INFOCOM 2011. 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 10-15 April 2011, Shanghai, China.
: Exploiting Tag-based Path Diversity in the DLG-Kautz network.
Secure Wireless Networks
Spectrum Allocation and Channel Assignment
, Yuan Xue
: Towards robust and efficient routing in multi-radio, multi-channel wireless mesh networks.
Resource Allocation in Cellular Networks
Cloud and Network Management
, Leandro Navarro
: Limits of energy saving for the allocation of data center resources to networked applications.
, Yaling Yang
: Information propagation speed study in multihop cognitive radio networks.
, Jung-Min Park
: Asynchronous channel hopping for establishing rendezvous in cognitive radio networks.
, Wenye Wang
: On distribution and limits of information dissemination latency and speed in mobile cognitive radio networks.
Routing in Wireless Networks
Wireless Sensor Networks I
, Xueyan Tang
: Scheduling data collection with dynamic traffic patterns in wireless sensor networks.
Routing and Forwarding
Security and Privacy in Wireless Sensor Networks
, Xiaojiang Du
: Biometric-based two-level secure access control for Implantable Medical Devices during emergencies.
RFID and WLAN
, Wei Li
, Xiuzhen Cheng
: Partially overlapping channel assignment based on "node orthogonality" for 802.11 wireless networks.
, Wei Lou
: The digital rights management game in peer-to-peer streaming systems.
Vehicular Ad Hoc Networks
Energy Efficiency and Congestion Control
, Ahmed Helmy
: Spatio-temporal modeling of wireless users internet access patterns using self-organizing maps.
Wireless Ad Hoc Networks
Incentive and Economic Models
Wireless Sensor Networks II
, Jianzhong Li
: Global weighted fairness guaranteed congestion avoidance protocol for wireless sensor networks.
, Do Young Eun
: Smart sleep: Sleep more to reduce delay in duty-cycled wireless sensor networks.
, Ying He
: GeoQuorum: Load balancing and energy efficient data access in wireless sensor networks.
Mobile ad hoc networks (MANET) 1
Peer-to-peer Networks 1
Performance Analysis and Modeling 1
Network coding 1
Wireless sensor network design 1
Cloud/Grid computing and networks 1
Wireless cross-layer design 1
Wireless network monitoring and measurement 1
, Yuan He
, Mo Li
, Jiliang Wang
, Kebin Liu
, Lufeng Mo
, Wei Dong
, Zheng Yang
, Min Xi
, Jizhong Zhao
, Xiang-Yang Li
: Does wireless sensor network scale? A measurement study on GreenOrbs.
Mobile ad hoc networks (MANET) 2
Peer-to-peer networks 2
Performance analysis and modeling 2
Network coding 2
Wireless sensor network design 2
CloudlGrid computing and networks 2
Wireless cross-layer design 2
Wireless network monitoring and measurement 2
Mobile ad hoc networks (MANET) 3
Peer-to-peer networks 3
, Baochun Li
: Asymptotic optimality of randomized peer-to-peer broadcast with network coding.
, John C. S. Lui
: Exploring the optimal replication strategy in P2P-VoD systems: Characterization and evaluation.
Performance analysis and modeling 3
Network Quality of Service
Wireless sensor network design 3
Energy-efficient networks 1
Data center networking 1
Wireless network security 1
Peer-to-peer networks 4
Performance analysis and modeling 4
, Xiaojun Cao
, Yi Pan
: A study of the routing and spectrum allocation in spectrum-sliced Elastic Optical Path networks.
Wireless sensor network design 4
Energy-efficient networks 2
, Wenye Wang
: Information delivery in large wireless networks with minimum energy expense.
Data center networking 2
Wireless network security 2
Performance analysis and modeling 5
Cyber-physical systems and networks
Network algorithms and calculus 1
Michael J. Neely
: Opportunistic scheduling with worst case delay guarantees in single and multi-hop networks.
Wireless sensor network design 5
Internet monitoring and measurement 1
Firewalls and network intrusion detection 1
, Haiying Shen
: SOAP: A Social network Aided Personalized and effective spam filter to clean your e-mail box.
Wireless network security 3
, Wenye Wang
, Cliff Wang
: From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic.
, Guohong Cao
: APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based services.
Network algorithms and calculus 2
Wireless sensor network design 6
, Rong Zheng
: Robust coverage under uncertainty in wireless sensor networks.
Wireless mesh networks
, Yang Yang
, Li Xiao
: Multi-path routing and rate allocation for multi-source video on-demand streaming in wireless mesh networks.
Internet monitoring and measurement 2
Firewalls and network intrusion detection 2
Wireless network security 4
, Fan Bai
: ETP: Encounter Transfer Protocol for opportunistic vehicle communication.
Cognitive radio and software defined radio 1
Wireless sensor network design 7
Online social networks
Scheduling, flow, and congestion control 1
Internet monitoring and measurement 3
Future Internet architectures
Network privacy and trustworthiness
, Yaling Yang
: Location privacy protection from RSS localization system using antenna pattern synthesis.
, Xue Liu
: Scheduling design and analysis for end-to-end heterogeneous flows in an avionics network.
Cognitive radio and software defined radio 2
, Jaehyuk Choi
, Kang G. Shin
: Wi-Fi 2.0: Price and quality competitions of duopoly cognitive radio wireless service providers with time-varying spectrum availability.
, Mingyan Liu
: Online learning in opportunistic spectrum access: A restless bandit approach.
Wireless sensor network design 8
Wireless resource/spectrum management 1
Wireless cellular networks 1
Chee Wei Tan
: Optimal power control in Rayleigh-fading heterogeneous networks.
, Shiwen Mao
: Downlink power control for variable bit rate videos over multicell wireless networks.
Scheduling, flow, and congestion control 2
, Atilla Eryilmaz
: On the limitations of randomization for Queue-Length-Based Scheduling in wireless networks.
Internet monitoring and measurement 4
Wireless LAN/MAN 1
Network economics and pricing