


default search action
31st INFOCOM 2012: Orlando, FL, USA
- Albert G. Greenberg, Kazem Sohraby:

Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012. IEEE 2012, ISBN 978-1-4673-0773-4 - Jiajia Liu

, Xiaohong Jiang, Hiroki Nishiyama
, Nei Kato:
Exact throughput capacity under power control in mobile ad hoc networks. 1-9 - Yujun Zhang, Guiling Wang

, Qi Hu, Zhongcheng Li, Jie Tian:
Design and performance study of a Topology-Hiding Multipath Routing protocol for mobile ad hoc networks. 10-18 - Wang Liu, Kejie Lu, Jianping Wang

, Yi Qian, Tao Zhang, Liusheng Huang:
Capacity of distributed content delivery in large-scale wireless ad hoc networks. 19-27 - Nguyen Tien Viet, François Baccelli:

On the spatial modeling of wireless networks by random packing models. 28-36 - Richard Southwell, Jianwei Huang, Xin Liu:

Spectrum mobility games. 37-45 - Yingzhe Li, Xinbing Wang, Xiaohua Tian, Xue Liu:

Scaling laws for cognitive radio network with heterogeneous mobile secondary users. 46-54 - Yao Zhao, Hongyi Wu, Miao Jin, Su Xia:

Localization in 3D surface sensor networks: Challenges and solutions. 55-63 - Chenshu Wu, Zheng Yang, Yunhao Liu, Wei Xi:

WILL: Wireless indoor localization without site survey. 64-72 - Zhiguo Wan, Kai Xing, Yunhao Liu:

Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks. 73-81 - Jayashree Subramanian, Robert Morris, Hari Balakrishnan:

UFlood: High-throughput flooding over wireless mesh networks. 82-90 - Mohsen Sardari, Ahmad Beirami, Faramarz Fekri

:
Memory-assisted universal compression of network flows. 91-99 - Peng Li, Song Guo

, Shui Yu
, Athanasios V. Vasilakos
:
CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. 100-108 - Jin Teng, Junda Zhu, Boying Zhang, Dong Xuan, Yuan F. Zheng:

E-V: Efficient visual surveillance with electronic footprints. 109-117 - Junkun Li, Jiming Chen, Ten-Hwang Lai:

Energy-efficient intrusion detection with a barrier of probabilistic sensors. 118-126 - Chengjie Wu, You Xu, Yixin Chen, Chenyang Lu:

Submodular game for distributed application allocation in shared sensor networks. 127-135 - Huai-Lei Fu, Hou-Chun Chen, Phone Lin

, Yuguang Fang
:
Energy-efficient reporting mechanisms for multi-type real-time monitoring in Machine-to-Machine communications networks. 136-144 - Hongkun Li, Yu Cheng

, Xiaohua Tian, Xinbing Wang:
A generic framework for throughput-optimal control in MR-MC wireless networks. 145-153 - Riccardo Crepaldi, Jeongkeun Lee, Raúl H. Etkin, Sung-Ju Lee, Robin Kravets

:
CSI-SF: Estimating wireless channel state using CSI sampling & fusion. 154-162 - Feng Wang, Dan Wang

, Jiangchuan Liu:
EleSense: Elevator-assisted wireless sensor data collection for high-rise structure monitoring. 163-171 - Hongxing Li, Chuan Wu

, Zongpeng Li, Wei Huang, Francis C. M. Lau:
Stochastic optimal multirate multicast in socially selfish wireless networks. 172-180 - Chunyi Peng, Minkyong Kim, Zhe Zhang, Hui Lei:

VDN: Virtual machine image distribution network for cloud data centers. 181-189 - Yang Song, Murtaza Zafer, Kang-Won Lee

:
Optimal bidding in spot instance market. 190-198 - Feng Wang, Jiangchuan Liu, Minghua Chen

:
CALMS: Cloud-assisted live media streaming for globalized demands with time/region diversities. 199-207 - Orathai Sukwong, Akkarit Sangpetch

, Hyong S. Kim:
SageShift: Managing SLAs for highly consolidated cloud. 208-216 - Huan Ma, Meng Yang, Deying Li, Yi Hong, Wenping Chen:

Minimum camera barrier coverage in wireless camera sensor networks. 217-225 - Dengyuan Wu, Dechang Chen, Kai Xing, Xiuzhen Cheng:

A statistical approach for target counting in sensor-based surveillance systems. 226-234 - Nan Hua, Ashwin Lall, Baochun Li, Jun (Jim) Xu:

A simpler and better design of error estimating coding. 235-243 - Xi Fang, Dejun Yang

, Guoliang Xue:
Strategizing surveillance for resource-constrained event monitoring. 244-252 - Jiajia Liu

, Xiaohong Jiang, Hiroki Nishiyama
, Nei Kato:
Multicast capacity, delay and delay jitter in intermittently connected mobile networks. 253-261 - Xiaoyu Chu, Harish Sethu:

Cooperative topology control with adaptation for improved lifetime in wireless ad hoc networks. 262-270 - Xi Chen, Wentao Huang, Xinbing Wang, Xiaojun Lin:

Multicast capacity in mobile wireless ad hoc network with infrastructure support. 271-279 - Xi Fang, Dejun Yang

, Guoliang Xue:
Resource allocation in load-constrained multihopwireless networks. 280-288 - Mustafa Al-Bado, Cigdem Sengul

, Ruben Merz:
What details are needed for wireless simulations? - A study of a site-specific indoor wireless model. 289-297 - Xinfeng Li, Jin Teng, Boying Zhang, Adam C. Champion, Dong Xuan:

TurfCast: A service for controlling information dissemination in wireless networks. 298-306 - Haopeng Li, Jiang Xie:

A low-cost channel scheduling design for multi-hop handoff delay reduction in internet-based wireless mesh networks. 307-315 - Michael J. Neely, Arash Saber Tehrani, Zhen Zhang:

Dynamic index coding for wireless broadcast networks. 316-324 - Xunrui Yin, Xin Wang, Jin Zhao, Xiangyang Xue, Zongpeng Li:

On benefits of network coding in bidirected networks and hyper-networks. 325-333 - Hsiao-Chen Lu, Wanjiun Liao

:
Cooperative multicasting in network-coding enabled multi-rate wireless relay networks. 334-342 - Anh Le, Athina Markopoulou

:
On detecting pollution attacks in inter-session network coding. 343-351 - Nathaniel M. Jones, Brooke Shrader, Eytan H. Modiano:

Optimal routing and scheduling for a simple network coding scheme. 352-360 - Yongle Cao, Shuo Guo, Tian He:

Robust multi-pipeline scheduling in low-duty-cycle wireless sensor networks. 361-369 - Zhi Sun, Ian F. Akyildiz:

On capacity of magnetic induction-based wireless underground sensor networks. 370-378 - Shengbo Chen, Prasun Sinha, Ness B. Shroff, Changhee Joo:

A simple asymptotically optimal energy allocation and routing scheme in rechargeable sensor networks. 379-387 - Xiaohui Liang

, Xu Li, Qinghua Shen, Rongxing Lu, Xiaodong Lin, Xuemin Shen
, Weihua Zhuang
:
Exploiting prediction to enable Secure and Reliable routing in Wireless Body Area Networks. 388-396 - Sobia Jangsher

, Syed Ali Khayam, Qasim M. Chaudhari:
Application-aware MIMO Video Rate Adaptation. 397-405 - Aneesh Reddy, Sujay Sanghavi, Sanjay Shakkottai:

On the effect of channel fading on greedy scheduling. 406-414 - Peng-Jun Wan, Dechang Chen, Guojun Dai, Zhu Wang, F. Frances Yao:

Maximizing capacity with power control under physical interference model in duplex mode. 415-423 - Canming Jiang, Yi Shi

, Y. Thomas Hou
, Wenjing Lou, Sastry Kompella
, Scott F. Midkiff
:
Squeezing the most out of interference: An optimization framework for joint interference exploitation and avoidance. 424-432 - Fangfei Chen, Katherine Guo, John Lin, Thomas La Porta:

Intra-cloud lightning: Building CDNs in the cloud. 433-441 - Haiyang Wang, Feng Wang, Jiangchuan Liu, Justin Groen:

Measurement and utilization of customer-provided resources for cloud computing. 442-450 - Cong Wang

, Kui Ren
, Shucheng Yu
, Karthik Mahendra Raje Urs:
Achieving usable and privacy-assured similarity search over outsourced cloud data. 451-459 - Di Niu, Hong Xu

, Baochun Li, Shuqiao Zhao:
Quality-assured cloud bandwidth auto-scaling for video-on-demand applications. 460-468 - Michal Ficek, Lukas Kencl

:
Inter-Call Mobility model: A spatio-temporal refinement of Call Data Records using a Gaussian mixture model. 469-477 - Christos Dimitrakakis

, Aikaterini Mitrokotsa
, Serge Vaudenay:
Expected loss bounds for authentication in constrained channels. 478-485 - Siyao Cheng, Jianzhong Li, Lei Yu

:
Location Aware Peak Value Queries in sensor networks. 486-494 - Bowu Zhang

, Kai Xing, Xiuzhen Cheng, Liusheng Huang, Rongfang Bie:
Traffic clustering and online traffic prediction in vehicle networks: A social influence perspective. 495-503 - Donghyun Kim, Baraki H. Abay, R. N. Uma, Weili Wu, Wei Wang, Alade O. Tokuta:

Minimizing data collection latency in wireless sensor network with multiple mobile elements. 504-512 - Rahul Vaze:

Percolation and connectivity on the signal to interference ratio graph. 513-521 - Chi-Kin Chau

, Richard J. Gibbens, Don Towsley
:
Impact of directional transmission in large-scale multi-hop wireless ad hoc networks. 522-530 - Savvas Gitzenis, Georgios S. Paschos

, Leandros Tassiulas:
Asymptotic laws for content replication and delivery in wireless networks. 531-539 - Andres Garcia-Saavedra

, Albert Banchs, Pablo Serrano
, Joerg Widmer
:
Distributed Opportunistic Scheduling: A control theoretic approach. 540-548 - Xiaojun Feng, Jin Zhang, Qian Zhang

, Bo Li:
Use your frequency wisely: Explore frequency domain for channel contention and ACK. 549-557 - Justin Manweiler, Peter Franklin, Romit Roy Choudhury:

RxIP: Monitoring the health of home wireless networks. 558-566 - Vinay Joseph

, Gustavo de Veciana:
Jointly optimizing multi-user rate adaptation for video transport over wireless systems: Mean-fairness-variability tradeoffs. 567-575 - Liang He, Zhe Yang, Jianping Pan

, Lin Cai
, Jingdong Xu:
Evaluating service disciplines for mobile elements in wireless ad hoc sensor networks. 576-584 - Marco Valero, Sang Shin Jung, A. Selcuk Uluagac

, Yingshu Li
, Raheem A. Beyah
:
Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks. 585-593 - Liang Liu, Anlong Ming, Huadong Ma, Xi Zhang:

A binary-classification-tree based framework for distributed target classification in multimedia sensor networks. 594-602 - Jin Wang, Shaojie Tang, Baocai Yin, Xiang-Yang Li:

Data gathering in wireless sensor networks through intelligent compressive sensing. 603-611 - Shaolei Ren

, Jaeok Park, Mihaela van der Schaar:
Maximizing profit on user-generated content platforms with heterogeneous participants. 612-620 - Xinggong Zhang, Yang Xu, Hao Hu, Yong Liu

, Zongming Guo, Yao Wang
:
Profiling Skype video calls: Rate control and video quality. 621-629 - Antonio Carzaniga

, Cyrus P. Hall, Michele Papalini:
Fully decentralized estimation of some global properties of a network. 630-638 - Xun Xiao, Minming Li

, Jianping Wang
, Chunming Qiao:
Optimal resource allocation to defend against deliberate attacks in networking infrastructures. 639-647 - Desmond W. H. Cai, Chee Wei Tan

, Steven H. Low:
Optimal max-min fairness rate control in wireless networks: Perron-Frobenius characterization and algorithms. 648-656 - Mahdi Hajiaghayi, Min Dong

, Ben Liang
:
Jointly optimal bit loading, channel pairing and power allocation for multi-channel relaying. 657-665 - Chunsheng Xin, Min Song:

Dynamic spectrum access as a service. 666-674 - Gesualdo Scutari, Francisco Facchinei

, Jong-Shi Pang, Lorenzo Lampariello
:
Equilibrium selection in power control games on the interference channel. 675-683 - Yu Wu, Chuan Wu

, Bo Li, Linquan Zhang, Zongpeng Li, Francis C. M. Lau:
Scaling social media applications into geo-distributed clouds. 684-692 - Ning Cao, Shucheng Yu

, Zhenyu Yang, Wenjing Lou, Y. Thomas Hou
:
LT codes-based secure and reliable cloud storage service. 693-701 - Siva Theja Maguluri, R. Srikant, Lei Ying

:
Stochastic models of load balancing and scheduling in cloud computing clusters. 702-710 - Di Niu, Chen Feng

, Baochun Li:
A theory of cloud bandwidth pricing for video-on-demand providers. 711-719 - Narendra Anand, Sung-Ju Lee, Edward W. Knightly:

STROBE: Actively securing wireless communications using Zero-Forcing Beamforming. 720-728 - Shuai Li, Haojin Zhu

, Zhaoyu Gao, Xinping Guan, Kai Xing, Xuemin Shen
:
Location privacy preservation in collaborative spectrum sensing. 729-737 - Kaihe Xu, Qian Wang

, Kui Ren
:
Joint UFH and power control for effective wireless anti-jamming communication. 738-746 - Eric Graves, Tan F. Wong:

Detection of channel degradation attack by Intermediary Node in Linear Networks. 747-755 - Shangxing Wang, Youyun Xu, Xinbing Wang:

Motioncast with general Markovian mobility. 756-764 - Philippe Jacquet, Salman Malik, Bernard Mans

, Alonso Silva:
On the throughput-delay trade-off in georouting networks. 765-773 - Canming Jiang, Yi Shi

, Y. Thomas Hou
, Wenjing Lou, Sastry Kompella
, Scott F. Midkiff
:
Toward simple criteria to establish capacity scaling laws for wireless networks. 774-782 - Gruia Calinescu

, Kan Qiao:
Asymmetric topology control: Exact solutions and fast approximations. 783-791 - Qiang Ma, Kebin Liu, Xin Miao, Yunhao Liu:

Sherlock is around: Detecting network failures with local evidence fusion. 792-800 - Zhenjiang Li, Mo Li

, Yunhao Liu:
Towards energy-fairness in asynchronous duty-cycling sensor networks. 801-809 - Arthur J. Friend, Vahideh H. Manshadi, Amin Saberi:

Distributed node placement algorithms for constructing well-connected sensor networks. 810-818 - Shibo He, Jiming Chen, Xu Li, Xuemin Shen

, Youxian Sun:
Cost-effective barrier coverage by mobile sensor networks. 819-827 - Tzvika Hartman, Avinatan Hassidim, Haim Kaplan, Danny Raz, Michal Segalov:

How to split a flow? 828-836 - Emilie Danna, Avinatan Hassidim, Haim Kaplan, Alok Kumar, Yishay Mansour, Danny Raz, Michal Segalov:

Upward Max Min Fairness. 837-845 - Emilie Danna, Subhasree Mandal, Arjun Singh:

A practical algorithm for balancing the max-min fairness and throughput objectives in traffic engineering. 846-854 - Magnús M. Halldórsson

, Pradipta Mitra:
Wireless capacity and admission control in cognitive radio. 855-863 - Wenchi Cheng, Xi Zhang, Hailin Zhang:

Full/half duplex based resource allocations for statistical quality of service provisioning in wireless relay networks. 864-872 - Yuefei Zhu, Baochun Li, Zongpeng Li:

Truthful spectrum auction design for secondary networks. 873-881 - Dejun Yang

, Xi Fang, Guoliang Xue:
Channel allocation in non-cooperative multi-radio multi-channel wireless networks. 882-890 - Zaixin Lu, Yan Shi, Weili Wu, Bin Fu:

Efficient data retrieval scheduling for multi-channel wireless data broadcast. 891-899 - Qiben Yan

, Ming Li, Tingting Jiang, Wenjing Lou, Y. Thomas Hou
:
Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks. 900-908 - Yao Liu, Peng Ning:

BitTrickle: Defending against broadband and high-power reactive jamming attacks. 909-917 - Martin Eian, Stig Fr. Mjølsnes

:
A formal analysis of IEEE 802.11w deadlock vulnerabilities. 918-926 - Hongbo Liu

, Jie Yang, Yan Wang, Yingying Chen
:
Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks. 927-935 - Qian Wang

, Kui Ren
, Xiaoqiao Meng:
When cloud meets eBay: Towards effective pricing for cloud computing. 936-944 - Sokol Kosta

, Andrius Aucinas, Pan Hui, Richard Mortier
, Xinwen Zhang:
ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. 945-953 - Vimal Mathew, Ramesh K. Sitaraman, Prashant J. Shenoy

:
Energy-aware load balancing in content delivery networks. 954-962 - Mansoor Alicherry, T. V. Lakshman:

Network aware resource allocation in distributed clouds. 963-971 - Xinxin Liu, Han Zhao, Miao Pan, Hao Yue

, Xiaolin Li, Yuguang Fang
:
Traffic-aware multiple mix zone placement for protecting location privacy. 972-980 - Shizhen Zhao, Xiaojun Lin:

On the design of scheduling algorithms for end-to-end backlog minimization in multi-hop wireless networks. 981-989 - Guner D. Celik, Eytan H. Modiano:

Scheduling in networks with time-varying channels and reconfiguration delay. 990-998 - Srikanth Hariharan, Ness B. Shroff:

On sample-path optimal dynamic scheduling for sum-queue minimization in trees under the K-hop interference model. 999-1007 - Shuguang Xiong, Lei Yu

, Haiying Shen, Chen Wang, Wei Lu:
Efficient algorithms for sensor deployment and routing in sensor networks for network-structured environment monitoring. 1008-1016 - Zhe Yang, Lin Cai

, Yu Liu, Jianping Pan
:
Environment-aware clock skew estimation and synchronization for wireless sensor networks. 1017-1025 - Cheng Bo, Danping Ren, Shaojie Tang, Xiang-Yang Li, XuFei Mao, Qiuyuan Huang, Lufeng Mo, Zhiping Jiang, Yongmei Sun, Yunhao Liu:

Locating sensors in the forest: A case study in GreenOrbs. 1026-1034 - Shouling Ji, Raheem A. Beyah

, Zhipeng Cai:
Snapshot/Continuous Data Collection capacity for large-scale probabilistic Wireless Sensor Networks. 1035-1043 - Sachin Kadloor, Negar Kiyavash, Parv Venkitasubramaniam

:
Mitigating timing based information leakage in shared schedulers. 1044-1052 - Costas Courcoubetis, Antonis Dimakis:

Fair background data transfers of minimal delay impact. 1053-1061 - Jing Yang

, Yanpei Liu, Stark C. Draper
:
Optimal scheduling policies with mutual information accumulation in wireless networks. 1062-1070 - Aditya Gopalan, Constantine Caramanis

, Sanjay Shakkottai:
Low-delay wireless scheduling with partial channel-state information. 1071-1079 - Karthikeyan Sundaresan, Sampath Rangarajan:

Adaptive resource scheduling in wireless OFDMA relay networks. 1080-1088 - Rohit Aggarwal, Can Emre Koksal, Philip Schniter

:
Performance bounds and associated design principles for multi-cellular wireless OFDMA systems. 1089-1097 - Harish Ganapathy, Constantine Caramanis

:
Queue-based sub-carrier grouping for feedback reduction in OFDMA systems. 1098-1106 - Negin Golrezaei, Karthikeyan Shanmugam

, Alexandros G. Dimakis, Andreas F. Molisch, Giuseppe Caire:
FemtoCaching: Wireless video content delivery through distributed caching helpers. 1107-1115 - Andrew R. Curtis, Tommy Carpenter, Mustafa Elsheikh, Alejandro López-Ortiz, Srinivasan Keshav

:
REWIRE: An optimization-based framework for unstructured data center network design. 1116-1124 - Xiaodong Wang, Yanjun Yao, Xiaorui Wang, Kefa Lu, Qing Cao:

CARPO: Correlation-aware power optimization in data center networks. 1125-1133 - Yuan Feng, Baochun Li, Bo Li:

Bargaining towards maximized resource utilization in video streaming datacenters. 1134-1142 - Fangfei Chen, Murali S. Kodialam, T. V. Lakshman:

Joint scheduling of processing and Shuffle phases in MapReduce systems. 1143-1151 - Cagatay Capar, Dennis Goeckel, Benyuan Liu, Don Towsley

:
Secret communication in large wireless networks without eavesdropper location information. 1152-1160 - Jin Tang, Yu Cheng

, Yong Hao:
Detection and prevention of SIP flooding attacks in voice over IP networks. 1161-1169 - Rui Zhang, Yanchao Zhang, Chi Zhang:

Secure top-k query processing via untrusted location-based service providers. 1170-1178 - Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik, Don Towsley

:
Physical layer security from inter-session interference in large wireless networks. 1179-1187 - Sok-Ian Sou, Phone Lin

, Ssu-Shih Chen, Jeu-Yih Jeng:
A novel multi-tariff charging method for next generation Multicast and Broadcast Service. 1188-1196 - Aemen Lodhi, Amogh Dhamdhere, Constantine Dovrolis:

GENESIS: An agent-based model of interdomain network formation, traffic flow and economics. 1197-1205 - Carlee Joe-Wong, Soumya Sen, Tian Lan, Mung Chiang:

Multi-resource allocation: Fairness-efficiency tradeoffs in a unifying framework. 1206-1214 - Youwen Yi, Jin Zhang, Qian Zhang

, Tao Jiang:
Spectrum leasing to femto service provider with hybrid access. 1215-1223 - Wenzhuo Ouyang, Atilla Eryilmaz, Ness B. Shroff:

Asymptotically optimal downlink scheduling over Markovian fading channels. 1224-1232 - Yu Hua, Xue Liu, Wenbo He:

HOSA: Holistic scheduling and analysis for scalable fault-tolerant FlexRay design. 1233-1241 - Partha Dutta, Anand Seetharam, Vijay Arya, Malolan Chetlur, Shivkumar Kalyanaraman, Jim Kurose:

On managing quality of experience of multiple video streams in wireless networks. 1242-1250 - Sungsu Lim

, Kyomin Jung, Matthew Andrews:
Stability of the Max-Weight protocol in adversarial wireless networks. 1251-1259 - Dianjie Lu, Xiaoxia Huang, Pan Li

, Jianping Fan:
Connectivity of large-scale Cognitive Radio Ad Hoc Networks. 1260-1268 - Ilenia Tinnirello, Giuseppe Bianchi, Pierluigi Gallo, Domenico Garlisi, Francesco Giuliano, Francesco Gringoli:

Wireless MAC processors: Programming MAC protocols on commodity Hardware. 1269-1277 - Lei Sun, Wenye Wang

:
Understanding the tempo-spatial limits of information dissemination in multi-channel Cognitive Radio Networks. 1278-1286 - Lei Sun, Wenye Wang

:
On latency distribution and scaling: from finite to large Cognitive Radio Networks under general mobility. 1287-1295 - Liang Liu, Yuning Song, Huadong Ma, Xi Zhang:

Physarum optimization: A biology-inspired algorithm for minimal exposure path problem in wireless sensor networks. 1296-1304 - Songtao Guo, Yuanyuan Yang

:
A distributed optimal framework for mobile data gathering with concurrent data uploading in wireless sensor networks. 1305-1313 - Changlei Liu, Guohong Cao:

Distributed critical location coverage in wireless sensor networks with lifetime constraint. 1314-1322 - Zhichao Cao, Yuan He, Yunhao Liu:

L2: Lazy forwarding in low duty cycle wireless sensor networks. 1323-1331 - Yao Liu, Fei Li, Lei Guo, Bo Shen, Songqing Chen:

A server's perspective of Internet streaming delivery to mobile devices. 1332-1340 - Muhammad Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Jia Wang:

Characterizing geospatial dynamics of application usage in a 3G cellular data network. 1341-1349 - Suk-Bok Lee, Dan Pei

, MohammadTaghi Hajiaghayi, Ioannis Pefkianakis, Songwu Lu, He Yan, Zihui Ge, Jennifer Yates, Mario Kosseifi:
Threshold compression for 3G scalable monitoring. 1350-1358 - Qian (Clara) Li, Rose Qingyang Hu, Geng Wu, Yi Qian:

On the optimal mobile association in heterogeneous wireless relay networks. 1359-1367 - Jie Wu, Yunsheng Wang:

Social feature-based multi-path routing in delay tolerant networks. 1368-1376 - Nikodin Ristanovic, George Theodorakopoulos

, Jean-Yves Le Boudec:
Traps and pitfalls of using contact traces in performance studies of opportunistic networks. 1377-1385 - Misael Mongiovì

, Ambuj K. Singh, Xifeng Yan, Bo Zong, Konstantinos Psounis:
Efficient multicasting for delay tolerant networks using graph indexing. 1386-1394 - Rongxing Lu, Xiaodong Lin, Tom H. Luan

, Xiaohui Liang
, Xu Li, Le Chen, Xuemin Shen
:
PReFilter: An efficient privacy-preserving Relay Filtering scheme for delay tolerant networks. 1395-1403 - Wanchun Jiang, Fengyuan Ren, Ran Shu, Chuang Lin:

Sliding Mode Congestion Control for data center Ethernet networks. 1404-1412 - Zhiyang Guo, Zhemin Zhang, Yuanyuan Yang

:
Exploring server redundancy in nonblocking multicast data center networks. 1413-1421 - Guanfeng Liang, Benjamin Sommer, Nitin H. Vaidya:

Experimental performance comparison of Byzantine Fault-Tolerant protocols for data centers. 1422-1430 - Yuan Yao, Longbo Huang, Abhishek B. Sharma, Leana Golubchik, Michael J. Neely:

Data centers power reduction: A two time scale approach for delay tolerant workloads. 1431-1439 - Dawei Gong, Yuanyuan Yang

:
AP association in 802.11n WLANs with heterogeneous clients. 1440-1448 - Kaishun Wu

, Haochao Li, Lu Wang
, Youwen Yi, Yunhuai Liu, Qian Zhang, Lionel M. Ni:
HJam: Attachment transmission in WLANs. 1449-1457 - Xi Chen, Yue Zhao, Brian Peck, Daji Qiao:

SAP: Smart Access Point with seamless load balancing multiple interfaces. 1458-1466 - Ehsan Aryafar, Mohammad Ali Khojastepour, Karthikeyan Sundaresan, Sampath Rangarajan, Edward W. Knightly:

ADAM: An adaptive beamforming system for multicasting in wireless LANs. 1467-1475 - Ning Lu, Tom H. Luan

, Miao Wang, Xuemin Shen
, Fan Bai:
Capacity and delay analysis for social-proximity urban vehicular networks. 1476-1484 - Yuchen Wu, Yanmin Zhu, Bo Li:

Infrastructure-assisted routing in vehicular networks. 1485-1493 - Joon Ahn, Yi Wang, Bo Yu, Fan Bai, Bhaskar Krishnamachari:

RISA: Distributed Road Information Sharing Architecture. 1494-1502 - Francesca Martelli

, M. Elena Renda
, Giovanni Resta
, Paolo Santi:
A measurement-based study of beaconing performance in IEEE 802.11p vehicular networks. 1503-1511 - Valentino Pacifici

, Frank Lehrieder, György Dán:
Cache capacity allocation for BitTorrent-like systems to minimize inter-ISP traffic. 1512-1520 - Yi Sun, Yang Richard Yang, Xiaobing Zhang, Yang Guo, Jun Li, Kavé Salamatian

:
Network optimization for DHT-based applications. 1521-1529 - Yipeng Zhou

, Tom Z. J. Fu, Dah Ming Chiu:
A unifying model and analysis of P2P VoD replication and scheduling. 1530-1538 - Delia Ciullo, Valentina Martina, Michele Garetto

, Emilio Leonardi
, Giovanni Luca Torrisi:
Stochastic analysis of self-sustainability in peer-assisted VoD systems. 1539-1547 - Cem Tekin, Mingyan Liu:

Approximately optimal adaptive learning in opportunistic spectrum access. 1548-1556 - Miao Pan, Pan Li

, Yang Song, Yuguang Fang
, Phone Lin
:
Spectrum clouds: A session based spectrum trading system for multi-hop cognitive radio networks. 1557-1565 - Bo Gao, Jung-Min Park, Yaling Yang:

Uplink soft frequency reuse for self-coexistence of cognitive radio networks operating in white-space spectrum. 1566-1574 - Shuang Li, Zizhan Zheng, Eylem Ekici

, Ness B. Shroff:
Maximizing system throughput by cooperative sensing in Cognitive Radio Networks. 1575-1583 - Ling Ding, Weili Wu, James Willson, Lidong Wu, Zaixin Lu, Wonjun Lee:

Constant-approximation for target coverage problem in wireless sensor networks. 1584-1592 - Shi Bai, Weiyi Zhang, Guoliang Xue, Jian Tang, Chonggang Wang:

DEAR: Delay-bounded Energy-constrained Adaptive Routing in wireless sensor networks. 1593-1601 - Hongyu Zhou, Hongyi Wu, Miao Jin:

A robust boundary detection algorithm based on connectivity only for 3D wireless sensor networks. 1602-1610 - XuFei Mao, Xin Miao, Yuan He, Xiang-Yang Li, Yunhao Liu:

CitySee: Urban CO2 monitoring with sensors. 1611-1619 - Vijay Kumar Adhikari, Yang Guo, Fang Hao, Matteo Varvello, Volker Hilt, Moritz Steiner, Zhi-Li Zhang:

Unreeling netflix: Understanding and improving multi-CDN movie delivery. 1620-1628 - Akshay Krishnamurthy, Aarti Singh:

Robust multi-source network tomography using selective probes. 1629-1637 - Ori Rottenstreich, Isaac Keslassy

:
The Bloom paradox: When not to use a Bloom filter? 1638-1646 - Tian Pan

, Xiaoyu Guo
, Chenhui Zhang, Junchen Jiang, Hao Wu, Bin Liu:
Tracking millions of flows in high speed networks for application identification. 1647-1655 - Jaime Llorca

, Kyle Guan, Gary Atkinson, Daniel C. Kilper
:
Energy efficient delivery of immersive video centric services. 1656-1664 - Renchao Xie, F. Richard Yu

, Hong Ji:
Energy-efficient spectrum sharing and power allocation in cognitive radio femtocell networks. 1665-1673 - Hao Liang, Bong Jun Choi

, Weihua Zhuang
, Xuemin Shen
:
Towards optimal energy store-carry-and-deliver for PHEVs via V2G system. 1674-1682 - Jian Tang, Brendan Mumey

, Yun Xing, Andy Johnson:
On exploiting flow allocation with rate adaptation for green networking. 1683-1691 - Bruno F. Ribeiro

, Pinghui Wang, Fabricio Murai, Don Towsley
:
Sampling directed graphs with random walks. 1692-1700 - Lingjie Duan

, Takeshi Kubo, Kohei Sugiyama, Jianwei Huang, Teruyuki Hasegawa, Jean C. Walrand:
Incentive mechanisms for smartphone collaboration in data acquisition and distributed computing. 1701-1709 - Felix Ming, Fai Wong, Peter Marbach:

Cosine-neighbourhood-refinement: Towards a robust network formation mechanism. 1710-1718 - Francesco Malandrino

, Maciej Kurant, Athina Markopoulou
, Cédric Westphal, Ulas C. Kozat:
Proactive seeding for information cascades in cellular networks. 1719-1727 - Amir R. Khakpour, Joshua W. Hulst, Zihui Ge, Alex X. Liu, Dan Pei

, Jia Wang:
Firewall fingerprinting. 1728-1736 - Jan van Lunteren, Alexis Guanella:

Hardware-accelerated regular expression matching at multiple tens of Gb/s. 1737-1745 - Chad R. Meiners, Eric Norige, Alex X. Liu, Eric Torng:

FlowSifter: A counting automata approach to layer 7 field extraction for deep flow inspection. 1746-1754 - Cláudia Pascoal, Maria Rosário de Oliveira, Rui Valadas

, Peter Filzmoser
, Paulo Salvador
, António Pacheco
:
Robust feature selection and robust PCA for internet traffic anomaly detection. 1755-1763 - Tao Jing, Xiuying Chen, Yan Huo, Xiuzhen Cheng:

Achievable transmission capacity of cognitive mesh networks with different media access control. 1764-1772 - Harish Ganapathy, Mukundan Madhavan, Malolan Chetlur, Shivkumar Kalyanaraman:

On Exploiting degrees-of-freedom in whitespaces. 1773-1781 - Yanxiao Zhao, Min Song, Chunsheng Xin, Manish Wadhwa:

Spectrum sensing based on three-state model to accomplish all-level fairness for co-existing multiple cognitive radio networks. 1782-1790 - Shiyao Chen, Lang Tong, Qing Zhao:

Delay optimal multichannel opportunistic access. 1791-1799 - Anand Seetharam, Jim Kurose, Dennis Goeckel, Gautam D. Bhanage:

A Markov chain model for coarse timescale channel variation in an 802.16e wireless network. 1800-1807 - Manjesh Kumar Hanawal, Eitan Altman, François Baccelli:

Stochastic geometry based medium access games. 1808-1816 - Yanyan Zhuang, Jianping Pan

:
A geometrical probability approach to location-critical network performance metrics. 1817-1825 - Yuedong Xu, Eitan Altman, Rachid El Azouzi

, Majed Haddad, Salah-Eddine Elayoubi, Tania Jiménez:
Probabilistic analysis of buffer starvation in Markovian queues. 1826-1834 - Khuong Vu, Rong Zheng:

Geometric algorithms for target localization and tracking under location uncertainties in wireless sensor networks. 1835-1843 - Zi Li, Yang Peng, Daji Qiao, Wensheng Zhang:

LBA: Lifetime balanced data aggregation in low duty cycle sensor networks. 1844-1852 - Wenping Liu, Dan Wang

, Hongbo Jiang, Wenyu Liu
, Chonggang Wang:
Approximate convex decomposition based localization in wireless sensor networks. 1853-1861 - Zichong Chen, Guillermo Barrenetxea, Martin Vetterli:

Share risk and energy: Sampling and communication strategies for multi-camera wireless monitoring networks. 1862-1870 - Meng Wang, Weiyu Xu, Enrique Mallada

, Ao Tang:
Sparse recovery with graph constraints: Fundamental limits and measurement construction. 1871-1879 - Ori Rottenstreich, Yossi Kanizo, Isaac Keslassy

:
The Variable-Increment Counting Bloom Filter. 1880-1888 - Erez Tsidon, Iddo Hanniel, Isaac Keslassy

:
Estimators also need shared values to grow together. 1889-1897 - Oguzhan Erdem, Hoang Le, Viktor K. Prasanna:

Hierarchical hybrid search structure for high performance packet classification. 1898-1906 - Changcun Ma, Deying Li, Hongwei Du, Huan Ma, Yuexuan Wang, Wonjun Lee:

Energy efficient broadcast in multiradio multichannel wireless networks. 1907-1915 - Xiang Sheng, Jian Tang, Weiyi Zhang:

Energy-efficient collaborative sensing with mobile phones. 1916-1924 - Jindou Fan, Chengchen Hu, Keqiang He, Junchen Jiang, Bin Liu:

Reducing power of traffic manager in routers via dynamic on/off-chip scheduling. 1925-1933 - Canming Jiang, Yi Shi

, Y. Thomas Hou
, Wenjing Lou:
Cherish every joule: Maximizing throughput with an eye on network-wide energy consumption. 1934-1941 - Zimu Liu, Yuan Feng, Baochun Li:

Socialize spontaneously with mobile applications. 1942-1950 - Wei Wei, Fengyuan Xu, Chiu C. Tan, Qun Li

:
SybilDefender: Defend against sybil attacks in large social networks. 1951-1959 - Kate Ching-Ju Lin, Chun-Wei Chen, Cheng-Fu Chou:

Preference-aware content dissemination in opportunistic mobile social networks. 1960-1968 - Rui Zhang, Yanchao Zhang, Jinyuan Sun, Guanhua Yan:

Fine-grained private matching for proximity-based mobile social networking. 1969-1977 - Cheng-Hung Lin, Chen-Hsiung Liu, Shih-Chieh Chang

, Wing-Kai Hon
:
Memory-efficient pattern matching architectures using perfect hashing on graphic processing units. 1978-1986 - Anat Bremler-Barr, Shimrit Tzur-David, David Hay, Yaron Koral:

Decompression-free inspection: DPI for shared dictionary compression over HTTP. 1987-1995 - Yu Wang, Dingbang Xu, Xiao He, Chao Zhang, Fan Li, Bin Xu:

L2P2: Location-aware location privacy protection for location-based services. 1996-2004 - Fabio Soldo, Ahmed Metwally:

Traffic anomaly detection based on the IP size distribution. 2005-2013 - Donglin Hu, Shiwen Mao:

Cooperative relay with interference alignment for video over cognitive radio networks. 2014-2022 - Diep N. Nguyen

, Marwan Krunz:
Spectrum management and power allocation in MIMO cognitive networks. 2023-2031 - Jing Zhao, Guohong Cao:

Robust topology control in multi-hop cognitive radio networks. 2032-2040 - Haiming Jin, Gaofei Sun, Xinbing Wang, Qian Zhang

:
Spectrum trading with insurance in cognitive radio networks. 2041-2049 - Corentin Briat

, Emre A. Yavuz, Gunnar Karlsson
:
A conservation-law-based modular fluid-flow model for network congestion modeling. 2050-2058 - Juan Antonio Cordero, Philippe Jacquet, Emmanuel Baccelli

:
Impact of jitter-based techniques on flooding over wireless ad hoc networks: Model and analysis. 2059-2067 - Javad Ghaderi, R. Srikant:

Effect of access probabilities on the delay performance of Q-CSMA algorithms. 2068-2076 - Derek Leonard, Zhongmei Yao

, Xiaoming Wang, Dmitri Loguinov:
Stochastic analysis of horizontal IP scanning. 2077-2085 - Hongbo Jiang, Tianlong Yu, Chen Tian, Guang Tan, Chonggang Wang:

CONSEL: Connectivity-based segmentation in large-scale 2D/3D sensor networks. 2086-2094 - Sen Yang, Xinbing Wang, Luoyi Fu:

On the topology of wireless sensor networks. 2095-2103 - Yin Wang, Yuan He, XuFei Mao, Yunhao Liu, Zhiyu Huang, Xiang-Yang Li:

Exploiting constructive interference for scalable flooding in wireless networks. 2104-2112 - Shouling Ji, Zhipeng Cai:

Distributed data collection and its capacity in asynchronous wireless sensor networks. 2113-2121 - Stefano Vissicchio, Luca Cittadini, Laurent Vanbever, Olivier Bonaventure:

iBGP deceptions: More sessions, fewer routes. 2122-2130 - Xiaohua Tian, Yu Cheng

:
Loop mitigation in bloom filter based multicast: A destination-oriented approach. 2131-2139 - Yu Zhang, Mihaela van der Schaar:

Reputation-based incentive protocols in crowdsourcing applications. 2140-2148 - In Keun Son, Shiwen Mao, Michelle X. Gong, Yihan Li:

On frame-based scheduling for directional mmWave WPANs. 2149-2157 - Hao Yue

, Chi Zhang, Miao Pan, Yuguang Fang
, Shigang Chen:
A time-efficient information collection protocol for large-scale RFID systems. 2158-2166 - Yuan Li, Chen Yuan

, Haibin Kan:
Novel constructions of complex orthogonal designs for space-time block codes. 2167-2173 - Tao Li, Wen Luo, Zhen Mo, Shigang Chen:

Privacy-preserving RFID authentication based on cryptographical encoding. 2174-2182 - Weiping Zhu, Jiannong Cao

, Yi Xu, Lei Yang, Junjun Kong:
Fault-tolerant RFID reader localization based on passive RFID tags. 2183-2191 - Yibei Ling, Scott Alexander, Richard Lau:

On quantification of anchor placement. 2192-2200 - Dian Zhang, Yunhuai Liu, Xiaonan Guo, Min Gao, Lionel M. Ni:

On distinguishing the multiple radio paths in RSS-based ranging. 2201-2209 - Kaishun Wu

, Jiang Xiao, Youwen Yi, Min Gao, Lionel M. Ni:
FILA: Fine-grained indoor localization. 2210-2218 - Zhongli Liu, Yinjie Chen, Benyuan Liu, Chengyu Cao, Xinwen Fu

:
HAWK: An unmanned mini helicopter-based aerial wireless kit for localization. 2219-2227 - Xinxin Zhao, Lingjun Li, Guoliang Xue, Gabriel Silva:

Efficient anonymous message submission. 2228-2236 - Murali S. Kodialam, T. V. Lakshman, Sarit Mukherjee:

Effective ad targeting with concealed profiles. 2237-2245 - Fan Zhang, Li He

, Wenbo He
, Xue Liu:
Data perturbation with state-dependent noise for participatory sensing. 2246-2254 - Mohammad Ashiqur Rahman

, Padmalochan Bera, Ehab Al-Shaer:
SmartAnalyzer: A noninvasive security threat analyzer for AMI smart grid. 2255-2263 - Shaowei Wang, Zhi-Hua Zhou, Mengyao Ge, Chonggang Wang:

Resource allocation for heterogeneous multiuser OFDM-based cognitive radio networks with imperfect spectrum sensing. 2264-2272 - Yi Song, Jiang Xie:

A distributed broadcast protocol in multi-hop cognitive radio ad hoc networks without a common control channel. 2273-2281 - Mo Dong, Gaofei Sun, Xinbing Wang, Qian Zhang

:
Combinatorial auction with time-frequency flexibility in cognitive radio networks. 2282-2290 - Xiang-Yang Li, Panlong Yang, Yubo Yan, Lizhao You

, Shaojie Tang, Qiuyuan Huang:
Almost optimal accessing of nonstochastic channels in cognitive radio networks. 2291-2299 - Majed Alresaini, Maheswaran Sathiamoorthy, Bhaskar Krishnamachari, Michael J. Neely:

Backpressure with Adaptive Redundancy (BWAR). 2300-2308 - Bruno Nardelli, Edward W. Knightly:

Closed-form throughput expressions for CSMA networks with collisions and hidden terminals. 2309-2317 - Mihalis G. Markakis

, Eytan H. Modiano, John N. Tsitsiklis:
Max-weight scheduling in networks with heavy-tailed traffic. 2318-2326 - Virag Shah, Gustavo de Veciana, George Kesidis:

Learning to route queries in unstructured P2P networks: Achieving throughput optimality subject to query resolution constraints. 2327-2335 - Reuven Cohen, Ilia Nudelman, Gleb Polevoy:

On the admission of dependent flows in powerful sensor networks. 2336-2344 - Miao Jin, Guodong Rong

, Hongyi Wu, Liang Shuai, Xiaohu Guo:
Optimal surface deployment problem in wireless sensor networks. 2345-2353 - Benjamin Gaudette, Vinay Hanumaiah, Sarma B. K. Vrudhula, Marwan Krunz:

Optimal range assignment in solar powered active wireless sensor networks. 2354-2362 - Ting Zhu, Abedelaziz Mohaisen

, Yi Ping, Don Towsley
:
DEOS: Dynamic energy-oriented scheduling for sustainable wireless sensor networks. 2363-2371 - Daniele Riboni

, Antonio Villani, Domenico Vitali, Claudio Bettini
, Luigi V. Mancini
:
Obfuscation of sensitive data in network flows. 2372-2380 - Zhen Ling, Junzhou Luo, Wei Yu

, Ming Yang, Xinwen Fu
:
Extensive analysis and large-scale empirical evaluation of tor bridge discovery. 2381-2389 - Zhen Ling, Junzhou Luo, Yang Zhang, Ming Yang, Xinwen Fu

, Wei Yu
:
A novel network delay based side-channel attack: Modeling and defense. 2390-2398 - Khuong Vu, Rong Zheng, Jie Gao:

Efficient algorithms for K-anonymous location privacy in participatory sensing. 2399-2407 - Sheng Zhang, Zhuzhong Qian, Jie Wu, Sanglu Lu:

An Opportunistic Resource Sharing and Topology-Aware mapping framework for virtual networks. 2408-2416 - Sara Oueslati, James Roberts, Nada Sbihi:

Flow-aware traffic control for a content-centric network. 2417-2425 - Mengjun Xie

, Indra Widjaja, Haining Wang:
Enhancing cache robustness for content-centric networking. 2426-2434 - Layong Luo, Gaogang Xie, Yingke Xie, Laurent Mathy, Kavé Salamatian

:
A hybrid IP lookup architecture with fast updates. 2435-2443 - Jie Dai, Zhan Hu, Bo Li, Jiangchuan Liu, Baochun Li:

Collaborative hierarchical caching with dynamic request routing for massive content distribution. 2444-2452 - Gideon Blocq, Ariel Orda:

How good is bargained routing? 2453-2461 - Lei Rao, Qixin Wang

, Xue Liu, Yufei Wang:
Analysis of TDMA crossbar real-time switch design for AFDX networks. 2462-2470 - Luigi Rizzo

, Marta Carbone, Gaetano Catalli:
Transparent acceleration of software packet forwarding using netmap. 2471-2479 - Patricio A. Galdames

, Ying Cai:
Efficient processing of location-cloaked queries. 2480-2488 - Jia Liu, Hanif D. Sherali:

A distributed Newton's method for joint multi-hop routing and flow control: Theory and algorithm. 2489-2497 - Yunghsiang S. Han, Rong Zheng, Wai Ho Mow

:
Exact regenerating codes for Byzantine fault tolerance in distributed storage. 2498-2506 - Arun Natarajan, Peng Ning, Yao Liu, Sushil Jajodia

, Steve E. Hutchinson:
NSDMiner: Automated discovery of Network Service Dependencies. 2507-2515 - Chia-Wei Chang, Han Liu, Guanyao Huang, Bill Lin, Chen-Nee Chuah

:
Distributed measurement-aware routing: Striking a balance between measurement and traffic engineering. 2516-2520 - Vijay Kumar Adhikari, Sourabh Jain, Yingying Chen, Zhi-Li Zhang:

Vivisecting YouTube: An active measurement study. 2521-2525 - Tao Li, Shigang Chen, Yan Qiao:

Origin-destination flow measurement in high-speed networks. 2526-2530 - Ye Tian

, Ratan Dey, Yong Liu
, Keith W. Ross:
China's Internet: Topology mapping and geolocating. 2531-2535 - Diana Joumblatt, Oana Goga, Renata Teixeira, Jaideep Chandrashekar, Nina Taft:

Characterizing end-host application performance across multiple networking environments. 2536-2540 - Guowu Xie, Marios Iliofotou, Ram Keralapura, Michalis Faloutsos

, Antonio Nucci:
SubFlow: Towards practical flow-level traffic classification. 2541-2545 - Haiyong Xie, Guangyu Shi, Pengwei Wang:

TECC: Towards collaborative in-network caching guided by traffic engineering. 2546-2550 - Stephen D. Strowes

, Colin Perkins
:
Harnessing Internet topological stability in Thorup-Zwick compact routing. 2551-2555 - João L. Sobrinho

, Franck Le:
A fresh look at inter-domain route aggregation. 2556-2560 - Rihua Wei, Yang Xu

, H. Jonathan Chao:
Block permutations in Boolean Space to minimize TCAM for packet classification. 2561-2565 - Amir Nahir, Ariel Orda, Danny Raz:

Workload factoring with the cloud: A game-theoretic perspective. 2566-2570 - Xuanjia Qiu, Hongxing Li, Chuan Wu

, Zongpeng Li, Francis C. M. Lau:
Cost-minimizing dynamic migration of content distribution services into hybrid clouds. 2571-2575 - Yan Zhu

, Hongxin Hu, Gail-Joon Ahn
, Dijiang Huang
, Shan-Biao Wang:
Towards temporal access control in cloud computing. 2576-2580 - Qin Liu, Chiu C. Tan, Jie Wu, Guojun Wang:

Efficient information retrieval for ranked queries in cost-effective cloud environments. 2581-2585 - Jian Tan, Xiaoqiao Meng, Li Zhang:

Performance analysis of Coupling Scheduler for MapReduce/Hadoop. 2586-2590 - Tung-Wei Kuo, Ming-Jer Tsai:

On the construction of data aggregation tree with minimum energy cost in wireless sensor networks: NP-completeness and approximation algorithms. 2591-2595 - Haitao Zhang, Shaojie Tang, Xiang-Yang Li, Huadong Ma:

Tracking and identifying burglar using collaborative sensor-camera networks. 2596-2600 - Liang Liu, Xi Zhang, Huadong Ma:

Optimal density estimation for exposure-path prevention in wireless sensor networks using percolation theory. 2601-2605 - Dawei Pan, Yi Yuan, Dan Wang

, XiaoHua Xu, Yu Peng, Xiyuan Peng, Peng-Jun Wan:
Thermal Inertia: Towards an energy conservation room management system. 2606-2610 - Daphney-Stavroula Zois

, Marco Levorato, Urbashi Mitra:
A POMDP framework for heterogeneous sensor selection in wireless body area networks. 2611-2615 - Wei Wei, Fengyuan Xu, Qun Li

:
MobiShare: Flexible privacy-preserving location sharing in mobile online social networks. 2616-2620 - Shraboni Jana, Kai Zeng, Prasant Mohapatra:

Trusted collaborative spectrum sensing for mobile cognitive radio networks. 2621-2625 - Dong-Hoon Shin, Saurabh Bagchi, Chih-Chun Wang:

Distributed online channel assignment toward optimal monitoring in multi-channel wireless networks. 2626-2630 - Matthew Knysz, Xin Hu, Yuanyuan Zeng, Kang G. Shin:

Open WiFi networks: Lethal weapons for botnets? 2631-2635 - Yao Liu, Peng Ning:

Enhanced wireless channel authentication using time-synched link signature. 2636-2640 - Nianbo Liu, Ming Liu, Guihai Chen

, Jiannong Cao
:
The sharing at roadside: Vehicular content distribution using parked vehicles. 2641-2645 - Maheswaran Sathiamoorthy, Alexandros G. Dimakis, Bhaskar Krishnamachari, Fan Bai:

Distributed storage codes reduce latency in vehicular networks. 2646-2650 - Merkourios Karaliopoulos, Christian Rohner:

Trace-based performance analysis of opportunistic forwarding under imperfect node cooperation. 2651-2655 - Yung-Chih Chen, Jim Kurose, Don Towsley

:
A mixed queueing network model of mobility in a campus wireless network. 2656-2660 - Xuemei Liu, Yanmin Zhu, Minglu Li, Qian Zhang

:
POVA: Traffic light sensing with probe vehicles. 2661-2665 - Huijiang Li, Neeraj Jaggi, Biplab Sikdar

:
An analytical approach towards cooperative relay scheduling under partial state information. 2666-2670 - Miloud Bagaa

, Abdelouahid Derhab, Noureddine Lasla
, Abdelraouf Ouadjaout
, Nadjib Badache:
Semi-structured and unstructured data aggregation scheduling in wireless sensor networks. 2671-2675 - Shaojie Tang, Lei Yang:

Morello: A quality-of-monitoring oriented sensing scheduling protocol in Sensor Networks. 2676-2680 - Xiaokang Yu, Xiaotian Yin, Wei Han, Jie Gao, Xianfeng Gu

:
Scalable routing in 3D high genus sensor networks using graph embedding. 2681-2685 - Qiang Liu, Xin Wang, Nageswara S. V. Rao

:
Fusion of state estimates over long-haul sensor networks under random delay and loss. 2686-2690 - Yaqin Zhou, Xiang-Yang Li, Min Liu, Zhongcheng Li, Shaojie Tang, XuFei Mao, Qiuyuan Huang:

Distributed link scheduling for throughput maximization under physical interference model. 2691-2695 - Javad Ghaderi, Tianxiong Ji, R. Srikant:

Connection-level scheduling in wireless networks using only MAC-layer information. 2696-2700 - Peng Zhao, Xinyu Yang, Jiayin Wang, Benyuan Liu, Jie Wang:

BOR/AC: Bandwidth-aware opportunistic routing with admission control in wireless mesh networks. 2701-2705 - Rafael P. Laufer, Pedro B. Velloso

, Luiz Filipe M. Vieira, Leonard Kleinrock:
PLASMA: A new routing paradigm for wireless multihop networks. 2706-2710 - Edith C. H. Ngai, Mani B. Srivastava

, Jiangchuan Liu:
Context-aware sensor data dissemination for mobile users in remote areas. 2711-2715 - Yonggang Wen, Weiwen Zhang, Haiyun Luo:

Energy-optimal mobile application execution: Taming resource-poor mobile devices with cloud clones. 2716-2720 - Karthik Thirugnanam, Bhojan Anand

, Jeena Sebastian, Pravein G. Kannan
, Akkihebbal L. Ananda, Rajesh Krishna Balan, Mun Choon Chan:
Dynamic lookahead mechanism for conserving power in multi-player mobile games. 2721-2725 - Jialin He, Hui Liu, Pengfei Cui, Jonathan Landon, Onur Altintas, Rama Vuyyuru, Dinesh Rajan, Joseph David Camp

:
Design and experimental evaluation of context-aware link-level adaptation. 2726-2730 - Sanjit Krishnan Kaul, Roy D. Yates, Marco Gruteser:

Real-time status: How often should one update? 2731-2735 - Sebastian Neumayer, Alon Efrat

, Eytan H. Modiano:
Geographic max-flow and min-cut under a circular disk failure model. 2736-2740 - Yang Liu, Wenji Chen, Yong Guan:

A fast sketch for aggregate queries over high-speed network traffic. 2741-2745 - Mohamad Jaber, Roberto G. Cascella, Chadi Barakat

:
Using host profiling to refine statistical application identification. 2746-2750 - Josep Sanjuàs-Cuxart, Pere Barlet-Ros

, Nick G. Duffield
, Ramana Rao Kompella:
Cuckoo sampling: Robust collection of flow aggregates under a fixed memory budget. 2751-2755 - He Yan, Ashley Flavel, Zihui Ge, Alexandre Gerber, Daniel Massey, Christos Papadopoulos, Hiren Shah, Jennifer Yates:

Argus: End-to-end service anomaly detection and localization from an ISP's point of view. 2756-2760 - Yanjiao Chen, Jin Zhang, Qian Zhang

, Juncheng Jia:
A reverse auction framework for access permission transaction to promote hybrid access in femtocell network. 2761-2765 - Mohammad Hadi Afrasiabi, Roch Guérin:

Pricing strategies for user-provided connectivity services. 2766-2770 - Eitan Altman, Dieter Fiems, Majed Haddad, Julien Gaillard:

Semi-dynamic Hawk and Dove game, applied to power control. 2771-2775 - Honggang Zhang, Sudarshan Vasudevan:

Design and analysis of a choking strategy for coalitions in data swarming systems. 2776-2780 - Swastik Brahma, Mainak Chatterjee:

A bayesian based incentive-compatible routing mechanism for Dynamic Spectrum Access networks. 2781-2785 - Zixia Huang, Klara Nahrstedt:

Perception-based playout scheduling for high-quality real-time interactive multimedia. 2786-2790 - Huan Huang, Bo Zhang

, S.-H. Gary Chan
, Gene Cheung, Pascal Frossard:
Coding and replication co-design for interactive multiview video streaming. 2791-2795 - Joerg Widmer

, Andrea Capalbo, Antonio Fernández Anta, Albert Banchs:
Rate allocation for layered multicast streaming with inter-layer network coding. 2796-2800 - Dimitris S. Papailiopoulos, Jianqiang Luo, Alexandros G. Dimakis, Cheng Huang, Jin Li:

Simple regenerating codes: Network coding for cloud storage. 2801-2805 - Sujogya Banerjee, Shahrzad Shirazipourazad, Arunabha Sen:

On region-based fault tolerant design of distributed file storage in networks. 2806-2810 - Haifeng Zheng, Shilin Xiao, Xinbing Wang, Xiaohua Tian:

Energy and latency analysis for in-network computation with compressive sensing in wireless sensor networks. 2811-2815 - Kyuho Son, Bhaskar Krishnamachari:

SpeedBalance: Speed-scaling-aware optimal load balancing for green cellular networks. 2816-2820 - Ning Ding, Abhinav Pathak, Dimitrios Koutsonikolas, Clayton Shepard, Y. Charlie Hu, Lin Zhong:

Realizing the full potential of PSM using proxying. 2821-2825 - Murat Kocaoglu

, Özgür B. Akan:
Minimum energy coding for wireless nanosensor networks. 2826-2830 - Andrea Francini:

Selection of a rate adaptation scheme for network hardware. 2831-2835 - Ratan Dey, Cong Tang, Keith W. Ross, Nitesh Saxena:

Estimating age privacy leakage in online social networks. 2836-2840 - Tom Callahan, Mark Allman, Michael Rabinovich

:
Pssst, over here: Communicating without fixed infrastructure. 2841-2845 - Seungwon Shin, Zhaoyan Xu, Guofei Gu:

EFFORT: Efficient and effective bot malware detection. 2846-2850 - Shui Yu

, Song Guo
, Ivan Stojmenovic:
Can we beat legitimate cyber behavior mimicking attacks from botnets? 2851-2855 - Marc Lelarge:

Coordination in network security games. 2856-2860 - David Breitgand

, Amir Epstein:
Improving consolidation of virtual machines with risk-aware bandwidth oversubscription in compute clouds. 2861-2865 - Muhammad Saqib Ilyas, Saqib Raza, Chao-Chih Chen, Zartash Afzal Uzmi

, Chen-Nee Chuah
:
RED-BL: Energy solution for loading data centers. 2866-2870 - Ting He, Shiyao Chen, Hyoil Kim, Lang Tong, Kang-Won Lee:

To migrate or to wait: Bandwidth-latency tradeoff in opportunistic scheduling of parallel tasks. 2871-2875 - Joe Wenjie Jiang, Tian Lan, Sangtae Ha, Minghua Chen

, Mung Chiang:
Joint VM placement and routing for data center traffic engineering. 2876-2880 - Dan Xu, Xin Liu:

Geographic trough filling for internet datacenters. 2881-2885 - Ze Li, Haiying Shen, Hailang Wang, Guoxin Liu, Jin Li:

SocialTube: P2P-assisted video sharing in online social networks. 2886-2890 - Haiyang Wang, Feng Wang, Jiangchuan Liu:

Accelerating peer-to-peer file sharing with social relations: Potentials and challenges. 2891-2895 - Lan Zhang, Xiang-Yang Li, Yunhao Liu, Qiuyuan Huang, Shaojie Tang:

Mechanism design for finding experts using locally constructed social referral web. 2896-2900 - Zhi Wang, Lifeng Sun, Chuan Wu

, Shiqiang Yang:
Guiding internet-scale video service deployment using microblog-based prediction. 2901-2905 - Atish Das Sarma, Anisur Rahaman Molla, Gopal Pandurangan

:
Near-optimal random walk sampling in distributed networks. 2906-2910 - Yuan Le, Liran Ma

, Wei Cheng, Xiuzhen Cheng, Biao Chen:
Maximizing throughput when achieving time fairness in multi-rate wireless LANs. 2911-2915 - Pirmin Heinzer, Vincent Lenders

, Franck Legendre:
Fast and accurate packet delivery estimation based on DSSS chip errors. 2916-2920 - Yang Liu, Mingyan Liu, Jing Deng:

Is diversity gain worth the pain: A delay comparison between opportunistic multi-channel MAC and single-channel MAC. 2921-2925 - Wenxian Li, Yanmin Zhu, Tian He:

WiBee: Building WiFi radio map with ZigBee sensor networks. 2926-2930 - Pablo Salvador, Francesco Gringoli

, Vincenzo Mancuso
, Pablo Serrano
, Andrea Mannocci
, Albert Banchs:
VoIPiggy: Implementation and evaluation of a mechanism to boost voice capacity in 802.11WLANs. 2931-2935 - Honghai Zhang, Narayan Prasad, Sampath Rangarajan:

MIMO downlink scheduling in LTE systems. 2936-2940 - Tae Hyun Kim, Theodoros Salonidis, Henrik Lundgren:

MIMO wireless networks with directional antennas in indoor environments. 2941-2945 - Richard Combes, Zwi Altman, Eitan Altman:

Self-organization in wireless networks: A flow-level perspective. 2946-2950 - Jia Liu, Qian Chen, Hanif D. Sherali:

Algorithm design for femtocell base station placement in commercial building environments. 2951-2955 - Mustafa Y. Arslan, Jongwon Yoon

, Karthikeyan Sundaresan, Srikanth V. Krishnamurthy
, Suman Banerjee:
Experimental characterization of interference in OFDMA femtocell networks. 2956-2960 - Wanchun Jiang, Fengyuan Ren, Chuang Lin, Ivan Stojmenovic:

Analysis of backward congestion notification with delay for enhanced ethernet networks. 2961-2965 - Ching-Ming Lien, Shu-Hao Chang

, Cheng-Shang Chang, Duan-Shin Lee:
Anchored desynchronization. 2966-2970 - Jelena Pesic, Julien Meuric, Esther Le Rouzic, Laurent Dupont, Michel Morvan:

Proactive failure detection for WDM carrying IP. 2971-2975 - Chih-Ping Li, Michael J. Neely:

Delay and rate-optimal control in a multi-class priority queue with adjustable service rates. 2976-2980 - Feng Lu, Geoffrey M. Voelker, Alex C. Snoeren:

Weighted fair queuing with differential dropping. 2981-2985 - László Toka, Pasquale Cataldi, Matteo Dell'Amico

, Pietro Michiardi:
Redundancy management for P2P backup. 2986-2990 - Zhongmei Yao, Daren B. H. Cline, Dmitri Loguinov:

On superposition of heterogeneous edge processes in dynamic random graphs. 2991-2995 - Ziyu Shao, Hao Zhang, Minghua Chen

, Kannan Ramchandran:
Reverse-engineering BitTorrent: A Markov approximation perspective. 2996-3000 - Delia Ciullo, Valentina Martina, Michele Garetto

, Emilio Leonardi
, Giovanni Luca Torrisi:
Performance analysis of non-stationary peer-assisted VoD systems. 3001-3005 - Srinivasan Venkatramanan, Anurag Kumar

:
Co-evolution of content popularity and delivery in mobile P2P networks. 3006-3010 - Xiao Lin Liu, Chong Luo, Wenjun Hu, Feng Wu:

Compressive broadcast in MIMO systems with receive antenna heterogeneity. 3011-3015 - Shan Zhou, Xinzhou Wu, Lei Ying

:
Distributed power control and coding-modulation adaptation in wireless networks using annealed Gibbs sampling. 3016-3020 - Sastry Kompella

, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides:
Impact of channel state information on the stability of cognitive shared channels. 3021-3025 - Bin Li

, Atilla Eryilmaz:
Distributed channel probing for efficient transmission scheduling over wireless fading channels. 3026-3030 - Devu Manikantan Shila, Yu Cheng

:
Ad hoc wireless networks meet the infrastructure: Mobility, capacity and delay. 3031-3035 - Anas Basalamah, Song Min Kim, Shuo Guo, Tian He, Yoshito Tobe:

Link correlation aware opportunistic routing. 3036-3040 - Yoora Kim, Kyunghan Lee

, Ness B. Shroff, Injong Rhee:
Revisiting delay-capacity tradeoffs for mobile networks: The delay is overestimated. 3041-3045 - Guohua Li, Jianzhong Li, Bo Yu:

Lower bound of weighted fairness guaranteed congestion control protocol for WSNs. 3046-3050 - Jinbei Zhang, Luoyi Fu, Xinbing Wang:

Impact of secrecy on capacity in large-scale wireless networks. 3051-3055 - XiaoHua Xu, Qian Wang

, Jiannong Cao
, Peng-Jun Wan, Kui Ren
, Yuanfang Chen:
Locating malicious nodes for data aggregation in wireless networks. 3056-3060 - Sangho Oh, Tam Vu, Marco Gruteser, Suman Banerjee:

Phantom: Physical layer cooperation for location privacy protection. 3061-3065 - Zhuo Lu, Wenye Wang

, Cliff Wang:
Hiding traffic with camouflage: Minimizing message delay in the smart grid under jamming. 3066-3070 - Yun Li, Jian Li, Jian Ren, Jie Wu:

Providing hop-by-hop authentication and source privacy in wireless sensor networks. 3071-3075 - Xiaojun Feng, Yanjiao Chen, Jin Zhang, Qian Zhang

, Bo Li:
TAHES: Truthful double Auction for Heterogeneous Spectrums. 3076-3080 - Bowen Li, Panlong Yang, Xiang-Yang Li, Shaojie Tang, Yunhao Liu, Qihui Wu:

Almost optimal dynamically-ordered multi-channel accessing for cognitive networks. 3081-3085 - Wenhan Dai, Yi Gai, Bhaskar Krishnamachari:

Efficient online learning for opportunistic spectrum access. 3086-3090 - Shimin Gong, Ping Wang, Jianwei Huang:

Robust threshold design for cooperative sensing in cognitive radio networks. 3091-3095 - Bin Cao, Lin X. Cai, Hao Liang, Jon W. Mark, Qinyu Zhang

, H. Vincent Poor
, Weihua Zhuang
:
Cooperative cognitive radio networking using quadrature signaling. 3096-3100

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














