


default search action
IEEE/ACM Transactions on Networking, Volume 24
Volume 24, Number 1, February 2016
- Reza Abdolee, Benoît Champagne:

Diffusion LMS Strategies in Sensor Networks With Noisy Input Data. 3-14 - Nikolaos Chrysos, Lydia Y. Chen, Christoforos Kachris

, Manolis Katevenis:
Discharging the Network From Its Flow Control Headaches: Packet Drops and HOL Blocking. 15-28 - Emir Kavurmacioglu, Murat Alanyali, David Starobinski:

Competition in Private Commons: Price War or Market Sharing? 29-42 - Hongyu Gao, Vinod Yegneswaran, Jian Jiang, Yan Chen, Phillip A. Porras, Shalini Ghosh, Hai-Xin Duan

:
Reexamining DNS From a Global Recursive Resolver Perspective. 43-57 - Can Zhao, Xiaojun Lin

, Chuan Wu
:
The Streaming Capacity of Sparsely Connected P2P Systems With Distributed Control. 58-71 - Xiaohan Kang, Weina Wang, Juan José Jaramillo

, Lei Ying:
On the Performance of Largest-Deficit-First for Scheduling Real-Time Traffic in Wireless Networks. 72-84 - Chih-Yu Wang, Chun-Han Ko, Hung-Yu Wei

, Athanasios V. Vasilakos
:
A Voting-Based Femtocell Downlink Cell-Breathing Control Mechanism. 85-98 - Lei Jiao

, Jun Li, Tianyin Xu, Wei Du, Xiaoming Fu
:
Optimizing Cost for Online Social Networks on Geo-Distributed Clouds. 99-112 - Mohamed Kashef, Anthony Ephremides:

Optimal Partial Relaying for Energy-Harvesting Wireless Networks. 113-122 - Ted H. Szymanski

:
An Ultra-Low-Latency Guaranteed-Rate Internet for Cloud Services. 123-136 - Eunice Adjarath Lemamou, Philippe Galinier, Steven Chamberland:

A Hybrid Iterated Local Search Algorithm for the Global Planning Problem of Survivable 4G Wireless Networks. 137-148 - Gábor Rétvári, János Tapolcai

, Attila Korösi, András Majdán, Zalán Heszberger:
Compressing IP Forwarding Tables: Towards Entropy Bounds and Beyond. 149-162 - Parinaz Naghizadeh

, Mingyan Liu:
Perceptions and Truth: A Mechanism Design Approach to Crowd-Sourcing Reputation. 163-176 - Zhoujia Mao, Can Emre Koksal, Ness B. Shroff:

Optimal Online Scheduling With Arbitrary Hard Deadlines in Multihop Communication Networks. 177-189 - Weina Wang, Kai Zhu, Lei Ying

, Jian Tan, Li Zhang:
MapTask Scheduling in MapReduce With Data Locality: Throughput and Heavy-Traffic Optimality. 190-203 - Hussein Al-Zubaidy, Jörg Liebeherr, Almut Burchard:

Network-Layer Performance Analysis of Multihop Fading Channels. 204-217 - Marcin Bienkowski

, Leszek Gasieniec, Marek Klonowski, Miroslaw Korzeniowski, Bernard Mans
, Stefan Schmid
, Roger Wattenhofer:
Distributed Alarming in the On-Duty and Off-Duty Models. 218-230 - Chen Qian, Simon S. Lam:

A Scalable and Resilient Layer-2 Network With Ethernet Compatibility. 231-244 - Eleni Stai, Symeon Papavassiliou, John S. Baras:

Performance-Aware Cross-Layer Design in Wireless Multihop Networks Via a Weighted Backpressure Approach. 245-258 - Xiaowen Gong, Junshan Zhang, Douglas Cochran, Kai Xing:

Optimal Placement for Barrier Coverage in Bistatic Radar Sensor Networks. 259-271 - Feng Wang, Jiangchuan Liu, Minghua Chen, Haiyang Wang:

Migration Towards Cloud-Assisted Live Media Streaming. 272-282 - Soheil Eshghi

, M. H. R. Khouzani, Saswati Sarkar, Santosh S. Venkatesh:
Optimal Patching in Clustered Malware Epidemics. 283-298 - Giusi Alfano, Michele Garetto

, Emilio Leonardi
:
Content-Centric Wireless Networks With Limited Buffers: When Mobility Hurts. 299-311 - Ziling Zhou, Binbin Chen

, Haifeng Yu:
Understanding RFID Counting Protocols. 312-327 - Guang Tan, Zhimeng Yin, Hongbo Jiang:

Trap Array: A Unified Model for Scalability Evaluation of Geometric Routing. 328-341 - Jeremy M. Plante, Arush Gadkar, Vinod M. Vokkarane

:
Manycast Overlay in Split-Incapable Networks for Supporting Bandwidth-Intensive Applications. 342-354 - Robert Margolies

, Ashwin Sridharan, Vaneet Aggarwal
, Rittwik Jana, N. K. Shankaranarayanan, Vinay A. Vaishampayan
, Gil Zussman:
Exploiting Mobility in Proportional Fair Cellular Scheduling: Measurements and Algorithms. 355-367 - Pedro E. Santacruz

, Vaneet Aggarwal
, Ashutosh Sabharwal:
Leveraging Physical-Layer Capabilites: Distributed Scheduling in Interference Networks With Local Views. 368-382 - Kundan Kandhway, Joy Kuri:

Campaigning in Heterogeneous Social Networks: Optimal Control of SI Information Epidemics. 383-396 - Wen Luo, Yan Qiao, Shigang Chen, Min Chen:

An Efficient Protocol for RFID Multigroup Threshold-Based Classification Based on Sampling and Logical Bitmap. 397-407 - Kai Zhu, Lei Ying

:
Information Source Detection in the SIR Model: A Sample-Path-Based Approach. 408-421 - Chen Chen, Hans-Arno Jacobsen, Roman Vitenberg:

Algorithms Based on Divide and Conquer for Topic-Based Publish/Subscribe Overlay Design. 422-436 - Valentino Pacifici

, Frank Lehrieder, György Dán:
Cache Bandwidth Allocation for P2P File-Sharing Systems to Minimize Inter-ISP Traffic. 437-448 - Qiang Liu, Xin Wang, Nageswara S. V. Rao

, Katharine Brigham, B. V. K. Vijaya Kumar
:
Effect of Retransmission and Retrodiction on Estimation and Fusion in Long-Haul Sensor Networks. 449-461 - Fengyu Gao, Hongyan Qian:

Efficient, Real-World Token Bucket Configuration for Residential Gateways. 462-475 - Sophia Athanasiadou, Marios Gatzianas

, Leonidas Georgiadis, Leandros Tassiulas:
Stable XOR-Based Policies for the Broadcast Erasure Channel With Feedback. 476-491 - Albert Banchs, Jorge Ortín

, Andres Garcia-Saavedra
, Douglas J. Leith
, Pablo Serrano
:
Thwarting Selfish Behavior in 802.11 WLANs. 492-505 - Florin Coras

, Jordi Domingo-Pascual, Darrel Lewis, Albert Cabellos-Aparicio:
An Analytical Model for Loc/ID Mappings Caches. 506-516 - Yi Gao, Wei Dong, Chun Chen, Jiajun Bu, Wenbin Wu, Xue Liu:

iPath: Path Inference in Wireless Sensor Networks. 517-528 - Jayakrishnan Nair, Martin Andreasson, Lachlan L. H. Andrew, Steven H. Low, John C. Doyle:

On Channel Failures, File Fragmentation Policies, and Heavy-Tailed Completion Times. 529-541 - Mohammad Hadi Afrasiabi, Roch Guérin:

Exploring User-Provided Connectivity. 542-554 - Ori Rottenstreich, Isaac Keslassy

, Avinatan Hassidim, Haim Kaplan, Ely Porat:
Optimal In/Out TCAM Encodings of Ranges. 555-568 - Flavio Esposito, Donato Di Paola

, Ibrahim Matta
:
On Distributed Virtual Network Embedding With Guarantees. 569-582 - Xiao-chun Yun, Yipeng Wang, Yongzheng Zhang, Yu Zhou

:
A Semantics-Aware Approach to the Automated Network Protocol Identification. 583-595 - Qiuyu Peng, Anwar Walid, Jaehyun Hwang, Steven H. Low:

Multipath TCP: Analysis, Design, and Implementation. 596-609 - James Daly, Alex X. Liu, Eric Torng:

A Difference Resolution Approach to Compressing Access Control Lists. 610-623 - Ahmed Farhan Hanif, Hamidou Tembine

, Mohamad Assaad, Djamal Zeghlache
:
Mean-Field Games for Resource Sharing in Cloud-Based Networks. 624-637
Volume 24, Number 2, April 2016
- Dong Zhao, Xiang-Yang Li, Huadong Ma:

Budget-Feasible Online Incentive Mechanisms for Crowdsourcing Tasks Truthfully. 647-661 - Daibo Liu, Mengshu Hou

, Zhichao Cao, Jiliang Wang, Yuan He
, Yunhao Liu:
Duplicate Detectable Opportunistic Forwarding in Duty-Cycled Wireless Sensor Networks. 662-673 - Joaquim Oller, Ilker Demirkol

, Jordi Casademont
, Josep Paradells
, Gerd Ulrich Gamm, Leonhard M. Reindl:
Has Time Come to Switch From Duty-Cycled MAC Protocols to Wake-Up Radio for Wireless Sensor Networks? 674-687 - Abhishek Mishra, Parv Venkitasubramaniam

:
Anonymity and Fairness in Packet Scheduling: A Quantitative Tradeoff. 688-702 - Min Chen, Wen Luo, Zhen Mo, Shigang Chen, Yuguang Fang

:
An Efficient Tag Search Protocol in Large-Scale RFID Systems With Noisy Channel. 703-716 - Alireza Shams Shafigh, Beatriz Lorenzo

, Savo Glisic, Jordi Pérez-Romero
, Luiz A. DaSilva, Allen B. MacKenzie
, Juha Röning
:
A Framework for Dynamic Network Architecture and Topology Optimization. 717-730 - Zakaria Al-Qudah, Eamon Johnson, Michael Rabinovich

, Oliver Spatscheck:
Internet With Transient Destination-Controlled Addressing. 731-744 - Zhi Zhang, Yigal Bejerano, Spyridon Antonakopoulos:

Energy-Efficient IP Core Network Configuration Under General Traffic Demands. 745-758 - Michael J. Neely:

Distributed Stochastic Optimization via Correlated Scheduling. 759-772 - Md. Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos

:
Detecting Malicious Facebook Applications. 773-787 - Xudong Wang, Wenguang Mao:

Analog Network Coding Without Restrictions on Superimposed Frames. 788-805 - Tong Meng

, Fan Wu, Guihai Chen
:
Code-Based Neighbor Discovery Protocols in Mobile Wireless Networks. 806-819 - Vinay Joseph

, Sem C. Borst, Martin I. Reiman:
Optimal Rate Allocation for Video Streaming in Wireless Networks With User Dynamics. 820-835 - Ramtin Pedarsani, Mohammad Ali Maddah-Ali, Urs Niesen:

Online Coded Caching. 836-845 - Jinsong Han

, Chen Qian, Panlong Yang, Dan Ma, Zhiping Jiang, Wei Xi, Jizhong Zhao:
GenePrint: Generic and Accurate Physical-Layer Identification for UHF RFID Tags. 846-858 - Kun Xie, Xin Wang, Jigang Wen, Jiannong Cao

:
Cooperative Routing With Relay Assignment in Multiradio Multihop Wireless Networks. 859-872 - Jian Guo, Fangming Liu, John C. S. Lui, Hai Jin:

Fair Network Bandwidth Allocation in IaaS Datacenters via a Cooperative Game Approach. 873-886 - Hongkun Yang, Simon S. Lam:

Real-Time Verification of Network Properties Using Atomic Predicates. 887-900 - Mustafa Y. Arslan, Karthikeyan Sundaresan, Srikanth V. Krishnamurthy

, Sampath Rangarajan:
iBUS: An Integrated Beamformer and Uplink Scheduler for OFDMA Small Cells. 901-914 - Karthikeyan Sundaresan, Mustafa Y. Arslan, Shailendra Singh, Sampath Rangarajan, Srikanth V. Krishnamurthy

:
FluidNet: A Flexible Cloud-Based Radio Access Network for Small Cells. 915-928 - Huiyuan Zhang, Dung T. Nguyen, Huiling Zhang, My T. Thai:

Least Cost Influence Maximization Across Multiple Social Networks. 929-939 - Chee Wei Tan

:
Optimal Power Control in Rayleigh-Fading Heterogeneous Wireless Networks. 940-953 - Ying Cui, Edmund M. Yeh, Ran Liu:

Enhancing the Delay Performance of Dynamic Backpressure Algorithms. 954-967 - Rihua Wei, Yang Xu

, H. Jonathan Chao:
Finding Nonequivalent Classifiers in Boolean Space to Reduce TCAM Usage. 968-981 - Jayakrishnan Nair, Krishna P. Jagannathan

, Adam Wierman:
When Heavy-Tailed and Light-Tailed Flows Compete: The Response Time Tail Under Generalized Max-Weight Scheduling. 982-995 - Hasti A. Pedersen, Sujit Dey:

Enhancing Mobile Video Capacity and Quality Using Rate Adaptation, RAN Caching and Processing. 996-1010 - Mingchen Zhao, Wenchao Zhou, Alexander J. T. Gurney, Andreas Haeberlen

, Micah Sherr, Boon Thau Loo
:
Private and Verifiable Interdomain Routing Decisions. 1011-1024 - Han Cai, Irem Koprulu, Ness B. Shroff:

Exploiting Double Opportunities for Latency-Constrained Content Propagation in Wireless Networks. 1025-1037 - Tao Han, Nirwan Ansari

:
A Traffic Load Balancing Framework for Software-Defined Radio Access Networks Powered by Hybrid Energy Sources. 1038-1051 - Wei Gong, Ivan Stojmenovic, Amiya Nayak

, Kebin Liu, Haoxiang Liu:
Fast and Scalable Counterfeits Estimation for Large-Scale RFID Systems. 1052-1064 - Chandramani Kishore Singh, Anurag Kumar

, Rajesh Sundaresan:
Combined Base Station Association and Power Control in Multichannel Cellular Networks. 1065-1080 - Dong-Hoon Shin, Shibo He, Junshan Zhang:

Robust and Cost-Effective Design of Cyber-Physical Systems: An Optimal Middleware Deployment Approach. 1081-1094 - Sang-Yoon Chang, Yih-Chun Hu, Nicola Laurenti:

SimpleMAC: A Simple Wireless MAC-Layer Countermeasure to Intelligent and Insider Jammers. 1095-1108 - Gaurav Agrawal, Deep Medhi

:
Embedding IP Unique Shortest Path Topology on a Wavelength-Routed Network: Normal and Survivable Design. 1109-1124 - Dao-Yuan Chang, Pi-Chung Wang

:
TCAM-Based Multi-Match Packet Classification Using Multidimensional Rule Layering. 1125-1138 - Xuanyu Cao

, Jinbei Zhang, Luoyi Fu, Weijie Wu, Xinbing Wang:
Optimal Secrecy Capacity-Delay Tradeoff in Large-Scale Mobile Ad Hoc Networks. 1139-1152 - Zhangyu Guan, Tommaso Melodia

, Gesualdo Scutari:
To Transmit or Not to Transmit? Distributed Queueing Games in Infrastructureless Wireless Networks. 1153-1166 - Abhijeet Bhorkar, Mohammad Naghshvar, Tara Javidi

:
Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks. 1167-1180 - Yunus Sarikaya

, Can Emre Koksal, Özgür Erçetin:
Dynamic Network Control for Confidential Multi-Hop Communications. 1181-1195 - Majed Alresaini, Kwame-Lante Wright, Bhaskar Krishnamachari, Michael J. Neely:

Backpressure Delay Enhancement for Encounter-Based Mobile Networks While Sustaining Throughput Optimality. 1196-1208 - Guan-Hua Tu

, Yuanjie Li, Chunyi Peng, Chi-Yu Li
, Songwu Lu:
Detecting Problematic Control-Plane Protocol Interactions in Mobile Networks. 1209-1222 - Ashok Anand, Athula Balachandran, Aditya Akella, Vyas Sekar, Srinivasan Seshan

:
Enhancing Video Accessibility and Availability Using Information-Bound References. 1223-1236 - Andra Lutu, Marcelo Bagnulo

, Cristel Pelsser
, Olaf Maennel
, Jesús Cid-Sueiro
:
The BGP Visibility Toolkit: Detecting Anomalous Internet Routing Behavior. 1237-1250 - Kirill Kogan

, Sergey I. Nikolenko
, Ori Rottenstreich, William Culhane
, Patrick Eugster:
Exploiting Order Independence for Scalable and Expressive Packet Classification. 1251-1264 - Shizhen Zhao, Xiaojun Lin

:
Design of Scheduling Algorithms for End-to-End Backlog Minimization in Wireless Multi-Hop Networks Under K-Hop Interference Models. 1265-1278 - Qingsi Wang, Mingyan Liu:

Learning in Hide-and-Seek. 1279-1292
Volume 24, Number 3, June 2016
- Alex X. Liu, Chad R. Meiners, Eric Torng:

Packet Classification Using Binary Content Addressable Memory. 1295-1307 - M. Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Shobha Venkataraman, Jia Wang:

Characterizing and Optimizing Cellular Network Performance During Crowded Events. 1308-1321 - Soongeol Kwon, Natarajan Gautam:

Time-Stable Performance in Parallel Queues With Non-Homogeneous and Multi-Class Workloads. 1322-1335 - Abishek Gopalan, Srinivasan Ramasubramanian:

IP Fast Rerouting and Disjoint Multipath Routing With Three Edge-Independent Spanning Trees. 1336-1349 - Yi Qin, Xiaohua Tian, Weijie Wu, Xinbing Wang:

Mobility Weakens the Distinction Between Multicast and Unicast. 1350-1363 - Yu Lu

, Mehul Motani
, Wai-Choong Wong
:
A QoE-Aware Resource Distribution Framework Incentivizing Context Sharing and Moderate Competition. 1364-1377 - Richard J. La:

Interdependent Security With Strategic Agents and Cascades of Infection. 1378-1391 - Yi Gao, Wei Dong, Wenbin Wu, Chun Chen, Xiang-Yang Li, Jiajun Bu:

Scalpel: Scalable Preferential Link Tomography Based on Graph Trimming. 1392-1403 - Jia Liu, Ness B. Shroff, Cathy H. Xia, Hanif D. Sherali:

Joint Congestion Control and Routing Optimization: An Efficient Second-Order Distributed Approach. 1404-1420 - Stefan Schmid

, Chen Avin
, Christian Scheideler, Michael Borokhovich, Bernhard Haeupler
, Zvi Lotker:
SplayNet: Towards Locally Self-Adjusting Networks. 1421-1433 - Wei Dai, Scott Jordan:

ISP Service Tier Design. 1434-1447 - Tian Pan

, Ting Zhang, Junxiao Shi
, Yang Li, Linxiao Jin, Fuliang Li, Jiahai Yang, Beichuan Zhang, Xueren Yang, Mingui Zhang, Huichen Dai, Bin Liu:
Towards Zero-Time Wakeup of Line Cards in Power-Aware Routers. 1448-1461 - Kai Han, Chi Zhang, Jun Luo

:
Taming the Uncertainty: Budget Limited Robust Crowdsensing Through Online Learning. 1462-1475 - Changhee Joo, Xiaojun Lin, Jiho Ryu, Ness B. Shroff:

Distributed Greedy Approximation to Maximum Weighted Independent Set for Scheduling With Fading Channels. 1476-1488 - Matti Siekkinen

, Mohammad Ashraful Hoque, Jukka K. Nurminen
:
Using Viewing Statistics to Control Energy and Traffic Overhead in Mobile Video Streaming. 1489-1503 - Huasen Wu, Xiaojun Lin, Xin Liu, Youguang Zhang:

Application-Level Scheduling With Probabilistic Deadline Constraints. 1504-1517 - Rafael P. Laufer, Leonard Kleinrock:

The Capacity of Wireless CSMA/CA Networks. 1518-1532 - Morteza Mardani, Georgios B. Giannakis

:
Estimating Traffic and Anomaly Maps via Network Tomography. 1533-1547 - Yan Qiao, Shigang Chen, Tao Li, Shiping Chen:

Tag-Ordering Polling Protocols in RFID Systems. 1548-1561 - Sachin Kadloor, Negar Kiyavash, Parv Venkitasubramaniam

:
Mitigating Timing Side Channel in Shared Schedulers. 1562-1573 - Pouya Ostovari

, Jie Wu, Abdallah Khreishah
, Ness B. Shroff:
Scalable Video Streaming With Helper Nodes Using Random Linear Network Coding. 1574-1587 - Ahmad Beirami

, Mohsen Sardari, Faramarz Fekri
:
Packet-Level Network Compression: Realization and Scaling of the Network-Wide Benefits. 1588-1604 - Jinsong Han, Chen Qian, Xing Wang, Dan Ma, Jizhong Zhao, Wei Xi, Zhiping Jiang, Zhi Wang:

Twins: Device-Free Object Tracking Using Passive Tags. 1605-1617 - Hang Li

, Chuan Huang, Ping Zhang, Shuguang Cui
, Junshan Zhang:
Distributed Opportunistic Scheduling for Energy Harvesting Based Wireless Networks: A Two-Stage Probing Approach. 1618-1631 - Yongmin Zhang, Shibo He, Jiming Chen:

Data Gathering Optimization by Dynamic Sensing and Routing in Rechargeable Sensor Networks. 1632-1646 - Jeongho Kwak, Okyoung Choi, Song Chong, Prasant Mohapatra:

Processor-Network Speed Scaling for Energy-Delay Tradeoff in Smartphone Applications. 1647-1660 - Jongho Won, Chris Y. T. Ma, David K. Y. Yau, Nageswara S. V. Rao

:
Privacy-Assured Aggregation Protocol for Smart Metering: A Proactive Fault-Tolerant Approach. 1661-1674 - Zhangyu Guan, Tommaso Melodia

, Dongfeng Yuan, Dimitris A. Pados:
Distributed Resource Management for Cognitive Ad Hoc Networks With Cooperative Relays. 1675-1689 - Sharayu Moharir, Sujay Sanghavi, Sanjay Shakkottai

:
Online Load Balancing Under Graph Constraints. 1690-1703 - Matteo Avalle, Fulvio Risso

, Riccardo Sisto:
Scalable Algorithms for NFA Multi-Striding and NFA-Based Deep Packet Inspection on GPUs. 1704-1717 - Kobi Cohen

, Amir Leshem
:
Distributed Game-Theoretic Optimization and Management of Multichannel ALOHA Networks. 1718-1731 - Dejun Yang

, Guoliang Xue, Xi Fang, Jian Tang:
Incentive Mechanisms for Crowdsensing: Crowdsourcing With Smartphones. 1732-1744 - Jinsung Lee, Hojin Lee, Yung Yi, Song Chong, Edward W. Knightly, Mung Chiang:

Making 802.11 DCF Near-Optimal: Design, Implementation, and Evaluation. 1745-1758 - Kai Liu, Joseph Kee-Yin Ng, Victor C. S. Lee, Sang Hyuk Son, Ivan Stojmenovic:

Cooperative Data Scheduling in Hybrid Vehicular Ad Hoc Networks: VANET as a Software Defined Network. 1759-1773 - Seon-Yeong Han, Nael B. Abu-Ghazaleh

, Dongman Lee:
Efficient and Consistent Path Loss Model for Mobile Network Simulation. 1774-1786 - Hulya Seferoglu, Eytan H. Modiano:

Separation of Routing and Scheduling in Backpressure-Based Wireless Networks. 1787-1800 - Wenzhuo Ouyang, Atilla Eryilmaz, Ness B. Shroff:

Downlink Scheduling Over Markovian Fading Channels. 1801-1812 - Roberto Gonzalez, Rubén Cuevas Rumín

, Reza Motamedi, Reza Rejaie, Ángel Cuevas
:
Assessing the Evolution of Google+ in Its First Two Years. 1813-1826 - Hongxing Li, Chuan Wu

, Zongpeng Li, Francis C. M. Lau:
Virtual Machine Trading in a Federation of Clouds: Individual Profit and Social Welfare Maximization. 1827-1840 - Xun Gong, Negar Kiyavash:

Quantifying the Information Leakage in Timing Side Channels in Deterministic Work-Conserving Schedulers. 1841-1852 - Jose Yallouz, Ori Rottenstreich, Ariel Orda:

Tunable Survivable Spanning Trees. 1853-1866 - Bin Li

, Ruogu Li, Atilla Eryilmaz:
Wireless Scheduling Design for Optimizing Both Service Regularity and Mean Delay in Heavy-Traffic Regimes. 1867-1880 - Qianyi Huang, Yang Gui, Fan Wu, Guihai Chen, Qian Zhang:

A General Privacy-Preserving Auction Mechanism for Secondary Spectrum Markets. 1881-1893 - Arnob Ghosh, Saswati Sarkar:

Quality-Sensitive Price Competition in Secondary Market Spectrum Oligopoly - Single Location Game. 1894-1907 - Zizhong Cao, Murali S. Kodialam, T. V. Lakshman:

Joint Static and Dynamic Traffic Scheduling in Data Center Networks. 1908-1918 - Zhenzhe Zheng, Fan Wu, Shaojie Tang, Guihai Chen

:
AEGIS: An Unknown Combinatorial Auction Mechanism Framework for Heterogeneous Spectrum Redistribution in Noncooperative Wireless Networks. 1919-1932
Volume 24, Number 4, August 2016
- Hamlet Medina Ruiz, Michel Kieffer

, Béatrice Pesquet-Popescu:
TCP and Network Coding: Equilibrium and Dynamic Properties. 1935-1947 - Zhidan Liu, Zhenjiang Li, Mo Li

, Wei Xing, Dongming Lu:
Path Reconstruction in Dynamic Wireless Sensor Networks Using Compressive Sensing. 1948-1960 - Gaurav Raina

, Sreelakshmi Manjunath
, Sai Prasad, Krishnamurthy Giridhar:
Stability and Performance Analysis of Compound TCP With REM and Drop-Tail Queue Management. 1961-1974 - Jianxia Ning, Shailendra Singh, Konstantinos Pelechrinis, Bin Liu, Srikanth V. Krishnamurthy

, Ramesh Govindan:
Forensic Analysis of Packet Losses in Wireless Networks. 1975-1988 - Yi Qin, Riheng Jia, Jinbei Zhang, Weijie Wu, Xinbing Wang:

Impact of Social Relation and Group Size in Multicast Ad Hoc Networks. 1989-2004 - Ahmed Osama Fathy Atya

, Ioannis Broustis, Shailendra Singh, Dimitris Syrivelis, Srikanth V. Krishnamurthy
, Thomas F. La Porta:
A Policy-Aware Enforcement Logic for Appropriately Invoking Network Coding. 2005-2018 - Pooja Vyavahare

, Nutan Limaye, D. Manjunath:
Optimal Embedding of Functions for In-Network Computation: Complexity Analysis and Algorithms. 2019-2032 - Prasanna Chaporkar, Stefan Magureanu, Alexandre Proutière:

Optimal Distributed Scheduling in Wireless Networks Under the SINR Interference Model. 2033-2045 - Mihalis G. Markakis, Eytan H. Modiano, John N. Tsitsiklis:

Delay Stability of Back-Pressure Policies in the Presence of Heavy-Tailed Traffic. 2046-2059 - Weijie Shi, Linquan Zhang, Chuan Wu

, Zongpeng Li, Francis C. M. Lau:
An Online Auction Framework for Dynamic Resource Provisioning in Cloud Computing. 2060-2073 - Reuven Cohen, Gabi Nakibly:

Restorable Logical Topology in the Face of No or Partial Traffic Demand Knowledge. 2074-2085 - Jeffrey Wildman

, Steven Weber:
On Characterizing the Local Pooling Factor of Greedy Maximal Scheduling in Random Graphs. 2086-2099 - Chen Qian, Simon S. Lam:

Greedy Routing by Network Distance Embedding. 2100-2113 - David L. Applegate, Aaron Archer, Vijay Gopalakrishnan, Seungjoon Lee, K. K. Ramakrishnan

:
Optimal Content Placement for a Large-Scale VoD System. 2114-2127 - Xiaofei Liao, Li Lin, Guang Tan, Hai Jin, Xiaobin Yang, Wei Zhang, Bo Li:

LiveRender: A Cloud Gaming System Based on Compressed Graphics Streaming. 2128-2139 - Bassel Saleh, Dongyu Qiu:

Performance Analysis of Network-Coding-Based P2P Live Streaming Systems. 2140-2153 - Luwei Cheng, Francis C. M. Lau:

Revisiting TCP Congestion Control in a Virtual Cluster Environment. 2154-2167 - Guanfeng Liang, Ulas C. Kozat:

On Throughput-Delay Optimal Access to Storage Clouds via Load Adaptive Coding and Chunking. 2168-2181 - Anh Le, Athina Markopoulou

, Alexandros G. Dimakis:
Auditing for Distributed Storage Systems. 2182-2195 - Zain Shamsi

, Ankur Nandwani, Derek Leonard, Dmitri Loguinov:
Hershel: Single-Packet OS Fingerprinting. 2196-2209 - Yang Peng, Kai Chen

, Guohui Wang, Wei Bai, Yangming Zhao, Hao Wang, Yanhui Geng, Zhiqiang Ma, Lin Gu:
Towards Comprehensive Traffic Forecasting in Cloud Computing: Design and Application. 2210-2222 - Michael J. Neely:

Energy-Aware Wireless Scheduling With Near-Optimal Backlog and Convergence Time Tradeoffs. 2223-2236 - Longbo Huang, Shaoquan Zhang, Minghua Chen

, Xin Liu:
When Backpressure Meets Predictive Scheduling. 2237-2250 - Joachim Fabini, Tanja Zseby:

The Right Time: Reducing Effective End-to-End Delay in Time-Slotted Packet-Switched Networks. 2251-2263 - Xiaohan Wei, Michael J. Neely:

Power-Aware Wireless File Downloading: A Lyapunov Indexing Approach to a Constrained Restless Bandit Problem. 2264-2277 - Jaewook Kwak, Chul-Ho Lee, Do Young Eun

:
A High-Order Markov-Chain-Based Scheduling Algorithm for Low Delay in CSMA Networks. 2278-2290 - Mehdi Nikkhah, Roch Guérin:

Migrating the Internet to IPv6: An Exploration of the When and Why. 2291-2304 - Rui Li, Alex X. Liu, Ann L. Wang, Bezawada Bruhadeshwar

:
Fast and Scalable Range Query Processing With Strong Privacy Protection for Cloud Computing. 2305-2318 - Joongheon Kim

, Giuseppe Caire, Andreas F. Molisch:
Quality-Aware Streaming and Scheduling for Device-to-Device Video Delivery. 2319-2331 - MohammadJavad Hajikhani, Thomas Kunz

, Howard Schwartz:
A Recursive Method for Clock Synchronization in Asymmetric Packet-Based Networks. 2332-2342 - Cheng-Shang Chang, Wanjiun Liao

, Tsung Ying Wu:
Tight Lower Bounds for Channel Hopping Schemes in Cognitive Radio Networks. 2343-2356 - John Tadrous, Atilla Eryilmaz, Hesham El Gamal:

Joint Smart Pricing and Proactive Content Caching for Mobile Services. 2357-2371 - Wei Dong, Jie Yu, Jiliang Wang, Xuefeng Zhang, Yi Gao, Chun Chen, Jiajun Bu:

Accurate and Robust Time Reconstruction for Deployed Sensor Networks. 2372-2385 - Guibin Tian, Yong Liu

:
Towards Agile and Smooth Video Adaptation in HTTP Adaptive Streaming. 2386-2399 - Alex X. Liu, Eric Torng:

Overlay Automata and Algorithms for Fast and Scalable Regular Expression Matching. 2400-2415 - Jaeseong Jeong

, Yung Yi, Jeong-woo Cho, Do Young Eun
, Song Chong:
Energy-Efficient Wi-Fi Sensing Policy Under Generalized Mobility Patterns With Aging. 2416-2428 - Gianfranco Nencioni

, Nishanth Sastry
, Gareth Tyson, Vijay Badrinarayanan, Dmytro Karamshuk, Jigna Chandaria, Jon Crowcroft
:
SCORE: Exploiting Global Broadcasts to Create Offline Personal Channels for On-Demand Access. 2429-2442 - Yu Xiang, Tian Lan, Vaneet Aggarwal

, Yih-Farn Robin Chen:
Joint Latency and Cost Optimization for Erasure-Coded Data Center Storage. 2443-2457 - Srikanth Hariharan, Ness B. Shroff:

On Sample-Path Optimal Dynamic Scheduling for Sum-Queue Minimization in Trees Under the K-Hop Interference Model. 2458-2471 - Chen Wang

, Hongbo Jiang, Tianlong Yu, John C. S. Lui:
SLICE: Enabling Greedy Routing in High Genus 3-D WSNs With General Topologies. 2472-2484 - Wei Dong, Swati Rallapalli, Lili Qiu, K. K. Ramakrishnan

, Yin Zhang:
Double Auctions for Dynamic Spectrum Allocation. 2485-2497 - Wan Du, Zhenjiang Li, Jansen Christian Liando, Mo Li

:
From Rateless to Distanceless: Enabling Sparse Sensor Network Deployment in Large Areas. 2498-2511 - Felix Ming Fai Wong, Zhenming Liu, Mung Chiang:

On the Efficiency of Social Recommender Networks. 2512-2524 - Lidia Donvito, Laura Galluccio, Alfio Lombardo

, Giacomo Morabito:
μ-NET: A Network for Molecular Biology Applications in Microfluidic Chips. 2525-2538 - Mehdi Malboubi, Cuong Vu, Chen-Nee Chuah

, Puneet Sharma:
Decentralizing Network Inference Problems With Multiple-Description Fusion Estimation (MDFE). 2539-2552 - Tobias Harks, Martin Hoefer, Kevin Schewior

, Alexander Skopalik:
Routing Games With Progressive Filling. 2553-2562 - Richard T. B. Ma

:
Subsidization Competition: Vitalizing the Neutral Internet. 2563-2576
Volume 24, Number 5, October 2016
- Huasen Wu, Xiaojun Lin, Xin Liu, Kun Tan, Yongguang Zhang:

CoSchd: Coordinated Scheduling With Channel and Load Awareness for Alleviating Cellular Congestion. 2579-2592 - Di Niu, Baochun Li:

An Asynchronous Fixed-Point Algorithm for Resource Sharing With Coupled Objectives. 2593-2606 - Can Zhao, Jian Zhao, Xiaojun Lin

, Chuan Wu
:
Capacity of P2P On-Demand Streaming With Simple, Robust, and Decentralized Control. 2607-2620 - Luis Amaral Lopes

, Rute C. Sofia
, Huseyin Haci, Huiling Zhu:
A Proposal for Dynamic Frequency Sharing in Wireless Networks. 2621-2633 - Karla Kvaternik, Jaime Llorca

, Daniel C. Kilper
, Lacra Pavel
:
A Methodology for the Design of Self-Optimizing, Decentralized Content-Caching Strategies. 2634-2647 - Shravan Garlapati

, P. Teja Kuruganti, R. Michael Buehrer, Jeffrey H. Reed:
SMAC: A Soft MAC to Reduce Control Overhead and Latency in CDMA-Based AMI Networks. 2648-2662 - Angelos Chatzipapas, Vincenzo Mancuso

:
An M/G/1 Model for Gigabit Energy Efficient Ethernet Links With Coalescing and Real-Trace-Based Evaluation. 2663-2675 - Víctor Valls, Douglas J. Leith

:
Max-Weight Revisited: Sequences of Nonconvex Optimizations Solving Convex Optimizations. 2676-2689 - Bei Liu, Wei Wang, Donghyun Kim, Deying Li, Jingyi Wang, Alade O. Tokuta, Yaolin Jiang:

On Approximating Minimum 3-Connected m-Dominating Set Problem in Unit Disk Graph. 2690-2701 - Yuxiao Hou, Jiajue Ou, Yuanqing Zheng, Mo Li

:
PLACE: Physical Layer Cardinality Estimation for Large-Scale RFID Systems. 2702-2714 - John Tadrous, Atilla Eryilmaz:

On Optimal Proactive Caching for Mobile Networks With Demand Uncertainties. 2715-2727 - Matteo Varvello, Rafael P. Laufer, Feixiong Zhang, T. V. Lakshman:

Multilayer Packet Classification With Graphics Processing Units. 2728-2741 - Sen Wang, Jun Bi, Jianping Wu, Athanasios V. Vasilakos

:
CPHR: In-Network Caching for Information-Centric Networking With Partitioning and Hash-Routing. 2742-2755 - Wei Gong, Haoxiang Liu, Lei Chen, Kebin Liu, Yunhao Liu:

Fast Composite Counting in RFID Systems. 2756-2767 - Shuihai Hu

, Kai Chen
, Haitao Wu, Wei Bai
, Chang Lan, Hao Wang, Hongze Zhao, Chuanxiong Guo
:
Explicit Path Control in Commodity Data Centers: Design and Applications. 2768-2781 - Guodong Shi, Bo Li, Mikael Johansson, Karl Henrik Johansson

:
Finite-Time Convergent Gossiping. 2782-2794 - Xu Chen, Lei Jiao

, Wenzhong Li, Xiaoming Fu
:
Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing. 2795-2808 - Johannes Dams, Martin Hoefer, Thomas Kesselheim:

Jamming-Resistant Learning in Wireless Networks. 2809-2818 - Mingyang Zhang, Changsheng You, Zuqing Zhu

:
On the Parallelization of Spectrum Defragmentation Reconfigurations in Elastic Optical Networks. 2819-2833 - Jinxue Zhang, Rui Zhang

, Jingchao Sun, Yanchao Zhang, Chi Zhang:
TrueTop: A Sybil-Resilient System for User Influence Measurement on Twitter. 2834-2846 - Donggyu Yun, Dongmyung Lee, Se-Young Yun, Jinwoo Shin, Yung Yi:

Delay Optimal CSMA With Linear Virtual Channels Under a General Topology. 2847-2857 - Xiaoyong Li, Daren B. H. Cline, Dmitri Loguinov:

On Sample-Path Staleness in Lazy Data Replication. 2858-2871 - Stepán Kucera, David López-Pérez:

Inter-Cell Interference Coordination for Control Channels in LTE Heterogeneous Networks. 2872-2884 - Jinsong Han, Han Ding, Chen Qian, Wei Xi, Zhi Wang, Zhiping Jiang, Longfei Shangguan, Jizhong Zhao:

CBID: A Customer Behavior Identification System Using Passive Tags. 2885-2898 - Ulas C. Kozat, Guanfeng Liang, Koray Kokten, János Tapolcai

:
On Optimal Topology Verification and Failure Localization for Software Defined Networks. 2899-2912 - Dan Li, Yirong Yu, Junxiao Shi

, Beichuan Zhang:
PALS: Saving Network Power With Low Overhead to ISPs and Applications. 2913-2925 - Xiang Wang, Weiqi Shi, Yang Xiang, Jun Li:

Efficient Network Security Policy Enforcement With Policy Space Analysis. 2926-2938 - Sonia A. Bhaskar:

Localization From Connectivity: A 1-bit Maximum Likelihood Approach. 2939-2953 - Arpan Chattopadhyay, Marceau Coupechoux, Anurag Kumar

:
Sequential Decision Algorithms for Measurement-Based Impromptu Deployment of a Wireless Relay Network Along a Line. 2954-2968 - Yang Song, Arun Venkataramani, Lixin Gao:

Identifying and Addressing Reachability and Policy Attacks in "Secure" BGP. 2969-2982 - Anh Le, Lorenzo Keller, Hulya Seferoglu, Blerim Cici, Christina Fragouli, Athina Markopoulou

:
MicroCast: Cooperative Video Streaming Using Cellular and Local Connections. 2983-2999 - Se-Young Yun, Jinwoo Shin, Yung Yi:

Distributed Medium Access Over Time-Varying Channels. 3000-3013 - Theodore Elhourani, Abishek Gopalan, Srinivasan Ramasubramanian:

IP Fast Rerouting for Multi-Link Failures. 3014-3025 - Nirmalya Roy, Archan Misra

, Sajal K. Das
, Christine Julien
:
Determining Quality- and Energy-Aware Multiple Contexts in Pervasive Computing Environments. 3026-3042 - Georgios S. Paschos, Chih-Ping Li, Eytan H. Modiano, Kostas Choumas

, Thanasis Korakis:
In-Network Congestion Control for Multirate Multicast. 3043-3055 - Salim El Rouayheb, Sreechakra Goparaju, Han Mao Kiah, Olgica Milenkovic:

Synchronization and Deduplication in Coded Distributed Storage Networks. 3056-3069 - Reaz Ahmed, Md. Faizul Bari, Shihabur Rahman Chowdhury

, Md. Golam Rabbani, Raouf Boutaba, Bertrand Mathieu:
αRoute: Routing on Names. 3070-3083 - Richard T. B. Ma

:
Usage-Based Pricing and Competition in Congestible Network Service Markets. 3084-3097 - Yuanqing Zheng, Mo Li

:
Read Bulk Data From Computational RFIDs. 3098-3108 - Zhangyu Guan, Giuseppe Enrico Santagati, Tommaso Melodia

:
Distributed Algorithms for Joint Channel Access and Rate Control in Ultrasonic Intra-Body Networks. 3109-3122 - Lin Chen, Wei Wang, Hua Huang

, Shan Lin:
On Time-Constrained Data Harvesting in Wireless Sensor Networks: Approximation Algorithm Design. 3123-3135 - Virag Shah, Gustavo de Veciana, George Kesidis:

A Stable Approach for Routing Queries in Unstructured P2P Networks. 3136-3147 - Lin Chen, Kaigui Bian, Meng Zheng:

Never Live Without Neighbors: From Single- to Multi-Channel Neighbor Discovery for Mobile Sensing Applications. 3148-3161 - Yi Xie, Yu Wang

, Haitao He, Yang Xiang, Shunzheng Yu, Xincheng Liu:
A General Collaborative Framework for Modeling and Perceiving Distributed Network Behavior. 3162-3176 - Jia Liu, Min Chen, Bin Xiao

, Feng Zhu
, Shigang Chen, Lijun Chen:
Efficient RFID Grouping Protocols. 3177-3190 - DaeHun Nyang, DongOh Shin:

Recyclable Counter With Confinement for Real-Time Per-Flow Measurement. 3191-3203 - Kundan Kandhway, Joy Kuri:

Optimal Resource Allocation Over Time and Degree Classes for Maximizing Information Dissemination in Social Networks. 3204-3217 - Sara Ayoubi, Yiheng Chen, Chadi Assi:

Towards Promoting Backup-Sharing in Survivable Virtual Network Design. 3218-3231 - Huiyuan Zhang

, Dung T. Nguyen, Soham Das, Huiling Zhang, My T. Thai:
Corrections to "Least Cost Influence Maximization Across Multiple Social Networks". 3232
Volume 24, Number 6, December 2016
- Wei Wang, Qian Zhang

:
Privacy Preservation for Context Sensing on Smartphone. 3235-3247 - Benjamin Baron, Prométhée Spathis, Hervé Rivano

, Marcelo Dias de Amorim:
Offloading Massive Data Onto Passenger Vehicles: Topology Simplification and Traffic Assignment. 3248-3261 - Yehuda Afek, Anat Bremler-Barr

, Yotam Harchol, David Hay, Yaron Koral:
Making DPI Engines Resilient to Algorithmic Complexity Attacks. 3262-3275 - Xinlei (Oscar) Wang, Amit Pande, Jindan Zhu, Prasant Mohapatra:

STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users. 3276-3289 - Le Zhang, Shahrokh Valaee:

Congestion Control for Vehicular Networks With Safety-Awareness. 3290-3299 - Wenping Liu, Tianping Deng, Yang Yang, Hongbo Jiang, Xiaofei Liao, Jiangchuan Liu, Bo Li, Guoyin Jiang:

Towards Robust Surface Skeleton Extraction and Its Applications in 3D Wireless Sensor Networks. 3300-3313 - Wei Gong, Haoxiang Liu, Xin Miao, Kebin Liu, Wenbo He

, Lan Zhang, Yunhao Liu:
Fast and Adaptive Continuous Scanning in Large-Scale RFID Systems. 3314-3325 - Yan Qiao, Shigang Chen, Zhen Mo, MyungKeun Yoon

:
When Bloom Filters Are No Longer Compact: Multi-Set Membership Lookup for Network Applications. 3326-3339 - Huazi Zhang, Kairan Sun, Qiuyuan Huang, Yonggang Wen, Dapeng Oliver Wu

:
FUN Coding: Design and Analysis. 3340-3353 - Pavlos Sermpezis, Thrasyvoulos Spyropoulos:

Effects of Content Popularity on the Performance of Content-Centric Opportunistic Networking: An Analytical Approach and Applications. 3354-3368 - Md. Endadul Hoque

, Hyojeong Lee
, Rahul Potharaju, Charles Killian, Cristina Nita-Rotaru:
Automated Adversarial Testing of Unmodified Wireless Routing Implementations. 3369-3382 - Osman Yagan, Armand M. Makowski:

Wireless Sensor Networks Under the Random Pairwise Key Predistribution Scheme: Can Resiliency Be Achieved With Small Key Rings? 3383-3396 - Dongmyoung Kim, Taejun Park, Seongwon Kim, Hyoil Kim, Sunghyun Choi

:
Load Balancing in Two-Tier Cellular Networks With Open and Hybrid Access Femtocells. 3397-3411 - Tal Mizrahi

, Efi Saat, Yoram Moses:
Timed Consistent Network Updates in Software-Defined Networks. 3412-3425 - Jiliang Wang, Shuo Lian, Wei Dong, Xiang-Yang Li, Yunhao Liu:

Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement. 3426-3438 - Wenping Liu, Hongbo Jiang, Jiangchuan Liu, Xiaofei Liao, Hongzhi Lin, Tianping Deng:

On the Distance-Sensitive and Load-Balanced Information Storage and Retrieval for 3D Sensor Networks. 3439-3449 - BongHwan Oh, Jaiyong Lee:

Feedback-Based Path Failure Detection and Buffer Blocking Protection for MPTCP. 3450-3461 - João Luis Sobrinho

, Laurent Vanbever, Franck Le, André Sousa, Jennifer Rexford
:
Scaling the Internet Routing System Through Distributed Route Aggregation. 3462-3476 - Muhammad Shahzad, Alex X. Liu

:
Accurate and Efficient Per-Flow Latency Measurement Without Probing and Time Stamping. 3477-3492 - Gideon Blocq, Ariel Orda:

How Good is Bargained Routing? 3493-3507 - Xin Sun, Geoffrey G. Xie:

An Integrated Systematic Approach to Designing Enterprise Access Control. 3508-3522 - Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Raheem A. Beyah

:
Structural Data De-Anonymization: Theory and Practice. 3523-3536 - Ming Zhu, Dan Li, Fangxin Wang, Anke Li, K. K. Ramakrishnan

, Ying Liu, Jianping Wu, Nan Zhu, Xue Liu:
CCDN: Content-Centric Data Center Networks. 3537-3550 - Saiyu Qi, Yuanqing Zheng, Mo Li

, Yunhao Liu, Jinli Qiu:
Scalable Industry Data Access Control in RFID-Enabled Supply Chain. 3551-3564 - Bing Hu, Kwan L. Yeung, Qian Zhou, Chunzhi He:

On Iterative Scheduling for Input-Queued Switches With a Speedup of 2-1/N. 3565-3577 - Émile Archambault, Nabih Alloune, Marija Furdek

, Zhenyu Xu, Christine Tremblay
, Ajmal Muhammad, Jiajia Chen, Lena Wosinska
, Paul Littlewood, Michel P. Bélanger:
Routing and Spectrum Assignment in Elastic Filterless Optical Networks. 3578-3592 - Xu Chen, Xiaowen Gong, Lei Yang, Junshan Zhang:

Exploiting Social Tie Structure for Cooperative Wireless Networking: A Social Group Utility Maximization Framework. 3593-3606 - Qing Wang

, Domenico Giustiniano
:
Intra-Frame Bidirectional Transmission in Networks of Visible LEDs. 3607-3619 - Zhao Zhang

, James Willson, Zaixin Lu, Weili Wu, Xuding Zhu, Ding-Zhu Du:
Approximating Maximum Lifetime k-Coverage Through Minimizing Weighted k-Cover in Homogeneous Wireless Sensor Networks. 3620-3633 - Di Wu

, Qiang Liu, Yong Li, Julie A. McCann, Amelia C. Regan
, Nalini Venkatasubramanian:
Adaptive Lookup of Open WiFi Using Crowdsensing. 3634-3647 - Long Gong, Huihui Jiang, Yixiang Wang, Zuqing Zhu

:
Novel Location-Constrained Virtual Network Embedding (LC-VNE) Algorithms Towards Integrated Node and Link Mapping. 3648-3661 - Simon Oya, Fernando Pérez-González

, Carmela Troncoso:
Design of Pool Mixes Against Profiling Attacks in Real Conditions. 3662-3675 - Long Cheng

, Jianwei Niu
, Yu Gu, Chengwen Luo, Tian He:
Achieving Efficient Reliable Flooding in Low-Duty-Cycle Wireless Sensor Networks. 3676-3689 - Valentino Pacifici

, György Dán:
Coordinated Selfish Distributed Caching for Peering Content-Centric Networks. 3690-3701 - Agostinho Agra

, Amaro de Sousa, Mahdi Doostmohammadi
:
The Minimum Cost Design of Transparent Optical Networks Combining Grooming, Routing, and Wavelength Assignment. 3702-3713 - Chi-Kin Chau

, Majid Khonji
, Muhammad Aftab:
Online Algorithms for Information Aggregation From Distributed and Correlated Sources. 3714-3725 - Víctor Berrocal-Plaza, Miguel A. Vega-Rodríguez

, Juan M. Sánchez-Pérez:
An Efficient Way of Assigning Paging Areas by Using Mobility Models. 3726-3739 - Zhenhua Li, Zhiyang Guo, Yuanyuan Yang

:
BCCC: An Expandable Network for Data Centers. 3740-3755 - Carla-Fabiana Chiasserini

, Michele Garetto
, Emilio Leonardi
:
Social Network De-Anonymization Under Scale-Free User Relations. 3756-3769 - Muhammad Shahzad, Alex X. Liu

:
Fast and Reliable Detection and Identification of Missing RFID Tags in the Wild. 3770-3784 - Wan-Seon Lim

, Kang G. Shin:
POEM: Minimizing Energy Consumption for WiFi Tethering Service. 3785-3797 - Jungseul Ok, Youngmi Jin, Jinwoo Shin, Yung Yi

:
On Maximizing Diffusion Speed Over Social Networks With Strategic Users. 3798-3811 - Maialen Larrañaga

, Urtzi Ayesta, Ina Maria Verloop:
Dynamic Control of Birth-and-Death Restless Bandits: Application to Resource-Allocation Problems. 3812-3825 - Varun Gupta

, Yigal Bejerano, Craig Gutterman, Jaime Ferragut, Katherine Guo, Thyaga Nandagopal, Gil Zussman:
Light-Weight Feedback Mechanism for WiFi Multicast to Very Large Groups - Experimental Evaluation. 3826-3840 - Li Yan

, Haiying Shen, Kang Chen:
TSearch: Target-Oriented Low-Delay Node Searching in DTNs With Social Network Properties. 3841-3855 - Tiantian Zhu, Hongyu Gao, Yi Yang, Kai Bu

, Yan Chen, Doug Downey, Kathy Lee, Alok N. Choudhary:
Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates. 3856-3869

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














