The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE INFOCOM (infocom)
2010 (conf/infocom/2010)

  1. SolarCode: Utilizing Erasure Codes for Reliable Data Delivery in Solar-powered Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  2. Improved Multi-criteria Spanners for Ad-Hoc Networks Under Energy and Distance Metrics. [Citation Graph (, )][DBLP]

  3. Joint Random Access and Power Selection for Maximal Throughput in Wireless Networks. [Citation Graph (, )][DBLP]

  4. Maximizing Energy Efficiency for Convergecast via Joint Duty Cycle and Route Optimization. [Citation Graph (, )][DBLP]

  5. Routing and Scheduling for Energy and Delay Minimization in the Powerdown Model. [Citation Graph (, )][DBLP]

  6. A Secondary Market for Spectrum. [Citation Graph (, )][DBLP]

  7. Change Management in Enterprise IT Systems: Process Modeling and Capacity-optimal Scheduling. [Citation Graph (, )][DBLP]

  8. Socially-Aware Network Design Games. [Citation Graph (, )][DBLP]

  9. Interactions, Competition and Innovation in a Service-Oriented Internet: An Economic Model. [Citation Graph (, )][DBLP]

  10. Capacity Region of a Wireless Mesh Backhaul Network over the CSMA/CA MAC. [Citation Graph (, )][DBLP]

  11. PinPoint Time Difference of Arrival for Unsynchronized 802.11 Wireless Cards. [Citation Graph (, )][DBLP]

  12. Sample Path Bounds for Long Memory FBM Traffic. [Citation Graph (, )][DBLP]

  13. alpha-Optimal User Association and Cell Load Balancing in Wireless Networks. [Citation Graph (, )][DBLP]

  14. On Providing Non-uniform Scheduling Guarantees in a Wireless Network. [Citation Graph (, )][DBLP]

  15. Measuring Availability in the Domain Name System. [Citation Graph (, )][DBLP]

  16. Topology Discovery for Virtual Local Area Networks. [Citation Graph (, )][DBLP]

  17. High Performance Dictionary-Based String Matching for Deep Packet Inspection. [Citation Graph (, )][DBLP]

  18. Network Coding Tomography for Network Failures. [Citation Graph (, )][DBLP]

  19. Tracking Skype VoIP Calls Over The Internet. [Citation Graph (, )][DBLP]

  20. Recognizing Exponential Inter-Contact Time in VANETs. [Citation Graph (, )][DBLP]

  21. Optimal Activation and Transmission Control in Delay Tolerant Networks. [Citation Graph (, )][DBLP]

  22. PeopleRank: Social Opportunistic Forwarding. [Citation Graph (, )][DBLP]

  23. Assessing the VANET's Local Information Storage Capability under Different Traffic Mobility. [Citation Graph (, )][DBLP]

  24. Dynamic Control of Coding in Delay Tolerant Networks. [Citation Graph (, )][DBLP]

  25. On the Fundamental Limits of Broadcasting in Wireless Mobile Networks. [Citation Graph (, )][DBLP]

  26. On Delay Constrained Multicast Capacity of Large-Scale Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]

  27. Throughput and Delay Analysis on Uncoded and Coded Wireless Broadcast with Hard Deadline Constraints. [Citation Graph (, )][DBLP]

  28. On the Impact of Mobility on Multicast Capacity of Wireless Networks. [Citation Graph (, )][DBLP]

  29. Deterministic Broadcast on Multiple Access Channels. [Citation Graph (, )][DBLP]

  30. Making the Case for Random Access Scheduling in Wireless Multi-hop Networks. [Citation Graph (, )][DBLP]

  31. From Theory to Practice: Evaluating Static Channel Assignments on a Wireless Mesh Network. [Citation Graph (, )][DBLP]

  32. Optimal Solutions for Single Fault Localization in Two Dimensional Lattice Networks. [Citation Graph (, )][DBLP]

  33. An Experimental Case for SIMO Random Access in Multi-hop Wireless Networks. [Citation Graph (, )][DBLP]

  34. SlideOR: Online Opportunistic Network Coding in Wireless Mesh Networks. [Citation Graph (, )][DBLP]

  35. Estimating Link Reliability in Wireless Networks: An Empirical Study and Interference Modeling. [Citation Graph (, )][DBLP]

  36. Cross-layer Optimization for Wireless Networks with Deterministic Channel Models. [Citation Graph (, )][DBLP]

  37. Non-Preemptive Buffer Management for Latency Sensitive Packets. [Citation Graph (, )][DBLP]

  38. A Frequency Domain Model to Predict the Estimation Accuracy of Packet Sampling. [Citation Graph (, )][DBLP]

  39. On Global Modeling of Backbone Network Traffic. [Citation Graph (, )][DBLP]

  40. Path Stitching: Internet-Wide Path and Delay Estimation from Existing Measurements. [Citation Graph (, )][DBLP]

  41. Tracking Long Duration Flows in Network Traffic. [Citation Graph (, )][DBLP]

  42. Tracking Quantiles of Network Data Streams with Dynamic Operations. [Citation Graph (, )][DBLP]

  43. Predicting Prefix Availability in the Internet. [Citation Graph (, )][DBLP]

  44. Link Homophily in the Application Layer and its Usage in Traffic Classification. [Citation Graph (, )][DBLP]

  45. Layered Internet Video Engineering (LIVE): Network-Assisted Bandwidth Sharing and Transient Loss Protection for Scalable Video Streaming. [Citation Graph (, )][DBLP]

  46. Scalable Modulation for Scalable Wireless Videocast. [Citation Graph (, )][DBLP]

  47. Channel-based Unidirectional Stream Protocol (CUSP). [Citation Graph (, )][DBLP]

  48. Buffer Management for Aggregated Streaming Data with Packet Dependencies. [Citation Graph (, )][DBLP]

  49. Characterizing Interactive Behavior in a Large-Scale Operational IPTV Environment. [Citation Graph (, )][DBLP]

  50. Lightweight Mutual Authentication and Ownership Transfer for RFID Systems. [Citation Graph (, )][DBLP]

  51. CoTrack: A Framework for Tracking Dynamic Features with Static and Mobile Sensors. [Citation Graph (, )][DBLP]

  52. Mobility Assisted Secret Key Generation Using Wireless Link Signatures. [Citation Graph (, )][DBLP]

  53. A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc Networks. [Citation Graph (, )][DBLP]

  54. Q-CSMA: Queue-Length Based CSMA/CA Algorithms for Achieving Maximum Throughput and Low Delay in Wireless Networks. [Citation Graph (, )][DBLP]

  55. Linear Programming Models For Multi-Channel P2P Streaming Systems. [Citation Graph (, )][DBLP]

  56. Understanding Sub-stream Scheduling in P2P Hybrid Live Streaming Systems. [Citation Graph (, )][DBLP]

  57. A Balanced Consistency Maintenance Protocol for Structured P2P Systems. [Citation Graph (, )][DBLP]

  58. Network Positioning from the Edge - An Empirical Study of the Effectiveness of Network Positioning in P2P Systems. [Citation Graph (, )][DBLP]

  59. MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming. [Citation Graph (, )][DBLP]

  60. BGP Skeleton - An Alternative to iBGP Route Reflection. [Citation Graph (, )][DBLP]

  61. Back-Pressure Routing for Intermittently Connected Networks. [Citation Graph (, )][DBLP]

  62. Performance Modeling and Analysis of Multi-Path Routing in Integrated Fiber-Wireless Networks. [Citation Graph (, )][DBLP]

  63. A Theoretical Framework for Hierarchical Routing Games. [Citation Graph (, )][DBLP]

  64. Evaluating Potential Routing Diversity for Internet Failure Recovery. [Citation Graph (, )][DBLP]

  65. Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems. [Citation Graph (, )][DBLP]

  66. An Optimal Key Distribution Scheme for Secure Multicast Group Communication. [Citation Graph (, )][DBLP]

  67. Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue. [Citation Graph (, )][DBLP]

  68. Towards Automatic Creation of Usable Security Configuration. [Citation Graph (, )][DBLP]

  69. PhishNet: Predictive Blacklisting to Detect Phishing Attacks. [Citation Graph (, )][DBLP]

  70. Reliable GPS-Free Double-Ruling-Based Information Brokerage in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  71. Capacity of Data Collection in Arbitrary Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  72. Critical Sensor Density for Partial Connectivity in Large Area Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  73. VBS: Maximum Lifetime Sleep Scheduling for Wireless Sensor Networks Using Virtual Backbones. [Citation Graph (, )][DBLP]

  74. Handling Triple Hidden Terminal Problems for Multi-Channel MAC in Long-Delay Underwater Sensor Networks. [Citation Graph (, )][DBLP]

  75. Mobile Real-Time Group Communication Service. [Citation Graph (, )][DBLP]

  76. Spatio-Temporal Fusion for Small-scale Primary Detection in Cognitive Radio Networks. [Citation Graph (, )][DBLP]

  77. CapAuth: A Capability-based Handover Scheme. [Citation Graph (, )][DBLP]

  78. Enhancing Wireless TCP: A Serialized-Timer Approach. [Citation Graph (, )][DBLP]

  79. On the Cost of Knowledge of Mobility in Dynamic Networks. [Citation Graph (, )][DBLP]

  80. A Hybrid Decision Approach for the Association Problem in Heterogeneous Networks. [Citation Graph (, )][DBLP]

  81. Resource Allocation over Network Dynamics without Timescale Separation. [Citation Graph (, )][DBLP]

  82. User-Centric Network Fairness through Connection-Level Control. [Citation Graph (, )][DBLP]

  83. Overcoming Failures: Fault-tolerance and Logical Centralization in Clean-Slate Network Management. [Citation Graph (, )][DBLP]

  84. Safeguarding Data Delivery by Decoupling Path Propagation and Adoption. [Citation Graph (, )][DBLP]

  85. Distributed Dynamic Speed Scaling. [Citation Graph (, )][DBLP]

  86. Survivable Distributed Storage with Progressive Decoding. [Citation Graph (, )][DBLP]

  87. Price of Anarchy in Non-Cooperative Load Balancing. [Citation Graph (, )][DBLP]

  88. Fuzzy Keyword Search over Encrypted Data in Cloud Computing. [Citation Graph (, )][DBLP]

  89. Distributed Resource Allocation for Synchronous Fork and Join Processing Networks. [Citation Graph (, )][DBLP]

  90. Haste: Practical Online Network Coding in a Multicast Switch. [Citation Graph (, )][DBLP]

  91. Worst-Case TCAM Rule Expansion. [Citation Graph (, )][DBLP]

  92. Simple Efficient TCAM Based Range Classification. [Citation Graph (, )][DBLP]

  93. Chip Error Pattern Analysis in IEEE 802.15.4. [Citation Graph (, )][DBLP]

  94. Mobile Sensor Deployment in Unknown Fields. [Citation Graph (, )][DBLP]

  95. Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks. [Citation Graph (, )][DBLP]

  96. On Channel-Discontinuity-Constraint Routing in Wireless Networks. [Citation Graph (, )][DBLP]

  97. Extending Access Point Connectivity through Opportunistic Routing in Vehicular Networks. [Citation Graph (, )][DBLP]

  98. Joint Routing and Scheduling in Multi-hop Wireless Networks with Directional Antennas. [Citation Graph (, )][DBLP]

  99. Opportunistic Routing with Congestion Diversity in Wireless Multi-hop Networks. [Citation Graph (, )][DBLP]

  100. An Optimization Based Distributed Algorithm for Mobile Data Gathering in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  101. An Efficient Algorithm for Constructing Maximum lifetime Tree for Data Gathering Without Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  102. Maintaining Approximate Minimum Steiner Tree and k-center for Mobile Agents in a Sensor Network. [Citation Graph (, )][DBLP]

  103. Virtual Appliance Content Distribution for a Global Infrastructure Cloud Service. [Citation Graph (, )][DBLP]

  104. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. [Citation Graph (, )][DBLP]

  105. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. [Citation Graph (, )][DBLP]

  106. Asymmetry-Aware Real-Time Distributed Joint Resource Allocation in IEEE 802.22 WRANs. [Citation Graph (, )][DBLP]

  107. Cooperative Resource Management in Cognitive WiMAX with Femto Cells. [Citation Graph (, )][DBLP]

  108. Efficient Resource Allocation with Flexible Channel Cooperation in OFDMA Cognitive Radio Networks. [Citation Graph (, )][DBLP]

  109. Optimal Control of Constrained Cognitive Radio Networks with Dynamic Population Size. [Citation Graph (, )][DBLP]

  110. Approximation Algorithms for Many-to-Many Traffic Grooming in WDM Mesh Networks. [Citation Graph (, )][DBLP]

  111. Risk-Aware Routing for Optical Transport Networks. [Citation Graph (, )][DBLP]

  112. Optimal Waveband Switching in Optical Ring Networks. [Citation Graph (, )][DBLP]

  113. An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs. [Citation Graph (, )][DBLP]

  114. Optimal Channel Choice for Collaborative Ad-Hoc Dissemination. [Citation Graph (, )][DBLP]

  115. On Space-Time Capacity Limits in Mobile and Delay Tolerant Networks. [Citation Graph (, )][DBLP]

  116. SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks. [Citation Graph (, )][DBLP]

  117. Discrete Gene Regulatory Networks (dGRNs): A Novel Approach to Configuring Sensor Networks. [Citation Graph (, )][DBLP]

  118. High Quality Sensor Placement for SHM Systems: Refocusing on Application Demands. [Citation Graph (, )][DBLP]

  119. CompactDFA: Generic State Machine Compression for Scalable Pattern Matching. [Citation Graph (, )][DBLP]

  120. SparseTrack: Enhancing Indoor Pedestrian Tracking with Sparse Infrastructure Support. [Citation Graph (, )][DBLP]

  121. Joint Power and Secret Key Queue Management for Delay Limited Secure Communication. [Citation Graph (, )][DBLP]

  122. Towards a Theory of Anonymous Networking. [Citation Graph (, )][DBLP]

  123. Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication. [Citation Graph (, )][DBLP]

  124. Refresh: Weak Privacy Model for RFID Systems. [Citation Graph (, )][DBLP]

  125. A Signal Processing View on Packet Sampling and Anomaly Detection. [Citation Graph (, )][DBLP]

  126. URCA: Pulling out Anomalies by their Root Causes. [Citation Graph (, )][DBLP]

  127. Scalable NIDS via Negative Pattern Matching and Exclusive Pattern Matching. [Citation Graph (, )][DBLP]

  128. Robust and Fast Pattern Matching for Intrusion Detection. [Citation Graph (, )][DBLP]

  129. Maximum Damage Malware Attack in Mobile Wireless Networks. [Citation Graph (, )][DBLP]

  130. PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems. [Citation Graph (, )][DBLP]

  131. Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments. [Citation Graph (, )][DBLP]

  132. Stimulating Cooperation in Multi-hop Wireless Networks Using Cheating Detection System. [Citation Graph (, )][DBLP]

  133. Cognitive Mobile Virtual Network Operator: Investment and Pricing with Supply Uncertainty. [Citation Graph (, )][DBLP]

  134. An Auction Framework for Spectrum Allocation with Interference Constraint in Cognitive Radio Networks. [Citation Graph (, )][DBLP]

  135. Opportunistic Spectrum Access with Multiple Users: Learning under Competition. [Citation Graph (, )][DBLP]

  136. Learning to Optimally Exploit Multi-Channel Diversity in Wireless Systems. [Citation Graph (, )][DBLP]

  137. FlashTrie: Hash-based Prefix-Compressed Trie for IP Route Lookup Beyond 100Gbps. [Citation Graph (, )][DBLP]

  138. Leaping Multiple Headers in a Single Bound: Wire-Speed Parsing Using the Kangaroo System. [Citation Graph (, )][DBLP]

  139. A Bit-Stuffing Algorithm for Crosstalk Avoidance in High Speed Switching. [Citation Graph (, )][DBLP]

  140. On the Aggregatability of Router Forwarding Tables. [Citation Graph (, )][DBLP]

  141. Routing in Socially Selfish Delay Tolerant Networks. [Citation Graph (, )][DBLP]

  142. Know Thy Neighbor: Towards Optimal Mapping of Contacts to Social Graphs for DTN Routing. [Citation Graph (, )][DBLP]

  143. MobiCent: a Credit-Based Incentive System for Disruption Tolerant Network. [Citation Graph (, )][DBLP]

  144. A Reaction-Diffusion Model for Epidemic Routing in Sparsely Connected MANETs. [Citation Graph (, )][DBLP]

  145. Delay Performance of Scheduling with Data Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  146. Joint Energy Management and Resource Allocation in Rechargeable Sensor Networks. [Citation Graph (, )][DBLP]

  147. ACR: Active Collision Recovery in Dense Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  148. Tunable Locally-Optimal Geographical Forwarding in Wireless Sensor Networks With Sleep-Wake Cycling Nodes. [Citation Graph (, )][DBLP]

  149. On the Viability of Paris Metro Pricing for Communication and Service Networks. [Citation Graph (, )][DBLP]

  150. Pricing under Constraints in Access Networks: Revenue Maximization and Congestion Management. [Citation Graph (, )][DBLP]

  151. On-line Pricing of Secondary Spectrum Access with Unknown Demand Function and Call Length Distribution. [Citation Graph (, )][DBLP]

  152. Pricing and Incentives in Peer-to-Peer Networks. [Citation Graph (, )][DBLP]

  153. File Fragmentation over an Unreliable Channel. [Citation Graph (, )][DBLP]

  154. Malicious Shellcode Detection with Virtual Memory Snapshots. [Citation Graph (, )][DBLP]

  155. Password Strength: An Empirical Analysis. [Citation Graph (, )][DBLP]

  156. A Collaboration-based Autonomous Reputation System for Email Services. [Citation Graph (, )][DBLP]

  157. Efficient Tag Identification in Mobile RFID Systems. [Citation Graph (, )][DBLP]

  158. Efficient Continuous Scanning in RFID Systems. [Citation Graph (, )][DBLP]

  159. Energy Efficient Algorithms for the RFID Estimation Problem. [Citation Graph (, )][DBLP]

  160. Counting RFID Tags Efficiently and Anonymously. [Citation Graph (, )][DBLP]

  161. Truthful Least-Priced-Path Routing in Opportunistic Spectrum Access Networks. [Citation Graph (, )][DBLP]

  162. Queuing Analysis in Multichannel Cognitive Spectrum Access: A Large Deviation Approach. [Citation Graph (, )][DBLP]

  163. Delay Analysis for Cognitive Radio Networks with Random Access: A Fluid Queue View. [Citation Graph (, )][DBLP]

  164. DAC: Distributed Asynchronous Cooperation for Wireless Relay Networks. [Citation Graph (, )][DBLP]

  165. Incorporating Random Linear Network Coding for Peer-to-Peer Network Diagnosis. [Citation Graph (, )][DBLP]

  166. Collaborative Measurements of Upload Speeds in P2P Systems. [Citation Graph (, )][DBLP]

  167. Measurement and Diagnosis of Address Misconfigured P2P Traffic. [Citation Graph (, )][DBLP]

  168. Approximate Models for General Cache Networks. [Citation Graph (, )][DBLP]

  169. Maximizing the Contact Opportunity for Vehicular Internet Access. [Citation Graph (, )][DBLP]

  170. Retiring Replicants: Congestion Control for Intermittently-Connected Networks. [Citation Graph (, )][DBLP]

  171. Multi-Channel Assignment in Wireless Sensor Networks: A Game Theoretic Approach. [Citation Graph (, )][DBLP]

  172. Max-Contribution: On Optimal Resource Allocation in Delay Tolerant Networks. [Citation Graph (, )][DBLP]

  173. Minimizing Electricity Cost: Optimization of Distributed Internet Data Centers in a Multi-Electricity-Market Environment. [Citation Graph (, )][DBLP]

  174. Improving the Scalability of Data Center Networks with Traffic-aware Virtual Machine Placement. [Citation Graph (, )][DBLP]

  175. The Impact of Virtualization on Network Performance of Amazon EC2 Data Center. [Citation Graph (, )][DBLP]

  176. Distance Estimation by Constructing The Virtual Ruler in Anisotropic Sensor Networks. [Citation Graph (, )][DBLP]

  177. Bernoulli Sampling Based (element of, delta)-Approximate Aggregation in Large-Scale Sensor Networks. [Citation Graph (, )][DBLP]

  178. Compressive Oversampling for Robust Data Transmission in Sensor Networks. [Citation Graph (, )][DBLP]

  179. Verifiable Fine-Grained Top-k Queries in Tiered Sensor Networks. [Citation Graph (, )][DBLP]

  180. BGP Churn Evolution: a Perspective from the Core. [Citation Graph (, )][DBLP]

  181. Demand-Oblivious Routing: Distributed vs. Centralized Approaches. [Citation Graph (, )][DBLP]

  182. Limitations and Possibilities of Path Trading between Autonomous Systems. [Citation Graph (, )][DBLP]

  183. On the Feasibility and Efficacy of Protection Routing in IP Networks. [Citation Graph (, )][DBLP]

  184. Optimal Probing for Unicast Network Delay Tomography. [Citation Graph (, )][DBLP]

  185. High-Speed Per-Flow Traffic Measurement with Probabilistic Multiplicity Counting. [Citation Graph (, )][DBLP]

  186. Netscope: Practical Network Loss Tomography. [Citation Graph (, )][DBLP]

  187. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring. [Citation Graph (, )][DBLP]

  188. Distributed Power Control for Cognitive User Access based on Primary Link Control Feedback. [Citation Graph (, )][DBLP]

  189. Multicast Scheduling with Cooperation and Network Coding in Cognitive Radio Networks. [Citation Graph (, )][DBLP]

  190. Cooperative Boundary Detection for Spectrum Sensing Using Dedicated Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  191. Implementation and Evaluation of Cooperative Communication Schemes in Software-Defined Radio Testbed. [Citation Graph (, )][DBLP]

  192. Tight Performance Bounds in the Worst-Case Analysis of Feed-Forward Networks. [Citation Graph (, )][DBLP]

  193. Non-asymptotic Delay Bounds for Networks with Heavy-Tailed Traffic. [Citation Graph (, )][DBLP]

  194. Transition from Heavy to Light Tails in Retransmission Durations. [Citation Graph (, )][DBLP]

  195. An Axiomatic Theory of Fairness in Network Resource Allocation. [Citation Graph (, )][DBLP]

  196. ARBOR: Hang Together Rather Than Hang Separately in 802.11 WiFi Networks. [Citation Graph (, )][DBLP]

  197. Designing a Practical Access Point Association Protocol. [Citation Graph (, )][DBLP]

  198. MAC-layer Time Fairness across Multiple Wireless LANs. [Citation Graph (, )][DBLP]

  199. Employing the One-Sender-Multiple-Receiver Technique in Wireless LANs. [Citation Graph (, )][DBLP]

  200. Approximate Capacity Subregions of Uniform Multihop Wireless Networks. [Citation Graph (, )][DBLP]

  201. Distributed Algorithms for Approximating Wireless Network Capacity. [Citation Graph (, )][DBLP]

  202. Throughput, Delay, and Mobility in Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]

  203. The Capacity of Ad Hoc Networks with Heterogeneous Traffic Using Cooperation. [Citation Graph (, )][DBLP]

  204. A Practical On-line Pacing Scheme at Edges of Small Buffer Networks. [Citation Graph (, )][DBLP]

  205. Enabling a Bufferless Core Network Using Edge-to-Edge Packet-Level FEC. [Citation Graph (, )][DBLP]

  206. Building Scalable Virtual Routers with Trie Braiding. [Citation Graph (, )][DBLP]

  207. A Systematic Approach for Evolving VLAN Designs. [Citation Graph (, )][DBLP]

  208. BitTorrent Darknets. [Citation Graph (, )][DBLP]

  209. ISP-Enabled Behavioral Ad Targeting without Deep Packet Inspection. [Citation Graph (, )][DBLP]

  210. Distributed Caching Algorithms for Content Distribution Networks. [Citation Graph (, )][DBLP]

  211. Efficient Similarity Estimation for Systems Exploiting Data Redundancy. [Citation Graph (, )][DBLP]

  212. Flow Control for Cost-Efficient Peer-to-Peer Streaming. [Citation Graph (, )][DBLP]

  213. Reciprocity and Barter in Peer-to-Peer Systems. [Citation Graph (, )][DBLP]

  214. How do Superpeer Networks Emerge? [Citation Graph (, )][DBLP]

  215. TopBT: A Topology-Aware and Infrastructure-Independent BitTorrent Client. [Citation Graph (, )][DBLP]

  216. Toward the Practical Use of Network Tomography for Internet Topology Discovery. [Citation Graph (, )][DBLP]

  217. Design and Analysis of a Robust Pipelined Memory System. [Citation Graph (, )][DBLP]

  218. Online Scheduling of Targeted Advertisements for IPTV. [Citation Graph (, )][DBLP]

  219. On the Impact of TCP and Per-Flow Scheduling on Internet Performance. [Citation Graph (, )][DBLP]

  220. Secure Wireless Communication with Dynamic Secrets. [Citation Graph (, )][DBLP]

  221. On the Age of Pseudonyms in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

  222. An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks. [Citation Graph (, )][DBLP]

  223. From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

  224. HaND: Fast Handoff with Null Dwell Time for IEEE 802.11 Networks. [Citation Graph (, )][DBLP]

  225. Metrics for Evaluating Video Streaming Quality in Lossy IEEE 802.11 Wireless Networks. [Citation Graph (, )][DBLP]

  226. Coupled 802.11 Flows in Urban Channels: Model and Experimental Evaluation. [Citation Graph (, )][DBLP]

  227. Compressive Sensing Based Positioning Using RSS of WLAN Access Points. [Citation Graph (, )][DBLP]

  228. Predictive Blacklisting as an Implicit Recommendation System. [Citation Graph (, )][DBLP]

  229. DiffProbe: Detecting ISP Service Discrimination. [Citation Graph (, )][DBLP]

  230. Network Reliability With Geographically Correlated Failures. [Citation Graph (, )][DBLP]

  231. Reliability in Layered Networks with Random Link Failures. [Citation Graph (, )][DBLP]

  232. Pressure Routing for Underwater Sensor Networks. [Citation Graph (, )][DBLP]

  233. On Distributed Time-Dependent Shortest Paths over Duty-Cycled Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  234. Resilient Routing for Sensor Networks Using Hyperbolic Embedding of Universal Covering Space. [Citation Graph (, )][DBLP]

  235. Information Quality Aware Routing in Event-Driven Sensor Networks. [Citation Graph (, )][DBLP]

  236. Asymptotic Analysis of Precoded Small Cell Networks. [Citation Graph (, )][DBLP]

  237. Elastic Rate Limiting for Spatially Biased Wireless Mesh Networks. [Citation Graph (, )][DBLP]

  238. Magnetworks: How Mobility Impacts the Design of Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

  239. Impact of Correlated Mobility on Delay-Throughput Performance in Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]

  240. Chorus: Collision Resolution for Efficient Wireless Broadcast. [Citation Graph (, )][DBLP]

  241. Throughput Analysis of Multiple Access Relay Channel under Collision Model. [Citation Graph (, )][DBLP]

  242. Distributed Coordination with Deaf Neighbors: Efficient Medium Access for 60 GHz Mesh Networks. [Citation Graph (, )][DBLP]

  243. A General Algorithm for Interference Alignment and Cancellation in Wireless Networks. [Citation Graph (, )][DBLP]

  244. Markov Approximation for Combinatorial Network Optimization. [Citation Graph (, )][DBLP]

  245. Convergence Speed of Binary Interval Consensus. [Citation Graph (, )][DBLP]

  246. Multicast Scaling Laws with Hierarchical Cooperation. [Citation Graph (, )][DBLP]

  247. Network Coding for Multi-Resolution Multicast. [Citation Graph (, )][DBLP]

  248. On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks. [Citation Graph (, )][DBLP]

  249. INPAC: An Enforceable Incentive Scheme for Wireless Networks using Network Coding. [Citation Graph (, )][DBLP]

  250. Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks. [Citation Graph (, )][DBLP]

  251. Optimizing the Batch Mode of Group Rekeying: Lower Bound and New Protocols. [Citation Graph (, )][DBLP]

  252. Towards an Efficient Reservation Algorithm for Distributed Reservation Protocols. [Citation Graph (, )][DBLP]

  253. Designing Low-Capacity Backup Networks for Fast Restoration. [Citation Graph (, )][DBLP]

  254. EmNet: Satisfying The Individual User Through Empathic Home Networks. [Citation Graph (, )][DBLP]

  255. Characterizing the Spread of Correlated Failures in Large Wireless Networks. [Citation Graph (, )][DBLP]

  256. Towards Reliable Scheduling Schemes for Long-lived Replaceable Sensor Networks. [Citation Graph (, )][DBLP]

  257. Green Wave: Latency and Capacity-Efficient Sleep Scheduling for Wireless Networks. [Citation Graph (, )][DBLP]

  258. Minimizing End-to-End Delay in Wireless Networks Using a Coordinated EDF Schedule. [Citation Graph (, )][DBLP]

  259. Practical Scheduling Algorithms for Concurrent Transmissions in Rate-adaptive Wireless Networks. [Citation Graph (, )][DBLP]

  260. Bargaining and Price-of-Anarchy in Repeated Inter-Session Network Coding Games. [Citation Graph (, )][DBLP]

  261. Multipath Wireless Network Coding: A Population Game Perspective. [Citation Graph (, )][DBLP]

  262. Wireless Network Virtualization as A Sequential Auction Game. [Citation Graph (, )][DBLP]

  263. Near-Optimal Power Control in Wireless Networks: A Potential Game Approach. [Citation Graph (, )][DBLP]

  264. Bayesian Inference for Localization in Cellular Networks. [Citation Graph (, )][DBLP]

  265. Beyond Triangle Inequality: Sifting Noisy and Outlier Distance Measurements for Localization. [Citation Graph (, )][DBLP]

  266. Cramer-Rao Bound Analysis of Localization Using Signal Strength Difference as Location Fingerprint. [Citation Graph (, )][DBLP]

  267. Is Network Coding Always Good for Cooperative Communications? [Citation Graph (, )][DBLP]

  268. Practical and General Amplify-and-Forward Designs for Cooperative Networks. [Citation Graph (, )][DBLP]

  269. Towards Efficient Designs for In-network Computing with Noisy Wireless Channels. [Citation Graph (, )][DBLP]

  270. Cooperative Communications in Multi-hop Wireless Networks: Joint Flow Routing and Relay Node Assignment. [Citation Graph (, )][DBLP]

  271. Diversity-Rate Trade-off in Erasure Networks. [Citation Graph (, )][DBLP]

  272. Optimal Control of Wireless Networks with Finite Buffers. [Citation Graph (, )][DBLP]

  273. The k-Constrained Bipartite Matching Problem: Approximation Algorithms and Applications to Wireless Networks. [Citation Graph (, )][DBLP]

  274. Rate Adaptation Games in Wireless LANs: Nash Equilibrium and Price of Anarchy. [Citation Graph (, )][DBLP]

  275. Improving QoS in BitTorrent-like VoD Systems. [Citation Graph (, )][DBLP]

  276. UUSee: Large-Scale Operational On-Demand Streaming with Random Network Coding. [Citation Graph (, )][DBLP]

  277. Minimizing the Worst-Case Playback Delay in VoD Services over Passive Optical Networks. [Citation Graph (, )][DBLP]

  278. Chameleon: Adaptive Peer-to-Peer Streaming with Network Coding. [Citation Graph (, )][DBLP]

  279. Distributed Monitoring and Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  280. Collaborative Data Compression Using Clustered Source Coding for Wireless Multimedia Sensor Networks. [Citation Graph (, )][DBLP]

  281. On Computing Compression Trees for Data Collection in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  282. Adaptive Calibration for Fusion-based Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  283. Resource Allocation in Multi-cell OFDMA-based Relay Networks. [Citation Graph (, )][DBLP]

  284. Deploying Mesh Nodes under Non-Uniform Propagation. [Citation Graph (, )][DBLP]

  285. M-Polar: Channel Allocation for Throughput Maximization in SDR Mesh Networks. [Citation Graph (, )][DBLP]

  286. Efficient Two-dimensional Data Allocation in IEEE 802.16 OFDMA. [Citation Graph (, )][DBLP]

  287. Efficient Active Probing for Fault Diagnosis in Large Scale and Noisy Networks. [Citation Graph (, )][DBLP]

  288. Reliable Adaptive Multipath Provisioning with Bandwidth and Differential Delay Constraints. [Citation Graph (, )][DBLP]

  289. Measurement Data Reduction through Variation Rate Metering. [Citation Graph (, )][DBLP]

  290. Two Samples are Enough: Opportunistic Flow-level Latency Estimation using NetFlow. [Citation Graph (, )][DBLP]

  291. First-Fit Scheduling for Beaconing in Multihop Wireless Networks. [Citation Graph (, )][DBLP]

  292. Analyzing the Performance of Greedy Maximal Scheduling via Local Pooling and Graph Theory. [Citation Graph (, )][DBLP]

  293. Low-complexity Scheduling Algorithms for Multi-channel Downlink Wireless Networks. [Citation Graph (, )][DBLP]

  294. Optimal Scheduling for Fair Resource Allocation in Ad Hoc Networks with Elastic and Inelastic Traffic. [Citation Graph (, )][DBLP]

  295. Optimal Linear Network Coding Design for Secure Unicast with Multiple Streams. [Citation Graph (, )][DBLP]

  296. P-Coding: Secure Network Coding against Eavesdropping Attacks. [Citation Graph (, )][DBLP]

  297. RIPPLE Authentication for Network Coding. [Citation Graph (, )][DBLP]

  298. When Watchdog Meets Coding. [Citation Graph (, )][DBLP]

  299. MSET: A Mobility Satellite Emulation Testbed. [Citation Graph (, )][DBLP]

  300. A Flexible Platform for Hardware-Aware Network Experiments and a Case Study on Wireless Network Coding. [Citation Graph (, )][DBLP]

  301. An Interaction-Based Mobility Model for Dynamic Hot Spot Analysis. [Citation Graph (, )][DBLP]

  302. Intrusion-Resilience in Mobile Unattended WSNs. [Citation Graph (, )][DBLP]

  303. Universal Rigidity: Towards Accurate and Efficient Localization of Wireless Networks. [Citation Graph (, )][DBLP]

  304. Towards Mobile Phone Localization without War-Driving. [Citation Graph (, )][DBLP]

  305. Towards Cooperative Localization of Wearable Sensors using Accelerometers and Cameras. [Citation Graph (, )][DBLP]

  306. Understanding Node Localizability of Wireless Ad-hoc Networks. [Citation Graph (, )][DBLP]

  307. A Tractable and Accurate Cross-Layer Model for Multi-Hop MIMO Networks. [Citation Graph (, )][DBLP]

  308. Topology Control for Effective Interference Cancellation in Multi-User MIMO Networks. [Citation Graph (, )][DBLP]

  309. DPLC: Dynamic Packet Length Control in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  310. Neighbor Discovery with Reception Status Feedback to Transmitters. [Citation Graph (, )][DBLP]

  311. Optimal SINR-based Random Access. [Citation Graph (, )][DBLP]

  312. Minimum Energy per Bit for Wideband Wireless Multicasting: Performance of Decode-and-Forward. [Citation Graph (, )][DBLP]

  313. Dynamic Power Allocation Under Arbitrary Varying Channels - The Multi-User Case. [Citation Graph (, )][DBLP]

  314. Minimum Power Energy Spanners in Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]

  315. Characterization of Non-Manipulable and Pareto Optimal Resource Allocation Strategies for Interference Coupled Wireless Systems. [Citation Graph (, )][DBLP]

  316. Utility Maximization for Delay Constrained QoS in Wireless. [Citation Graph (, )][DBLP]

  317. Routing for Energy Minimization in the Speed Scaling Model. [Citation Graph (, )][DBLP]

  318. The Capacity of Heterogeneous Wireless Networks. [Citation Graph (, )][DBLP]

  319. Minimizing Energy Consumption with Probabilistic Distance Models in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  320. Multi-Round Sensor Deployment for Guaranteed Barrier Coverage. [Citation Graph (, )][DBLP]

  321. Delay Tolerant Event Collection in Sensor Networks with Mobile Sink. [Citation Graph (, )][DBLP]

  322. Pattern Mutation in Wireless Sensor Deployment. [Citation Graph (, )][DBLP]

  323. P2P Trading in Social Networks: The Value of Staying Connected. [Citation Graph (, )][DBLP]

  324. Walking in Facebook: A Case Study of Unbiased Sampling of OSNs. [Citation Graph (, )][DBLP]

  325. Surfing the Blogosphere: Optimal Personalized Strategies for Searching the Web. [Citation Graph (, )][DBLP]

  326. A Privacy-Preserving Scheme for Online Social Networks with Efficient Revocation. [Citation Graph (, )][DBLP]

  327. Topological Properties Affect the Power of Network Coding in Decentralized Broadcast. [Citation Graph (, )][DBLP]

  328. Stable Maximum Throughput Broadcast in Wireless Fading Channels. [Citation Graph (, )][DBLP]

  329. Reliable Wireless Broadcasting with Near-Zero Feedback. [Citation Graph (, )][DBLP]

  330. Reliable Broadcasting in Random Networks and the Effect of Density. [Citation Graph (, )][DBLP]

  331. On the Absence of Isolated Nodes in Wireless Ad-Hoc Networks with Unreliable Links - a Curious Gap. [Citation Graph (, )][DBLP]

  332. Stochastic Analysis of Non-Slotted Aloha in Wireless Ad-Hoc Networks. [Citation Graph (, )][DBLP]

  333. An Investigation on the Nature of Wireless Scheduling. [Citation Graph (, )][DBLP]

  334. Effective Carrier Sensing in CSMA Networks under Cumulative Interference. [Citation Graph (, )][DBLP]

  335. Frequency-Domain Packet Scheduling for 3GPP LTE Uplink. [Citation Graph (, )][DBLP]

  336. Scheduling Heterogeneous Real-Time Traffic over Fading Wireless Channels. [Citation Graph (, )][DBLP]

  337. Fair Scheduling in Cellular Systems in the Presence of Noncooperative Mobiles. [Citation Graph (, )][DBLP]

  338. Energy-Conserving Scheduling in Multi-hop Wireless Networks with Time-Varying Channels. [Citation Graph (, )][DBLP]

  339. Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks. [Citation Graph (, )][DBLP]

  340. SafeQ: Secure and Efficient Query Processing in Sensor Networks. [Citation Graph (, )][DBLP]

  341. Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks. [Citation Graph (, )][DBLP]

  342. Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  343. Delay-Based Network Utility Maximization. [Citation Graph (, )][DBLP]

  344. On Approximation of New Optimization Methods for Assessing Network Vulnerability. [Citation Graph (, )][DBLP]

  345. Twister Networks and Their Applications to Load-Balanced Switches. [Citation Graph (, )][DBLP]

  346. Analyzing Nonblocking Switching Networks using Linear Programming (Duality). [Citation Graph (, )][DBLP]

  347. Forward Contracts for Complementary Segments of a Communication Network. [Citation Graph (, )][DBLP]

  348. Multipath Network Flows: Bounded Buffers and Jitter. [Citation Graph (, )][DBLP]

  349. Utility Functionals Associated With Available Congestion Control Algorithms. [Citation Graph (, )][DBLP]

  350. Value-aware Resource Allocation for Service Guarantees in Networks. [Citation Graph (, )][DBLP]

  351. A New Constant Factor Approximation for Computing 3-Connected m-Dominating Sets in Homogeneous Wireless Networks. [Citation Graph (, )][DBLP]

  352. On the Connectivity Analysis over Large-Scale Hybrid Wireless Networks. [Citation Graph (, )][DBLP]

  353. Design and Optimization of a Tiered Wireless Access Network. [Citation Graph (, )][DBLP]

  354. A Novel Xcast-based Caching Architecture for Inter-gateway Handoffs in Infrastructure Wireless Mesh Networks. [Citation Graph (, )][DBLP]

  355. Random Walks on Digraphs: A Theoretical Framework for Estimating Transmission Costs in Wireless Routing. [Citation Graph (, )][DBLP]

  356. MIMO-Aware Routing in Wireless Mesh Networks. [Citation Graph (, )][DBLP]

  357. Routing Primitives for Wireless Mesh Networks: Design, Analysis and Experiments. [Citation Graph (, )][DBLP]

  358. Multihop Transmission Opportunity in Wireless Multihop Networks. [Citation Graph (, )][DBLP]

  359. CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks. [Citation Graph (, )][DBLP]

  360. A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping. [Citation Graph (, )][DBLP]

  361. Castor: Scalable Secure Routing for Ad Hoc Networks. [Citation Graph (, )][DBLP]

  362. A Formal Study of Trust-Based Routing in Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]

  363. On Scheduling for Minimizing End-to-End Buffer Usage over Multihop Wireless Networks. [Citation Graph (, )][DBLP]

  364. A Greedy Link Scheduler for Wireless Networks with Gaussian Multiple Access and Broadcast Channels. [Citation Graph (, )][DBLP]

  365. CSMA-Based Distributed Scheduling in Multi-hop MIMO Networks under SINR Model. [Citation Graph (, )][DBLP]

  366. Distributed Opportunistic Scheduling for Ad-Hoc Communications Under Delay Constraints. [Citation Graph (, )][DBLP]

  367. Throughput-Optimal Opportunistic Scheduling in the Presence of Flow-Level Dynamics. [Citation Graph (, )][DBLP]

  368. Tree-structured Data Regeneration in Distributed Storage Systems with Regenerating Codes. [Citation Graph (, )][DBLP]

  369. Optimizing Throughput and Latency under Given Power Budget for Network Packet Processing. [Citation Graph (, )][DBLP]

  370. On Constructing Efficient Shared Decision Trees for Multiple Packet Filters. [Citation Graph (, )][DBLP]

  371. CCACK: Efficient Network Coding Based Opportunistic Routing Through Cumulative Coded Acknowledgments. [Citation Graph (, )][DBLP]

  372. Cooperative Bridges: Topology Control in Cooperative Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]

  373. A Framework for Joint Network Coding and Transmission Rate Control in Wireless Networks. [Citation Graph (, )][DBLP]

  374. On the Impact of Random Losses on TCP Performance in Coded Wireless Mesh Networks. [Citation Graph (, )][DBLP]

  375. Overhearing-aware Joint Routing and Rate Selection in Multi-hop Multi-rate UWB-based WPANs. [Citation Graph (, )][DBLP]

  376. Robust and Scalable Integrated Routing in MANETs Using Context-Aware Ordered Meshes. [Citation Graph (, )][DBLP]

  377. Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces. [Citation Graph (, )][DBLP]

  378. A New Phase Transitions for Local Delays in MANETs. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002