default search action
IEEE/ACM Transactions on Networking, Volume 20
Volume 20, Number 1, February 2012
- Neal Charbonneau, Vinod Vokkarane:
Static Routing and Wavelength Assignment for Multicast Advance Reservation in All-Optical Wavelength-Routed WDM Networks. 1-14 - Hanan Shpungin, Zongpeng Li:
Throughput and Energy Efficiency in Wireless Ad Hoc Networks With Gaussian Channels. 15-28 - Binbin Chen, Ziling Zhou, Yuda Zhao, Haifeng Yu:
Efficient Error Estimating Coding: Feasibility and Applications. 29-44 - Saqib Raza, Guanyao Huang, Chen-Nee Chuah, Srini Seetharaman, Jatinder Pal Singh:
MeasuRouting: A Framework for Routing Assisted Traffic Monitoring. 45-56 - Peilong Li, Honghai Zhang, Baohua Zhao, Sampath Rangarajan:
Scalable Video Multicast With Adaptive Modulation and Coding in Broadband Wireless Data Systems. 57-68 - Chandramani Kishore Singh, Saswati Sarkar, Alireza Aram, Anurag Kumar:
Cooperative Profit Sharing in Coalition-Based Resource Allocation in Wireless Networks. 69-83 - Kai Chen, Chuanxiong Guo, Haitao Wu, Jing Yuan, Zhenqian Feng, Yan Chen, Songwu Lu, Wenfei Wu:
DAC: Generic and Automatic Address Configuration for Data Center Networks. 84-99 - Arun Sridharan, Can Emre Koksal, Elif Uysal-Biyikoglu:
A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels. 100-113 - Ferhat Dikbiyik, Laxman H. Sahasrabuddhe, Massimo Tornatore, Biswanath Mukherjee:
Exploiting Excess Capacity to Improve Robustness of WDM Mesh Networks. 114-124 - Minlan Yu, Marina Thottan, Li (Erran) Li:
Latency Equalization as a New Network Service Primitive. 125-138 - Myungjin Lee, Nick G. Duffield, Ramana Rao Kompella:
Opportunistic Flow-Level Latency Estimation Using Consistent NetFlow. 139-152 - Sangman Cho, Theodore Elhourani, Srinivasan Ramasubramanian:
Independent Directed Acyclic Graphs for Resilient Multipath Routing. 153-162 - Berk Birand, Maria Chudnovsky, Bernard Ries, Paul D. Seymour, Gil Zussman, Yori Zwols:
Analyzing the Performance of Greedy Maximal Scheduling via Local Pooling and Graph Theory. 163-176 - Hongseok Kim, Gustavo de Veciana, Xiangying Yang, Muthaiah Venkatachalam:
Distributed ά-Optimal User Association and Cell Load Balancing in Wireless Networks. 177-190 - Giuseppe Campobello, Alessandro Leonardi, Sergio Palazzo:
Improving Energy Saving and Reliability in Wireless Sensor Networks Using a Simple CRT-Based Packet-Forwarding Solution. 191-205 - Mosharaf Chowdhury, Muntasir Raihan Rahman, Raouf Boutaba:
ViNEYard: Virtual Network Embedding Algorithms With Coordinated Node and Link Mapping. 206-219 - Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta:
Abnormally Malicious Autonomous Systems and Their Internet Connectivity. 220-230 - Julien Ridoux, Darryl Veitch, Timothy Broomhead:
The Case for Feed-Forward Clock Synchronization. 231-242 - Abhijeet Bhorkar, Mohammad Naghshvar, Tara Javidi, Bhaskar D. Rao:
Adaptive Opportunistic Routing for Wireless Ad Hoc Networks. 243-256 - Hayang Kim, Xiaoli Ma, Benjamin R. Hamilton:
Tracking Low-Precision Clocks With Time-Varying Drifts Using Kalman Filtering. 257-270 - Yihua He, Michalis Faloutsos, Srikanth V. Krishnamurthy, Marek Chrobak:
Obtaining Provably Legitimate Internet Topologies. 271-284 - Matthew Andrews, Antonio Fernández Anta, Lisa Zhang, Wenbo Zhao:
Routing for Power Minimization in the Speed Scaling Model. 285-294 - Fang Hao, Murali S. Kodialam, T. V. Lakshman, Haoyu Song:
Fast Dynamic Multiple-Set Membership Testing Using Combinatorial Bloom Filters. 295-304 - Yunbo Wang, Mehmet C. Vuran, Steve Goddard:
Cross-Layer Analysis of the End-to-End Delay Distribution in Wireless Sensor Networks. 305-318
Volume 20, Number 2, April 2012
- Wei Wei, Sharad Jaiswal, Jim Kurose, Don Towsley, Kyoungwon Suh, Bing Wang:
Identifying 802.11 Traffic From Passive Measurements Using Iterative Bayesian Inference. 325-338 - Sungho Yun, Constantine Caramanis:
System-Level Optimization in Wireless Networks: Managing Interference and Uncertainty via Robust Optimization. 339-352 - Justin Manweiler, Naveen Santhapuri, Souvik Sen, Romit Roy Choudhury, Srihari Nelakuditi, Kamesh Munagala:
Order Matters: Transmission Reordering in Wireless Networks. 353-366 - Bridge Qiao Zhao, John C. S. Lui, Dah-Ming Chiu:
A Mathematical Framework for Analyzing Adaptive Incentive Protocols in P2P Networks. 367-380 - Fabio Soldo, Katerina J. Argyraki, Athina Markopoulou:
Optimal Source-Based Filtering of Malicious Traffic. 381-395 - Mukundan Venkataraman, Mainak Chatterjee:
Quantifying Video-QoE Degradations of Internet Links. 396-407 - Guoqiang Mao, Brian D. O. Anderson:
Towards a Better Understanding of Large-Scale Network Models. 408-421 - Michael Menth, Frank Lehrieder:
Performance of PCN-Based Admission Control Under Challenging Conditions. 422-435 - Miklós Reiter, Richard Steinberg:
Congestion-Dependent Pricing and Forward Contracts for Complementary Segments of a Communication Network. 436-449 - Rui Tan, Guoliang Xing, Benyuan Liu, Jianping Wang, Xiaohua Jia:
Exploiting Data Fusion to Improve the Coverage of Wireless Sensor Networks. 450-462 - Luca Chiaraviglio, Marco Mellia, Fabio Neri:
Minimizing ISP Network Energy Cost: Formulation and Solutions. 463-476 - Niv Buchbinder, Liane Lewin-Eytan, Ishai Menache, Joseph Naor, Ariel Orda:
Dynamic Power Allocation Under Arbitrary Varying Channels - An Online Approach. 477-487 - Chad R. Meiners, Alex X. Liu, Eric Torng:
Bit Weaving: A Non-Prefix Approach to Compressing Packet Classifiers in TCAMs. 488-500 - Eric Jung, Xin Liu:
Opportunistic Spectrum Access in Multiple-Primary-User Environments Under the Packet Collision Constraint. 501-514 - Kyunghan Lee, Seongik Hong, Seong Joon Kim, Injong Rhee, Song Chong:
SLAW: Self-Similar Least-Action Human Walk. 515-529 - Tao Shu, Marwan Krunz:
Finding Cheap Routes in Profit-Driven Opportunistic Spectrum Access Networks: A Truthful Mechanism Design Approach. 530-543 - Souvik Sen, Romit Roy Choudhury, Srihari Nelakuditi:
CSMA/CN: Carrier Sense Multiple Access With Collision Notification. 544-556 - Beakcheol Jang, Mihail L. Sichitiu:
IEEE 802.11 Saturation Throughput Analysis in the Presence of Hidden Terminals. 557-570 - Ahmed Elmokashfi, Amund Kvalbein, Constantine Dovrolis:
BGP Churn Evolution: A Perspective From the Core. 571-584 - Ermin Kozica, W. Bastiaan Kleijn:
A Quantization Theoretic Perspective on Simulcast and Layered Multicast Optimization. 585-593 - Costas Courcoubetis, Richard R. Weber:
Economic Issues in Shared Infrastructures. 594-608 - Thang N. Dinh, Ying Xuan, My T. Thai, Panos M. Pardalos, Taieb Znati:
On New Approaches of Assessing Network Vulnerability: Hardness and Approximation. 609-619 - Giovanna Carofiglio, Luca Muscariello:
On the Impact of TCP and Per-Flow Scheduling on Internet Performance. 620-633
Volume 20, Number 3, June 2012
- Khandoker Nadim Parvez, Carey Williamson, Anirban Mahanti, Niklas Carlsson:
Insights on Media Streaming Progress Using BitTorrent-Like Protocols for On-Demand Streaming. 637-650 - Lili Cao, Haitao Zheng:
Balancing Reliability and Utilization in Dynamic Spectrum Access. 651-661 - Matthew Roughan, Yin Zhang, Walter Willinger, Lili Qiu:
Spatio-Temporal Compressive Sensing and Internet Traffic Matrices (Extended Version). 662-676 - João L. Sobrinho, Tiago Quelhas:
A Theory for the Connectivity Discovered by Routing Protocols. 677-689 - XiaoHua Xu, Xiang-Yang Li, Peng-Jun Wan, Shaojie Tang:
Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks. 690-698 - Masanori Bando, N. Sertac Artan, H. Jonathan Chao:
Scalable Lookahead Regular Expression Detection System for Deep Packet Inspection. 699-714 - Sanjeev Khanna, Santosh S. Venkatesh, Omid Fatemieh, Fariba Khan, Carl A. Gunter:
Adaptive Selective Verification: An Efficient Adaptive Countermeasure to Thwart DoS Attacks. 715-728 - Fong Pong, Nian-Feng Tzeng:
Concise Lookup Tables for IPv4 and IPv6 Longest Prefix Matching in Scalable Routers. 729-741 - Rafael P. Laufer, Henri Dubois-Ferrière, Leonard Kleinrock:
Polynomial-Time Algorithms for Multirate Anypath Routing in Wireless Multihop Networks. 742-755 - Douglas J. Leith, Qizhi Cao, Vijay G. Subramanian:
Max-Min Fairness in 802.11 Mesh Networks. 756-769 - Changbin Liu, Ricardo Correa, Xiaozhou Li, Prithwish Basu, Boon Thau Loo, Yun Mao:
Declarative Policy-Based Adaptive Mobile Ad Hoc Networking. 770-783 - Edoardo Amaldi, Antonio Capone, Matteo Cesana, Ilario Filippini:
Design of Wireless Sensor Networks for Mobile Target Detection. 784-797 - Samir Sebbah, Brigitte Jaumard:
Differentiated Quality-of-Recovery in Survivable Optical Mesh Networks Using $p$ -Structures. 798-810 - Ramana Rao Kompella, Kirill Levchenko, Alex C. Snoeren, George Varghese:
Router Support for Fine-Grained Latency Measurements. 811-824 - Jian Ni, Bo (Rambo) Tan, R. Srikant:
Q-CSMA: Queue-Length-Based CSMA/CA Algorithms for Achieving Maximum Throughput and Low Delay in Wireless Networks. 825-836 - Wei Wang, Kang G. Shin, Wenbo Wang:
Distributed Resource Allocation Based on Queue Balancing in Multihop Cognitive Radio Networks. 837-850 - Yi Zhu, Jason P. Jue:
Reliable Collective Communications With Weighted SRLGs in Optical Networks. 851-863 - Guang Tan, Anne-Marie Kermarrec:
Greedy Geographic Routing in Large-Scale Sensor Networks: A Minimum Network Decomposition Approach. 864-877 - Siamak Sorooshyari, Chee Wei Tan, Mung Chiang:
Power Control for Cognitive Radio Networks: Axioms, Algorithms, and Analysis. 878-891 - Parvathinathan Venkitasubramaniam, Lang Tong:
A Game-Theoretic Approach to Anonymous Networking. 892-905 - Abishek Gopalan, Srinivasan Ramasubramanian:
On Identifying Additive Link Metrics Using Linearly Independent Cycles and Paths. 906-916 - Xinbing Wang, Luoyi Fu, Chenhui Hu:
Multicast Performance With Hierarchical Cooperation. 917-930 - Brian Eriksson, Gautam Dasarathy, Paul Barford, Robert D. Nowak:
Efficient Network Tomography for Internet Topology Discovery. 931-943 - Dan Li, Yuanjie Li, Jianping Wu, Sen Su, Jiangwei Yu:
ESM: Efficient and Scalable Data Center Multicast Routing. 944-955 - Zizhan Zheng, Prasun Sinha, Santosh Kumar:
Sparse WiFi Deployment for Vehicular Internet Access With Bounded Interconnection Gap. 956-969 - Anat Bremler-Barr, Yaron Koral:
Accelerating Multipattern Matching on Compressed HTTP Traffic. 970-983
Volume 20, Number 4, August 2012
- Cataldo Basile, Alberto Cappadonia, Antonio Lioy:
Network-Level Access Control Policy Analysis and Transformation. 985-998 - Diego G. Passos, Célio Vinicius N. de Albuquerque:
A Joint Approach to Routing Metrics and Rate Adaptation in Wireless Mesh Networks. 999-1009 - Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuzmanovic, Antonio Nucci:
Taming the Mobile Data Deluge With Drop Zones. 1010-1023 - Vicky Sharma, Koushik Kar, K. K. Ramakrishnan, Shivkumar Kalyanaraman:
A Transport Protocol to Exploit Multipath Diversity in Wireless Networks. 1024-1039 - Hao Wang, Haiquan (Chuck) Zhao, Bill Lin, Jun (Jim) Xu:
DRAM-Based Statistics Counter Array Architecture With Performance Guarantee. 1040-1053 - Yi Shi, Y. Thomas Hou:
Some Fundamental Results on Base Station Movement Problem for Wireless Sensor Networks. 1054-1067 - Ashwini Kumar, Kang G. Shin:
DSASync: Managing End-to-End Connections in Dynamic Spectrum Access Wireless LANs. 1068-1081 - Sharanya Eswaran, Archan Misra, Thomas F. La Porta:
Control-Theoretic Utility Maximization in Multihop Wireless Networks Under Mission Dynamics. 1082-1095 - Krishna P. Jagannathan, Mihalis G. Markakis, Eytan H. Modiano, John N. Tsitsiklis:
Queue-Length Asymptotics for Generalized Max-Weight Scheduling in the Presence of Heavy-Tailed Traffic. 1096-1111 - Bin Li, Atilla Eryilmaz:
Exploring the Throughput Boundaries of Randomized Schedulers in Wireless Networks. 1112-1124 - Evangelos Bampas, Aris Pagourtzis, George Pierrakos, Katerina Potika:
On a Noncooperative Model for Wavelength Assignment in Multifiber Optical Networks. 1125-1137 - Jung Ryu, Lei Ying, Sanjay Shakkottai:
Timescale Decoupled Routing and Rate Control in Intermittently Connected Networks. 1138-1151 - Gabriel Yik Keung, Bo Li, Qian Zhang:
The Intrusion Detection in Mobile Sensor Network. 1152-1161 - Josep M. Pujol, Vijay Erramilli, Georgos Siganos, Xiaoyuan Yang, Nikolaos Laoutaris, Parminder Chhabra, Pablo Rodriguez:
The Little Engine(s) That Could: Scaling Online Social Networks. 1162-1175 - Frank Lehrieder, György Dán, Tobias Hoßfeld, Simon Oechsner, Vlad Singeorzan:
Caching for BitTorrent-Like P2P Systems: A Simple Fluid Model and Its Implications. 1176-1189 - Hongbo Jiang, Arun Iyengar, Erich M. Nahum, Wolfgang Segmuller, Asser N. Tantawi, Charles P. Wright:
Design, Implementation, and Performance of a Load Balancer for SIP Server Clusters. 1190-1202 - Apoorva Jindal, Mingyan Liu:
Networked Computing in Wireless Sensor Networks for Structural Health Monitoring. 1203-1216 - Charles Shen, Erich M. Nahum, Henning Schulzrinne, Charles P. Wright:
The Impact of TLS on SIP Server Performance: Measurement and Modeling. 1217-1230 - Daniel Medina, Felix Hoffmann, Francesco Rossetto, Carl-Herbert Rokitansky:
A Geographic Routing Strategy for North Atlantic In-Flight Internet Access Via Airborne Mesh Networking. 1231-1244 - Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan, Weijia Jia:
A New Cell-Counting-Based Attack Against Tor. 1245-1261 - Masanori Bando, Yi-Li Lin, H. Jonathan Chao:
FlashTrie: Beyond 100-Gb/s IP Route Lookup Using Hash-Based Prefix-Compressed Trie. 1262-1275 - Caihong Kai, Soung Chang Liew:
Applications of Belief Propagation in CSMA Wireless Networks. 1276-1289 - Guowang Miao, Ye (Geoffrey) Li, Ananthram Swami:
Channel-Aware Distributed Medium Access Control. 1290-1303 - Pan Li, Miao Pan, Yuguang Fang:
Capacity Bounds of Three-Dimensional Wireless Ad Hoc Networks. 1304-1315 - Long Bao Le, Eytan H. Modiano, Ness B. Shroff:
Optimal Control of Wireless Networks With Finite Buffers. 1316-1329
Volume 20, Number 5, October 2012
- Ravi Kokku, Rajesh Mahindra, Honghai Zhang, Sampath Rangarajan:
NVS: A Substrate for Virtualizing Wireless Resources in Cellular Networks. 1333-1346 - M. H. R. Khouzani, Saswati Sarkar, Eitan Altman:
Maximum Damage Malware Attack in Mobile Wireless Networks. 1347-1360 - Alex Sherman, Jason Nieh, Clifford Stein:
FairTorrent: A Deficit-Based Distributed Algorithm to Ensure Fairness in Peer-to-Peer Systems. 1361-1374 - Dimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun Wang:
Pacifier: High-Throughput, Reliable Multicast Without "Crying Babies" in Wireless Mesh Networks. 1375-1388 - Wei Chen, Khaled Ben Letaief, Zhigang Cao:
Buffer-Aware Network Coding for Wireless Networks. 1389-1401 - Yang Qin, Lie-Liang Yang:
Steady-State Throughput Analysis of Network Coding Nodes Employing Stop-and-Wait Automatic Repeat Request. 1402-1411 - Yongkun Li, Bridge Qiao Zhao, John C. S. Lui:
On Modeling Product Advertisement in Large-Scale Online Social Networks. 1412-1425 - Danhua Guo, Laxmi N. Bhuyan, Bin Liu:
An Efficient Parallelized L7-Filter Design for Multicore Servers. 1426-1439 - Murtaza Zafer, Dakshi Agrawal, Mudhakar Srivatsa:
Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary. 1440-1451 - Joseph Camp, Ehsan Aryafar, Edward W. Knightly:
Coupled 802.11 Flows in Urban Channels: Model and Experimental Evaluation. 1452-1465 - Yi Gai, Bhaskar Krishnamachari, Rahul Jain:
Combinatorial Network Optimization With Unknown Variables: Multi-Armed Bandits With Linear Rewards and Individual Observations. 1466-1478 - Danail Traskov, Michael Heindlmaier, Muriel Médard, Ralf Koetter:
Scheduling for Network-Coded Multicast. 1479-1488 - Haoyu Song, Murali S. Kodialam, Fang Hao, T. V. Lakshman:
Efficient Trie Braiding in Scalable Virtual Routers. 1489-1500 - Wentao Huang, Xinbing Wang:
Capacity Scaling of General Cognitive Networks. 1501-1513 - Mhameed Aezladen, Reuven Cohen, Danny Raz:
Efficient Location-Based Decision-Supporting Content Distribution to Mobile Groups. 1514-1526 - Mohammad A. Saleh, Ahmed E. Kamal:
Approximation Algorithms for Many-to-Many Traffic Grooming in Optical WDM Networks. 1527-1540 - Cem Tekin, Mingyan Liu, Richard Southwell, Jianwei Huang, Sahand Haji Ali Ahmad:
Atomic Congestion Games on Graphs and Their Applications in Networking. 1541-1552 - Wei Gao, Qinghua Li, Bo Zhao, Guohong Cao:
Social-Aware Multicast in Disruption-Tolerant Networks. 1553-1566 - Ramon Aparicio-Pardo, Nina Skorin-Kapov, Pablo Pavón-Mariño, Belen Garcia-Manrubia:
(Non-)Reconfigurable Virtual Topology Design Under Multihour Traffic in Optical Networks. 1567-1580 - Khoa Tran Phan, Jaeok Park, Mihaela van der Schaar:
Near-Optimal Deviation-Proof Medium Access Control Designs in Wireless Networks. 1581-1594 - Honghai Zhang, Yuanxi Jiang, Karthik Sundaresan, Sampath Rangarajan, Baohua Zhao:
Wireless Multicast Scheduling With Switched Beamforming Antennas. 1595-1607 - Shreeshankar Bodas, Sanjay Shakkottai, Lei Ying, R. Srikant:
Low-Complexity Scheduling Algorithms for Multichannel Downlink Wireless Networks. 1608-1621 - Tao Li, Shigang Chen, Yibei Ling:
Per-Flow Traffic Measurement Through Randomized Counter Sharing. 1622-1634 - Eugenio Magistretti, Omer Gurewitz, Edward W. Knightly:
Measurement-Driven Modeling of Transmission Coordination for 802.11 Online Throughput Prediction. 1635-1648 - Ruogu Li, Atilla Eryilmaz:
Scheduling for End-to-End Deadline-Constrained Traffic With Reliability Requirements in Multihop Networks. 1649-1662 - Sandeep Yadav, Ashwath Kumar Krishna Reddy, A. L. Narasimha Reddy, Supranamaya Ranjan:
Detecting Algorithmically Generated Domain-Flux Attacks With DNS Traffic Analysis. 1663-1677
Volume 20, Number 6, December 2012
- Minghua Chen, Miroslav Ponec, Sudipta Sengupta, Jin Li, Philip A. Chou:
Utility maximization in peer-to-peer systems with applications to video conferencing. 1681-1694 - Bo Han, Lusheng Ji, Seungjoon Lee, Bobby Bhattacharjee, Robert R. Miller:
Are all bits equal?: experimental study of IEEE 802.11 communication bit errors. 1695-1706 - Lu Zhang, Xueyan Tang:
Optimizing client assignment for enhancing interactivity in distributed interactive applications. 1707-1720 - Ihsan Ayyub Qazi, Lachlan L. H. Andrew, Taieb Znati:
Congestion control with multipacket feedback. 1721-1733 - He Yan, Lee Breslau, Zihui Ge, Daniel Massey, Dan Pei, Jennifer Yates:
G-RCA: a generic root cause analysis platform for service quality management in large IP networks. 1734-1747 - Liguang Xie, Yi Shi, Y. Thomas Hou, Hanif D. Sherali:
Making sensor networks immortal: an energy-renewal approach with wireless power transfer. 1748-1761 - János Tapolcai, Pin-Han Ho, Lajos Rónyai, Bin Wu:
Network-wide local unambiguous failure localization (NWL-UFL) via monitoring trails. 1762-1773 - Fei Chen, Alex X. Liu:
Privacy- and integrity-preserving range queries in sensor networks. 1774-1787 - Daniela Brauckhoff, Xenofontas A. Dimitropoulos, Arno Wagner, Kavé Salamatian:
Anomaly extraction in backbone networks using association rules. 1788-1799 - Yong Ding, Yang Yang, Li Xiao:
Multisource video on-demand streaming in wireless mesh networks. 1800-1813 - Anduo Wang, Limin Jia, Wenchao Zhou, Yiqing Ren, Boon Thau Loo, Jennifer Rexford, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott:
FSR: formal analysis and implementation toolkit for safe interdomain routing. 1814-1827 - Jérôme François, Issam Aib, Raouf Boutaba:
FireCol: a collaborative protection network for the detection of flooding DDoS attacks. 1828-1841 - Laurent Vanbever, Stefano Vissicchio, Cristel Pelsser, Pierre François, Olivier Bonaventure:
Lossless migrations of link-state IGPs. 1842-1855 - Eitan Altman, Anurag Kumar, Chandramani Kishore Singh, Rajesh Sundaresan:
Spatial SINR games of base station placement and mobile association. 1856-1869 - George B. Mertzios, Ignasi Sau, Mordechai Shalom, Shmuel Zaks:
Placing regenerators in optical networks to satisfy multiple sets of requests. 1870-1879 - Thuy T. T. Nguyen, Grenville J. Armitage, Philip Branch, Sebastian Zander:
Timely and continuous machine-learning-based classification for interactive IP traffic. 1880-1894 - Isaac Keslassy, Kirill Kogan, Gabriel Scalosub, Michael Segal:
Providing performance guarantees in multipass network processors. 1895-1909 - Jeff Seibert, Ruben Torres, Marco Mellia, Maurizio M. Munafò, Cristina Nita-Rotaru, Sanjay G. Rao:
The internet-wide impact of P2P traffic localization on ISP profitability. 1910-1923 - Weiyao Xiao, Sachin Agarwal, David Starobinski, Ari Trachtenberg:
Reliable rateless wireless broadcasting with near-zero feedback. 1924-1937 - Dominic DiPalantino, Ramesh Johari:
Traffic engineering with semiautonomous users: a game-theoretic perspective. 1938-1949 - Jiajia Liu, Xiaohong Jiang, Hiroki Nishiyama, Nei Kato:
Generalized two-hop relay for flexible delay control in MANETs. 1950-1963 - Ziqiu Yun, Xiaole Bai, Dong Xuan, Weijia Jia, Wei Zhao:
Pattern mutation in wireless sensor deployment. 1964-1977 - Tao Li, Samuel S. Wu, Shigang Chen, Mark C. K. Yang:
Generalized energy-efficient algorithms for the RFID estimation problem. 1978-1990 - Gaurav S. Kasbekar, Yigal Bejerano, Saswati Sarkar:
Generic coverage verification without location information using dimension reduction. 1991-2004 - Vinod Kone, Lei Yang, Xue Yang, Ben Y. Zhao, Haitao Zheng:
The effectiveness of opportunistic spectrum access: a measurement study. 2005-2016
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.