


default search action
24th INFOCOM 2005: Miami, FL, USA
- INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA. IEEE 2005, ISBN 0-7803-8968-9

Volume 1
- Reviewers List.

- Godfrey Tan, John V. Guttag:

The 802.11 MAC protocol leads to inefficient equilibria. 1-11 - Hao Zhu, Guohong Cao:

rDCF: a relay-enabled medium access control protocol for wireless ad hoc networks. 12-22 - Xin Wang, Koushik Kar:

Throughput modelling and fairness issues in CSMA/CA based ad-hoc networks. 23-34 - Yaling Yang, Jun Wang, Robin Kravets:

Distributed optimal contention window control for elastic traffic in wireless LANs. 35-46 - Tianmin Ren, Richard J. La:

Downlink beamforming algorithms with inter-cell interference in cellular networks. 47-57 - François Baccelli, Bartlomiej Blaszczyszyn, Mohamed Kadhem Karray:

Blocking rates in large CDMA networks via a spatial Erlang formula. 58-67 - Tian Bu, Mun Choon Chan, Ramachandran Ramjee:

Designing wireless radio access networks for third generation cellular networks. 68-78 - Zvi Rosberg:

Asymptotically optimal transmission power and rate control for CDMA channels with multiple user classes. 79-89 - John G. Dorsey, Daniel P. Siewiorek:

Exchange power management for mobile ad hoc networks. 90-101 - Arash Behzad, Izhak Rubin:

Impact of power control on the performance of ad hoc wireless networks. 102-113 - Rahul Mangharam, Ragunathan Rajkumar, Sofie Pollin, Francky Catthoor, Bruno Bougard, Liesbet Van der Perre, Ingrid Moerman:

Optimal fixed and scalable energy management for wireless networks. 114-125 - Seung Jun Baek, Gustavo de Veciana:

Spatial energy balancing in large-scale wireless multihop networks. 126-137 - Hyuk Lim, Jennifer C. Hou:

Localization for anisotropic sensor networks. 138-149 - Antonio Caruso

, Stefano Chessa
, Swades De, Alessandro Urpi:
GPS free coordinate assignment and routing in wireless sensor networks. 150-160 - Lei Fang, Wenliang Du, Peng Ning:

A beacon-less location discovery scheme for wireless sensor networks. 161-171 - Nissanka Bodhi Priyantha, Hari Balakrishnan, Erik D. Demaine, Seth J. Teller:

Mobile-assisted localization in wireless sensor networks. 172-183 - Srinivas Shakkottai, R. Srikant:

Economics of network pricing with multiple ISPs. 184-194 - Linhai He, Jean C. Walrand:

Pricing differentiated Internet services. 195-204 - Linhai He, Jean C. Walrand:

Pricing and revenue sharing strategies for Internet service providers. 205-216 - Matthew Andrews:

Maximizing profit in overloaded networks. 217-224 - Jinyang Li, Jeremy Stribling, Robert Morris, M. Frans Kaashoek, Thomer M. Gil:

A performance vs. cost framework for evaluating DHT design tradeoffs under churn. 225-236 - Pierre François, Olivier Bonaventure:

Avoiding transient loops during IGP convergence in IP networks. 237-247 - Ramakrishna Gummadi, Ramesh Govindan:

Practical routing-layer support for scalable multihoming. 248-259 - Gábor Rétvári, József Bíró, Tibor Cinkler, Tamás Henk:

A precomputation scheme for minimum interference routing: the least-critical-path-first algorithm. 260-268 - David E. Taylor, Jonathan S. Turner:

Scalable Packet Classification using Distributed Crossproducting of Field Labels. 269-280 - Xiliang Liu, Kaliappa Nadar Ravindran, Dmitri Loguinov:

What signals do packet-pair dispersions carry? 281-292 - Kai Zheng, Hao Che, Zhijun Wang, Bin Liu:

TCAM-based distributed parallel packet classification algorithm with range-matching solution. 293-303 - Filippo Geraci

, Marco Pellegrini
, Paolo Pisati, Luigi Rizzo:
Packet classification via improved space decomposition techniques. 304-312 - David Kiyoshi Goldenberg, Arvind Krishnamurthy, Wesley C. Maness, Yang Richard Yang, Anthony Young, A. Stephen Morse, Andreas Savvides, Brian D. O. Anderson:

Network localization in partially localizable networks. 313-326 - Anxiao Jiang, Jehoshua Bruck

:
Monotone percolation and the topology control of wireless networks. 327-338 - Qing Fang, Jie Gao, Leonidas J. Guibas, Vin de Silva, Li Zhang:

GLIDER: gradient landmark-based distributed routing for sensor networks. 339-350 - Kyoungwon Suh, Yang Guo, James F. Kurose, Donald F. Towsley:

Locating network monitors: complexity, heuristics, and coverage. 351-361 - François Baccelli, Ki Baek Kim, Danny De Vleeschauwer:

Analysis of the competition between wired, DSL and wireless users in an access network. 362-373 - Alberto Blanc, Yi-Kai Liu, Amin Vahdat:

Designing incentives for peer-to-peer routing. 374-385 - Alex Zemlianov, Gustavo de Veciana:

Cooperation and decision-making in a wireless multi-provider setting. 386-397 - Brendan Burns, Oliver Brock, Brian Neil Levine:

MV routing and capacity building in disruption tolerant networks. 398-408 - Matthew Andrews, Lisa Zhang:

Bounds on fiber minimization in optical networks with fixed fiber capacity. 409-419 - Zhenghao Zhang, Yuanyuan Yang

:
A novel analytical model for electronic and optical switches with shared buffer. 420-431 - Andrew Brzezinski, Eytan H. Modiano:

Dynamic reconfiguration and routing algorithms for IP-over-WDM networks with stochastic traffic. 432-443 - Chunpeng Xiao, Benny Bing, Gee-Kung Chang:

An efficient reservation MAC protocol with preallocation for high-speed WDM passive optical networks. 444-454 - Honghai Zhang, Jennifer C. Hou:

Capacity of wireless ad-hoc networks under ultra wide band with power constraint. 455-465 - Honghai Zhang, Jennifer C. Hou:

On the critical total power for asymptotic k-connectivity in wireless networks. 466-476 - Aravind Velayutham, Karthikeyan Sundaresan, Raghupathy Sivakumar:

Non-pipelined relay improves throughput performance of wireless ad-hoc networks. 477-490 - Daniele Miorandi, Eitan Altman:

Coverage and connectivity of ad hoc networks presence of channel randomness. 491-502 - Wensheng Zhang, Guohong Cao:

Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach. 503-514 - Scott C.-H. Huang, Ding-Zhu Du:

New constructions on broadcast encryption key pre-distribution schemes. 515-523 - Haowen Chan, Adrian Perrig:

PIKE: peer intermediaries for key establishment in sensor networks. 524-535 - Anat Bremler-Barr, Hanoch Levy:

Spoofing prevention method. 536-547 - Murtaza Zafer, Eytan H. Modiano:

A calculus approach to minimum energy transmission policies with quality of service guarantees. 548-559 - Sara Alouf

, Eitan Altman, Jérôme Galtier, Jean-François Lalande
, Corinne Touati:
Quasi-optimal bandwidth allocation for multi-spot MFTDMA satellites. 560-571 - Michael J. Neely:

Energy optimal control for time varying wireless networks. 572-583 - Yunnan Wu, Qian Zhang, Wenwu Zhu, Sun-Yuan Kung:

Bounding the power rate function of wireless ad hoc networks. 584-595 - Brighten Godfrey, Ion Stoica:

Heterogeneity and load balance in distributed hash tables. 596-606 - Chun Zhang, Yong Liu

, Weibo Gong, James F. Kurose, Robert Moll, Donald F. Towsley
:
On optimal routing with multiple traffic matrices. 607-618 - Aaron D. Jaggard, Vijay Ramachandran:

Relating two formal models of path-vector routing. 619-630 - Baruch Awerbuch, David Holmer, Herbert Rubens, Robert D. Kleinberg:

Provably competitive adaptive routing. 631-641 - A. S. Krishnakumar, Parameshwaran Krishnan:

On the accuracy of signal strength-based estimation techniques. 642-650 - Tamer Nadeem

, Lusheng Ji, Ashok K. Agrawala, Jonathan R. Agre:
Location enhancement to IEEE 802.11 DCF. 651-663 - Cristian Tuduce, Thomas R. Gross:

A mobility model based on WLAN traces and its validation. 664-674 - Ishwar Ramani, Stefan Savage:

SyncScan: practical fast handoff for 802.11 infrastructure networks. 675-684 - Neil Barakat, Edward H. Sargent

:
Dual-header optical burst switching: a new architecture for WDM burst-switched networks. 685-693 - Zhenghao Zhang, Yuanyuan Yang:

On-line optimal wavelength assignment in WDM networks with shared wavelength converter pool. 694-705 - Michael Scheutzow, Patrick Seeling

, Martin Maier, Martin Reisslein
:
Multicast capacity of packet-switched ring WDM networks. 706-717 - Huan Liu, Fouad A. Tobagi:

Traffic grooming in WDM SONET UPSR rings with multiple line speeds. 718-729 - Xin Yu, Zvi M. Kedem:

A distributed adaptive cache update algorithm for the dynamic source routing protocol. 730-739 - Shiwen Mao, Yiwei Thomas Hou

, Xiaolin Cheng, Hanif D. Sherali, Scott F. Midkiff
:
Multipath routing for multiple description video in wireless ad hoc networks. 740-750 - Jian Tang, Guoliang Xue, Christopher Chandler, Weiyi Zhang:

Interference-aware routing in multihop wireless networks using directional antennas. 751-760 - Yiwei Thomas Hou

, Yi Shi
, Hanif D. Sherali, Jeffrey E. Wieselthier:
Online lifetime-centric multicast routing for ad hoc networks with directional antennas. 761-772
Volume 2
- Jian Ni, Danny H. K. Tsang, Sekhar Tatikonda, Brahim Bensaou:

Threshold and reservation based call admission control policies for multiservice resource-sharing systems. 773-783 - Konstantin Avrachenkov, Urtzi Ayesta, Patrick Brown, R. Núñez Queija:

Discriminatory processor sharing revisited. 784-795 - Lingkun Chu, Kai Shen, Hong Tang, Tao Yang, Jingyu Zhou:

Dependency isolation for thread-based multi-tier Internet services. 796-806 - Jiani Guo, Jingnan Yao, Laxmi N. Bhuyan:

An efficient packet scheduling algorithm in network processors. 807-818 - Emilio Leonardi, Marco Mellia

, Marco Ajmone Marsan, Fabio Neri:
Joint optimal scheduling and routing for maximum network throughput. 819-830 - Xin Yuan, Zhenhai Duan:

FRR: a proportional and worst-case fair round robin scheduler. 831-842 - Deng Pan, Yuanyuan Yang:

Credit based fair scheduling for packet switched networks. 843-854 - Joseph Naor, Adi Rosén, Gabriel Scalosub:

Online time-constrained scheduling in linear networks. 855-865 - Fred Stann, John S. Heidemann:

BARD: Bayesian-assisted resource discovery in sensor networks. 866-877 - Mark D. Yarvis, Nandakishore Kushalnagar, Harkirat Singh, Anand Rangarajan, York Liu, Suresh Singh:

Exploiting heterogeneity in sensor networks. 878-890 - Gang Zhou, Tian He, John A. Stankovic, Tarek F. Abdelzaher:

RID: radio interference detection in wireless sensor networks. 891-901 - Min Ding, Dechang Chen, Kai Xing, Xiuzhen Cheng:

Localized fault-tolerant event boundary detection in sensor networks. 902-913 - Mingyu Chen, Jinsong Zhang, Manohar N. Murthi, Kamal Premaratne

:
TCP congestion avoidance: a network calculus interpretation and performance improvements. 914-925 - Shirin Ebrahimi-Taghizadeh, Ahmed Helmy

, Sandeep Gupta:
TCP vs. TCP: a systematic study of adverse impact of short-lived TCP flows on long-lived TCP flows. 926-937 - Jiantao Wang, David X. Wei, Steven H. Low:

Modelling and stability of FAST TCP. 938-948 - Eli Brosh, Galit Lubetzky-Sharon, Yuval Shavitt

:
Spatial-temporal analysis of passive TCP measurements. 949-959 - Cheng-Shang Chang, Duan-Shin Lee, Chao-Lin Yu:

Generalization of the Pollaczek-Khinchin formula for throughput analysis of input-buffered switches. 960-970 - Paolo Giaccone

, Emilio Leonardi
, Devavrat Shah:
On the maximal throughput of networks with finite buffers and its application to buffered crossbars. 971-980 - Shang-Tse Chuang, Sundar Iyer, Nick McKeown:

Practical algorithms for performance guarantees in buffered crossbars. 981-991 - Stefanos Kaxiras, Georgios Keramidas:

IPStash: a set-associative memory approach for efficient IP-lookup. 992-1001 - Shao Liu, Tamer Basar, R. Srikant:

Pitfalls in the fluid modeling of RTT variations in window-based congestion control. 1002-1012 - Qishi Wu, Nageswara S. V. Rao

:
A class of reliable UDP-based transport protocols based on stochastic approximation. 1013-1024 - Steven H. Low, Lachlan L. H. Andrew, Bartek P. Wydrowski:

Understanding XCP: equilibrium and fairness. 1025-1036 - Yongguang Zhang, Thomas R. Henderson:

An implementation and experimental study of the explicit control protocol (XCP). 1037-1048 - Pankaj Risbood, Swarup Acharya, Bhawna Gupta:

The BEST challenge for next-generation Ethernet services. 1049-1059 - Wei Wei, Bing Wang, Chun Zhang, James F. Kurose, Donald F. Towsley

:
Classification of access network types: Ethernet wireless LAN, ADSL, cable modem or dialup? 1060-1071 - Amogh Dhamdhere, Hao Jiang, Constantinos Dovrolis:

Buffer sizing for congested Internet links. 1072-1083 - Jean-Loup Guillaume, Matthieu Latapy:

Relevance of massively distributed explorations of the Internet topology: simulation results. 1084-1094 - Lacra Pavel

:
Power control for OSNR optimization in optical networks: a distributed algorithm via a central cost approach. 1095-1105 - Maciej Kurant, Patrick Thiran:

On survivable routing of mesh topologies in IP-over-WDM networks. 1106-1116 - Anurag Srivastava, Swarup Acharya, Mansoor Alicherry, Bhawna Gupta, Pankaj Risbood:

Differential delay aware routing for Ethernet over SONET/SDH. 1117-1127 - Hung Q. Ngo, Dazhen Pan, Yuanyuan Yang

:
Optical switching networks with minimum number of limited range wavelength converters. 1128-1138 - Abhishek Sharma, Azer Bestavros

, Ibrahim Matta
:
dPAM: a distributed prefetching protocol for scalable asynchronous multicast in P2P systems. 1139-1150 - Ming Zhong, Kai Shen, Joel I. Seiferas:

Non-uniform random membership management in peer-to-peer networks. 1151-1161 - Abhishek Kumar, Jun (Jim) Xu, Ellen W. Zegura:

Efficient and scalable query routing for unstructured peer-to-peer networks. 1162-1173 - Jian Liang, Rakesh Kumar, Y. Xi, Keith W. Ross:

Pollution in P2P file sharing systems. 1174-1185 - Zohar Naor:

On-line search for mobile users. 1186-1195 - Yun Mao, Björn Knutsson, Honghui Lu, Jonathan M. Smith:

DHARMA: distributed home agent for robust mobile access. 1196-1206 - Jie Li

, Atushi Kubota, Hisao Kameda:
Location management for PCS networks with consideration of mobility patterns. 1207-1216 - David Madigan, E. Einahrawy, R. P. Martin, Wen-Hua Ju, Parameshwaran Krishnan, A. S. Krishnakumar:

Bayesian indoor positioning systems. 1217-1227 - Saumitra M. Das, Himabindu Pucha, Y. Charlie Hu:

Performance comparison of scalable location services for geographic ad hoc routing. 1228-1239 - Nianjun Zhou, Alhussein A. Abouzeid

:
Routing in ad hoc networks: a theoretical framework with practical implications. 1240-1251 - Wei Yu, Yan Sun, K. J. Ray Liu:

HADOF: defense against routing disruptions in mobile ad hoc networks. 1252-1261 - Xiaojun Lin, Ness B. Shroff, R. Srikant:

Asymptotically optimal power-aware routing for multihop wireless networks with renewable energy sources. 1262-1272 - Sándor Rácz, Tamás Jakabfy, János Farkas, Csaba Antal:

Connection admission control for flow level QoS in bufferless models. 1273-1282 - Wenye Wang, Xinbing Wang, Arne A. Nilsson:

A new admission control scheme under energy and QoS constraints for wireless networks. 1283-1294 - Eitan Altman:

On stochastic recursive equations and infinite server queues. 1295-1302 - Sami Ayyorgun, Sarut Vanichpun, Wu-chun Feng:

Q-Composer and CpR: a probabilistic synthesizer and regulator of traffic (a probabilistic control of buffer occupancy). 1303-1315 - Eitan Altman, Konstantin Avrachenkov

, Arzad Alam Kherani, B. J. Prabhu:
Performance analysis and stochastic stability of congestion control protocols. 1316-1327 - Boris M. Miller, Konstantin Avrachenkov

, Karen V. Stepanyan
, Gregory B. Miller
:
Flow control as stochastic optimal control problem with incomplete information. 1328-1337 - Ao Tang, Jiantao Wang, Steven H. Low, Mung Chiang:

Network equilibrium of heterogeneous congestion control protocols. 1338-1349 - Eitan Altman, Konstantin Avrachenkov

, B. J. Prabhu:
Fairness in MIMD congestion control algorithms. 1350-1361 - Mina Guirguis, Azer Bestavros

, Ibrahim Matta
, Yuting Zhang:
Reduction of quality (RoQ) attacks on Internet end-systems. 1362-1372 - Qiming Li, Ee-Chien Chang, Mun Choon Chan:

On the effectiveness of DDoS attacks on statistical filtering. 1373-1383 - Yong Tang, Shigang Chen:

Defending against Internet worms: a signature-based approach. 1384-1394 - Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song:

FIT: fast Internet traceback. 1395-1406 - Wenrui Zhao, Mostafa H. Ammar, Ellen W. Zegura:

Controlling the mobility of multiple data transport ferries in a delay-tolerant network. 1407-1418 - Jonathan Ledlie, Margo I. Seltzer:

Distributed, secure load balancing with skew, heterogeneity and churn. 1419-1430 - Weifeng Chen, L. Clarke, James F. Kurose, Donald F. Towsley

:
Optimizing cost-sensitive trust-negotiation protocols. 1431-1442 - Yossi Matias, R. Refua:

Delayed-dictionary compression for packet networks. 1443-1454 - Ayalvadi J. Ganesh, Laurent Massoulié, Donald F. Towsley

:
The effect of network topology on the spread of epidemics. 1455-1466 - Satish Raghunath, Shivkumar Kalyanaraman, K. K. Ramakrishnan:

Trade-offs in resource management for virtual private networks. 1467-1477 - Wei Liang, Wenye Wang:

A quantitative study of authentication and QoS in wireless IP networks. 1478-1489 - Hsinping Wang, Tsungnan Lin

:
On efficiency in searching networks. 1490-1501
Volume 3
- Reviewers List.

- Xin Chen, Shansi Ren, Haining Wang, Xiaodong Zhang:

SCOPE: scalable consistency maintenance in structured P2P systems. 1502-1513 - Rongmei Zhang, Y. Charlie Hu:

Assisted peer-to-peer search with partial indexing. 1514-1525 - Christos Gkantsidis, Milena Mihail, Amin Saberi:

Hybrid search schemes for unstructured peer-to-peer networks. 1526-1537 - Micah Adler, Rakesh Kumar, Keith W. Ross, Dan Rubenstein, Torsten Suel, David D. Yao:

Optimal peer selection for P2P downloading and streaming. 1538-1549 - Anurag Kumar

, Eitan Altman, Daniele Miorandi, Munish Goyal:
New insights from a fixed point analysis of single cell IEEE 802.11 WLANs. 1550-1561 - Arunchandar Vasan, Ramachandran Ramjee, Thomas Y. C. Woo:

ECHOS - enhanced capacity 802.11 hotspots. 1562-1572 - Daji Qiao, Kang G. Shin:

Smart power-saving mode for IEEE 802.11 wireless LANs. 1573-1583 - Chun-Ting Chou, S. N. Shankar, Kang G. Shin:

Achieving per-stream QoS with distributed airtime allocation and admission control in IEEE 802.11e wireless LANs. 1584-1595 - Weizhao Wang, Xiang-Yang Li, Zheng Sun, Yu Wang:

Design multicast protocols for non-cooperative networks. 1596-1607 - Desmond S. Lun, Niranjan Ratnakar, Ralf Koetter, Muriel Médard, Ebad Ahmed, Hyunjoo Lee:

Achieving minimum-cost multicast: a decentralized approach based on network coding. 1607-1617 - Zongpeng Li, Baochun Li:

Efficient and distributed computation of maximum multicast rates. 1618-1628 - François Baccelli, Augustin Chaintreau

, Zhen Liu, Anton Riabov:
The one-to-many TCP overlay: a scalable and reliable multicast architecture. 1629-1640 - M. Sundstron, Lars-Åke Larzon:

High-performance longest prefix matching supporting high-speed incremental updates and guaranteed compression. 1641-1652 - Stephen P. Boyd, Arpita Ghosh, Balaji Prabhakar, Devavrat Shah:

Gossip algorithms: design, analysis and applications. 1653-1664 - Utku Irmak, Svilen Mihaylov, Torsten Suel:

Improved single-round protocols for remote file synchronization. 1665-1676 - Dongsheng Li, Xicheng Lu, Jie Wu:

FISSIONE: a scalable constant degree and low congestion DHT scheme based on Kautz graphs. 1677-1688 - Ningning Hu, Li Li, Zhuoqing Morley Mao, Peter Steenkiste

, Jia Wang:
A measurement study of Internet bottlenecks. 1689-1700 - David B. Chua, Eric D. Kolaczyk, Mark Crovella:

Efficient monitoring of end-to-end network properties. 1701-1711 - Isaac Keslassy

, Cheng-Shang Chang, Nick McKeown, Duan-Shin Lee:
Optimal load-balancing. 1712-1722 - Michael J. Neely, Eytan H. Modiano, Chih-Ping Li:

Fairness and optimal stochastic control for heterogeneous networks. 1723-1734 - Jun Luo

, Jean-Pierre Hubaux:
Joint mobility and routing for lifetime elongation in wireless sensor networks. 1735-1746 - Chiranjeeb Buragohain, Divyakant Agrawal, Subhash Suri:

Power aware routing for sensor databases. 1747-1757 - Yu He, Cauligi S. Raghavendra:

XVR: X visiting-pattern routing for sensor networks. 1758-1769 - D. Ferrara, Laura Galluccio

, Alessandro Leonardi, Giacomo Morabito
, Sergio Palazzo:
MACRO: an integrated MAC/routing protocol for geographic forwarding in wireless sensor networks. 1770-1781 - Arindam Kumar Das, Robert J. Marks II, Payman Arabshahi, Andrew Gray:

Power controlled minimum frame length scheduling in TDMA wireless networks with sectored antennas. 1782-1793 - Atilla Eryilmaz, R. Srikant:

Fair resource allocation in wireless networks using queue-length-based scheduling and congestion control. 1794-1803 - Xiaojun Lin, Ness B. Shroff:

The impact of imperfect scheduling on cross-layer rate control in wireless networks. 1804-1814 - Piyush Gupta, Yogesh Sankarasubramaniam

, Alexander L. Stolyar:
Random-access scheduling with service differentiation in wireless networks. 1815-1825 - Nahur Fonseca, Mark Crovella:

Bayesian packet loss detection for TCP. 1826-1837 - R. King, Richard G. Baraniuk, Rudolf H. Riedi:

TCP-Africa: an adaptive and fair rapid increase rule for scalable TCP. 1838-1848 - Jörg Ott, Dirk Kutscher

:
A disconnection-tolerant transport for drive-thru Internet environments. 1849-1862 - Ruy de Oliveira, Torsten Braun

:
A dynamic adaptive acknowledgment strategy for TCP over multihop wireless networks. 1863-1874 - Jiangzhuo Chen, Lujun Jia, Xin Liu, Guevara Noubir, Ravi Sundaram:

Minimum energy accumulative routing in wireless networks. 1875-1886 - Jinhua Zhu, Xin Wang:

PEER: a progressive energy efficient routing protocol for wireless ad hoc networks. 1887-1896 - Philippe Nain, Donald F. Towsley

, Benyuan Liu, Zhen Liu:
Properties of random direction models. 1897-1907 - Yingqun Yu, Georgios B. Giannakis

:
SICTA: a 0.693 contention tree algorithm using successive interference cancellation. 1908-1916 - Srdjan Capkun, Jean-Pierre Hubaux:

Secure positioning of wireless devices with application to sensor networks. 1917-1928 - Heesook Choi, Hui Song, Guohong Cao, Thomas F. La Porta:

Mobile multi-layered IPsec. 1929-1939 - Yanchao Zhang, Wei Liu, Wenjing Lou:

Anonymous communications in mobile ad hoc networks. 1940-1951 - Patrick P. C. Lee

, Vishal Misra, Dan Rubenstein:
Distributed algorithms for secure multipath routing. 1952-1963 - Ritesh Madan, Shuguang Cui

, Sanjay Lall, Andrea J. Goldsmith:
Cross-layer design for lifetime maximization in interference-limited wireless sensor networks. 1964-1975 - Mihaela Cardei, My T. Thai, Yingshu Li

, Weili Wu:
Energy-efficient target coverage in wireless sensor networks. 1976-1984 - Wook Choi, Sajal K. Das

:
A novel framework for energy - conserving data gathering in wireless sensor networks. 1985-1996 - Koushik Kar, Ananth Krishnamurthy, Neeraj Jaggi:

Dynamic node activation in networks of rechargeable sensors. 1997-2007 - Lin Cai

, Xuemin Shen, Jon W. Mark, Jianping Pan:
A QoS-aware AIMD protocol for time-sensitive applications in wired/wireless networks. 2008-2019 - Julian Chesterfield, Rajiv Chakravorty, Ian Pratt, Suman Banerjee, Pablo Rodriguez:

Exploiting diversity to enhance multimedia streaming over cellular links. 2020-2031 - Patrick Hosein:

Capacity of packetized voice services over time-shared wireless packet data channels. 2032-2043 - Jens Müller, Sergei Gorlatch:

GSM: a game scalability model for multiplayer real-time games. 2044-2045 - Seong Soo Kim, A. L. Narasimha Reddy:

A study of analyzing network traffic as images in real-time. 2056-2067 - David E. Taylor, Jonathan S. Turner:

ClassBench: a packet classification benchmark. 2068-2079 - Fang Hao, Murali S. Kodialam, T. V. Lakshman, Hui Zhang:

Fast, memory-efficient traffic estimation by coincidence counting. 2080-2090 - Takashi Okumura, Daniel Mossé:

The Netnice packet filter: bridging the structural mismatches in end-host network control. 2091-2101 - Xinyan Zhang, Jiangchuan Liu, Bo Li, Tak-Shing Peter Yum:

CoolStreaming/DONet: a data-driven overlay network for peer-to-peer live media streaming. 2102-2111 - Shelley Zhuang, Dennis Geels, Ion Stoica, Randy H. Katz:

On failure detection algorithms in overlay networks. 2112-2123 - Wenjie Wang, Cheng Jin, Sugih Jamin:

Network overlay construction under limited end-to-end reachability. 2124-2134 - Selwyn Yuen, Baochun Li:

Strategyproof mechanisms for dynamic tree formation in overlay networks. 2135-2146 - Sreenivas Gollapudi, D. Sivakumar, Aidong Zhang:

Exploiting anarchy in networks: a game-theoretic approach to combining fairness and throughput. 2147-2158 - Krishna K. Ramachandran, Biplab Sikdar:

An analytic framework for modeling peer to peer networks. 2159-2169 - Geoffrey G. Xie, Jibin Zhan, David A. Maltz, Hui Zhang, Albert G. Greenberg, Gísli Hjálmtýsson, Jennifer Rexford

:
On static reachability analysis of IP networks. 2170-2183 - Zongpeng Li, Baochun Li, Dan Jiang, Lap Chi Lau:

On achieving optimal throughput with network coding. 2184-2194 - Mathilde Durvy, Patrick Thiran:

Reaction-diffusion based transmission patterns for ad hoc networks. 2195-2205 - Xiaohua Jia

, Dongsoo Kim, Sam Makki, Peng-Jun Wan, Chih-Wei Yi
:
Power assignment for k-connectivity in wireless ad hoc networks. 2206-2211 - Lijun Chen

, Steven H. Low, John C. Doyle:
Joint congestion control and media access control design for ad hoc wireless networks. 2212-2222 - Ashish Raniwala, Tzi-cker Chiueh:

Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network. 2223-2234
Volume 4
- Taieb Znati:

Message from the general chair. - Edward W. Knightly, Kia Makki:

Message from the technical program co-chairs. - Reviewers List.

- Christos Gkantsidis, Pablo Rodriguez:

Network coding for large scale content distribution. 2235-2245 - Samrat Ganguly, Akhilesh Saxena, Sudeept Bhatnagar, Rauf Izmailov

, Suman Banerjee:
Fast replication in content distribution overlays. 2246-2256 - Min Dai, Dmitri Loguinov:

Analysis and modeling of MPEG-4 and H.264 multi-layer video traffic. 2257-2267 - Shu Tao, Kuai Xu

, Antonio Jose Estepa
, Teng Fei, Lixin Gao, Roch Guérin, James F. Kurose, Donald F. Towsley
, Zhi-Li Zhang:
Improving VoIP quality through path switching. 2268-2278 - Saikat Ray, Wei Lai, Ioannis Ch. Paschalidis:

Deployment optimization of sensornet-based stochastic location-detection systems. 2279-2289 - Stavros Toumpis, Leandros Tassiulas:

Packetostatics: deployment of massively dense sensor networks as an electrostatics problem. 2290-2301 - Guiling Wang

, Guohong Cao, Thomas F. La Porta, Wensheng Zhang:
Sensor relocation in mobile sensor networks. 2302-2312 - Jie Wu, Shuhui Yang:

SMART: a scan-based movement-assisted sensor deployment method in wireless sensor networks. 2313-2324 - Shiwen Mao, Shivendra S. Panwar, Yiwei Thomas Hou

:
On optimal partitioning of realtime traffic over multiple paths. 2325-2336 - Jaideep Chandrashekar, Zhenhai Duan, Zhi-Li Zhang, Jeffrey Krasky:

Limiting path exploration in BGP. 2337-2348 - Vahid Tabatabaee, Bobby Bhattacharjee, Richard J. La, Mark A. Shayman:

Differentiated traffic engineering for QoS provisioning. 2349-2359 - Hao Wang, Haiyong Xie, Lili Qiu, Abraham Silberschatz, Yang Richard Yang:

Optimal ISP subscription for Internet multihoming: algorithm design and implication analysis. 2360-2371 - Wu-chi Feng, Edward C. Kaiser, A. Luu:

Design and implementation of network puzzles. 2372-2382 - Peter B. Key, Laurent Massoulié, Milan Vojnovic:

Farsighted users harness network time-diversity. 2383-2394 - Murali S. Kodialam, T. V. Lakshman, Sudipta Sengupta:

Configuring networks with content filtering nodes with applications to network security. 2395-2404 - Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos D. Keromytis:

The effect of DNS delays on worm propagation in an IPv6 Internet. 2405-2414 - Matthew Andrews, Lijun Qian, Alexander L. Stolyar:

Optimal utility based multi-user throughput allocation subject to throughput constraints. 2415-2424 - Gijs van Kessel, R. Núñez Queija, Sem C. Borst:

Differentiated bandwidth sharing with disparate flow sizes. 2425-2435 - Abhimanyu Das, Debojyoti Dutta, Ahmed Helmy

, Ashish Goel, John S. Heidemann:
Low-state fairness: lower bounds and practical enforcement. 2436-2446 - Olufemi Komolafe, Joseph S. Sventek:

RSVP performance evaluation using multi-objective evolutionary optimisation. 2447-2457 - Ioannis Ch. Paschalidis, Wei Lai, David Starobinski:

Asymptotically optimal transmission policies for low-power wireless sensor networks. 2458-2469 - Gang Lu, Narayanan Sadagopan, Bhaskar Krishnamachari, Ashish Goel:

Delay efficient sleep scheduling in wireless sensor networks. 2470-2481 - Hai Liu, Peng-Jun Wan, Chih-Wei Yi

, Xiaohua Jia
, S. A. M. Makki, Niki Pissinou:
Maximal lifetime scheduling in sensor surveillance networks. 2482-2491 - Shashidhar Gandham, Milind Dawande, Ravi Prakash

:
Link scheduling in sensor networks: distributed edge coloring revisited. 2492-2501 - Sudarshan Vasudevan, James F. Kurose, Donald F. Towsley:

On neighbor discovery in wireless networks with directional antennas. 2502-2512 - Mario Cagalj, Saurabh Ganeriwal, Imad Aad, Jean-Pierre Hubaux:

On selfish behavior in CSMA/CA networks. 2513-2524 - Xue Yang, Nitin H. Vaidya:

On physical carrier sensing in wireless ad hoc networks. 2525-2535 - J. D. Herdtner, Edwin K. P. Chong

:
Throughput-storage tradeoff in ad hoc networks. 2536-2542 - Yong Liu

, Honggang Zhang, Weibo Gong, Donald F. Towsley
:
On the interaction between overlay routing and underlay routing. 2543-2553 - Junghee Han, David Watson, Farnam Jahanian:

Topology aware overlay networks. 2554-2565 - Nicolas Christin

, John Chuang
:
A cost-based analysis of overlay routing geometries. 2566-2577 - W. Wang, B. Li:

Market-driven bandwidth allocation in selfish overlay networks. 2578-2589 - Raymond Yim, Michael Rosenblum, Vahid Tarokh:

Delay bounds for packetizing time-varying fluid policies with speedup and lookahead in single server systems. 2590-2601 - Xunqi Yu, James W. Modestino, Xusheng Tian:

The accuracy of Gilbert models in predicting packet-loss statistics for a single-multiplexer network model. 2602-2612 - Robin Groenevelt, Eitan Altman:

Analysis of alternating-priority queueing models with (cross) correlated switchover times. 2613-2624 - Nilesh Khude, Anurag Kumar

, Aditya Karnik:
Time and energy complexity of distributed computation in wireless sensor networks. 2625-2637 - Maggie Xiaoyan Cheng, Lu Ruan, Weili Wu:

Achieving minimum coverage breach under bandwidth constraints in wireless sensor networks. 2638-2645 - Emad A. Felemban

, Chang-Gun Lee, Eylem Ekici
, Ryan Boder, Serdar Vural:
Probabilistic QoS guarantee in reliability and timeliness domains in wireless sensor networks. 2646-2657 - Shengli Yuan, Saket Varma, Jason P. Jue:

Minimum-color path problems for reliability in mesh networks. 2658-2669 - Olivier Dousse, Massimo Franceschetti, Patrick Thiran:

Information theoretic bounds on the throughput scaling of wireless relay networks. 2670-2678 - Mung Chiang, Shengyu Zhang, Prashanth Hande:

Distributed rate allocation for inelastic flows: optimization frameworks, optimality conditions, and optimal algorithms. 2679-2690 - Randeep Bhatia, Murali S. Kodialam, T. V. Lakshman, Sudipta Sengupta:

Capacity allocation and routing of locally restorable bandwidth guaranteed connections. 2691-2701 - Weiyi Zhang, Guoliang Xue, Jian Tang, Krishnaiyan Thulasiraman:

Linear time construction of redundant trees for recovery schemes enhancing QoP and QoS. 2702-2710 - Pars Mutaf, Claude Castelluccia:

Compact neighbor discovery: a bandwidth defense through bandwidth optimization. 2711-2719 - Masoud Sharif, Babak Hassibi:

A delay analysis for opportunistic transmission in fading broadcast channels. 2720-2730 - Pradipta De, Ashish Raniwala, Srikant Sharma, Tzi-cker Chiueh:

MiNT: a miniaturized network testbed for mobile wireless research. 2731-2742 - Jean-Yves Le Boudec, Milan Vojnovic:

Perfect simulation and stationarity of a class of mobility models. 2743-2754 - Birsen Sirkeci-Mergen, Anna Scaglione:

A continuum approach to dense wireless networks with cooperation. 2755-2763 - Mark Claypool, Robert E. Kinicki, A. Kumar:

Traffic sensitive active queue management. 2764-2769 - Kuan-Ta Chen, Polly Huang, Chun-Ying Huang

, Chin-Laung Lei:
The impact of network variabilities on TCP clocking schemes. 2770-2775 - Cheng-Yuan Ho, Yi-Cheng Chan, Yaw-Chung Chen:

An efficient mechanism of TCP-Vegas on mobile IP networks. 2776-2780 - Noriaki Kamiyama:

Identifying high-rate flows with less memory. 2781-2785 - Tobias Harks, Tobias Poschwatta:

Utility fair congestion control for real-time traffic. 2786-2791 - Ryuji Wakikawa, Yasuhiro Ohara, Jun Murai:

Virtual mobility control domain for enhancements of mobility protocols. 2792-2797 - Michela Meo

, Fabio Milan:
A rational model for service rate allocation in peer-to-peer networks. 2798-2802 - Tuna Güven, Richard J. La, Mark A. Shayman, Bobby Bhattacharjee:

Measurement-based multipath multicast. 2803-2808 - Li Lao, Jun-Hong Cui, Mario Gerla, Dario Maggiorini

:
A comparative study of multicast protocols: top, bottom, or in the middle?. 2809-2814 - Ming Yang, Jifeng Ru, X. Rong Li, Huimin Chen, Anwer Bashi:

Predicting Internet end-to-end delay: a multiple-model approach. 2815-2819 - Basheer Al-Duwairi, G. Manimaran:

Intentional dropping: a novel scheme for SYN flooding mitigation. 2820-2824 - Daniel Stutzbach, Reza Rejaie:

Capturing accurate snapshots of the Gnutella network. 2825-2830 - Yongguang Zhang, Mohin Ahmed:

A control theoretic analysis of XCP. 2831-2835 - Weibin Zhao, Henning Schulzrinne:

DotSlash: handling Web hotspots at dynamic content Web sites. 2836-2840 - D.-L. Pham, Shinji Sugawara

, Tetsuya Miki:
A new scheduler for real-time applications in differentiated services networks. 2841-2846 - Stefan Schmid, Lars Eggert, Marcus Brunner, Jürgen Quittek:

Towards autonomous network domains. 2847-2852 - Yannis Drougas, Vana Kalogeraki

:
A fair resource allocation algorithm for peer-to-peer overlays. 2853-2858 - Zifei Zhong, Srihari Nelakuditi, Yinzhe Yu, Sanghwan Lee, Junling Wang, Chen-Nee Chuah

:
Failure inferencing based fast rerouting for handling transient link and node failures. 2859-2863 - Avadora Dumitrescu:

Efficient distributed admission control for core-stateless networks. 2864-2869 - Aman Kapoor, Aaron Falk, Theodore Faber, Yuri Pryadkin:

Achieving faster access to satellite link bandwidth. 2870-2875 - Rodrigo Fonseca, Puneet Sharma, Sujata Banerjee

, Sung-Ju Lee, Sujoy Basu:
Distributed querying of Internet distance information. 2876-2881

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














