Mao:
Downlink power control for variable bit rate videos over multicell wireless networks. 2561-2569 - Wei Yu, Taesoo Kwon, Changyong Shin:
Multicell coordination via joint scheduling, beamforming and power spectrum adaptation. 2570-2578
Scheduling, flow, and congestion control 2
- Bo Ji, Changhee Joo, Ness B. Shroff:
Delay-based Back-Pressure scheduling in multi-hop wireless networks. 2579-2587 - Po-Kai Huang, Xiaojun Lin, Chih-Chun Wang:
A low-complexity congestion control and scheduling algorithm for multihop wireless networks with order-optimal per-flow delay. 2588-2596 - Bin Li, Atilla Eryilmaz:
On the limitations of randomization for Queue-Length-Based Scheduling in wireless networks. 2597-2605 - Yishay Mansour, Boaz Patt-Shamir, Dror Rawitz:
Overflow management with multipart packets. 2606-2614
Internet monitoring and measurement 4
- Cheng Huang, David A. Maltz, Jin Li, Albert G. Greenberg:
Public DNS system and Global Traffic Management. 2615-2623 - Jun Li, Scott Brooks:
I-seismograph: Observing and measuring Internet earthquakes. 2624-2632 - Xin Hu, Matthew Knysz, Kang G. Shin:
Measurement and analysis of global IP-usage patterns of fast-flux botnets. 2633-2641
Wireless LAN/MAN 1
- Giusi Alfano, Michele Garetto, Emilio Leonardi:
New insights into the stochastic geometry analysis of dense CSMA networks. 2642-2650 - Yinjie Chen, Zhongli Liu, Benyuan Liu, Xinwen Fu, Wei Zhao:
Identifying mobiles hiding behind wireless routers. 2651-2659 - Yan Gao, Chee Wei Tan, Ying Huang, Zheng Zeng, P. R. Kumar:
Feasibility and optimization of delay guarantees for non-homogeneous flows in IEEE 802.11 WLANs. 2660-2668 - Zheng Zeng, Yan Gao, Kun Tan, P. R. Kumar:
CHAIN: Introducing minimum controlled coordination into random access MAC. 2669-2677
Network economics and pricing
- Yong Cui, Tianze Ma, Xiuzhen Cheng:
Multi-hop access pricing in public area WLANs. 2678-2686 - Yi Gai, Hua Liu, Bhaskar Krishnamachari:
A packet dropping-based incentive mechanism for M/M/1 queues with selfish users. 2687-2695 - Shaolei Ren, Jaeok Park, Mihaela van der Schaar:
User subscription dynamics and revenue maximization in communications markets. 2696-2704 - Chandramani Kishore Singh, Eitan Altman:
The wireless multicast coalition game and the non-cooperative association problem. 2705-2713
Cognitive radio and software defined radio 3
- Sha Hua, Hang Liu, Mingquan Wu, Shivendra S. Panwar:
Exploiting MIMO antennas in cooperative cognitive radio networks. 2714-2722 - Tengyi Zhang, Danny H. K. Tsang:
Optimal Cooperative Sensing Scheduling for energy-efficient Cognitive Radio Networks. 2723-2731 - Chengzhi Li, Huaiyu Dai:
Transport throughput of secondary networks in spectrum sharing systems. 2732-2740 - Chonggang Wang, Kazem Sohraby, Rittwik Jana, Lusheng Ji, Mahmoud Daneshmand:
Network selection for secondary users in cognitive radio systems. 2741-2749
Wireless sensor network design 9
- Zhen Ren, Gang Zhou, Andrew J. Pyles, Matthew Keally, Weizhen Mao, Haining Wang:
BodyT2: Throughput and time delay performance assurance for heterogeneous BSNs. 2750-2758 - Miao Zhao, Yuanyuan Yang:
A framework for mobile data gathering with load balanced clustering and MIMO uploading. 2759-2767 - Xuefeng Liu, Jiannong Cao, Steven Lai, Chao Yang, Hejun Wu, Youlin Xu:
Energy efficient clustering for WSN-based structural health monitoring. 2768-2776 - Yaling Yang, Yujun Li, Mengshu Hou:
Many-to-one deliverability of greedy routing in 2-D wireless sensor networks. 2777-2785
Wireless resourcelspectrum management 2
- Zhe Yang, Yuanqian Luo, Lin Cai:
Network modulation: A new dimension to enhance wireless network performance. 2786-2794 - Zih-Ci Lin, Huai-Lei Fu, Phone Lin:
Dynamic Channel Allocation for wireless zone-based Multicast and Broadcast Service. 2795-2803 - Fan Wu, Nikhil Singh, Nitin H. Vaidya, Guihai Chen:
On adaptive-width channel allocation in non-cooperative, multi-radio wireless networks. 2804-2812 - Mahmoud Al-Ayyoub, Himanshu Gupta:
Truthful spectrum auctions with approximate revenue. 2813-2821
Wireless cellular networks 2
- Mohit Thakur, Nadia Fawaz, Muriel Médard:
Optimal relay location and power allocation for low SNR broadcast relay channels. 2822-2830 - Pan Li, Xiaoxia Huang, Yuguang Fang:
Capacity scaling of multihop cellular networks. 2831-2839 - Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuzmanovic, Antonio Nucci:
Taming user-generated content in mobile networks via Drop Zones. 2840-2848
Scheduling, flow, and congestion control 3
- Urtzi Ayesta, Peter Jacko, Vladimír Novák:
A nearly-optimal index rule for scheduling of users with abandonment. 2849-2857 - Meghana M. Amble, Parimal Parag, Srinivas Shakkottai, Lei Ying:
Content-aware caching and traffic management in content distribution networks. 2858-2866 - Mahdi Lotfinezhad, Peter Marbach:
Throughput-optimal random access with order-optimal delay. 2867-2875 - Vinod Ramaswamy, Diganto Choudhury, Srinivas Shakkottai:
Which protocol? Mutual interaction of heterogeneous congestion controllers. 2876-2884
Network protocols
- Hyungsoo Jung, Shin Gyu Kim, Heon Young Yeom, Sooyong Kang, Lavy Libman:
Adaptive delay-based congestion control for high bandwidth-delay product networks. 2885-2893 - Jingyuan Wang, Jiangtao Wen, Jun Zhang, Yuxing Han:
TCP-FIT: An improved TCP congestion control algorithm and its performance. 2894-2902 - Fei Chen, Bezawada Bruhadeshwar, Alex X. Liu:
A cross-domain privacy-preserving protocol for cooperative firewall optimization. 2903-2911 - Shruti Sanadhya, Raghupathy Sivakumar:
Adaptive flow control for TCP on mobile phones. 2912-2920
Wireless LAN/MAN 2
- Amitabha Amitava Ghosh, Rittwik Jana, V. Ramaswami, Jim Rowland, N. K. Shankaranarayanan:
Modeling and characterization of large-scale Wi-Fi traffic in public hot-spots. 2921-2929 - Kyu-Han Kim, Alexander W. Min, Dhruv Gupta, Prasant Mohapatra, Jatinder Pal Singh:
Improving energy efficiency of Wi-Fi sensing on smartphones. 2930-2938 - Jie Xiong, Romit Roy Choudhury:
PeerCast: Improving link layer multicast through cooperative relaying. 2939-2947
Internet routing
- Gábor Rétvári, János Tapolcai, Gábor Enyedi, András Császár:
IP fast ReRoute: Loop Free Alternates revisited. 2948-2956 - Marco Chiesa, Luca Cittadini, Giuseppe Di Battista, Stefano Vissicchio:
Local transit policies and the complexity of BGP Stability Testing. 2957-2965 - Martin Suchara, Alex Fabrikant, Jennifer Rexford:
BGP safety with spurious updates. 2966-2974 - Alex Fabrikant, Umar Syed, Jennifer Rexford:
There's something about MRAI: Timing diversity can exponentially worsen BGP convergence. 2975-2983
Cognitive radio and software defined radio 4
- Dongyue Xue, Eylem Ekici:
Guaranteed opportunistic scheduling in multi-hop cognitive radio networks. 2984-2992 - Alexander W. Min, Kyu-Han Kim, Jatinder Pal Singh, Kang G. Shin:
Opportunistic spectrum access for mobile cognitive radios. 2993-3001 - Karim Khalil, Mehmet Karaca, Özgür Erçetin, Eylem Ekici:
Optimal scheduling in cooperate-to-join Cognitive Radio Networks. 3002-3010 - Yi Song, Jiang Xie:
Performance analysis of spectrum handoff for cognitive radio ad hoc networks without common control channel under homogeneous primary traffic. 3011-3019
Wireless resource/spectrum management 3
- Ajay Gopinathan, Zongpeng Li, Chuan Wu:
Strategyproof auctions for balancing social welfare and fairness in secondary spectrum markets. 3020-3028 - Eyjolfur Ingi Asgeirsson, Pradipta Mitra:
On a game theoretic approach to capacity maximization in wireless networks. 3029-3037 - Qinghe Du, Xi Zhang:
Base-station selections for qos provisioning over distributed multi-user MIMO links in wireless networks. 3038-3046 - Chandrashekhar Thejaswi P. S., Tuan Tran, Junshan Zhang:
When compressive sampling meets multicast: Outage analysis and subblock network coding. 3047-3055
Scheduling, flow, and congestion control 4
- Wenzhuo Ouyang, Sugumar Murugesan, Atilla Eryilmaz, Ness B. Shroff:
Exploiting channel memory for joint estimation and scheduling in downlink networks. 3056-3064 - Ruogu Li, Atilla Eryilmaz:
Scheduling for end-to-end deadline-constrained traffic with reliability requirements in multi-hop networks. 3065-3073 - Hyunseok Chang, Murali S. Kodialam, Ramana Rao Kompella, T. V. Lakshman, Myungjin Lee, Sarit Mukherjee:
Scheduling in mapreduce-like systems for fast completion time. 3074-3082 - Lin Liu, Zhenghao Zhang, Yuanyuan Yang:
Pipelining packet scheduling in a low latency optical packet switch. 3083-3091
Wireless communications - Short-range (UWB, RFID, ...)
- Lei Yang, Jinsong Han, Yong Qi, Cheng Wang, Tao Gu, Yunhao Liu:
Season: Shelving interference and joint identification in large-scale RFID systems. 3092-3100 - Shigang Chen, Ming Zhang, Bin Xiao:
Efficient information collection protocols for sensor-augmented RFID networks. 3101-3109 - Nazif C. Tas, Tamer Nadeem, Ashok K. Agrawala:
Making wireless networks MORAL. 3110-3118
Delay tolerant networks
- Wei Gao, Guohong Cao:
User-centric data dissemination in disruption tolerant networks. 3119-3127 - Kyunghan Lee, Yoora Kim, Song Chong, Injong Rhee, Yung Yi:
Delay-capacity tradeoffs for mobile networks with Lévy walks and Lévy flights. 3128-3136 - Esa Hyytiä, Jorma T. Virtamo, Pasi E. Lassila, Jussi Kangasharju, Jörg Ott:
When does content float? Characterizing availability of anchored information in opportunistic content sharing. 3137-3145 - Eitan Altman, Veeraruna Kavitha, Francesco De Pellegrini, Vijay Kamble, Vivek S. Borkar:
Risk sensitive optimal control framework applied to delay tolerant networks. 3146-3154
Localization
- Junxing Zhang, Sneha Kumar Kasera, Neal Patwari, Piyush Rai:
Distinguishing locations across perimeters using wireless link measurements. 3155-3163 - Miao Jin, Su Xia, Hongyi Wu, Xianfeng Gu:
Scalable and fully distributed localization with mere connectivity. 3164-3172 - Sándor Laki, Péter Mátray, Péter Hága, Tamas Sebok, István Csabai, Gábor Vattay:
Spotter: A model based active geolocation service. 3173-3181 - Jun-geun Park, Dorothy Curtis, Seth J. Teller, Jonathan Ledlie:
Implications of device diversity for organic localization. 3182-3190
Router and switch design
- Isaac Keslassy, Kirill Kogan, Gabriel Scalosub, Michael Segal:
Providing performance guarantees in multipass network processors. 3191-3199 - Tao Li, Shigang Chen, Wen Luo, Ming Zhang:
Scan detection in high-speed networks based on optimal dynamic bit sharing. 3200-3208 - Lixiong Chen, Xue Liu, Qixin Wang, Yufei Wang:
A real-time multicast routing scheme for multi-hop switched fieldbuses. 3209-3217
Overlay networks and distributed computing
- Dinh Nguyen Tran, Jinyang Li, Lakshminarayanan Subramanian, Sherman S. M. Chow:
Optimal Sybil-resilient node admission control. 3218-3226 - Lu Zhang, Xueyan Tang:
Client assignment for improving interactivity in distributed interactive applications. 3227-3235 - Rami Cohen, Danny Raz:
Cost effective resource allocation of overlay routing relay nodes. 3236-3244
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.