


default search action
29th INFOCOM 2010: San Diego, CA, USA
- INFOCOM 2010. 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 15-19 March 2010, San Diego, CA, USA. IEEE 2010, ISBN 978-1-4244-5838-7

Energy Efficiency
- Yong Yang, Lu Su, Yan Gao, Tarek F. Abdelzaher:

SolarCode: Utilizing Erasure Codes for Reliable Data Delivery in Solar-powered Wireless Sensor Networks. 1-5 - Michael Segal

, Hanan Shpungin:
Improved Multi-criteria Spanners for Ad-Hoc Networks Under Energy and Distance Metrics. 6-10 - Yan Gao, Zheng Zeng, P. R. Kumar:

Joint Random Access and Power Selection for Maximal Throughput in Wireless Networks. 11-15 - Wenjie Zeng, Anish Arora, Ness B. Shroff:

Maximizing Energy Efficiency for Convergecast via Joint Duty Cycle and Route Optimization. 16-20 - Matthew Andrews, Antonio Fernández, Lisa Zhang, Wenbo Zhao:

Routing and Scheduling for Energy and Delay Minimization in the Powerdown Model. 21-25
Games, Markets and Economics Models
- Hong Xu

, Jin Jin, Baochun Li:
A Secondary Market for Spectrum. 31-35 - Praveen Kumar Muthuswamy, Koushik Kar, Sambit Sahu, Prashant Pradhan, Saswati Sarkar:

Change Management in Enterprise IT Systems: Process Modeling and Capacity-optimal Scheduling. 36-40 - Jocelyne Elias, Fabio Martignon, Konstantin Avrachenkov

, Giovanni Neglia:
Socially-Aware Network Design Games. 41-45 - Zhi-Li Zhang, Papak Nabipay, Andrew M. Odlyzko, Roch Guérin:

Interactions, Competition and Innovation in a Service-Oriented Internet: An Economic Model. 46-50
Modeling 1
- Yu Cheng

, Hongkun Li, Peng-Jun Wan, Xinbing Wang:
Capacity Region of a Wireless Mesh Backhaul Network over the CSMA/CA MAC. 51-55 - Matthew Mah, Neha Gupta, Ashok K. Agrawala:

PinPoint Time Difference of Arrival for Unsynchronized 802.11 Wireless Cards. 56-60 - Amr Rizk, Markus Fidler:

Sample Path Bounds for Long Memory FBM Traffic. 61-65 - Hongseok Kim, Gustavo de Veciana, Xiangying Yang:

alpha-Optimal User Association and Cell Load Balancing in Wireless Networks. 66-70 - Vartika Bhandari, Nitin H. Vaidya:

On Providing Non-uniform Scheduling Guarantees in a Wireless Network. 71-75
Network Monitoring 1
- Casey T. Deccio, Jeff Sedayao, Krishna Kant, Prasant Mohapatra:

Measuring Availability in the Domain Name System. 76-80 - Hassan Gobjuka:

Topology Discovery for Virtual Local Area Networks. 81-85 - Yi-Hua Edward Yang, Hoang Le, Viktor K. Prasanna:

High Performance Dictionary-Based String Matching for Deep Packet Inspection. 86-90 - Hongyi Yao, Sidharth Jaggi

, Minghua Chen
:
Network Coding Tomography for Network Failures. 91-95 - Hemant Sengar, Zhen Ren, Haining Wang, Duminda Wijesekera, Sushil Jajodia

:
Tracking Skype VoIP Calls Over The Internet. 96-100
VANET / DTN
- Hongzi Zhu, Luoyi Fu, Guangtao Xue, Yanmin Zhu, Minglu Li, Lionel M. Ni:

Recognizing Exponential Inter-Contact Time in VANETs. 101-105 - Eitan Altman, Amar Prakash Azad, Tamer Basar, Francesco De Pellegrini:

Optimal Activation and Transmission Control in Delay Tolerant Networks. 106-110 - Abderrahmen Mtibaa, Martin May, Christophe Diot, Mostafa H. Ammar:

PeopleRank: Social Opportunistic Forwarding. 111-115 - Bojin Liu, Behrooz Khorashadi, Dipak Ghosal, Chen-Nee Chuah

, H. Michael Zhang:
Assessing the VANET's Local Information Storage Capability under Different Traffic Mobility. 116-120 - Eitan Altman, Francesco De Pellegrini, Lucile Sassatelli:

Dynamic Control of Coding in Delay Tolerant Networks. 121-125
Broadcast / Multicast
- Giovanni Resta

, Paolo Santi:
On the Fundamental Limits of Broadcasting in Wireless Mobile Networks. 126-130 - Shan Zhou, Lei Ying:

On Delay Constrained Multicast Capacity of Large-Scale Mobile Ad-Hoc Networks. 131-135 - Xiaohang Li, Chih-Chun Wang, Xiaojun Lin:

Throughput and Delay Analysis on Uncoded and Coded Wireless Broadcast with Hard Deadline Constraints. 136-140 - Jubin Jose, Ahmed Abdel-Hadi, Piyush Gupta, Sriram Vishwanath:

On the Impact of Mobility on Multicast Capacity of Wireless Networks. 141-145 - Lakshmi Anantharamu, Bogdan S. Chlebus, Dariusz R. Kowalski, Mariusz A. Rokicki:

Deterministic Broadcast on Multiple Access Channels. 146-150
MESH / MULTIHOP
- Apoorva Jindal, Ann Arbor, Konstantinos Psounis:

Making the Case for Random Access Scheduling in Wireless Multi-hop Networks. 151-155 - Daniel Wu, Prasant Mohapatra:

From Theory to Practice: Evaluating Static Channel Assignments on a Wireless Mesh Network. 156-160 - János Tapolcai

, Lajos Rónyai, Pin-Han Ho:
Optimal Solutions for Single Fault Localization in Two Dimensional Lattice Networks. 161-165 - Ahmed K. F. Khattab

:
An Experimental Case for SIMO Random Access in Multi-hop Wireless Networks. 166-170 - Yunfeng Lin, Ben Liang

, Baochun Li:
SlideOR: Online Opportunistic Network Coding in Wireless Mesh Networks. 171-175
Modeling 2
- Shinuk Woo, Hwangnam Kim:

Estimating Link Reliability in Wireless Networks: An Empirical Study and Interference Modeling. 176-180 - Ziyu Shao, Minghua Chen

, Amir Salman Avestimehr, Shuo-Yen Robert Li:
Cross-layer Optimization for Wireless Networks with Deterministic Channel Models. 181-185 - Moran Feldman

, Joseph Naor:
Non-Preemptive Buffer Management for Latency Sensitive Packets. 186-190 - Luigi Alfredo Grieco, Chadi Barakat

:
A Frequency Domain Model to Predict the Estimation Accuracy of Packet Sampling. 191-195 - Stilian Stoev, George Michailidis, Joel Vaughan:

On Global Modeling of Backbone Network Traffic. 196-200
Network Monitoring 2
- D. K. Lee, Keon Jang, Changhyun Lee, Gianluca Iannaccone, Sue B. Moon:

Path Stitching: Internet-Wide Path and Delay Estimation from Existing Measurements. 201-205 - Aiyou Chen, Yu Jin, Jin Cao:

Tracking Long Duration Flows in Network Traffic. 206-210 - Jin Cao, Li Erran Li, Aiyou Chen, Tian Bu:

Tracking Quantiles of Network Data Streams with Dynamic Operations. 211-215 - Ravish Khosla, Sonia Fahmy

, Y. Charlie Hu, Jennifer Neville:
Predicting Prefix Availability in the Internet. 216-220 - Brian Gallagher

, Marios Iliofotou, Tina Eliassi-Rad, Michalis Faloutsos
:
Link Homophily in the Application Layer and its Usage in Traffic Classification. 221-225
Video / Streaming
- Xiaoqing Zhu, Rong Pan, Nandita Dukkipati, Vijay G. Subramanian, Flavio Bonomi:

Layered Internet Video Engineering (LIVE): Network-Assisted Bandwidth Sharing and Transient Loss Protection for Scalable Video Streaming. 226-230 - Lin Cai

, Yuanqian Luo, Siyuan Xiang, Jianping Pan
:
Scalable Modulation for Scalable Wireless Videocast. 231-235 - Wesley W. Terpstra, Christof Leng, Max Lehn, Alejandro P. Buchmann:

Channel-based Unidirectional Stream Protocol (CUSP). 236-240 - Gabriel Scalosub, Peter Marbach, Jörg Liebeherr:

Buffer Management for Aggregated Streaming Data with Packet Dependencies. 241-245 - Vijay Gopalakrishnan, Rittwik Jana, Ralph Knag, K. K. Ramakrishnan

, Deborah F. Swayne, Vinay A. Vaishampayan
:
Characterizing Interactive Behavior in a Large-Scale Operational IPTV Environment. 246-250
Wireless Networks 1
- Lars Kulseng, Zhen Yu, Yawen Wei, Yong Guan:

Lightweight Mutual Authentication and Ownership Transfer for RFID Systems. 251-255 - Thanh Dang, Nirupama Bulusu, Wu-chi Feng, Sergey Frolov

:
CoTrack: A Framework for Tracking Dynamic Features with Static and Mobile Sensors. 256-260 - Junxing Zhang, Sneha Kumar Kasera, Neal Patwari:

Mobility Assisted Secret Key Generation Using Wireless Link Signatures. 261-265 - Natalia Castro Fernandes

, Marcelo Duffles Donato Moreira, Otto Carlos Muniz Bandeira Duarte:
A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc Networks. 266-270 - Jian Ni, Bo (Rambo) Tan, R. Srikant:

Q-CSMA: Queue-Length Based CSMA/CA Algorithms for Achieving Maximum Throughput and Low Delay in Wireless Networks. 271-275
Peer-to-Peer
- Miao Wang, Lisong Xu, Byrav Ramamurthy:

Linear Programming Models For Multi-Channel P2P Streaming Systems. 276-280 - Zhenjiang Li, Danny H. K. Tsang, Wang-Chien Lee:

Understanding Sub-stream Scheduling in P2P Hybrid Live Streaming Systems. 281-285 - Yi Hu, Min Feng, Laxmi N. Bhuyan:

A Balanced Consistency Maintenance Protocol for Structured P2P Systems. 286-290 - David R. Choffnes, Mario A. Sánchez, Fabian E. Bustamante:

Network Positioning from the Edge - An Empirical Study of the Effectiveness of Network Positioning in P2P Systems. 291-295 - Qiyan Wang, Long H. Vu, Klara Nahrstedt, Himanshu Khurana:

MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming. 296-300
Routing
- Bakr Sarakbi, Stéphane Maag:

BGP Skeleton - An Alternative to iBGP Route Reflection. 301-305 - Jung Ryu, Lei Ying

, Sanjay Shakkottai:
Back-Pressure Routing for Intermittently Connected Networks. 306-310 - Jianping Wang

, Kui Wu, Shiliang Li, Chunming Qiao:
Performance Modeling and Analysis of Multi-Path Routing in Integrated Fiber-Wireless Networks. 311-315 - Vijay Kamble, Eitan Altman, Rachid El Azouzi

, Vinod Sharma:
A Theoretical Framework for Hierarchical Routing Games. 316-320 - Chengchen Hu, Kai Chen

, Yan Chen, Bin Liu:
Evaluating Potential Routing Diversity for Internet Failure Recovery. 321-325
Security
- Andrew J. Kalafut, Craig A. Shue, Minaxi Gupta:

Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems. 326-330 - Zhibin Zhou, Dijiang Huang

:
An Optimal Key Distribution Scheme for Secure Multicast Group Communication. 331-335 - Daniele Quercia, Stephen Hailes:

Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue. 336-340 - Bin Zhang, Ehab Al-Shaer:

Towards Automatic Creation of Usable Security Configuration. 341-345 - Pawan Prakash, Manish Kumar, Ramana Rao Kompella, Minaxi Gupta:

PhishNet: Predictive Blacklisting to Detect Phishing Attacks. 346-350
Sensor Networks 1
- Chia-Hung Lin, Jian-Jhih Kuo

, Ming-Jer Tsai:
Reliable GPS-Free Double-Ruling-Based Information Brokerage in Wireless Sensor Networks. 351-355 - Siyuan Chen, Shaojie Tang, Minsu Huang, Yu Wang:

Capacity of Data Collection in Arbitrary Wireless Sensor Networks. 356-360 - Haiyan Cai, Xiaohua Jia

, Mo Sha
:
Critical Sensor Density for Partial Connectivity in Large Area Wireless Sensor Networks. 361-365 - Yaxiong Zhao, Jie Wu, Feng Li, Sanglu Lu:

VBS: Maximum Lifetime Sleep Scheduling for Wireless Sensor Networks Using Virtual Backbones. 366-370 - Robert Zhong Zhou, James Peng Zheng

, Jun-Hong Cui, Zaihan Jiang:
Handling Triple Hidden Terminal Problems for Multi-Channel MAC in Long-Delay Underwater Sensor Networks. 371-375
Wireless Networks 2
- Zohar Naor, Sajal K. Das

:
Mobile Real-Time Group Communication Service. 376-380 - Alexander W. Min, Xinyu Zhang, Kang G. Shin:

Spatio-Temporal Fusion for Small-scale Primary Detection in Cognitive Radio Networks. 381-385 - Liang Cai, Sridhar Machiraju, Hao Chen

:
CapAuth: A Capability-based Handover Scheme. 386-390 - Chengdi Lai, Ka-Cheong Leung, Victor O. K. Li:

Enhancing Wireless TCP: A Serialized-Timer Approach. 391-395 - Di Wang, Alhussein A. Abouzeid

:
On the Cost of Knowledge of Mobility in Dynamic Networks. 396-400
Networks
- Salah-Eddine Elayoubi, Eitan Altman, Majed Haddad, Zwi Altman:

A Hybrid Decision Approach for the Association Problem in Heterogeneous Networks. 401-405 - Alexandre Proutière, Yung Yi, Tian Lan, Mung Chiang:

Resource Allocation over Network Dynamics without Timescale Separation. 406-410 - Andrés Ferragut

, Fernando Paganini:
User-Centric Network Fairness through Connection-Level Control. 411-415 - Hammad Iqbal, Taieb Znati:

Overcoming Failures: Fault-tolerance and Logical Centralization in Clean-Slate Network Management. 416-420 - Mingui Zhang, Bin Liu, Beichuan Zhang:

Safeguarding Data Delivery by Decoupling Path Propagation and Adoption. 421-425
Distributed Computing
- Rade Stanojevic, Robert Shorten:

Distributed Dynamic Speed Scaling. 426-430 - Yunghsiang S. Han, Oluwasoji Omiwade, Rong Zheng:

Survivable Distributed Storage with Progressive Decoding. 431-435 - Urtzi Ayesta, Olivier Brun, Balakrishna J. Prabhu:

Price of Anarchy in Non-Cooperative Load Balancing. 436-440 - Jin Li, Qian Wang

, Cong Wang
, Ning Cao, Kui Ren
, Wenjing Lou:
Fuzzy Keyword Search over Encrypted Data in Cloud Computing. 441-445 - Haiquan (Chuck) Zhao, Cathy H. Xia, Zhen Liu, Donald F. Towsley

:
Distributed Resource Allocation for Synchronous Fork and Join Processing Networks. 446-450
Hardware and Sensors
- Shuang Yang, Xin Wang, Baochun Li:

Haste: Practical Online Network Coding in a Multicast Switch. 451-455 - Ori Rottenstreich, Isaac Keslassy

:
Worst-Case TCAM Rule Expansion. 456-460 - Rami Cohen, Danny Raz:

Simple Efficient TCAM Based Range Classification. 461-465 - Kaishun Wu

, Haoyu Tan, Hoilun Ngan, Lionel M. Ni:
Chip Error Pattern Analysis in IEEE 802.15.4. 466-470 - Novella Bartolini

, Tiziana Calamoneri
, Thomas La Porta, Simone Silvestri:
Mobile Sensor Deployment in Unknown Fields. 471-475
Routing in Wireless Networks
- Kai Zeng, Zhenyu Yang, Wenjing Lou:

Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks. 476-480 - Swaminathan Sankararaman, Alon Efrat

, Srinivasan Ramasubramanian, Pankaj K. Agarwal:
On Channel-Discontinuity-Constraint Routing in Wireless Networks. 481-485 - Ilias Leontiadis, Paolo Costa, Cecilia Mascolo

:
Extending Access Point Connectivity through Opportunistic Routing in Vehicular Networks. 486-490 - Partha Dutta, Vivek Mhatre, Debmalya Panigrahi, Rajeev Rastogi:

Joint Routing and Scheduling in Multi-hop Wireless Networks with Directional Antennas. 491-495 - Mohammad Naghshvar, Tara Javidi

:
Opportunistic Routing with Congestion Diversity in Wireless Multi-hop Networks. 496-500
Sensor Networks 2
- Miao Zhao

, Yuanyuan Yang
:
An Optimization Based Distributed Algorithm for Mobile Data Gathering in Wireless Sensor Networks. 501-505 - Junbin Liang, Jianxin Wang, Jiannong Cao

, Jianer Chen, Mingming Lu:
An Efficient Algorithm for Constructing Maximum lifetime Tree for Data Gathering Without Aggregation in Wireless Sensor Networks. 506-510 - Dengpan Zhou, Jie Gao:

Maintaining Approximate Minimum Steiner Tree and k-center for Mobile Agents in a Sensor Network. 511-515
Cloud Computing
- Amir Epstein, Dean H. Lorenz

, Ezra Silvera, Inbar Shapira:
Virtual Appliance Content Distribution for a Global Infrastructure Cloud Service. 516-524 - Cong Wang

, Qian Wang
, Kui Ren
, Wenjing Lou:
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. 525-533 - Shucheng Yu

, Cong Wang
, Kui Ren
, Wenjing Lou:
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. 534-542
Resource Management for Cognitive Radio Networks
- Hyoil Kim, Kang G. Shin:

Asymmetry-Aware Real-Time Distributed Joint Resource Allocation in IEEE 802.22 WRANs. 543-551 - Jin Jin, Baochun Li:

Cooperative Resource Management in Cognitive WiMAX with Femto Cells. 552-560 - Hong Xu

, Baochun Li:
Efficient Resource Allocation with Flexible Channel Cooperation in OFDMA Cognitive Radio Networks. 561-569 - Mahdi Lotfinezhad, Ben Liang

, Elvino S. Sousa:
Optimal Control of Constrained Cognitive Radio Networks with Dynamic Population Size. 570-578
Optical Network
- Mohammad A. Saleh, Ahmed E. Kamal:

Approximation Algorithms for Many-to-Many Traffic Grooming in WDM Mesh Networks. 579-587 - Ming Xia, Massimo Tornatore

, Charles U. Martel, Biswanath Mukherjee:
Risk-Aware Routing for Optical Transport Networks. 588-595 - Onur Turkcu, Suresh Subramaniam

:
Optimal Waveband Switching in Optical Ring Networks. 596-604
Delay Tolerant Network
- Haojin Zhu

, Xiaodong Lin, Rongxing Lu, Xuemin Shen
, Dongsheng Xing, Zhenfu Cao
:
An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs. 605-613 - Liang Hu, Jean-Yves Le Boudec, Milan Vojnovic:

Optimal Channel Choice for Collaborative Ad-Hoc Dissemination. 614-622 - Philippe Jacquet, Bernard Mans

, Georgios Rodolakis:
On Space-Time Capacity Limits in Mobile and Delay Tolerant Networks. 623-631 - Rongxing Lu, Xiaodong Lin, Xuemin Shen

:
SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks. 632-640
Sensor Network Design 1
- Andrew Markham

, Agathoniki Trigoni
:
Discrete Gene Regulatory Networks (dGRNs): A Novel Approach to Configuring Sensor Networks. 641-649 - Bo Li, Dan Wang

, Feng Wang, Yi Qing Ni:
High Quality Sensor Placement for SHM Systems: Refocusing on Application Demands. 650-658 - Anat Bremler-Barr, David Hay, Yaron Koral:

CompactDFA: Generic State Machine Compression for Scalable Pattern Matching. 659-667 - Yunye Jin, Mehul Motani

, Wee-Seng Soh
, Juanjuan Zhang
:
SparseTrack: Enhancing Indoor Pedestrian Tracking with Sparse Infrastructure Support. 668-676
Wireless Network Security 1
- Onur Güngör, Jian Tan, Can Emre Koksal, Hesham El Gamal, Ness B. Shroff:

Joint Power and Secret Key Queue Management for Delay Limited Secure Communication. 677-685 - Javad Ghaderi, Rayadurgam Srikant:

Towards a Theory of Anonymous Networking. 686-694 - Yao Liu, Peng Ning, Huaiyu Dai, An Liu:

Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication. 695-703 - Li Lu, Yunhao Liu, Xiang-Yang Li:

Refresh: Weak Privacy Model for RFID Systems. 704-712
Anomaly/Intrusion Detection
- Daniela Brauckhoff, Kavé Salamatian

, Martin May:
A Signal Processing View on Packet Sampling and Anomaly Detection. 713-721 - Fernando Silveira, Christophe Diot:

URCA: Pulling out Anomalies by their Root Causes. 722-730 - Kai Zheng, Xin Zhang, Zhiping Cai, Zhijun Wang, Baohua Yang:

Scalable NIDS via Negative Pattern Matching and Exclusive Pattern Matching. 731-739 - Kedar S. Namjoshi, Girija J. Narlikar:

Robust and Fast Pattern Matching for Intrusion Detection. 740-748
Wireless Network Security 2
- M. H. R. Khouzani, Saswati Sarkar, Eitan Altman:

Maximum Damage Malware Attack in Mobile Wireless Networks. 749-757 - Jing Shi, Rui Zhang

, Yunzhong Liu, Yanchao Zhang:
PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems. 758-766 - Jie Yang, Yong Ge, Hui Xiong, Yingying Chen

, Hongbo Liu:
Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments. 767-775 - Mohamed Elsalih Mahmoud, Xuemin Shen

:
Stimulating Cooperation in Multi-hop Wireless Networks Using Cheating Detection System. 776-784
Cognitive Radio Network Design 1
- Lingjie Duan

, Jianwei Huang, Biying Shou
:
Cognitive Mobile Virtual Network Operator: Investment and Pricing with Supply Uncertainty. 785-793 - Lin Chen, Stefano Iellamo, Marceau Coupechoux, Philippe Godlewski:

An Auction Framework for Spectrum Allocation with Interference Constraint in Cognitive Radio Networks. 794-802 - Animashree Anandkumar, Nithin Michael, Ao Tang:

Opportunistic Spectrum Access with Multiple Users: Learning under Competition. 803-811 - Prasanna Chaporkar, Alexandre Proutière, Himanshu Asnani:

Learning to Optimally Exploit Multi-Channel Diversity in Wireless Systems. 812-820
High Speed Network Design
- Masanori Bando, H. Jonathan Chao:

FlashTrie: Hash-based Prefix-Compressed Trie for IP Route Lookup Beyond 100Gbps. 821-829 - Christos Kozanitis, John Huber, Sushil Singh, George Varghese:

Leaping Multiple Headers in a Single Bound: Wire-Speed Parsing Using the Kangaroo System. 830-838 - Cheng-Shang Chang, Jay Cheng, Tien-Ke Huang, Xuan-Chao Huang, Duan-Shin Lee:

A Bit-Stuffing Algorithm for Crosstalk Avoidance in High Speed Switching. 839-847 - Xin Zhao, Yaoqing Liu, Lan Wang, Beichuan Zhang:

On the Aggregatability of Router Forwarding Tables. 848-856
Routing in Delay Tolerant Networks
- Qinghua Li, Sencun Zhu, Guohong Cao:

Routing in Socially Selfish Delay Tolerant Networks. 857-865 - Theus Hossmann, Thrasyvoulos Spyropoulos, Franck Legendre:

Know Thy Neighbor: Towards Optimal Mapping of Contacts to Social Graphs for DTN Routing. 866-874 - Bin Bin Chen

, Mun Choon Chan:
MobiCent: a Credit-Based Incentive System for Disruption Tolerant Network. 875-883 - Daniel J. Klein, João Pedro Hespanha, Upamanyu Madhow:

A Reaction-Diffusion Model for Epidemic Routing in Sparsely Connected MANETs. 884-892
Sensor Network Analysis
- Changhee Joo

, Jin-Ghoo Choi, Ness B. Shroff:
Delay Performance of Scheduling with Data Aggregation in Wireless Sensor Networks. 893-901 - Ren-Shiou Liu

, Prasun Sinha, Can Emre Koksal:
Joint Energy Management and Resource Allocation in Rechargeable Sensor Networks. 902-910 - Yafeng Wu, Gang Zhou, John A. Stankovic:

ACR: Active Collision Recovery in Dense Wireless Sensor Networks. 911-919
Pricing & Billing
- Chi-Kin Chau

, Qian Wang, Dah-Ming Chiu:
On the Viability of Paris Metro Pricing for Communication and Service Networks. 929-937 - Prashanth Hande, Mung Chiang, A. Robert Calderbank, Junshan Zhang:

Pricing under Constraints in Access Networks: Revenue Maximization and Congestion Management. 938-946 - Huseyin Mutlu, Murat Alanyali, David Starobinski:

On-line Pricing of Secondary Spectrum Access with Unknown Demand Function and Call Length Distribution. 947-955 - Jaeok Park, Mihaela van der Schaar:

Pricing and Incentives in Peer-to-Peer Networks. 956-964
Security & Reliability Design
- Jayakrishnan Nair, Martin Andreasson, Lachlan L. H. Andrew, Steven H. Low, John Doyle:

File Fragmentation over an Unreliable Channel. 965-973 - Boxuan Gu, Xiaole Bai, Zhimin Yang, Adam C. Champion, Dong Xuan:

Malicious Shellcode Detection with Virtual Memory Snapshots. 974-982 - Matteo Dell'Amico

, Pietro Michiardi, Yves Roudier:
Password Strength: An Empirical Analysis. 983-991 - Mengjun Xie

, Haining Wang:
A Collaboration-based Autonomous Reputation System for Email Services. 992-1000
RFID
- Lei Xie, Bo Sheng

, Chiu C. Tan, Hao Han, Qun Li
, Daoxu Chen:
Efficient Tag Identification in Mobile RFID Systems. 1001-1009 - Bo Sheng

, Qun Li
, Weizhen Mao:
Efficient Continuous Scanning in RFID Systems. 1010-1018 - Tao Li, Samuel S. Wu, Shigang Chen, Mark C. K. Yang:

Energy Efficient Algorithms for the RFID Estimation Problem. 1019-1027 - Hao Han, Bo Sheng

, Chiu C. Tan, Qun Li
, Weizhen Mao, Sanglu Lu:
Counting RFID Tags Efficiently and Anonymously. 1028-1036
Cognitive Radio Network Design 2
- Tao Shu, Marwan Krunz:

Truthful Least-Priced-Path Routing in Opportunistic Spectrum Access Networks. 1037-1045 - Amine Laourine, Shiyao Chen, Lang Tong:

Queuing Analysis in Multichannel Cognitive Spectrum Access: A Large Deviation Approach. 1046-1054 - Shanshan Wang, Junshan Zhang, Lang Tong:

Delay Analysis for Cognitive Radio Networks with Random Access: A Fluid Queue View. 1055-1063 - Xinyu Zhang, Kang G. Shin:

DAC: Distributed Asynchronous Cooperation for Wireless Relay Networks. 1064-1072
P2P Modeling/Measurement
- Elias Kehdi, Baochun Li:

Incorporating Random Linear Network Coding for Peer-to-Peer Network Diagnosis. 1073-1081 - John R. Douceur, James W. Mickens, Thomas Moscibroda, Debmalya Panigrahi:

Collaborative Measurements of Upload Speeds in P2P Systems. 1082-1090 - Zhichun Li, Anup Goyal, Yan Chen, Aleksandar Kuzmanovic:

Measurement and Diagnosis of Address Misconfigured P2P Traffic. 1091-1099 - Elisha J. Rosensweig, James F. Kurose, Donald F. Towsley

:
Approximate Models for General Cache Networks. 1100-1108
Resource Management for DTN
- Zizhan Zheng, Zhixue Lu, Prasun Sinha, Santosh Kumar:

Maximizing the Contact Opportunity for Vehicular Internet Access. 1109-1117 - Nathanael Thompson, Samuel C. Nelson, Mehedi Bakht, Tarek F. Abdelzaher, Robin Kravets

:
Retiring Replicants: Congestion Control for Intermittently-Connected Networks. 1118-1126 - Qing Yu, Jiming Chen, Yanfei Fan, Xuemin Shen

, Youxian Sun:
Multi-Channel Assignment in Wireless Sensor Networks: A Game Theoretic Approach. 1127-1135 - Kyunghan Lee

, Yung Yi, Jaeseong Jeong
, Hyungsuk Won, Injong Rhee, Song Chong:
Max-Contribution: On Optimal Resource Allocation in Delay Tolerant Networks. 1136-1144
Data Center
- Lei Rao, Xue Liu, Le Xie

, Wenyu Liu
:
Minimizing Electricity Cost: Optimization of Distributed Internet Data Centers in a Multi-Electricity-Market Environment. 1145-1153 - Xiaoqiao Meng, Vasileios Pappas, Li Zhang:

Improving the Scalability of Data Center Networks with Traffic-aware Virtual Machine Placement. 1154-1162 - Guohui Wang, T. S. Eugene Ng:

The Impact of Virtualization on Network Performance of Amazon EC2 Data Center. 1163-1171
Sensor Network Design 2
- Yun Wang, Kai Li, Jie Wu:

Distance Estimation by Constructing The Virtual Ruler in Anisotropic Sensor Networks. 1172-1180 - Siyao Cheng, Jianzhong Li, Qianqian Ren, Lei Yu:

Bernoulli Sampling Based (element of, delta)-Approximate Aggregation in Large-Scale Sensor Networks. 1181-1189 - Zainul Charbiwala, Supriyo Chakraborty, Sadaf Zahedi, Younghun Kim, Ting He, Chatschik Bisdikian, Mani B. Srivastava:

Compressive Oversampling for Robust Data Transmission in Sensor Networks. 1190-1198 - Rui Zhang, Jing Shi, Yunzhong Liu, Yanchao Zhang:

Verifiable Fine-Grained Top-k Queries in Tiered Sensor Networks. 1199-1207
Internet Routing
- Ahmed Elmokashfi, Amund Kvalbein, Constantine Dovrolis:

BGP Churn Evolution: a Perspective from the Core. 1208-1216 - Gábor Rétvári, Gábor Németh:

Demand-Oblivious Routing: Distributed vs. Centralized Approaches. 1217-1225 - Yuval Shavitt

, Yaron Singer:
Limitations and Possibilities of Path Trading between Autonomous Systems. 1226-1234 - Kin Wah Kwong, Lixin Gao, Roch Guérin, Zhi-Li Zhang:

On the Feasibility and Efficacy of Protection Routing in IP Networks. 1235-1243
Traffic Measurement
- Yu Gu, Guofei Jiang, Vishal K. Singh, Yueping Zhang:

Optimal Probing for Unicast Network Delay Tomography. 1244-1252 - Peter Lieven, Björn Scheuermann:

High-Speed Per-Flow Traffic Measurement with Probabilistic Multiplicity Counting. 1253-1261 - Denisa Ghita, Hung Xuan Nguyen, Maciej Kurant, Katerina J. Argyraki

, Patrick Thiran:
Netscope: Practical Network Loss Tomography. 1262-1270 - Saqib Raza, Guanyao Huang, Chen-Nee Chuah

, Srini Seetharaman, Jatinder Pal Singh:
MeasuRouting: A Framework for Routing Assisted Traffic Monitoring. 1271-1279
Cognitive Radio Network 3
- Senhua Huang, Xin Liu, Zhi Ding

:
Distributed Power Control for Cognitive User Access based on Primary Link Control Feedback. 1280-1288 - Jin Jin, Hong Xu

, Baochun Li:
Multicast Scheduling with Cooperation and Network Coding in Cognitive Radio Networks. 1289-1297 - Yanyan Yang, Yunhuai Liu, Qian Zhang

, Lionel M. Ni:
Cooperative Boundary Detection for Spectrum Sensing Using Dedicated Wireless Sensor Networks. 1298-1306 - Jin Zhang, Juncheng Jia, Qian Zhang

, Eric M. K. Lo:
Implementation and Evaluation of Cooperative Communication Schemes in Software-Defined Radio Testbed. 1307-1315
Wireless Network Analysis 1
- Anne Bouillard, Laurent Jouhet, Eric Thierry:

Tight Performance Bounds in the Worst-Case Analysis of Feed-Forward Networks. 1316-1324 - Jörg Liebeherr, Almut Burchard, Florin Ciucu:

Non-asymptotic Delay Bounds for Networks with Heavy-Tailed Traffic. 1325-1333 - Jian Tan, Ness B. Shroff:

Transition from Heavy to Light Tails in Retransmission Durations. 1334-1342 - Tian Lan, David T. H. Kao, Mung Chiang, Ashutosh Sabharwal:

An Axiomatic Theory of Fairness in Network Resource Allocation. 1343-1351
WLAN Design 1
- Xinyu Xing, Shivakant Mishra, Xue Liu:

ARBOR: Hang Together Rather Than Hang Separately in 802.11 WiFi Networks. 1352-1360 - Fengyuan Xu, Chiu C. Tan, Qun Li

, Guanhua Yan, Jie Wu:
Designing a Practical Access Point Association Protocol. 1361-1369 - Ming Zhang, Shigang Chen, Ying Jian:

MAC-layer Time Fairness across Multiple Wireless LANs. 1370-1378 - Zhenghao Zhang, Steven Bronson, Jin Xie, Hu Wei:

Employing the One-Sender-Multiple-Receiver Technique in Wireless LANs. 1379-1387
Wireless Capacity Analysis
- Peng-Jun Wan, Lixin Wang, Ai Huang, Minming Li

, F. Frances Yao:
Approximate Capacity Subregions of Uniform Multihop Wireless Networks. 1388-1396 - Michael Dinitz

:
Distributed Algorithms for Approximating Wireless Network Capacity. 1397-1405 - Pan Li

, Yuguang Fang
, Jie Li
:
Throughput, Delay, and Mobility in Wireless Ad Hoc Networks. 1406-1414 - Mingyue Ji, Zheng Wang, Hamid R. Sadjadpour, Jose Joaquin Garcia-Luna-Aceves:

The Capacity of Ad Hoc Networks with Heterogeneous Traffic Using Cooperation. 1415-1423
Network Design
- Yan Cai, Bo Jiang, Tilman Wolf

, Weibo Gong:
A Practical On-line Pacing Scheme at Edges of Small Buffer Networks. 1424-1432 - Arun Vishwanath, Vijay Sivaraman, Marina Thottan, Constantine Dovrolis:

Enabling a Bufferless Core Network Using Edge-to-Edge Packet-Level FEC. 1433-1441 - Haoyu Song

, Murali S. Kodialam, Fang Hao, T. V. Lakshman:
Building Scalable Virtual Routers with Trie Braiding. 1442-1450 - Xin Sun, Yu-Wei Eric Sung, Sunil Krothapalli, Sanjay G. Rao:

A Systematic Approach for Evolving VLAN Designs. 1451-1459
Content Distribution
- Chao Zhang, Prithula Dhungel, Di Wu, Zhengye Liu, Keith W. Ross:

BitTorrent Darknets. 1460-1468 - Gabriel Maciá-Fernández

, Yong Wang, Rafael Rodríguez-Gómez
, Aleksandar Kuzmanovic:
ISP-Enabled Behavioral Ad Targeting without Deep Packet Inspection. 1469-1477 - Sem C. Borst, Varun Gupta, Anwar Walid:

Distributed Caching Algorithms for Content Distribution Networks. 1478-1486 - Kanat Tangwongsan, Himabindu Pucha, David G. Andersen, Michael Kaminsky:

Efficient Similarity Estimation for Systems Exploiting Data Redundancy. 1487-1495
P2P Design
- Dan-Cristian Tomozei, Laurent Massoulié:

Flow Control for Cost-Efficient Peer-to-Peer Streaming. 1496-1504 - Daniel Sadoc Menasché, Laurent Massoulié, Donald F. Towsley

:
Reciprocity and Barter in Peer-to-Peer Systems. 1505-1513 - Bivas Mitra, Abhishek Kumar Dubey, Sujoy Ghose, Niloy Ganguly

:
How do Superpeer Networks Emerge? 1514-1522 - Shansi Ren, Enhua Tan, Tian Luo, Songqing Chen, Lei Guo, Xiaodong Zhang:

TopBT: A Topology-Aware and Infrastructure-Independent BitTorrent Client. 1523-1531
Internet & Internet Application Modeling
- Brian Eriksson, Gautam Dasarathy

, Paul Barford, Robert D. Nowak:
Toward the Practical Use of Network Tomography for Internet Topology Discovery. 1532-1540 - Hao Wang, Haiquan (Chuck) Zhao, Bill Lin, Jun (Jim) Xu:

Design and Analysis of a Robust Pipelined Memory System. 1541-1549 - Murali S. Kodialam, T. V. Lakshman, Sarit Mukherjee, Limin Wang:

Online Scheduling of Targeted Advertisements for IPTV. 1550-1558 - Giovanna Carofiglio, Luca Muscariello:

On the Impact of TCP and Per-Flow Scheduling on Internet Performance. 1559-1567
Wireless Network Security 3
- Sheng Xiao, Weibo Gong, Donald F. Towsley

:
Secure Wireless Communication with Dynamic Secrets. 1568-1576 - Julien Freudiger, Mohammad Hossein Manshaei, Jean-Yves Le Boudec, Jean-Pierre Hubaux:

On the Age of Pseudonyms in Mobile Ad Hoc Networks. 1577-1585 - Santhanakrishnan Anand, Shamik Sengupta, Rajarathnam Chandramouli

:
An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks. 1586-1594 - Kai Xing, Xiuzhen Cheng:

From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks. 1595-1603
WLAN Design 2
- Xi Chen, Daji Qiao:

HaND: Fast Handoff with Null Dwell Time for IEEE 802.11 Networks. 1604-1612 - An (Jack) Chan, Kai Zeng, Prasant Mohapatra, Sung-Ju Lee, Sujata Banerjee

:
Metrics for Evaluating Video Streaming Quality in Lossy IEEE 802.11 Wireless Networks. 1613-1621 - Joseph Camp

, Ehsan Aryafar, Edward W. Knightly:
Coupled 802.11 Flows in Urban Channels: Model and Experimental Evaluation. 1622-1630 - Chen Feng, Wain Sy Anthea Au, Shahrokh Valaee, Zhenhui Tan:

Compressive Sensing Based Positioning Using RSS of WLAN Access Points. 1631-1639
Network Reliability/Traffic Measurement
- Fabio Soldo, Anh Le, Athina Markopoulou

:
Predictive Blacklisting as an Implicit Recommendation System. 1640-1648 - Partha Kanuparthy, Constantine Dovrolis:

DiffProbe: Detecting ISP Service Discrimination. 1649-1657 - Sebastian Neumayer, Eytan H. Modiano:

Network Reliability With Geographically Correlated Failures. 1658-1666 - Kayi Lee, Hyang-Won Lee, Eytan H. Modiano:

Reliability in Layered Networks with Random Link Failures. 1667-1675
Routing in Sensor Networks
- Uichin Lee, Paul Wang, Youngtae Noh

, Luiz Filipe M. Vieira, Mario Gerla, Jun-Hong Cui:
Pressure Routing for Underwater Sensor Networks. 1676-1684 - Shouwen Lai, Binoy Ravindran

:
On Distributed Time-Dependent Shortest Paths over Duty-Cycled Wireless Sensor Networks. 1685-1693 - Wei Zeng, Rik Sarkar, Feng Luo, Xianfeng Gu

, Jie Gao:
Resilient Routing for Sensor Networks Using Hyperbolic Embedding of Universal Covering Space. 1694-1702 - Hwee-Xian Tan

, Mun Choon Chan, Wendong Xiao, Peng Yong Kong
, Chen-Khong Tham
:
Information Quality Aware Routing in Event-Driven Sensor Networks. 1703-1711
Wireless Network Analysis 2
- Sreenath Ramanath, Mérouane Debbah, Eitan Altman, Vinod Kumar:

Asymptotic Analysis of Precoded Small Cell Networks. 1712-1719 - Vincenzo Mancuso

, Omer Gurewitz, Ahmed K. F. Khattab
, Edward W. Knightly:
Elastic Rate Limiting for Spatially Biased Wireless Mesh Networks. 1720-1728 - Alonso Silva, Eitan Altman, Mérouane Debbah, Giuseppa Alfano

:
Magnetworks: How Mobility Impacts the Design of Mobile Ad Hoc Networks. 1729-1737 - Delia Ciullo, Valentina Martina, Michele Garetto

, Emilio Leonardi
:
Impact of Correlated Mobility on Delay-Throughput Performance in Mobile Ad-Hoc Networks. 1738-1746
Wireless Network Analysis 3
- Xinyu Zhang, Kang G. Shin:

Chorus: Collision Resolution for Efficient Wireless Broadcast. 1747-1755 - Seyed A. Hejazi, Ben Liang

:
Throughput Analysis of Multiple Access Relay Channel under Collision Model. 1756-1764 - Sumit Singh, Raghuraman Mudumbai, Upamanyu Madhow:

Distributed Coordination with Deaf Neighbors: Efficient Medium Access for 60 GHz Mesh Networks. 1765-1773 - Li Erran Li, Richard Alimi, Dawei Shen, Harish Viswanathan, Yang Richard Yang:

A General Algorithm for Interference Alignment and Cancellation in Wireless Networks. 1774-1782
Network Modeling
- Minghua Chen

, Soung Chang Liew, Ziyu Shao, Caihong Kai:
Markov Approximation for Combinatorial Network Optimization. 1783-1791 - Moez Draief, Milan Vojnovic:

Convergence Speed of Binary Interval Consensus. 1792-1800 - Chenhui Hu, Xinbing Wang, Ding Nie, Jun Zhao:

Multicast Scaling Laws with Hierarchical Cooperation. 1801-1809 - Minji Kim, Daniel Enrique Lucani

, Xiaomeng Shi, Fang Zhao, Muriel Médard:
Network Coding for Multi-Resolution Multicast. 1810-1818
Wireless Network Security 4
- Zhuo Lu, Wenye Wang

, Cliff Wang:
On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks. 1819-1827 - Tingting Chen, Sheng Zhong:

INPAC: An Enforceable Incentive Scheme for Wireless Networks using Network Coding. 1828-1836 - Kai Zeng, Daniel Wu, An (Jack) Chan, Prasant Mohapatra:

Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks. 1837-1845 - Yang Ji, Seung-Woo Seo:

Optimizing the Batch Mode of Group Rekeying: Lower Bound and New Protocols. 1846-1854
Traffic Engineering and Restoration
- Maryam Daneshi, Jianping Pan

, Sudhakar Ganti:
Towards an Efficient Reservation Algorithm for Distributed Reservation Protocols. 1855-1863 - Ron Banner, Ariel Orda:

Designing Low-Capacity Backup Networks for Fast Restoration. 1864-1872 - John R. Lange, J. Scott Miller, Peter A. Dinda:

EmNet: Satisfying The Individual User Through Empathic Home Networks. 1873-1881 - Yi Xu, Wenye Wang

:
Characterizing the Spread of Correlated Failures in Large Wireless Networks. 1882-1890
Wireless Network Scheduling 1
- Bin Tong, Zi Li, Guiling Wang

, Wensheng Zhang:
Towards Reliable Scheduling Schemes for Long-lived Replaceable Sensor Networks. 1891-1899 - Saikat Guha, Chi-Kin Chau

, Prithwish Basu:
Green Wave: Latency and Capacity-Efficient Sleep Scheduling for Wireless Networks. 1900-1908 - Praveen Jayachandran, Matthew Andrews:

Minimizing End-to-End Delay in Wireless Networks Using a Coordinated EDF Schedule. 1909-1917 - Zhe Yang, Lin Cai

, Wu-Sheng Lu:
Practical Scheduling Algorithms for Concurrent Transmissions in Rate-adaptive Wireless Networks. 1918-1926
Game Theory in Wireless Networks
- Amir Hamed Mohsenian Rad, Jianwei Huang, Vincent W. S. Wong

, Robert Schober:
Bargaining and Price-of-Anarchy in Repeated Inter-Session Network Coding Games. 1927-1935 - Vinith Reddy, Srinivas Shakkottai, Alexander Sprintson

, Natarajan Gautam:
Multipath Wireless Network Coding: A Population Game Perspective. 1936-1944 - Fangwen Fu, Ulas C. Kozat:

Wireless Network Virtualization as A Sequential Auction Game. 1945-1953 - Ozan Candogan, Ishai Menache, Asuman E. Ozdaglar, Pablo A. Parrilo

:
Near-Optimal Power Control in Wireless Networks: A Potential Game Approach. 1954-1962
Localization
- Hui Zang, François Baccelli, Jean Bolot:

Bayesian Inference for Localization in Cellular Networks. 1963-1971 - Lirong Jian, Zheng Yang, Yunhao Liu:

Beyond Triangle Inequality: Sifting Noisy and Outlier Distance Measurements for Localization. 1972-1980 - A. K. M. Mahtab Hossain, Wee-Seng Soh

:
Cramer-Rao Bound Analysis of Localization Using Signal Strength Difference as Location Fingerprint. 1981-1989
Network Coding/Cooperative Communication
- Sushant Sharma, Yi Shi

, Jia Liu, Y. Thomas Hou
, Sastry Kompella
:
Is Network Coding Always Good for Cooperative Communications? 1990-1998 - Qijia Liu

, Wei Zhang, Xiaoli Ma:
Practical and General Amplify-and-Forward Designs for Cooperative Networks. 1999-2007 - Chengzhi Li, Huaiyu Dai:

Towards Efficient Designs for In-network Computing with Noisy Wireless Channels. 2008-2015 - Sushant Sharma, Yi Shi

, Y. Thomas Hou
, Hanif D. Sherali, Sastry Kompella
:
Cooperative Communications in Multi-hop Wireless Networks: Joint Flow Routing and Relay Node Assignment. 2016-2024
Wireless Network Analysis 4
- Shahab Oveis Gharan, Shervan Fashandi, Amir K. Khandani:

Diversity-Rate Trade-off in Erasure Networks. 2025-2033 - Long Bao Le

, Eytan H. Modiano, Ness B. Shroff:
Optimal Control of Wireless Networks with Finite Buffers. 2034-2042 - André Berger, James Gross, Tobias Harks:

The k-Constrained Bipartite Matching Problem: Approximation Algorithms and Applications to Wireless Networks. 2043-2051 - Bozidar Radunovic, Prasanna Chaporkar, Alexandre Proutière:

Rate Adaptation Games in Wireless LANs: Nash Equilibrium and Price of Anarchy. 2052-2060
P2P Streaming
- Yan Yang, Alix L. H. Chow, Leana Golubchik, Danielle Bragg:

Improving QoS in BitTorrent-like VoD Systems. 2061-2069 - Zimu Liu, Chuan Wu

, Baochun Li, Shuqiao Zhao:
UUSee: Large-Scale Operational On-Demand Streaming with Random Network Coding. 2070-2078 - Jianping Wang

, Chunming Qiao, Yan Li, Kejie Lu:
Minimizing the Worst-Case Playback Delay in VoD Services over Passive Optical Networks. 2079-2087 - Anh Tuan Nguyen, Baochun Li, Frank Eliassen:

Chameleon: Adaptive Peer-to-Peer Streaming with Network Coding. 2088-2096
Aggregation/Compression in Sensor Networks
- Changlei Liu, Guohong Cao:

Distributed Monitoring and Aggregation in Wireless Sensor Networks. 2097-2105 - Pu Wang

, Rui Dai, Ian F. Akyildiz:
Collaborative Data Compression Using Clustered Source Coding for Wireless Multimedia Sensor Networks. 2106-2114 - Jian Li, Amol Deshpande, Samir Khuller:

On Computing Compression Trees for Data Collection in Wireless Sensor Networks. 2115-2123 - Rui Tan, Guoliang Xing, Xue Liu, Jianguo Yao, Zhaohui Yuan:

Adaptive Calibration for Fusion-based Wireless Sensor Networks. 2124-2132
Wireless Network Design I
- Yao Hua, Qian Zhang

, Zhisheng Niu:
Resource Allocation in Multi-cell OFDMA-based Relay Networks. 2133-2141 - Joshua Robinson, Mohit Singh, Ram Swaminathan, Edward W. Knightly:

Deploying Mesh Nodes under Non-Uniform Propagation. 2142-2150 - Eugene Chai, Kang G. Shin:

M-Polar: Channel Allocation for Throughput Maximization in SDR Mesh Networks. 2151-2159 - Claudio Cicconetti

, Luciano Lenzini, Andrea Lodi, Silvano Martello, Enzo Mingozzi, Michele Monaci
:
Efficient Two-dimensional Data Allocation in IEEE 802.16 OFDMA. 2160-2168
Network Management/Measurement
- Lu Cheng, Xuesong Qiu, Luoming Meng, Yan Qiao, Raouf Boutaba:

Efficient Active Probing for Fault Diagnosis in Large Scale and Noisy Networks. 2169-2177 - Weiyi Zhang, Jian Tang, Chonggang Wang, Shanaka de Soysa:

Reliable Adaptive Multipath Provisioning with Bandwidth and Differential Delay Constraints. 2178-2186 - Giuseppe Bianchi

, Elisa Boschi, Simone Teofili, Brian Trammell
:
Measurement Data Reduction through Variation Rate Metering. 2187-2195 - Myungjin Lee, Nick G. Duffield

, Ramana Rao Kompella:
Two Samples are Enough: Opportunistic Flow-level Latency Estimation using NetFlow. 2196-2204
Wireless Network Scheduling II
- Peng-Jun Wan, Zhu Wang, Hongwei Du, Scott C.-H. Huang, Zhiyuan Wan:

First-Fit Scheduling for Beaconing in Multihop Wireless Networks. 2205-2212 - Berk Birand, Maria Chudnovsky

, Bernard Ries
, Paul D. Seymour
, Gil Zussman, Yori Zwols:
Analyzing the Performance of Greedy Maximal Scheduling via Local Pooling and Graph Theory. 2213-2221 - Shreeshankar Bodas, Sanjay Shakkottai, Lei Ying, R. Srikant:

Low-complexity Scheduling Algorithms for Multi-channel Downlink Wireless Networks. 2222-2230 - Juan José Jaramillo

, R. Srikant:
Optimal Scheduling for Fair Resource Allocation in Ad Hoc Networks with Elastic and Inelastic Traffic. 2231-2239
Secure Network Coding
- Jin Wang, Jianping Wang

, Kejie Lu, Bin Xiao
, Naijie Gu:
Optimal Linear Network Coding Design for Secure Unicast with Multiple Streams. 2240-2248 - Peng Zhang, Yixin Jiang, Chuang Lin, Yanfei Fan, Xuemin Shen

:
P-Coding: Secure Network Coding against Eavesdropping Attacks. 2249-2257 - Yaping Li, Hongyi Yao, Minghua Chen

, Sidharth Jaggi, Alon Rosen:
RIPPLE Authentication for Network Coding. 2258-2266 - Guanfeng Liang, Rachit Agarwal, Nitin H. Vaidya:

When Watchdog Meets Coding. 2267-2275
Mobility Models and Testbeds
- Roman Chertov, Daniel M. Havey, Kevin C. Almeroth:

MSET: A Mobility Satellite Emulation Testbed. 2276-2284 - Xi Deng, Yuanyuan Yang

, Sangjin Hong:
A Flexible Platform for Hardware-Aware Network Experiments and a Case Study on Wireless Network Coding. 2285-2293 - Frédéric Morlot, Salah-Eddine Elayoubi

, François Baccelli:
An Interaction-Based Mobility Model for Dynamic Hot Spot Analysis. 2294-2302 - Roberto Di Pietro

, Gabriele Oligeri, Claudio Soriente
, Gene Tsudik:
Intrusion-Resilience in Mobile Unattended WSNs. 2303-2311
Wireless Network Localization
- Zhisu Zhu, Anthony Man-Cho So

, Yinyu Ye:
Universal Rigidity: Towards Accurate and Efficient Localization of Wireless Networks. 2312-2320 - Ionut Constandache, Romit Roy Choudhury, Injong Rhee:

Towards Mobile Phone Localization without War-Driving. 2321-2329 - Deokwoo Jung, Thiago Teixeira, Andreas Savvides:

Towards Cooperative Localization of Wearable Sensors using Accelerometers and Cameras. 2330-2338 - Zheng Yang, Yunhao Liu:

Understanding Node Localizability of Wireless Ad-hoc Networks. 2339-2347
Wireless Network Modeling
- Jia Liu, Yi Shi

, Y. Thomas Hou
:
A Tractable and Accurate Cross-Layer Model for Multi-Hop MIMO Networks. 2348-2356 - Ece Gelal

, Konstantinos Pelechrinis, Tae-Suk Kim, Ioannis Broustis, Srikanth V. Krishnamurthy
, Bhaskar Rao:
Topology Control for Effective Interference Cancellation in Multi-User MIMO Networks. 2357-2365 - Wei Dong, Xue Liu, Chun Chen, Yuan He, Gong Chen, Yunhao Liu, Jiajun Bu:

DPLC: Dynamic Packet Length Control in Wireless Sensor Networks. 2366-2374 - Ramin Khalili, Dennis Goeckel, Donald F. Towsley

, Ananthram Swami:
Neighbor Discovery with Reception Status Feedback to Transmitters. 2375-2383
Wireless Network Design 2
- Amir Hamed Mohsenian Rad, Vincent W. S. Wong

, Robert Schober:
Optimal SINR-based Random Access. 2384-2392 - Aman Jain, Sanjeev R. Kulkarni, Sergio Verdú:

Minimum Energy per Bit for Wideband Wireless Multicasting: Performance of Decode-and-Forward. 2393-2401 - Niv Buchbinder

, Liane Lewin-Eytan, Ishai Menache, Joseph Naor, Ariel Orda:
Dynamic Power Allocation Under Arbitrary Varying Channels - The Multi-User Case. 2402-2410 - A. Karim Abu-Affash, Rom Aschner, Paz Carmi, Matthew J. Katz:

Minimum Power Energy Spanners in Wireless Ad Hoc Networks. 2411-2416
Resource Management for Wireless Networks
- Holger Boche, Siddharth Naik, Tansu Alpcan

:
Characterization of Non-Manipulable and Pareto Optimal Resource Allocation Strategies for Interference Coupled Wireless Systems. 2417-2425 - I-Hong Hou, P. R. Kumar:

Utility Maximization for Delay Constrained QoS in Wireless. 2426-2434 - Matthew Andrews, Antonio Fernández

, Lisa Zhang, Wenbo Zhao:
Routing for Energy Minimization in the Speed Scaling Model. 2435-2443 - Pan Li

, Yuguang Fang
:
The Capacity of Heterogeneous Wireless Networks. 2444-2452
Sensor Network Design 3
- Yanyan Zhuang, Jianping Pan

, Lin Cai
:
Minimizing Energy Consumption with Probabilistic Distance Models in Wireless Sensor Networks. 2453-2461 - Guanqun Yang, Daji Qiao:

Multi-Round Sensor Deployment for Guaranteed Barrier Coverage. 2462-2470 - Xing Xu, Ji Luo, Qian Zhang

:
Delay Tolerant Event Collection in Sensor Networks with Mobile Sink. 2471-2479 - Xiaole Bai, Ziqiu Yun, Dong Xuan, Weijia Jia

, Wei Zhao
:
Pattern Mutation in Wireless Sensor Deployment. 2480-2488
Online Social Network/Web Search
- Zhengye Liu, Hao Hu, Yong Liu

, Keith W. Ross, Yao Wang
, Markus Mobius:
P2P Trading in Social Networks: The Value of Staying Connected. 2489-2497 - Minas Gjoka, Maciej Kurant, Carter T. Butts, Athina Markopoulou

:
Walking in Facebook: A Case Study of Unbiased Sampling of OSNs. 2498-2506 - Stratis Ioannidis

, Laurent Massoulié:
Surfing the Blogosphere: Optimal Personalized Strategies for Searching the Web. 2507-2515 - Jinyuan Sun, Xiaoyan Zhu, Yuguang Fang

:
A Privacy-Preserving Scheme for Online Social Networks with Efficient Revocation. 2516-2524
Wireless Broadcast
- Di Niu, Baochun Li:

Topological Properties Affect the Power of Network Coding in Decentralized Broadcast. 2525-2533 - Wei Pu, Hao Cui, Chong Luo, Feng Wu, Chang Wen Chen:

Stable Maximum Throughput Broadcast in Wireless Fading Channels. 2534-2542 - Weiyao Xiao, Sachin Agarwal, David Starobinski, Ari Trachtenberg:

Reliable Wireless Broadcasting with Near-Zero Feedback. 2543-2551 - Nikolaos Fountoulakis

, Anna Huber, Konstantinos Panagiotou:
Reliable Broadcasting in Random Networks and the Effect of Density. 2552-2560
Wireles Network Analysis 5
- N. Prasanth Anthapadmanabhan, Armand M. Makowski:

On the Absence of Isolated Nodes in Wireless Ad-Hoc Networks with Unreliable Links - a Curious Gap. 2561-2569 - Bartlomiej Blaszczyszyn, Paul Mühlethaler:

Stochastic Analysis of Non-Slotted Aloha in Wireless Ad-Hoc Networks. 2570-2578 - Cem Boyaci, Bo Li, Ye Xia:

An Investigation on the Nature of Wireless Scheduling. 2579-2587 - Liqun Fu, Soung Chang Liew, Jianwei Huang:

Effective Carrier Sensing in CSMA Networks under Cumulative Interference. 2588-2596
Wireless Network Scheduling 3
- Hongkun Yang, Fengyuan Ren, Chuang Lin, Jiao Zhang:

Frequency-Domain Packet Scheduling for 3GPP LTE Uplink. 2597-2605 - I-Hong Hou, P. R. Kumar:

Scheduling Heterogeneous Real-Time Traffic over Fading Wireless Channels. 2606-2614 - Veeraruna Kavitha, Eitan Altman, Rachid El Azouzi

, Rajesh Sundaresan:
Fair Scheduling in Cellular Systems in the Presence of Noncooperative Mobiles. 2615-2623 - Yang Song, Chi Zhang, Yuguang Fang

, Zhisheng Niu:
Energy-Conserving Scheduling in Multi-hop Wireless Networks with Time-Varying Channels. 2624-2632
Sensor Network Security
- Rui Zhang, Yanchao Zhang:

Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks. 2633-2641 - Fei Chen, Alex X. Liu:

SafeQ: Secure and Efficient Query Processing in Sensor Networks. 2642-2650 - Ming Li, Shucheng Yu

, Wenjing Lou, Kui Ren
:
Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks. 2651-2659 - Yun Li, Jian Ren:

Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks. 2660-2668
Network Theory
- Michael J. Neely:

Delay-Based Network Utility Maximization. 2669-2677 - Thang N. Dinh

, Ying Xuan, My T. Thai, E. K. Park, Taieb Znati:
On Approximation of New Optimization Methods for Assessing Network Vulnerability. 2678-2686 - Ching-Ming Lien, Cheng-Shang Chang, Jay Cheng, Duan-Shin Lee, Jou-Ting Liao:

Twister Networks and Their Applications to Load-Balanced Switches. 2687-2695 - Hung Q. Ngo, Atri Rudra, Anh N. Le, Thanh-Nhan Nguyen:

Analyzing Nonblocking Switching Networks using Linear Programming (Duality). 2696-2704
Traffic Management
- Miklós Reiter, Richard Steinberg:

Forward Contracts for Complementary Segments of a Communication Network. 2705-2713 - Tricha Anjali, Gruia Calinescu

, Alexander Fortin, Sanjiv Kapoor, Nandakiran Kirubanandan, Sutep Tongngam
:
Multipath Network Flows: Bounded Buffers and Jitter. 2714-2720 - Javad Lavaei, John C. Doyle, Steven H. Low:

Utility Functionals Associated With Available Congestion Control Algorithms. 2721-2729 - Parimal Parag

, Srinivas Shakkottai, Jean-François Chamberland
:
Value-aware Resource Allocation for Service Guarantees in Networks. 2730-2738
Wireless Network Analysis 6
- Donghyun Kim, Wei Wang, Xianyue Li, Zhao Zhang, Weili Wu:

A New Constant Factor Approximation for Computing 3-Connected m-Dominating Sets in Homogeneous Wireless Networks. 2739-2747 - Chi Yi, Wenye Wang

:
On the Connectivity Analysis over Large-Scale Hybrid Wireless Networks. 2748-2756 - In Keun Son, Shiwen Mao:

Design and Optimization of a Tiered Wireless Access Network. 2757-2765 - Weiyi Zhao, Jiang Xie:

A Novel Xcast-based Caching Architecture for Inter-gateway Handoffs in Infrastructure Wireless Mesh Networks. 2766-2774
Routing in Wireless Networks
- Yanhua Li, Zhi-Li Zhang:

Random Walks on Digraphs: A Theoretical Framework for Estimating Transmission Costs in Wireless Routing. 2775-2783 - Shan Chu, Xin Wang:

MIMO-Aware Routing in Wireless Mesh Networks. 2784-2792 - Stanislav Miskovic, Edward W. Knightly:

Routing Primitives for Wireless Mesh Networks: Design, Analysis and Experiments. 2793-2801 - Chansu Yu, Tianning Shen, Kang G. Shin, Jeong-Yoon Lee, Young-Joo Suh:

Multihop Transmission Opportunity in Wireless Multihop Networks. 2802-2810
Security Design
- Feng Li, Yinying Yang, Jie Wu:

CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks. 2811-2819 - Fengjun Li

, Bo Luo
, Peng Liu, Chao-Hsien Chu
:
A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping. 2820-2828 - Wojciech Galuba, Panos Papadimitratos

, Marcin Poturalski, Karl Aberer, Zoran Despotovic, Wolfgang Kellerer
:
Castor: Scalable Secure Routing for Ad Hoc Networks. 2829-2837 - Chi Zhang, Xiaoyan Zhu, Yang Song, Yuguang Fang

:
A Formal Study of Trust-Based Routing in Wireless Ad Hoc Networks. 2838-2846
Wirelsess Network Scheduling 4
- V. J. Venkataramanan, Xiaojun Lin, Lei Ying

, Sanjay Shakkottai:
On Scheduling for Minimizing End-to-End Buffer Usage over Multihop Wireless Networks. 2847-2855 - Arun Sridharan, Can Emre Koksal, Elif Uysal-Biyikoglu

:
A Greedy Link Scheduler for Wireless Networks with Gaussian Multiple Access and Broadcast Channels. 2856-2864 - Dajun Qian, Dong Zheng, Junshan Zhang, Ness B. Shroff:

CSMA-Based Distributed Scheduling in Multi-hop MIMO Networks under SINR Model. 2865-2873 - Sheu-Sheu Tan, Dong Zheng, Junshan Zhang, James R. Zeidler:

Distributed Opportunistic Scheduling for Ad-Hoc Communications Under Delay Constraints. 2874-2882
Modeling/Router Design
- Shihuan Liu, Lei Ying, R. Srikant:

Throughput-Optimal Opportunistic Scheduling in the Presence of Flow-Level Dynamics. 2883-2891 - Jun Li

, Shuang Yang, Xin Wang, Baochun Li:
Tree-structured Data Regeneration in Distributed Storage Systems with Regenerating Codes. 2892-2900 - Jilong Kuang, Laxmi N. Bhuyan:

Optimizing Throughput and Latency under Given Power Budget for Network Packet Processing. 2901-2909 - Bo Zhang, T. S. Eugene Ng:

On Constructing Efficient Shared Decision Trees for Multiple Packet Filters. 2910-2918
Wireless Network Design
- Dimitrios Koutsonikolas, Chih-Chun Wang, Y. Charlie Hu:

CCACK: Efficient Network Coding Based Opportunistic Routing Through Cumulative Coded Acknowledgments. 2919-2927 - Jieun Yu, Heejun Roh

, Wonjun Lee, Sangheon Pack
, Ding-Zhu Du:
Cooperative Bridges: Topology Control in Cooperative Wireless Ad Hoc Networks. 2928-2936 - Tae-Suk Kim, Serdar Vural, Ioannis Broustis, Dimitris Syrivelis, Srikanth V. Krishnamurthy

, Thomas F. La Porta:
A Framework for Joint Network Coding and Transmission Rate Control in Wireless Networks. 2937-2945 - Sofiane Hassayoun, Patrick Maillé

, David Ros:
On the Impact of Random Losses on TCP Performance in Coded Wireless Mesh Networks. 2946-2954
Adhoc Network Routing & Delay Analysis
- Raed T. Al-Zubi, Marwan Krunz:

Overhearing-aware Joint Routing and Rate Selection in Multi-hop Multi-rate UWB-based WPANs. 2955-2963 - Rolando Menchaca-Méndez

, J. J. Garcia-Luna-Aceves:
Robust and Scalable Integrated Routing in MANETs Using Context-Aware Ordered Meshes. 2964-2972 - Fragkiskos Papadopoulos

, Dmitri V. Krioukov, Marián Boguñá, Amin Vahdat:
Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces. 2973-2981 - François Baccelli, Bartlomiej Blaszczyszyn:

A New Phase Transitions for Local Delays in MANETs. 2982-2990

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














