default search action
31st INFOCOM 2012: Orlando, FL, USA
- Albert G. Greenberg, Kazem Sohraby:
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012. IEEE 2012, ISBN 978-1-4673-0773-4 - Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Exact throughput capacity under power control in mobile ad hoc networks. 1-9 - Yujun Zhang, Guiling Wang, Qi Hu, Zhongcheng Li, Jie Tian:
Design and performance study of a Topology-Hiding Multipath Routing protocol for mobile ad hoc networks. 10-18 - Wang Liu, Kejie Lu, Jianping Wang, Yi Qian, Tao Zhang, Liusheng Huang:
Capacity of distributed content delivery in large-scale wireless ad hoc networks. 19-27 - Nguyen Tien Viet, François Baccelli:
On the spatial modeling of wireless networks by random packing models. 28-36 - Richard Southwell, Jianwei Huang, Xin Liu:
Spectrum mobility games. 37-45 - Yingzhe Li, Xinbing Wang, Xiaohua Tian, Xue Liu:
Scaling laws for cognitive radio network with heterogeneous mobile secondary users. 46-54 - Yao Zhao, Hongyi Wu, Miao Jin, Su Xia:
Localization in 3D surface sensor networks: Challenges and solutions. 55-63 - Chenshu Wu, Zheng Yang, Yunhao Liu, Wei Xi:
WILL: Wireless indoor localization without site survey. 64-72 - Zhiguo Wan, Kai Xing, Yunhao Liu:
Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks. 73-81 - Jayashree Subramanian, Robert Tappan Morris, Hari Balakrishnan:
UFlood: High-throughput flooding over wireless mesh networks. 82-90 - Mohsen Sardari, Ahmad Beirami, Faramarz Fekri:
Memory-assisted universal compression of network flows. 91-99 - Peng Li, Song Guo, Shui Yu, Athanasios V. Vasilakos:
CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. 100-108 - Jin Teng, Junda Zhu, Boying Zhang, Dong Xuan, Yuan F. Zheng:
E-V: Efficient visual surveillance with electronic footprints. 109-117 - Junkun Li, Jiming Chen, Ten-Hwang Lai:
Energy-efficient intrusion detection with a barrier of probabilistic sensors. 118-126 - Chengjie Wu, You Xu, Yixin Chen, Chenyang Lu:
Submodular game for distributed application allocation in shared sensor networks. 127-135 - Huai-Lei Fu, Hou-Chun Chen, Phone Lin, Yuguang Fang:
Energy-efficient reporting mechanisms for multi-type real-time monitoring in Machine-to-Machine communications networks. 136-144 - Hongkun Li, Yu Cheng, Xiaohua Tian, Xinbing Wang:
A generic framework for throughput-optimal control in MR-MC wireless networks. 145-153 - Riccardo Crepaldi, Jeongkeun Lee, Raúl H. Etkin, Sung-Ju Lee, Robin Kravets:
CSI-SF: Estimating wireless channel state using CSI sampling & fusion. 154-162 - Feng Wang, Dan Wang, Jiangchuan Liu:
EleSense: Elevator-assisted wireless sensor data collection for high-rise structure monitoring. 163-171 - Hongxing Li, Chuan Wu, Zongpeng Li, Wei Huang, Francis C. M. Lau:
Stochastic optimal multirate multicast in socially selfish wireless networks. 172-180 - Chunyi Peng, Minkyong Kim, Zhe Zhang, Hui Lei:
VDN: Virtual machine image distribution network for cloud data centers. 181-189 - Yang Song, Murtaza Zafer, Kang-Won Lee:
Optimal bidding in spot instance market. 190-198 - Feng Wang, Jiangchuan Liu, Minghua Chen:
CALMS: Cloud-assisted live media streaming for globalized demands with time/region diversities. 199-207 - Orathai Sukwong, Akkarit Sangpetch, Hyong S. Kim:
SageShift: Managing SLAs for highly consolidated cloud. 208-216 - Huan Ma, Meng Yang, Deying Li, Yi Hong, Wenping Chen:
Minimum camera barrier coverage in wireless camera sensor networks. 217-225 - Dengyuan Wu, Dechang Chen, Kai Xing, Xiuzhen Cheng:
A statistical approach for target counting in sensor-based surveillance systems. 226-234 - Nan Hua, Ashwin Lall, Baochun Li, Jun (Jim) Xu:
A simpler and better design of error estimating coding. 235-243 - Xi Fang, Dejun Yang, Guoliang Xue:
Strategizing surveillance for resource-constrained event monitoring. 244-252 - Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Multicast capacity, delay and delay jitter in intermittently connected mobile networks. 253-261 - Xiaoyu Chu, Harish Sethu:
Cooperative topology control with adaptation for improved lifetime in wireless ad hoc networks. 262-270 - Xi Chen, Wentao Huang, Xinbing Wang, Xiaojun Lin:
Multicast capacity in mobile wireless ad hoc network with infrastructure support. 271-279 - Xi Fang, Dejun Yang, Guoliang Xue:
Resource allocation in load-constrained multihopwireless networks. 280-288 - Mustafa Al-Bado, Cigdem Sengul, Ruben Merz:
What details are needed for wireless simulations? - A study of a site-specific indoor wireless model. 289-297 - Xinfeng Li, Jin Teng, Boying Zhang, Adam C. Champion, Dong Xuan:
TurfCast: A service for controlling information dissemination in wireless networks. 298-306 - Haopeng Li, Jiang Xie:
A low-cost channel scheduling design for multi-hop handoff delay reduction in internet-based wireless mesh networks. 307-315 - Michael J. Neely, Arash Saber Tehrani, Zhen Zhang:
Dynamic index coding for wireless broadcast networks. 316-324 - Xunrui Yin, Xin Wang, Jin Zhao, Xiangyang Xue, Zongpeng Li:
On benefits of network coding in bidirected networks and hyper-networks. 325-333 - Hsiao-Chen Lu, Wanjiun Liao:
Cooperative multicasting in network-coding enabled multi-rate wireless relay networks. 334-342 - Anh Le, Athina Markopoulou:
On detecting pollution attacks in inter-session network coding. 343-351 - Nathaniel M. Jones, Brooke Shrader, Eytan H. Modiano:
Optimal routing and scheduling for a simple network coding scheme. 352-360 - Yongle Cao, Shuo Guo, Tian He:
Robust multi-pipeline scheduling in low-duty-cycle wireless sensor networks. 361-369 - Zhi Sun, Ian F. Akyildiz:
On capacity of magnetic induction-based wireless underground sensor networks. 370-378 - Shengbo Chen, Prasun Sinha, Ness B. Shroff, Changhee Joo:
A simple asymptotically optimal energy allocation and routing scheme in rechargeable sensor networks. 379-387 - Xiaohui Liang, Xu Li, Qinghua Shen, Rongxing Lu, Xiaodong Lin, Xuemin Shen, Weihua Zhuang:
Exploiting prediction to enable Secure and Reliable routing in Wireless Body Area Networks. 388-396 - Sobia Jangsher, Syed Ali Khayam, Qasim M. Chaudhari:
Application-aware MIMO Video Rate Adaptation. 397-405 - Aneesh Reddy, Sujay Sanghavi, Sanjay Shakkottai:
On the effect of channel fading on greedy scheduling. 406-414 - Peng-Jun Wan, Dechang Chen, Guojun Dai, Zhu Wang, F. Frances Yao:
Maximizing capacity with power control under physical interference model in duplex mode. 415-423 - Canming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou, Sastry Kompella, Scott F. Midkiff:
Squeezing the most out of interference: An optimization framework for joint interference exploitation and avoidance. 424-432 - Fangfei Chen, Katherine Guo, John Lin, Thomas La Porta:
Intra-cloud lightning: Building CDNs in the cloud. 433-441 - Haiyang Wang, Feng Wang, Jiangchuan Liu, Justin Groen:
Measurement and utilization of customer-provided resources for cloud computing. 442-450 - Cong Wang, Kui Ren, Shucheng Yu, Karthik Mahendra Raje Urs:
Achieving usable and privacy-assured similarity search over outsourced cloud data. 451-459 - Di Niu, Hong Xu, Baochun Li, Shuqiao Zhao:
Quality-assured cloud bandwidth auto-scaling for video-on-demand applications. 460-468 - Michal Ficek, Lukas Kencl:
Inter-Call Mobility model: A spatio-temporal refinement of Call Data Records using a Gaussian mixture model. 469-477 - Christos Dimitrakakis, Aikaterini Mitrokotsa, Serge Vaudenay:
Expected loss bounds for authentication in constrained channels. 478-485 - Siyao Cheng, Jianzhong Li, Lei Yu:
Location Aware Peak Value Queries in sensor networks. 486-494 - Bowu Zhang, Kai Xing, Xiuzhen Cheng, Liusheng Huang, Rongfang Bie:
Traffic clustering and online traffic prediction in vehicle networks: A social influence perspective. 495-503 - Donghyun Kim, Baraki H. Abay, R. N. Uma, Weili Wu, Wei Wang, Alade O. Tokuta:
Minimizing data collection latency in wireless sensor network with multiple mobile elements. 504-512 - Rahul Vaze:
Percolation and connectivity on the signal to interference ratio graph. 513-521 - Chi-Kin Chau, Richard J. Gibbens, Don Towsley:
Impact of directional transmission in large-scale multi-hop wireless ad hoc networks. 522-530 - Savvas Gitzenis, Georgios S. Paschos, Leandros Tassiulas:
Asymptotic laws for content replication and delivery in wireless networks. 531-539 - Andres Garcia-Saavedra, Albert Banchs, Pablo Serrano, Joerg Widmer:
Distributed Opportunistic Scheduling: A control theoretic approach. 540-548 - Xiaojun Feng, Jin Zhang, Qian Zhang, Bo Li:
Use your frequency wisely: Explore frequency domain for channel contention and ACK. 549-557 - Justin Manweiler, Peter Franklin, Romit Roy Choudhury:
RxIP: Monitoring the health of home wireless networks. 558-566 - Vinay Joseph, Gustavo de Veciana:
Jointly optimizing multi-user rate adaptation for video transport over wireless systems: Mean-fairness-variability tradeoffs. 567-575 - Liang He, Zhe Yang, Jianping Pan, Lin Cai, Jingdong Xu:
Evaluating service disciplines for mobile elements in wireless ad hoc sensor networks. 576-584 - Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Yingshu Li, Raheem A. Beyah:
Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks. 585-593 - Liang Liu, Anlong Ming, Huadong Ma, Xi Zhang:
A binary-classification-tree based framework for distributed target classification in multimedia sensor networks. 594-602 - Jin Wang, Shaojie Tang, Baocai Yin, Xiang-Yang Li:
Data gathering in wireless sensor networks through intelligent compressive sensing. 603-611 - Shaolei Ren, Jaeok Park, Mihaela van der Schaar:
Maximizing profit on user-generated content platforms with heterogeneous participants. 612-620 - Xinggong Zhang, Yang Xu, Hao Hu, Yong Liu, Zongming Guo, Yao Wang:
Profiling Skype video calls: Rate control and video quality. 621-629 - Antonio Carzaniga, Cyrus P. Hall, Michele Papalini:
Fully decentralized estimation of some global properties of a network. 630-638 - Xun Xiao, Minming Li, Jianping Wang, Chunming Qiao:
Optimal resource allocation to defend against deliberate attacks in networking infrastructures. 639-647 - Desmond W. H. Cai, Chee Wei Tan, Steven H. Low:
Optimal max-min fairness rate control in wireless networks: Perron-Frobenius characterization and algorithms. 648-656 - Mahdi Hajiaghayi, Min Dong, Ben Liang:
Jointly optimal bit loading, channel pairing and power allocation for multi-channel relaying. 657-665 - Chunsheng Xin, Min Song:
Dynamic spectrum access as a service. 666-674 - Gesualdo Scutari, Francisco Facchinei, Jong-Shi Pang, Lorenzo Lampariello:
Equilibrium selection in power control games on the interference channel. 675-683 - Yu Wu, Chuan Wu, Bo Li, Linquan Zhang, Zongpeng Li, Francis C. M. Lau:
Scaling social media applications into geo-distributed clouds. 684-692 - Ning Cao, Shucheng Yu, Zhenyu Yang, Wenjing Lou, Y. Thomas Hou:
LT codes-based secure and reliable cloud storage service. 693-701 - Siva Theja Maguluri, R. Srikant, Lei Ying:
Stochastic models of load balancing and scheduling in cloud computing clusters. 702-710 - Di Niu, Chen Feng, Baochun Li:
A theory of cloud bandwidth pricing for video-on-demand providers. 711-719 - Narendra Anand, Sung-Ju Lee, Edward W. Knightly:
STROBE: Actively securing wireless communications using Zero-Forcing Beamforming. 720-728 - Shuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan, Kai Xing, Xuemin Shen:
Location privacy preservation in collaborative spectrum sensing. 729-737 - Kaihe Xu, Qian Wang, Kui Ren:
Joint UFH and power control for effective wireless anti-jamming communication. 738-746 - Eric Graves, Tan F. Wong:
Detection of channel degradation attack by Intermediary Node in Linear Networks. 747-755 - Shangxing Wang, Youyun Xu, Xinbing Wang:
Motioncast with general Markovian mobility. 756-764 - Philippe Jacquet, Salman Malik, Bernard Mans, Alonso Silva:
On the throughput-delay trade-off in georouting networks. 765-773 - Canming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou, Sastry Kompella, Scott F. Midkiff:
Toward simple criteria to establish capacity scaling laws for wireless networks. 774-782 - Gruia Calinescu, Kan Qiao:
Asymmetric topology control: Exact solutions and fast approximations. 783-791 - Qiang Ma, Kebin Liu, Xin Miao, Yunhao Liu:
Sherlock is around: Detecting network failures with local evidence fusion. 792-800 - Zhenjiang Li, Mo Li, Yunhao Liu:
Towards energy-fairness in asynchronous duty-cycling sensor networks. 801-809 - Arthur J. Friend, Vahideh H. Manshadi, Amin Saberi:
Distributed node placement algorithms for constructing well-connected sensor networks. 810-818 - Shibo He, Jiming Chen, Xu Li, Xuemin Shen, Youxian Sun:
Cost-effective barrier coverage by mobile sensor networks. 819-827 - Tzvika Hartman, Avinatan Hassidim, Haim Kaplan, Danny Raz, Michal Segalov:
How to split a flow? 828-836 - Emilie Danna, Avinatan Hassidim, Haim Kaplan, Alok Kumar, Yishay Mansour, Danny Raz, Michal Segalov:
Upward Max Min Fairness. 837-845 - Emilie Danna, Subhasree Mandal, Arjun Singh:
A practical algorithm for balancing the max-min fairness and throughput objectives in traffic engineering. 846-854 - Magnús M. Halldórsson, Pradipta Mitra:
Wireless capacity and admission control in cognitive radio. 855-863 - Wenchi Cheng, Xi Zhang, Hailin Zhang:
Full/half duplex based resource allocations for statistical quality of service provisioning in wireless relay networks. 864-872 - Yuefei Zhu, Baochun Li, Zongpeng Li:
Truthful spectrum auction design for secondary networks. 873-881 - Dejun Yang, Xi Fang, Guoliang Xue:
Channel allocation in non-cooperative multi-radio multi-channel wireless networks. 882-890 - Zaixin Lu, Yan Shi, Weili Wu, Bin Fu:
Efficient data retrieval scheduling for multi-channel wireless data broadcast. 891-899 - Qiben Yan, Ming Li, Tingting Jiang, Wenjing Lou, Y. Thomas Hou:
Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks. 900-908 - Yao Liu, Peng Ning:
BitTrickle: Defending against broadband and high-power reactive jamming attacks. 909-917 - Martin Eian, Stig Fr. Mjølsnes:
A formal analysis of IEEE 802.11w deadlock vulnerabilities. 918-926 - Hongbo Liu, Jie Yang, Yan Wang, Yingying Chen:
Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks. 927-935 - Qian Wang, Kui Ren, Xiaoqiao Meng:
When cloud meets eBay: Towards effective pricing for cloud computing. 936-944 - Sokol Kosta, Andrius Aucinas, Pan Hui, Richard Mortier, Xinwen Zhang:
ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. 945-953 - Vimal Mathew, Ramesh K. Sitaraman, Prashant J. Shenoy:
Energy-aware load balancing in content delivery networks. 954-962 - Mansoor Alicherry, T. V. Lakshman:
Network aware resource allocation in distributed clouds. 963-971 - Xinxin Liu, Han Zhao, Miao Pan, Hao Yue, Xiaolin Li, Yuguang Fang:
Traffic-aware multiple mix zone placement for protecting location privacy. 972-980 - Shizhen Zhao, Xiaojun Lin:
On the design of scheduling algorithms for end-to-end backlog minimization in multi-hop wireless networks. 981-989 - Guner D. Celik, Eytan H. Modiano:
Scheduling in networks with time-varying channels and reconfiguration delay. 990-998 - Srikanth Hariharan, Ness B. Shroff:
On sample-path optimal dynamic scheduling for sum-queue minimization in trees under the K-hop interference model. 999-1007 - Shuguang Xiong, Lei Yu, Haiying Shen, Chen Wang, Wei Lu:
Efficient algorithms for sensor deployment and routing in sensor networks for network-structured environment monitoring. 1008-1016 - Zhe Yang, Lin Cai, Yu Liu, Jianping Pan:
Environment-aware clock skew estimation and synchronization for wireless sensor networks. 1017-1025 - Cheng Bo, Danping Ren, Shaojie Tang, Xiang-Yang Li, XuFei Mao, Qiuyuan Huang, Lufeng Mo, Zhiping Jiang, Yongmei Sun, Yunhao Liu:
Locating sensors in the forest: A case study in GreenOrbs. 1026-1034 - Shouling Ji, Raheem A. Beyah, Zhipeng Cai:
Snapshot/Continuous Data Collection capacity for large-scale probabilistic Wireless Sensor Networks. 1035-1043 - Sachin Kadloor, Negar Kiyavash, Parv Venkitasubramaniam:
Mitigating timing based information leakage in shared schedulers. 1044-1052 - Costas Courcoubetis, Antonis Dimakis:
Fair background data transfers of minimal delay impact. 1053-1061 - Jing Yang, Yanpei Liu, Stark C. Draper:
Optimal scheduling policies with mutual information accumulation in wireless networks. 1062-1070 - Aditya Gopalan, Constantine Caramanis, Sanjay Shakkottai:
Low-delay wireless scheduling with partial channel-state information. 1071-1079 - Karthikeyan Sundaresan, Sampath Rangarajan:
Adaptive resource scheduling in wireless OFDMA relay networks. 1080-1088 - Rohit Aggarwal, Can Emre Koksal, Philip Schniter:
Performance bounds and associated design principles for multi-cellular wireless OFDMA systems. 1089-1097 - Harish Ganapathy, Constantine Caramanis:
Queue-based sub-carrier grouping for feedback reduction in OFDMA systems. 1098-1106 - Negin Golrezaei, Karthikeyan Shanmugam, Alexandros G. Dimakis, Andreas F. Molisch, Giuseppe Caire:
FemtoCaching: Wireless video content delivery through distributed caching helpers. 1107-1115 - Andrew R. Curtis, Tommy Carpenter, Mustafa Elsheikh, Alejandro López-Ortiz, Srinivasan Keshav:
REWIRE: An optimization-based framework for unstructured data center network design. 1116-1124 - Xiaodong Wang, Yanjun Yao, Xiaorui Wang, Kefa Lu, Qing Cao:
CARPO: Correlation-aware power optimization in data center networks. 1125-1133 - Yuan Feng, Baochun Li, Bo Li:
Bargaining towards maximized resource utilization in video streaming datacenters. 1134-1142 - Fangfei Chen, Murali S. Kodialam, T. V. Lakshman:
Joint scheduling of processing and Shuffle phases in MapReduce systems. 1143-1151 - Cagatay Capar, Dennis Goeckel, Benyuan Liu, Don Towsley:
Secret communication in large wireless networks without eavesdropper location information. 1152-1160 - Jin Tang, Yu Cheng, Yong Hao:
Detection and prevention of SIP flooding attacks in voice over IP networks. 1161-1169 - Rui Zhang, Yanchao Zhang, Chi Zhang:
Secure top-k query processing via untrusted location-based service providers. 1170-1178 - Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik, Don Towsley:
Physical layer security from inter-session interference in large wireless networks. 1179-1187 - Sok-Ian Sou, Phone Lin, Ssu-Shih Chen, Jeu-Yih Jeng:
A novel multi-tariff charging method for next generation Multicast and Broadcast Service. 1188-1196 - Aemen Lodhi, Amogh Dhamdhere, Constantine Dovrolis:
GENESIS: An agent-based model of interdomain network formation, traffic flow and economics. 1197-1205 - Carlee Joe-Wong, Soumya Sen, Tian Lan, Mung Chiang:
Multi-resource allocation: Fairness-efficiency tradeoffs in a unifying framework. 1206-1214 - Youwen Yi, Jin Zhang, Qian Zhang, Tao Jiang:
Spectrum leasing to femto service provider with hybrid access. 1215-1223 - Wenzhuo Ouyang, Atilla Eryilmaz, Ness B. Shroff:
Asymptotically optimal downlink scheduling over Markovian fading channels. 1224-1232 - Yu Hua, Xue Liu, Wenbo He:
HOSA: Holistic scheduling and analysis for scalable fault-tolerant FlexRay design. 1233-1241 - Partha Dutta, Anand Seetharam, Vijay Arya, Malolan Chetlur, Shivkumar Kalyanaraman, Jim Kurose:
On managing quality of experience of multiple video streams in wireless networks. 1242-1250 - Sungsu Lim, Kyomin Jung, Matthew Andrews:
Stability of the Max-Weight protocol in adversarial wireless networks. 1251-1259 - Dianjie Lu, Xiaoxia Huang, Pan Li, Jianping Fan:
Connectivity of large-scale Cognitive Radio Ad Hoc Networks. 1260-1268 - Ilenia Tinnirello, Giuseppe Bianchi, Pierluigi Gallo, Domenico Garlisi, Francesco Giuliano, Francesco Gringoli:
Wireless MAC processors: Programming MAC protocols on commodity Hardware. 1269-1277 - Lei Sun, Wenye Wang:
Understanding the tempo-spatial limits of information dissemination in multi-channel Cognitive Radio Networks. 1278-1286 - Lei Sun, Wenye Wang:
On latency distribution and scaling: from finite to large Cognitive Radio Networks under general mobility. 1287-1295 - Liang Liu, Yuning Song, Huadong Ma, Xi Zhang:
Physarum optimization: A biology-inspired algorithm for minimal exposure path problem in wireless sensor networks. 1296-1304 - Songtao Guo, Yuanyuan Yang:
A distributed optimal framework for mobile data gathering with concurrent data uploading in wireless sensor networks. 1305-1313 - Changlei Liu, Guohong Cao:
Distributed critical location coverage in wireless sensor networks with lifetime constraint. 1314-1322 - Zhichao Cao, Yuan He, Yunhao Liu:
L2: Lazy forwarding in low duty cycle wireless sensor networks. 1323-1331 - Yao Liu, Fei Li, Lei Guo, Bo Shen, Songqing Chen:
A server's perspective of Internet streaming delivery to mobile devices. 1332-1340 - Muhammad Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Jia Wang:
Characterizing geospatial dynamics of application usage in a 3G cellular data network. 1341-1349 - Suk-Bok Lee, Dan Pei, MohammadTaghi Hajiaghayi, Ioannis Pefkianakis, Songwu Lu, He Yan, Zihui Ge, Jennifer Yates, Mario Kosseifi:
Threshold compression for 3G scalable monitoring. 1350-1358 - Qian (Clara) Li, Rose Qingyang Hu, Geng Wu, Yi Qian:
On the optimal mobile association in heterogeneous wireless relay networks. 1359-1367 - Jie Wu, Yunsheng Wang:
Social feature-based multi-path routing in delay tolerant networks. 1368-1376 - Nikodin Ristanovic, George Theodorakopoulos, Jean-Yves Le Boudec:
Traps and pitfalls of using contact traces in performance studies of opportunistic networks. 1377-1385 - Misael Mongiovì, Ambuj K. Singh, Xifeng Yan, Bo Zong, Konstantinos Psounis:
Efficient multicasting for delay tolerant networks using graph indexing. 1386-1394 - Rongxing Lu, Xiaodong Lin, Tom H. Luan, Xiaohui Liang, Xu Li, Le Chen, Xuemin Shen:
PReFilter: An efficient privacy-preserving Relay Filtering scheme for delay tolerant networks. 1395-1403 - Wanchun Jiang, Fengyuan Ren, Ran Shu, Chuang Lin:
Sliding Mode Congestion Control for data center Ethernet networks. 1404-1412 - Zhiyang Guo, Zhemin Zhang, Yuanyuan Yang:
Exploring server redundancy in nonblocking multicast data center networks. 1413-1421 - Guanfeng Liang, Benjamin Sommer, Nitin H. Vaidya:
Experimental performance comparison of Byzantine Fault-Tolerant protocols for data centers. 1422-1430 - Yuan Yao, Longbo Huang, Abhishek B. Sharma, Leana Golubchik, Michael J. Neely:
Data centers power reduction: A two time scale approach for delay tolerant workloads. 1431-1439 - Dawei Gong, Yuanyuan Yang:
AP association in 802.11n WLANs with heterogeneous clients. 1440-1448 - Kaishun Wu, Haochao Li, Lu Wang, Youwen Yi, Yunhuai Liu, Qian Zhang, Lionel M. Ni:
HJam: Attachment transmission in WLANs. 1449-1457 - Xi Chen, Yue Zhao, Brian Peck, Daji Qiao:
SAP: Smart Access Point with seamless load balancing multiple interfaces. 1458-1466 - Ehsan Aryafar, Mohammad Ali Khojastepour, Karthikeyan Sundaresan, Sampath Rangarajan, Edward W. Knightly:
ADAM: An adaptive beamforming system for multicasting in wireless LANs. 1467-1475 - Ning Lu, Tom H. Luan, Miao Wang, Xuemin Shen, Fan Bai:
Capacity and delay analysis for social-proximity urban vehicular networks. 1476-1484 - Yuchen Wu, Yanmin Zhu, Bo Li:
Infrastructure-assisted routing in vehicular networks. 1485-1493 - Joon Ahn, Yi Wang, Bo Yu, Fan Bai, Bhaskar Krishnamachari:
RISA: Distributed Road Information Sharing Architecture. 1494-1502 - Francesca Martelli, M. Elena Renda, Giovanni Resta, Paolo Santi:
A measurement-based study of beaconing performance in IEEE 802.11p vehicular networks. 1503-1511 - Valentino Pacifici, Frank Lehrieder, György Dán:
Cache capacity allocation for BitTorrent-like systems to minimize inter-ISP traffic. 1512-1520 - Yi Sun, Yang Richard Yang, Xiaobing Zhang, Yang Guo, Jun Li, Kavé Salamatian:
Network optimization for DHT-based applications. 1521-1529 - Yipeng Zhou, Tom Z. J. Fu, Dah Ming Chiu:
A unifying model and analysis of P2P VoD replication and scheduling. 1530-1538 - Delia Ciullo, Valentina Martina, Michele Garetto, Emilio Leonardi, Giovanni Luca Torrisi:
Stochastic analysis of self-sustainability in peer-assisted VoD systems. 1539-1547 - Cem Tekin, Mingyan Liu:
Approximately optimal adaptive learning in opportunistic spectrum access. 1548-1556 - Miao Pan, Pan Li, Yang Song, Yuguang Fang, Phone Lin:
Spectrum clouds: A session based spectrum trading system for multi-hop cognitive radio networks. 1557-1565 - Bo Gao, Jung-Min Park, Yaling Yang:
Uplink soft frequency reuse for self-coexistence of cognitive radio networks operating in white-space spectrum. 1566-1574 - Shuang Li, Zizhan Zheng, Eylem Ekici, Ness B. Shroff:
Maximizing system throughput by cooperative sensing in Cognitive Radio Networks. 1575-1583 - Ling Ding, Weili Wu, James Willson, Lidong Wu, Zaixin Lu, Wonjun Lee:
Constant-approximation for target coverage problem in wireless sensor networks. 1584-1592 - Shi Bai, Weiyi Zhang, Guoliang Xue, Jian Tang, Chonggang Wang:
DEAR: Delay-bounded Energy-constrained Adaptive Routing in wireless sensor networks. 1593-1601 - Hongyu Zhou, Hongyi Wu, Miao Jin:
A robust boundary detection algorithm based on connectivity only for 3D wireless sensor networks. 1602-1610 - XuFei Mao, Xin Miao, Yuan He, Xiang-Yang Li, Yunhao Liu:
CitySee: Urban CO2 monitoring with sensors. 1611-1619 - Vijay Kumar Adhikari, Yang Guo, Fang Hao, Matteo Varvello, Volker Hilt, Moritz Steiner, Zhi-Li Zhang:
Unreeling netflix: Understanding and improving multi-CDN movie delivery. 1620-1628 - Akshay Krishnamurthy, Aarti Singh:
Robust multi-source network tomography using selective probes. 1629-1637 - Ori Rottenstreich, Isaac Keslassy:
The Bloom paradox: When not to use a Bloom filter? 1638-1646 - Tian Pan, Xiaoyu Guo, Chenhui Zhang, Junchen Jiang, Hao Wu, Bin Liu:
Tracking millions of flows in high speed networks for application identification. 1647-1655 - Jaime Llorca, Kyle Guan, Gary Atkinson, Daniel C. Kilper:
Energy efficient delivery of immersive video centric services. 1656-1664 - Renchao Xie, F. Richard Yu, Hong Ji:
Energy-efficient spectrum sharing and power allocation in cognitive radio femtocell networks. 1665-1673 - Hao Liang, Bong Jun Choi, Weihua Zhuang, Xuemin Shen:
Towards optimal energy store-carry-and-deliver for PHEVs via V2G system. 1674-1682 - Jian Tang, Brendan Mumey, Yun Xing, Andy Johnson:
On exploiting flow allocation with rate adaptation for green networking. 1683-1691 - Bruno F. Ribeiro, Pinghui Wang, Fabricio Murai, Don Towsley:
Sampling directed graphs with random walks. 1692-1700 - Lingjie Duan, Takeshi Kubo, Kohei Sugiyama, Jianwei Huang, Teruyuki Hasegawa, Jean C. Walrand:
Incentive mechanisms for smartphone collaboration in data acquisition and distributed computing. 1701-1709 - Felix Ming, Fai Wong, Peter Marbach:
Cosine-neighbourhood-refinement: Towards a robust network formation mechanism. 1710-1718 - Francesco Malandrino, Maciej Kurant, Athina Markopoulou, Cédric Westphal, Ulas C. Kozat:
Proactive seeding for information cascades in cellular networks. 1719-1727 - Amir R. Khakpour, Joshua W. Hulst, Zihui Ge, Alex X. Liu, Dan Pei, Jia Wang:
Firewall fingerprinting. 1728-1736 - Jan van Lunteren, Alexis Guanella:
Hardware-accelerated regular expression matching at multiple tens of Gb/s. 1737-1745 - Chad R. Meiners, Eric Norige, Alex X. Liu, Eric Torng:
FlowSifter: A counting automata approach to layer 7 field extraction for deep flow inspection. 1746-1754 - Cláudia Pascoal, Maria Rosário de Oliveira, Rui Valadas, Peter Filzmoser, Paulo Salvador, António Pacheco:
Robust feature selection and robust PCA for internet traffic anomaly detection. 1755-1763 - Tao Jing, Xiuying Chen, Yan Huo, Xiuzhen Cheng:
Achievable transmission capacity of cognitive mesh networks with different media access control. 1764-1772 - Harish Ganapathy, Mukundan Madhavan, Malolan Chetlur, Shivkumar Kalyanaraman:
On Exploiting degrees-of-freedom in whitespaces. 1773-1781 - Yanxiao Zhao, Min Song, Chunsheng Xin, Manish Wadhwa:
Spectrum sensing based on three-state model to accomplish all-level fairness for co-existing multiple cognitive radio networks. 1782-1790 - Shiyao Chen, Lang Tong, Qing Zhao:
Delay optimal multichannel opportunistic access. 1791-1799 - Anand Seetharam, Jim Kurose, Dennis Goeckel, Gautam D. Bhanage:
A Markov chain model for coarse timescale channel variation in an 802.16e wireless network. 1800-1807 - Manjesh Kumar Hanawal, Eitan Altman, François Baccelli:
Stochastic geometry based medium access games. 1808-1816 - Yanyan Zhuang, Jianping Pan:
A geometrical probability approach to location-critical network performance metrics. 1817-1825 - Yuedong Xu, Eitan Altman, Rachid El Azouzi, Majed Haddad, Salah-Eddine Elayoubi, Tania Jiménez:
Probabilistic analysis of buffer starvation in Markovian queues. 1826-1834 - Khuong Vu, Rong Zheng:
Geometric algorithms for target localization and tracking under location uncertainties in wireless sensor networks. 1835-1843 - Zi Li, Yang Peng, Daji Qiao, Wensheng Zhang:
LBA: Lifetime balanced data aggregation in low duty cycle sensor networks. 1844-1852 - Wenping Liu, Dan Wang, Hongbo Jiang, Wenyu Liu, Chonggang Wang:
Approximate convex decomposition based localization in wireless sensor networks. 1853-1861 - Zichong Chen, Guillermo Barrenetxea, Martin Vetterli:
Share risk and energy: Sampling and communication strategies for multi-camera wireless monitoring networks. 1862-1870 - Meng Wang, Weiyu Xu, Enrique Mallada, Ao Tang:
Sparse recovery with graph constraints: Fundamental limits and measurement construction. 1871-1879 - Ori Rottenstreich, Yossi Kanizo, Isaac Keslassy:
The Variable-Increment Counting Bloom Filter. 1880-1888 - Erez Tsidon, Iddo Hanniel, Isaac Keslassy:
Estimators also need shared values to grow together. 1889-1897 - Oguzhan Erdem, Hoang Le, Viktor K. Prasanna:
Hierarchical hybrid search structure for high performance packet classification. 1898-1906 - Changcun Ma, Deying Li, Hongwei Du, Huan Ma, Yuexuan Wang, Wonjun Lee:
Energy efficient broadcast in multiradio multichannel wireless networks. 1907-1915 - Xiang Sheng, Jian Tang, Weiyi Zhang:
Energy-efficient collaborative sensing with mobile phones. 1916-1924 - Jindou Fan, Chengchen Hu, Keqiang He, Junchen Jiang, Bin Liu:
Reducing power of traffic manager in routers via dynamic on/off-chip scheduling. 1925-1933 - Canming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou:
Cherish every joule: Maximizing throughput with an eye on network-wide energy consumption. 1934-1941 - Zimu Liu, Yuan Feng, Baochun Li:
Socialize spontaneously with mobile applications. 1942-1950 - Wei Wei, Fengyuan Xu, Chiu C. Tan, Qun Li:
SybilDefender: Defend against sybil attacks in large social networks. 1951-1959 - Kate Ching-Ju Lin, Chun-Wei Chen, Cheng-Fu Chou:
Preference-aware content dissemination in opportunistic mobile social networks. 1960-1968 - Rui Zhang, Yanchao Zhang, Jinyuan Sun, Guanhua Yan:
Fine-grained private matching for proximity-based mobile social networking. 1969-1977 - Cheng-Hung Lin, Chen-Hsiung Liu, Shih-Chieh Chang, Wing-Kai Hon:
Memory-efficient pattern matching architectures using perfect hashing on graphic processing units. 1978-1986 - Anat Bremler-Barr, Shimrit Tzur-David, David Hay, Yaron Koral:
Decompression-free inspection: DPI for shared dictionary compression over HTTP. 1987-1995 - Yu Wang, Dingbang Xu, Xiao He, Chao Zhang, Fan Li, Bin Xu:
L2P2: Location-aware location privacy protection for location-based services. 1996-2004 - Fabio Soldo, Ahmed Metwally:
Traffic anomaly detection based on the IP size distribution. 2005-2013 - Donglin Hu, Shiwen Mao:
Cooperative relay with interference alignment for video over cognitive radio networks. 2014-2022 - Diep N. Nguyen, Marwan Krunz:
Spectrum management and power allocation in MIMO cognitive networks. 2023-2031 - Jing Zhao, Guohong Cao:
Robust topology control in multi-hop cognitive radio networks. 2032-2040 - Haiming Jin, Gaofei Sun, Xinbing Wang, Qian Zhang:
Spectrum trading with insurance in cognitive radio networks. 2041-2049 - Corentin Briat, Emre A. Yavuz, Gunnar Karlsson:
A conservation-law-based modular fluid-flow model for network congestion modeling. 2050-2058 - Juan Antonio Cordero, Philippe Jacquet, Emmanuel Baccelli:
Impact of jitter-based techniques on flooding over wireless ad hoc networks: Model and analysis. 2059-2067 - Javad Ghaderi, R. Srikant:
Effect of access probabilities on the delay performance of Q-CSMA algorithms. 2068-2076 - Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri Loguinov:
Stochastic analysis of horizontal IP scanning. 2077-2085 - Hongbo Jiang, Tianlong Yu, Chen Tian, Guang Tan, Chonggang Wang:
CONSEL: Connectivity-based segmentation in large-scale 2D/3D sensor networks. 2086-2094 - Sen Yang, Xinbing Wang, Luoyi Fu:
On the topology of wireless sensor networks. 2095-2103 - Yin Wang, Yuan He, XuFei Mao, Yunhao Liu, Zhiyu Huang, Xiang-Yang Li:
Exploiting constructive interference for scalable flooding in wireless networks. 2104-2112 - Shouling Ji, Zhipeng Cai:
Distributed data collection and its capacity in asynchronous wireless sensor networks. 2113-2121 - Stefano Vissicchio, Luca Cittadini, Laurent Vanbever, Olivier Bonaventure:
iBGP deceptions: More sessions, fewer routes. 2122-2130 - Xiaohua Tian, Yu Cheng:
Loop mitigation in bloom filter based multicast: A destination-oriented approach. 2131-2139 - Yu Zhang, Mihaela van der Schaar:
Reputation-based incentive protocols in crowdsourcing applications. 2140-2148 - In Keun Son, Shiwen Mao, Michelle X. Gong, Yihan Li:
On frame-based scheduling for directional mmWave WPANs. 2149-2157 - Hao Yue, Chi Zhang, Miao Pan, Yuguang Fang, Shigang Chen:
A time-efficient information collection protocol for large-scale RFID systems. 2158-2166 - Yuan Li, Chen Yuan, Haibin Kan:
Novel constructions of complex orthogonal designs for space-time block codes. 2167-2173 - Tao Li, Wen Luo, Zhen Mo, Shigang Chen:
Privacy-preserving RFID authentication based on cryptographical encoding. 2174-2182 - Weiping Zhu, Jiannong Cao, Yi Xu, Lei Yang, Junjun Kong:
Fault-tolerant RFID reader localization based on passive RFID tags. 2183-2191 - Yibei Ling, Scott Alexander, Richard Lau:
On quantification of anchor placement. 2192-2200 - Dian Zhang, Yunhuai Liu, Xiaonan Guo, Min Gao, Lionel M. Ni:
On distinguishing the multiple radio paths in RSS-based ranging. 2201-2209 - Kaishun Wu, Jiang Xiao, Youwen Yi, Min Gao, Lionel M. Ni:
FILA: Fine-grained indoor localization. 2210-2218 - Zhongli Liu, Yinjie Chen, Benyuan Liu, Chengyu Cao, Xinwen Fu:
HAWK: An unmanned mini helicopter-based aerial wireless kit for localization. 2219-2227 - Xinxin Zhao, Lingjun Li, Guoliang Xue, Gabriel Silva:
Efficient anonymous message submission. 2228-2236 - Murali S. Kodialam, T. V. Lakshman, Sarit Mukherjee:
Effective ad targeting with concealed profiles. 2237-2245 - Fan Zhang, Li He, Wenbo He, Xue Liu:
Data perturbation with state-dependent noise for participatory sensing. 2246-2254 - Mohammad Ashiqur Rahman, Padmalochan Bera, Ehab Al-Shaer:
SmartAnalyzer: A noninvasive security threat analyzer for AMI smart grid. 2255-2263 - Shaowei Wang, Zhi-Hua Zhou, Mengyao Ge, Chonggang Wang:
Resource allocation for heterogeneous multiuser OFDM-based cognitive radio networks with imperfect spectrum sensing. 2264-2272 - Yi Song, Jiang Xie:
A distributed broadcast protocol in multi-hop cognitive radio ad hoc networks without a common control channel. 2273-2281 - Mo Dong, Gaofei Sun, Xinbing Wang, Qian Zhang:
Combinatorial auction with time-frequency flexibility in cognitive radio networks. 2282-2290 - Xiang-Yang Li, Panlong Yang, Yubo Yan, Lizhao You, Shaojie Tang, Qiuyuan Huang:
Almost optimal accessing of nonstochastic channels in cognitive radio networks. 2291-2299 - Majed Alresaini, Maheswaran Sathiamoorthy, Bhaskar Krishnamachari, Michael J. Neely:
Backpressure with Adaptive Redundancy (BWAR). 2300-2308 - Bruno Nardelli, Edward W. Knightly:
Closed-form throughput expressions for CSMA networks with collisions and hidden terminals. 2309-2317 - Mihalis G. Markakis, Eytan H. Modiano, John N. Tsitsiklis:
Max-weight scheduling in networks with heavy-tailed traffic. 2318-2326 - Virag Shah, Gustavo de Veciana, George Kesidis:
Learning to route queries in unstructured P2P networks: Achieving throughput optimality subject to query resolution constraints. 2327-2335 - Reuven Cohen, Ilia Nudelman, Gleb Polevoy:
On the admission of dependent flows in powerful sensor networks. 2336-2344 - Miao Jin, Guodong Rong, Hongyi Wu, Liang Shuai, Xiaohu Guo:
Optimal surface deployment problem in wireless sensor networks. 2345-2353 - Benjamin Gaudette, Vinay Hanumaiah, Sarma B. K. Vrudhula, Marwan Krunz:
Optimal range assignment in solar powered active wireless sensor networks. 2354-2362 - Ting Zhu, Abedelaziz Mohaisen, Yi Ping, Don Towsley:
DEOS: Dynamic energy-oriented scheduling for sustainable wireless sensor networks. 2363-2371 - Daniele Riboni, Antonio Villani, Domenico Vitali, Claudio Bettini, Luigi V. Mancini:
Obfuscation of sensitive data in network flows. 2372-2380 - Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen Fu:
Extensive analysis and large-scale empirical evaluation of tor bridge discovery. 2381-2389 - Zhen Ling, Junzhou Luo, Yang Zhang, Ming Yang, Xinwen Fu, Wei Yu:
A novel network delay based side-channel attack: Modeling and defense. 2390-2398 - Khuong Vu, Rong Zheng, Jie Gao:
Efficient algorithms for K-anonymous location privacy in participatory sensing. 2399-2407 - Sheng Zhang, Zhuzhong Qian, Jie Wu, Sanglu Lu:
An Opportunistic Resource Sharing and Topology-Aware mapping framework for virtual networks. 2408-2416 - Sara Oueslati, James Roberts, Nada Sbihi:
Flow-aware traffic control for a content-centric network. 2417-2425 - Mengjun Xie, Indra Widjaja, Haining Wang:
Enhancing cache robustness for content-centric networking. 2426-2434 - Layong Luo, Gaogang Xie, Yingke Xie, Laurent Mathy, Kavé Salamatian:
A hybrid IP lookup architecture with fast updates. 2435-2443 - Jie Dai, Zhan Hu, Bo Li, Jiangchuan Liu, Baochun Li:
Collaborative hierarchical caching with dynamic request routing for massive content distribution. 2444-2452 - Gideon Blocq, Ariel Orda:
How good is bargained routing? 2453-2461 - Lei Rao, Qixin Wang, Xue Liu, Yufei Wang:
Analysis of TDMA crossbar real-time switch design for AFDX networks. 2462-2470 - Luigi Rizzo, Marta Carbone, Gaetano Catalli:
Transparent acceleration of software packet forwarding using netmap. 2471-2479 - Patricio A. Galdames, Ying Cai:
Efficient processing of location-cloaked queries. 2480-2488 - Jia Liu, Hanif D. Sherali:
A distributed Newton's method for joint multi-hop routing and flow control: Theory and algorithm. 2489-2497 - Yunghsiang S. Han, Rong Zheng, Wai Ho Mow:
Exact regenerating codes for Byzantine fault tolerance in distributed storage. 2498-2506 - Arun Natarajan, Peng Ning, Yao Liu, Sushil Jajodia, Steve E. Hutchinson:
NSDMiner: Automated discovery of Network Service Dependencies. 2507-2515 - Chia-Wei Chang, Han Liu, Guanyao Huang, Bill Lin, Chen-Nee Chuah:
Distributed measurement-aware routing: Striking a balance between measurement and traffic engineering. 2516-2520 - Vijay Kumar Adhikari, Sourabh Jain, Yingying Chen, Zhi-Li Zhang:
Vivisecting YouTube: An active measurement study. 2521-2525 - Tao Li, Shigang Chen, Yan Qiao:
Origin-destination flow measurement in high-speed networks. 2526-2530 - Ye Tian, Ratan Dey, Yong Liu, Keith W. Ross:
China's Internet: Topology mapping and geolocating. 2531-2535 - Diana Joumblatt, Oana Goga, Renata Teixeira, Jaideep Chandrashekar, Nina Taft:
Characterizing end-host application performance across multiple networking environments. 2536-2540 - Guowu Xie, Marios Iliofotou, Ram Keralapura, Michalis Faloutsos, Antonio Nucci:
SubFlow: Towards practical flow-level traffic classification. 2541-2545 - Haiyong Xie, Guangyu Shi, Pengwei Wang:
TECC: Towards collaborative in-network caching guided by traffic engineering. 2546-2550 - Stephen D. Strowes, Colin Perkins:
Harnessing Internet topological stability in Thorup-Zwick compact routing. 2551-2555 - João L. Sobrinho, Franck Le:
A fresh look at inter-domain route aggregation. 2556-2560 - Rihua Wei, Yang Xu, H. Jonathan Chao:
Block permutations in Boolean Space to minimize TCAM for packet classification. 2561-2565 - Amir Nahir, Ariel Orda, Danny Raz:
Workload factoring with the cloud: A game-theoretic perspective. 2566-2570 - Xuanjia Qiu, Hongxing Li, Chuan Wu, Zongpeng Li, Francis C. M. Lau:
Cost-minimizing dynamic migration of content distribution services into hybrid clouds. 2571-2575 - Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang, Shan-Biao Wang:
Towards temporal access control in cloud computing. 2576-2580 - Qin Liu, Chiu C. Tan, Jie Wu, Guojun Wang:
Efficient information retrieval for ranked queries in cost-effective cloud environments. 2581-2585 - Jian Tan, Xiaoqiao Meng, Li Zhang:
Performance analysis of Coupling Scheduler for MapReduce/Hadoop. 2586-2590 - Tung-Wei Kuo, Ming-Jer Tsai:
On the construction of data aggregation tree with minimum energy cost in wireless sensor networks: NP-completeness and approximation algorithms. 2591-2595 - Haitao Zhang, Shaojie Tang, Xiang-Yang Li, Huadong Ma:
Tracking and identifying burglar using collaborative sensor-camera networks. 2596-2600 - Liang Liu, Xi Zhang, Huadong Ma:
Optimal density estimation for exposure-path prevention in wireless sensor networks using percolation theory. 2601-2605 - Dawei Pan, Yi Yuan, Dan Wang, XiaoHua Xu, Yu Peng, Xiyuan Peng, Peng-Jun Wan:
Thermal Inertia: Towards an energy conservation room management system. 2606-2610 - Daphney-Stavroula Zois, Marco Levorato, Urbashi Mitra:
A POMDP framework for heterogeneous sensor selection in wireless body area networks. 2611-2615 - Wei Wei, Fengyuan Xu, Qun Li:
MobiShare: Flexible privacy-preserving location sharing in mobile online social networks. 2616-2620 - Shraboni Jana, Kai Zeng, Prasant Mohapatra:
Trusted collaborative spectrum sensing for mobile cognitive radio networks. 2621-2625 - Dong-Hoon Shin, Saurabh Bagchi, Chih-Chun Wang:
Distributed online channel assignment toward optimal monitoring in multi-channel wireless networks. 2626-2630 - Matthew Knysz, Xin Hu, Yuanyuan Zeng, Kang G. Shin:
Open WiFi networks: Lethal weapons for botnets? 2631-2635 - Yao Liu, Peng Ning:
Enhanced wireless channel authentication using time-synched link signature. 2636-2640 - Nianbo Liu, Ming Liu, Guihai Chen, Jiannong Cao:
The sharing at roadside: Vehicular content distribution using parked vehicles. 2641-2645 - Maheswaran Sathiamoorthy, Alexandros G. Dimakis, Bhaskar Krishnamachari, Fan Bai:
Distributed storage codes reduce latency in vehicular networks. 2646-2650 - Merkourios Karaliopoulos, Christian Rohner:
Trace-based performance analysis of opportunistic forwarding under imperfect node cooperation. 2651-2655 - Yung-Chih Chen, Jim Kurose, Don Towsley:
A mixed queueing network model of mobility in a campus wireless network. 2656-2660 - Xuemei Liu, Yanmin Zhu, Minglu Li, Qian Zhang:
POVA: Traffic light sensing with probe vehicles. 2661-2665 - Huijiang Li, Neeraj Jaggi, Biplab Sikdar:
An analytical approach towards cooperative relay scheduling under partial state information. 2666-2670 - Miloud Bagaa, Abdelouahid Derhab, Noureddine Lasla, Abdelraouf Ouadjaout, Nadjib Badache:
Semi-structured and unstructured data aggregation scheduling in wireless sensor networks. 2671-2675 - Shaojie Tang, Lei Yang:
Morello: A quality-of-monitoring oriented sensing scheduling protocol in Sensor Networks. 2676-2680 - Xiaokang Yu, Xiaotian Yin, Wei Han, Jie Gao, Xianfeng Gu:
Scalable routing in 3D high genus sensor networks using graph embedding. 2681-2685 - Qiang Liu, Xin Wang, Nageswara S. V. Rao:
Fusion of state estimates over long-haul sensor networks under random delay and loss. 2686-2690 - Yaqin Zhou, Xiang-Yang Li, Min Liu, Zhongcheng Li, Shaojie Tang, XuFei Mao, Qiuyuan Huang:
Distributed link scheduling for throughput maximization under physical interference model. 2691-2695 - Javad Ghaderi, Tianxiong Ji, R. Srikant:
Connection-level scheduling in wireless networks using only MAC-layer information. 2696-2700 - Peng Zhao, Xinyu Yang, Jiayin Wang, Benyuan Liu, Jie Wang:
BOR/AC: Bandwidth-aware opportunistic routing with admission control in wireless mesh networks. 2701-2705 - Rafael P. Laufer, Pedro B. Velloso, Luiz Filipe M. Vieira, Leonard Kleinrock:
PLASMA: A new routing paradigm for wireless multihop networks. 2706-2710 - Edith C. H. Ngai, Mani B. Srivastava, Jiangchuan Liu:
Context-aware sensor data dissemination for mobile users in remote areas. 2711-2715 - Yonggang Wen, Weiwen Zhang, Haiyun Luo:
Energy-optimal mobile application execution: Taming resource-poor mobile devices with cloud clones. 2716-2720 - Karthik Thirugnanam, Bhojan Anand, Jeena Sebastian, Pravein G. Kannan, Akkihebbal L. Ananda, Rajesh Krishna Balan, Mun Choon Chan:
Dynamic lookahead mechanism for conserving power in multi-player mobile games. 2721-2725 - Jialin He, Hui Liu, Pengfei Cui, Jonathan Landon, Onur Altintas, Rama Vuyyuru, Dinesh Rajan, Joseph David Camp:
Design and experimental evaluation of context-aware link-level adaptation. 2726-2730 - Sanjit Krishnan Kaul, Roy D. Yates, Marco Gruteser:
Real-time status: How often should one update? 2731-2735 - Sebastian Neumayer, Alon Efrat, Eytan H. Modiano:
Geographic max-flow and min-cut under a circular disk failure model. 2736-2740 - Yang Liu, Wenji Chen, Yong Guan:
A fast sketch for aggregate queries over high-speed network traffic. 2741-2745 - Mohamad Jaber, Roberto G. Cascella, Chadi Barakat:
Using host profiling to refine statistical application identification. 2746-2750 - Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Nick G. Duffield, Ramana Rao Kompella:
Cuckoo sampling: Robust collection of flow aggregates under a fixed memory budget. 2751-2755 - He Yan, Ashley Flavel, Zihui Ge, Alexandre Gerber, Daniel Massey, Christos Papadopoulos, Hiren Shah, Jennifer Yates:
Argus: End-to-end service anomaly detection and localization from an ISP's point of view. 2756-2760 - Yanjiao Chen, Jin Zhang, Qian Zhang, Juncheng Jia:
A reverse auction framework for access permission transaction to promote hybrid access in femtocell network. 2761-2765 - Mohammad Hadi Afrasiabi, Roch Guérin:
Pricing strategies for user-provided connectivity services. 2766-2770 - Eitan Altman, Dieter Fiems, Majed Haddad, Julien Gaillard:
Semi-dynamic Hawk and Dove game, applied to power control. 2771-2775 - Honggang Zhang, Sudarshan Vasudevan:
Design and analysis of a choking strategy for coalitions in data swarming systems. 2776-2780 - Swastik Brahma, Mainak Chatterjee:
A bayesian based incentive-compatible routing mechanism for Dynamic Spectrum Access networks. 2781-2785 - Zixia Huang, Klara Nahrstedt:
Perception-based playout scheduling for high-quality real-time interactive multimedia. 2786-2790 - Huan Huang, Bo Zhang, S.-H. Gary Chan, Gene Cheung, Pascal Frossard:
Coding and replication co-design for interactive multiview video streaming. 2791-2795 - Joerg Widmer, Andrea Capalbo, Antonio Fernández Anta, Albert Banchs:
Rate allocation for layered multicast streaming with inter-layer network coding. 2796-2800 - Dimitris S. Papailiopoulos, Jianqiang Luo, Alexandros G. Dimakis, Cheng Huang, Jin Li:
Simple regenerating codes: Network coding for cloud storage. 2801-2805 - Sujogya Banerjee, Shahrzad Shirazipourazad, Arunabha Sen:
On region-based fault tolerant design of distributed file storage in networks. 2806-2810 - Haifeng Zheng, Shilin Xiao, Xinbing Wang, Xiaohua Tian:
Energy and latency analysis for in-network computation with compressive sensing in wireless sensor networks. 2811-2815 - Kyuho Son, Bhaskar Krishnamachari:
SpeedBalance: Speed-scaling-aware optimal load balancing for green cellular networks. 2816-2820 - Ning Ding, Abhinav Pathak, Dimitrios Koutsonikolas, Clayton Shepard, Y. Charlie Hu, Lin Zhong:
Realizing the full potential of PSM using proxying. 2821-2825 - Murat Kocaoglu, Özgür B. Akan:
Minimum energy coding for wireless nanosensor networks. 2826-2830 - Andrea Francini:
Selection of a rate adaptation scheme for network hardware. 2831-2835 - Ratan Dey, Cong Tang, Keith W. Ross, Nitesh Saxena:
Estimating age privacy leakage in online social networks. 2836-2840 - Tom Callahan, Mark Allman, Michael Rabinovich:
Pssst, over here: Communicating without fixed infrastructure. 2841-2845 - Seungwon Shin, Zhaoyan Xu, Guofei Gu:
EFFORT: Efficient and effective bot malware detection. 2846-2850 - Shui Yu, Song Guo, Ivan Stojmenovic:
Can we beat legitimate cyber behavior mimicking attacks from botnets? 2851-2855 - Marc Lelarge:
Coordination in network security games. 2856-2860 - David Breitgand, Amir Epstein:
Improving consolidation of virtual machines with risk-aware bandwidth oversubscription in compute clouds. 2861-2865 - Muhammad Saqib Ilyas, Saqib Raza, Chao-Chih Chen, Zartash Afzal Uzmi, Chen-Nee Chuah:
RED-BL: Energy solution for loading data centers. 2866-2870 - Ting He, Shiyao Chen, Hyoil Kim, Lang Tong, Kang-Won Lee:
To migrate or to wait: Bandwidth-latency tradeoff in opportunistic scheduling of parallel tasks. 2871-2875 - Joe Wenjie Jiang, Tian Lan, Sangtae Ha, Minghua Chen, Mung Chiang:
Joint VM placement and routing for data center traffic engineering. 2876-2880 - Dan Xu, Xin Liu:
Geographic trough filling for internet datacenters. 2881-2885 - Ze Li, Haiying Shen, Hailang Wang, Guoxin Liu, Jin Li:
SocialTube: P2P-assisted video sharing in online social networks. 2886-2890 - Haiyang Wang, Feng Wang, Jiangchuan Liu:
Accelerating peer-to-peer file sharing with social relations: Potentials and challenges. 2891-2895 - Lan Zhang, Xiang-Yang Li, Yunhao Liu, Qiuyuan Huang, Shaojie Tang:
Mechanism design for finding experts using locally constructed social referral web. 2896-2900 - Zhi Wang, Lifeng Sun, Chuan Wu, Shiqiang Yang:
Guiding internet-scale video service deployment using microblog-based prediction. 2901-2905 - Atish Das Sarma, Anisur Rahaman Molla, Gopal Pandurangan:
Near-optimal random walk sampling in distributed networks. 2906-2910 - Yuan Le, Liran Ma, Wei Cheng, Xiuzhen Cheng, Biao Chen:
Maximizing throughput when achieving time fairness in multi-rate wireless LANs. 2911-2915 - Pirmin Heinzer, Vincent Lenders, Franck Legendre:
Fast and accurate packet delivery estimation based on DSSS chip errors. 2916-2920 - Yang Liu, Mingyan Liu, Jing Deng:
Is diversity gain worth the pain: A delay comparison between opportunistic multi-channel MAC and single-channel MAC. 2921-2925 - Wenxian Li, Yanmin Zhu, Tian He:
WiBee: Building WiFi radio map with ZigBee sensor networks. 2926-2930 - Pablo Salvador, Francesco Gringoli, Vincenzo Mancuso, Pablo Serrano, Andrea Mannocci, Albert Banchs:
VoIPiggy: Implementation and evaluation of a mechanism to boost voice capacity in 802.11WLANs. 2931-2935 - Honghai Zhang, Narayan Prasad, Sampath Rangarajan:
MIMO downlink scheduling in LTE systems. 2936-2940 - Tae Hyun Kim, Theodoros Salonidis, Henrik Lundgren:
MIMO wireless networks with directional antennas in indoor environments. 2941-2945 - Richard Combes, Zwi Altman, Eitan Altman:
Self-organization in wireless networks: A flow-level perspective. 2946-2950 - Jia Liu, Qian Chen, Hanif D. Sherali:
Algorithm design for femtocell base station placement in commercial building environments. 2951-2955 - Mustafa Y. Arslan, Jongwon Yoon, Karthikeyan Sundaresan, Srikanth V. Krishnamurthy, Suman Banerjee:
Experimental characterization of interference in OFDMA femtocell networks. 2956-2960 - Wanchun Jiang, Fengyuan Ren, Chuang Lin, Ivan Stojmenovic:
Analysis of backward congestion notification with delay for enhanced ethernet networks. 2961-2965 - Ching-Ming Lien, Shu-Hao Chang, Cheng-Shang Chang, Duan-Shin Lee:
Anchored desynchronization. 2966-2970 - Jelena Pesic, Julien Meuric, Esther Le Rouzic, Laurent Dupont, Michel Morvan:
Proactive failure detection for WDM carrying IP. 2971-2975 - Chih-Ping Li, Michael J. Neely:
Delay and rate-optimal control in a multi-class priority queue with adjustable service rates. 2976-2980 - Feng Lu, Geoffrey M. Voelker, Alex C. Snoeren:
Weighted fair queuing with differential dropping. 2981-2985 - László Toka, Pasquale Cataldi, Matteo Dell'Amico, Pietro Michiardi:
Redundancy management for P2P backup. 2986-2990 - Zhongmei Yao, Daren B. H. Cline, Dmitri Loguinov:
On superposition of heterogeneous edge processes in dynamic random graphs. 2991-2995 - Ziyu Shao, Hao Zhang, Minghua Chen, Kannan Ramchandran:
Reverse-engineering BitTorrent: A Markov approximation perspective. 2996-3000 - Delia Ciullo, Valentina Martina, Michele Garetto, Emilio Leonardi, Giovanni Luca Torrisi:
Performance analysis of non-stationary peer-assisted VoD systems. 3001-3005 - Srinivasan Venkatramanan, Anurag Kumar:
Co-evolution of content popularity and delivery in mobile P2P networks. 3006-3010 - Xiao Lin Liu, Chong Luo, Wenjun Hu, Feng Wu:
Compressive broadcast in MIMO systems with receive antenna heterogeneity. 3011-3015 - Shan Zhou, Xinzhou Wu, Lei Ying:
Distributed power control and coding-modulation adaptation in wireless networks using annealed Gibbs sampling. 3016-3020 - Sastry Kompella, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides:
Impact of channel state information on the stability of cognitive shared channels. 3021-3025 - Bin Li, Atilla Eryilmaz:
Distributed channel probing for efficient transmission scheduling over wireless fading channels. 3026-3030 - Devu Manikantan Shila, Yu Cheng:
Ad hoc wireless networks meet the infrastructure: Mobility, capacity and delay. 3031-3035 - Anas Basalamah, Song Min Kim, Shuo Guo, Tian He, Yoshito Tobe:
Link correlation aware opportunistic routing. 3036-3040 - Yoora Kim, Kyunghan Lee, Ness B. Shroff, Injong Rhee:
Revisiting delay-capacity tradeoffs for mobile networks: The delay is overestimated. 3041-3045 - Guohua Li, Jianzhong Li, Bo Yu:
Lower bound of weighted fairness guaranteed congestion control protocol for WSNs. 3046-3050 - Jinbei Zhang, Luoyi Fu, Xinbing Wang:
Impact of secrecy on capacity in large-scale wireless networks. 3051-3055 - XiaoHua Xu, Qian Wang, Jiannong Cao, Peng-Jun Wan, Kui Ren, Yuanfang Chen:
Locating malicious nodes for data aggregation in wireless networks. 3056-3060 - Sangho Oh, Tam Vu, Marco Gruteser, Suman Banerjee:
Phantom: Physical layer cooperation for location privacy protection. 3061-3065 - Zhuo Lu, Wenye Wang, Cliff Wang:
Hiding traffic with camouflage: Minimizing message delay in the smart grid under jamming. 3066-3070 - Yun Li, Jian Li, Jian Ren, Jie Wu:
Providing hop-by-hop authentication and source privacy in wireless sensor networks. 3071-3075 - Xiaojun Feng, Yanjiao Chen, Jin Zhang, Qian Zhang, Bo Li:
TAHES: Truthful double Auction for Heterogeneous Spectrums. 3076-3080 - Bowen Li, Panlong Yang, Xiang-Yang Li, Shaojie Tang, Yunhao Liu, Qihui Wu:
Almost optimal dynamically-ordered multi-channel accessing for cognitive networks. 3081-3085 - Wenhan Dai, Yi Gai, Bhaskar Krishnamachari:
Efficient online learning for opportunistic spectrum access. 3086-3090 - Shimin Gong, Ping Wang, Jianwei Huang:
Robust threshold design for cooperative sensing in cognitive radio networks. 3091-3095 - Bin Cao, Lin X. Cai, Hao Liang, Jon W. Mark, Qinyu Zhang, H. Vincent Poor, Weihua Zhuang:
Cooperative cognitive radio networking using quadrature signaling. 3096-3100
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.