


default search action
32nd INFOCOM 2013: Turin, Italy
- Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013. IEEE 2013, ISBN 978-1-4673-5944-3

Student Poster Session
- Xuan Nam Nguyen, Damien Saucez, Thierry Turletti:

Efficient caching in content-centric networks using OpenFlow. 1-2 - Mathieu Michel, Bruno Quoitin

:
Impact of a sleep schedule on the AODV convergence time in WSNs. 3-4 - João Marco C. Silva

, Paulo Carvalho
, Solange Rito Lima
:
Enhancing traffic sampling scope and efficiency. 5-6 - Antonio Villani, Daniele Riboni, Domenico Vitali, Claudio Bettini

, Luigi V. Mancini:
Obsidian: A scalable and efficient framework for NetFlow obfuscation. 7-8 - Alessandro Cammarano, Dora Spenza

, Chiara Petrioli:
Energy-harvesting WSNs for structural health monitoring of underground train tunnels. 9-10 - Anooq Muzaffar Sheikh, Attilio Fiandrotti

, Enrico Magli:
Distributed scheduling for scalable P2P video streaming with network coding. 11-12 - Piergiuseppe Di Marco

, Carlo Fischione
, George Athanasiou
, Prodromos-Vasileios Mekikis
:
MAC-aware routing metrics for low power and lossy networks. 13-14 - Muhammad Saqib Ilyas, Zartash Afzal Uzmi:

Electricity cost efficient workload mapping. 15-16 - Anh Dung Nguyen, Patrick Sénac, Michel Diaz:

On the impact of disorder on dynamic network navigation. 17-18 - Adisorn Lertsinsrubtavee, Naceur Malouch, Serge Fdida:

Efficient dynamic spectrum sharing through rate compensation and spectrum handoff. 19-20 - Shahzad Ali, Gianluca Rizzo

, Balaji Rengarajan, Marco Ajmone Marsan:
A simple approximate analysis of floating content for context-aware applications. 21-22 - Kamini Garg:

Data dissemination bounds in people-centric systems. 23-24
MC - Cloud computing and networks 1
- Hongxing Li, Chuan Wu

, Zongpeng Li, Francis C. M. Lau:
Profit-maximizing virtual machine trading in a federation of selfish clouds. 25-29 - Orathai Sukwong, Hyong S. Kim:

DPack: Disk scheduler for highly consolidated cloud. 30-34 - Yaxiong Zhao, Jie Wu:

Dache: A data aware caching for big-data applications using the MapReduce framework. 35-39 - Chen Zhang, Xue Liu:

HBaseMQ: A distributed message queuing system on clouds with HBase. 40-44
MC - Social networks
- Xu Cheng, Haitao Li, Jiangchuan Liu:

Video sharing propagation in social networks: Measurement, modeling, and analysis. 45-49 - Haitao Li, Haiyang Wang, Jiangchuan Liu, Ke Xu:

Video requests from Online Social Networks: Characterization, analysis and generation. 50-54 - Thang N. Dinh

, Nam P. Nguyen, My T. Thai:
An adaptive approximation algorithm for community detection in dynamic scale-free networks. 55-59 - Joydeep Chandra, Bivas Mitra, Niloy Ganguly

:
Effect of constraints on superpeer topologies. 60-64
MC - Network Monitoring
- Hao Li

, Chengchen Hu:
ROOM: Rule Organized Optimal Matching for fine-grained traffic identification. 65-69 - Andrea Di Pietro, Felipe Huici, Nicola Bonelli, Brian Trammell

, Petr Kastovsky, Tristan Groleat, Sandrine Vaton, Maurizio Dusi:
Toward composable network traffic measurement. 70-74 - Brian Eriksson, Mark Crovella:

Understanding geolocation accuracy using network geometry. 75-79 - Kensuke Fukuda, Shinta Sato, Takeshi Mitamura:

A technique for counting DNSSEC validators. 80-84
MC - Content based networking
- Elisha J. Rosensweig, Jim Kurose:

A network calculus for cache networks. 85-89 - Reaz Ahmed, Md. Faizul Bari, Shihabur Rahman Chowdhury

, Md. Golam Rabbani, Raouf Boutaba, Bertrand Mathieu:
αRoute: A name based routing scheme for Information Centric Networks. 90-94 - Yi Wang, Tian Pan

, Zhian Mi, Huichen Dai, Xiaoyu Guo
, Ting Zhang, Bin Liu, Qunfeng Dong:
NameFilter: Achieving fast name lookup with low memory cost via applying two-stage Bloom filters. 95-99 - Sumanta Saha, Andrey Lukyanenko, Antti Ylä-Jääski:

Cooperative caching through routing control in information-centric networks. 100-104
MC - Vehicular networks
- Francesco Malandrino

, Claudio Ettore Casetti, Carla-Fabiana Chiasserini
, Marco Fiore
, Roberto Sadao Yokoyama, Carlo Borgiattino:
A-VIP: Anonymous verification and inference of positions in vehicular networks. 105-109 - Christoph Sommer

, Stefan Joerer, Michele Segata
, Ozan K. Tonguz, Renato Lo Cigno
, Falko Dressler
:
How shadowing hurts vehicular communications and how dynamic beaconing can help. 110-114 - Kai Xing, Tianbo Gu, Zhengang Zhao, Lei Shi, Yunhao Liu, Pengfei Hu

, Yuepeng Wang, Yi Liang, Shuo Zhang, Yang Wang, Liusheng Huang:
Approaching reliable realtime communications? A novel system design and implementation for roadway safety oriented vehicular communications. 115-119 - Evsen Yanmaz

, Robert Kuschnig, Christian Bettstetter
:
Achieving air-ground communications in 802.11 networks with three-dimensional aerial mobility. 120-124
MC - Wireless networks 1
- Sangki Yun, Lili Qiu, Apurv Bhartia:

Multi-point to multi-point MIMO in wireless LANs. 125-129 - Brendan Mumey

, Jian Tang, Ivan R. Judson, Richard S. Wolff:
Beam scheduling and relay assignment in wireless relay networks with smart antennas. 130-134 - Peng-Jun Wan, Lei Wang, Chao Ma, Zhu Wang, Boliu Xu, Minming Li

:
Maximizing wireless network capacity with linear power: Breaking the logarithmic barrier. 135-139 - Tsung-Han Lin, H. T. Kung:

Concurrent channel access and estimation for scalable multiuser MIMO networking. 140-144
MC - Sensor networks 1
- Ju Wang, Dingyi Fang

, Xiaojiang Chen, Zhe Yang, Tianzhang Xing, Lin Cai
:
LCS: Compressive sensing based device-free localization for multiple targets in sensor networks. 145-149 - Shaojie Tang, Jing Yuan

:
DAMson: On distributed sensing scheduling to achieve high Quality of Monitoring. 155-159 - Ankur Kamthe, Miguel Á. Carreira-Perpiñán, Alberto Cerpa:

Quick construction of data-driven models of the short-term behavior of wireless links. 160-164
MC - Cognitive radio networks
- Hongjuan Li

, Xiuzhen Cheng, Keqiu Li, Xiaoshuang Xing, Tao Jing:
Utility-based cooperative spectrum sensing scheduling in cognitive radio networks. 165-169 - Clement Kam, Sastry Kompella

, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides:
Multicast throughput stability analysis for cognitive cooperative random access. 170-174 - Tao Jing, Shixiang Zhu, Hongjuan Li

, Xiuzhen Cheng, Yan Huo:
Cooperative relay selection in cognitive radio networks. 175-179 - Yanjiao Chen

, Jin Zhang, Kaishun Wu
, Qian Zhang
:
TAMES: A Truthful Auction Mechanism for heterogeneous spectrum allocation. 180-184
MC - Cloud computing and networks 2
- Shaolei Ren

, Mihaela van der Schaar
:
Joint design of Dynamic Scheduling and Pricing in wireless cloud computing. 185-189 - Weiwen Zhang, Yonggang Wen, Dapeng Oliver Wu

:
Energy-efficient scheduling policy for collaborative execution in mobile cloud computing. 190-194 - Peng Shu, Fangming Liu, Hai Jin, Min Chen, Feng Wen, Yupeng Qu, Bo Li:

eTime: Energy-efficient transmission between cloud and mobile devices. 195-199
MC - Security, privacy, authentication 1
- Xiaofan He, Huaiyu Dai, Wenbo Shen, Peng Ning:

Is link signature dependable for wireless security? 200-204 - Roberto Di Pietro

, Stefano Guarino
:
Data confidentiality and availability via secret sharing and node mobility in UWSN. 205-209 - Hyungbae Park, Sejun Song, Baek-Young Choi

, Chin-Tser Huang:
PASSAGES: Preserving Anonymity of Sources and Sinks against Global Eavesdroppers. 210-214 - Shaxun Chen, Amit Pande, Kai Zeng, Prasant Mohapatra:

Video source identification in lossy wireless networks. 215-219
MC - Measurements
- Boxun Zhang, Gunnar Kreitz, Marcus Isaksson, Javier Ubillos, Guido Urdaneta, Johan A. Pouwelse

, Dick H. J. Epema:
Understanding user behavior in Spotify. 220-224 - John Mark Agosta, Jaideep Chandrashekar, Mark Crovella, Nina Taft, Daniel Ting:

Mixture models of endhost network traffic. 225-229 - Ignacio Bermudez, Stefano Traverso, Marco Mellia

, Maurizio M. Munafò:
Exploring the cloud from passive measurements: The Amazon AWS case. 230-234 - Diana Joumblatt, Jaideep Chandrashekar, Branislav Kveton, Nina Taft, Renata Teixeira:

Predicting user dissatisfaction with Internet application performance at end-hosts. 235-239
MC - Content distribution
- Haowei Yuan, Patrick Crowley:

Experimental evaluation of content distribution with NDN and HTTP. 240-244 - Jaime Llorca

, Antonia M. Tulino
, Kyle Guan, Jairo O. Esteban, Matteo Varvello, Nakjung Choi
, Daniel C. Kilper
:
Dynamic in-network caching for energy efficient content delivery. 245-249 - Yao Liu, Fei Li, Lei Guo, Bo Shen, Songqing Chen:

Effectively minimizing redundant Internet streaming traffic to iOS devices. 250-254 - Mohsen Sardari, Ahmad Beirami, Jun Zou, Faramarz Fekri

:
Content-aware network data compression using joint memorization and clustering. 255-259
MC - Network coding
- Ahmed Osama Fathy Atya, Ioannis Broustis, Shailendra Singh, Dimitris Syrivelis, Srikanth V. Krishnamurthy

, Thomas F. La Porta:
Wireless network coding: Deciding when to flip the switch. 260-264 - Wentao Huang, Tracey Ho, Hongyi Yao, Sidharth Jaggi:

Rateless resilient network coding against byzantine adversaries. 265-269 - Jin Wang, Kejie Lu, Jianping Wang

, Chunming Qiao:
Untraceability of mobile devices in wireless mesh networks using linear network coding. 270-274 - Shuai Wang, Guang Tan, Yunhuai Liu, Hongbo Jiang, Tian He:

Coding Opportunity Aware Backbone metrics for broadcast in wireless networks. 275-279
MC - Wireless networks 2
- Sven Wiethölter, Andreas Ruttor, Uwe Bergemann, Manfred Opper, Adam Wolisz:

DARA: Estimating the behavior of data rate adaptation algorithms in WLAN hotspots. 280-284 - Yong Xiao, Jianwei Huang, Chau Yuen, Luiz A. DaSilva:

Fairness and efficiency tradeoffs for user cooperation in distributed wireless networks. 285-289 - Hemant Kowshik, Partha Dutta, Malolan Chetlur, Shivkumar Kalyanaraman:

A quantitative framework for guaranteeing QoE of video delivery over wireless. 290-294 - Qingjun Xiao, Bin Xiao

, Shigang Chen:
Differential estimation in dynamic RFID systems. 295-299
MC - Sensor networks 2
- Zhaoyang Zhang, Honggang Wang

, Xiaodong Lin, Hua Fang
, Dong Xuan:
Effective epidemic control and source tracing through mobile social sensing over WBANs. 300-304 - Su Xia, Ning Ding, Miao Jin, Hongyi Wu, Yang Yang:

Medial axis construction and applications in 3D wireless sensor networks. 305-309 - Liwen Xu, Xiao Qi, Yuexuan Wang, Thomas Moscibroda:

Efficient data gathering using Compressed Sparse Functions. 310-314 - Wei Dong, Biyuan Mo, Chao Huang, Yunhao Liu, Chun Chen:

R3: Optimizing relocatable code for efficient reprogramming in networked embedded systems. 315-319
MC - Wireless networks 5
- Esa Hyytiä

, Jörg Ott:
Criticality of large delay tolerant networks via directed continuum percolation in space-time. 320-324 - Wei Bao

, Ben Liang
:
On the insensitivity of user distribution in multicell networks under general mobility and session patterns. 325-329 - Siddhant Agrawal

, Prasanna Chaporkar, Rajan Udwani:
Call admission control for real-time applications in wireless network. 330-334 - Juan José Jaramillo, Lei Ying

:
Distributed admission control without knowledge of the capacity region. 335-339
MC - Data center networking 1
- Jianying Luo, Lei Rao, Xue Liu:

Data center energy cost minimization: A spatio-temporal scheduling approach. 340-344 - Zeyu Zheng, Minming Li

, Xun Xiao, Jianping Wang
:
Coordinated resource provisioning and maintenance scheduling in cloud data centers. 345-349 - Zhiyang Guo, Yuanyuan Yang

:
Multicast fat-tree data center networks with bounded link oversubscription. 350-354 - Rami Cohen, Liane Lewin-Eytan, Joseph Naor, Danny Raz:

Almost optimal virtual machine placement for traffic intense data centers. 355-359
MC - Security, privacy, authentication 2
- Sookhyun Yang, Jim Kurose, Brian Neil Levine:

Disambiguation of residential wired and wireless access in a forensic setting. 360-364 - Yi Guo, Lei Yang

, Xuan Ding, Jinsong Han, Yunhao Liu:
OpenSesame: Unlocking smart phone through handshaking biometrics. 365-369 - Mohammad Abdel-Rahman

, Hanif Rahbari
, Marwan Krunz, Philippe Nain:
Fast and secure rendezvous protocols for mitigating control channel DoS attacks. 370-374 - Lingjun Li, Xinxin Zhao, Guoliang Xue:

Near field authentication for smart devices. 375-379
MC - Optical networks
- János Tapolcai

, Pin-Han Ho, Péter Babarczi
, Lajos Rónyai:
On achieving all-optical failure restoration via monitoring trails. 380-384 - Shahrzad Shirazipourazad, Chenyang Zhou, Zahra Derakhshandeh, Arunabha Sen:

On routing and spectrum allocation in spectrum-sliced optical networks. 385-389 - Xiaomin Chen, Admela Jukan, Ashwin Gumaste:

Multipath de-fragmentation: Achieving better spectral efficiency in elastic optical path networks. 390-394 - Zilong Ye, Xiaojun Cao

, Xiujiao Gao, Chunming Qiao:
A predictive and incremental grooming scheme for time-varying traffic in WDM networks. 395-399
MC - Virtualization and cloud networks
- Anyu Wang

, Zhifang Zhang:
Exact cooperative regenerating codes with minimum-repair-bandwidth for distributed storage. 400-404 - Linquan Zhang, Chuan Wu

, Zongpeng Li, Chuanxiong Guo
, Minghua Chen
, Francis C. M. Lau:
Moving big data to the cloud. 405-409 - Qian Hu, Yang Wang, Xiaojun Cao

:
Resolve the virtual network embedding problem: A column generation approach. 410-414 - Yvonne-Anne Pignolet, Stefan Schmid

, Gilles Trédan:
Adversarial VNet embeddings: A threat for ISPs? 415-419
MC - Cellular networks
- Xuan Bao, Yin Lin, Uichin Lee, Ivica Rimac, Romit Roy Choudhury:

DataSpotting: Exploiting naturally clustered mobile devices to offload cellular traffic. 420-424 - Shan Zhou, Jie Yang, Dahai Xu, Guangzhi Li, Yu Jin, Zihui Ge, Mario Kosseifi, Robert D. Doverspike, Yingying Chen

, Lei Ying
:
Proactive call drop avoidance in UMTS networks. 425-429 - Stefano Paris, Fabio Martignon, Ilario Filippini

, Lin Chen:
A bandwidth trading marketplace for mobile data offloading. 430-434 - Youngbin Im, Carlee Joe-Wong, Sangtae Ha, Soumya Sen, Ted Taekyoung Kwon, Mung Chiang:

AMUSE: Empowering users for cost-aware offloading with throughput-delay tradeoffs. 435-439 - Fei Yu, Guangtao Xue, Hongzi Zhu, Zhenxian Hu, Minglu Li, Gong Zhang:

Cutting without pain: Mitigating 3G radio tail effect on smartphones. 440-444
MC - Wireless networks 3
- Rongxing Lu, Xiaodong Lin, Zhiguo Shi, Bin Cao, Xuemin (Sherman) Shen

:
IPAD: An incentive and privacy-aware data dissemination scheme in opportunistic networks. 445-449 - Yong Zhou, Weihua Zhuang

:
Beneficial cooperation ratio in multi-hop wireless ad hoc networks. 450-454 - Chenxi Qiu, Lei Yu

, Haiying Shen, Sohraab Soltani:
Low-latency multi-flow broadcasts in fading wireless networks. 455-459 - Pedro E. Santacruz, Vaneet Aggarwal

, Ashutosh Sabharwal:
Beyond interference avoidance: Distributed sub-network scheduling in wireless networks with local views. 460-464
MC - Sensor networks 3
- Yang Yang, Miao Jin, Yao Zhao, Hongyi Wu:

Cut graph based information storage and retrieval in 3D sensor networks with general topology. 465-469 - Shibo He, Xiaowen Gong, Junshan Zhang, Jiming Chen, Youxian Sun:

Barrier coverage in wireless sensor networks: From lined-based to curve-based deployment. 470-474 - Anais Vergne, Laurent Decreusefond

, Philippe Martins:
Reduction algorithm for simplicial complexes. 475-479 - Yin Wang, Yuan He, Dapeng Cheng, Yunhao Liu, Xiang-Yang Li:

TriggerCas: Enabling wireless consrucive collisions. 480-484
MC - Localization
- Xiuyuan Zheng, Jie Yang, Yingying Chen

, Yu Gan
:
Adaptive device-free passive localization coping with dynamic target speed. 485-489 - Chenshu Wu, Zheng Yang, Yiyang Zhao, Yunhao Liu:

Footprints elicit the truth: Improving global positioning accuracy via local mobility. 490-494 - Kaikai Liu, Xinxin Liu, Lulu Xie, Xiaolin Li:

Towards accurate acoustic localization on a smartphone. 495-499 - Xinfeng Li, Jin Teng, Qiang Zhai, Junda Zhu, Dong Xuan, Yuan F. Zheng, Wei Zhao

:
EV-Human: Human localization via visual estimation of body electronic interference. 500-504 - Yu Zhao, Yunhuai Liu, Tian He, Athanasios V. Vasilakos

, Chuanping Hu:
FREDI: Robust RSS-based ranging with multipath effect and radio interference. 505-509
MC - Data center networking 2
- Amir Nahir, Ariel Orda, Danny Raz:

Schedule first, manage later: Network-aware load balancing. 510-514 - Kai Wang, Minghong Lin, Florin Ciucu, Adam Wierman, Chuang Lin:

Characterizing the impact of the workload on the value of dynamic resizing in data centers. 515-519 - Yan Gao, Zheng Zeng, Xue Liu, P. R. Kumar:

The answer is blowing in the wind: Analysis of powering Internet data centers with wind energy. 520-524
MC - Applications of game theory
- Tianrong Zhang, Fan Wu, Chunming Qiao:

SPECIAL: A strategy-proof and Efficient multi-channel Auction mechanism for wireless networks. 525-529 - Yangming Zhao, Sheng Wang, Shizhong Xu, Xiong Wang, Xiujiao Gao, Chunming Qiao:

Load balance vs energy efficiency in traffic engineering: A game Theoretical Perspective. 530-534 - Xin Luo, Hamidou Tembine

:
Evolutionary coalitional games for random access control. 535-539 - Chih-Yu Wang, Yan Chen

, Hung-Yu Wei
, K. J. Ray Liu
:
Optimal pricing in stochastic scalable video coding multicasting system. 540-544
MC - Router and switch design
- Yossi Kanizo, David Hay, Isaac Keslassy

:
Palette: Distributing tables in software-defined networks. 545-549 - Qing Li

, Mingwei Xu, Meng Chen:
NSFIB construction & aggregation with next hop of strict partial order. 550-554 - Dario G. Garao, Guido Maier, Achille Pattavina:

Modular architectures of optical multi-stage switching networks. 555-559
MC - Wireless networks 4
- Eugene Chai, Kang G. Shin, Sung-Ju Lee, Jeongkeun Lee, Raúl H. Etkin:

Defeating heterogeneity in wireless multicast networks. 560-564 - Chien-Han Chai, Yuan-Yao Shih

, Ai-Chun Pang:
A spectrum-sharing rewarding framework for co-channel hybrid access femtocell networks. 565-569 - Richard Southwell, Xu Chen, Jianwei Huang:

QoS satisfaction games for spectrum sharing. 570-574 - Shreeshankar Bodas, Bilal Sadiq:

Polynomial-complexity, low-delay scheduling for SCFDMA-based wireless uplink networks. 575-579
MC - Energy harvesting and smart grids
- Qingsi Wang, Mingyan Liu:

When simplicity meets optimality: Efficient transmission power control with stochastic energy harvesting. 580-584 - Maria Gorlatova, Robert Margolies, John Sarik, Gerald Stanje, Jianxun Zhu, Baradwaj Vigraham, Marcin Szczodrak, Luca P. Carloni

, Peter R. Kinget
, Ioannis Kymissis
, Gil Zussman:
Prototyping energy harvesting active networked tags (EnHANTs). 585-589 - Nicolò Michelusi

, Leonardo Badia
, Ruggero Carli, Luca Corradini
, Michele Zorzi:
Impact of battery degradation on optimal management policies of harvesting-based wireless sensor devices. 590-594 - Byung-Gook Kim, Shaolei Ren

, Mihaela van der Schaar
, Jang-Won Lee
:
Bidirectional energy trading for residential load scheduling and electric vehicles. 595-599
MC - Security, privacy, authentication 3
- Shang Shang, Paul W. Cuff, Pan Hui, Sanjeev R. Kulkarni:

An upper bound on the convergence time for quantized consensus. 600-604 - Lan Zhang, Xiang-Yang Li, Yunhao Liu, Taeho Jung:

Verifiable private multi-party computation: Ranging and ranking. 605-609 - Zhen Xu, Cong Wang

, Qian Wang
, Kui Ren
, Lingyu Wang:
Proof-carrying cloud computation: The case of convex optimization. 610-614 - Stefanie Roos, Thorsten Strufe:

A contribution to analyzing and enhancing Darknet routing. 615-619
Cloud computing and networks 1
- Yang Guo, Alexander L. Stolyar, Anwar Walid:

Shadow-routing based dynamic algorithms for virtual machine placement in a network cloud. 620-628 - Hiroki Yanagisawa, Takayuki Osogami, Rudy Raymond

:
Dependable virtual machine allocation. 629-637 - Li Erran Li, Vahid Liaghat, Hongze Zhao, MohammadTaghi Hajiaghayi, Dan Li, Gordon T. Wilfong, Yang Richard Yang, Chuanxiong Guo

:
PACE: Policy-Aware Application Cloud Embedding. 638-646 - Mansoor Alicherry, T. V. Lakshman:

Optimizing data access latencies in cloud systems by intelligent virtual machine placement. 647-655
Underwater and aerial sensor networks
- Zhaoquan Gu, Qiang-Sheng Hua, Yuexuan Wang, Francis C. M. Lau:

Reducing information gathering latency through Mobile Aerial Sensor Network. 656-664 - Seongwon Han, Youngtae Noh

, Uichin Lee, Mario Gerla:
M-FAMA: A multi-session MAC protocol for reliable underwater acoustic streams. 665-673 - Xin Dong, Mehmet Can Vuran

:
Environment aware connectivity for wireless underground sensor networks. 674-682 - Yibo Zhu, Zaihan Jiang, Zheng Peng, Michael Zuba, Jun-Hong Cui, Huifang Chen:

Toward practical MAC design for underwater acoustic networks. 683-691
Optical networks
- Greg Kuperman, Eytan H. Modiano:

Network protection with guaranteed recovery times using recovery domains. 692-700 - Zhemin Zhang, Zhiyang Guo, Yuanyuan Yang

:
Bounded-reorder packet scheduling in optical cut-through switch. 701-709 - Alexandre Fréchette, F. Bruce Shepherd, Marina K. Thottan, Peter J. Winzer:

Shortest path versus multi-hub routing in networks with uncertain demand. 710-718
Cognitive radio networks 1
- Tarun Bansal, Bo Chen, Prasun Sinha:

DISCERN: Cooperative whitespace scanning in practical environments. 719-727 - Lei Sun, Wenye Wang

:
Understanding Blackholes in large-scale Cognitive Radio Networks under generic failures. 728-736 - Youngjune Gwon, H. T. Kung:

Scaling network-based spectrum analyzer with constant communication cost. 737-745 - I-Hsun Chuang, Hsiao-Yun Wu, Kuan-Rong Lee, Yau-Hwang Kuo:

Alternate hop-and-wait channel rendezvous method for cognitive radio networks. 746-754
Cellular networks 1
- Wei Dong, Swati Rallapalli, Rittwik Jana, Lili Qiu, K. K. Ramakrishnan

, Leo Razoumov, Yin Zhang, Tae Won Cho:
iDEAL: Incentivized dynamic cellular offloading via auctions. 755-763 - Han Cai, Irem Koprulu, Ness B. Shroff:

Exploiting double opportunities for deadline based content propagation in wireless networks. 764-772 - Bartlomiej Blaszczyszyn, Mohamed Kadhem Karray, Holger Paul Keeler:

Using Poisson processes to model lattice cellular networks. 773-781 - Wei Wang, Jin Zhang, Qian Zhang

:
Cooperative cell outage detection in Self-Organizing femtocell networks. 782-790
Mobile security and privacy
- Boxuan Gu, Xinfeng Li, Gang Li, Adam C. Champion, Zhezhe Chen, Feng Qin, Dong Xuan:

D2Taint: Differentiated and dynamic information flow tracking on smartphones for numerous data sources. 791-799 - Jingchao Sun, Rui Zhang, Yanchao Zhang:

Privacy-preserving spatiotemporal matching. 800-808 - Shuaifu Dai, Alok Tongaonkar, Xiaoyin Wang, Antonio Nucci, Dawn Song:

NetworkProfiler: Towards automatic fingerprinting of Android apps. 809-817
Network economics and pricing 1
- M. H. R. Khouzani, Soumya Sen, Ness B. Shroff:

An economic analysis of regulating security investments in the Internet. 818-826 - Qianyi Huang, Yixin Tao, Fan Wu:

SPRING: A Strategy-proof and Privacy preserving spectrum auction mechanism. 827-835 - Shang-Pin Sheng, Mingyan Liu:

Profit incentive in a secondary spectrum market: A contract design approach. 836-844 - Randall Berry

, Michael L. Honig, Thành Nguyen, Vijay G. Subramanian
, Hang Zhou, Rakesh Vohra:
On the nature of revenue-sharing contracts to incentivize spectrum-sharing. 845-853
Cloud computing and networks 2
- Hong Xu

, Baochun Li:
Joint request mapping and response routing for geo-distributed cloud services. 854-862 - Elisha J. Rosensweig, Daniel Sadoc Menasché, Jim Kurose:

On the steady-state of cache networks. 863-871 - Zhi Zhou, Fangming Liu, Hai Jin, Bo Li, Baochun Li, Hongbo Jiang:

On arbitrating the power-performance tradeoff in SaaS clouds. 872-880 - Wei Wei, Harry Tian Gao, Fengyuan Xu, Qun Li

:
Fast Mencius: Mencius with low commit latency. 881-889
RFID
- Wen Luo, Yan Qiao, Shigang Chen:

An efficient protocol for RFID multigroup threshold-based classification. 890-898 - Min Chen, Wen Luo, Zhen Mo, Shigang Chen, Yuguang Fang

:
An efficient tag search protocol in large-scale RFID systems. 899-907 - Yuanqing Zheng

, Mo Li
:
ZOE: Fast cardinality estimation for large-scale RFID systems. 908-916 - Yuanqing Zheng

, Mo Li
:
P-MTI: Physical-layer Missing Tag Identification via compressive sensing. 917-925
Network survivability
- Greg Kuperman, Eytan H. Modiano:

Providing protection in multi-hop wireless networks. 926-934 - János Tapolcai

, Gábor Rétvári:
Router virtualization for improving IP-level resilience. 935-943 - Jose Yallouz, Ariel Orda:

Tunable QoS-aware network survivability. 944-952
Cognitive radio networks 2
- Shuang Li, Zizhan Zheng, Eylem Ekici

, Ness B. Shroff:
Maximizing social welfare in operator-based Cognitive Radio Networks under spectrum uncertainty and sensing inaccuracy. 953-961 - Chunxiao Jiang, Yan Chen

, Yu-Han Yang, Chih-Yu Wang, K. J. Ray Liu
:
Dynamic Chinese Restaurant Game in cognitive radio networks. 962-970 - Wei Li, Xiuzhen Cheng, Tao Jing, Xiaoshuang Xing:

Cooperative multi-hop relaying via network formation games in cognitive radio networks. 971-979 - Shengrong Bu, F. Richard Yu

, Yi Qian:
Energy-efficient cognitive heterogeneous networks powered by the smart grid. 980-988
Cellular networks 2
- Danny De Vleeschauwer

, Harish Viswanathan, Andre Beck, Steven A. Benno, Gang Li, Raymond B. Miller:
Optimization of HTTP adaptive streaming over mobile cellular networks. 989-997 - Ehsan Aryafar, Alireza Keshavarz-Haddad, Michael Wang, Mung Chiang:

RAT selection games in HetNets. 998-1006 - Ashwin Sridharan, Jean Bolot:

Location patterns of mobile users: A large-scale tudy. 1007-1015 - Yin Sun, Can Emre Koksal, Sung-Ju Lee, Ness B. Shroff:

Network control without CSI using rateless codes for downlink cellular systems. 1016-1024
Security and privacy 1
- Kevin D. Bowers, Ari Juels, Ronald L. Rivest, Emily Shen:

Drifting Keys: Impersonation detection for constrained devices. 1025-1033 - Lu Shi, Shucheng Yu

, Wenjing Lou, Y. Thomas Hou
:
SybilShield: An agent-aided social network-based Sybil defense among multiple communities. 1034-1042 - Zhen Ling, Junzhou Luo, Kui Wu, Xinwen Fu

:
Protocol-level hidden server discovery. 1043-1051 - Liqun Chen

, Hoon Wei Lim, Guomin Yang
:
Cross-domain password-based authenticated key exchange revisited. 1052-1060
Network economics and pricing 2
- Carlee Joe-Wong, Soumya Sen, Sangtae Ha:

Offering supplementary wireless technologies: Adoption behavior and offloading benefits. 1061-1069 - Lingjie Duan

, Jianwei Huang, Jean C. Walrand:
Economic analysis of 4G network upgrade. 1070-1078 - Valentino Pacifici

, György Dán:
Content-peering dynamics of autonomous caches in a content-centric network. 1079-1087 - Lingjie Duan

, Jianwei Huang, Biying Shou
:
Optimal pricing for local and global WiFi markets. 1088-1096
Energy efficiency in wireless networks
- Dimitrios Tsilimantos

, Jean-Marie Gorce
, Eitan Altman:
Stochastic analysis of energy savings with sleep mode in OFDMA wireless networks. 1097-1105 - R. M. Karthik, Arvind Chakrapani

:
Practical algorithm for power efficient DRX configuration in next generation mobiles. 1106-1114 - Rahul Vaze:

Competitive ratio analysis of online algorithms to minimize packet transmission time in energy harvesting communication system. 1115-1123 - Cheng Liu, Karthikeyan Sundaresan, Meilong Jiang, Sampath Rangarajan, Gee-Kung Chang:

The case for re-configurable backhaul in cloud-RAN based small cell networks. 1124-1132
Smart Grid
- Shaojie Tang, Qiuyuan Huang, Xiang-Yang Li, Dapeng Wu

:
Smoothing the energy consumption: Peak demand reduction in smart grid. 1133-1141 - Yingsong Huang, Shiwen Mao, R. Mark Nelms:

Adaptive electricity scheduling in microgrids. 1142-1150 - Yang Gao, Yan Chen

, Chih-Yu Wang, K. J. Ray Liu
:
A contract-based approach for ancillary services in V2G networks: Optimality and learning. 1151-1159 - Xuan Liu, Kui Ren

, Yanling Yuan, Zuyi Li
, Qian Wang
:
Optimal budget deployment strategy against power grid interdiction. 1160-1168
Sensor coverage and topology control
- Xiaowen Gong, Junshan Zhang, Douglas Cochran:

When target motion matters: Doppler coverage in radar sensor networks. 1169-1177 - Yilin Shen, Dung T. Nguyen, My T. Thai:

Adaptive approximation algorithms for hole healing in hybrid wireless sensor networks. 1178-1186 - Lidong Wu, Hongwei Du, Weili Wu, Deying Li, Jing Lv, Wonjun Lee:

Approximations for Minimum Connected Sensor Cover. 1187-1194 - Zuoming Yu, Jin Teng, Xinfeng Li, Dong Xuan:

On wireless network coverage in bounded areas. 1195-1203
Router and switch design
- Longbo Huang, Jean C. Walrand:

A Benes packet network. 1204-1212 - Yaoqing Liu, Beichuan Zhang, Lan Wang:

FIFA: Fast incremental FIB aggregation. 1213-1221 - Layong Luo, Gaogang Xie, Kavé Salamatian

, Steve Uhlig
, Laurent Mathy, Yingke Xie:
A trie merging approach with incremental updates for virtual routers. 1222-1230 - Ori Rottenstreich, Marat Radan, Yuval Cassuto, Isaac Keslassy

, Carmi Arad, Tal Mizrahi
, Yoram Revah, Avinatan Hassidim:
Compressing forwarding tables. 1231-1239
Cognitive radio networks 3
- Qiben Yan

, Ming Li, Feng Chen, Tingting Jiang, Wenjing Lou, Y. Thomas Hou
, Chang-Tien Lu
:
Non-parametric passive traffic monitoring in cognitive radio networks. 1240-1248 - Yang Liu, Mingyan Liu:

To stay or to switch: Multiuser dynamic channel access. 1249-1257 - Wessam Afifi, Marwan Krunz:

Exploiting self-interference suppression for improved spectrum awareness/efficiency in cognitive radio systems. 1258-1266 - Xiang Sheng, Jian Tang, Chenfei Gao, Weiyi Zhang, Chonggang Wang:

Leveraging load migration and basestaion consolidation for green communications in virtualized Cognitive Radio Networks. 1267-1275
Cloud computing and networks 3
- Yadi Ma, Thyaga Nandagopal, Krishna P. N. Puttaswamy, Suman Banerjee:

An ensemble of replication and erasure codes for cloud file systems. 1276-1284 - Marco Valerio Barbera, Sokol Kosta

, Alessandro Mei
, Julinda Stefa
:
To offload or not to offload? The bandwidth and energy costs of mobile cloud computing. 1285-1293 - Lluis Pamies-Juarez, Anwitaman Datta

, Frédérique E. Oggier:
RapidRAID: Pipelined erasure codes for fast data archival in distributed storage systems. 1294-1302 - Yu Hua, Bin Xiao

, Xue Liu:
NEST: Locality-aware approximate query service for cloud computing. 1303-1311
Ad hoc networks 1
- Rafael P. Laufer, Leonard Kleinrock:

On the capacity of wireless CSMA/CA multihop networks. 1312-1320 - Wang Liu, Kejie Lu, Jianping Wang

, Yi Qian, Liusheng Huang, Jun Liu, Dapeng Oliver Wu
:
On the throughput-delay trade-off in large-scale MANETs with a generalized i.i.d. mobility model. 1321-1329 - Huacheng Zeng, Yi Shi

, Y. Thomas Hou
, Wenjing Lou, Sastry Kompella
, Scott F. Midkiff
:
On interference alignment for multi-hop MIMO networks. 1330-1338 - Guanhong Pei, Anil Kumar S. Vullikanti:

Distributed approximation algorithms for maximum link scheduling and local broadcasting in the physical interference model. 1339-1347
Wireless LAN 1
- Mahanth Gowda, Souvik Sen, Romit Roy Choudhury, Sung-Ju Lee:

Cooperative packet recovery in enterprise WLANs. 1348-1356 - Jin Tang, Yu Cheng

:
Selfish misbehavior detection in 802.11 based wireless networks: An adaptive approach based on Markov decision process. 1357-1365 - Yifan Zhang, Qun Li

:
HoWiES: A holistic approach to ZigBee assisted WiFi energy savings in mobile devices. 1366-1374 - Pei Huang, Xi Yang, Li Xiao:

WiFi-BA: Choosing arbitration over backoff in high speed multicarrier wireless networks. 1375-1383
Sensor networks 1
- Xuefeng Liu, Jiannong Cao

, Shaojie Tang:
Fault tolerant complex event detection in WSNs: A case study in structural health monitoring. 1384-1392 - Long Cheng, Yu Gu, Tian He, Jianwei Niu

:
Dynamic switching-based reliable flooding in low-duty-cycle wireless sensor networks. 1393-1401 - Iordanis Koutsopoulos:

Optimal incentive-driven design of participatory sensing systems. 1402-1410 - Hengchang Liu, Shaohan Hu, Wei Zheng, Zhiheng Xie, Shiguang Wang, Pan Hui, Tarek F. Abdelzaher:

Efficient 3G budget utilization in mobile participatory sensing applications. 1411-1419
Network measurement and analysis
- Sriharsha Gangam, Puneet Sharma, Sonia Fahmy

:
Pegasus: Precision hunting for icebergs and anomalies in network flows. 1420-1428 - Avinatan Hassidim, Danny Raz, Michal Segalov, Ariel Shaqed:

Network utilization: The flow view. 1429-1437 - Gerhard Haßlinger, Anne Schwahn, Franz Hartleb:

2-State (semi-)Markov processes beyond Gilbert-Elliott: Traffic and channel models based on 2nd order statistics. 1438-1446 - Yang Liu, Wenji Chen, Yong Guan:

Near-optimal approximate membership query over time-decaying windows. 1447-1455
Cognitive radio networks 4
- Ying Dai, Jie Wu, Chunsheng Xin:

Virtual backbone construction for cognitive radio networks without common control channel. 1456-1464 - Xiaoshuang Xing, Tao Jing, Yan Huo, Hongjuan Li

, Xiuzhen Cheng:
Channel quality prediction based on Bayesian inference in cognitive radio networks. 1465-1473 - Yanxiao Zhao, Min Song, Chunsheng Xin:

FMAC: A fair MAC protocol for coexisting cognitive radio networks. 1474-1482 - Mustafa Özger

, Özgür B. Akan:
Event-driven spectrum-aware clustering in cognitive radio sensor networks. 1483-1491
Cloud pricing and cost optimization
- Ali Khanafer, Murali S. Kodialam, Krishna P. N. Puttaswamy:

The constrained Ski-Rental problem and its application to online cloud cost optimization. 1492-1500 - Di Niu, Baochun Li:

An efficient distributed algorithm for resource allocation in large-scale coupled systems. 1501-1509 - Hong Zhang, Bo Li, Hongbo Jiang, Fangming Liu, Athanasios V. Vasilakos

, Jiangchuan Liu:
A framework for truthful online auctions in cloud computing with heterogeneous user demands. 1510-1518 - Heejun Roh

, Cheoulhoon Jung, Wonjun Lee, Ding-Zhu Du:
Resource pricing game in geo-distributed clouds. 1519-1527
Ad hoc networks 2
- Bo Ji

, Changhee Joo, Ness B. Shroff:
Exploring the inefficiency and instability of Back-Pressure algorithms. 1528-1536 - Sharayu Moharir, Sanjay Shakkottai:

MaxWeight vs. BackPressure: Routing and scheduling in multi-channel relay networks. 1537-1545 - Huacheng Zeng, Yi Shi

, Y. Thomas Hou
, Wenjing Lou:
An efficient DoF scheduling algorithm for multi-hop MIMO networks. 1546-1554 - Hulya Seferoglu, Eytan H. Modiano:

Diff-Max: Separation of routing and scheduling in backpressure-based wireless networks. 1555-1563
Wireless LAN 2
- Haochao Li, Kaishun Wu

, Qian Zhang
, Lionel M. Ni:
CUTS: Improving channel utilization in both time and spatial domains in WLANs. 1564-1572 - Julien Herzen, Ruben Merz, Patrick Thiran:

Distributed spectrum assignment for home WLANs. 1573-1581 - Oscar Bejarano, Edward W. Knightly:

Virtual MISO triggers in Wi-Fi-like networks. 1582-1590 - Yuan Yao, Lei Rao, Xue Liu, Xingshe Zhou:

Delay analysis and study of IEEE 802.11p based DSRC safety communication in a highway environment. 1591-1599
Resource allocation in cloud computing 1
- Yousi Zheng, Ness B. Shroff, Prasun Sinha:

A new analytical technique for designing provably efficient MapReduce schedulers. 1600-1608 - Weina Wang, Kai Zhu, Lei Ying, Jian Tan, Li Zhang:

Map task scheduling in MapReduce with data locality: Throughput and heavy-traffic optimality. 1609-1617 - Jian Tan, Xiaoqiao Meng, Li Zhang:

Coupling task progress for MapReduce resource-aware scheduling. 1618-1626 - Jian Tan, Shicong Meng, Xiaoqiao Meng, Li Zhang:

Improving ReduceTask data locality for sequential MapReduce jobs. 1627-1635
Sensor networks 2
- Liguang Xie, Yi Shi

, Y. Thomas Hou
, Wenjing Lou, Hanif D. Sherali, Scott F. Midkiff
:
Bundling mobile base station and wireless energy transfer: Modeling and optimization. 1636-1644 - Xiaolin Fang, Hong Gao, Jianzhong Li, Yingshu Li

:
Application-aware data collection in Wireless Sensor Networks. 1645-1653 - Linghe Kong

, Mingyuan Xia, Xiao-Yang Liu, Min-You Wu, Xue Liu:
Data loss and reconstruction in sensor networks. 1654-1662 - Guohua Li, Jianzhong Li, Hong Gao:

ε-Approximation to data streams in sensor networks. 1663-1671
Internet monitoring and measurement
- Oded Argon, Yuval Shavitt

, Udi Weinsberg:
Inferring the periodicity in large-scale Internet measurements. 1672-1680 - Xun Fan, John S. Heidemann, Ramesh Govindan:

Evaluating anycast in the domain name system. 1681-1689 - Yi-Chao Chen, Gene Moo Lee

, Nick G. Duffield
, Lili Qiu, Jia Wang:
Event detection using customer care calls. 1690-1698 - Mehdi Malboubi, Cuong Vu, Chen-Nee Chuah

, Puneet Sharma:
Decentralizing network inference problems with Multiple-Description Fusion Estimation (MDFE). 1699-1707
Cognitive radio networks 5
- Anastasios Giannoulis, Paul Patras

, Edward W. Knightly:
Mobile Access of Wide-Spectrum Networks: Design, deployment and experimental evaluation. 1708-1716 - Hongxing Li, Chuan Wu

, Zongpeng Li, Francis C. M. Lau:
Socially-optimal multi-hop secondary communication under arbitrary primary user mechanisms. 1717-1725 - Bin Cao, Jon W. Mark, Qinyu Zhang

, Rongxing Lu, Xiaodong Lin, Xuemin (Sherman) Shen
:
On optimal communication strategies for cooperative cognitive radio networking. 1726-1734 - Sang-Woon Jeon, Michael Gastpar:

Capacity scaling of cognitive networks: Beyond interference-limited communication. 1735-1743
Overlay and peer-to-peer networks
- Youngmi Jin, Yung Yi, George Kesidis, Fatih Kocak, Jinwoo Shin:

Hybrid client-server and peer-to-peer caching systems with selfish peers. 1744-1752 - François Baccelli, Fabien Mathieu, Ilkka Norros, Rémi Varloot:

Can P2P networks be super-scalable? 1753-1761 - Zhongmei Yao, Daren B. H. Cline, Dmitri Loguinov:

Unstructured P2P link lifetimes redux. 1762-1770 - Kianoosh Mokhtarian, Hans-Arno Jacobsen:

Minimum-delay overlay multicast. 1771-1779
Security and privacy 2
- Hao Chen, Yu Chen, Douglas H. Summerville, Zhou Su:

An optimized design of reconfigurable PSD accelerator for online shrew DDoS attacks detection. 1780-1787 - Wenji Chen, Yang Liu, Yong Guan:

Cardinality change-based early detection of large-scale cyber-attacks. 1788-1796 - Guanyu Tian, Zhenhai Duan, Todd Baumeister, Yingfei Dong:

A traceback attack on Freenet. 1797-1805 - Hongli Zhang, Jiantao Shi

, Lin Ye, Xiaojiang Du:
PPBD: A piracy preventing system for BT DHT networks. 1806-1814
Ad hoc networks 3
- Giuseppa Alfano, Michele Garetto

, Emilio Leonardi
:
Content-centric wireless networks with limited buffers: When mobility hurts. 1815-1823 - Seon-Yeong Han, Nael B. Abu-Ghazaleh

, Dongman Lee:
Double Regression: Efficient spatially correlated path loss model for wireless network simulation. 1824-1832 - Hussein Al-Zubaidy, Jörg Liebeherr, Almut Burchard:

A (min, ×) network calculus for multi-hop fading channels. 1833-1841 - Ming Li, Pan Li

, Miao Pan, Jinyuan Sun:
Economic-robust transmission opportunity auction in multi-hop wireless networks. 1842-1850
Wireless mesh networks
- Devu Manikantan Shila, Yu Cheng

:
Capacity gain through power enhancement in multi-radio multi-channel wireless networks. 1851-1859 - Haopeng Li, Jiang Xie:

GaS: A gateway scheduling-based handoff scheme in single-radio infrastructure wireless mesh networks. 1860-1868 - Ramanujan K. Sheshadri

, Dimitrios Koutsonikolas:
Comparison of routing metrics in 802.11n wireless mesh networks. 1869-1877 - Zi Feng, George Papageorgiou, Srikanth V. Krishnamurthy

, Ramesh Govindan, Tom La Porta:
Trading off distortion for delay for video transmissions in wireless networks. 1878-1886
Resource allocation in cloud computing 2
- Siva Theja Maguluri, R. Srikant:

Scheduling jobs with unknown duration in clouds. 1887-1895 - Furong Huang, Anima Anandkumar:

FCD: Fast-concurrent-distributed load balancing under switching costs and imperfect observations. 1896-1904 - Johannes Schneider, Stefan Schmid

:
Optimal bounds for online page migration with generalized migration costs. 1905-1913 - Yuval Rochman, Hanoch Levy, Eli Brosh:

Resource placement and assignment in distributed network topologies. 1914-1922
Sensor networks 3
- Seksan Laitrakun, Edward J. Coyle

:
Optimizing the collection of local decisions for time-constrained distributed detection in WSNs. 1923-1931 - Songtao Guo, Cong Wang, Yuanyuan Yang

:
Mobile data gathering with Wireless Energy Replenishment in rechargeable sensor networks. 1932-1940 - Dawei Gong, Yuanyuan Yang

:
Low-latency SINR-based data gathering in wireless sensor networks. 1941-1949 - Yeqing Yi, Rui Li, Fei Chen, Alex X. Liu, Yaping Lin:

A digital watermarking approach to secure and precise range query processing in sensor networks. 1950-1958
Network modelling
- Pengda Huang

, Matthew Jordan Tonnemacher, Yongjiu Du, Dinesh Rajan, Joseph David Camp
:
Towards scalable network emulation: Channel accuracy versus implementation resources. 1959-1967 - Minas Gjoka, Maciej Kurant, Athina Markopoulou

:
2.5K-graphs: From sampling to generation. 1968-1976 - Tung-Wei Kuo, Kate Ching-Ju Lin, Ming-Jer Tsai:

Maximizing submodular set function with connectivity constraint: Theory and application to networks. 1977-1985
Spectrum pricing
- Yuefei Zhu, Baochun Li, Zongpeng Li:

Core-selecting combinatorial auction design for secondary spectrum markets. 1986-1994 - Xiaojun Feng, Qian Zhang

, Jin Zhang:
Hybrid pricing for TV white space database. 1995-2003 - Yanjiao Chen

, Lingjie Duan
, Jianwei Huang, Qian Zhang
:
Balance of revenue and social welfare in FCC's spectrum allocation. 2004-2012 - Peng Lin, Xiaojun Feng, Qian Zhang

, Mounir Hamdi
:
Groupon in the Air: A three-stage auction framework for Spectrum Group-buying. 2013-2021
Security and privacy 3
- Prakash Mandayam Comar, Lei Liu, Sabyasachi Saha, Pang-Ning Tan

, Antonio Nucci:
Combining supervised and unsupervised learning for zero-day malware detection. 2022-2030 - Seyed Ali Ahmadzadeh, Gordon B. Agnew:

Turbo covert channel: An iterative framework for covert communication over data networks. 2031-2039 - James Daly, Alex X. Liu, Eric Torng:

A difference resolution approach to compressing Access Control Lists. 2040-2048 - Ori Rottenstreich, Isaac Keslassy

, Avinatan Hassidim, Haim Kaplan, Ely Porat:
On finding an optimal TCAM encoding scheme for packet classification. 2049-2057
Mobile Opportunistic Networks 1
- Wei Gao, Qinghua Li:

Wakeup scheduling for energy-efficient communication in opportunistic mobile networks. 2058-2066 - Yoora Kim, Kyunghan Lee

, Ness B. Shroff, Injong Rhee:
Providing probabilistic guarantees on the time of information spread in opportunistic networks. 2067-2075 - Chul-Ho Lee, Jaewook Kwak, Do Young Eun

:
Characterizing link connectivity for opportunistic mobile networking: Does mobility suffice? 2076-2084 - Mingjun Xiao, Jie Wu, Cong Liu, Liusheng Huang:

TOUR: Time-sensitive Opportunistic Utility-based Routing in delay tolerant networks. 2085-2091
Wireless cross-layer design
- Nathaniel M. Jones, Brooke Shrader, Eytan H. Modiano:

Distributed CSMA with pairwise coding. 2094-2102 - Jia Liu, Cathy H. Xia, Ness B. Shroff, Hanif D. Sherali:

Distributed cross-layer optimization in wireless networks: A second-order approach. 2103-2111 - Bin Li

, Atilla Eryilmaz, Ruogu Li:
Wireless scheduling for network utility maximization with optimal convergence speed. 2112-2120 - Peng-Jun Wan, Xiaohua Jia

, Guojun Dai
, Hongwei Du, Zhiguo Wan, Ophir Frieder:
Scalable algorithms for wireless link schedulings in multi-channel multi-radio wireless networks. 2121-2129
Data center networking
- Advait Abhay Dixit, Pawan Prakash, Y. Charlie Hu, Ramana Rao Kompella:

On the impact of packet spraying in data center networks. 2130-2138 - Jian Guo, Fangming Liu, Dan Zeng, John C. S. Lui, Hai Jin:

A cooperative game based allocation for sharing data center networks. 2139-2147 - Ziyu Shao, Xin Jin, Wenjie Jiang, Minghua Chen

, Mung Chiang:
Intra-data-center traffic engineering with ensemble routing. 2148-2156 - Ali Munir, Ihsan Ayyub Qazi

, Zartash Afzal Uzmi
, Aisha Mushtaq, Saad N. Ismail, M. Safdar Iqbal, Basma Khan:
Minimizing flow completion times in data centers. 2157-2165
Sensor networks 4
- Xiaomeng Ban, Mayank Goswami, Wei Zeng, Xianfeng Gu

, Jie Gao:
Topology dependent space filling curves for sensor networks and applications. 2166-2174 - Tianlong Yu, Hongbo Jiang, Guang Tan, Chonggang Wang, Chen Tian, Yu Wu:

SINUS: A scalable and distributed routing algorithm with guaranteed delivery for WSNs on high genus 3D surfaces. 2175-2183 - Kai Xing, Shuo Zhang, Lei Shi, Haojin Zhu

, Yuepeng Wang:
A localized backbone renovating algorithm for wireless ad hoc and sensor networks. 2184-2192 - Markus Benter, Florentin Neumann, Hannes Frey:

Reactive planar spanner construction in wireless ad hoc and sensor networks. 2193-2201
Traffic engineering
- Ting He, Dennis Goeckel, Ramya Raghavendra, Don Towsley

:
Endhost-based shortest path routing in dynamic networks: An online learning approach. 2202-2210 - Sugam Agarwal, Murali S. Kodialam, T. V. Lakshman

:
Traffic engineering in software defined networks. 2211-2219 - Laurent Vanbever, Stefano Vissicchio, Luca Cittadini, Olivier Bonaventure:

When the cure is worse than the disease: The impact of graceful IGP operations on BGP. 2220-2228
Spectrum sensing
- Jerry T. Chiang, Yih-Chun Hu:

Did you also hear that? Spectrum sensing using Hermitian inner product. 2229-2237 - Shimin Gong, Ping Wang, Wei Liu

, Weihua Zhuang
:
Performance bounds of energy detection with signal uncertainty in cognitive radio networks. 2238-2246 - Sungro Yoon, Li Erran Li, Soung Chang Liew, Romit Roy Choudhury, Injong Rhee, Kun Tan:

QuickSense: Fast and energy-efficient channel sensing for dynamic spectrum access networks. 2247-2255 - Qiang Liu, Xin Wang, Yong Cui:

Scheduling of sequential periodic sensing for cognitive radios. 2256-2264
Wireless security and privacy 1
- Iris Safaka, Christina Fragouli, Katerina J. Argyraki

, Suhas N. Diggavi:
Exchanging pairwise secrets efficiently. 2265-2273 - Chunqiang Hu, Xiuzhen Cheng, Fan Zhang, Dengyuan Wu, Xiaofeng Liao, Dechang Chen:

OPFKA: Secure and efficient Ordered-Physiological-Feature-based key agreement for wireless Body Area Networks. 2274-2282 - Xiaojun Zhu

, Fengyuan Xu, Edmund Novak, Chiu C. Tan, Qun Li
, Guihai Chen
:
Extracting secret key from wireless link dynamics in vehicular environments. 2283-2291 - Pengfei Huang, Xudong Wang:

Fast secret key generation in static wireless networks: A virtual channel approach. 2292-2300
Mobile Opportunistic Networks 2
- Linke Guo, Chi Zhang, Hao Yue

, Yuguang Fang
:
A privacy-preserving social-assisted mobile content dissemination scheme in DTNs. 2301-2309 - Ting Ning, Zhipeng Yang, Hongyi Wu, Zhu Han:

Self-Interest-Driven incentives for ad dissemination in autonomous mobile social networks. 2310-2318 - Jie Wu, Mingjun Xiao, Liusheng Huang:

Homing spread: Community home-based multi-copy routing in mobile social networks. 2319-2327 - Jaeseong Jeong

, Yung Yi, Jeong-woo Cho, Do Young Eun
, Song Chong:
Wi-Fi sensing: Should mobiles sleep longer as they age? 2328-2336
Network coding
- Georgios S. Paschos, Constantinos Fragiadakis, Leonidas Georgiadis, Leandros Tassiulas:

Wireless network coding with partial overhearing information. 2337-2345 - Jun Li

, Xin Wang, Baochun Li:
Cooperative pipelined regeneration in distributed storage systems. 2346-2354 - Yuchong Hu, Patrick P. C. Lee

, Kenneth W. Shum:
Analysis and construction of functional regenerating codes with uncoded repair for distributed storage systems. 2355-2363 - Xunrui Yin, Yan Wang, Xin Wang, Xiangyang Xue, Zongpeng Li:

A graph minor perspective to network coding: Connecting algebraic coding with network topologies. 2364-2372
Social computing and networks
- Bo Jiang, Nidhi Hegde, Laurent Massoulié, Don Towsley

:
How to Optimally allocate your budget of attention in social networks. 2373-2381 - Jin Cao, Hongyu Gao, Li Erran Li, Brian D. Friedman:

Enterprise social network analysis and modeling: A tale of two graphs. 2382-2390 - Dong Wang, Hosung Park, Gaogang Xie, Sue B. Moon, Mohamed Ali Kâafar

, Kavé Salamatian
:
A genealogy of information spreading on microblogs: A Galton-Watson-based explicative model. 2391-2399 - Jilong Xue, Zhi Yang, Xiaoyong Yang, Xiao Wang, Lijiang Chen, Yafei Dai:

VoteTrust: Leveraging friend invitation graph to defend against social network Sybils. 2400-2408
Sensor networks 5
- Siming Li, Wei Zeng, Dengpan Zhou, Xianfeng David Gu, Jie Gao:

Compact conformal map for greedy routing in wireless mobile sensor networks. 2409-2417 - Novella Bartolini

, Giancarlo Bongiovanni, Thomas La Porta, Simone Silvestri:
On the security vulnerabilities of the virtual force approach to mobile sensor deployment. 2418-2426 - Dongxiao Yu, Qiang-Sheng Hua, Yuexuan Wang, Jiguo Yu

, Francis C. M. Lau:
Efficient distributed multiple-message broadcasting in unstructured wireless networks. 2427-2435 - Zhongming Zheng, Anfeng Liu, Lin X. Cai

, Zhigang Chen, Xuemin (Sherman) Shen
:
ERCD: An energy-efficient clone detection protocol in WSNs. 2436-2444
Scheduling and buffer management
- Yashar Ghiassi-Farrokhfal

, Jörg Liebeherr:
Capacity provisioning for schedulers with tiny buffers. 2445-2453 - Sachin Kadloor, Negar Kiyavash:

Delay optimal policies offer very little privacy. 2454-2462 - Zhoujia Mao, Can Emre Koksal, Ness B. Shroff:

Online packet scheduling with hard deadlines in multihop communication networks. 2463-2471 - Leana Golubchik, Samir Khuller, Koyel Mukherjee, Yuan Yao:

To send or not to send: Reducing the cost of data transmission. 2472-2478
Localization
- Sungwon Yang, Pralav Dessai, Mansi Verma, Mario Gerla:

FreeLoc: Calibration-free crowdsourced indoor localization. 2481-2489 - Yinjie Chen, Zhongli Liu, Xinwen Fu

, Benyuan Liu, Wei Zhao
:
Theory underlying measurement of AOA with a rotating directional antenna. 2490-2498 - Senshan Ji, Kam-Fung Sze, Zirui Zhou

, Anthony Man-Cho So
, Yinyu Ye:
Beyond convex relaxation: A polynomial-time non-convex optimization approach to network localization. 2499-2507 - Xiaojun Zhu

, Qun Li
, Guihai Chen
:
APT: Accurate outdoor pedestrian tracking with smartphones. 2508-2516
Wireless security and privacy 2
- Xinlei (Oscar) Wang, Wei Cheng, Prasant Mohapatra, Tarek F. Abdelzaher:

ARTSense: Anonymous reputation and trust in participatory sensing. 2517-2525 - Rui Zhang

, Jinxue Zhang, Yanchao Zhang, Chi Zhang:
Secure crowdsourcing-based cooperative pectrum sensing. 2526-2534 - Shuai Li, Haojin Zhu

, Zhaoyu Gao, Xinping Guan, Kai Xing:
YouSense: Mitigating entropy selfishness in distributed collaborative spectrum sensing. 2535-2543 - Zhiping Jiang, Jizhong Zhao, Xiang-Yang Li, Jinsong Han, Wei Xi:

Rejecting the attack: Source authentication for Wi-Fi management frames using CSI Information. 2544-2552
Vehicular Networks 1
- Yujin Li, Wenye Wang:

Horizon on the move: Geocast in intermittently connected vehicular ad hoc networks. 2553-2561 - Tom H. Luan

, Xuemin (Sherman) Shen
, Fan Bai:
Integrity-oriented content transmission in highway vehicular ad hoc networks. 2562-2570 - Xu Li, Chunming Qiao, Yunfei Hou

, Yunjie Zhao, Aditya Wagh, Adel W. Sadek, Liusheng Huang, Hongli Xu:
On-road ads delivery scheduling and bandwidth allocation in vehicular CPS. 2571-2579 - Yuchen Wu, Yanmin Zhu, Hongzi Zhu, Bo Li:

CCR: Capacity-constrained replication for data delivery in vehicular networks. 2580-2588
Wireless networks 1
- Bo Ji

, Gagan Raj Gupta
, Xiaojun Lin, Ness B. Shroff:
Performance of low-complexity greedy scheduling policies in multi-channel wireless networks: Optimal throughput and near-optimal delay. 2589-2597 - Po-Kai Huang, Xiaojun Lin:

Improving the delay performance of CSMA algorithms: A Virtual Multi-Channel approach. 2598-2606 - Rahul Urgaonkar, Ram Ramanathan, Jason Redi, William N. Tetteh:

Channel assignment in dense MC-MR wireless networks: Scaling laws and algorithms. 2607-2615 - Ruogu Li, Atilla Eryilmaz, Bin Li

:
Throughput-optimal wireless scheduling with regulated inter-service times. 2616-2624
Cloud security and privacy 1
- Taeho Jung, Xiang-Yang Li, Zhiguo Wan, Meng Wan:

Privacy preserving cloud data access with multi-authorities. 2625-2633 - Taeho Jung, XuFei Mao, Xiang-Yang Li, Shaojie Tang, Wei Gong, Lan Zhang:

Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation. 2634-2642 - Zhigang Zhou, Hongli Zhang, Xiaojiang Du, Panpan Li, Xiang-Zhan Yu:

Prometheus: Privacy-aware data retrieval on hybrid cloud. 2643-2651 - Jiawei Yuan, Shucheng Yu

:
Efficient privacy-preserving biometric identification in cloud computing. 2652-2660
Sensor networks 6
- Hao Huang, Jihoon Yun, Ziguo Zhong, Song Min Kim, Tian He:

PSR: Practical synchronous rendezvous in low-duty-cycle wireless networks. 2661-2669 - Yang Peng, Zi Li, Daji Qiao, Wensheng Zhang:

I2C: A holistic approach to prolong the sensor network lifetime. 2670-2678 - Wei Dong, Yunhao Liu, Yuan He, Tong Zhu:

Measurement and analysis on the packet delivery performance in a large scale sensor network. 2679-2687 - Qiang Ma, Kebin Liu, Xiangrong Xiao, Zhichao Cao, Yunhao Liu:

Link Scanner: Faulty link detection for wireless sensor networks. 2688-2696
Multimedia networking
- Can Zhao, Jian Zhao, Xiaojun Lin, Chuan Wu

:
Capacity of P2P on-demand streaming with simple, robust and decentralized control. 2697-2705 - Zheng Lu, Gustavo de Veciana:

Optimizing stored video delivery for mobile networks: The value of knowing the future. 2706-2714 - Yuedong Xu, Salah-Eddine Elayoubi

, Eitan Altman, Rachid El Azouzi
:
Impact of flow-level dynamics on QoE of video streaming in wireless networks. 2715-2723 - Delia Ciullo, Valentina Martina, Michele Garetto

, Emilio Leonardi
:
How much can large-scale Video-on-Demand benefit from users' cooperation? 2724-2732
Localization and location privacy
- He Wang

, Zhiyang Wang, Guobin Shen, Fan Li, Song Han, Feng Zhao:
WheelLoc: Enabling continuous location service on mobile phone for outdoor scenarios. 2733-2741 - Chih-Chuan Cheng, Pi-Cheng Hsiu

:
Extend your journey: Introducing signal strength into location-based applications. 2742-2750 - Zhaoyu Gao, Haojin Zhu

, Yao Liu, Muyuan Li, Zhenfu Cao
:
Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures. 2751-2759 - Xiang-Yang Li, Taeho Jung:

Search me if you can: Privacy-preserving location query service. 2760-2768
Wireless security and privacy 3
- Ningning Cheng, Xinlei (Oscar) Wang, Wei Cheng, Prasant Mohapatra, Aruna Seneviratne

:
Characterizing privacy leakage of public WiFi networks for users on travel. 2769-2777 - Ting Wang, Yaling Yang:

Analysis on perfect location spoofing attacks using beamforming. 2778-2786 - Yan Zhang, Loukas Lazos:

Countering selfish misbehavior in multi-channel MAC protocols. 2787-2795 - Biao Han

, Jie Li
:
Secrecy capacity maximization for secure cooperative ad-hoc networks. 2796-2804
Vehicular Networks 2
- Nguyen Tien Viet, François Baccelli, Kai Zhu, Sundar Subramanian, Xinzhou Wu:

A performance analysis of CSMA based broadcast protocol in VANETs. 2805-2813 - Lei Zhang, Lin Cai

, Jianping Pan
:
Connectivity in two-dimensional lattice networks. 2814-2822 - Hongjian Wang

, Yanmin Zhu, Qian Zhang
:
Compressive sensing based monitoring with vehicular networks. 2823-2831 - Hongzi Zhu, Mianxiong Dong

, Shan Chang, Yanmin Zhu, Minglu Li, Xuemin (Sherman) Shen
:
ZOOM: Scaling the mobility for fast opportunistic forwarding in vehicular networks. 2832-2840
Wireless networks 2
- Richard Combes, Zwi Altman, Eitan Altman:

Interference coordination in wireless networks: A flow-level perspective. 2841-2849 - Ahmed Badr, Ashish Khisti, Wai-Tian Tan, John G. Apostolopoulos:

Streaming codes for channels with burst and isolated erasures. 2850-2858 - Chenxi Qiu, Haiying Shen, Sohraab Soltani, Karan Sapra, Hao Jiang, Jason O. Hallstrom:

CEDAR: An optimal and distributed strategy for packet recovery in wireless networks. 2859-2867 - Peng-Jun Wan, Zhiguo Wan, Zhu Wang, Xiao-Hua Xu, Shaojie Tang, Xiaohua Jia

:
Stability analyses of static greedy link schedulings in MC-MR wireless networks. 2868-2876
Cloud security and privacy 2
- Fang Hao, Murali S. Kodialam, T. V. Lakshman, Krishna P. N. Puttaswamy:

Protecting cloud data using dynamic inline fingerprint checks. 2877-2885 - Guojun Wang, Qin Liu, Feng Li, Shuhui Yang, Jie Wu:

Outsourcing privacy-preserving social networks to a cloud. 2886-2894 - Kan Yang

, Xiaohua Jia
, Kui Ren
, Bo Zhang:
DAC-MACS: Effective data access control for multi-authority cloud storage systems. 2895-2903 - Boyang Wang, Baochun Li, Hui Li:

Public auditing for shared data with efficient user revocation in the cloud. 2904-2912
Sensor networks 7
- Sk. Kajal Arefin Imon, Adnan Rahath Khan, Mario Di Francesco, Sajal K. Das

:
RaSMaLai: A Randomized Switching algorithm for Maximizing Lifetime in tree-based wireless sensor networks. 2913-2921 - Lingkun Fu, Peng Cheng, Yu Gu, Jiming Chen, Tian He:

Minimizing charging delay in wireless rechargeable sensor networks. 2922-2930 - Maria Isabel Vergara Gallego, Franck Rousseau

:
Energy efficient neighborhood maintenance and medium access with Wake on Idle. 2931-2939 - Yuhang Gao, Jianwei Niu

, Ruogu Zhou, Guoliang Xing:
ZiFind: Exploiting cross-technology interference signatures for energy-efficient indoor localization. 2940-2948
Flow and congestion control
- Chih-Ping Li, Eytan H. Modiano:

Receiver-based flow control for networks in overload. 2949-2957 - Chengdi Lai, Ka-Cheong Leung, Victor O. K. Li:

Does it hurt when others prosper?: Exploring the impact of heterogeneous reordering robustness of TCP. 2958-2966 - Ken Inoue, Davide Pasetto, Karol Lynch, Massimiliano Meneghin, Kay Müller, John D. Sheehan:

Low-latency and high bandwidth TCP/IP protocol processing through an integrated HW/SW approach. 2967-2975 - Jayakrishnan Nair, Krishna P. Jagannathan

, Adam Wierman:
When heavy-tailed and light-tailed flows compete: The response time tail under generalized max-weight scheduling. 2976-2984
Location privacy
- Xinxin Liu, Kaikai Liu, Linke Guo, Xiaolin Li, Yuguang Fang

:
A game-theoretic approach for achieving k-anonymity in Location Based Services. 2985-2993 - Dejun Yang

, Xi Fang, Guoliang Xue:
Truthful incentive mechanisms for k-anonymity location privacy. 2994-3002 - Xinxin Zhao, Lingjun Li, Guoliang Xue:

Checking in without worries: Location privacy in location based social networks. 3003-3011 - Ming Li, Sergio Salinas, Arun Thapa, Pan Li

:
n-CD: A geometric approach to preserving location privacy in location-based services. 3012-3020
Wireless security and privacy 4
- Rui Shi, Mayank Goswami, Jie Gao, Xianfeng Gu

:
Is random walk truly memoryless - Traffic analysis and source location privacy under random walks. 3021-3029 - Xiali Hei, Xiaojiang Du, Shan Lin, Insup Lee:

PIPAC: Patient infusion pattern based access control scheme for wireless insulin pump system. 3030-3038 - Kai Xing, Zhiguo Wan, Pengfei Hu

, Haojin Zhu
, Yuepeng Wang, Xi Chen
, Yang Wang, Liusheng Huang:
Mutual privacy-preserving regression modeling in participatory sensing. 3039-3047 - Hongbo Liu

, Yang Wang, Jie Yang, Yingying Chen
:
Fast and practical secret key extraction by exploiting channel response. 3048-3056
Cyber-physical systems
- Zimu Zhou, Zheng Yang, Chenshu Wu, Longfei Shangguan, Yunhao Liu:

Towards omnidirectional passive human detection. 3057-3065 - Longfei Shangguan, Zhenjiang Li, Zheng Yang, Mo Li

, Yunhao Liu:
OTrack: Order tracking for luggage in mobile RFID systems. 3066-3074 - Wei Cheng, Kefeng Tan, Victor Omwando, Jindan Zhu, Prasant Mohapatra:

RSS-Ratio for enhancing performance of RSS-based applications. 3075-3083 - Siyao Cheng, Jianzhong Li, Zhipeng Cai:

O(ε)-Approximation to physical world by sensor networks. 3084-3092
Wireless networks 3
- Xinyu Zhang

, Kang G. Shin:
Gap Sense: Lightweight coordination of heterogeneous wireless devices. 3094-3101 - Justin Manweiler, Naveen Santhapuri, Romit Roy Choudhury, Srihari Nelakuditi:

Predicting length of stay at WiFi hotspots. 3102-3110 - Rong Zheng, Thanh Le, Zhu Han:

Approximate online learning for passive monitoring of multi-channel wireless networks. 3111-3119 - Wenchi Cheng, Xi Zhang, Hailin Zhang:

Optimal dynamic power control for full-duplex bidirectional-channel based wireless networks. 3120-3128
GI'2013: 16th IEEE Global Internet Symposium
Global Datasets
- Gautam S. Thakur

, Pan Hui, Ahmed Helmy
:
Modeling and characterization of vehicular density at scale. 3129-3134 - Yi Wang, Michalis Faloutsos

, Hui Zang:
On the usage patterns of multimodal communication: Countries and evolution. 3135-3140 - Matteo Varvello, Moritz Steiner:

DHT-based traffic localization in the wild. 3141-3146
TMA 2013: The 5th IEEE International Traffic Monitoring and Analysis Workshop
DNS Analysis
- Yingdi Yu, Duane Wessels, Matt Larson, Lixia Zhang:

Check-Repeat: A new method of measuring DNSSEC validating resolvers. 3147-3152 - Andreas Berger, Wilfried N. Gansterer

:
Modeling DNS agility with DNSMap. 3153-3158 - Arian Bär, Antonio Paciello, Peter Romirer-Maierhofer:

Trapping botnets by DNS failure graphs: Validation, extension and application to a 3G network. 3159-3164
NetSciCom 2013: Fifth International Workshop on Network Science for Communication Networks 2013
Session 1B
- Ali Tizghadam, Ali Shariat, Alberto Leon-Garcia, Hassan Naser:

Robust QoS-guaranteed network engineering in interference-aware wireless networks. 3165-3170 - Simone Mainardi, Enrico Gregori, Luciano Lenzini:

The twofold nature of autonomous systems: Evidence combining stock market data with topological properties. 3171-3176
INFOCOM'2013 CCSES: 2013 INFOCOM Workshop on Communications and Control for Smart Energy Systems
Consumer Behavior
- S. N. Akshay Uttama Nambi, Thanasis G. Papaioannou

, Dipanjan Chakraborty, Karl Aberer:
Sustainable energy consumption monitoring in residential settings. 3177-3182 - Ugo Montanari, Alain Tcheukam Siwe:

Real time market models and prosumer profiling. 3183-3188
SDP'13: SDP 2013 - IEEE INFOCOM Workshop
Session I: SDP of Content Distribution & Access
- John Tadrous, Atilla Eryilmaz, Hesham El Gamal:

Pricing for demand shaping and proactive download in smart data networks. 3189-3194 - Yih-Farn Robin Chen, Rittwik Jana:

SpeedGate: A smart data pricing testbed based on speed tiers. 3195-3200 - Hyojung Lee, Hyeryung Jang, Yung Yi, Jeong-woo Cho:

On the interaction between content-oriented traffic scheduling and revenue sharing among providers. 3201-3206 - Yang Song, Arun Venkataramani, Lixin Gao:

On the CDN pricing game. 3207-3212 - Matthew Andrews, Ulas Özen

, Martin I. Reiman, Qiong Wang:
Economic models of sponsored content in wireless networks with uncertain demand. 3213-3218
INFOCOM'2013 CCSES: 2013 INFOCOM Workshop on Communications and Control for Smart Energy Systems
Energy Effiency in the Smart Grid
- Sun Sun, Min Dong

, Ben Liang
:
Real-time welfare-maximizing regulation allocation in aggregator-EVs systems. 3219-3224 - Tian Zhang, Wei Chen, Zhu Han, Zhigang Cao:

A cross-layer perspective on energy harvesting aided green communications over fading channels. 3225-3230 - Giulio Betti, Edoardo Amaldi, Antonio Capone

, Giulia Ercolani:
Cost-aware optimization models for communication networks with renewable energy sources. 3231-3236
GI'2013: 16th IEEE Global Internet Symposium
Inferring the Shape of the Internet
- Pietro Marchetta, Antonio Pescapè:

DRAGO: Detecting, quantifying and locating hidden routers in Traceroute IP paths. 3237-3242 - Andra Lutu, Marcelo Bagnulo

, Olaf Maennel
:
The BGP visibility scanner. 3243-3248 - Vasileios Giotsas

, Shi Zhou
:
Improving the discovery of IXP peering links through passive BGP measurements. 3249-3254
NetSciCom 2013: Fifth International Workshop on Network Science for Communication Networks 2013
Session 2
- Eitan Altman, Francesco De Pellegrini, Rachid El Azouzi

, Daniele Miorandi, Tania Jiménez:
Emergence of equilibria from individual strategies in online content diffusion. 3255-3260 - Pavlos Sermpezis, Thrasyvoulos Spyropoulos:

Information diffusion in heterogeneous networks: The configuration model approach. 3261-3266 - Youngmi Jin, Jungseul Ok, Yung Yi, Jinwoo Shin:

On the impact of global information on diffusion of innovations over social networks. 3267-3272 - Konstantinos Poularakis, Leandros Tassiulas:

Surviving in a competitive market of information providers. 3273-3278
TMA 2013: The 5th IEEE International Traffic Monitoring and Analysis Workshop
Network Performances
- Alessio Botta

, Antonio Pescapè:
New generation satellite broadband Internet services: Should ADSL and 3G worry? 3279-3284 - Heng Cui, Ernst W. Biersack:

Troubleshooting slow webpage downloads. 3285-3290 - YiXi Gong, Dario Rossi, Claudio Testa, Silvio Valenti, M. Dave Taht:

Fighting the bufferbloat: On the coexistence of AQM and low priority congestion control. 3291-3296 - Chiara Chirichella, Dario Rossi:

To the Moon and back: Are Internet bufferbloat delays really that large? 3297-3302
SDP'13: SDP 2013 - IEEE INFOCOM Workshop
Session II: SDP of Offloading & Scheduling
- Lin Gao, George Iosifidis

, Jianwei Huang, Leandros Tassiulas:
Economics of mobile data offloading. 3303-3308 - Joohyun Lee

, Yung Yi, Song Chong, Youngmi Jin:
Economics of WiFi offloading: Trading delay for cellular capacity. 3309-3314 - Byung-Gook Kim, Shaolei Ren

, Mihaela van der Schaar
, Jang-Won Lee
:
Tiered billing scheme for residential load scheduling with bidirectional energy trading. 3315-3320 - Ozgur Dalkilic, Ozan Candogan, Atilla Eryilmaz:

Pricing algorithms for the day-ahead electricity market with flexible consumer participation. 3321-3326 - Ming-Jye Sheng, Carlee Joe-Wong, Sangtae Ha, Felix Ming Fai Wong, Soumya Sen:

Smart data pricing: Lessons from trial planning. 3327-3332
GI'2013: 16th IEEE Global Internet Symposium
New Mechanisms
- Larissa Spinelli, Mark Crovella, Brian Eriksson:

AliasCluster: A lightweight approach to interface disambiguation. 3333-3338 - Georg K. Hampel, Moritz Steiner, Tian Bu:

Applying software-defined networking to the telecom domain. 3339-3344 - Yan Shvartzshnaider, Maximilian Ott

, Olivier Mehani
, Guillaume Jourjon, Thierry Rakotoarivelo, David Levy:
Into the Moana1 - Hypergraph-based network layer indirection. 3345-3350 - Gautam S. Thakur

, Ahmed Helmy
:
COBRA: A framework for the analysis of realistic mobility models. 3351-3356
NetSciCom 2013: Fifth International Workshop on Network Science for Communication Networks 2013
Session 3
- Yanhua Li, Moritz Steiner, Limin Wang, Zhi-Li Zhang, Jie Bao:

Exploring venue popularity in Foursquare. 3357-3362 - Yi Wang, Hui Zang, Michalis Faloutsos

:
Inferring cellular user demographic information using homophily on call graphs. 3363-3368 - Tiphaine Phe-Neau, Marcelo Dias de Amorim, Vania Conan:

The strength of vicinity annexation in opportunistic networking. 3369-3374 - Stojan Trajanovski, Fernando A. Kuipers, Piet Van Mieghem:

Finding critical regions in a network. 3375-3380
TMA 2013: The 5th IEEE International Traffic Monitoring and Analysis Workshop
Passive Monitoring and Classification
- Luigi Grimaudo, Marco Mellia

, Elena Baralis, Ram Keralapura:
Self-learning classifier for Internet traffic. 3381-3386 - David Malone

, Darren F. Kavanagh
, Niall Richard Murphy:
Rogue femtocell owners: How Mallory can monitor my devices. 3387-3392 - Stefan Ruehrup, Pierfrancesco Urbano, Andreas Berger, Alessandro D'Alconzo:

Botnet detection revisited: Theory and practice of finding malicious P2P networks via Internet connection graphs. 3393-3398 - Luca Deri, Alfredo Cardigliano, Francesco Fusco

:
10 Gbit line rate packet-to-disk using n2disk. 3399-3404
INFOCOM'2013 CCSES: 2013 INFOCOM Workshop on Communications and Control for Smart Energy Systems
Smart Grid Communications
- Velin Kounev, David Tipper

:
Advanced metering and demand response communication performance in Zigbee based HANs. 3405-3410 - Sören Finster

, Ingmar Baumgart
:
Elderberry: A peer-to-peer, privacy-aware smart metering protocol. 3411-3416 - Hanno Georg, Nils Dorsch, Markus Putzke, Christian Wietfeld

:
Performance evaluation of time-critical communication networks for smart grids based on IEC 61850. 3417-3422
Smart Grid Security
- Ting Liu, Yun Gu, Dai Wang, Yuhong Gui, Xiaohong Guan:

A novel method to detect bad data injection attack in smart grid. 3423-3428 - Hasen Nicanfar, Seyedali Hosseininezhad, Peyman TalebiFard, Victor C. M. Leung

:
Robust privacy-preserving authentication scheme for communication between electric vehicle as power energy storage and power stations. 3429-3434 - Liang Tang, Yun Rui, Qian Wang

, Husheng Li, Zhiyong Bu:
A reverse transmission mechanism for surveillance network in smart grid. 3435-3440
GI'2013: 16th IEEE Global Internet Symposium
New Tools
- Razvan Beuran, Shinsuke Miwa, Yoichi Shinoda:

Network emulation testbed for DTN applications and protocols. 3441-3446 - Selcuk Cevher, Mustafa Ulutas

, Ibrahim Hökelek:
Trade-off analysis of multi topology routing based IP fast reroute mechanisms. 3447-3452 - Han Zhang, Christos Papadopoulos, Daniel Massey:

Detecting encrypted botnet traffic. 3453-3458
NetSciCom 2013: Fifth International Workshop on Network Science for Communication Networks 2013
Session 4
- Valerio Arnaboldi

, Marco Conti
, Andrea Passarella
, Fabio Pezzoni:
Ego networks in Twitter: An experimental analysis. 3459-3464 - Swati Rallapalli, Wei Dong, Gene Moo Lee

, Yi-Chao Chen, Lili Qiu:
Analysis and applications of smartphone user mobility. 3465-3470
TMA 2013: The 5th IEEE International Traffic Monitoring and Analysis Workshop
Global Internet
- Karyn Benson, Alberto Dainotti

, K. C. Claffy
, Emile Aben:
Gaining insight into AS-level outages through analysis of Internet background radiation. 3471-3476 - Pierre-Antoine Vervier, Olivier Thonnard:

SpamTracer: How stealthy are spammers? 3477-3482 - Lior Neudorfer, Yuval Shavitt

, Noa Zilberman
:
Improving AS relationship inference using PoPs. 3483-3488

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














