


default search action
IEEE/ACM Transactions on Networking, Volume 24
Volume 24, Number 1, February 2016
- Reza Abdolee, Benoît Champagne:
Diffusion LMS Strategies in Sensor Networks With Noisy Input Data. 3-14 - Nikolaos Chrysos, Lydia Y. Chen, Christoforos Kachris, Manolis Katevenis:
Discharging the Network From Its Flow Control Headaches: Packet Drops and HOL Blocking. 15-28 - Emir Kavurmacioglu, Murat Alanyali, David Starobinski:
Competition in Private Commons: Price War or Market Sharing? 29-42 - Hongyu Gao, Vinod Yegneswaran, Jian Jiang, Yan Chen, Phillip A. Porras, Shalini Ghosh, Hai-Xin Duan:
Reexamining DNS From a Global Recursive Resolver Perspective. 43-57 - Can Zhao, Xiaojun Lin
, Chuan Wu
:
The Streaming Capacity of Sparsely Connected P2P Systems With Distributed Control. 58-71 - Xiaohan Kang, Weina Wang, Juan José Jaramillo
, Lei Ying:
On the Performance of Largest-Deficit-First for Scheduling Real-Time Traffic in Wireless Networks. 72-84 - Chih-Yu Wang, Chun-Han Ko, Hung-Yu Wei, Athanasios V. Vasilakos
:
A Voting-Based Femtocell Downlink Cell-Breathing Control Mechanism. 85-98 - Lei Jiao
, Jun Li, Tianyin Xu, Wei Du, Xiaoming Fu
:
Optimizing Cost for Online Social Networks on Geo-Distributed Clouds. 99-112 - Mohamed Kashef, Anthony Ephremides:
Optimal Partial Relaying for Energy-Harvesting Wireless Networks. 113-122 - Ted H. Szymanski
:
An Ultra-Low-Latency Guaranteed-Rate Internet for Cloud Services. 123-136 - Eunice Adjarath Lemamou, Philippe Galinier, Steven Chamberland:
A Hybrid Iterated Local Search Algorithm for the Global Planning Problem of Survivable 4G Wireless Networks. 137-148 - Gábor Rétvári, János Tapolcai
, Attila Korösi, András Majdán, Zalán Heszberger:
Compressing IP Forwarding Tables: Towards Entropy Bounds and Beyond. 149-162 - Parinaz Naghizadeh
, Mingyan Liu:
Perceptions and Truth: A Mechanism Design Approach to Crowd-Sourcing Reputation. 163-176 - Zhoujia Mao, Can Emre Koksal, Ness B. Shroff:
Optimal Online Scheduling With Arbitrary Hard Deadlines in Multihop Communication Networks. 177-189 - Weina Wang, Kai Zhu, Lei Ying
, Jian Tan, Li Zhang:
MapTask Scheduling in MapReduce With Data Locality: Throughput and Heavy-Traffic Optimality. 190-203 - Hussein Al-Zubaidy, Jörg Liebeherr, Almut Burchard:
Network-Layer Performance Analysis of Multihop Fading Channels. 204-217 - Marcin Bienkowski
, Leszek Gasieniec, Marek Klonowski, Miroslaw Korzeniowski, Bernard Mans
, Stefan Schmid
, Roger Wattenhofer:
Distributed Alarming in the On-Duty and Off-Duty Models. 218-230 - Chen Qian, Simon S. Lam:
A Scalable and Resilient Layer-2 Network With Ethernet Compatibility. 231-244 - Eleni Stai, Symeon Papavassiliou, John S. Baras:
Performance-Aware Cross-Layer Design in Wireless Multihop Networks Via a Weighted Backpressure Approach. 245-258 - Xiaowen Gong, Junshan Zhang, Douglas Cochran, Kai Xing:
Optimal Placement for Barrier Coverage in Bistatic Radar Sensor Networks. 259-271 - Feng Wang, Jiangchuan Liu, Minghua Chen, Haiyang Wang:
Migration Towards Cloud-Assisted Live Media Streaming. 272-282 - Soheil Eshghi
, M. H. R. Khouzani, Saswati Sarkar, Santosh S. Venkatesh:
Optimal Patching in Clustered Malware Epidemics. 283-298 - Giusi Alfano, Michele Garetto
, Emilio Leonardi
:
Content-Centric Wireless Networks With Limited Buffers: When Mobility Hurts. 299-311 - Ziling Zhou, Binbin Chen
, Haifeng Yu:
Understanding RFID Counting Protocols. 312-327 - Guang Tan, Zhimeng Yin, Hongbo Jiang:
Trap Array: A Unified Model for Scalability Evaluation of Geometric Routing. 328-341 - Jeremy M. Plante, Arush Gadkar, Vinod M. Vokkarane
:
Manycast Overlay in Split-Incapable Networks for Supporting Bandwidth-Intensive Applications. 342-354 - Robert Margolies
, Ashwin Sridharan, Vaneet Aggarwal
, Rittwik Jana, N. K. Shankaranarayanan, Vinay A. Vaishampayan
, Gil Zussman:
Exploiting Mobility in Proportional Fair Cellular Scheduling: Measurements and Algorithms. 355-367 - Pedro E. Santacruz
, Vaneet Aggarwal
, Ashutosh Sabharwal:
Leveraging Physical-Layer Capabilites: Distributed Scheduling in Interference Networks With Local Views. 368-382 - Kundan Kandhway, Joy Kuri:
Campaigning in Heterogeneous Social Networks: Optimal Control of SI Information Epidemics. 383-396 - Wen Luo, Yan Qiao, Shigang Chen, Min Chen:
An Efficient Protocol for RFID Multigroup Threshold-Based Classification Based on Sampling and Logical Bitmap. 397-407 - Kai Zhu, Lei Ying
:
Information Source Detection in the SIR Model: A Sample-Path-Based Approach. 408-421 - Chen Chen, Hans-Arno Jacobsen, Roman Vitenberg:
Algorithms Based on Divide and Conquer for Topic-Based Publish/Subscribe Overlay Design. 422-436 - Valentino Pacifici
, Frank Lehrieder, György Dán:
Cache Bandwidth Allocation for P2P File-Sharing Systems to Minimize Inter-ISP Traffic. 437-448 - Qiang Liu, Xin Wang, Nageswara S. V. Rao
, Katharine Brigham, B. V. K. Vijaya Kumar
:
Effect of Retransmission and Retrodiction on Estimation and Fusion in Long-Haul Sensor Networks. 449-461 - Fengyu Gao, Hongyan Qian:
Efficient, Real-World Token Bucket Configuration for Residential Gateways. 462-475 - Sophia Athanasiadou, Marios Gatzianas
, Leonidas Georgiadis, Leandros Tassiulas:
Stable XOR-Based Policies for the Broadcast Erasure Channel With Feedback. 476-491 - Albert Banchs, Jorge Ortín
, Andres Garcia-Saavedra
, Douglas J. Leith
, Pablo Serrano
:
Thwarting Selfish Behavior in 802.11 WLANs. 492-505 - Florin Coras
, Jordi Domingo-Pascual, Darrel Lewis, Albert Cabellos-Aparicio:
An Analytical Model for Loc/ID Mappings Caches. 506-516 - Yi Gao, Wei Dong, Chun Chen, Jiajun Bu, Wenbin Wu, Xue Liu:
iPath: Path Inference in Wireless Sensor Networks. 517-528 - Jayakrishnan Nair, Martin Andreasson, Lachlan L. H. Andrew, Steven H. Low, John C. Doyle:
On Channel Failures, File Fragmentation Policies, and Heavy-Tailed Completion Times. 529-541 - Mohammad Hadi Afrasiabi, Roch Guérin:
Exploring User-Provided Connectivity. 542-554 - Ori Rottenstreich, Isaac Keslassy
, Avinatan Hassidim, Haim Kaplan, Ely Porat:
Optimal In/Out TCAM Encodings of Ranges. 555-568 - Flavio Esposito, Donato Di Paola
, Ibrahim Matta
:
On Distributed Virtual Network Embedding With Guarantees. 569-582 - Xiao-chun Yun, Yipeng Wang, Yongzheng Zhang, Yu Zhou
:
A Semantics-Aware Approach to the Automated Network Protocol Identification. 583-595 - Qiuyu Peng, Anwar Walid, Jaehyun Hwang, Steven H. Low:
Multipath TCP: Analysis, Design, and Implementation. 596-609 - James Daly, Alex X. Liu, Eric Torng:
A Difference Resolution Approach to Compressing Access Control Lists. 610-623 - Ahmed Farhan Hanif, Hamidou Tembine
, Mohamad Assaad, Djamal Zeghlache
:
Mean-Field Games for Resource Sharing in Cloud-Based Networks. 624-637
Volume 24, Number 2, April 2016
- Dong Zhao, Xiang-Yang Li, Huadong Ma:
Budget-Feasible Online Incentive Mechanisms for Crowdsourcing Tasks Truthfully. 647-661 - Daibo Liu, Mengshu Hou
, Zhichao Cao, Jiliang Wang, Yuan He
, Yunhao Liu:
Duplicate Detectable Opportunistic Forwarding in Duty-Cycled Wireless Sensor Networks. 662-673 - Joaquim Oller, Ilker Demirkol
, Jordi Casademont
, Josep Paradells
, Gerd Ulrich Gamm, Leonhard M. Reindl:
Has Time Come to Switch From Duty-Cycled MAC Protocols to Wake-Up Radio for Wireless Sensor Networks? 674-687 - Abhishek Mishra, Parv Venkitasubramaniam
:
Anonymity and Fairness in Packet Scheduling: A Quantitative Tradeoff. 688-702 - Min Chen, Wen Luo, Zhen Mo, Shigang Chen, Yuguang Fang
:
An Efficient Tag Search Protocol in Large-Scale RFID Systems With Noisy Channel. 703-716 - Alireza Shams Shafigh, Beatriz Lorenzo
, Savo Glisic, Jordi Pérez-Romero
, Luiz A. DaSilva, Allen B. MacKenzie
, Juha Röning
:
A Framework for Dynamic Network Architecture and Topology Optimization. 717-730 - Zakaria Al-Qudah, Eamon Johnson, Michael Rabinovich
, Oliver Spatscheck:
Internet With Transient Destination-Controlled Addressing. 731-744 - Zhi Zhang, Yigal Bejerano, Spyridon Antonakopoulos:
Energy-Efficient IP Core Network Configuration Under General Traffic Demands. 745-758 - Michael J. Neely:
Distributed Stochastic Optimization via Correlated Scheduling. 759-772 - Md. Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos
:
Detecting Malicious Facebook Applications. 773-787 - Xudong Wang, Wenguang Mao:
Analog Network Coding Without Restrictions on Superimposed Frames. 788-805 - Tong Meng, Fan Wu, Guihai Chen
:
Code-Based Neighbor Discovery Protocols in Mobile Wireless Networks. 806-819 - Vinay Joseph
, Sem C. Borst, Martin I. Reiman:
Optimal Rate Allocation for Video Streaming in Wireless Networks With User Dynamics. 820-835 - Ramtin Pedarsani, Mohammad Ali Maddah-Ali, Urs Niesen:
Online Coded Caching. 836-845 - Jinsong Han, Chen Qian, Panlong Yang, Dan Ma, Zhiping Jiang, Wei Xi, Jizhong Zhao:
GenePrint: Generic and Accurate Physical-Layer Identification for UHF RFID Tags. 846-858 - Kun Xie, Xin Wang, Jigang Wen, Jiannong Cao
:
Cooperative Routing With Relay Assignment in Multiradio Multihop Wireless Networks. 859-872 - Jian Guo, Fangming Liu, John C. S. Lui, Hai Jin:
Fair Network Bandwidth Allocation in IaaS Datacenters via a Cooperative Game Approach. 873-886 - Hongkun Yang, Simon S. Lam:
Real-Time Verification of Network Properties Using Atomic Predicates. 887-900 - Mustafa Y. Arslan, Karthikeyan Sundaresan, Srikanth V. Krishnamurthy
, Sampath Rangarajan:
iBUS: An Integrated Beamformer and Uplink Scheduler for OFDMA Small Cells. 901-914 - Karthikeyan Sundaresan, Mustafa Y. Arslan, Shailendra Singh, Sampath Rangarajan, Srikanth V. Krishnamurthy
:
FluidNet: A Flexible Cloud-Based Radio Access Network for Small Cells. 915-928 - Huiyuan Zhang, Dung T. Nguyen, Huiling Zhang, My T. Thai:
Least Cost Influence Maximization Across Multiple Social Networks. 929-939 - Chee Wei Tan
:
Optimal Power Control in Rayleigh-Fading Heterogeneous Wireless Networks. 940-953 - Ying Cui, Edmund M. Yeh, Ran Liu:
Enhancing the Delay Performance of Dynamic Backpressure Algorithms. 954-967 - Rihua Wei, Yang Xu
, H. Jonathan Chao:
Finding Nonequivalent Classifiers in Boolean Space to Reduce TCAM Usage. 968-981 - Jayakrishnan Nair, Krishna P. Jagannathan
, Adam Wierman:
When Heavy-Tailed and Light-Tailed Flows Compete: The Response Time Tail Under Generalized Max-Weight Scheduling. 982-995 - Hasti A. Pedersen, Sujit Dey:
Enhancing Mobile Video Capacity and Quality Using Rate Adaptation, RAN Caching and Processing. 996-1010 - Mingchen Zhao, Wenchao Zhou, Alexander J. T. Gurney, Andreas Haeberlen, Micah Sherr, Boon Thau Loo
:
Private and Verifiable Interdomain Routing Decisions. 1011-1024 - Han Cai, Irem Koprulu, Ness B. Shroff:
Exploiting Double Opportunities for Latency-Constrained Content Propagation in Wireless Networks. 1025-1037 - Tao Han, Nirwan Ansari
:
A Traffic Load Balancing Framework for Software-Defined Radio Access Networks Powered by Hybrid Energy Sources. 1038-1051 - Wei Gong, Ivan Stojmenovic, Amiya Nayak
, Kebin Liu, Haoxiang Liu:
Fast and Scalable Counterfeits Estimation for Large-Scale RFID Systems. 1052-1064 - Chandramani Kishore Singh, Anurag Kumar
, Rajesh Sundaresan:
Combined Base Station Association and Power Control in Multichannel Cellular Networks. 1065-1080 - Dong-Hoon Shin, Shibo He, Junshan Zhang:
Robust and Cost-Effective Design of Cyber-Physical Systems: An Optimal Middleware Deployment Approach. 1081-1094 - Sang-Yoon Chang, Yih-Chun Hu, Nicola Laurenti:
SimpleMAC: A Simple Wireless MAC-Layer Countermeasure to Intelligent and Insider Jammers. 1095-1108 - Gaurav Agrawal, Deep Medhi
:
Embedding IP Unique Shortest Path Topology on a Wavelength-Routed Network: Normal and Survivable Design. 1109-1124 - Dao-Yuan Chang, Pi-Chung Wang
:
TCAM-Based Multi-Match Packet Classification Using Multidimensional Rule Layering. 1125-1138 - Xuanyu Cao
, Jinbei Zhang, Luoyi Fu, Weijie Wu, Xinbing Wang:
Optimal Secrecy Capacity-Delay Tradeoff in Large-Scale Mobile Ad Hoc Networks. 1139-1152 - Zhangyu Guan, Tommaso Melodia
, Gesualdo Scutari:
To Transmit or Not to Transmit? Distributed Queueing Games in Infrastructureless Wireless Networks. 1153-1166 - Abhijeet Bhorkar, Mohammad Naghshvar, Tara Javidi
:
Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks. 1167-1180 - Yunus Sarikaya
, Can Emre Koksal, Özgür Erçetin:
Dynamic Network Control for Confidential Multi-Hop Communications. 1181-1195 - Majed Alresaini, Kwame-Lante Wright, Bhaskar Krishnamachari, Michael J. Neely:
Backpressure Delay Enhancement for Encounter-Based Mobile Networks While Sustaining Throughput Optimality. 1196-1208 - Guan-Hua Tu
, Yuanjie Li, Chunyi Peng, Chi-Yu Li
, Songwu Lu:
Detecting Problematic Control-Plane Protocol Interactions in Mobile Networks. 1209-1222 - Ashok Anand, Athula Balachandran, Aditya Akella, Vyas Sekar, Srinivasan Seshan
:
Enhancing Video Accessibility and Availability Using Information-Bound References. 1223-1236 - Andra Lutu, Marcelo Bagnulo
, Cristel Pelsser
, Olaf Maennel
, Jesús Cid-Sueiro
:
The BGP Visibility Toolkit: Detecting Anomalous Internet Routing Behavior. 1237-1250 - Kirill Kogan
, Sergey I. Nikolenko
, Ori Rottenstreich, William Culhane
, Patrick Eugster:
Exploiting Order Independence for Scalable and Expressive Packet Classification. 1251-1264 - Shizhen Zhao, Xiaojun Lin
:
Design of Scheduling Algorithms for End-to-End Backlog Minimization in Wireless Multi-Hop Networks Under K-Hop Interference Models. 1265-1278 - Qingsi Wang, Mingyan Liu:
Learning in Hide-and-Seek. 1279-1292
Volume 24, Number 3, June 2016
- Alex X. Liu, Chad R. Meiners, Eric Torng:
Packet Classification Using Binary Content Addressable Memory. 1295-1307 - M. Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Shobha Venkataraman, Jia Wang:
Characterizing and Optimizing Cellular Network Performance During Crowded Events. 1308-1321 - Soongeol Kwon, Natarajan Gautam:
Time-Stable Performance in Parallel Queues With Non-Homogeneous and Multi-Class Workloads. 1322-1335 - Abishek Gopalan, Srinivasan Ramasubramanian:
IP Fast Rerouting and Disjoint Multipath Routing With Three Edge-Independent Spanning Trees. 1336-1349 - Yi Qin, Xiaohua Tian, Weijie Wu, Xinbing Wang:
Mobility Weakens the Distinction Between Multicast and Unicast. 1350-1363 - Yu Lu
, Mehul Motani
, Wai-Choong Wong
:
A QoE-Aware Resource Distribution Framework Incentivizing Context Sharing and Moderate Competition. 1364-1377 - Richard J. La:
Interdependent Security With Strategic Agents and Cascades of Infection. 1378-1391 - Yi Gao, Wei Dong, Wenbin Wu, Chun Chen, Xiang-Yang Li, Jiajun Bu:
Scalpel: Scalable Preferential Link Tomography Based on Graph Trimming. 1392-1403 - Jia Liu, Ness B. Shroff, Cathy H. Xia, Hanif D. Sherali:
Joint Congestion Control and Routing Optimization: An Efficient Second-Order Distributed Approach. 1404-1420 - Stefan Schmid
, Chen Avin
, Christian Scheideler, Michael Borokhovich, Bernhard Haeupler
, Zvi Lotker:
SplayNet: Towards Locally Self-Adjusting Networks. 1421-1433 - Wei Dai, Scott Jordan:
ISP Service Tier Design. 1434-1447 - Tian Pan
, Ting Zhang, Junxiao Shi
, Yang Li, Linxiao Jin, Fuliang Li, Jiahai Yang, Beichuan Zhang, Xueren Yang, Mingui Zhang, Huichen Dai, Bin Liu:
Towards Zero-Time Wakeup of Line Cards in Power-Aware Routers. 1448-1461 - Kai Han, Chi Zhang, Jun Luo
:
Taming the Uncertainty: Budget Limited Robust Crowdsensing Through Online Learning. 1462-1475 - Changhee Joo, Xiaojun Lin, Jiho Ryu, Ness B. Shroff:
Distributed Greedy Approximation to Maximum Weighted Independent Set for Scheduling With Fading Channels. 1476-1488 - Matti Siekkinen
, Mohammad Ashraful Hoque, Jukka K. Nurminen
:
Using Viewing Statistics to Control Energy and Traffic Overhead in Mobile Video Streaming. 1489-1503 - Huasen Wu, Xiaojun Lin, Xin Liu, Youguang Zhang:
Application-Level Scheduling With Probabilistic Deadline Constraints. 1504-1517 - Rafael P. Laufer, Leonard Kleinrock:
The Capacity of Wireless CSMA/CA Networks. 1518-1532 - Morteza Mardani, Georgios B. Giannakis
:
Estimating Traffic and Anomaly Maps via Network Tomography. 1533-1547 - Yan Qiao, Shigang Chen, Tao Li, Shiping Chen:
Tag-Ordering Polling Protocols in RFID Systems. 1548-1561 - Sachin Kadloor, Negar Kiyavash, Parv Venkitasubramaniam
:
Mitigating Timing Side Channel in Shared Schedulers. 1562-1573 - Pouya Ostovari
, Jie Wu, Abdallah Khreishah
, Ness B. Shroff:
Scalable Video Streaming With Helper Nodes Using Random Linear Network Coding. 1574-1587 - Ahmad Beirami
, Mohsen Sardari, Faramarz Fekri
:
Packet-Level Network Compression: Realization and Scaling of the Network-Wide Benefits. 1588-1604 - Jinsong Han, Chen Qian, Xing Wang, Dan Ma, Jizhong Zhao, Wei Xi, Zhiping Jiang, Zhi Wang:
Twins: Device-Free Object Tracking Using Passive Tags. 1605-1617 - Hang Li
, Chuan Huang, Ping Zhang, Shuguang Cui
, Junshan Zhang:
Distributed Opportunistic Scheduling for Energy Harvesting Based Wireless Networks: A Two-Stage Probing Approach. 1618-1631 - Yongmin Zhang, Shibo He, Jiming Chen:
Data Gathering Optimization by Dynamic Sensing and Routing in Rechargeable Sensor Networks. 1632-1646 - Jeongho Kwak, Okyoung Choi, Song Chong, Prasant Mohapatra:
Processor-Network Speed Scaling for Energy-Delay Tradeoff in Smartphone Applications. 1647-1660 - Jongho Won, Chris Y. T. Ma, David K. Y. Yau, Nageswara S. V. Rao
:
Privacy-Assured Aggregation Protocol for Smart Metering: A Proactive Fault-Tolerant Approach. 1661-1674 - Zhangyu Guan, Tommaso Melodia
, Dongfeng Yuan, Dimitris A. Pados:
Distributed Resource Management for Cognitive Ad Hoc Networks With Cooperative Relays. 1675-1689 - Sharayu Moharir, Sujay Sanghavi, Sanjay Shakkottai
:
Online Load Balancing Under Graph Constraints. 1690-1703