


default search action
IEEE/ACM Transactions on Networking, Volume 18
Volume 18, Number 1, February 2010
- Guohan Lu, Yan Chen, Stefan Birrer, Fabián E. Bustamante, Xing Li:

POPI: a user-level tool for inferring router packet forwarding priority. 1-14 - Reuven Cohen, Liran Katzir:

Computational analysis and efficient algorithms for micro and macro OFDMA downlink scheduling. 15-26 - Sanghwan Lee, Zhi-Li Zhang, Sambit Sahu, Debanjan Saha:

On suitability of Euclidean embedding for host-based network coordinate systems. 27-40 - Jren-Chit Chin, Yu Dong, Wing-Kai Hon, Chris Yu-Tak Ma, David K. Y. Yau:

Detection of intelligent mobile target in a mobile sensor network. 41-52 - Lanjia Wang, Zhichun Li, Yan Chen, Zhi Fu, Xing Li:

Thwarting zero-day polymorphic worms with network-level length-based signature generation. 53-66 - Ahmed E. Kamal:

1 + N network protection for mesh networks: network coding-based protection using p-cycles. 67-80 - Fong Pong, Nian-Feng Tzeng:

SUSE: superior storage-efficiency for routing tables through prefix transformation and aggregation. 81-94 - Stefan Rührup, Hanna Kalosha, Amiya Nayak, Ivan Stojmenovic:

Message-efficient beaconless georouting with guaranteed delivery in wireless sensor, ad hoc, and actuator networks. 95-108 - Ricardo V. Oliveira, Dan Pei, Walter Willinger, Beichuan Zhang, Lixia Zhang:

The (in)completeness of the observed internet AS-level structure. 109-122 - Jian Ni, Haiyong Xie, Sekhar Tatikonda, Yang Richard Yang:

Efficient and dynamic routing topology inference from end-to-end measurements. 123-135 - Steven Chamberland:

Global access network evolution. 136-149 - Zhen Yu, Yong Guan:

A dynamic en-route filtering scheme for data reporting in wireless sensor networks. 150-163 - Damien Fay, Hamed Haddadi, Andrew Thomason, Andrew W. Moore, Richard Mortier, Almerima Jamakovic, Steve Uhlig, Miguel Rio:

Weighted spectral distribution for internet topology analysis: theory and applications. 164-176 - Yuichi Ohsita, Takashi Miyamura, Shin'ichi Arakawa, Shingo Ata, Eiji Oki, Kohei Shiomoto, Masayuki Murata:

Gradually reconfiguring virtual network topologies based on estimated traffic matrices. 177-189 - Behnam Attaran Rezaei, Nima Sarshar, Vwani P. Roychowdhury:

Distributed resource sharing in low-latency wireless ad hoc networks. 190-201 - Tao Shu, Marwan Krunz:

Coverage-time optimization for clustered wireless sensor networks: a power-balancing approach. 202-215 - Jonathan Bredin, Erik D. Demaine, Mohammad Taghi Hajiaghayi, Daniela Rus:

Deploying sensor networks with guaranteed fault tolerance. 216-228 - Bo Zhang, Tze Sing Eugene Ng, Animesh Nandi, Rudolf H. Riedi, Peter Druschel, Guohui Wang:

Measurement-based analysis, modeling, and synthesis of the internet delay space. 229-242 - Lap Kong Law, Konstantinos Pelechrinis, Srikanth V. Krishnamurthy, Michalis Faloutsos:

Downlink capacity of hybrid cellular ad hoc networks. 243-256 - Xiaoming Wang, Dmitri Loguinov:

Understanding and modeling the internet topology: economics and evolution perspective. 257-270 - Balagangadhar G. Bathula, Vinod Vokkarane:

QoS-based manycasting over optical burst-switched (OBS) networks. 271-283 - Bin Wu, Kwan L. Yeung, Pin-Han Ho:

ILP formulations for p-cycle design without candidate cycle enumeration. 284-295 - Rajgopal Kannan, Shuangqing Wei, Vasu Chakravarthy, Muralidhar Rangaswamy:

Approximation algorithms for minimum energy transmission scheduling in rate and duty-cycle constrained wireless networks. 296-306 - Saikat Ray, Roch Guérin, Kin Wah Kwong, Rute Sofia:

Always acyclic distributed path computation. 307-319 - Mo Li, Yunhao Liu:

Rendered path: range-free localization in anisotropic sensor networks with holes. 320-332
Volume 18, Number 2, April 2010
- Gireesh Shrimali, Aditya Akella, Almir Mutapcic:

Cooperative interdomain traffic engineering using Nash bargaining and decomposition. 341-352 - Dragos Andrei, Massimo Tornatore, Marwan Batayneh, Charles U. Martel, Biswanath Mukherjee:

Provisioning of deadline-driven requests with flexible transmission rates in WDM mesh networks. 353-366 - Amit Mondal, Aleksandar Kuzmanovic:

Upgrading mice to elephants: effects and end-point solutions. 367-378 - Yufang Xi, Edmund M. Yeh:

Distributed algorithms for minimum cost multicast with network coding. 379-392 - Gagan Raj Gupta, Ness B. Shroff:

Delay analysis for wireless networks with single hop traffic and general interference constraints. 393-405 - Longbo Huang, Michael J. Neely:

The optimality of two prices: maximizing revenue in a stochastic communication system. 406-419 - Bozidar Radunovic, Christos Gkantsidis, Peter B. Key, Pablo Rodriguez:

Toward practical opportunistic routing with intra-session network coding for mesh networks. 420-433 - Satyajayant Misra, Seung Don Hong, Guoliang Xue, Jian Tang:

Constrained relay node placement in wireless sensor networks: formulation and approximations. 434-447 - Nadim Parvez, Anirban Mahanti, Carey L. Williamson:

An analytic throughput model for TCP NewReno. 448-461 - Ashraf Al Daoud, Murat Alanyali, David Starobinski:

Pricing strategies for spectrum lease in secondary markets. 462-475 - Srinivas Shakkottai, Ramesh Johari:

Demand-aware content distribution on the internet. 476-489 - Alex X. Liu, Chad R. Meiners, Eric Torng:

TCAM Razor: a systematic approach towards minimizing packet classifiers in TCAMs. 490-500 - Longbi Lin, Xiaojun Lin, Ness B. Shroff:

Low-complexity and distributed energy minimization in multihop wireless networks. 501-514 - Joohwan Kim, Xiaojun Lin, Ness B. Shroff, Prasun Sinha:

Minimizing delay and maximizing lifetime for wireless sensor networks with anycast. 515-528 - Si-Qing Zheng, Ashwin Gumaste, Hong Shen:

A parallel self-routing rearrangeable nonblocking multi-log2 N photonic switching network. 529-539 - Ilenia Tinnirello, Giuseppe Bianchi:

Rethinking the IEEE 802.11e EDCA performance modeling methodology. 540-553 - Nilanjan Banerjee, Mark D. Corner, Brian Neil Levine:

Design and field experimentation of an energy-efficient architecture for DTN throwboxes. 554-567 - Reuven Cohen, Gabi Nakibly:

Maximizing restorable throughput in MPLS networks. 568-581 - Sheng Zhong, Fan Wu:

A collusion-resistant routing scheme for noncooperative wireless ad hoc networks. 582-595 - Aruna Balasubramanian, Brian Neil Levine, Arun Venkataramani:

Replication routing in DTNs: a resource allocation approach. 596-609 - Mohamed Hefeeda, Cheng-Hsin Hsu:

On burst transmission scheduling in mobile TV broadcast networks. 610-623 - Chuan-Ching Sue, Hsaing-Wen Cheng:

A fitting report position scheme for the gated IPACT dynamic bandwidth algorithm in EPONs. 624-637 - Atilla Eryilmaz, Asuman E. Ozdaglar, Devavrat Shah, Eytan H. Modiano:

Distributed cross-layer algorithms for the optimal control of multihop wireless networks. 638-651 - Joel Sommers, Paul Barford, Nick G. Duffield, Amos Ron:

Multiobjective monitoring for SLA compliance. 652-665 - Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuzmanovic, Antonio Nucci:

Googling the internet: profiling internet endpoints via the world wide web. 666-679
Volume 18, Number 3, June 2010
- Cheng-Hsin Hsu, Mohamed Hefeeda

:
Broadcasting Video Streams Encoded With Arbitrary Bit Rates in Energy-Constrained Mobile TV Networks. 681-694 - David Starobinski, Weiyao Xiao:

Asymptotically Optimal Data Dissemination in Multichannel Wireless Sensor Networks: Single Radios Suffice. 695-707 - Martin Karsten:

Approximation of Generalized Processor Sharing With Interleaved Stratified Timer Wheels. 708-721 - Ioannis Broustis, Konstantina Papagiannaki, Srikanth V. Krishnamurthy

, Michalis Faloutsos
, Vivek P. Mhatre:
Measurement-Driven Guidelines for 802.11 WLAN Design. 722-735 - Suat Özdemir

, Hasan Cam:
Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks. 736-749 - Nina Skorin-Kapov, Jiajia Chen

, Lena Wosinska
:
A New Approach to Optical Networks Security: Attack-Aware Routing and Wavelength Assignment. 750-760 - Yun Mao, Feng Wang, Lili Qiu, Simon Lam, Jonathan Smith:

S4: Small State and Small Stretch Compact Routing Protocol for Large Static Wireless Networks. 761-774 - Richard T. B. Ma

, Dah-Ming Chiu, John Chi-Shing Lui, Vishal Misra, Dan Rubenstein:
Internet Economics: The Use of Shapley Value for ISP Settlement. 775-787 - V. J. Venkataramanan, Xiaojun Lin:

On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability. 788-801 - Hongseok Kim, Gustavo de Veciana:

Leveraging Dynamic Spare Capacity in Wireless Systems to Conserve Mobile Terminals' Energy. 802-815 - Abdallah Khreishah

, Chih-Chun Wang, Ness B. Shroff:
Rate Control With Pairwise Intersession Network Coding. 816-829 - Enrique Campos-Náñez:

Decentralized Algorithms for Adaptive Pricing in Multiclass Loss Networks. 830-843 - Ao Tang, Xiaoliang Wei, Steven H. Low, Mung Chiang:

Equilibrium of Heterogeneous Congestion Control: Optimality and Stability. 844-857 - Parbati K. Manna, Shigang Chen, Sanjay Ranka

:
Inside the Permutation-Scanning Worms: Propagation Modeling and Analysis. 858-870 - Jun Luo

, Jean-Pierre Hubaux:
Joint Sink Mobility and Routing to Maximize the Lifetime of Wireless Sensor Networks: The Case of Constrained Mobility. 871-884 - Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, Feng Xiao:

SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks. 885-898 - Chris Chambers, Wu-chang Feng, Sambit Sahu, Debanjan Saha, David Brandt:

Characterizing Online Games. 899-910 - Cesare Roseti

, Michele Luglio
, Francesco Zampognaro
:
Analysis and Performance Evaluation of a Burst-Based TCP for Satellite DVB RCS Links. 911-921 - Qingya She, Xiaodong Huang, Jason P. Jue:

How Reliable Can Two-Path Protection Be? 922-933 - Ziqiu Yun, Xiaole Bai, Dong Xuan, Ten-Hwang Lai, Weijia Jia

:
Optimal Deployment Patterns for Full Coverage and k -Connectivity (k <= 6) Wireless Sensor Networks. 934-947 - Wencheng Lu, Sartaj Sahni:

Low-Power TCAMs for Very Large Forwarding Tables. 948-959 - Libin Jiang, Jean C. Walrand:

A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless Networks. 960-972 - Ritesh Madan, Stephen P. Boyd, Sanjay Lall

:
Fast Algorithms for Resource Allocation in Wireless Cellular Networks. 973-984 - Ornan Ori Gerstel, Galen H. Sasaki:

A General Framework for Service Availability for Bandwidth-Efficient Connection-Oriented Networks. 985-995 - Chun-I Fan, Pei-Hsiu Ho, Ruei-Hau Hsu:

Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications. 996-1009
Volume 18, Number 4, August 2010
- Milan Vojnovic, Varun Gupta, Thomas Karagiannis, Christos Gkantsidis:

Sampling Strategies for Epidemic-Style Information Dissemination. 1013-1025 - Mariyam Mirza, Joel Sommers, Paul Barford, Xiaojin Zhu:

A Machine Learning Approach to TCP Throughput Prediction. 1026-1039 - Jörg Liebeherr, Markus Fidler, Shahrokh Valaee:

A System-Theoretic Approach to Bandwidth Estimation. 1040-1053 - Yufang Xi, Edmund M. Yeh:

Throughput Optimal Distributed Power Control of Stochastic Wireless Networks. 1054-1066 - Song Guo

, Victor C. M. Leung
:
A Distributed Algorithm for Min-Max Tree and Max-Min Cut Problems in Communication Networks. 1067-1076 - Bing Hu, Kwan L. Yeung:

Feedback-Based Scheduling for Load-Balanced Two-Stage Switches. 1077-1090 - Ming Yu, Mengchu Zhou:

A Performance Modeling Scheme for Multistage Switch Networks With Phase-Type and Bursty Traffic. 1091-1104 - Sriram Lakshmanan, Cheng-Lin Tsao, Raghupathy Sivakumar:

Aegis: Physical Space Security for Wireless Networks With Smart Antennas. 1105-1118 - Yanming Shen, Shivendra S. Panwar, H. Jonathan Chao:

SQUID: A Practical 100% Throughput Scheduler for Crosspoint Buffered Switches. 1119-1131 - Yunhao Liu, Kebin Liu, Mo Li

:
Passive Diagnosis for Wireless Sensor Networks. 1132-1144 - Xiang-Yang Li, Yunhao Liu, Shi Li, Shaojie Tang:

Multicast Capacity of Wireless Ad Hoc Networks Under Gaussian Channel Model. 1145-1157 - Sudipta Sengupta, Shravan K. Rayanchu, Suman Banerjee:

Network Coding-Aware Routing in Wireless Networks. 1158-1170 - Murtaza Zafer, Bong Jun Ko, Ivan Wang Hei Ho

:
Transmit Power Estimation Using Spatially Diverse Measurements Under Wireless Fading. 1171-1180 - Haythem Bany Salameh

, Marwan Krunz, Ossama Younis:
Cooperative Adaptive Spectrum Sharing in Cognitive Radio Networks. 1181-1194 - Yong Liu

:
Delay Bounds of Chunk-Based Peer-to-Peer Video Streaming. 1195-1206 - Can Emre Koksal:

Rate Quantization and the Speedup Required to Achieve 100% Throughput for Multicast Over Crossbar Switches. 1207-1219 - Hassan Gobjuka, Yuri Breitbart:

Ethernet Topology Discovery for Networks With Incomplete Information. 1220-1233 - Zubair Md Fadlullah

, Tarik Taleb, Athanasios V. Vasilakos
, Mohsen Guizani, Nei Kato:
DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis. 1234-1247 - Di Wu, Yong Liu

, Keith W. Ross:
Modeling and Analysis of Multichannel P2P Live Video Systems. 1248-1260 - Patrick Loiseau, Paulo Gonçalves, Guillaume Dewaele, Pierre Borgnat

, Patrice Abry
, Pascale Vicat-Primet:
Investigating Self-Similarity and Heavy-Tailed Distributions on a Large-Scale Experimental Facility. 1261-1274 - Mario Barbera, Alfio Lombardo

, Carla Panarello, Giovanni Schembra
:
Queue Stability Analysis and Performance Evaluation of a TCP-Compliant Window Management Mechanism. 1275-1288 - Kishore Ramachandran, Ravi Kokku, Honghai Zhang, Marco Gruteser:

Symphony: Synchronous Two-Phase Rate and Power Control in 802.11 WLANs. 1289-1302 - Lijun Chen

, Steven H. Low, John C. Doyle:
Random Access Game and Medium Access Control Design. 1303-1316 - Changchuan Yin, Long Gao, Shuguang Cui

:
Scaling Laws for Overlaid Wireless Networks: A Cognitive Radio Network versus a Primary Network. 1317-1329 - Bill Lin, Isaac Keslassy

:
The Concurrent Matching Switch Architecture. 1330-1343
Volume 18, Number 5, October 2010
- Xiaolong Li, Homayoun Yousefi'zadeh:

Analysis, Simulation, and Implementation of VCP: A Wireless Profiling. 1345-1358 - Mikhail Afanasyev, Tsuwei Chen, Geoffrey M. Voelker, Alex C. Snoeren:

Usage Patterns in an Urban WiFi Network. 1359-1372 - Shervan Fashandi, Shahab Oveis Gharan, Amir K. Khandani:

Path Diversity Over Packet Switched Networks: Performance Analysis and Rate Allocation. 1373-1386 - Jun Luo

, Catherine Rosenberg, André Girard:
Engineering Wireless Mesh Networks: Joint Scheduling, Routing, Power Control, and Rate Adaptation. 1387-1400 - Leonard H. Grokop, David N. C. Tse:

Spectrum Sharing Between Wireless Networks. 1401-1412 - Irene Ya-Ping Chen, Li-Da Tong, Yi-Ming Huang:

Rearrangeable Nonblocking Optical Interconnection Network Fabrics With Crosstalk Constraints. 1413-1421 - Ao Tang, Lachlan L. H. Andrew, Krister Jacobsson, Karl Henrik Johansson

, Håkan Hjalmarsson
, Steven H. Low:
Queue Dynamics With Window Flow Control. 1422-1435 - S. Q. Zheng, Jianping Wang

, Bing Yang, Mei Yang:
Minimum-Cost Multiple Paths Subject to Minimum Link and Node Sharing in a Network. 1436-1449 - Utku Günay Acer

, Shivkumar Kalyanaraman, Alhussein A. Abouzeid
:
Weak State Routing for Large-Scale Dynamic Networks. 1450-1463 - Chandrashekhar Thejaswi P. S., Junshan Zhang, Man-On Pun, H. Vincent Poor

, Dong Zheng:
Distributed Opportunistic Scheduling With Two-Level Probing. 1464-1477 - Eli Brosh, Salman Abdul Baset, Vishal Misra, Dan Rubenstein, Henning Schulzrinne

:
The Delay-Friendliness of TCP for Real-Time Traffic. 1478-1491 - Madanagopal Ramachandran

, N. Usha Rani, Timothy A. Gonsalves:
Path Computation Algorithms for Dynamic Service Provisioning With Protection and Inverse Multiplexing in SDH/SONET Networks. 1492-1504 - Alessandro Finamore, Marco Mellia

, Michela Meo
, Dario Rossi:
KISS: Stochastic Packet Inspection Classifier for UDP Traffic. 1505-1515 - Domenico Giustiniano

, David Malone
, Douglas J. Leith
, Konstantina Papagiannaki:
Measuring Transmission Opportunities in 802.11 Links. 1516-1529 - Eyuphan Bulut, Zijian Wang, Boleslaw K. Szymanski

:
Cost-Effective Multiperiod Spraying for Routing in Delay-Tolerant Networks. 1530-1543 - MohammadHossein Bateni, Alexandre Gerber, Mohammad Taghi Hajiaghayi, Subhabrata Sen:

Multi-VPN Optimization for Scalable Routing via Relaying. 1544-1556 - Konstantinos Christodoulopoulos

, Konstantinos Manousakis
, Emmanouel A. Varvarigos
:
Offline Routing and Wavelength Assignment in Transparent WDM Networks. 1557-1570 - Yan Wu, Zhoujia Mao, Sonia Fahmy

, Ness B. Shroff:
Constructing Maximum-Lifetime Data-Gathering Forests in Sensor Networks. 1571-1584 - Tianxiong Ji, Eleftheria Athanasopoulou, R. Srikant:

On Optimal Scheduling Algorithms for Small Generalized Switches. 1585-1598 - Neda Beheshti, Emily F. Burmeister, Yashar Ganjali, John E. Bowers, Daniel J. Blumenthal

, Nick McKeown:
Optical Packet Buffers for Backbone Internet Routers. 1599-1609 - Shan Chu, Xin Wang:

Opportunistic and Cooperative Spatial Multiplexing in MIMO Ad Hoc Networks. 1610-1623 - Giusi Alfano, Michele Garetto

, Emilio Leonardi
, Valentina Martina:
Capacity Scaling of Wireless Networks With Inhomogeneous Node Density: Lower Bounds. 1624-1636 - Yung Yi, Gustavo de Veciana, Sanjay Shakkottai:

MAC Scheduling With Low Overheads by Learning Neighborhood Contention Patterns. 1637-1650 - Agostino Forestiero

, Emilio Leonardi
, Carlo Mastroianni
, Michela Meo
:
Self-Chord: A Bio-Inspired P2P Framework for Self-Organizing Distributed Systems. 1651-1664 - Anat Bremler-Barr

, David Hay, Danny Hendler, Ron M. Roth:
PEDS: A Parallel Error Detection Scheme for TCAM Devices. 1665-1675
Volume 18, Number 6, December 2010
- Nizar Bouabdallah, Rami Langar, Raouf Boutaba:

Design and Analysis of Mobility-Aware Clustering Algorithms for Wireless Mesh Networks. 1677-1690 - Srinivas Shakkottai, Xin Liu, Rayadurgam Srikant:

The Multicast Capacity of Large Multihop Wireless Networks. 1691-1700 - Douglas M. Blough, Giovanni Resta

, Paolo Santi:
Approximation Algorithms for Wireless Link Scheduling With SINR-Based Interference. 1701-1712 - Sastry Kompella

, Jeffrey E. Wieselthier, Anthony Ephremides, Hanif D. Sherali, Gam D. Nguyen:
On Optimal SINR-Based Scheduling in Multihop Wireless Networks. 1713-1724 - Nikhil Shetty, Galina Schwartz, Jean C. Walrand:

Internet QoS and Regulations. 1725-1737 - Y. M. Ko, N. Gautam:

Epidemic-Based Information Dissemination in Wireless Mobile Sensor Networks. 1738-1751 - Adam Kirsch, Michael Mitzenmacher:

The Power of One Move: Hashing Schemes for Hardware. 1752-1765 - Ali Tajer, Xiaodong Wang:

Multiuser Diversity Gain in Cognitive Networks. 1766-1779 - Ashima Gupta, Debalina Ghosh, Prasant Mohapatra:

Scheduling Prioritized Services in Multihop OFDMA Networks. 1780-1792 - Soumya Sen, Youngmi Jin, Roch Guérin, Kartik Hosanagar:

Modeling the Dynamics of Network Technology Adoption and the Role of Converters. 1793-1805 - Zheng Yang, Yunhao Liu, Xiang-Yang Li:

Beyond Trilateration: On the Localizability of Wireless Ad Hoc Networks. 1806-1814 - Zheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing Morley Mao, Randy Bush:

iSPY: Detecting IP Prefix Hijacking on My Own. 1815-1828 - Yong Liao, Lixin Gao, Roch Guérin, Zhi-Li Zhang:

Safe Interdomain Routing Under Diverse Commercial Agreements. 1829-1840 - Gaurav S. Kasbekar, Saswati Sarkar:

Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks. 1841-1854 - Diana Berbecaru

, Luca Albertalli, Antonio Lioy
:
The ForwardDiffSig Scheme for Multicast Authentication. 1855-1868 - Mohammad A. Saleh, Ahmed E. Kamal:

Design and Provisioning of WDM Networks With Many-to-Many Traffic Grooming. 1869-1882 - Diego Lucerna, Massimo Tornatore

, Achille Pattavina:
Algorithms and Models for Backup Reprovisioning in WDM Networks. 1883-1894 - Hyang-Won Lee, Eytan H. Modiano, Kayi Lee:

Diverse Routing in Networks With Probabilistic Failures. 1895-1907 - Reuven Cohen, Guy Grebla, Liran Katzir

:
Cross-Layer Hybrid FEC/ARQ Reliable Multicast With Adaptive Modulation and Coding in Broadband Wireless Networks. 1908-1920 - Jaeok Park, Mihaela van der Schaar:

Medium Access Control Protocols With Memory. 1921-1934 - Kaidi D. Huang, Ken R. Duffy

, David Malone
:
On the Validity of IEEE 802.11 MAC Modeling Hypotheses. 1935-1948 - Joseph Camp

, Edward W. Knightly:
Modulation Rate Adaptation in Urban and Vehicular Environments: Cross-Layer Implementation and Experimental Evaluation. 1949-1962 - Hanan Shpungin, Michael Segal

:
Near-Optimal Multicriteria Spanner Constructions in Wireless Ad Hoc Networks. 1963-1976 - Domenico Ficara, Andrea Di Pietro, Stefano Giordano

, Gregorio Procissi
, Fabio Vitucci:
Enhancing Counting Bloom Filters Through Huffman-Coded Multilayer Structures. 1977-1987 - Shrinivasa Kini, Srinivasan Ramasubramanian, Amund Kvalbein, Audun Fosselie Hansen:

Fast Recovery From Dual-Link or Single-Node Failures in IP Networks Using Tunneling. 1988-1999

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














