Optimal Peer-to-Peer Technique for Massive Content Distribution (English)
- New search for: Zheng, X.
- New search for: Cho, C.
- New search for: Xia, Y.
- New search for: Zheng, X.
- New search for: Cho, C.
- New search for: Xia, Y.
In:
IEEE INFOCOM 2008 - The 27th Conference on Computer Communications
;
151-155
;
2008
-
ISSN:
- Conference paper / Electronic Resource
-
Title:Optimal Peer-to-Peer Technique for Massive Content Distribution
-
Contributors:
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2008-04-01
-
Size:239345 byte
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Theoretical Results on Base Station Movement Problem for Sensor NetworkShi, Y. / Hou, Y. T. et al. | 2008
- 6
-
Delay Analysis for Maximal Scheduling in Wireless Networks with Bursty TrafficNeely, M. J. et al. | 2008
- 11
-
Connectivity and Latency in Large-Scale Wireless Networks with Unreliable LinksKong, Z. / Yeh, E. M. et al. | 2008
- 16
-
The Speed of Information Propagation in Large Wireless NetworksXu, Y. / Wang, W. et al. | 2008
- 21
-
A Quasi-Likelihood Approach for Accurate Traffic Matrix Estimation in a High Speed NetworkCao, J. / Chen, A. / Bu, T. et al. | 2008
- 26
-
Accurate and Efficient Traffic Monitoring Using Adaptive Non-Linear Sampling MethodHu, C. / Wang, S. / Tian, J. / Liu, B. / Cheng, Y. / Chen, Y. et al. | 2008
- 31
-
Turbo King: Framework for Large-Scale Internet Delay MeasurementsLeonard, D. / Loguinov, D. et al. | 2008
- 36
-
Network Routing Topology Inference from End-to-End MeasurementsNi, J. / Xie, H. / Tatikonda, S. / Yang, Y. R. et al. | 2008
- 41
-
Attack-Tolerant Time-Synchronization in Wireless Sensor NetworksHu, X. / Park, T. / Shin, K. G. et al. | 2008
- 46
-
Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor NetworksSheng, B. / Li, Q. et al. | 2008
- 51
-
Towards Statistically Strong Source Anonymity for Sensor NetworksShao, M. / Yang, Y. / Zhu, S. / Cao, G. et al. | 2008
- 56
-
Confidentiality Protection for Distributed Sensor Data AggregationFeng, T. / Wang, C. / Zhang, W. / Ruan, L. et al. | 2008
- 61
-
On the Feasibility of the Link Abstraction in (Rural) Mesh NetworksGokhale, D. / Sen, S. / Chebrolu, K. / Raman, B. et al. | 2008
- 66
-
iPack: in-Network Packet Mixing for High Throughput Wireless Mesh NetworksAlimi, R. / Li, L. / Ramjee, R. / Viswanathan, H. / Yang, Y. R. et al. | 2008
- 71
-
Integrating Traffic Estimation and Routing Optimization for Multi-Radio Multi-Channel Wireless Mesh NetworksDai, L. / Xue, Y. / Chang, B. / Cao, Y. / Cui, Y. et al. | 2008
- 76
-
A Measurement Study of Multiplicative Overhead Effects in Wireless NetworksCamp, J. / Mancuso, V. / Gurewitz, O. / Knightly, E. W. et al. | 2008
- 81
-
Optimization Based Rate Control for Communication Networks with Inter-Session Network CodingKhreishah, A. / Wang, C.-C. / Shroff, N. B. et al. | 2008
- 86
-
Impact of File Arrivals and Departures on Buffer Sizing in Core RoutersLakshmikantha, A. / Srikant, R. / Beck, C. et al. | 2008
- 91
-
Window Flow Control: Macroscopic Properties from Microscopic FactorsTang, A. / Andrew, L. L. H. / Jacobsson, K. / Johansson, K. H. / Low, S. H. / Hjalmarsson, H. et al. | 2008
- 96
-
On the Design of Load Factor based Congestion Control Protocols for Next-Generation NetworksQazi, I. A. / Znati, T. et al. | 2008
- 101
-
Peacock Hashing: Deterministic and Updatable Hashing for High Performance NetworkingKumar, S. / Turner, J. / Crowley, P. et al. | 2008
- 2002
-
The Kraft's Inequality of Scheduling for Packet-Switched Clos NetworksLee, T. T. et al. | 2008
- 106
-
The Power of One Move: Hashing Schemes for HardwareKirsch, A. / Mitzenmacher, M. et al. | 2008
- 111
-
All-Match Based Complete Redundancy Removal for Packet Classifiers in TCAMsLiu, A. X. / Meiners, C. R. / Zhou, Y. et al. | 2008
- 116
-
Satisfying Arbitrary Delay Requirements in Multihop NetworksAndrews, M. / Zhang, L. et al. | 2008
- 121
-
MPLOT: A Transport Protocol Exploiting Multipath Diversity Using Erasure CodesSharma, V. / Kalyanaraman, S. / Kar, K. / Ramakrishnan, K. K. / Subramanian, V. et al. | 2008
- 126
-
Balanced Relay Allocation on Heterogeneous Unstructured OverlaysNguyen, H. X. / Figueiredo, D. R. / Grossglauser, M. / Thiran, P. et al. | 2008
- 131
-
Proxy Caching in Split TCP: Dynamics, Stability and Tail AsymptoticsBaccelli, F. / Carofiglio, G. / Foss, S. et al. | 2008
- 136
-
Beltway Buffers: Avoiding the OS Traffic Jamde Bruijn, W. / Bos, H. et al. | 2008
- 141
-
Swarming on Optimized Graphs for n-Way BroadcastSmaragdakis, G. / Laoutaris, N. / Michiardi, P. / Bestavros, A. / Byers, J. W. / Roussopoulos, M. et al. | 2008
- 146
-
Link Lifetimes and Randomized Neighbor Selection in DHTsYao, Z. / Loguinov, D. et al. | 2008
- 151
-
Optimal Peer-to-Peer Technique for Massive Content DistributionZheng, X. / Cho, C. / Xia, Y. et al. | 2008
- 2092
-
Approximation Algorithms for Scheduling Real-Time Multicast Flows in Wireless LANsBejerano, Y. / Lee, D. / Sinha, P. / Zhang, L. et al. | 2008
- 156
-
Algorithms for Low-Latency Remote File SynchronizationYan, H. / Irmak, U. / Suel, T. et al. | 2008
- 161
-
Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic AnalysisTague, P. / Slater, D. / Rogers, J. / Poovendran, R. et al. | 2008
- 166
-
A Memory Efficient Multiple Pattern Matching Architecture for Network SecuritySong, T. / Zhang, W. / Wang, D. / Xue, Y. et al. | 2008
- 171
-
Live Baiting for Service-Level DoS AttackersKhattab, S. / Gobriel, S. / Melhem, R. / Mosse, D. et al. | 2008
- 176
-
Firewall Compressor: An Algorithm for Minimizing Firewall PoliciesLiu, A. X. / Torng, E. / Meiners, C. R. et al. | 2008
- 186
-
On Survivable Access Network Design: Complexity and AlgorithmsXu, D. / Anshelevich, E. / Chiang, M. et al. | 2008
- 191
-
Survivable Multipath Provisioning with Differential Delay Constraint in Telecom Mesh NetworksHuang, S. / Mukherjee, B. / Martel, C. et al. | 2008
- 196
-
Improving Efficiency of Backup Reprovisioning in WDM NetworksTornatore, M. / Lucerna, D. / Pattavina, A. et al. | 2008
- 201
-
Spectrum Sharing Between Wireless NetworksGrokop, L. / Tse, D. N. C. et al. | 2008
- 206
-
Capacity Scaling of Sparse Mobile Ad Hoc NetworksGaretto, M. / Giaccone, P. / Leonardi, E. et al. | 2008
- 211
-
A Unifying Perspective on the Capacity of Wireless Ad Hoc NetworksWang, Z. / Sadjadpour, H. R. / Garcia-Luna-Aceves, J. J. et al. | 2008
- 216
-
Game-Theoretic Model for Collaborative Protocols in Selfish, Tariff-Free, Multihop Wireless NetworksNg, S.-K. / Seah, W. K. G. et al. | 2008
- 221
-
The Meandering Current Mobility Model and its Impact on Underwater Mobile Sensor NetworksCaruso, A. / Paparella, F. / Vieira, L. F. M. / Erol, M. / Gerla, M. et al. | 2008
- 226
-
Cross-Layer Packet Size Optimization for Wireless Terrestrial, Underwater, and Underground Sensor NetworksVuran, M. C. / Akyildiz, I. F. et al. | 2008
- 231
-
T-Lohi: A New Class of MAC Protocols for Underwater Acoustic Sensor NetworksSyed, A. A. / Ye, W. / Heidemann, J. et al. | 2008
- 236
-
Underwater Localization in Sparse 3D Acoustic Sensor NetworksCheng, W. / Teymorian, A. Y. / Ma, L. / Cheng, X. / Lu, X. / Lu, Z. et al. | 2008
- 241
-
Throughput Anonymity Trade-off in Wireless Networks under Latency ConstraintsVenkitasubramaniam, P. / Tong, L. et al. | 2008
- 246
-
An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor NetworksZhang, C. / Lu, R. / Lin, X. / Ho, P.-H. / Shen, X. et al. | 2008
- 251
-
Modeling Secure Connectivity of Self-Organized Wireless Ad Hoc NetworksZhang, C. / Song, Y. / Fang, Y. et al. | 2008
- 256
-
A Scalable Method for Access Control in Location-Based Broadcast ServicesSrivatsa, M. / Iyengar, A. / Yin, J. / Liu, L. et al. | 2008
- 261
-
Tracking Down Skype TrafficBonfiglio, D. / Mellia, M. / Meo, M. / Ritacca, N. / Rossi, D. et al. | 2008
- 266
-
Automatic Profiling of Network Event Sequences: Algorithm and ApplicationsMeng, X. / Jiang, G. / Zhang, H. / Chen, H. / Yoshihira, K. et al. | 2008
- 271
-
Characterizing and Modelling Clustering Features in AS-Level Internet TopologyLi, Y. / Cui, J.-H. / Maggiorini, D. / Faloutsos, M. et al. | 2008
- 276
-
Temporal Delay TomographyArya, V. / Duffield, N. G. / Veitch, D. et al. | 2008
- 281
-
Constrained Relay Node Placement in Wireless Sensor Networks to Meet Connectivity and Survivability RequirementsMisra, S. / Hong, S. D. / Xue, G. / Tang, J. et al. | 2008
- 286
-
On Maintaining Sensor-Actor Connectivity in Wireless Sensor and Actor NetworksWu, J. / Yang, S. / Cardei, M. et al. | 2008
- 291
-
Simple and Efficient k-Coverage Verification without Location InformationBejerano, Y. et al. | 2008
- 2279
-
Joint Traffic Routing and Distribution of Security Services in High Speed NetworksHess, A. / Sengupta, S. / Kumar, V. P. et al. | 2008
- 296
-
Deploying Four-Connectivity and Full-Coverage Wireless Sensor NetworksBai, X. / Yun, Z. / Xuan, D. / Lai, T. H. / Jia, W. et al. | 2008
- 301
-
Fair Scheduling through Packet ElectionJagabathula, S. / Doshi, V. / Shah, D. et al. | 2008
- 306
-
Quasi-Output-Buffered SwitchesChang, C.-S. / Cheng, J. / Lee, D.-S. / Wu, C.-F. et al. | 2008
- 311
-
MultiLayer Compressed Counting Bloom FiltersFicara, D. / Giordano, S. / Procissi, G. / Vitucci, F. et al. | 2008
- 316
-
Low Power TCAMs for Very Large Forwarding TablesLu, W. / Sahni, S. et al. | 2008
- 321
-
How Bad is Suboptimal Rate Allocation?Lan, T. / Lin, X. / Chiang, M. / Lee, R. et al. | 2008
- 326
-
On the Performance of Primal/Dual Schemes for Congestion Control in Networks with Dynamic FlowsMa, K. / Mazumdar, R. / Luo, J. et al. | 2008
- 331
-
Utility Max-Min Fair Congestion Control with Time-Varying DelaysMiller, K. / Harks, T. et al. | 2008
- 336
-
Reducing Maximum Stretch in Compact RoutingEnachescu, M. / Wang, M. / Goel, A. et al. | 2008
- 341
-
A p-norm Flow Optimization Problem in Dense Wireless Sensor NetworksKalantari, M. / Haghpanahi, M. / Shayman, M. et al. | 2008
- 346
-
Select-and-Protest-Based Beaconless Georouting with Guaranteed Delivery in Wireless Sensor NetworksKalosha, H. / Nayak, A. / Ruhrup, S. / Stojmenovic, I. et al. | 2008
- 351
-
Virtual-Coordinate-Based Delivery-Guaranteed Routing Protocol in Wireless Sensor Networks with Unidirectional LinksLin, C.-H. / Liu, B.-H. / Yang, H.-Y. / Kao, C.-Y. / Tsai, M.-J. et al. | 2008
- 356
-
On the Construction of a Maximum-Lifetime Data Gathering Tree in Sensor Networks: NP-Completeness and Approximation AlgorithmWu, Y. / Fahmy, S. / Shroff, N. B. et al. | 2008
- 361
-
Energy Efficient Opportunistic Network Coding for Wireless NetworksCui, T. / Chen, L. / Ho, T. et al. | 2008
- 366
-
Channelization for Network Coding in Wireless NetworksKumar, R. / Choi, H. / Shin, J. / La Porta, T. et al. | 2008
- 371
-
How Many Packets Can We Encode? - An Analysis of Practical Wireless Network CodingLe, J. / Lui, J. C. S. / Chiu, D. M. et al. | 2008
- 376
-
Bounds on the Benefit of Network Coding: Throughput and Energy Saving in Wireless NetworksKeshavarz-Haddad, A. / Riedi, R. et al. | 2008
- 385
-
Weighted Proportional Fairness Capacity of Gaussian MIMO Broadcast ChannelsLiu, J. / Hou, Y. T. et al. | 2008
- 394
-
Decentralized Rate Regulation in Random Access ChannelsMenache, I. / Shimkin, N. et al. | 2008
- 403
-
Efficient Rate-Constrained Nash Equilibrium in Collision Channels with State InformationMenache, I. / Shimkin, N. et al. | 2008
- 412
-
CTU: Capturing Throughput Dependencies in UWB NetworksBroustis, I. / Vlavianos, A. / Krishnamurthy, P. / Krishnamurthy, S. V. et al. | 2008
- 421
-
Online Energy Efficient Packet Scheduling with Delay Constraints in Wireless NetworksZhong, X. / Xu, C.-Z. et al. | 2008
- 430
-
Unified Energy-Efficient Routing for Multi-Hop Wireless NetworksKwon, S. / Shroff, N. B. et al. | 2008
- 439
-
An Energy Efficiency Evaluation for Sensor Nodes with Multiple Processors, Radios and SensorsJung, D. / Savvides, A. et al. | 2008
- 448
-
Multi-Objective Topology Control in Wireless NetworksBanner, R. / Orda, A. et al. | 2008
- 457
-
Power Awareness in Network Design and RoutingChabarek, J. / Sommers, J. / Barford, P. / Estan, C. / Tsiang, D. / Wright, S. et al. | 2008
- 466
-
Link-State Routing with Hop-by-Hop Forwarding Can Achieve Optimal Traffic EngineeringXu, D. / Chiang, M. / Rexford, J. et al. | 2008
- 475
-
Area Avoidance Routing in Distance-Vector NetworksZlatokrilov, H. / Levy, H. et al. | 2008
- 484
-
Cluster-Based Back-Pressure Routing AlgorithmYing, L. / Srikant, R. / Towsley, D. et al. | 2008
- 493
-
Cross-Layer Rate Control in Wireless Networks with Lossy Links: Leaky-Pipe Flow, Effective Network Utility Maximization and Hop-by-Hop AlgorithmsGao, Q. / Zhang, J. / Hanly, S. V. et al. | 2008
- 502
-
Architecture and Abstractions for Environment and Traffic Aware System-Level Coordination of Wireless Networks: The Downlink CaseRengarajan, B. / de Veciana, G. et al. | 2008
- 511
-
Computational Analysis and Efficient Algorithms for Micro and Macro OFDMA SchedulingCohen, R. / Katzir, L. et al. | 2008
- 520
-
On the Throughput Capacity of Opportunistic Multicasting with Erasure CodesKozat, U. C. et al. | 2008
- 529
-
Adaptive Selective VerificationKhanna, S. / Venkatesh, S. S. / Fatemieh, O. / Khan, F. / Gunter, C. A. et al. | 2008
- 538
-
A Practical and Flexible Key Management Mechanism For Trusted Collaborative ComputingZou, X. / Dai, Y.-S. / Bertino, E. et al. | 2008
- 547
-
Exploring Historical Location Data for Anonymity Preservation in Location-Based ServicesXu, T. / Cai, Y. et al. | 2008
- 556
-
ALPACAS: A Large-Scale Privacy-Aware Collaborative Anti-Spam SystemZhong, Z. / Ramaswamy, L. / Li, K. et al. | 2008
- 565
-
BodyQoS: Adaptive and Radio-Agnostic QoS for Body Sensor NetworksZhou, G. / Lu, J. / Wan, C.-Y. / Yarvis, M. D. / Stankovic, J. A. et al. | 2008
- 574
-
CORD: Energy-Efficient Reliable Bulk Data Dissemination in Sensor NetworksHuang, L. / Setia, S. et al. | 2008
- 583
-
APL: Autonomous Passive Localization for Wireless Sensors Deployed in Road NetworksJeong, J. / Guo, S. / He, T. / Du, D. et al. | 2008
- 592
-
Probabilistic Approach to Provisioning Guaranteed QoS for Distributed Event DetectionZhu, Y. / Ni, L. M. et al. | 2008
- 601
-
Border Effects, Fairness, and Phase Transition in Large Wireless NetworksDurvy, M. / Dousse, O. / Thiran, P. et al. | 2008
- 610
-
Resource Allocation in Multi-Radio Multi-Channel Multi-Hop Wireless NetworksMerlin, S. / Vaidya, N. / Zorzi, M. et al. | 2008
- 619
-
Joint Scheduling and Congestion Control in Mobile Ad-Hoc NetworksAkyol, U. / Andrews, M. / Gupta, P. / Hobby, J. / Saniee, I. / Stolyar, A. et al. | 2008
- 628
-
On the Capacity of Multi-Channel Wireless Networks Using Directional AntennasDai, H.-N. / Ng, K.-W. / Wong, R.-W. / Wu, M.-Y. et al. | 2008
- 637
-
Queueing Analysis of Loss Systems with Variable Optical Delay LinesLee, D.-S. / Chang, C.-S. / Cheng, J. / Yan, H.-S. et al. | 2008
- 646
-
Emergency Handling in Ethernet Passive Optical Networks Using Priority-Based Dynamic Bandwidth AllocationMoon, B. et al. | 2008
- 655
-
All-Optical Label Stacking: Easing the Trade-offs Between Routing and Architecture Cost in All-Optical Packet SwitchingSolano, F. / Van Caenegem, R. / Colle, D. / Marzo, J. L. / Pickavet, M. / Fabregat, R. / Demeester, P. et al. | 2008
- 664
-
On Constructions of Optical Queues with a Limited Number of RecirculationsCheng, J. / Chang, C.-S. / Chao, T.-H. / Lee, D.-S. / Lien, C.-M. et al. | 2008
- 673
-
Closed Form Solutions for Symmetric Water Filling GamesAltman, E. / Avrachenkov, K. / Garnaev, A. et al. | 2008
- 682
-
Spot Pricing of Secondary Spectrum Usage in Wireless Cellular NetworksMutlu, H. / Alanyali, M. / Starobinski, D. et al. | 2008
- 691
-
Self-Organizing Dynamic Fractional Frequency Reuse in OFDMA SystemsStolyar, A. L. / Viswanathan, H. et al. | 2008
- 700
-
Cell Selection in 4G Cellular NetworksAmzallag, D. / Bar-Yehuda, R. / Raz, D. / Scalosub, G. et al. | 2008
- 700
-
SRLG Failure Localization in All-Optical Networks Using Monitoring Cycles and PathsAhuja, S. S. / Ramasubramanian, S. / Krunz, M. et al. | 2008
- 709
-
A Novel Access Method for Supporting Absolute and Proportional Priorities in 802.11 WLANsNassiri, M. / Heusse, M. / Duda, A. et al. | 2008
- 718
-
Drive-By Localization of Roadside WiFi NetworksSubramanian, A. P. / Deshpande, P. / Gao, J. / Das, S. R. et al. | 2008
- 726
-
Call Admission Control in IEEE 802.11 WLANs Using QP-CATShin, S. / Schulzrinne, H. et al. | 2008
- 735
-
Diagnosing Wireless Packet Losses in 802.11: Separating Collision from Weak SignalRayanchu, S. / Mishra, A. / Agrawal, D. / Saha, S. / Banerjee, S. et al. | 2008
- 744
-
Link Positions Matter: A Noncommutative Routing Metric for Wireless Mesh NetworkJakllari, G. / Eidenbenz, S. / Hengartner, N. / Krishnamurthy, S. V. / Faloutsos, M. et al. | 2008
- 753
-
Network Formation Among Selfish Energy-Constrained Wireless DevicesNama, H. / Mandayam, N. / Yates, R. et al. | 2008
- 762
-
Distance-1 Constrained Channel Assignment in Single Radio Wireless Mesh NetworksAryafar, E. / Gurewitz, O. / Knightly, E. W. et al. | 2008
- 771
-
Minimum Cost Topology Construction for Rural Wireless Mesh NetworksPanigrahi, D. / Dutta, P. / Jaiswal, S. / Naidu, K. V. M. / Rastogi, R. et al. | 2008
- 780
-
Minimum Cost Data Aggregation with Localized Processing for Statistical InferenceAnandkumar, A. / Tong, L. / Swami, A. / Ephremides, A. et al. | 2008
- 789
-
Connectivity-Based Localization of Large Scale Sensor Networks with Complex ShapeLederer, S. / Wang, Y. / Gao, J. et al. | 2008
- 798
-
Robust Planarization of Unlocalized Wireless Sensor NetworksZhang, F. / Jiang, A. / Chen, J. et al. | 2008
- 807
-
On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with AnycastKim, J. / Lin, X. / Shroff, N. B. / Sinha, P. et al. | 2008
- 816
-
On End-to-End Throughput of Opportunistic Routing in Multirate and Multihop Wireless NetworksZeng, K. / Lou, W. / Zhai, H. et al. | 2008
- 825
-
An Information Model for Geographic Greedy Forwarding in Wireless Ad-Hoc Sensor NetworksJiang, Z. / Ma, J. / Lou, W. / Wu, J. et al. | 2008
- 834
-
Randomized 3D Geographic RoutingFlury, R. / Wattenhofer, R. et al. | 2008
- 843
-
Embracing Interference in Ad Hoc Networks Using Joint Routing and Scheduling with Multiple Packet ReceptionWang, X. / Garcia-Luna-Aceves, J. J. et al. | 2008
- 852
-
Dynamic Bandwidth Request-Allocation Algorithm for Real-Time Services in IEEE 802.16 Broadband Wireless Access NetworksPark, E.-C. / Kim, H. / Kim, J.-Y. / Kim, H.-S. et al. | 2008
- 861
-
Creating Templates to Achieve Low Delay in Multi-Carrier Frame-Based Wireless Data SystemsAndrews, M. / Zhang, L. et al. | 2008
- 870
-
Stable and Efficient Spectrum Access in Next Generation Dynamic Spectrum NetworksCao, L. / Zheng, H. et al. | 2008
- 879
-
End-to-End Resource Allocation in OFDM Based Linear Multi-Hop NetworksZhang, X. / Jiao, W. / Tao, M. et al. | 2008
- 888
-
Analysis of Price Competition in a Slotted Resource Allocation GameMaille, P. / Tuffin, B. et al. | 2008
- 897
-
Design and Analysis of Hybrid Packet SchedulersComer, D. / Martynov, M. et al. | 2008
- 906
-
Improved Smoothed Round Robin Schedulers for High-Speed Packet NetworksGuo, C. et al. | 2008
- 915
-
Modeling Resource Sharing Dynamics of VoIP Users over a WLAN Using a Game-Theoretic ApproachWatanabe, E. H. / Menasche, D. S. / de Souza e Silva, E. / Leao, R. M. M. et al. | 2008
- 924
-
On the Levy-Walk Nature of Human MobilityRhee, I. / Shin, M. / Hong, S. / Lee, K. / Chong, S. et al. | 2008
- 933
-
Joint Effects of Radio Channels and Node Mobility on Link Dynamics in Wireless NetworksWang, W. / Zhao, M. et al. | 2008
- 942
-
HERO: Online Real-Time Vehicle Tracking in ShanghaiZhu, H. / Zhu, Y. / Li, M. / Ni, L. M. et al. | 2008
- 951
-
Wide-Area IP Network MobilityHu, X. / Li, L. / Mao, Z. M. / Yang, Y. R. et al. | 2008
- 960
-
Iso-Contour Queries and Gradient Descent with Guaranteed Delivery in Sensor NetworksSarkar, R. / Zhu, X. / Gao, J. / Guibas, L. J. / Mitchell, J. S. B. et al. | 2008
- 968
-
iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor NetworksLu, X. / Spear, M. / Levitt, K. / Wu, S. F. et al. | 2008
- 977
-
Distributed Operator Placement and Data Caching in Large-Scale Sensor NetworksYing, L. / Liu, Z. / Towsley, D. / Xia, C. H. et al. | 2008
- 986
-
Which Distributed Averaging Algorithm Should I Choose for my Sensor Network?Denantes, P. / Benezit, F. / Thiran, P. / Vetterli, M. et al. | 2008
- 995
-
Feasible Rate Allocation in Wireless NetworksGummadi, R. / Jung, K. / Shah, D. / Sreenivas, R. et al. | 2008
- 1004
-
Proportional Fairness in Multi-Rate Wireless LANsLi, L. / Pal, M. / Yang, Y. R. et al. | 2008
- 1013
-
Topology Control for Maintaining Network Connectivity and Maximizing Network Capacity under the Physical ModelGao, Y. / Hou, J. C. / Nguyen, H. et al. | 2008
- 1022
-
Starvation Modeling and Identification in Dense 802.11 Wireless Community NetworksHua, C. / Zheng, R. et al. | 2008
- 1031
-
Inside the New Coolstreaming: Principles, Measurements and Performance ImplicationsLi, B. / Xie, S. / Qu, Y. / Keung, G. Y. / Lin, C. / Liu, J. / Zhang, X. et al. | 2008
- 1040
-
Achieving Honest Ratings with Reputation-Based Fines in Electronic MarketsPapaioannou, T. G. / Stamoulis, G. D. et al. | 2008
- 1049
-
Understanding Disconnection and Stabilization of ChordYao, Z. / Loguinov, D. et al. | 2008
- 1058
-
On Reducing Mesh Delay for Peer-to-Peer Live StreamingRen, D. / Li, Y.-T. / Chan, S.-H. et al. | 2008
- 1067
-
Incremental Bloom FiltersHao, F. / Kodialam, M. / Lakshman, T. V. et al. | 2008
- 1076
-
Resolving Anonymous Routers in Internet Topology Measurement StudiesGunes, M. H. / Sarac, K. et al. | 2008
- 1085
-
The Inframetric Model for the InternetFraigniaud, P. / Lebhar, E. / Viennot, L. et al. | 2008
- 1094
-
Modeling the Evolution of Degree Correlation in Scale-Free Topology GeneratorsWang, X. / Liu, X. / Loguinov, D. et al. | 2008
- 1103
-
Understanding the Capacity Region of the Greedy Maximal Scheduling Algorithm in Multi-Hop Wireless NetworksJoo, C. / Lin, X. / Shroff, N. B. et al. | 2008
- 1112
-
Adaptive Frame Concatenation Mechanisms for QoS in Multi-Rate Wireless Ad Hoc NetworksLi, M. / Zhu, H. / Xiao, Y. / Chlamtac, I. / Prabhakaran, B. et al. | 2008
- 1121
-
Fast and Distributed Computation of Schedules in Wireless NetworksDeb, S. / Mangla, K. / Naidu, K. V. M. et al. | 2008
- 1130
-
Joint Node Placement and Assignment for Throughput Optimization in Mobile Backbone NetworksSrinivas, A. / Modiano, E. et al. | 2008
- 1139
-
Multihop Local Pooling for Distributed Throughput Maximization in Wireless NetworksZussman, G. / Brzezinski, A. / Modiano, E. et al. | 2008
- 1148
-
Capacity of Asynchronous Random-Access Scheduling in Wireless NetworksChafekar, D. / Levin, D. / Kumar, V. S. A. / Marathe, M. V. / Parthasarathy, S. / Srinivasan, A. et al. | 2008
- 1157
-
Distributed Robust Optimization for Communication NetworksYang, K. / Wu, Y. / Huang, J. / Wang, X. / Verdu, S. et al. | 2008
- 1166
-
Approximation Algorithms for Computing Capacity of Wireless Networks with SINR ConstraintsChafekar, D. / Kumar, V. S. A. / Marathe, M. V. / Parthasarathy, S. / Srinivasan, A. et al. | 2008
- 1175
-
Light-Weight Contour Tracking in Wireless Sensor NetworksZhu, X. / Sarkar, R. / Gao, J. / Mitchell, J. S. B. et al. | 2008
- 1184
-
Essentia: Architecting Wireless Sensor Networks AsymmetricallyHe, T. / Stankovic, J. A. / Stoleru, R. / Gu, Y. / Wu, Y. et al. | 2008
- 1193
-
Realistic and Efficient Multi-Channel Communications in Wireless Sensor NetworksWu, Y. / Stankovic, J. A. / He, T. / Lin, S. et al. | 2008
- 1202
-
Using Transmit-Only Sensors to Reduce Deployment Cost of Wireless Sensor NetworksBlaszczyszyn, B. / Radunovic, B. et al. | 2008
- 1211
-
Dynamic Jamming Mitigation for Wireless Broadcast NetworksChiang, J. T. / Hu, Y.-C. et al. | 2008
- 1220
-
A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi NetworksMa, L. / Teymorian, A. Y. / Cheng, X. et al. | 2008
- 1229
-
ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular CommunicationsLu, R. / Lin, X. / Zhu, H. / Ho, P.-H. / Shen, X. et al. | 2008
- 1238
-
On Data-Centric Trust Establishment in Ephemeral Ad Hoc NetworksRaya, M. / Papadimitratos, P. / Gligor, V. D. / Hubaux, J.-P. et al. | 2008
- 1247
-
Adding Capacity Points to a Wireless Mesh Network Using Local SearchRobinson, J. / Uysal, M. / Swaminathan, R. / Knightly, E. et al. | 2008
- 1256
-
Association Control in Mobile Wireless NetworksKim, M. / Liu, Z. / Parthasarathy, S. / Pendarakis, D. / Yang, H. et al. | 2008
- 1265
-
On the Performance of IEEE 802.11 under JammingBayraktaroglu, E. / King, C. / Liu, X. / Noubir, G. / Rajaraman, R. / Thapa, B. et al. | 2008
- 1274
-
Measurement Based Analysis and Modeling of the Error Process in IEEE 802.15.4 LR-WPANsIlyas, M. U. / Radha, H. et al. | 2008
- 1283
-
Mobile Data Gathering with Space-Division Multiple Access in Wireless Sensor NetworksZhao, M. / Ma, M. / Yang, Y. et al. | 2008
- 1292
-
A Distributed Optimization Algorithm for Multi-Hop Cognitive Radio NetworksShi, Y. / Hou, Y. T. et al. | 2008
- 1301
-
Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio NetworksUrgaonkar, R. / Neely, M. J. et al. | 2008
- 1310
-
Cooperative Opportunistic Routing Using Transmit Diversity in Wireless Mesh NetworksKurth, M. / Zubow, A. / Redlich, J.-P. et al. | 2008
- 1319
-
Towards Optimal Resource Allocation in Partial-Fault Tolerant ApplicationsBansal, N. / Bhagwan, R. / Jain, N. / Park, Y. / Turaga, D. / Venkatramani, C. et al. | 2008
- 1328
-
Optimal Geographic Routing for Wireless Networks with Near-Arbitrary Holes and TrafficSubramanian, S. / Shakkottai, S. / Gupta, P. et al. | 2008
- 1337
-
Link State Routing Overhead in Mobile Ad Hoc Networks: A Rate-Distortion FormulationWang, D. / Abouzeid, A. A. et al. | 2008
- 1346
-
Circular Sailing Routing for Wireless NetworksLi, F. / Wang, Y. et al. | 2008
- 1355
-
Multi-Channel Live P2P Streaming: Refocusing on ServersWu, C. / Li, B. / Zhao, S. et al. | 2008
- 1364
-
Stable Peers: Existence, Importance, and Application in Peer-to-Peer Live Video StreamingWang, F. / Liu, J. / Xiong, Y. et al. | 2008
- 1373
-
FLoD: A Framework for Peer-to-Peer 3D StreamingHu, S.-Y. / Huang, T.-H. / Chang, S.-C. / Sung, W.-L. / Jiang, J.-R. / Chen, B.-Y. et al. | 2008
- 1382
-
Snoogle: A Search Engine for the Physical WorldWang, H. / Tan, C. C. / Li, Q. et al. | 2008
- 1391
-
Towards a Theory of Robust Localization Against Malicious Beacon NodesZhong, S. / Jadliwala, M. / Upadhyaya, S. / Qiao, C. et al. | 2008
- 1400
-
Optimal Sleep-Wake Scheduling for Quickest Intrusion Detection Using Wireless Sensor NetworksPremkumar, K. / Kumar, A. et al. | 2008
- 1409
-
An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution AttacksYu, Z. / Wei, Y. / Ramkumar, B. / Guan, Y. et al. | 2008
- 1418
-
Lightweight and Compromise-Resilient Message Authentication in Sensor NetworksZhang, W. / Subramanian, N. / Wang, G. et al. | 2008
- 1427
-
Opportunistic Spectrum Access in Cognitive Radio NetworksHuang, S. / Liu, X. / Ding, Z. et al. | 2008
- 1436
-
MAC for Networks with Multipacket Reception Capability and Spatially Distributed NodesCelik, G. D. / Zussman, G. / Khan, W. F. / Modiano, E. et al. | 2008
- 1445
-
How Physical Carrier Sense Affects System Throughput in IEEE 802.11 Wireless NetworksZeng, Z. / Yang, Y. / Hou, J. C. et al. | 2008
- 1454
-
Channel Aware Distributed Scheduling for Exploiting Multi-Receiver Diversity and Multiuser Diversity in Ad-Hoc Networks: A Unified PHY/MAC ApproachZheng, D. / Cao, M. / Zhang, J. / Kumar, P. R. et al. | 2008
- 1463
-
Pricing, Competition, and Routing for Selfish and Strategic Nodes in Multi-Hop Relay NetworksXi, Y. / Yeh, E. M. et al. | 2008
- 1472
-
Guaranteeing Quality of Service to Peering TrafficZhang-Shen, R. / McKeown, N. et al. | 2008
- 1481
-
A Stateless and Light-Weight Bandwidth Management Mechanism for Elastic TrafficPrasad, R. S. / Thottan, M. / Lakshman, T. V. et al. | 2008
- 1490
-
Stability and Delay Bounds in Heterogeneous Networks of Aggregate SchedulersRizzo, G. / Le Boudec, J.-Y. et al. | 2008
- 1499
-
Efficient Broadcast in MANETs Using Network Coding and Directional AntennasYang, S. / Wu, J. / Cardei, M. et al. | 2008
- 1508
-
Efficient Network Coded Data Transmissions in Disruption Tolerant NetworksLin, Y. / Li, B. / Liang, B. et al. | 2008
- 1517
-
AdapCode: Adaptive Network Coding for Code Updates in Wireless Sensor NetworksHou, I.-H. / Tsai, Y.-E. / Abdelzaher, T. F. / Gupta, I. et al. | 2008
- 1526
-
Continuous Network Coding in Wireless Relay NetworksPu, W. / Luo, C. / Li, S. / Chen, C. W. et al. | 2008
- 1535
-
Competitive Analysis of Opportunistic Spectrum Access StrategiesChang, N. B. / Liu, M. et al. | 2008
- 1543
-
Globally Optimal Channel Assignment for Non-Cooperative Wireless NetworksWu, F. / Zhong, S. / Qiao, C. et al. | 2008
- 1552
-
On Wireless Social Community NetworksManshaei, M. H. / Freudiger, J. / Felegyhazi, M. / Marbach, P. / Hubaux, J.-P. et al. | 2008
- 1561
-
Prioritized Repeated Eliminations Multiple Access: A Novel Protocol for Wireless NetworksWikstrand, G. / Nilsson, T. / Dougherty, M. S. et al. | 2008
- 1570
-
Index Policies for Real-Time Multicast Scheduling for Wireless Broadcast SystemsRaghunathan, V. / Borkar, V. / Cao, M. / Kumar, P. R. et al. | 2008
- 1579
-
Real-Time Video Multicast in WiMAX NetworksDeb, S. / Jaiswal, S. / Nagaraj, K. et al. | 2008
- 1588
-
Cross-Monotonic MulticastLi, Z. et al. | 2008
- 1597
-
Multicast Tree Diameter for Dynamic Distributed Interactive ApplicationsVik, K.-H. / Halvorsen, P. / Griwodz, C. et al. | 2008
- 1606
-
Capacity of Hybrid Cellular-Ad Hoc Data NetworksLaw, L. K. / Krishnamurthy, S. V. / Faloutsos, M. et al. | 2008
- 1615
-
Design Guidelines for Routing Metrics in Multihop Wireless NetworksYang, Y. / Wang, J. et al. | 2008
- 1624
-
Building Robust Nomadic Wireless Mesh Networks Using Directional AntennasDong, Q. / Bejerano, Y. et al. | 2008
- 1633
-
Measurement and Modeling of the Origins of Starvation in Congestion Controlled Mesh NetworksShi, J. / Gurewitz, O. / Mancuso, V. / Camp, J. / Knightly, E. W. et al. | 2008
- 1642
-
A Device-Independent Router ModelChertov, R. / Fahmy, S. / Shroff, N. B. et al. | 2008
- 1651
-
GRE Encapsulated Multicast Probing: A Scalable Technique for Measuring One-Way LossGu, Y. / Breslau, L. / Duffield, N. / Sen, S. et al. | 2008
- 1660
-
Complex Network Measurements: Estimating the Relevance of Observed PropertiesLatapy, M. / Magnien, C. et al. | 2008
- 1669
-
Delay Bounds under Arbitrary Multiplexing: When Network Calculus Leaves You in the Lurch...Schmitt, J. B. / Zdarsky, F. A. / Fidler, M. et al. | 2008
- 1678
-
Sampling Strategies for Epidemic-Style Information DisseminationVojnovic, M. / Gupta, V. / Karagiannis, T. / Gkantsidis, C. et al. | 2008
- 1687
-
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh NetworksSun, J. / Zhang, C. / Fang, Y. et al. | 2008
- 1696
-
Exact Modeling of Propagation for Permutation-Scanning WormsManna, P. K. / Chen, S. / Ranka, S. et al. | 2008
- 1705
-
Distributed Spatial Anomaly DetectionChhabra, P. / Scott, C. / Kolaczyk, E. D. / Crovella, M. et al. | 2008
- 1714
-
HyperCBR: Large-Scale Content-Based Routing in a Multidimensional SpaceCastelli, S. / Costa, P. / Picco, G. P. et al. | 2008
- 1723
-
Searching for Rare Objects Using Index ReplicationPuttaswamy, K. P. N. / Sala, A. / Zhao, B. Y. et al. | 2008
- 1732
-
Bandwidth-Aware Routing in Overlay NetworksLee, S.-J. / Banerjee, S. / Sharma, P. / Yalagandula, P. / Basu, S. et al. | 2008
- 1741
-
Minerva: Learning to Infer Network Path PropertiesWouhaybi, R. H. / Sharma, P. / Banerjee, S. / Campbell, A. T. et al. | 2008
- 1750
-
Design of Robust Random Access Protocols For Wireless Networks Using Game Theoretic ModelsCho, Y. / Hwang, C.-S. / Tobagi, F. A. et al. | 2008
- 1759
-
A Stochastic Evolutionary Game of Energy Management in a Distributed Aloha NetworkAltman, E. / Hayel, Y. et al. | 2008
- 1768
-
Detecting 802.11 MAC Layer Spoofing Using Received Signal StrengthSheng, Y. / Tan, K. / Chen, G. / Kotz, D. / Campbell, A. et al. | 2008
- 1777
-
Wireless Medium Access via Adaptive Backoff: Delay and Loss MinimizationHauksson, G. / Alanyali, M. et al. | 2008
- 1786
-
Beyond TCAMs: An SRAM-Based Parallel Multi-Pipeline Architecture for Terabit IP LookupJiang, W. / Wang, Q. / Prasanna, V. K. et al. | 2008
- 1795
-
A Memory-Efficient Hashing by Multi-Predicate Bloom Filters for Packet ClassificationYu, H. / Mahapatra, R. et al. | 2008
- 1804
-
Time Blocking Analysis in Time-Driven Switching NetworksNguyen, V.-T. / Lo Cigno, R. / Ofek, Y. / Telek, M. et al. | 2008
- 1813
-
Run-Time System for Scalable Network ServicesShevade, U. / Kokku, R. / Vin, H. M. et al. | 2008
- 1822
-
On Optimal Sizing of Tiered Network ServicesLv, Q. / Rouskas, G. N. et al. | 2008
- 1831
-
Maximum Coverage at Minimum Cost for Multi-Domain IP/MPLS NetworksYannuzzi, M. / Masip-Bruin, X. / Serral-Gracia, R. / Marin-Tordera, E. / Sprintson, A. / Orda, A. et al. | 2008
- 1840
-
Non-Metric Coordinates for Predicting Network ProximityKey, P. / Massoulie, L. / Tomozei, D.-C. et al. | 2008
- 1849
-
Detecting Anomalies Using End-to-End Path MeasurementsNaidu, K. V. M. / Panigrahi, D. / Rastogi, R. et al. | 2008
- 1858
-
Design and Evaluation of a Routing-Informed Cooperative MAC Protocol for Ad Hoc NetworksLichte, H. S. / Valentin, S. / Karl, H. / Aad, I. / Loyola, L. / Widmer, J. et al. | 2008
- 1867
-
Residual Link Lifetime Prediction with Limited Information Input in Mobile Ad Hoc NetworksHaas, Z. J. / Hua, E. Y. et al. | 2008
- 1876
-
Robust Distributed Spectrum Sensing in Cognitive Radio NetworksChen, R. / Park, J.-M. / Bian, K. et al. | 2008
- 1885
-
Spectrum Sharing in Cognitive Radio NetworksWang, F. / Krunz, M. / Cui, S. et al. | 2008
- 1894
-
Power-Adjusted Random Access to a Wireless ChannelChoi, Y.-J. / Shin, K. G. et al. | 2008
- 1903
-
A Game-Theoretic Analysis of QoS in Wireless MACNuggehalli, P. / Sarkar, M. / Kulkarni, K. / Rao, R. R. et al. | 2008
- 1912
-
Optimizing Distributed MAC Protocol for Multi-Hop Ultra-Wideband Wireless NetworksCai, L. X. / Cai, L. / Shen, X. / Mark, J. W. et al. | 2008
- 1921
-
Exploiting Multi-Channel Diversity in Spectrum-Agile NetworksMin, A. W. / Shin, K. G. et al. | 2008
- 1930
-
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring SystemsWang, X. / Yu, W. / Fu, X. / Xuan, D. / Zhao, W. et al. | 2008
- 1939
-
Cyber-Fraud is One Typo AwayBanerjee, A. / Barman, D. / Faloutsos, M. / Bhuyan, L. N. et al. | 2008
- 1948
-
A New Perspective on Internet Security using InsuranceBolot, J. C. / Lelarge, M. et al. | 2008
- 1957
-
A Novel Quantitative Approach For Measuring Network SecurityAhmed, M. S. / Al-Shaer, E. / Khan, L. et al. | 2008
- 1966
-
Task Scheduling and Lightpath Establishment in Optical GridsLiu, X. / Wei, W. / Qiao, C. / Wang, T. / Hu, W. / Guo, W. / Wu, M.-Y. et al. | 2008
- 1975
-
On Transient-Constrained Wavelength AssignmentLi, G. / Chiu, A. / Doverspike, R. / Birk, M. / Husa, D. / Zanki, N. et al. | 2008
- 1984
-
Theory of Linear Games with Constraints and Its Application to Power Control of Optical NetworksZhu, Q. / Pavel, L. et al. | 2008
- 1993
-
A Three-Stage Load-Balancing SwitchWang, X. / Cai, Y. / Xiao, S. / Gong, W. et al. | 2008
- 2011
-
Limit Theorems for Degree of Coverage and Lifetime in Large Sensor NetworksPaillard, G. / Ravelomanana, V. et al. | 2008
- 2020
-
A Novel On-Demand Framework for Collaborative Object Detection in Sensor NetworksYang, G. / Shukla, V. / Qiao, D. et al. | 2008
- 2029
-
Towards Energy-Optimal and Reliable Data Collection via Collision-Free Scheduling in Wireless Sensor NetworksLee, H. / Keshavarzian, A. et al. | 2008
- 2038
-
Cross-Layer Quality of Service Support for UWB Wireless Multimedia Sensor NetworksMelodia, T. / Akyildiz, I. F. et al. | 2008
- 2047
-
A Singlehop Collaborative Feedback Primitive for Wireless Sensor NetworksDemirbas, M. / Soysal, O. / Hussain, M. et al. | 2008
- 2056
-
A New ACK Policy To Mitigate the Effects of Coexisting IEEE 802.11/802.11e DevicesAl-Mefleh, H. / Chang, J. M. et al. | 2008
- 2065
-
An Empirical Activity Model for WLAN UsersPhillips, C. / Singh, S. et al. | 2008
- 2074
-
Opportunistic Waiver of Data Reception for Exploiting Multiuser Diversity in the Uplink of IEEE 802.11 WLANHahm, S.-I. / Lee, J.-W. / Kim, C.-K. et al. | 2008
- 2083
-
A Practical SNR-Guided Rate AdaptationZhang, J. / Tan, K. / Zhao, J. / Wu, H. / Zhang, Y. et al. | 2008
- 2101
-
Delay Tolerant Collaborations among Campus-Wide Wireless UsersYu, X. / Chandra, S. et al. | 2008
- 2110
-
DRIP: A Dynamic VoRonoi RegIons-Based Publish/Subscribe Protocol in Mobile NetworksYuan, Q. / Wu, J. et al. | 2008
- 2119
-
Information Concealing GamesSarkar, S. / Altman, E. / El-Azouzi, R. / Hayel, Y. et al. | 2008
- 2128
-
SVATS: A Sensor-Network-Based Vehicle Anti-Theft SystemSong, H. / Zhu, S. / Cao, G. et al. | 2008
- 2137
-
Spatial Signatures for Lightweight Security in Wireless Sensor NetworksSang, L. / Arora, A. et al. | 2008
- 2146
-
ACK-Clocking Dynamics: Modelling the Interaction between Windows and the NetworkJacobsson, K. / Andrew, L. L. H. / Tang, A. / Johansson, K. H. / Hjalmarsson, H. / Low, S. H. et al. | 2008
- 2153
-
Maximal Recovery Network Coding under Topology ConstraintMisra, K. / Karande, S. / Radha, H. et al. | 2008
- 2162
-
Is Random Network Coding Helpful in WiMAX?Jin, J. / Li, B. / Kong, T. et al. | 2008
- 2171
-
Reliability Gain of Network Coding in Lossy Wireless NetworksGhaderi, M. / Towsley, D. / Kurose, J. et al. | 2008
- 2180
-
Making Large Scale Deployment of RCP Practical for Real NetworksTai, C.-H. / Zhu, J. / Dukkipati, N. et al. | 2008
- 2189
-
A Decomposition Method for Transmission Scheduling in Multi-Channel Wireless Sensor NetworksPaschalidis, I. C. / Lai, W. / Song, X. et al. | 2008
- 2198
-
Scalable Localization with Mobility Prediction for Underwater Sensor NetworksZhou, Z. / Cui, J.-H. / Bagtzoglou, A. et al. | 2008
- 2207
-
Asynchronous Sampling Benefits Wireless Sensor NetworksWang, J. / Liu, Y. / Das, S. K. et al. | 2008
- 2216
-
Sensor-Aided Overlay Deployment and Relocation for Vast-Scale Sensor NetworksYang, G. / Tong, B. / Qiao, D. / Zhang, W. et al. | 2008
- 2225
-
Utility-Driven Spatiotemporal Sampling Using Mobile SensorsYu, Y. / Rittle, L. J. et al. | 2008
- 2234
-
Routing in Outer SpaceMei, A. / Stefa, J. et al. | 2008
- 2243
-
Location-Dependent Network Performance and Design Strategies for Wireless Mesh NetworksLiu, T. / Liao, W. et al. | 2008
- 2252
-
An Optimization Framework for Opportunistic Multipath Routing in Wireless Mesh NetworksRadunovic, B. / Gkantsidis, C. / Key, P. / Rodriguez, P. et al. | 2008
- 2261
-
A New Channel Assignment Mechanism for Rural Wireless Mesh NetworksDutta, P. / Jaiswal, S. / Panigrahi, D. / Rastogi, R. et al. | 2008
- 2270
-
DSCM: An Energy-Efficient and Rate-Optimal Multicast Protocol for Multihop Wireless Networks Using Distributed Source CodingSartipi, M. / Vellambi, B. N. / Rahnavard, N. / Fekri, F. et al. | 2008
- 2288
-
L+1-MWM: A Fast Pattern Matching Algorithm for High-Speed Packet FilteringChoi, Y.-H. / Jung, M.-Y. / Seo, S.-W. et al. | 2008
- 2297
-
Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS AttacksBen-Porat, U. / Bremler-Barr, A. / Levy, H. et al. | 2008
- 2306
-
Spatial-Temporal Characteristics of Internet Malicious SourcesChen, Z. / Ji, C. / Barford, P. et al. | 2008
- 2315
-
DAWN: A Novel Strategy for Detecting ASCII Worms in NetworksManna, P. K. / Ranka, S. / Chen, S. et al. | 2008
- 2324
-
Maximizing Restorable Throughput in MPLS NetworksCohen, R. / Nakibly, G. et al. | 2008
- 2333
-
A Backup Route Aware Routing Protocol - Fast Recovery from Transient Routing FailuresWang, F. / Gao, L. et al. | 2008
- 2342
-
Policy-Aware Topologies for Efficient Inter-Domain Routing EvaluationsHe, Y. / Faloutsos, M. / Krishnamurthy, S. V. / Chrobak, M. et al. | 2008
- 2351
-
A Distributed Minimum-Distortion Routing Algorithm with In-Network Data ProcessingKhalili, R. / Kurose, J. et al. | 2008
- 2360
-
Designing a Fault-Tolerant Network Using Valiant Load-BalancingZhang-Shen, R. / McKeown, N. et al. | 2008
- 2369
-
Cooperative Routing in Multi-Source Multi-Destination Multi-Hop Wireless NetworksZhang, J. / Zhang, Q. et al. | 2008
- 2378
-
On a Non-Linear Optimization Approach for Proportional Fairness in Ad-Hoc Wireless NetworksSingh, N. / Sreenivas, R. S. et al. | 2008
- 2387
-
Exploiting Heavy-Tailed Statistics for Predictable QoS Routing in Ad Hoc Wireless NetworksLuo, S. / Li, J. H. / Park, K. / Levy, R. et al. | 2008
- 2396
-
Beyond Proportional Fairness: A Resource Biasing Framework for Shaping Throughput Profiles in Multihop Wireless NetworksSingh, S. / Madhow, U. / Belding, E. M. et al. | 2008
- 2405
-
Resource Allocation for Downlink Statistical Multiuser QoS Provisionings in Cellular Wireless NetworksDu, Q. / Zhang, X. et al. | 2008
- 2414
-
State-Dependent Proportional Fair Scheduling Algorithms for Wireless Forward Link Data ServicesTsai, J.-T. et al. | 2008
- 2423
-
QoS Performance Analysis of Cognitive Radio-Based Virtual Wireless NetworksIshibashi, B. / Bouabdallah, N. / Boutaba, R. et al. | 2008
- 2432
-
An Explanation for Unexpected 802.11 Outdoor Link-level Measurement ResultsGiustiniano, D. / Bianchi, G. / Scalia, L. / Tinnirello, I. et al. | 2008
- 2441
-
Design of a Channel Characteristics-Aware Routing ProtocolKrishnan, R. / Raniwala, A. / Chiueh, T.-C. et al. | 2008
- 2450
-
BAKE: A Balanced Kautz Tree Structure for Peer-to-Peer NetworksGuo, D. / Liu, Y. / Li, X. et al. | 2008
- 2458
-
Maximizing Resilient Throughput in Peer-to-Peer Network: A Generalized Flow ApproachChang, B. / Cui, Y. / Xue, Y. et al. | 2008
- 2467
-
Exploiting the Properties of Query Workload and File Name Distributions to Improve P2P Synopsis-Based SearchesAcosta, W. / Chandra, S. et al. | 2008
- 2476
-
Towards Collaborative User-Level Overlay Fault DiagnosisTang, Y. / Al-Shaer, E. et al. | 2008
- 2485
-
A Trust and Reputation based Anti-SPIM MethodBi, J. / Wu, J. / Zhang, W. et al. | 2008
- i
-
2008 COPYRIGHT PAGE| 2008
- ii
-
DEDICATION TO JENNIFER HOU| 2008
- iii
-
MESSAGE FROM THE GENERAL CHAIR| 2008
- iv
-
MESSAGE FROM THE TECHNICAL CHAIR| 2008
- vi
-
MESSAGE FROM MINI PROGRAM CHAIR| 2008
- vii
-
CONFERENCE ORGANIZING COMMITTEE| 2008
- xvi
-
SPONSORS| 2008
- xvii
-
TABLE OF CONTENTS| 2008