


default search action
IEEE/ACM Transactions on Networking, Volume 20
Volume 20, Number 1, February 2012
- Neal Charbonneau, Vinod Vokkarane

:
Static Routing and Wavelength Assignment for Multicast Advance Reservation in All-Optical Wavelength-Routed WDM Networks. 1-14 - Hanan Shpungin, Zongpeng Li:

Throughput and Energy Efficiency in Wireless Ad Hoc Networks With Gaussian Channels. 15-28 - Binbin Chen

, Ziling Zhou, Yuda Zhao, Haifeng Yu:
Efficient Error Estimating Coding: Feasibility and Applications. 29-44 - Saqib Raza, Guanyao Huang, Chen-Nee Chuah

, Srini Seetharaman, Jatinder Pal Singh:
MeasuRouting: A Framework for Routing Assisted Traffic Monitoring. 45-56 - Peilong Li, Honghai Zhang, Baohua Zhao, Sampath Rangarajan:

Scalable Video Multicast With Adaptive Modulation and Coding in Broadband Wireless Data Systems. 57-68 - Chandramani Kishore Singh, Saswati Sarkar, Alireza Aram, Anurag Kumar

:
Cooperative Profit Sharing in Coalition-Based Resource Allocation in Wireless Networks. 69-83 - Kai Chen

, Chuanxiong Guo
, Haitao Wu, Jing Yuan, Zhenqian Feng, Yan Chen, Songwu Lu, Wenfei Wu:
DAC: Generic and Automatic Address Configuration for Data Center Networks. 84-99 - Arun Sridharan, Can Emre Koksal, Elif Uysal-Biyikoglu

:
A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels. 100-113 - Ferhat Dikbiyik, Laxman H. Sahasrabuddhe, Massimo Tornatore

, Biswanath Mukherjee:
Exploiting Excess Capacity to Improve Robustness of WDM Mesh Networks. 114-124 - Minlan Yu, Marina Thottan, Li (Erran) Li:

Latency Equalization as a New Network Service Primitive. 125-138 - Myungjin Lee, Nick G. Duffield

, Ramana Rao Kompella:
Opportunistic Flow-Level Latency Estimation Using Consistent NetFlow. 139-152 - Sangman Cho, Theodore Elhourani, Srinivasan Ramasubramanian:

Independent Directed Acyclic Graphs for Resilient Multipath Routing. 153-162 - Berk Birand, Maria Chudnovsky

, Bernard Ries
, Paul D. Seymour
, Gil Zussman, Yori Zwols:
Analyzing the Performance of Greedy Maximal Scheduling via Local Pooling and Graph Theory. 163-176 - Hongseok Kim, Gustavo de Veciana, Xiangying Yang, Muthaiah Venkatachalam:

Distributed ά-Optimal User Association and Cell Load Balancing in Wireless Networks. 177-190 - Giuseppe Campobello, Alessandro Leonardi, Sergio Palazzo:

Improving Energy Saving and Reliability in Wireless Sensor Networks Using a Simple CRT-Based Packet-Forwarding Solution. 191-205 - Mosharaf Chowdhury, Muntasir Raihan Rahman, Raouf Boutaba:

ViNEYard: Virtual Network Embedding Algorithms With Coordinated Node and Link Mapping. 206-219 - Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta:

Abnormally Malicious Autonomous Systems and Their Internet Connectivity. 220-230 - Julien Ridoux, Darryl Veitch, Timothy Broomhead:

The Case for Feed-Forward Clock Synchronization. 231-242 - Abhijeet Bhorkar, Mohammad Naghshvar, Tara Javidi

, Bhaskar D. Rao:
Adaptive Opportunistic Routing for Wireless Ad Hoc Networks. 243-256 - Hayang Kim, Xiaoli Ma, Benjamin R. Hamilton:

Tracking Low-Precision Clocks With Time-Varying Drifts Using Kalman Filtering. 257-270 - Yihua He, Michalis Faloutsos

, Srikanth V. Krishnamurthy
, Marek Chrobak:
Obtaining Provably Legitimate Internet Topologies. 271-284 - Matthew Andrews, Antonio Fernández Anta

, Lisa Zhang, Wenbo Zhao:
Routing for Power Minimization in the Speed Scaling Model. 285-294 - Fang Hao, Murali S. Kodialam, T. V. Lakshman, Haoyu Song

:
Fast Dynamic Multiple-Set Membership Testing Using Combinatorial Bloom Filters. 295-304 - Yunbo Wang, Mehmet C. Vuran

, Steve Goddard:
Cross-Layer Analysis of the End-to-End Delay Distribution in Wireless Sensor Networks. 305-318
Volume 20, Number 2, April 2012
- Wei Wei, Sharad Jaiswal, Jim Kurose, Don Towsley

, Kyoungwon Suh, Bing Wang:
Identifying 802.11 Traffic From Passive Measurements Using Iterative Bayesian Inference. 325-338 - Sungho Yun, Constantine Caramanis

:
System-Level Optimization in Wireless Networks: Managing Interference and Uncertainty via Robust Optimization. 339-352 - Justin Manweiler, Naveen Santhapuri, Souvik Sen, Romit Roy Choudhury, Srihari Nelakuditi, Kamesh Munagala:

Order Matters: Transmission Reordering in Wireless Networks. 353-366 - Bridge Qiao Zhao, John C. S. Lui, Dah-Ming Chiu:

A Mathematical Framework for Analyzing Adaptive Incentive Protocols in P2P Networks. 367-380 - Fabio Soldo, Katerina J. Argyraki

, Athina Markopoulou
:
Optimal Source-Based Filtering of Malicious Traffic. 381-395 - Mukundan Venkataraman, Mainak Chatterjee:

Quantifying Video-QoE Degradations of Internet Links. 396-407 - Guoqiang Mao

, Brian D. O. Anderson:
Towards a Better Understanding of Large-Scale Network Models. 408-421 - Michael Menth, Frank Lehrieder:

Performance of PCN-Based Admission Control Under Challenging Conditions. 422-435 - Miklós Reiter, Richard Steinberg

:
Congestion-Dependent Pricing and Forward Contracts for Complementary Segments of a Communication Network. 436-449 - Rui Tan, Guoliang Xing, Benyuan Liu, Jianping Wang

, Xiaohua Jia
:
Exploiting Data Fusion to Improve the Coverage of Wireless Sensor Networks. 450-462 - Luca Chiaraviglio

, Marco Mellia
, Fabio Neri:
Minimizing ISP Network Energy Cost: Formulation and Solutions. 463-476 - Niv Buchbinder

, Liane Lewin-Eytan, Ishai Menache, Joseph Naor, Ariel Orda:
Dynamic Power Allocation Under Arbitrary Varying Channels - An Online Approach. 477-487 - Chad R. Meiners, Alex X. Liu, Eric Torng:

Bit Weaving: A Non-Prefix Approach to Compressing Packet Classifiers in TCAMs. 488-500 - Eric Jung, Xin Liu:

Opportunistic Spectrum Access in Multiple-Primary-User Environments Under the Packet Collision Constraint. 501-514 - Kyunghan Lee

, Seongik Hong, Seong Joon Kim, Injong Rhee, Song Chong:
SLAW: Self-Similar Least-Action Human Walk. 515-529 - Tao Shu, Marwan Krunz:

Finding Cheap Routes in Profit-Driven Opportunistic Spectrum Access Networks: A Truthful Mechanism Design Approach. 530-543 - Souvik Sen, Romit Roy Choudhury, Srihari Nelakuditi:

CSMA/CN: Carrier Sense Multiple Access With Collision Notification. 544-556 - Beakcheol Jang, Mihail L. Sichitiu

:
IEEE 802.11 Saturation Throughput Analysis in the Presence of Hidden Terminals. 557-570 - Ahmed Elmokashfi, Amund Kvalbein, Constantine Dovrolis:

BGP Churn Evolution: A Perspective From the Core. 571-584 - Ermin Kozica, W. Bastiaan Kleijn

:
A Quantization Theoretic Perspective on Simulcast and Layered Multicast Optimization. 585-593 - Costas Courcoubetis, Richard R. Weber:

Economic Issues in Shared Infrastructures. 594-608 - Thang N. Dinh

, Ying Xuan, My T. Thai, Panos M. Pardalos, Taieb Znati:
On New Approaches of Assessing Network Vulnerability: Hardness and Approximation. 609-619 - Giovanna Carofiglio, Luca Muscariello:

On the Impact of TCP and Per-Flow Scheduling on Internet Performance. 620-633
Volume 20, Number 3, June 2012
- Khandoker Nadim Parvez, Carey Williamson, Anirban Mahanti, Niklas Carlsson:

Insights on Media Streaming Progress Using BitTorrent-Like Protocols for On-Demand Streaming. 637-650 - Lili Cao, Haitao Zheng:

Balancing Reliability and Utilization in Dynamic Spectrum Access. 651-661 - Matthew Roughan

, Yin Zhang, Walter Willinger, Lili Qiu:
Spatio-Temporal Compressive Sensing and Internet Traffic Matrices (Extended Version). 662-676 - João L. Sobrinho

, Tiago Quelhas:
A Theory for the Connectivity Discovered by Routing Protocols. 677-689 - XiaoHua Xu, Xiang-Yang Li, Peng-Jun Wan, Shaojie Tang:

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks. 690-698 - Masanori Bando, N. Sertac Artan, H. Jonathan Chao:

Scalable Lookahead Regular Expression Detection System for Deep Packet Inspection. 699-714 - Sanjeev Khanna, Santosh S. Venkatesh, Omid Fatemieh, Fariba Khan, Carl A. Gunter:

Adaptive Selective Verification: An Efficient Adaptive Countermeasure to Thwart DoS Attacks. 715-728 - Fong Pong, Nian-Feng Tzeng:

Concise Lookup Tables for IPv4 and IPv6 Longest Prefix Matching in Scalable Routers. 729-741 - Rafael P. Laufer, Henri Dubois-Ferrière, Leonard Kleinrock:

Polynomial-Time Algorithms for Multirate Anypath Routing in Wireless Multihop Networks. 742-755 - Douglas J. Leith

, Qizhi Cao, Vijay G. Subramanian
:
Max-Min Fairness in 802.11 Mesh Networks. 756-769 - Changbin Liu, Ricardo Correa, Xiaozhou Li, Prithwish Basu, Boon Thau Loo

, Yun Mao:
Declarative Policy-Based Adaptive Mobile Ad Hoc Networking. 770-783 - Edoardo Amaldi, Antonio Capone

, Matteo Cesana
, Ilario Filippini
:
Design of Wireless Sensor Networks for Mobile Target Detection. 784-797 - Samir Sebbah, Brigitte Jaumard:

Differentiated Quality-of-Recovery in Survivable Optical Mesh Networks Using $p$ -Structures. 798-810 - Ramana Rao Kompella, Kirill Levchenko, Alex C. Snoeren, George Varghese:

Router Support for Fine-Grained Latency Measurements. 811-824 - Jian Ni, Bo (Rambo) Tan, R. Srikant:

Q-CSMA: Queue-Length-Based CSMA/CA Algorithms for Achieving Maximum Throughput and Low Delay in Wireless Networks. 825-836 - Wei Wang, Kang G. Shin, Wenbo Wang:

Distributed Resource Allocation Based on Queue Balancing in Multihop Cognitive Radio Networks. 837-850 - Yi Zhu, Jason P. Jue:

Reliable Collective Communications With Weighted SRLGs in Optical Networks. 851-863 - Guang Tan, Anne-Marie Kermarrec

:
Greedy Geographic Routing in Large-Scale Sensor Networks: A Minimum Network Decomposition Approach. 864-877 - Siamak Sorooshyari

, Chee Wei Tan
, Mung Chiang:
Power Control for Cognitive Radio Networks: Axioms, Algorithms, and Analysis. 878-891 - Parvathinathan Venkitasubramaniam

, Lang Tong:
A Game-Theoretic Approach to Anonymous Networking. 892-905 - Abishek Gopalan, Srinivasan Ramasubramanian:

On Identifying Additive Link Metrics Using Linearly Independent Cycles and Paths. 906-916 - Xinbing Wang, Luoyi Fu, Chenhui Hu:

Multicast Performance With Hierarchical Cooperation. 917-930 - Brian Eriksson, Gautam Dasarathy

, Paul Barford, Robert D. Nowak:
Efficient Network Tomography for Internet Topology Discovery. 931-943 - Dan Li, Yuanjie Li, Jianping Wu, Sen Su, Jiangwei Yu:

ESM: Efficient and Scalable Data Center Multicast Routing. 944-955 - Zizhan Zheng

, Prasun Sinha, Santosh Kumar:
Sparse WiFi Deployment for Vehicular Internet Access With Bounded Interconnection Gap. 956-969 - Anat Bremler-Barr

, Yaron Koral:
Accelerating Multipattern Matching on Compressed HTTP Traffic. 970-983
Volume 20, Number 4, August 2012
- Cataldo Basile

, Alberto Cappadonia, Antonio Lioy
:
Network-Level Access Control Policy Analysis and Transformation. 985-998 - Diego G. Passos

, Célio Vinicius N. de Albuquerque
:
A Joint Approach to Routing Metrics and Rate Adaptation in Wireless Mesh Networks. 999-1009 - Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuzmanovic, Antonio Nucci:

Taming the Mobile Data Deluge With Drop Zones. 1010-1023 - Vicky Sharma, Koushik Kar

, K. K. Ramakrishnan
, Shivkumar Kalyanaraman:
A Transport Protocol to Exploit Multipath Diversity in Wireless Networks. 1024-1039 - Hao Wang, Haiquan (Chuck) Zhao, Bill Lin, Jun (Jim) Xu:

DRAM-Based Statistics Counter Array Architecture With Performance Guarantee. 1040-1053 - Yi Shi

, Y. Thomas Hou
:
Some Fundamental Results on Base Station Movement Problem for Wireless Sensor Networks. 1054-1067 - Ashwini Kumar, Kang G. Shin:

DSASync: Managing End-to-End Connections in Dynamic Spectrum Access Wireless LANs. 1068-1081 - Sharanya Eswaran, Archan Misra

, Thomas F. La Porta:
Control-Theoretic Utility Maximization in Multihop Wireless Networks Under Mission Dynamics. 1082-1095 - Krishna P. Jagannathan

, Mihalis G. Markakis
, Eytan H. Modiano, John N. Tsitsiklis:
Queue-Length Asymptotics for Generalized Max-Weight Scheduling in the Presence of Heavy-Tailed Traffic. 1096-1111 - Bin Li

, Atilla Eryilmaz:
Exploring the Throughput Boundaries of Randomized Schedulers in Wireless Networks. 1112-1124 - Evangelos Bampas

, Aris Pagourtzis
, George Pierrakos, Katerina Potika
:
On a Noncooperative Model for Wavelength Assignment in Multifiber Optical Networks. 1125-1137 - Jung Ryu, Lei Ying

, Sanjay Shakkottai
:
Timescale Decoupled Routing and Rate Control in Intermittently Connected Networks. 1138-1151 - Gabriel Yik Keung, Bo Li, Qian Zhang

:
The Intrusion Detection in Mobile Sensor Network. 1152-1161 - Josep M. Pujol, Vijay Erramilli, Georgos Siganos, Xiaoyuan Yang, Nikolaos Laoutaris

, Parminder Chhabra, Pablo Rodriguez:
The Little Engine(s) That Could: Scaling Online Social Networks. 1162-1175 - Frank Lehrieder, György Dán, Tobias Hoßfeld

, Simon Oechsner, Vlad Singeorzan:
Caching for BitTorrent-Like P2P Systems: A Simple Fluid Model and Its Implications. 1176-1189 - Hongbo Jiang, Arun Iyengar, Erich M. Nahum, Wolfgang Segmuller, Asser N. Tantawi

, Charles P. Wright:
Design, Implementation, and Performance of a Load Balancer for SIP Server Clusters. 1190-1202 - Apoorva Jindal, Mingyan Liu:

Networked Computing in Wireless Sensor Networks for Structural Health Monitoring. 1203-1216 - Charles Shen, Erich M. Nahum, Henning Schulzrinne

, Charles P. Wright:
The Impact of TLS on SIP Server Performance: Measurement and Modeling. 1217-1230 - Daniel Medina, Felix Hoffmann, Francesco Rossetto, Carl-Herbert Rokitansky:

A Geographic Routing Strategy for North Atlantic In-Flight Internet Access Via Airborne Mesh Networking. 1231-1244 - Zhen Ling, Junzhou Luo, Wei Yu

, Xinwen Fu
, Dong Xuan, Weijia Jia
:
A New Cell-Counting-Based Attack Against Tor. 1245-1261 - Masanori Bando, Yi-Li Lin, H. Jonathan Chao:

FlashTrie: Beyond 100-Gb/s IP Route Lookup Using Hash-Based Prefix-Compressed Trie. 1262-1275 - Caihong Kai, Soung Chang Liew:

Applications of Belief Propagation in CSMA Wireless Networks. 1276-1289 - Guowang Miao, Ye (Geoffrey) Li, Ananthram Swami:

Channel-Aware Distributed Medium Access Control. 1290-1303 - Pan Li

, Miao Pan, Yuguang Fang
:
Capacity Bounds of Three-Dimensional Wireless Ad Hoc Networks. 1304-1315 - Long Bao Le

, Eytan H. Modiano, Ness B. Shroff:
Optimal Control of Wireless Networks With Finite Buffers. 1316-1329
Volume 20, Number 5, October 2012
- Ravi Kokku, Rajesh Mahindra, Honghai Zhang, Sampath Rangarajan:

NVS: A Substrate for Virtualizing Wireless Resources in Cellular Networks. 1333-1346 - M. H. R. Khouzani, Saswati Sarkar, Eitan Altman:

Maximum Damage Malware Attack in Mobile Wireless Networks. 1347-1360 - Alex Sherman, Jason Nieh, Clifford Stein:

FairTorrent: A Deficit-Based Distributed Algorithm to Ensure Fairness in Peer-to-Peer Systems. 1361-1374 - Dimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun Wang:

Pacifier: High-Throughput, Reliable Multicast Without "Crying Babies" in Wireless Mesh Networks. 1375-1388 - Wei Chen

, Khaled Ben Letaief
, Zhigang Cao:
Buffer-Aware Network Coding for Wireless Networks. 1389-1401 - Yang Qin, Lie-Liang Yang:

Steady-State Throughput Analysis of Network Coding Nodes Employing Stop-and-Wait Automatic Repeat Request. 1402-1411 - Yongkun Li, Bridge Qiao Zhao, John C. S. Lui:

On Modeling Product Advertisement in Large-Scale Online Social Networks. 1412-1425 - Danhua Guo, Laxmi N. Bhuyan, Bin Liu:

An Efficient Parallelized L7-Filter Design for Multicore Servers. 1426-1439 - Murtaza Zafer, Dakshi Agrawal, Mudhakar Srivatsa:

Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary. 1440-1451 - Joseph Camp

, Ehsan Aryafar, Edward W. Knightly:
Coupled 802.11 Flows in Urban Channels: Model and Experimental Evaluation. 1452-1465 - Yi Gai, Bhaskar Krishnamachari, Rahul Jain

:
Combinatorial Network Optimization With Unknown Variables: Multi-Armed Bandits With Linear Rewards and Individual Observations. 1466-1478 - Danail Traskov, Michael Heindlmaier, Muriel Médard, Ralf Koetter:

Scheduling for Network-Coded Multicast. 1479-1488 - Haoyu Song

, Murali S. Kodialam, Fang Hao, T. V. Lakshman:
Efficient Trie Braiding in Scalable Virtual Routers. 1489-1500 - Wentao Huang, Xinbing Wang:

Capacity Scaling of General Cognitive Networks. 1501-1513 - Mhameed Aezladen, Reuven Cohen, Danny Raz:

Efficient Location-Based Decision-Supporting Content Distribution to Mobile Groups. 1514-1526 - Mohammad A. Saleh, Ahmed E. Kamal:

Approximation Algorithms for Many-to-Many Traffic Grooming in Optical WDM Networks. 1527-1540 - Cem Tekin, Mingyan Liu, Richard Southwell, Jianwei Huang, Sahand Haji Ali Ahmad:

Atomic Congestion Games on Graphs and Their Applications in Networking. 1541-1552 - Wei Gao, Qinghua Li, Bo Zhao, Guohong Cao:

Social-Aware Multicast in Disruption-Tolerant Networks. 1553-1566 - Ramon Aparicio-Pardo, Nina Skorin-Kapov, Pablo Pavón-Mariño, Belen Garcia-Manrubia

:
(Non-)Reconfigurable Virtual Topology Design Under Multihour Traffic in Optical Networks. 1567-1580 - Khoa Tran Phan, Jaeok Park, Mihaela van der Schaar:

Near-Optimal Deviation-Proof Medium Access Control Designs in Wireless Networks. 1581-1594 - Honghai Zhang, Yuanxi Jiang, Karthik Sundaresan, Sampath Rangarajan, Baohua Zhao:

Wireless Multicast Scheduling With Switched Beamforming Antennas. 1595-1607 - Shreeshankar Bodas, Sanjay Shakkottai, Lei Ying

, R. Srikant:
Low-Complexity Scheduling Algorithms for Multichannel Downlink Wireless Networks. 1608-1621 - Tao Li, Shigang Chen, Yibei Ling:

Per-Flow Traffic Measurement Through Randomized Counter Sharing. 1622-1634 - Eugenio Magistretti, Omer Gurewitz, Edward W. Knightly:

Measurement-Driven Modeling of Transmission Coordination for 802.11 Online Throughput Prediction. 1635-1648 - Ruogu Li, Atilla Eryilmaz:

Scheduling for End-to-End Deadline-Constrained Traffic With Reliability Requirements in Multihop Networks. 1649-1662 - Sandeep Yadav, Ashwath Kumar Krishna Reddy, A. L. Narasimha Reddy, Supranamaya Ranjan:

Detecting Algorithmically Generated Domain-Flux Attacks With DNS Traffic Analysis. 1663-1677
Volume 20, Number 6, December 2012
- Minghua Chen

, Miroslav Ponec, Sudipta Sengupta, Jin Li, Philip A. Chou:
Utility maximization in peer-to-peer systems with applications to video conferencing. 1681-1694 - Bo Han, Lusheng Ji, Seungjoon Lee, Bobby Bhattacharjee, Robert R. Miller:

Are all bits equal?: experimental study of IEEE 802.11 communication bit errors. 1695-1706 - Lu Zhang, Xueyan Tang:

Optimizing client assignment for enhancing interactivity in distributed interactive applications. 1707-1720 - Ihsan Ayyub Qazi, Lachlan L. H. Andrew, Taieb Znati:

Congestion control with multipacket feedback. 1721-1733 - He Yan, Lee Breslau, Zihui Ge, Daniel Massey, Dan Pei

, Jennifer Yates:
G-RCA: a generic root cause analysis platform for service quality management in large IP networks. 1734-1747 - Liguang Xie, Yi Shi, Y. Thomas Hou, Hanif D. Sherali:

Making sensor networks immortal: an energy-renewal approach with wireless power transfer. 1748-1761 - János Tapolcai

, Pin-Han Ho, Lajos Rónyai, Bin Wu:
Network-wide local unambiguous failure localization (NWL-UFL) via monitoring trails. 1762-1773 - Fei Chen, Alex X. Liu:

Privacy- and integrity-preserving range queries in sensor networks. 1774-1787 - Daniela Brauckhoff, Xenofontas A. Dimitropoulos, Arno Wagner, Kavé Salamatian:

Anomaly extraction in backbone networks using association rules. 1788-1799 - Yong Ding, Yang Yang, Li Xiao:

Multisource video on-demand streaming in wireless mesh networks. 1800-1813 - Anduo Wang, Limin Jia

, Wenchao Zhou, Yiqing Ren, Boon Thau Loo
, Jennifer Rexford
, Vivek Nigam, Andre Scedrov
, Carolyn L. Talcott:
FSR: formal analysis and implementation toolkit for safe interdomain routing. 1814-1827 - Jérôme François

, Issam Aib, Raouf Boutaba:
FireCol: a collaborative protection network for the detection of flooding DDoS attacks. 1828-1841 - Laurent Vanbever, Stefano Vissicchio, Cristel Pelsser

, Pierre François, Olivier Bonaventure:
Lossless migrations of link-state IGPs. 1842-1855 - Eitan Altman, Anurag Kumar

, Chandramani Kishore Singh, Rajesh Sundaresan:
Spatial SINR games of base station placement and mobile association. 1856-1869 - George B. Mertzios, Ignasi Sau

, Mordechai Shalom
, Shmuel Zaks:
Placing regenerators in optical networks to satisfy multiple sets of requests. 1870-1879 - Thuy T. T. Nguyen, Grenville J. Armitage, Philip Branch, Sebastian Zander:

Timely and continuous machine-learning-based classification for interactive IP traffic. 1880-1894 - Isaac Keslassy

, Kirill Kogan
, Gabriel Scalosub, Michael Segal
:
Providing performance guarantees in multipass network processors. 1895-1909 - Jeff Seibert, Ruben Torres, Marco Mellia

, Maurizio M. Munafò, Cristina Nita-Rotaru, Sanjay G. Rao:
The internet-wide impact of P2P traffic localization on ISP profitability. 1910-1923 - Weiyao Xiao, Sachin Agarwal, David Starobinski, Ari Trachtenberg:

Reliable rateless wireless broadcasting with near-zero feedback. 1924-1937 - Dominic DiPalantino, Ramesh Johari:

Traffic engineering with semiautonomous users: a game-theoretic perspective. 1938-1949 - Jiajia Liu

, Xiaohong Jiang
, Hiroki Nishiyama
, Nei Kato:
Generalized two-hop relay for flexible delay control in MANETs. 1950-1963 - Ziqiu Yun, Xiaole Bai, Dong Xuan, Weijia Jia

, Wei Zhao
:
Pattern mutation in wireless sensor deployment. 1964-1977 - Tao Li, Samuel S. Wu, Shigang Chen, Mark C. K. Yang:

Generalized energy-efficient algorithms for the RFID estimation problem. 1978-1990 - Gaurav S. Kasbekar, Yigal Bejerano, Saswati Sarkar:

Generic coverage verification without location information using dimension reduction. 1991-2004 - Vinod Kone, Lei Yang, Xue Yang, Ben Y. Zhao, Haitao Zheng:

The effectiveness of opportunistic spectrum access: a measurement study. 2005-2016

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














