27. INFOCOM 2008:
Phoenix,
AZ,
USA
INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA.
IEEE 2008
Theoretical Foundations
- Yi Shi, Yiwei Thomas Hou:
Theoretical Results on Base Station Movement Problem for Sensor Network.
1-5
- Michael J. Neely:
Delay Analysis for Maximal Scheduling in Wireless Networks with Bursty Traffic.
6-10
- Zhenning Kong, Edmund M. Yeh:
Connectivity and Latency in Large-Scale Wireless Networks with Unreliable Links.
11-15
- Yi Xu, Wenye Wang:
The Speed of Information Propagation in Large Wireless Networks.
16-20
Internet Measurement 1
- Jin Cao, Aiyou Chen, Tian Bu:
A Quasi-Likelihood Approach for Accurate Traffic Matrix Estimation in a High Speed Network.
21-25
- Chengchen Hu, Sheng Wang, Jia Tian, Bin Liu, Yu Cheng, Yan Chen:
Accurate and Efficient Traffic Monitoring Using Adaptive Non-Linear Sampling Method.
26-30
- Derek Leonard, Dmitri Loguinov:
Turbo King: Framework for Large-Scale Internet Delay Measurements.
31-35
- Jian Ni, Haiyong Xie, Sekhar Tatikonda, Yang Richard Yang:
Network Routing Topology Inference from End-to-End Measurements.
36-40
Sensor Security 1
Wireless Mesh Networks 1
- Dattatraya Y. Gokhale, Sayandeep Sen, Kameswari Chebrolu, Bhaskaran Raman:
On the Feasibility of the Link Abstraction in (Rural) Mesh Networks.
61-65
- Richard Alimi, Erran L. Li, Ramachandran Ramjee, Harish Viswanathan, Yang Richard Yang:
iPack: in-Network Packet Mixing for High Throughput Wireless Mesh Networks.
66-70
- Liang Dai, Yuan Xue, Bin Chang, Yanchuan Cao, Yi Cui:
Integrating Traffic Estimation and Routing Optimization for Multi-Radio Multi-Channel Wireless Mesh Networks.
71-75
- Joseph Camp, Vincenzo Mancuso, Omer Gurewitz, Edward W. Knightly:
A Measurement Study of Multiplicative Overhead Effects in Wireless Networks.
76-80
Congestion Control 1
- Abdallah Khreishah, Chih-Chun Wang, Ness B. Shroff:
Optimization Based Rate Control for Communication Networks with Inter-Session Network Coding.
81-85
- Ashvin Lakshmikantha, R. Srikant, Carolyn L. Beck:
Impact of File Arrivals and Departures on Buffer Sizing in Core Routers.
86-90
- Ao Tang, Lachlan L. H. Andrew, Krister Jacobsson, Karl Henrik Johansson, Steven H. Low, Håkan Hjalmarsson:
Window Flow Control: Macroscopic Properties from Microscopic Factors.
91-95
- Ihsan A. Qazi, Taieb Znati:
On the Design of Load Factor based Congestion Control Protocols for Next-Generation Networks.
96-100
Router/Switch Design 1
Transport Protocols
- Vicky Sharma, Shivkumar Kalyanaraman, Koushik Kar, K. K. Ramakrishnan, Vijaynarayanan Subramanian:
MPLOT: A Transport Protocol Exploiting Multipath Diversity Using Erasure Codes.
121-125
- Hung Xuan Nguyen, Daniel R. Figueiredo, Matthias Grossglauser, Patrick Thiran:
Balanced Relay Allocation on Heterogeneous Unstructured Overlays.
126-130
- François Baccelli, Giovanna Carofiglio, Serguei Foss:
Proxy Caching in Split TCP: Dynamics, Stability and Tail Asymptotics.
131-135
- Willem de Bruijn, Herbert Bos:
Beltway Buffers: Avoiding the OS Traffic Jam.
136-140
Peer-to-Peer Networks 1
- Georgios Smaragdakis, Azer Bestavros, Nikolaos Laoutaris, John W. Byers, Pietro Michiardi, Mema Roussopoulos:
Swarming on Optimized Graphs for n-Way Broadcast.
141-145
- Zhongmei Yao, Dmitri Loguinov:
Link Lifetimes and Randomized Neighbor Selection in DHTs.
146-150
- Xiaoying Zheng, Chunglae Cho, Ye Xia:
Optimal Peer-to-Peer Technique for Massive Content Distribution.
151-155
- Hao Yan, Utku Irmak, Torsten Suel:
Algorithms for Low-Latency Remote File Synchronization.
156-160
Network Security 1
- Patrick Tague, David Slater, Jason Rogers, Radha Poovendran:
Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis.
161-165
- Tian Song, Wei Zhang, Dongsheng Wang, Yibo Xue:
A Memory Efficient Multiple Pattern Matching Architecture for Network Security.
166-170
- Sherif M. Khattab, Sameh Gobriel, Rami G. Melhem, Daniel Mossé:
Live Baiting for Service-Level DoS Attackers.
171-175
- Alex X. Liu, Eric Torng, Chad R. Meiners:
Firewall Compressor: An Algorithm for Minimizing Firewall Policies.
176-180
Optical Networks 1
Cooperative Ad Hoc Networking
Underwater Networks
- Antonio Caruso, Francesco Paparella, Luiz Filipe M. Vieira, Melike Erol, Mario Gerla:
The Meandering Current Mobility Model and its Impact on Underwater Mobile Sensor Networks.
221-225
- Mehmet C. Vuran, Ian F. Akyildiz:
Cross-Layer Packet Size Optimization for Wireless Terrestrial, Underwater, and Underground Sensor Networks.
226-230
- Affan A. Syed, Wei Ye, John S. Heidemann:
T-Lohi: A New Class of MAC Protocols for Underwater Acoustic Sensor Networks.
231-235
- Wei Cheng, Amin Y. Teymorian, Liran Ma, Xiuzhen Cheng, Xicheng Lu, Zexin Lu:
Underwater Localization in Sparse 3D Acoustic Sensor Networks.
236-240
Ad Hoc Networks Security
- Parvathinathan Venkitasubramaniam, Lang Tong:
Throughput Anonymity Trade-off in Wireless Networks under Latency Constraints.
241-245
- Chenxi Zhang, Rongxing Lu, Xiaodong Lin, Pin-Han Ho, Xuemin Shen:
An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks.
246-250
- Chi Zhang, Yang Song, Yuguang Fang:
Modeling Secure Connectivity of Self-Organized Wireless Ad Hoc Networks.
251-255
- Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu:
A Scalable Method for Access Control in Location-Based Broadcast Services.
256-260
Internet Measurement 2
- Dario Bonfiglio, Marco Mellia, Michela Meo, Nicolo Ritacca, Dario Rossi:
Tracking Down Skype Traffic.
261-265
- Xiaoqiao Meng, Guofei Jiang, Hui Zhang, Haifeng Chen, Kenji Yoshihira:
Automatic Profiling of Network Event Sequences: Algorithm and Applications.
266-270
- Yan Li, Jun-Hong Cui, Dario Maggiorini, Michalis Faloutsos:
Characterizing and Modelling Clustering Features in AS-Level Internet Topology.
271-275
- Vijay Arya, Nick G. Duffield, Darryl Veitch:
Temporal Delay Tomography.
276-280
Sensor Networks Connectivity
Router/Switch Design 2
Congestion Control 2
Sensor Network Routing
- Mehdi Kalantari, Masoumeh Haghpanahi, Mark A. Shayman:
A p-norm Flow Optimization Problem in Dense Wireless Sensor Networks.
341-345
- Hanna Kalosha, Amiya Nayak, Stefan Rührup, Ivan Stojmenovic:
Select-and-Protest-Based Beaconless Georouting with Guaranteed Delivery in Wireless Sensor Networks.
346-350
- Chia-Hung Lin, Bing-Hong Liu, Hong-Yen Yang, Chi-Yen Kao, Ming-Jer Tsai:
Virtual-Coordinate-Based Delivery-Guaranteed Routing Protocol in Wireless Sensor Networks with Unidirectional Links.
351-355
- Yan Wu, Sonia Fahmy, Ness B. Shroff:
On the Construction of a Maximum-Lifetime Data Gathering Tree in Sensor Networks: NP-Completeness and Approximation Algorithm.
356-360
Network Coding 1
Wireless MAC 1
Ad Hoc Networks:
Energy Efficiency
Routing Protocols
- Joseph Chabarek, Joel Sommers, Paul Barford, Cristian Estan, David Tsiang, Stephen Wright:
Power Awareness in Network Design and Routing.
457-465
- Dahai Xu, Mung Chiang, Jennifer Rexford:
Link-State Routing with Hop-by-Hop Forwarding Can Achieve Optimal Traffic Engineering.
466-474
- Haim Zlatokrilov, Hanoch Levy:
Area Avoidance Routing in Distance-Vector Networks.
475-483
- Lei Ying, R. Srikant, Donald F. Towsley:
Cluster-Based Back-Pressure Routing Algorithm.
484-492
Crosslayer Design 1
- Qinghai Gao, Junshan Zhang, Stephen V. Hanly:
Cross-Layer Rate Control in Wireless Networks with Lossy Links: Leaky-Pipe Flow, Effective Network Utility Maximization and Hop-by-Hop Algorithms.
493-501
- Balaji Rengarajan, Gustavo de Veciana:
Architecture and Abstractions for Environment and Traffic Aware System-Level Coordination of Wireless Networks: The Downlink Case.
502-510
- Reuven Cohen, Liran Katzir:
Computational Analysis and Efficient Algorithms for Micro and Macro OFDMA Scheduling.
511-519
- Ulas C. Kozat:
On the Throughput Capacity of Opportunistic Multicasting with Erasure Codes.
520-528
Network Security 2
Sensor Networks 1
Ad Hoc Networks 1
- Mathilde Durvy, Olivier Dousse, Patrick Thiran:
Border Effects, Fairness, and Phase Transition in Large Wireless Networks.
601-609
- Simone Merlin, Nitin H. Vaidya, Michele Zorzi:
Resource Allocation in Multi-Radio Multi-Channel Multi-Hop Wireless Networks.
610-618
- Umut Akyol, Matthew Andrews, Piyush Gupta, John D. Hobby, Iraj Saniee, Alexander L. Stolyar:
Joint Scheduling and Congestion Control in Mobile Ad-Hoc Networks.
619-627
- Hongning Dai, Kam-Wing Ng, Raymond Chi-Wing Wong, Min-You Wu:
On the Capacity of Multi-Channel Wireless Networks Using Directional Antennas.
628-636
Optical Networks 2
- Duan-Shin Lee, Cheng-Shang Chang, Jay Cheng, Horng-Sheng Yan:
Queueing Analysis of Loss Systems with Variable Optical Delay Lines.
637-645
- Byongkwon Moon:
Emergency Handling in Ethernet Passive Optical Networks Using Priority-Based Dynamic Bandwidth Allocation.
646-654
- Fernando Solano, Ruth van Caenegem, Didier Colle, José-Luis Marzo, Mario Pickavet, Ramón Fabregat, Piet Demeester:
All-Optical Label Stacking: Easing the Trade-offs Between Routing and Architecture Cost in All-Optical Packet Switching.
655-663
- Jay Cheng, Cheng-Shang Chang, Tsz-Hsuan Chao, Duan-Shin Lee, Ching-Ming Lien:
On Constructions of Optical Queues with a Limited Number of Recirculations.
664-672
Cellular Networks
Wireless:
IEEE 802.11 issues
- Mohammad Nassiri, Martin Heusse, Andrzej Duda:
A Novel Access Method for Supporting Absolute and Proportional Priorities in 802.11 WLANs.
709-717
- Anand Prabhu Subramanian, Pralhad Deshpande, Jie Gao, Samir R. Das:
Drive-By Localization of Roadside WiFi Networks.
718-725
- Sangho Shin, Henning Schulzrinne:
Call Admission Control in IEEE 802.11 WLANs Using QP-CAT.
726-734
- Shravan K. Rayanchu, Arunesh Mishra, Dheeraj Agrawal, Sharad Saha, Suman Banerjee:
Diagnosing Wireless Packet Losses in 802.11: Separating Collision from Weak Signal.
735-743
Wireless Mesh Networks 2
- Gentian Jakllari, Stephan Eidenbenz, Nicolas W. Hengartner, Srikanth V. Krishnamurthy, Michalis Faloutsos:
Link Positions Matter: A Noncommutative Routing Metric for Wireless Mesh Network.
744-752
- Hithesh Nama, Narayan B. Mandayam, Roy D. Yates:
Network Formation Among Selfish Energy-Constrained Wireless Devices.
753-761
- Ehsan Aryafar, Omer Gurewitz, Edward W. Knightly:
Distance-1 Constrained Channel Assignment in Single Radio Wireless Mesh Networks.
762-770
- Debmalya Panigrahi, Partha Dutta, Sharad Jaiswal, K. V. M. Naidu, Rajeev Rastogi:
Minimum Cost Topology Construction for Rural Wireless Mesh Networks.
771-779
Sensor Networks 2
- Animashree Anandkumar, Lang Tong, Ananthram Swami, Anthony Ephremides:
Minimum Cost Data Aggregation with Localized Processing for Statistical Inference.
780-788
- Sol Lederer, Yue Wang, Jie Gao:
Connectivity-Based Localization of Large Scale Sensor Networks with Complex Shape.
789-797
- Fenghui Zhang, Anxiao Jiang, Jianer Chen:
Robust Planarization of Unlocalized Wireless Sensor Networks.
798-806
- Joohwan Kim, Xiaojun Lin, Ness B. Shroff, Prasun Sinha:
On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast.
807-815
Ad Hoc Networks 2
Wireless Networks 1
Quality of Service 1
Mobility
- Injong Rhee, Minsu Shin, Seongik Hong, Kyunghan Lee, Song Chong:
On the Levy-Walk Nature of Human Mobility.
924-932
- Wenye Wang, Ming Zhao:
Joint Effects of Radio Channels and Node Mobility on Link Dynamics in Wireless Networks.
933-941
- Hongzi Zhu, Yanmin Zhu, Minglu Li, Lionel M. Ni:
HERO: Online Real-Time Vehicle Tracking in Shanghai.
942-950
- Xin Hu, Erran L. Li, Zhuoqing Morley Mao, Yang Richard Yang:
Wide-Area IP Network Mobility.
951-959
Sensor Querying
- Rik Sarkar, Xianjin Zhu, Jie Gao, Leonidas J. Guibas, Joseph S. B. Mitchell:
Iso-Contour Queries and Gradient Descent with Guaranteed Delivery in Sensor Networks.
960-967
- Xiaoming Lu, Matt Spear, Karl N. Levitt, Shyhtsun Felix Wu:
iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks.
968-976
- Lei Ying, Zhen Liu, Donald F. Towsley, Cathy H. Xia:
Distributed Operator Placement and Data Caching in Large-Scale Sensor Networks.
977-985
- Patrick Denantes, Florence Bénézit, Patrick Thiran, Martin Vetterli:
Which Distributed Averaging Algorithm Should I Choose for my Sensor Network?
986-994
Wireless Networks 2
Peer-to-Peer Networks 2
- Bo Li, Susu Xie, Yang Qu, Gabriel Yik Keung, Chuang Lin, Jiangchuan Liu, Xinyan Zhang:
Inside the New Coolstreaming: Principles, Measurements and Performance Implications.
1031-1039
- Thanasis G. Papaioannou, George D. Stamoulis:
Achieving Honest Ratings with Reputation-Based Fines in Electronic Markets.
1040-1048
- Zhongmei Yao, Dmitri Loguinov:
Understanding Disconnection and Stabilization of Chord.
1049-1057
- Dongni Ren, Y.-T. Hillman Li, Shueng-Han Gary Chan:
On Reducing Mesh Delay for Peer-to-Peer Live Streaming.
1058-1066
Internet Measurement 3
Ad Hoc Networks:
Scheduling
Cross layer Design 2
- Gil Zussman, Andrew Brzezinski, Eytan Modiano:
Multihop Local Pooling for Distributed Throughput Maximization in Wireless Networks.
1139-1147
- Deepti Chafekar, Dave Levin, V. S. Anil Kumar, Madhav V. Marathe, Srinivasan Parthasarathy, Aravind Srinivasan:
Capacity of Asynchronous Random-Access Scheduling in Wireless Networks.
1148-1156
- Kai Yang, Yihong Wu, Jianwei Huang, Xiaodong Wang, Sergio Verdú:
Distributed Robust Optimization for Communication Networks.
1157-1165
- Deepti Chafekar, V. S. Anil Kumar, Madhav V. Marathe, Srinivasan Parthasarathy, Aravind Srinivasan:
Approximation Algorithms for Computing Capacity of Wireless Networks with SINR Constraints.
1166-1174
Sensor Networks 3
- Xianjin Zhu, Rik Sarkar, Jie Gao, Joseph S. B. Mitchell:
Light-Weight Contour Tracking in Wireless Sensor Networks.
1175-1183
- Tian He, John A. Stankovic, Radu Stoleru, Yu Gu, Yafeng Wu:
Essentia: Architecting Wireless Sensor Networks Asymmetrically.
1184-1192
- Yafeng Wu, John A. Stankovic, Tian He, Shan Lin:
Realistic and Efficient Multi-Channel Communications in Wireless Sensor Networks.
1193-1201
- Bartlomiej Blaszczyszyn, Bozidar Radunovic:
Using Transmit-Only Sensors to Reduce Deployment Cost of Wireless Sensor Networks.
1202-1210
Network Security 3
- Jerry T. Chiang, Yih-Chun Hu:
Dynamic Jamming Mitigation for Wireless Broadcast Networks.
1211-1219
- Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng:
A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks.
1220-1228
- Rongxing Lu, Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen:
ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications.
1229-1237
- Maxim Raya, Panagiotis Papadimitratos, Virgil D. Gligor, Jean-Pierre Hubaux:
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks.
1238-1246
Wireless Networks 3
- Joshua Robinson, Mustafa Uysal, Ram Swaminathan, Edward W. Knightly:
Adding Capacity Points to a Wireless Mesh Network Using Local Search.
1247-1255
- Minkyong Kim, Zhen Liu, Srinivasan Parthasarathy, Dimitrios E. Pendarakis, Hao Yang:
Association Control in Mobile Wireless Networks.
1256-1264
- Emrah Bayraktaroglu, Christopher King, Xin Liu, Guevara Noubir, Rajmohan Rajaraman, Bishal Thapa:
On the Performance of IEEE 802.11 under Jamming.
1265-1273
- Muhammad Usman Ilyas, Hayder Radha:
Measurement Based Analysis and Modeling of the Error Process in IEEE 802.15.4 LR-WPANs.
1274-1282
Cross Layer Design 3
Wireless Routing
Multimedia
- Chuan Wu, Baochun Li, Shuqiao Zhao:
Multi-Channel Live P2P Streaming: Refocusing on Servers.
1355-1363
- Feng Wang, Jiangchuan Liu, Yongqiang Xiong:
Stable Peers: Existence, Importance, and Application in Peer-to-Peer Live Video Streaming.
1364-1372
- Shun-Yun Hu, Ting-Hao Huang, Shao-Chen Chang, Wei-Lun Sung, Jehn-Ruey Jiang, Bing-Yu Chen:
FLoD: A Framework for Peer-to-Peer 3D Streaming.
1373-1381
- Haodong Wang, Chiu Chiang Tan, Qun Li:
Snoogle: A Search Engine for the Physical World.
1382-1390
Sensor Security 2
Wireless MAC 2
- Senhua Huang, Xin Liu, Zhi Ding:
Opportunistic Spectrum Access in Cognitive Radio Networks.
1427-1435
- Guner D. Celik, Gil Zussman, Wajahat F. Khan, Eytan Modiano:
MAC for Networks with Multipacket Reception Capability and Spatially Distributed Nodes.
1436-1444
- Zheng Zeng, Yong Yang, Jennifer C. Hou:
How Physical Carrier Sense Affects System Throughput in IEEE 802.11 Wireless Networks.
1445-1453
- Dong Zheng, Min Cao, Junshan Zhang, P. R. Kumar:
Channel Aware Distributed Scheduling for Exploiting Multi-Receiver Diversity and Multiuser Diversity in Ad-Hoc Networks: A Unified PHY/MAC Approach.
1454-1462
Quality of Service 2
Network Coding 2
- Shuhui Yang, Jie Wu, Mihaela Cardei:
Efficient Broadcast in MANETs Using Network Coding and Directional Antennas.
1499-1507
- Yunfeng Lin, Baochun Li, Ben Liang:
Efficient Network Coded Data Transmissions in Disruption Tolerant Networks.
1508-1516
- I-Hong Hou, Yu-En Tsai, Tarek F. Abdelzaher, Indranil Gupta:
AdapCode: Adaptive Network Coding for Code Updates in Wireless Sensor Networks.
1517-1525
- Wei Pu, Chong Luo, Shipeng Li, Chang Wen Chen:
Continuous Network Coding in Wireless Relay Networks.
1526-1534
Wireless Networks 4
Multicast
Wireless Mesh Networks 3
Internet Measurement 4
Network Security 3
- Milan Vojnovic, Varun Gupta, Thomas Karagiannis, Christos Gkantsidis:
Sampling Strategies for Epidemic-Style Information Dissemination.
1678-1686
- Jinyuan Sun, Chi Zhang, Yuguang Fang:
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks.
1687-1695
- Parbati K. Manna, Shigang Chen, Sanjay Ranka:
Exact Modeling of Propagation for Permutation-Scanning Worms.
1696-1704
- Parminder Chhabra, Clayton Scott, Eric D. Kolaczyk, Mark Crovella:
Distributed Spatial Anomaly Detection.
1705-1713
Peer-to-Peer Networks 3
- Stefano Castelli, Paolo Costa, Gian Pietro Picco:
HyperCBR: Large-Scale Content-Based Routing in a Multidimensional Space.
1714-1722
- Krishna Puttaswamy, Alessandra Sala, Ben Y. Zhao:
Searching for Rare Objects Using Index Replication.
1723-1731
- Sung-Ju Lee, Sujata Banerjee, Puneet Sharma, Praveen Yalagandula, Sujoy Basu:
Bandwidth-Aware Routing in Overlay Networks.
1732-1740
- Rita H. Wouhaybi, Puneet Sharma, Sujata Banerjee, Andrew T. Campbell:
Minerva: Learning to Infer Network Path Properties.
1741-1749
Wireless MAC 3
Router/Switch Design 3
Economics,
Pricing and Measurement
- Qian Lv, George N. Rouskas:
On Optimal Sizing of Tiered Network Services.
1822-1830
- Marcelo Yannuzzi, Xavier Masip-Bruin, René Serral-Gracià, Eva Marín-Tordera, Alexander Sprintson, Ariel Orda:
Maximum Coverage at Minimum Cost for Multi-Domain IP/MPLS Networks.
1831-1839
- Peter B. Key, Laurent Massoulié, Dan-Cristian Tomozei:
Non-Metric Coordinates for Predicting Network Proximity.
1840-1848
- K. V. M. Naidu, Debmalya Panigrahi, Rajeev Rastogi:
Detecting Anomalies Using End-to-End Path Measurements.
1849-1857
Wireless ad hoc networks - I
- Hermann S. Lichte, Stefan Valentin, Holger Karl, Imad Aad, Luis Loyola, Jörg Widmer:
Design and Evaluation of a Routing-Informed Cooperative MAC Protocol for Ad Hoc Networks.
1858-1866
- Zygmunt J. Haas, Edward Y. Hua:
Residual Link Lifetime Prediction with Limited Information Input in Mobile Ad Hoc Networks.
1867-1875
- Ruiliang Chen, Jung Min Park, Kaigui Bian:
Robust Distributed Spectrum Sensing in Cognitive Radio Networks.
1876-1884
- Fan Wang, Marwan Krunz, Shuguang Cui:
Spectrum Sharing in Cognitive Radio Networks.
1885-1893
Medium access control and channel diversity
Network Security I
- Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan, Wei Zhao:
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems.
1930-1938
- Anirban Banerjee, Dhiman Barman, Michalis Faloutsos, Laxmi N. Bhuyan:
Cyber-Fraud is One Typo Away.
1939-1947
- Jean-Chrysostome Bolot, Marc Lelarge:
A New Perspective on Internet Security using Insurance.
1948-1956
- Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan:
A Novel Quantitative Approach For Measuring Network Security.
1957-1965
Optical Networks and Switching
- Xin Liu, Wei Wei, Chunming Qiao, Ting Wang, Weisheng Hu, Wei Guo, Min-You Wu:
Task Scheduling and Lightpath Establishment in Optical Grids.
1966-1974
- Guangzhi Li, Angela L. Chiu, Robert D. Doverspike, Martin Birk, Don Husa, Nick Zanki:
On Transient-Constrained Wavelength Assignment.
1975-1983
- Quanyan Zhu, Lacra Pavel:
Theory of Linear Games with Constraints and Its Application to Power Control of Optical Networks.
1984-1992
- Xiaolin Wang, Yan Cai, Sheng Xiao, Weibo Gong:
A Three-Stage Load-Balancing Switch.
1993-2001
- Tony Tong Lee:
The Kraft's Inequality of Scheduling for Packet-Switched Clos Networks.
2002-2010
Sensor networks - I
Wireless LANs
- Haithem Al-Mefleh, J. Morris Chang:
A New ACK Policy To Mitigate the Effects of Coexisting IEEE 802.11/802.11e Devices.
2056-2064
- Caleb T. Phillips, Suresh Singh:
An Empirical Activity Model for WLAN Users.
2065-2073
- Seong-il Hahm, Jongwon Lee, Chong-kwon Kim:
Opportunistic Waiver of Data Reception for Exploiting Multiuser Diversity in the Uplink of IEEE 802.11 WLAN.
2074-2082
- Jiansong Zhang, Kun Tan, Jun Zhao, Haitao Wu, Yongguang Zhang:
A Practical SNR-Guided Rate Adaptation.
2083-2091
- Yigal Bejerano, Dongwook Lee, Prasun Sinha, Lisa Zhang:
Approximation Algorithms for Scheduling Real-Time Multicast Flows in Wireless LANs.
2092-2100
Wireless Applications and Security
Congestion Control and Network Coding
- Krister Jacobsson, Lachlan L. H. Andrew, Ao Tang, Karl Henrik Johansson, Håkan Hjalmarsson, Steven H. Low:
ACK-Clocking Dynamics: Modelling the Interaction between Windows and the Network.
2146-2152
- Kiran Misra, Shirish S. Karande, Hayder Radha:
Maximal Recovery Network Coding under Topology Constraint.
2153-2161
- Jin Jin, Baochun Li, Taegon Kong:
Is Random Network Coding Helpful in WiMAX?
2162-2170
- Majid Ghaderi, Donald F. Towsley, James F. Kurose:
Reliability Gain of Network Coding in Lossy Wireless Networks.
2171-2179
- Chia-Hui Tai, Jiang Zhu, Nandita Dukkipati:
Making Large Scale Deployment of RCP Practical for Real Networks.
2180-2188
Sensor networks - II
- Ioannis Ch. Paschalidis, Wei Lai, Xiangdong Song:
A Decomposition Method for Transmission Scheduling in Multi-Channel Wireless Sensor Networks.
2189-2197
- Zhong Zhou, Jun-Hong Cui, Amvrossios Bagtzoglou:
Scalable Localization with Mobility Prediction for Underwater Sensor Networks.
2198-2206
- Jing Wang, Yonghe Liu, Sajal K. Das:
Asynchronous Sampling Benefits Wireless Sensor Networks.
2207-2215
- Guanqun Yang, Bin Tong, Daji Qiao, Wensheng Zhang:
Sensor-Aided Overlay Deployment and Relocation for Vast-Scale Sensor Networks.
2216-2224
- Yang Yu, Loren J. Rittle:
Utility-Driven Spatiotemporal Sampling Using Mobile Sensors.
2225-2233
Multi-hop/Mesh wireless networks
- Alessandro Mei, Julinda Stefa:
Routing in Outer Space.
2234-2242
- Tehuang Liu, Wanjiun Liao:
Location-Dependent Network Performance and Design Strategies for Wireless Mesh Networks.
2243-2251
- Bozidar Radunovic, Christos Gkantsidis, Peter B. Key, Pablo Rodriguez:
An Optimization Framework for Opportunistic Multipath Routing in Wireless Mesh Networks.
2252-2260
- Partha Dutta, Sharad Jaiswal, Debmalya Panigrahi, Rajeev Rastogi:
A New Channel Assignment Mechanism for Rural Wireless Mesh Networks.
2261-2269
- Mina Sartipi, Badri N. Vellambi, Nazanin Rahnavard, Faramarz Fekri:
DSCM: An Energy-Efficient and Rate-Optimal Multicast Protocol for Multihop Wireless Networks Using Distributed Source Coding.
2270-2278
Network Security II
- Andreas Hess, Sudipta Sengupta, Vijay P. Kumar:
Joint Traffic Routing and Distribution of Security Services in High Speed Networks.
2279-2287
- Yoon-Ho Choi, Moon-Young Jung, Seung-Woo Seo:
L+1-MWM: A Fast Pattern Matching Algorithm for High-Speed Packet Filtering.
2288-2296
- Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy:
Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks.
2297-2305
- Zesheng Chen, Chuanyi Ji, Paul Barford:
Spatial-Temporal Characteristics of Internet Malicious Sources.
2306-2314
- Parbati K. Manna, Sanjay Ranka, Shigang Chen:
DAWN: A Novel Strategy for Detecting ASCII Worms in Networks.
2315-2323
Restoration and Fault Tolerance
Wireless ad hoc networks - II
QoS and performance evaluation
Peer-to-Peer Networks and Applications
Copyright © Fri Mar 12 17:16:15 2010
by Michael Ley (ley@uni-trier.de)