default search action
32nd INFOCOM 2013: Turin, Italy
- Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013. IEEE 2013, ISBN 978-1-4673-5944-3
Student Poster Session
- Xuan Nam Nguyen, Damien Saucez, Thierry Turletti:
Efficient caching in content-centric networks using OpenFlow. 1-2 - Mathieu Michel, Bruno Quoitin:
Impact of a sleep schedule on the AODV convergence time in WSNs. 3-4 - João Marco C. Silva, Paulo Carvalho, Solange Rito Lima:
Enhancing traffic sampling scope and efficiency. 5-6 - Antonio Villani, Daniele Riboni, Domenico Vitali, Claudio Bettini, Luigi V. Mancini:
Obsidian: A scalable and efficient framework for NetFlow obfuscation. 7-8 - Alessandro Cammarano, Dora Spenza, Chiara Petrioli:
Energy-harvesting WSNs for structural health monitoring of underground train tunnels. 9-10 - Anooq Muzaffar Sheikh, Attilio Fiandrotti, Enrico Magli:
Distributed scheduling for scalable P2P video streaming with network coding. 11-12 - Piergiuseppe Di Marco, Carlo Fischione, George Athanasiou, Prodromos-Vasileios Mekikis:
MAC-aware routing metrics for low power and lossy networks. 13-14 - Muhammad Saqib Ilyas, Zartash Afzal Uzmi:
Electricity cost efficient workload mapping. 15-16 - Anh Dung Nguyen, Patrick Sénac, Michel Diaz:
On the impact of disorder on dynamic network navigation. 17-18 - Adisorn Lertsinsrubtavee, Naceur Malouch, Serge Fdida:
Efficient dynamic spectrum sharing through rate compensation and spectrum handoff. 19-20 - Shahzad Ali, Gianluca Rizzo, Balaji Rengarajan, Marco Ajmone Marsan:
A simple approximate analysis of floating content for context-aware applications. 21-22 - Kamini Garg:
Data dissemination bounds in people-centric systems. 23-24
MC - Cloud computing and networks 1
- Hongxing Li, Chuan Wu, Zongpeng Li, Francis C. M. Lau:
Profit-maximizing virtual machine trading in a federation of selfish clouds. 25-29 - Orathai Sukwong, Hyong S. Kim:
DPack: Disk scheduler for highly consolidated cloud. 30-34 - Yaxiong Zhao, Jie Wu:
Dache: A data aware caching for big-data applications using the MapReduce framework. 35-39 - Chen Zhang, Xue Liu:
HBaseMQ: A distributed message queuing system on clouds with HBase. 40-44
MC - Social networks
- Xu Cheng, Haitao Li, Jiangchuan Liu:
Video sharing propagation in social networks: Measurement, modeling, and analysis. 45-49 - Haitao Li, Haiyang Wang, Jiangchuan Liu, Ke Xu:
Video requests from Online Social Networks: Characterization, analysis and generation. 50-54 - Thang N. Dinh, Nam P. Nguyen, My T. Thai:
An adaptive approximation algorithm for community detection in dynamic scale-free networks. 55-59 - Joydeep Chandra, Bivas Mitra, Niloy Ganguly:
Effect of constraints on superpeer topologies. 60-64
MC - Network Monitoring
- Hao Li, Chengchen Hu:
ROOM: Rule Organized Optimal Matching for fine-grained traffic identification. 65-69 - Andrea Di Pietro, Felipe Huici, Nicola Bonelli, Brian Trammell, Petr Kastovsky, Tristan Groleat, Sandrine Vaton, Maurizio Dusi:
Toward composable network traffic measurement. 70-74 - Brian Eriksson, Mark Crovella:
Understanding geolocation accuracy using network geometry. 75-79 - Kensuke Fukuda, Shinta Sato, Takeshi Mitamura:
A technique for counting DNSSEC validators. 80-84
MC - Content based networking
- Elisha J. Rosensweig, Jim Kurose:
A network calculus for cache networks. 85-89 - Reaz Ahmed, Md. Faizul Bari, Shihabur Rahman Chowdhury, Md. Golam Rabbani, Raouf Boutaba, Bertrand Mathieu:
αRoute: A name based routing scheme for Information Centric Networks. 90-94 - Yi Wang, Tian Pan, Zhian Mi, Huichen Dai, Xiaoyu Guo, Ting Zhang, Bin Liu, Qunfeng Dong:
NameFilter: Achieving fast name lookup with low memory cost via applying two-stage Bloom filters. 95-99 - Sumanta Saha, Andrey Lukyanenko, Antti Ylä-Jääski:
Cooperative caching through routing control in information-centric networks. 100-104
MC - Vehicular networks
- Francesco Malandrino, Claudio Ettore Casetti, Carla-Fabiana Chiasserini, Marco Fiore, Roberto Sadao Yokoyama, Carlo Borgiattino:
A-VIP: Anonymous verification and inference of positions in vehicular networks. 105-109 - Christoph Sommer, Stefan Joerer, Michele Segata, Ozan K. Tonguz, Renato Lo Cigno, Falko Dressler:
How shadowing hurts vehicular communications and how dynamic beaconing can help. 110-114 - Kai Xing, Tianbo Gu, Zhengang Zhao, Lei Shi, Yunhao Liu, Pengfei Hu, Yuepeng Wang, Yi Liang, Shuo Zhang, Yang Wang, Liusheng Huang:
Approaching reliable realtime communications? A novel system design and implementation for roadway safety oriented vehicular communications. 115-119 - Evsen Yanmaz, Robert Kuschnig, Christian Bettstetter:
Achieving air-ground communications in 802.11 networks with three-dimensional aerial mobility. 120-124
MC - Wireless networks 1
- Sangki Yun, Lili Qiu, Apurv Bhartia:
Multi-point to multi-point MIMO in wireless LANs. 125-129 - Brendan Mumey, Jian Tang, Ivan R. Judson, Richard S. Wolff:
Beam scheduling and relay assignment in wireless relay networks with smart antennas. 130-134 - Peng-Jun Wan, Lei Wang, Chao Ma, Zhu Wang, Boliu Xu, Minming Li:
Maximizing wireless network capacity with linear power: Breaking the logarithmic barrier. 135-139 - Tsung-Han Lin, H. T. Kung:
Concurrent channel access and estimation for scalable multiuser MIMO networking. 140-144
MC - Sensor networks 1
- Ju Wang, Dingyi Fang, Xiaojiang Chen, Zhe Yang, Tianzhang Xing, Lin Cai:
LCS: Compressive sensing based device-free localization for multiple targets in sensor networks. 145-149 - Shaojie Tang, Jing Yuan:
DAMson: On distributed sensing scheduling to achieve high Quality of Monitoring. 155-159 - Ankur Kamthe, Miguel Á. Carreira-Perpiñán, Alberto Cerpa:
Quick construction of data-driven models of the short-term behavior of wireless links. 160-164
MC - Cognitive radio networks
- Hongjuan Li, Xiuzhen Cheng, Keqiu Li, Xiaoshuang Xing, Tao Jing:
Utility-based cooperative spectrum sensing scheduling in cognitive radio networks. 165-169 - Clement Kam, Sastry Kompella, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides:
Multicast throughput stability analysis for cognitive cooperative random access. 170-174 - Tao Jing, Shixiang Zhu, Hongjuan Li, Xiuzhen Cheng, Yan Huo:
Cooperative relay selection in cognitive radio networks. 175-179 - Yanjiao Chen, Jin Zhang, Kaishun Wu, Qian Zhang:
TAMES: A Truthful Auction Mechanism for heterogeneous spectrum allocation. 180-184
MC - Cloud computing and networks 2
- Shaolei Ren, Mihaela van der Schaar:
Joint design of Dynamic Scheduling and Pricing in wireless cloud computing. 185-189 - Weiwen Zhang, Yonggang Wen, Dapeng Oliver Wu:
Energy-efficient scheduling policy for collaborative execution in mobile cloud computing. 190-194 - Peng Shu, Fangming Liu, Hai Jin, Min Chen, Feng Wen, Yupeng Qu, Bo Li:
eTime: Energy-efficient transmission between cloud and mobile devices. 195-199
MC - Security, privacy, authentication 1
- Xiaofan He, Huaiyu Dai, Wenbo Shen, Peng Ning:
Is link signature dependable for wireless security? 200-204 - Roberto Di Pietro, Stefano Guarino:
Data confidentiality and availability via secret sharing and node mobility in UWSN. 205-209 - Hyungbae Park, Sejun Song, Baek-Young Choi, Chin-Tser Huang:
PASSAGES: Preserving Anonymity of Sources and Sinks against Global Eavesdroppers. 210-214 - Shaxun Chen, Amit Pande, Kai Zeng, Prasant Mohapatra:
Video source identification in lossy wireless networks. 215-219
MC - Measurements
- Boxun Zhang, Gunnar Kreitz, Marcus Isaksson, Javier Ubillos, Guido Urdaneta, Johan A. Pouwelse, Dick H. J. Epema:
Understanding user behavior in Spotify. 220-224 - John Mark Agosta, Jaideep Chandrashekar, Mark Crovella, Nina Taft, Daniel Ting:
Mixture models of endhost network traffic. 225-229 - Ignacio Bermudez, Stefano Traverso, Marco Mellia, Maurizio M. Munafò:
Exploring the cloud from passive measurements: The Amazon AWS case. 230-234 - Diana Joumblatt, Jaideep Chandrashekar, Branislav Kveton, Nina Taft, Renata Teixeira:
Predicting user dissatisfaction with Internet application performance at end-hosts. 235-239
MC - Content distribution
- Haowei Yuan, Patrick Crowley:
Experimental evaluation of content distribution with NDN and HTTP. 240-244 - Jaime Llorca, Antonia M. Tulino, Kyle Guan, Jairo O. Esteban, Matteo Varvello, Nakjung Choi, Daniel C. Kilper:
Dynamic in-network caching for energy efficient content delivery. 245-249 - Yao Liu, Fei Li, Lei Guo, Bo Shen, Songqing Chen:
Effectively minimizing redundant Internet streaming traffic to iOS devices. 250-254 - Mohsen Sardari, Ahmad Beirami, Jun Zou, Faramarz Fekri:
Content-aware network data compression using joint memorization and clustering. 255-259
MC - Network coding
- Ahmed Osama Fathy Atya, Ioannis Broustis, Shailendra Singh, Dimitris Syrivelis, Srikanth V. Krishnamurthy, Thomas F. La Porta:
Wireless network coding: Deciding when to flip the switch. 260-264 - Wentao Huang, Tracey Ho, Hongyi Yao, Sidharth Jaggi:
Rateless resilient network coding against byzantine adversaries. 265-269 - Jin Wang, Kejie Lu, Jianping Wang, Chunming Qiao:
Untraceability of mobile devices in wireless mesh networks using linear network coding. 270-274 - Shuai Wang, Guang Tan, Yunhuai Liu, Hongbo Jiang, Tian He:
Coding Opportunity Aware Backbone metrics for broadcast in wireless networks. 275-279
MC - Wireless networks 2
- Sven Wiethölter, Andreas Ruttor, Uwe Bergemann, Manfred Opper, Adam Wolisz:
DARA: Estimating the behavior of data rate adaptation algorithms in WLAN hotspots. 280-284 - Yong Xiao, Jianwei Huang, Chau Yuen, Luiz A. DaSilva:
Fairness and efficiency tradeoffs for user cooperation in distributed wireless networks. 285-289 - Hemant Kowshik, Partha Dutta, Malolan Chetlur, Shivkumar Kalyanaraman:
A quantitative framework for guaranteeing QoE of video delivery over wireless. 290-294 - Qingjun Xiao, Bin Xiao, Shigang Chen:
Differential estimation in dynamic RFID systems. 295-299
MC - Sensor networks 2
- Zhaoyang Zhang, Honggang Wang, Xiaodong Lin, Hua Fang, Dong Xuan:
Effective epidemic control and source tracing through mobile social sensing over WBANs. 300-304 - Su Xia, Ning Ding, Miao Jin, Hongyi Wu, Yang Yang:
Medial axis construction and applications in 3D wireless sensor networks. 305-309 - Liwen Xu, Xiao Qi, Yuexuan Wang, Thomas Moscibroda:
Efficient data gathering using Compressed Sparse Functions. 310-314 - Wei Dong, Biyuan Mo, Chao Huang, Yunhao Liu, Chun Chen:
R3: Optimizing relocatable code for efficient reprogramming in networked embedded systems. 315-319
MC - Wireless networks 5
- Esa Hyytiä, Jörg Ott:
Criticality of large delay tolerant networks via directed continuum percolation in space-time. 320-324 - Wei Bao, Ben Liang:
On the insensitivity of user distribution in multicell networks under general mobility and session patterns. 325-329 - Siddhant Agrawal, Prasanna Chaporkar, Rajan Udwani:
Call admission control for real-time applications in wireless network. 330-334 - Juan José Jaramillo, Lei Ying:
Distributed admission control without knowledge of the capacity region. 335-339
MC - Data center networking 1
- Jianying Luo, Lei Rao, Xue Liu:
Data center energy cost minimization: A spatio-temporal scheduling approach. 340-344 - Zeyu Zheng, Minming Li, Xun Xiao, Jianping Wang:
Coordinated resource provisioning and maintenance scheduling in cloud data centers. 345-349 - Zhiyang Guo, Yuanyuan Yang:
Multicast fat-tree data center networks with bounded link oversubscription. 350-354 - Rami Cohen, Liane Lewin-Eytan, Joseph Naor, Danny Raz:
Almost optimal virtual machine placement for traffic intense data centers. 355-359
MC - Security, privacy, authentication 2
- Sookhyun Yang, Jim Kurose, Brian Neil Levine:
Disambiguation of residential wired and wireless access in a forensic setting. 360-364 - Yi Guo, Lei Yang, Xuan Ding, Jinsong Han, Yunhao Liu:
OpenSesame: Unlocking smart phone through handshaking biometrics. 365-369 - Mohammad Abdel-Rahman, Hanif Rahbari, Marwan Krunz, Philippe Nain:
Fast and secure rendezvous protocols for mitigating control channel DoS attacks. 370-374 - Lingjun Li, Xinxin Zhao, Guoliang Xue:
Near field authentication for smart devices. 375-379
MC - Optical networks
- János Tapolcai, Pin-Han Ho, Péter Babarczi, Lajos Rónyai:
On achieving all-optical failure restoration via monitoring trails. 380-384 - Shahrzad Shirazipourazad, Chenyang Zhou, Zahra Derakhshandeh, Arunabha Sen:
On routing and spectrum allocation in spectrum-sliced optical networks. 385-389 - Xiaomin Chen, Admela Jukan, Ashwin Gumaste:
Multipath de-fragmentation: Achieving better spectral efficiency in elastic optical path networks. 390-394 - Zilong Ye, Xiaojun Cao, Xiujiao Gao, Chunming Qiao:
A predictive and incremental grooming scheme for time-varying traffic in WDM networks. 395-399
MC - Virtualization and cloud networks
- Anyu Wang, Zhifang Zhang:
Exact cooperative regenerating codes with minimum-repair-bandwidth for distributed storage. 400-404 - Linquan Zhang, Chuan Wu, Zongpeng Li, Chuanxiong Guo, Minghua Chen, Francis C. M. Lau:
Moving big data to the cloud. 405-409 - Qian Hu, Yang Wang, Xiaojun Cao:
Resolve the virtual network embedding problem: A column generation approach. 410-414 - Yvonne-Anne Pignolet, Stefan Schmid, Gilles Trédan:
Adversarial VNet embeddings: A threat for ISPs? 415-419
MC - Cellular networks
- Xuan Bao, Yin Lin, Uichin Lee, Ivica Rimac, Romit Roy Choudhury:
DataSpotting: Exploiting naturally clustered mobile devices to offload cellular traffic. 420-424 - Shan Zhou, Jie Yang, Dahai Xu, Guangzhi Li, Yu Jin, Zihui Ge, Mario Kosseifi, Robert D. Doverspike, Yingying Chen, Lei Ying:
Proactive call drop avoidance in UMTS networks. 425-429 - Stefano Paris, Fabio Martignon, Ilario Filippini, Lin Chen:
A bandwidth trading marketplace for mobile data offloading. 430-434 - Youngbin Im, Carlee Joe-Wong, Sangtae Ha, Soumya Sen, Ted Taekyoung Kwon, Mung Chiang:
AMUSE: Empowering users for cost-aware offloading with throughput-delay tradeoffs. 435-439 - Fei Yu, Guangtao Xue, Hongzi Zhu, Zhenxian Hu, Minglu Li, Gong Zhang:
Cutting without pain: Mitigating 3G radio tail effect on smartphones. 440-444
MC - Wireless networks 3
- Rongxing Lu, Xiaodong Lin, Zhiguo Shi, Bin Cao, Xuemin (Sherman) Shen:
IPAD: An incentive and privacy-aware data dissemination scheme in opportunistic networks. 445-449 - Yong Zhou, Weihua Zhuang:
Beneficial cooperation ratio in multi-hop wireless ad hoc networks. 450-454 - Chenxi Qiu, Lei Yu, Haiying Shen, Sohraab Soltani:
Low-latency multi-flow broadcasts in fading wireless networks. 455-459 - Pedro E. Santacruz, Vaneet Aggarwal, Ashutosh Sabharwal:
Beyond interference avoidance: Distributed sub-network scheduling in wireless networks with local views. 460-464
MC - Sensor networks 3
- Yang Yang, Miao Jin, Yao Zhao, Hongyi Wu:
Cut graph based information storage and retrieval in 3D sensor networks with general topology. 465-469 - Shibo He, Xiaowen Gong, Junshan Zhang, Jiming Chen, Youxian Sun:
Barrier coverage in wireless sensor networks: From lined-based to curve-based deployment. 470-474 - Anais Vergne, Laurent Decreusefond, Philippe Martins:
Reduction algorithm for simplicial complexes. 475-479 - Yin Wang, Yuan He, Dapeng Cheng, Yunhao Liu, Xiang-Yang Li:
TriggerCas: Enabling wireless consrucive collisions. 480-484
MC - Localization
- Xiuyuan Zheng, Jie Yang, Yingying Chen, Yu Gan:
Adaptive device-free passive localization coping with dynamic target speed. 485-489 - Chenshu Wu, Zheng Yang, Yiyang Zhao, Yunhao Liu:
Footprints elicit the truth: Improving global positioning accuracy via local mobility. 490-494 - Kaikai Liu, Xinxin Liu, Lulu Xie, Xiaolin Li:
Towards accurate acoustic localization on a smartphone. 495-499 - Xinfeng Li, Jin Teng, Qiang Zhai, Junda Zhu, Dong Xuan, Yuan F. Zheng, Wei Zhao:
EV-Human: Human localization via visual estimation of body electronic interference. 500-504 - Yu Zhao, Yunhuai Liu, Tian He, Athanasios V. Vasilakos, Chuanping Hu:
FREDI: Robust RSS-based ranging with multipath effect and radio interference. 505-509
MC - Data center networking 2
- Amir Nahir, Ariel Orda, Danny Raz:
Schedule first, manage later: Network-aware load balancing. 510-514 - Kai Wang, Minghong Lin, Florin Ciucu, Adam Wierman, Chuang Lin:
Characterizing the impact of the workload on the value of dynamic resizing in data centers. 515-519 - Yan Gao, Zheng Zeng, Xue Liu, P. R. Kumar:
The answer is blowing in the wind: Analysis of powering Internet data centers with wind energy. 520-524
MC - Applications of game theory
- Tianrong Zhang, Fan Wu, Chunming Qiao:
SPECIAL: A strategy-proof and Efficient multi-channel Auction mechanism for wireless networks. 525-529 - Yangming Zhao, Sheng Wang, Shizhong Xu, Xiong Wang, Xiujiao Gao, Chunming Qiao:
Load balance vs energy efficiency in traffic engineering: A game Theoretical Perspective. 530-534 - Xin Luo, Hamidou Tembine:
Evolutionary coalitional games for random access control. 535-539 - Chih-Yu Wang, Yan Chen, Hung-Yu Wei, K. J. Ray Liu:
Optimal pricing in stochastic scalable video coding multicasting system. 540-544
MC - Router and switch design
- Yossi Kanizo, David Hay, Isaac Keslassy:
Palette: Distributing tables in software-defined networks. 545-549 - Qing Li, Mingwei Xu, Meng Chen:
NSFIB construction & aggregation with next hop of strict partial order. 550-554 - Dario G. Garao, Guido Maier, Achille Pattavina:
Modular architectures of optical multi-stage switching networks. 555-559
MC - Wireless networks 4
- Eugene Chai, Kang G. Shin, Sung-Ju Lee, Jeongkeun Lee, Raúl H. Etkin:
Defeating heterogeneity in wireless multicast networks. 560-564 - Chien-Han Chai, Yuan-Yao Shih, Ai-Chun Pang:
A spectrum-sharing rewarding framework for co-channel hybrid access femtocell networks. 565-569 - Richard Southwell, Xu Chen, Jianwei Huang:
QoS satisfaction games for spectrum sharing. 570-574 - Shreeshankar Bodas, Bilal Sadiq:
Polynomial-complexity, low-delay scheduling for SCFDMA-based wireless uplink networks. 575-579
MC - Energy harvesting and smart grids
- Qingsi Wang, Mingyan Liu:
When simplicity meets optimality: Efficient transmission power control with stochastic energy harvesting. 580-584 - Maria Gorlatova, Robert Margolies, John Sarik, Gerald Stanje, Jianxun Zhu, Baradwaj Vigraham, Marcin Szczodrak, Luca P. Carloni, Peter R. Kinget, Ioannis Kymissis, Gil Zussman:
Prototyping energy harvesting active networked tags (EnHANTs). 585-589 - Nicolò Michelusi, Leonardo Badia, Ruggero Carli, Luca Corradini, Michele Zorzi:
Impact of battery degradation on optimal management policies of harvesting-based wireless sensor devices. 590-594 - Byung-Gook Kim, Shaolei Ren, Mihaela van der Schaar, Jang-Won Lee:
Bidirectional energy trading for residential load scheduling and electric vehicles. 595-599
MC - Security, privacy, authentication 3
- Shang Shang, Paul W. Cuff, Pan Hui, Sanjeev R. Kulkarni:
An upper bound on the convergence time for quantized consensus. 600-604 - Lan Zhang, Xiang-Yang Li, Yunhao Liu, Taeho Jung:
Verifiable private multi-party computation: Ranging and ranking. 605-609 - Zhen Xu, Cong Wang, Qian Wang, Kui Ren, Lingyu Wang:
Proof-carrying cloud computation: The case of convex optimization. 610-614 - Stefanie Roos, Thorsten Strufe:
A contribution to analyzing and enhancing Darknet routing. 615-619
Cloud computing and networks 1
- Yang Guo, Alexander L. Stolyar, Anwar Walid:
Shadow-routing based dynamic algorithms for virtual machine placement in a network cloud. 620-628 - Hiroki Yanagisawa, Takayuki Osogami, Rudy Raymond:
Dependable virtual machine allocation. 629-637 - Li Erran Li, Vahid Liaghat, Hongze Zhao, MohammadTaghi Hajiaghayi, Dan Li, Gordon T. Wilfong, Yang Richard Yang, Chuanxiong Guo:
PACE: Policy-Aware Application Cloud Embedding. 638-646 - Mansoor Alicherry, T. V. Lakshman:
Optimizing data access latencies in cloud systems by intelligent virtual machine placement. 647-655
Underwater and aerial sensor networks
- Zhaoquan Gu, Qiang-Sheng Hua, Yuexuan Wang, Francis C. M. Lau:
Reducing information gathering latency through Mobile Aerial Sensor Network. 656-664 - Seongwon Han, Youngtae Noh, Uichin Lee, Mario Gerla:
M-FAMA: A multi-session MAC protocol for reliable underwater acoustic streams. 665-673 - Xin Dong, Mehmet Can Vuran:
Environment aware connectivity for wireless underground sensor networks. 674-682 - Yibo Zhu, Zaihan Jiang, Zheng Peng, Michael Zuba, Jun-Hong Cui, Huifang Chen:
Toward practical MAC design for underwater acoustic networks. 683-691
Optical networks
- Greg Kuperman, Eytan H. Modiano:
Network protection with guaranteed recovery times using recovery domains. 692-700 - Zhemin Zhang, Zhiyang Guo, Yuanyuan Yang:
Bounded-reorder packet scheduling in optical cut-through switch. 701-709 - Alexandre Fréchette, F. Bruce Shepherd, Marina K. Thottan, Peter J. Winzer:
Shortest path versus multi-hub routing in networks with uncertain demand. 710-718
Cognitive radio networks 1
- Tarun Bansal, Bo Chen, Prasun Sinha:
DISCERN: Cooperative whitespace scanning in practical environments. 719-727 - Lei Sun, Wenye Wang:
Understanding Blackholes in large-scale Cognitive Radio Networks under generic failures. 728-736 - Youngjune Gwon, H. T. Kung:
Scaling network-based spectrum analyzer with constant communication cost. 737-745 - I-Hsun Chuang, Hsiao-Yun Wu, Kuan-Rong Lee, Yau-Hwang Kuo:
Alternate hop-and-wait channel rendezvous method for cognitive radio networks. 746-754
Cellular networks 1
- Wei Dong, Swati Rallapalli, Rittwik Jana, Lili Qiu, K. K. Ramakrishnan, Leo Razoumov, Yin Zhang, Tae Won Cho:
iDEAL: Incentivized dynamic cellular offloading via auctions. 755-763 - Han Cai, Irem Koprulu, Ness B. Shroff:
Exploiting double opportunities for deadline based content propagation in wireless networks. 764-772 - Bartlomiej Blaszczyszyn, Mohamed Kadhem Karray, Holger Paul Keeler:
Using Poisson processes to model lattice cellular networks. 773-781 - Wei Wang, Jin Zhang, Qian Zhang:
Cooperative cell outage detection in Self-Organizing femtocell networks. 782-790
Mobile security and privacy
- Boxuan Gu, Xinfeng Li, Gang Li, Adam C. Champion, Zhezhe Chen, Feng Qin, Dong Xuan:
D2Taint: Differentiated and dynamic information flow tracking on smartphones for numerous data sources. 791-799 - Jingchao Sun, Rui Zhang, Yanchao Zhang:
Privacy-preserving spatiotemporal matching. 800-808 - Shuaifu Dai, Alok Tongaonkar, Xiaoyin Wang, Antonio Nucci, Dawn Song:
NetworkProfiler: Towards automatic fingerprinting of Android apps. 809-817
Network economics and pricing 1
- M. H. R. Khouzani, Soumya Sen, Ness B. Shroff:
An economic analysis of regulating security investments in the Internet. 818-826 - Qianyi Huang, Yixin Tao, Fan Wu:
SPRING: A Strategy-proof and Privacy preserving spectrum auction mechanism. 827-835 - Shang-Pin Sheng, Mingyan Liu:
Profit incentive in a secondary spectrum market: A contract design approach. 836-844 - Randall Berry, Michael L. Honig, Thành Nguyen, Vijay G. Subramanian, Hang Zhou, Rakesh Vohra:
On the nature of revenue-sharing contracts to incentivize spectrum-sharing. 845-853
Cloud computing and networks 2
- Hong Xu, Baochun Li:
Joint request mapping and response routing for geo-distributed cloud services. 854-862 - Elisha J. Rosensweig, Daniel Sadoc Menasché, Jim Kurose:
On the steady-state of cache networks. 863-871 - Zhi Zhou, Fangming Liu, Hai Jin, Bo Li, Baochun Li, Hongbo Jiang:
On arbitrating the power-performance tradeoff in SaaS clouds. 872-880 - Wei Wei, Harry Tian Gao, Fengyuan Xu, Qun Li:
Fast Mencius: Mencius with low commit latency. 881-889
RFID
- Wen Luo, Yan Qiao, Shigang Chen:
An efficient protocol for RFID multigroup threshold-based classification. 890-898 - Min Chen, Wen Luo, Zhen Mo, Shigang Chen, Yuguang Fang:
An efficient tag search protocol in large-scale RFID systems. 899-907 - Yuanqing Zheng, Mo Li:
ZOE: Fast cardinality estimation for large-scale RFID systems. 908-916 - Yuanqing Zheng, Mo Li:
P-MTI: Physical-layer Missing Tag Identification via compressive sensing. 917-925
Network survivability
- Greg Kuperman, Eytan H. Modiano:
Providing protection in multi-hop wireless networks. 926-934 - János Tapolcai, Gábor Rétvári:
Router virtualization for improving IP-level resilience. 935-943 - Jose Yallouz, Ariel Orda:
Tunable QoS-aware network survivability. 944-952
Cognitive radio networks 2
- Shuang Li, Zizhan Zheng, Eylem Ekici, Ness B. Shroff:
Maximizing social welfare in operator-based Cognitive Radio Networks under spectrum uncertainty and sensing inaccuracy. 953-961 - Chunxiao Jiang, Yan Chen, Yu-Han Yang, Chih-Yu Wang, K. J. Ray Liu:
Dynamic Chinese Restaurant Game in cognitive radio networks. 962-970 - Wei Li, Xiuzhen Cheng, Tao Jing, Xiaoshuang Xing:
Cooperative multi-hop relaying via network formation games in cognitive radio networks. 971-979 - Shengrong Bu, F. Richard Yu, Yi Qian:
Energy-efficient cognitive heterogeneous networks powered by the smart grid. 980-988
Cellular networks 2
- Danny De Vleeschauwer, Harish Viswanathan, Andre Beck, Steven A. Benno, Gang Li, Raymond B. Miller:
Optimization of HTTP adaptive streaming over mobile cellular networks. 989-997 - Ehsan Aryafar, Alireza Keshavarz-Haddad, Michael Wang, Mung Chiang:
RAT selection games in HetNets. 998-1006 - Ashwin Sridharan, Jean Bolot:
Location patterns of mobile users: A large-scale tudy. 1007-1015 - Yin Sun, Can Emre Koksal, Sung-Ju Lee, Ness B. Shroff:
Network control without CSI using rateless codes for downlink cellular systems. 1016-1024
Security and privacy 1
- Kevin D. Bowers, Ari Juels, Ronald L. Rivest, Emily Shen:
Drifting Keys: Impersonation detection for constrained devices. 1025-1033 - Lu Shi, Shucheng Yu, Wenjing Lou, Y. Thomas Hou:
SybilShield: An agent-aided social network-based Sybil defense among multiple communities. 1034-1042 - Zhen Ling, Junzhou Luo, Kui Wu, Xinwen Fu:
Protocol-level hidden server discovery. 1043-1051 - Liqun Chen, Hoon Wei Lim, Guomin Yang:
Cross-domain password-based authenticated key exchange revisited. 1052-1060
Network economics and pricing 2
- Carlee Joe-Wong, Soumya Sen, Sangtae Ha:
Offering supplementary wireless technologies: Adoption behavior and offloading benefits. 1061-1069 - Lingjie Duan, Jianwei Huang, Jean C. Walrand:
Economic analysis of 4G network upgrade. 1070-1078 - Valentino Pacifici, György Dán:
Content-peering dynamics of autonomous caches in a content-centric network. 1079-1087 - Lingjie Duan, Jianwei Huang, Biying Shou:
Optimal pricing for local and global WiFi markets. 1088-1096
Energy efficiency in wireless networks
- Dimitrios Tsilimantos, Jean-Marie Gorce, Eitan Altman:
Stochastic analysis of energy savings with sleep mode in OFDMA wireless networks. 1097-1105 - R. M. Karthik, Arvind Chakrapani:
Practical algorithm for power efficient DRX configuration in next generation mobiles. 1106-1114 - Rahul Vaze:
Competitive ratio analysis of online algorithms to minimize packet transmission time in energy harvesting communication system. 1115-1123 - Cheng Liu, Karthikeyan Sundaresan, Meilong Jiang, Sampath Rangarajan, Gee-Kung Chang:
The case for re-configurable backhaul in cloud-RAN based small cell networks. 1124-1132
Smart Grid
- Shaojie Tang, Qiuyuan Huang, Xiang-Yang Li, Dapeng Wu:
Smoothing the energy consumption: Peak demand reduction in smart grid. 1133-1141 - Yingsong Huang, Shiwen Mao, R. Mark Nelms:
Adaptive electricity scheduling in microgrids. 1142-1150 - Yang Gao, Yan Chen, Chih-Yu Wang, K. J. Ray Liu:
A contract-based approach for ancillary services in V2G networks: Optimality and learning. 1151-1159 - Xuan Liu, Kui Ren, Yanling Yuan, Zuyi Li, Qian Wang:
Optimal budget deployment strategy against power grid interdiction. 1160-1168
Sensor coverage and topology control
- Xiaowen Gong, Junshan Zhang, Douglas Cochran:
When target motion matters: Doppler coverage in radar sensor networks. 1169-1177 - Yilin Shen, Dung T. Nguyen, My T. Thai:
Adaptive approximation algorithms for hole healing in hybrid wireless sensor networks. 1178-1186 - Lidong Wu, Hongwei Du, Weili Wu, Deying Li, Jing Lv, Wonjun Lee:
Approximations for Minimum Connected Sensor Cover. 1187-1194 - Zuoming Yu, Jin Teng, Xinfeng Li, Dong Xuan:
On wireless network coverage in bounded areas. 1195-1203
Router and switch design
- Longbo Huang, Jean C. Walrand:
A Benes packet network. 1204-1212 - Yaoqing Liu, Beichuan Zhang, Lan Wang:
FIFA: Fast incremental FIB aggregation. 1213-1221 - Layong Luo, Gaogang Xie, Kavé Salamatian, Steve Uhlig, Laurent Mathy, Yingke Xie:
A trie merging approach with incremental updates for virtual routers. 1222-1230 - Ori Rottenstreich, Marat Radan, Yuval Cassuto, Isaac Keslassy, Carmi Arad, Tal Mizrahi, Yoram Revah, Avinatan Hassidim:
Compressing forwarding tables. 1231-1239
Cognitive radio networks 3
- Qiben Yan, Ming Li, Feng Chen, Tingting Jiang, Wenjing Lou, Y. Thomas Hou, Chang-Tien Lu:
Non-parametric passive traffic monitoring in cognitive radio networks. 1240-1248 - Yang Liu, Mingyan Liu:
To stay or to switch: Multiuser dynamic channel access. 1249-1257 - Wessam Afifi, Marwan Krunz:
Exploiting self-interference suppression for improved spectrum awareness/efficiency in cognitive radio systems. 1258-1266 - Xiang Sheng, Jian Tang, Chenfei Gao, Weiyi Zhang, Chonggang Wang:
Leveraging load migration and basestaion consolidation for green communications in virtualized Cognitive Radio Networks. 1267-1275
Cloud computing and networks 3
- Yadi Ma, Thyaga Nandagopal, Krishna P. N. Puttaswamy, Suman Banerjee:
An ensemble of replication and erasure codes for cloud file systems. 1276-1284 - Marco Valerio Barbera, Sokol Kosta, Alessandro Mei, Julinda Stefa:
To offload or not to offload? The bandwidth and energy costs of mobile cloud computing. 1285-1293 - Lluis Pamies-Juarez, Anwitaman Datta, Frédérique E. Oggier:
RapidRAID: Pipelined erasure codes for fast data archival in distributed storage systems. 1294-1302 - Yu Hua, Bin Xiao, Xue Liu:
NEST: Locality-aware approximate query service for cloud computing. 1303-1311
Ad hoc networks 1
- Rafael P. Laufer, Leonard Kleinrock:
On the capacity of wireless CSMA/CA multihop networks. 1312-1320 - Wang Liu, Kejie Lu, Jianping Wang, Yi Qian, Liusheng Huang, Jun Liu, Dapeng Oliver Wu:
On the throughput-delay trade-off in large-scale MANETs with a generalized i.i.d. mobility model. 1321-1329 - Huacheng Zeng, Yi Shi, Y. Thomas Hou, Wenjing Lou, Sastry Kompella, Scott F. Midkiff:
On interference alignment for multi-hop MIMO networks. 1330-1338 - Guanhong Pei, Anil Kumar S. Vullikanti:
Distributed approximation algorithms for maximum link scheduling and local broadcasting in the physical interference model. 1339-1347
Wireless LAN 1
- Mahanth Gowda, Souvik Sen, Romit Roy Choudhury, Sung-Ju Lee:
Cooperative packet recovery in enterprise WLANs. 1348-1356 - Jin Tang, Yu Cheng:
Selfish misbehavior detection in 802.11 based wireless networks: An adaptive approach based on Markov decision process. 1357-1365 - Yifan Zhang, Qun Li:
HoWiES: A holistic approach to ZigBee assisted WiFi energy savings in mobile devices. 1366-1374 - Pei Huang, Xi Yang, Li Xiao:
WiFi-BA: Choosing arbitration over backoff in high speed multicarrier wireless networks. 1375-1383
Sensor networks 1
- Xuefeng Liu, Jiannong Cao, Shaojie Tang:
Fault tolerant complex event detection in WSNs: A case study in structural health monitoring. 1384-1392 - Long Cheng, Yu Gu, Tian He, Jianwei Niu:
Dynamic switching-based reliable flooding in low-duty-cycle wireless sensor networks. 1393-1401 - Iordanis Koutsopoulos:
Optimal incentive-driven design of participatory sensing systems. 1402-1410 - Hengchang Liu, Shaohan Hu, Wei Zheng, Zhiheng Xie, Shiguang Wang, Pan Hui, Tarek F. Abdelzaher:
Efficient 3G budget utilization in mobile participatory sensing applications. 1411-1419
Network measurement and analysis
- Sriharsha Gangam, Puneet Sharma, Sonia Fahmy:
Pegasus: Precision hunting for icebergs and anomalies in network flows. 1420-1428 - Avinatan Hassidim, Danny Raz, Michal Segalov, Ariel Shaqed:
Network utilization: The flow view. 1429-1437 - Gerhard Haßlinger, Anne Schwahn, Franz Hartleb:
2-State (semi-)Markov processes beyond Gilbert-Elliott: Traffic and channel models based on 2nd order statistics. 1438-1446 - Yang Liu, Wenji Chen, Yong Guan:
Near-optimal approximate membership query over time-decaying windows. 1447-1455
Cognitive radio networks 4
- Ying Dai, Jie Wu, Chunsheng Xin:
Virtual backbone construction for cognitive radio networks without common control channel. 1456-1464 - Xiaoshuang Xing, Tao Jing, Yan Huo, Hongjuan Li, Xiuzhen Cheng:
Channel quality prediction based on Bayesian inference in cognitive radio networks. 1465-1473 - Yanxiao Zhao, Min Song, Chunsheng Xin:
FMAC: A fair MAC protocol for coexisting cognitive radio networks. 1474-1482 - Mustafa Özger, Özgür B. Akan:
Event-driven spectrum-aware clustering in cognitive radio sensor networks. 1483-1491
Cloud pricing and cost optimization
- Ali Khanafer, Murali S. Kodialam, Krishna P. N. Puttaswamy:
The constrained Ski-Rental problem and its application to online cloud cost optimization. 1492-1500 - Di Niu, Baochun Li:
An efficient distributed algorithm for resource allocation in large-scale coupled systems. 1501-1509 - Hong Zhang, Bo Li, Hongbo Jiang, Fangming Liu, Athanasios V. Vasilakos, Jiangchuan Liu:
A framework for truthful online auctions in cloud computing with heterogeneous user demands. 1510-1518 - Heejun Roh, Cheoulhoon Jung, Wonjun Lee, Ding-Zhu Du:
Resource pricing game in geo-distributed clouds. 1519-1527
Ad hoc networks 2
- Bo Ji, Changhee Joo, Ness B. Shroff:
Exploring the inefficiency and instability of Back-Pressure algorithms. 1528-1536 - Sharayu Moharir, Sanjay Shakkottai:
MaxWeight vs. BackPressure: Routing and scheduling in multi-channel relay networks. 1537-1545 - Huacheng Zeng, Yi Shi, Y. Thomas Hou, Wenjing Lou:
An efficient DoF scheduling algorithm for multi-hop MIMO networks. 1546-1554 - Hulya Seferoglu, Eytan H. Modiano:
Diff-Max: Separation of routing and scheduling in backpressure-based wireless networks. 1555-1563
Wireless LAN 2
- Haochao Li, Kaishun Wu, Qian Zhang, Lionel M. Ni:
CUTS: Improving channel utilization in both time and spatial domains in WLANs. 1564-1572 - Julien Herzen, Ruben Merz, Patrick Thiran:
Distributed spectrum assignment for home WLANs. 1573-1581 - Oscar Bejarano, Edward W. Knightly:
Virtual MISO triggers in Wi-Fi-like networks. 1582-1590 - Yuan Yao, Lei Rao, Xue Liu, Xingshe Zhou:
Delay analysis and study of IEEE 802.11p based DSRC safety communication in a highway environment. 1591-1599
Resource allocation in cloud computing 1
- Yousi Zheng, Ness B. Shroff, Prasun Sinha:
A new analytical technique for designing provably efficient MapReduce schedulers. 1600-1608 - Weina Wang, Kai Zhu, Lei Ying, Jian Tan, Li Zhang:
Map task scheduling in MapReduce with data locality: Throughput and heavy-traffic optimality. 1609-1617 - Jian Tan, Xiaoqiao Meng, Li Zhang:
Coupling task progress for MapReduce resource-aware scheduling. 1618-1626 - Jian Tan, Shicong Meng, Xiaoqiao Meng, Li Zhang:
Improving ReduceTask data locality for sequential MapReduce jobs. 1627-1635
Sensor networks 2
- Liguang Xie, Yi Shi, Y. Thomas Hou, Wenjing Lou, Hanif D. Sherali, Scott F. Midkiff:
Bundling mobile base station and wireless energy transfer: Modeling and optimization. 1636-1644 - Xiaolin Fang, Hong Gao, Jianzhong Li, Yingshu Li:
Application-aware data collection in Wireless Sensor Networks. 1645-1653 - Linghe Kong, Mingyuan Xia, Xiao-Yang Liu, Min-You Wu, Xue Liu:
Data loss and reconstruction in sensor networks. 1654-1662 - Guohua Li, Jianzhong Li, Hong Gao:
ε-Approximation to data streams in sensor networks. 1663-1671
Internet monitoring and measurement
- Oded Argon, Yuval Shavitt, Udi Weinsberg:
Inferring the periodicity in large-scale Internet measurements. 1672-1680 - Xun Fan, John S. Heidemann, Ramesh Govindan:
Evaluating anycast in the domain name system. 1681-1689 - Yi-Chao Chen, Gene Moo Lee, Nick G. Duffield, Lili Qiu, Jia Wang:
Event detection using customer care calls. 1690-1698 - Mehdi Malboubi, Cuong Vu, Chen-Nee Chuah, Puneet Sharma:
Decentralizing network inference problems with Multiple-Description Fusion Estimation (MDFE). 1699-1707
Cognitive radio networks 5
- Anastasios Giannoulis, Paul Patras, Edward W. Knightly:
Mobile Access of Wide-Spectrum Networks: Design, deployment and experimental evaluation. 1708-1716 - Hongxing Li, Chuan Wu, Zongpeng Li, Francis C. M. Lau:
Socially-optimal multi-hop secondary communication under arbitrary primary user mechanisms. 1717-1725 - Bin Cao, Jon W. Mark, Qinyu Zhang, Rongxing Lu, Xiaodong Lin, Xuemin (Sherman) Shen:
On optimal communication strategies for cooperative cognitive radio networking. 1726-1734 - Sang-Woon Jeon, Michael Gastpar:
Capacity scaling of cognitive networks: Beyond interference-limited communication. 1735-1743
Overlay and peer-to-peer networks
- Youngmi Jin, Yung Yi, George Kesidis, Fatih Kocak, Jinwoo Shin:
Hybrid client-server and peer-to-peer caching systems with selfish peers. 1744-1752 - François Baccelli, Fabien Mathieu, Ilkka Norros, Rémi Varloot:
Can P2P networks be super-scalable? 1753-1761 - Zhongmei Yao, Daren B. H. Cline, Dmitri Loguinov:
Unstructured P2P link lifetimes redux. 1762-1770 - Kianoosh Mokhtarian, Hans-Arno Jacobsen:
Minimum-delay overlay multicast. 1771-1779
Security and privacy 2
- Hao Chen, Yu Chen, Douglas H. Summerville, Zhou Su:
An optimized design of reconfigurable PSD accelerator for online shrew DDoS attacks detection. 1780-1787 - Wenji Chen, Yang Liu, Yong Guan:
Cardinality change-based early detection of large-scale cyber-attacks. 1788-1796 - Guanyu Tian, Zhenhai Duan, Todd Baumeister, Yingfei Dong:
A traceback attack on Freenet. 1797-1805 - Hongli Zhang, Jiantao Shi, Lin Ye, Xiaojiang Du:
PPBD: A piracy preventing system for BT DHT networks. 1806-1814
Ad hoc networks 3
- Giuseppa Alfano, Michele Garetto, Emilio Leonardi:
Content-centric wireless networks with limited buffers: When mobility hurts. 1815-1823 - Seon-Yeong Han, Nael B. Abu-Ghazaleh, Dongman Lee:
Double Regression: Efficient spatially correlated path loss model for wireless network simulation. 1824-1832 - Hussein Al-Zubaidy, Jörg Liebeherr, Almut Burchard:
A (min, ×) network calculus for multi-hop fading channels. 1833-1841 - Ming Li, Pan Li, Miao Pan, Jinyuan Sun:
Economic-robust transmission opportunity auction in multi-hop wireless networks. 1842-1850
Wireless mesh networks
- Devu Manikantan Shila, Yu Cheng:
Capacity gain through power enhancement in multi-radio multi-channel wireless networks. 1851-1859 - Haopeng Li, Jiang Xie:
GaS: A gateway scheduling-based handoff scheme in single-radio infrastructure wireless mesh networks. 1860-1868 - Ramanujan K. Sheshadri, Dimitrios Koutsonikolas:
Comparison of routing metrics in 802.11n wireless mesh networks. 1869-1877 - Zi Feng, George Papageorgiou, Srikanth V. Krishnamurthy, Ramesh Govindan, Tom La Porta:
Trading off distortion for delay for video transmissions in wireless networks. 1878-1886
Resource allocation in cloud computing 2
- Siva Theja Maguluri, R. Srikant:
Scheduling jobs with unknown duration in clouds. 1887-1895 - Furong Huang, Anima Anandkumar:
FCD: Fast-concurrent-distributed load balancing under switching costs and imperfect observations. 1896-1904 - Johannes Schneider, Stefan Schmid:
Optimal bounds for online page migration with generalized migration costs. 1905-1913 - Yuval Rochman, Hanoch Levy, Eli Brosh:
Resource placement and assignment in distributed network topologies. 1914-1922
Sensor networks 3
- Seksan Laitrakun, Edward J. Coyle:
Optimizing the collection of local decisions for time-constrained distributed detection in WSNs. 1923-1931 - Songtao Guo, Cong Wang, Yuanyuan Yang:
Mobile data gathering with Wireless Energy Replenishment in rechargeable sensor networks. 1932-1940 - Dawei Gong, Yuanyuan Yang:
Low-latency SINR-based data gathering in wireless sensor networks. 1941-1949 - Yeqing Yi, Rui Li, Fei Chen, Alex X. Liu, Yaping Lin:
A digital watermarking approach to secure and precise range query processing in sensor networks. 1950-1958
Network modelling
- Pengda Huang, Matthew Jordan Tonnemacher, Yongjiu Du, Dinesh Rajan, Joseph David Camp:
Towards scalable network emulation: Channel accuracy versus implementation resources. 1959-1967 - Minas Gjoka, Maciej Kurant, Athina Markopoulou:
2.5K-graphs: From sampling to generation. 1968-1976 - Tung-Wei Kuo, Kate Ching-Ju Lin, Ming-Jer Tsai:
Maximizing submodular set function with connectivity constraint: Theory and application to networks. 1977-1985
Spectrum pricing
- Yuefei Zhu, Baochun Li, Zongpeng Li:
Core-selecting combinatorial auction design for secondary spectrum markets. 1986-1994 - Xiaojun Feng, Qian Zhang, Jin Zhang:
Hybrid pricing for TV white space database. 1995-2003 - Yanjiao Chen, Lingjie Duan, Jianwei Huang, Qian Zhang:
Balance of revenue and social welfare in FCC's spectrum allocation. 2004-2012 - Peng Lin, Xiaojun Feng, Qian Zhang, Mounir Hamdi:
Groupon in the Air: A three-stage auction framework for Spectrum Group-buying. 2013-2021
Security and privacy 3
- Prakash Mandayam Comar, Lei Liu, Sabyasachi Saha, Pang-Ning Tan, Antonio Nucci:
Combining supervised and unsupervised learning for zero-day malware detection. 2022-2030 - Seyed Ali Ahmadzadeh, Gordon B. Agnew:
Turbo covert channel: An iterative framework for covert communication over data networks. 2031-2039 - James Daly, Alex X. Liu, Eric Torng:
A difference resolution approach to compressing Access Control Lists. 2040-2048 - Ori Rottenstreich, Isaac Keslassy, Avinatan Hassidim, Haim Kaplan, Ely Porat:
On finding an optimal TCAM encoding scheme for packet classification. 2049-2057
Mobile Opportunistic Networks 1
- Wei Gao, Qinghua Li:
Wakeup scheduling for energy-efficient communication in opportunistic mobile networks. 2058-2066 - Yoora Kim, Kyunghan Lee, Ness B. Shroff, Injong Rhee:
Providing probabilistic guarantees on the time of information spread in opportunistic networks. 2067-2075 - Chul-Ho Lee, Jaewook Kwak, Do Young Eun:
Characterizing link connectivity for opportunistic mobile networking: Does mobility suffice? 2076-2084 - Mingjun Xiao, Jie Wu, Cong Liu, Liusheng Huang:
TOUR: Time-sensitive Opportunistic Utility-based Routing in delay tolerant networks. 2085-2091
Wireless cross-layer design
- Nathaniel M. Jones, Brooke Shrader, Eytan H. Modiano:
Distributed CSMA with pairwise coding. 2094-2102 - Jia Liu, Cathy H. Xia, Ness B. Shroff, Hanif D. Sherali:
Distributed cross-layer optimization in wireless networks: A second-order approach. 2103-2111 - Bin Li, Atilla Eryilmaz, Ruogu Li:
Wireless scheduling for network utility maximization with optimal convergence speed. 2112-2120 - Peng-Jun Wan, Xiaohua Jia, Guojun Dai, Hongwei Du, Zhiguo Wan, Ophir Frieder:
Scalable algorithms for wireless link schedulings in multi-channel multi-radio wireless networks. 2121-2129
Data center networking
- Advait Abhay Dixit, Pawan Prakash, Y. Charlie Hu, Ramana Rao Kompella:
On the impact of packet spraying in data center networks. 2130-2138 - Jian Guo, Fangming Liu, Dan Zeng, John C. S. Lui, Hai Jin:
A cooperative game based allocation for sharing data center networks. 2139-2147 - Ziyu Shao, Xin Jin, Wenjie Jiang, Minghua Chen, Mung Chiang:
Intra-data-center traffic engineering with ensemble routing. 2148-2156 - Ali Munir, Ihsan Ayyub Qazi, Zartash Afzal Uzmi, Aisha Mushtaq, Saad N. Ismail, M. Safdar Iqbal, Basma Khan:
Minimizing flow completion times in data centers. 2157-2165
Sensor networks 4
- Xiaomeng Ban, Mayank Goswami, Wei Zeng, Xianfeng Gu, Jie Gao:
Topology dependent space filling curves for sensor networks and applications. 2166-2174 - Tianlong Yu, Hongbo Jiang, Guang Tan, Chonggang Wang, Chen Tian, Yu Wu:
SINUS: A scalable and distributed routing algorithm with guaranteed delivery for WSNs on high genus 3D surfaces. 2175-2183 - Kai Xing, Shuo Zhang, Lei Shi, Haojin Zhu, Yuepeng Wang:
A localized backbone renovating algorithm for wireless ad hoc and sensor networks. 2184-2192 - Markus Benter, Florentin Neumann, Hannes Frey:
Reactive planar spanner construction in wireless ad hoc and sensor networks. 2193-2201
Traffic engineering
- Ting He, Dennis Goeckel, Ramya Raghavendra, Don Towsley:
Endhost-based shortest path routing in dynamic networks: An online learning approach. 2202-2210 - Sugam Agarwal, Murali S. Kodialam, T. V. Lakshman:
Traffic engineering in software defined networks. 2211-2219 - Laurent Vanbever, Stefano Vissicchio, Luca Cittadini, Olivier Bonaventure:
When the cure is worse than the disease: The impact of graceful IGP operations on BGP. 2220-2228
Spectrum sensing
- Jerry T. Chiang, Yih-Chun Hu:
Did you also hear that? Spectrum sensing using Hermitian inner product. 2229-2237 - Shimin Gong, Ping Wang, Wei Liu, Weihua Zhuang:
Performance bounds of energy detection with signal uncertainty in cognitive radio networks. 2238-2246 - Sungro Yoon, Li Erran Li, Soung Chang Liew, Romit Roy Choudhury, Injong Rhee, Kun Tan:
QuickSense: Fast and energy-efficient channel sensing for dynamic spectrum access networks. 2247-2255 - Qiang Liu, Xin Wang, Yong Cui:
Scheduling of sequential periodic sensing for cognitive radios. 2256-2264
Wireless security and privacy 1
- Iris Safaka, Christina Fragouli, Katerina J. Argyraki, Suhas N. Diggavi:
Exchanging pairwise secrets efficiently. 2265-2273 - Chunqiang Hu, Xiuzhen Cheng, Fan Zhang, Dengyuan Wu, Xiaofeng Liao, Dechang Chen:
OPFKA: Secure and efficient Ordered-Physiological-Feature-based key agreement for wireless Body Area Networks. 2274-2282 - Xiaojun Zhu, Fengyuan Xu, Edmund Novak, Chiu C. Tan, Qun Li, Guihai Chen:
Extracting secret key from wireless link dynamics in vehicular environments. 2283-2291 - Pengfei Huang, Xudong Wang:
Fast secret key generation in static wireless networks: A virtual channel approach. 2292-2300
Mobile Opportunistic Networks 2
- Linke Guo, Chi Zhang, Hao Yue, Yuguang Fang:
A privacy-preserving social-assisted mobile content dissemination scheme in DTNs. 2301-2309 - Ting Ning, Zhipeng Yang, Hongyi Wu, Zhu Han:
Self-Interest-Driven incentives for ad dissemination in autonomous mobile social networks. 2310-2318 - Jie Wu, Mingjun Xiao, Liusheng Huang:
Homing spread: Community home-based multi-copy routing in mobile social networks. 2319-2327 - Jaeseong Jeong, Yung Yi, Jeong-woo Cho, Do Young Eun, Song Chong:
Wi-Fi sensing: Should mobiles sleep longer as they age? 2328-2336
Network coding
- Georgios S. Paschos, Constantinos Fragiadakis, Leonidas Georgiadis, Leandros Tassiulas:
Wireless network coding with partial overhearing information. 2337-2345 - Jun Li, Xin Wang, Baochun Li:
Cooperative pipelined regeneration in distributed storage systems. 2346-2354 - Yuchong Hu, Patrick P. C. Lee, Kenneth W. Shum:
Analysis and construction of functional regenerating codes with uncoded repair for distributed storage systems. 2355-2363 - Xunrui Yin, Yan Wang, Xin Wang, Xiangyang Xue, Zongpeng Li:
A graph minor perspective to network coding: Connecting algebraic coding with network topologies. 2364-2372
Social computing and networks
- Bo Jiang, Nidhi Hegde, Laurent Massoulié, Don Towsley:
How to Optimally allocate your budget of attention in social networks. 2373-2381 - Jin Cao, Hongyu Gao, Li Erran Li, Brian D. Friedman:
Enterprise social network analysis and modeling: A tale of two graphs. 2382-2390 - Dong Wang, Hosung Park, Gaogang Xie, Sue B. Moon, Mohamed Ali Kâafar, Kavé Salamatian:
A genealogy of information spreading on microblogs: A Galton-Watson-based explicative model. 2391-2399 - Jilong Xue, Zhi Yang, Xiaoyong Yang, Xiao Wang, Lijiang Chen, Yafei Dai:
VoteTrust: Leveraging friend invitation graph to defend against social network Sybils. 2400-2408
Sensor networks 5
- Siming Li, Wei Zeng, Dengpan Zhou, Xianfeng David Gu, Jie Gao:
Compact conformal map for greedy routing in wireless mobile sensor networks. 2409-2417 - Novella Bartolini, Giancarlo Bongiovanni, Thomas La Porta, Simone Silvestri:
On the security vulnerabilities of the virtual force approach to mobile sensor deployment. 2418-2426 - Dongxiao Yu, Qiang-Sheng Hua, Yuexuan Wang, Jiguo Yu, Francis C. M. Lau:
Efficient distributed multiple-message broadcasting in unstructured wireless networks. 2427-2435 - Zhongming Zheng, Anfeng Liu, Lin X. Cai, Zhigang Chen, Xuemin (Sherman) Shen:
ERCD: An energy-efficient clone detection protocol in WSNs. 2436-2444
Scheduling and buffer management
- Yashar Ghiassi-Farrokhfal, Jörg Liebeherr:
Capacity provisioning for schedulers with tiny buffers. 2445-2453 - Sachin Kadloor, Negar Kiyavash:
Delay optimal policies offer very little privacy. 2454-2462 - Zhoujia Mao, Can Emre Koksal, Ness B. Shroff:
Online packet scheduling with hard deadlines in multihop communication networks. 2463-2471 - Leana Golubchik, Samir Khuller, Koyel Mukherjee, Yuan Yao:
To send or not to send: Reducing the cost of data transmission. 2472-2478
Localization
- Sungwon Yang, Pralav Dessai, Mansi Verma, Mario Gerla:
FreeLoc: Calibration-free crowdsourced indoor localization. 2481-2489 - Yinjie Chen, Zhongli Liu, Xinwen Fu, Benyuan Liu, Wei Zhao:
Theory underlying measurement of AOA with a rotating directional antenna. 2490-2498 - Senshan Ji, Kam-Fung Sze, Zirui Zhou, Anthony Man-Cho So, Yinyu Ye:
Beyond convex relaxation: A polynomial-time non-convex optimization approach to network localization. 2499-2507 - Xiaojun Zhu, Qun Li, Guihai Chen:
APT: Accurate outdoor pedestrian tracking with smartphones. 2508-2516
Wireless security and privacy 2
- Xinlei (Oscar) Wang, Wei Cheng, Prasant Mohapatra, Tarek F. Abdelzaher:
ARTSense: Anonymous reputation and trust in participatory sensing. 2517-2525 - Rui Zhang, Jinxue Zhang, Yanchao Zhang, Chi Zhang:
Secure crowdsourcing-based cooperative pectrum sensing. 2526-2534 - Shuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan, Kai Xing:
YouSense: Mitigating entropy selfishness in distributed collaborative spectrum sensing. 2535-2543 - Zhiping Jiang, Jizhong Zhao, Xiang-Yang Li, Jinsong Han, Wei Xi:
Rejecting the attack: Source authentication for Wi-Fi management frames using CSI Information. 2544-2552
Vehicular Networks 1
- Yujin Li, Wenye Wang:
Horizon on the move: Geocast in intermittently connected vehicular ad hoc networks. 2553-2561 - Tom H. Luan, Xuemin (Sherman) Shen, Fan Bai:
Integrity-oriented content transmission in highway vehicular ad hoc networks. 2562-2570 - Xu Li, Chunming Qiao, Yunfei Hou, Yunjie Zhao, Aditya Wagh, Adel W. Sadek, Liusheng Huang, Hongli Xu:
On-road ads delivery scheduling and bandwidth allocation in vehicular CPS. 2571-2579 - Yuchen Wu, Yanmin Zhu, Hongzi Zhu, Bo Li:
CCR: Capacity-constrained replication for data delivery in vehicular networks. 2580-2588
Wireless networks 1
- Bo Ji, Gagan Raj Gupta, Xiaojun Lin, Ness B. Shroff:
Performance of low-complexity greedy scheduling policies in multi-channel wireless networks: Optimal throughput and near-optimal delay. 2589-2597 - Po-Kai Huang, Xiaojun Lin:
Improving the delay performance of CSMA algorithms: A Virtual Multi-Channel approach. 2598-2606 - Rahul Urgaonkar, Ram Ramanathan, Jason Redi, William N. Tetteh:
Channel assignment in dense MC-MR wireless networks: Scaling laws and algorithms. 2607-2615 - Ruogu Li, Atilla Eryilmaz, Bin Li:
Throughput-optimal wireless scheduling with regulated inter-service times. 2616-2624
Cloud security and privacy 1
- Taeho Jung, Xiang-Yang Li, Zhiguo Wan, Meng Wan:
Privacy preserving cloud data access with multi-authorities. 2625-2633 - Taeho Jung, XuFei Mao, Xiang-Yang Li, Shaojie Tang, Wei Gong, Lan Zhang:
Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation. 2634-2642 - Zhigang Zhou, Hongli Zhang, Xiaojiang Du, Panpan Li, Xiang-Zhan Yu:
Prometheus: Privacy-aware data retrieval on hybrid cloud. 2643-2651 - Jiawei Yuan, Shucheng Yu:
Efficient privacy-preserving biometric identification in cloud computing. 2652-2660
Sensor networks 6
- Hao Huang, Jihoon Yun, Ziguo Zhong, Song Min Kim, Tian He:
PSR: Practical synchronous rendezvous in low-duty-cycle wireless networks. 2661-2669 - Yang Peng, Zi Li, Daji Qiao, Wensheng Zhang:
I2C: A holistic approach to prolong the sensor network lifetime. 2670-2678 - Wei Dong, Yunhao Liu, Yuan He, Tong Zhu:
Measurement and analysis on the packet delivery performance in a large scale sensor network. 2679-2687 - Qiang Ma, Kebin Liu, Xiangrong Xiao, Zhichao Cao, Yunhao Liu:
Link Scanner: Faulty link detection for wireless sensor networks. 2688-2696
Multimedia networking
- Can Zhao, Jian Zhao, Xiaojun Lin, Chuan Wu:
Capacity of P2P on-demand streaming with simple, robust and decentralized control. 2697-2705 - Zheng Lu, Gustavo de Veciana:
Optimizing stored video delivery for mobile networks: The value of knowing the future. 2706-2714 - Yuedong Xu, Salah-Eddine Elayoubi, Eitan Altman, Rachid El Azouzi:
Impact of flow-level dynamics on QoE of video streaming in wireless networks. 2715-2723 - Delia Ciullo, Valentina Martina, Michele Garetto, Emilio Leonardi:
How much can large-scale Video-on-Demand benefit from users' cooperation? 2724-2732
Localization and location privacy
- He Wang, Zhiyang Wang, Guobin Shen, Fan Li, Song Han, Feng Zhao:
WheelLoc: Enabling continuous location service on mobile phone for outdoor scenarios. 2733-2741 - Chih-Chuan Cheng, Pi-Cheng Hsiu:
Extend your journey: Introducing signal strength into location-based applications. 2742-2750 - Zhaoyu Gao, Haojin Zhu, Yao Liu, Muyuan Li, Zhenfu Cao:
Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures. 2751-2759 - Xiang-Yang Li, Taeho Jung:
Search me if you can: Privacy-preserving location query service. 2760-2768
Wireless security and privacy 3
- Ningning Cheng, Xinlei (Oscar) Wang, Wei Cheng, Prasant Mohapatra, Aruna Seneviratne:
Characterizing privacy leakage of public WiFi networks for users on travel. 2769-2777 - Ting Wang, Yaling Yang:
Analysis on perfect location spoofing attacks using beamforming. 2778-2786 - Yan Zhang, Loukas Lazos:
Countering selfish misbehavior in multi-channel MAC protocols. 2787-2795 - Biao Han, Jie Li:
Secrecy capacity maximization for secure cooperative ad-hoc networks. 2796-2804
Vehicular Networks 2
- Nguyen Tien Viet, François Baccelli, Kai Zhu, Sundar Subramanian, Xinzhou Wu:
A performance analysis of CSMA based broadcast protocol in VANETs. 2805-2813 - Lei Zhang, Lin Cai, Jianping Pan:
Connectivity in two-dimensional lattice networks. 2814-2822 - Hongjian Wang, Yanmin Zhu, Qian Zhang:
Compressive sensing based monitoring with vehicular networks. 2823-2831 - Hongzi Zhu, Mianxiong Dong, Shan Chang, Yanmin Zhu, Minglu Li, Xuemin (Sherman) Shen:
ZOOM: Scaling the mobility for fast opportunistic forwarding in vehicular networks. 2832-2840
Wireless networks 2
- Richard Combes, Zwi Altman, Eitan Altman:
Interference coordination in wireless networks: A flow-level perspective. 2841-2849 - Ahmed Badr, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:
Streaming codes for channels with burst and isolated erasures. 2850-2858 - Chenxi Qiu, Haiying Shen, Sohraab Soltani, Karan Sapra, Hao Jiang, Jason O. Hallstrom:
CEDAR: An optimal and distributed strategy for packet recovery in wireless networks. 2859-2867 - Peng-Jun Wan, Zhiguo Wan, Zhu Wang, XiaoHua Xu, Shaojie Tang, Xiaohua Jia:
Stability analyses of static greedy link schedulings in MC-MR wireless networks. 2868-2876
Cloud security and privacy 2
- Fang Hao, Murali S. Kodialam, T. V. Lakshman, Krishna P. N. Puttaswamy:
Protecting cloud data using dynamic inline fingerprint checks. 2877-2885 - Guojun Wang, Qin Liu, Feng Li, Shuhui Yang, Jie Wu:
Outsourcing privacy-preserving social networks to a cloud. 2886-2894 - Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang:
DAC-MACS: Effective data access control for multi-authority cloud storage systems. 2895-2903 - Boyang Wang, Baochun Li, Hui Li:
Public auditing for shared data with efficient user revocation in the cloud. 2904-2912
Sensor networks 7
- Sk. Kajal Arefin Imon, Adnan Khan, Mario Di Francesco, Sajal K. Das:
RaSMaLai: A Randomized Switching algorithm for Maximizing Lifetime in tree-based wireless sensor networks. 2913-2921 - Lingkun Fu, Peng Cheng, Yu Gu, Jiming Chen, Tian He:
Minimizing charging delay in wireless rechargeable sensor networks. 2922-2930 - Maria Isabel Vergara Gallego, Franck Rousseau:
Energy efficient neighborhood maintenance and medium access with Wake on Idle. 2931-2939 - Yuhang Gao, Jianwei Niu, Ruogu Zhou, Guoliang Xing:
ZiFind: Exploiting cross-technology interference signatures for energy-efficient indoor localization. 2940-2948
Flow and congestion control
- Chih-Ping Li, Eytan H. Modiano:
Receiver-based flow control for networks in overload. 2949-2957 - Chengdi Lai, Ka-Cheong Leung, Victor O. K. Li:
Does it hurt when others prosper?: Exploring the impact of heterogeneous reordering robustness of TCP. 2958-2966 - Ken Inoue, Davide Pasetto, Karol Lynch, Massimiliano Meneghin, Kay Müller, John Sheehan:
Low-latency and high bandwidth TCP/IP protocol processing through an integrated HW/SW approach. 2967-2975 - Jayakrishnan Nair, Krishna P. Jagannathan, Adam Wierman:
When heavy-tailed and light-tailed flows compete: The response time tail under generalized max-weight scheduling. 2976-2984
Location privacy
- Xinxin Liu, Kaikai Liu, Linke Guo, Xiaolin Li, Yuguang Fang:
A game-theoretic approach for achieving k-anonymity in Location Based Services. 2985-2993 - Dejun Yang, Xi Fang, Guoliang Xue:
Truthful incentive mechanisms for k-anonymity location privacy. 2994-3002 - Xinxin Zhao, Lingjun Li, Guoliang Xue:
Checking in without worries: Location privacy in location based social networks. 3003-3011 - Ming Li, Sergio Salinas, Arun Thapa, Pan Li:
n-CD: A geometric approach to preserving location privacy in location-based services. 3012-3020
Wireless security and privacy 4
- Rui Shi, Mayank Goswami, Jie Gao, Xianfeng Gu:
Is random walk truly memoryless - Traffic analysis and source location privacy under random walks. 3021-3029 - Xiali Hei, Xiaojiang Du, Shan Lin, Insup Lee:
PIPAC: Patient infusion pattern based access control scheme for wireless insulin pump system. 3030-3038 - Kai Xing, Zhiguo Wan, Pengfei Hu, Haojin Zhu, Yuepeng Wang, Xi Chen, Yang Wang, Liusheng Huang:
Mutual privacy-preserving regression modeling in participatory sensing. 3039-3047 - Hongbo Liu, Yang Wang, Jie Yang, Yingying Chen:
Fast and practical secret key extraction by exploiting channel response. 3048-3056
Cyber-physical systems
- Zimu Zhou, Zheng Yang, Chenshu Wu, Longfei Shangguan, Yunhao Liu:
Towards omnidirectional passive human detection. 3057-3065 - Longfei Shangguan, Zhenjiang Li, Zheng Yang, Mo Li, Yunhao Liu:
OTrack: Order tracking for luggage in mobile RFID systems. 3066-3074 - Wei Cheng, Kefeng Tan, Victor Omwando, Jindan Zhu, Prasant Mohapatra:
RSS-Ratio for enhancing performance of RSS-based applications. 3075-3083 - Siyao Cheng, Jianzhong Li, Zhipeng Cai:
O(ε)-Approximation to physical world by sensor networks. 3084-3092
Wireless networks 3
- Xinyu Zhang, Kang G. Shin:
Gap Sense: Lightweight coordination of heterogeneous wireless devices. 3094-3101 - Justin Manweiler, Naveen Santhapuri, Romit Roy Choudhury, Srihari Nelakuditi:
Predicting length of stay at WiFi hotspots. 3102-3110 - Rong Zheng, Thanh Le, Zhu Han:
Approximate online learning for passive monitoring of multi-channel wireless networks. 3111-3119 - Wenchi Cheng, Xi Zhang, Hailin Zhang:
Optimal dynamic power control for full-duplex bidirectional-channel based wireless networks. 3120-3128
GI'2013: 16th IEEE Global Internet Symposium
Global Datasets
- Gautam S. Thakur, Pan Hui, Ahmed Helmy:
Modeling and characterization of vehicular density at scale. 3129-3134 - Yi Wang, Michalis Faloutsos, Hui Zang:
On the usage patterns of multimodal communication: Countries and evolution. 3135-3140 - Matteo Varvello, Moritz Steiner:
DHT-based traffic localization in the wild. 3141-3146
TMA 2013: The 5th IEEE International Traffic Monitoring and Analysis Workshop
DNS Analysis
- Yingdi Yu, Duane Wessels, Matt Larson, Lixia Zhang:
Check-Repeat: A new method of measuring DNSSEC validating resolvers. 3147-3152 - Andreas Berger, Wilfried N. Gansterer:
Modeling DNS agility with DNSMap. 3153-3158 - Arian Bär, Antonio Paciello, Peter Romirer-Maierhofer:
Trapping botnets by DNS failure graphs: Validation, extension and application to a 3G network. 3159-3164
NetSciCom 2013: Fifth International Workshop on Network Science for Communication Networks 2013
Session 1B
- Ali Tizghadam, Ali Shariat, Alberto Leon-Garcia, Hassan Naser:
Robust QoS-guaranteed network engineering in interference-aware wireless networks. 3165-3170 - Simone Mainardi, Enrico Gregori, Luciano Lenzini:
The twofold nature of autonomous systems: Evidence combining stock market data with topological properties. 3171-3176
INFOCOM'2013 CCSES: 2013 INFOCOM Workshop on Communications and Control for Smart Energy Systems
Consumer Behavior
- S. N. Akshay Uttama Nambi, Thanasis G. Papaioannou, Dipanjan Chakraborty, Karl Aberer:
Sustainable energy consumption monitoring in residential settings. 3177-3182 - Ugo Montanari, Alain Tcheukam Siwe:
Real time market models and prosumer profiling. 3183-3188
SDP'13: SDP 2013 - IEEE INFOCOM Workshop
Session I: SDP of Content Distribution & Access
- John Tadrous, Atilla Eryilmaz, Hesham El Gamal:
Pricing for demand shaping and proactive download in smart data networks. 3189-3194 - Yih-Farn Robin Chen, Rittwik Jana:
SpeedGate: A smart data pricing testbed based on speed tiers. 3195-3200 - Hyojung Lee, Hyeryung Jang, Yung Yi, Jeong-woo Cho:
On the interaction between content-oriented traffic scheduling and revenue sharing among providers. 3201-3206 - Yang Song, Arun Venkataramani, Lixin Gao:
On the CDN pricing game. 3207-3212 - Matthew Andrews, Ulas Özen, Martin I. Reiman, Qiong Wang:
Economic models of sponsored content in wireless networks with uncertain demand. 3213-3218
INFOCOM'2013 CCSES: 2013 INFOCOM Workshop on Communications and Control for Smart Energy Systems
Energy Effiency in the Smart Grid
- Sun Sun, Min Dong, Ben Liang:
Real-time welfare-maximizing regulation allocation in aggregator-EVs systems. 3219-3224 - Tian Zhang, Wei Chen, Zhu Han, Zhigang Cao:
A cross-layer perspective on energy harvesting aided green communications over fading channels. 3225-3230 - Giulio Betti, Edoardo Amaldi, Antonio Capone, Giulia Ercolani:
Cost-aware optimization models for communication networks with renewable energy sources. 3231-3236
GI'2013: 16th IEEE Global Internet Symposium
Inferring the Shape of the Internet
- Pietro Marchetta, Antonio Pescapè:
DRAGO: Detecting, quantifying and locating hidden routers in Traceroute IP paths. 3237-3242 - Andra Lutu, Marcelo Bagnulo, Olaf Maennel:
The BGP visibility scanner. 3243-3248 - Vasileios Giotsas, Shi Zhou:
Improving the discovery of IXP peering links through passive BGP measurements. 3249-3254
NetSciCom 2013: Fifth International Workshop on Network Science for Communication Networks 2013
Session 2
- Eitan Altman, Francesco De Pellegrini, Rachid El Azouzi, Daniele Miorandi, Tania Jiménez:
Emergence of equilibria from individual strategies in online content diffusion. 3255-3260 - Pavlos Sermpezis, Thrasyvoulos Spyropoulos:
Information diffusion in heterogeneous networks: The configuration model approach. 3261-3266 - Youngmi Jin, Jungseul Ok, Yung Yi, Jinwoo Shin:
On the impact of global information on diffusion of innovations over social networks. 3267-3272 - Konstantinos Poularakis, Leandros Tassiulas:
Surviving in a competitive market of information providers. 3273-3278
TMA 2013: The 5th IEEE International Traffic Monitoring and Analysis Workshop
Network Performances
- Alessio Botta, Antonio Pescapè:
New generation satellite broadband Internet services: Should ADSL and 3G worry? 3279-3284 - Heng Cui, Ernst W. Biersack:
Troubleshooting slow webpage downloads. 3285-3290 - YiXi Gong, Dario Rossi, Claudio Testa, Silvio Valenti, M. Dave Taht:
Fighting the bufferbloat: On the coexistence of AQM and low priority congestion control. 3291-3296 - Chiara Chirichella, Dario Rossi:
To the Moon and back: Are Internet bufferbloat delays really that large? 3297-3302
SDP'13: SDP 2013 - IEEE INFOCOM Workshop
Session II: SDP of Offloading & Scheduling
- Lin Gao, George Iosifidis, Jianwei Huang, Leandros Tassiulas:
Economics of mobile data offloading. 3303-3308 - Joohyun Lee, Yung Yi, Song Chong, Youngmi Jin:
Economics of WiFi offloading: Trading delay for cellular capacity. 3309-3314 - Byung-Gook Kim, Shaolei Ren, Mihaela van der Schaar, Jang-Won Lee:
Tiered billing scheme for residential load scheduling with bidirectional energy trading. 3315-3320 - Ozgur Dalkilic, Ozan Candogan, Atilla Eryilmaz:
Pricing algorithms for the day-ahead electricity market with flexible consumer participation. 3321-3326 - Ming-Jye Sheng, Carlee Joe-Wong, Sangtae Ha, Felix Ming Fai Wong, Soumya Sen:
Smart data pricing: Lessons from trial planning. 3327-3332
GI'2013: 16th IEEE Global Internet Symposium
New Mechanisms
- Larissa Spinelli, Mark Crovella, Brian Eriksson:
AliasCluster: A lightweight approach to interface disambiguation. 3333-3338 - Georg K. Hampel, Moritz Steiner, Tian Bu:
Applying software-defined networking to the telecom domain. 3339-3344 - Yan Shvartzshnaider, Maximilian Ott, Olivier Mehani, Guillaume Jourjon, Thierry Rakotoarivelo, David Levy:
Into the Moana1 - Hypergraph-based network layer indirection. 3345-3350 - Gautam S. Thakur, Ahmed Helmy:
COBRA: A framework for the analysis of realistic mobility models. 3351-3356
NetSciCom 2013: Fifth International Workshop on Network Science for Communication Networks 2013
Session 3
- Yanhua Li, Moritz Steiner, Limin Wang, Zhi-Li Zhang, Jie Bao:
Exploring venue popularity in Foursquare. 3357-3362 - Yi Wang, Hui Zang, Michalis Faloutsos:
Inferring cellular user demographic information using homophily on call graphs. 3363-3368 - Tiphaine Phe-Neau, Marcelo Dias de Amorim, Vania Conan:
The strength of vicinity annexation in opportunistic networking. 3369-3374 - Stojan Trajanovski, Fernando A. Kuipers, Piet Van Mieghem:
Finding critical regions in a network. 3375-3380
TMA 2013: The 5th IEEE International Traffic Monitoring and Analysis Workshop
Passive Monitoring and Classification
- Luigi Grimaudo, Marco Mellia, Elena Baralis, Ram Keralapura:
Self-learning classifier for Internet traffic. 3381-3386 - David Malone, Darren F. Kavanagh, Niall Richard Murphy:
Rogue femtocell owners: How Mallory can monitor my devices. 3387-3392 - Stefan Ruehrup, Pierfrancesco Urbano, Andreas Berger, Alessandro D'Alconzo:
Botnet detection revisited: Theory and practice of finding malicious P2P networks via Internet connection graphs. 3393-3398 - Luca Deri, Alfredo Cardigliano, Francesco Fusco:
10 Gbit line rate packet-to-disk using n2disk. 3399-3404
INFOCOM'2013 CCSES: 2013 INFOCOM Workshop on Communications and Control for Smart Energy Systems
Smart Grid Communications
- Velin Kounev, David Tipper:
Advanced metering and demand response communication performance in Zigbee based HANs. 3405-3410 - Sören Finster, Ingmar Baumgart:
Elderberry: A peer-to-peer, privacy-aware smart metering protocol. 3411-3416 - Hanno Georg, Nils Dorsch, Markus Putzke, Christian Wietfeld:
Performance evaluation of time-critical communication networks for smart grids based on IEC 61850. 3417-3422
Smart Grid Security
- Ting Liu, Yun Gu, Dai Wang, Yuhong Gui, Xiaohong Guan:
A novel method to detect bad data injection attack in smart grid. 3423-3428 - Hasen Nicanfar, Seyedali Hosseininezhad, Peyman TalebiFard, Victor C. M. Leung:
Robust privacy-preserving authentication scheme for communication between electric vehicle as power energy storage and power stations. 3429-3434 - Liang Tang, Yun Rui, Qian Wang, Husheng Li, Zhiyong Bu:
A reverse transmission mechanism for surveillance network in smart grid. 3435-3440
GI'2013: 16th IEEE Global Internet Symposium
New Tools
- Razvan Beuran, Shinsuke Miwa, Yoichi Shinoda:
Network emulation testbed for DTN applications and protocols. 3441-3446 - Selcuk Cevher, Mustafa Ulutas, Ibrahim Hökelek:
Trade-off analysis of multi topology routing based IP fast reroute mechanisms. 3447-3452 - Han Zhang, Christos Papadopoulos, Daniel Massey:
Detecting encrypted botnet traffic. 3453-3458
NetSciCom 2013: Fifth International Workshop on Network Science for Communication Networks 2013
Session 4
- Valerio Arnaboldi, Marco Conti, Andrea Passarella, Fabio Pezzoni:
Ego networks in Twitter: An experimental analysis. 3459-3464 - Swati Rallapalli, Wei Dong, Gene Moo Lee, Yi-Chao Chen, Lili Qiu:
Analysis and applications of smartphone user mobility. 3465-3470
TMA 2013: The 5th IEEE International Traffic Monitoring and Analysis Workshop
Global Internet
- Karyn Benson, Alberto Dainotti, kc claffy, Emile Aben:
Gaining insight into AS-level outages through analysis of Internet background radiation. 3471-3476 - Pierre-Antoine Vervier, Olivier Thonnard:
SpamTracer: How stealthy are spammers? 3477-3482 - Lior Neudorfer, Yuval Shavitt, Noa Zilberman:
Improving AS relationship inference using PoPs. 3483-3488
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.